From cd410812cdc91133805959e73890902086b746d6 Mon Sep 17 00:00:00 2001 From: nlepagnez Date: Thu, 17 Aug 2023 16:25:24 +0200 Subject: [PATCH 01/18] Change ESI_ExchConfigAvailableEnvironments to ExchangeEnvironmentList in all files --- .../ESI-ExchangeOnPremisesCollector.json | 4 ++-- .../Package/createUiDefinition.json | 2 +- .../Package/mainTemplate.json | 12 ++++++------ .../Parsers/ExchangeEnvironmentList.txt | 2 +- ...Microsoft Exchange Least Privilege with RBAC.json | 2 +- .../Microsoft Exchange Security Review.json | 2 +- .../Data Connectors/ESI-ExchangeOnlineCollector.json | 4 ++-- .../Package/createUiDefinition.json | 2 +- .../Package/mainTemplate.json | 12 ++++++------ .../Parsers/ExchangeEnvironmentList.txt | 2 +- ... Exchange Least Privilege with RBAC - Online.json | 2 +- .../Microsoft Exchange Security Review - Online.json | 2 +- 12 files changed, 24 insertions(+), 24 deletions(-) diff --git a/Solutions/Microsoft Exchange Security - Exchange On-Premises/Data Connectors/ESI-ExchangeOnPremisesCollector.json b/Solutions/Microsoft Exchange Security - Exchange On-Premises/Data Connectors/ESI-ExchangeOnPremisesCollector.json index d4552fae0d2..f0f0cd73cf5 100644 --- a/Solutions/Microsoft Exchange Security - Exchange On-Premises/Data Connectors/ESI-ExchangeOnPremisesCollector.json +++ b/Solutions/Microsoft Exchange Security - Exchange On-Premises/Data Connectors/ESI-ExchangeOnPremisesCollector.json @@ -67,7 +67,7 @@ "instructionSteps": [ { "title": "Parser deployment (When using Microsoft Exchange Security Solution, Parsers are automatically deployed)", - "description": ">**NOTE:** This data connector depends on a parser based on a Kusto Function to work as expected. Follow the steps for each Parser to create the Kusto Functions alias : [**ExchangeConfiguration**](https://aka.ms/sentinel-ESI-ExchangeConfiguration-OnPrem-parser) and [**ESI_ExchConfigAvailableEnvironments**](https://aka.ms/sentinel-ESI-ExchangeEnvironmentList-OnPrem-parser)", + "description": ">**NOTE:** This data connector depends on a parser based on a Kusto Function to work as expected. Follow the steps for each Parser to create the Kusto Functions alias : [**ExchangeConfiguration**](https://aka.ms/sentinel-ESI-ExchangeConfiguration-OnPrem-parser) and [**ExchangeEnvironmentList**](https://aka.ms/sentinel-ESI-ExchangeEnvironmentList-OnPrem-parser)", "instructions": [ { "parameters": { @@ -86,7 +86,7 @@ "description": "Click on save button.\n Define the parameters as asked on the header of the parser file.\nClick save again." }, { - "title": "4. Reproduce the same steps for Parser **ESI_ExchConfigAvailableEnvironments**", + "title": "4. Reproduce the same steps for Parser **ExchangeEnvironmentList**", "description": "Reproduce the step 2 and 3 with the content of 'ExchangeEnvironmentList.txt' file" } ] diff --git a/Solutions/Microsoft Exchange Security - Exchange On-Premises/Package/createUiDefinition.json b/Solutions/Microsoft Exchange Security - Exchange On-Premises/Package/createUiDefinition.json index 00b5ae52581..b218ff8f728 100644 --- a/Solutions/Microsoft Exchange Security - Exchange On-Premises/Package/createUiDefinition.json +++ b/Solutions/Microsoft Exchange Security - Exchange On-Premises/Package/createUiDefinition.json @@ -107,7 +107,7 @@ "name": "dataconnectors-parser-text", "type": "Microsoft.Common.TextBlock", "options": { - "text": "The solution installs three (3) parsers that transform ingested data. The transformed logs can be accessed using the ExchangeConfiguration, ExchangeAdminAuditLogs and ESI_ExchConfigAvailableEnvironments Kusto Function aliases." + "text": "The solution installs three (3) parsers that transform ingested data. The transformed logs can be accessed using the ExchangeConfiguration, ExchangeAdminAuditLogs and ExchangeEnvironmentList Kusto Function aliases." } } ] diff --git a/Solutions/Microsoft Exchange Security - Exchange On-Premises/Package/mainTemplate.json b/Solutions/Microsoft Exchange Security - Exchange On-Premises/Package/mainTemplate.json index fd12dbc1048..c9b544ea61a 100644 --- a/Solutions/Microsoft Exchange Security - Exchange On-Premises/Package/mainTemplate.json +++ b/Solutions/Microsoft Exchange Security - Exchange On-Premises/Package/mainTemplate.json @@ -1705,7 +1705,7 @@ }, "instructionSteps": [ { - "description": ">**NOTE:** This data connector depends on a parser based on a Kusto Function to work as expected. Follow the steps for each Parser to create the Kusto Functions alias : [**ExchangeConfiguration**](https://aka.ms/sentinel-ESI-ExchangeConfiguration-OnPrem-parser) and [**ESI_ExchConfigAvailableEnvironments**](https://aka.ms/sentinel-ESI-ExchangeEnvironmentList-OnPrem-parser)", + "description": ">**NOTE:** This data connector depends on a parser based on a Kusto Function to work as expected. Follow the steps for each Parser to create the Kusto Functions alias : [**ExchangeConfiguration**](https://aka.ms/sentinel-ESI-ExchangeConfiguration-OnPrem-parser) and [**ExchangeEnvironmentList**](https://aka.ms/sentinel-ESI-ExchangeEnvironmentList-OnPrem-parser)", "instructions": [ { "parameters": { @@ -1724,7 +1724,7 @@ "description": "Click on save button.\n Define the parameters as asked on the header of the parser file.\nClick save again." }, { - "title": "4. Reproduce the same steps for Parser **ESI_ExchConfigAvailableEnvironments**", + "title": "4. Reproduce the same steps for Parser **ExchangeEnvironmentList**", "description": "Reproduce the step 2 and 3 with the content of 'ExchangeEnvironmentList.txt' file" } ] @@ -1945,7 +1945,7 @@ }, "instructionSteps": [ { - "description": ">**NOTE:** This data connector depends on a parser based on a Kusto Function to work as expected. Follow the steps for each Parser to create the Kusto Functions alias : [**ExchangeConfiguration**](https://aka.ms/sentinel-ESI-ExchangeConfiguration-OnPrem-parser) and [**ESI_ExchConfigAvailableEnvironments**](https://aka.ms/sentinel-ESI-ExchangeEnvironmentList-OnPrem-parser)", + "description": ">**NOTE:** This data connector depends on a parser based on a Kusto Function to work as expected. Follow the steps for each Parser to create the Kusto Functions alias : [**ExchangeConfiguration**](https://aka.ms/sentinel-ESI-ExchangeConfiguration-OnPrem-parser) and [**ExchangeEnvironmentList**](https://aka.ms/sentinel-ESI-ExchangeEnvironmentList-OnPrem-parser)", "instructions": [ { "parameters": { @@ -1964,7 +1964,7 @@ "description": "Click on save button.\n Define the parameters as asked on the header of the parser file.\nClick save again." }, { - "title": "4. Reproduce the same steps for Parser **ESI_ExchConfigAvailableEnvironments**", + "title": "4. Reproduce the same steps for Parser **ExchangeEnvironmentList**", "description": "Reproduce the step 2 and 3 with the content of 'ExchangeEnvironmentList.txt' file" } ] @@ -2473,7 +2473,7 @@ }, "properties": { "displayName": "[parameters('workbook1-name')]", - "serializedData": "{\"version\":\"Notebook/1.0\",\"items\":[{\"type\":9,\"content\":{\"version\":\"KqlParameterItem/1.0\",\"parameters\":[{\"id\":\"743317e2-ebcf-4958-861d-4ff97fc7cce1\",\"version\":\"KqlParameterItem/1.0\",\"name\":\"EnvironmentList\",\"label\":\"Environment\",\"type\":2,\"isRequired\":true,\"multiSelect\":true,\"quote\":\"'\",\"delimiter\":\",\",\"query\":\"ESI_ExchConfigAvailableEnvironments(Target=\\\"On-Premises\\\") | where ESIEnvironment != \\\"\\\"\",\"typeSettings\":{\"limitSelectTo\":1,\"showDefault\":false},\"queryType\":0,\"resourceType\":\"microsoft.operationalinsights/workspaces\"},{\"id\":\"a88b4e41-eb2f-41bf-92d8-27c83650a4b8\",\"version\":\"KqlParameterItem/1.0\",\"name\":\"DateOfConfiguration\",\"label\":\"Collection time\",\"type\":2,\"isRequired\":true,\"query\":\"let _configurationEnv = split(iff(isnull({EnvironmentList}) or isempty({EnvironmentList}) or tolower({EnvironmentList}) == \\\"all\\\",\\\"All\\\",tostring({EnvironmentList})),',');\\r\\nESIExchangeConfig_CL\\r\\n| extend ScopedEnvironment = iff(_configurationEnv contains \\\"All\\\", \\\"All\\\",ESIEnvironment_s) \\r\\n| where ScopedEnvironment in (_configurationEnv)\\r\\n| extend Collection = format_datetime(todatetime(EntryDate_s), 'yyyy-MM-dd')\\r\\n| summarize Collection = max(Collection)\\r\\n| project Collection = \\\"lastdate\\\", Selected = true\\r\\n| join kind= fullouter ( ESIExchangeConfig_CL | extend ScopedEnvironment = iff(_configurationEnv contains \\\"All\\\", \\\"All\\\",ESIEnvironment_s) \\r\\n | where ScopedEnvironment in (_configurationEnv)\\r\\n | where TimeGenerated > ago(90d)\\r\\n | extend Collection = format_datetime(todatetime(EntryDate_s), 'yyyy-MM-dd')\\r\\n | summarize by Collection \\r\\n | join kind= fullouter ( ESIExchangeConfig_CL | extend ScopedEnvironment = iff(_configurationEnv contains \\\"All\\\", \\\"All\\\",ESIEnvironment_s) \\r\\n | where ScopedEnvironment in (_configurationEnv)\\r\\n | where TimeGenerated > ago(90d)\\r\\n | extend Collection = format_datetime(todatetime(EntryDate_s), 'yyyy-MM-dd')\\r\\n | extend PreciseCollection = format_datetime(todatetime(EntryDate_s), 'yyyy-MM-dd HH:mm ')\\r\\n | summarize by PreciseCollection, Collection \\r\\n | join kind=leftouter (\\r\\n ESIExchangeConfig_CL | extend ScopedEnvironment = iff(_configurationEnv contains \\\"All\\\", \\\"All\\\",ESIEnvironment_s) \\r\\n | where ScopedEnvironment in (_configurationEnv)\\r\\n | where TimeGenerated > ago(90d)\\r\\n | extend Collection = format_datetime(todatetime(EntryDate_s), 'yyyy-MM-dd')\\r\\n | extend PreciseCollection = format_datetime(todatetime(EntryDate_s), 'yyyy-MM-dd HH:mm')\\r\\n | summarize by PreciseCollection, Collection \\r\\n | summarize count() by Collection\\r\\n ) on Collection\\r\\n ) on Collection\\r\\n) on Collection\\r\\n| project Value = iif(Selected,Collection,iif(count_ > 1,PreciseCollection,Collection1)), Label = iif(Selected,\\\"Last Known date\\\",iif(count_ > 1,PreciseCollection,Collection1)), Selected\\r\\n| sort by Selected, Value desc\",\"typeSettings\":{\"showDefault\":false},\"queryType\":0,\"resourceType\":\"microsoft.operationalinsights/workspaces\"},{\"id\":\"8ac96eb3-918b-4a36-bcc4-df50d8f46175\",\"version\":\"KqlParameterItem/1.0\",\"name\":\"Help\",\"label\":\"Show Help\",\"type\":10,\"isRequired\":true,\"query\":\"{\\\"version\\\":\\\"1.0.0\\\",\\\"content\\\":\\\"[\\\\r\\\\n { \\\\\\\"value\\\\\\\": \\\\\\\"Yes\\\\\\\", \\\\\\\"label\\\\\\\": \\\\\\\"Yes\\\\\\\"},\\\\r\\\\n {\\\\\\\"value\\\\\\\": \\\\\\\"No\\\\\\\", \\\\\\\"label\\\\\\\": \\\\\\\"No\\\\\\\", \\\\\\\"selected\\\\\\\":true }\\\\r\\\\n]\\\\r\\\\n\\\"}\",\"timeContext\":{\"durationMs\":2592000000},\"queryType\":8}],\"style\":\"above\",\"queryType\":0,\"resourceType\":\"microsoft.operationalinsights/workspaces\"},\"name\":\"TimeRange\"},{\"type\":1,\"content\":{\"json\":\"This workbook displayed the custom RBAC delegations: on default groups, on Custom Roles groups, Using custom roles.
\\r\\nSelect your Exchange Organization and adjust the time range.\\r\\nBy default, the Help won't be displayed. To display the help, choose Yes on the toogle buttom \\\"Show Help\\\"\",\"style\":\"info\"},\"name\":\"text - 8\"},{\"type\":11,\"content\":{\"version\":\"LinkItem/1.0\",\"style\":\"tabs\",\"links\":[{\"id\":\"e59f0f7f-fd05-4ec8-9f59-e4d9c3b589f2\",\"cellValue\":\"selected\",\"linkTarget\":\"parameter\",\"linkLabel\":\"Current RBAC Delegation\",\"subTarget\":\"RBACDelegation\",\"preText\":\"RBAC Delegation\",\"postText\":\"\",\"style\":\"link\"},{\"id\":\"67739913-b364-4071-864d-faf4d94c9ad6\",\"cellValue\":\"selected\",\"linkTarget\":\"parameter\",\"linkLabel\":\"Custom Roles\",\"subTarget\":\"CustomRole\",\"style\":\"link\"},{\"id\":\"8def944a-53fe-4544-bc8f-5b3ca66eda34\",\"cellValue\":\"selected\",\"linkTarget\":\"parameter\",\"linkLabel\":\"Default Groups content\",\"subTarget\":\"DefaultGroup\",\"preText\":\"Default Group\",\"style\":\"link\"},{\"id\":\"5eeebe10-be67-4f8a-9d91-4bc6c70c3e16\",\"cellValue\":\"selected\",\"linkTarget\":\"parameter\",\"linkLabel\":\"Workbook Help\",\"subTarget\":\"start\",\"style\":\"link\"}]},\"name\":\"links - 3\"},{\"type\":12,\"content\":{\"version\":\"NotebookGroup/1.0\",\"groupType\":\"editable\",\"title\":\"Custom Delegations\",\"items\":[{\"type\":1,\"content\":{\"json\":\"The current delegations are compared to an export of default delegations done on Exchange 2019.\\r\\nTo find which is used for the comparaison please follow this link.\\r\\nThe export is located on the public GitHub of the project.\\r\\n\\r\\ncheck this link : https://aka.ms/esiwatchlist\\r\\n\\r\\nIt will be updated by the team project.\\r\\n\",\"style\":\"info\"},\"name\":\"text - 2\"},{\"type\":12,\"content\":{\"version\":\"NotebookGroup/1.0\",\"groupType\":\"editable\",\"title\":\"Custom Delegations on User Accounts\",\"items\":[{\"type\":1,\"content\":{\"json\":\"This section displays custom delegations set directly on User Accounts.\"},\"name\":\"text - 2 - Copy\"},{\"type\":1,\"content\":{\"json\":\"This section displays all the nonstandard delegations done directly to a user account.\\r\\n\\r\\nDetailed information for the user accounts will be displayed.\\r\\n\\r\\nThis status is done by comparing current delegation with the default delegations for latest export of default Exchange 2019 delegation located in the public GitHub of the project.\\r\\n\\r\\nThese types of delegations are not visible on the Exchange Admin Center.\\r\\n\\r\\nUsual results :\\r\\n\\r\\n - Delegations done directly to service account. Being able to see this delegation will help to sanityze the environment as some delegations may be no more necessary\\r\\n\\r\\n - Delegation done by mistake directly to Administrator Accounts\\r\\n\\r\\n - Suspicious delegations\\r\\n\\r\\nDetailed information for the user accounts will be displayed in the sections below.\\r\\n\\r\\nView RBAC effective permissions\\r\\n\\r\\nGet-ManagementRoleAssignment\\r\\n\\r\\nUnderstanding Role Based Access Control\\r\\n\",\"style\":\"info\"},\"conditionalVisibility\":{\"parameterName\":\"Help\",\"comparison\":\"isEqualTo\",\"value\":\"Yes\"},\"name\":\"text - 3\"},{\"type\":9,\"content\":{\"version\":\"KqlParameterItem/1.0\",\"parameters\":[{\"id\":\"d9d4e0a2-b75d-4825-9f4e-7606516500e1\",\"version\":\"KqlParameterItem/1.0\",\"name\":\"RoleAssignee\",\"type\":2,\"query\":\"let DefMRA = externaldata (Name:string)[h\\\"https://raw.githubusercontent.com/nlepagnez/ESI-PublicContent/main/Operations/Watchlists/StandardMRA.csv\\\"]with(format=\\\"csv\\\",ignoreFirstRecord=true)| summarize make_list(Name);\\r\\nExchangeConfiguration(SpecificSectionList=\\\"MRA\\\",SpecificConfigurationDate=\\\"{DateOfConfiguration:value}\\\",SpecificConfigurationEnv={EnvironmentList})\\r\\n| where CmdletResultValue.Name !in (DefMRA) and CmdletResultValue.RoleAssigneeType == \\\"0\\\"\\r\\n| project CmdletResultValue\\r\\n| extend RoleAssigneeName = tostring(CmdletResultValue.RoleAssigneeName)\\r\\n| distinct RoleAssigneeName\\r\\n\",\"typeSettings\":{\"showDefault\":false},\"queryType\":0,\"resourceType\":\"microsoft.operationalinsights/workspaces\"},{\"id\":\"46c608de-033d-4c4f-99e6-2784439cfa18\",\"version\":\"KqlParameterItem/1.0\",\"name\":\"Role\",\"type\":2,\"query\":\"ExchangeConfiguration(SpecificSectionList=\\\"MRA\\\",SpecificConfigurationDate=\\\"{DateOfConfiguration:value}\\\",SpecificConfigurationEnv={EnvironmentList})\\r\\n|extend Role=tostring (CmdletResultValue.Role.Name)\\r\\n| distinct Role\\r\\n| sort by Role asc\",\"typeSettings\":{\"showDefault\":false},\"queryType\":0,\"resourceType\":\"microsoft.operationalinsights/workspaces\"}],\"style\":\"pills\",\"queryType\":0,\"resourceType\":\"microsoft.operationalinsights/workspaces\"},\"name\":\"parameters - 5\"},{\"type\":3,\"content\":{\"version\":\"KqlItem/1.0\",\"query\":\"let DefMRA = externaldata (Name:string)[h\\\"https://raw.githubusercontent.com/nlepagnez/ESI-PublicContent/main/Operations/Watchlists/StandardMRA.csv\\\"]with(format=\\\"csv\\\",ignoreFirstRecord=true)| summarize make_list(Name);\\r\\nExchangeConfiguration(SpecificSectionList=\\\"MRA\\\",SpecificConfigurationDate=\\\"{DateOfConfiguration:value}\\\",SpecificConfigurationEnv={EnvironmentList})\\r\\n| where CmdletResultValue.RoleAssigneeName endswith \\\"{RoleAssignee}\\\" \\r\\n| where CmdletResultValue.Role.Name contains \\\"{Role}\\\"\\r\\n| where CmdletResultValue.Name !in (DefMRA) and CmdletResultValue.RoleAssigneeType == \\\"0\\\" and CmdletResultValue.Name !contains \\\"Deleg\\\"\\r\\n| extend Name = tostring(CmdletResultValue.Name)\\r\\n| extend Role = tostring(CmdletResultValue.Role.Name)\\r\\n| extend RoleAssigneeName = tostring(CmdletResultValue.RoleAssigneeName)\\r\\n| extend CustomRecipientWriteScope = tostring(CmdletResultValue.CustomRecipientWriteScope.Name)\\r\\n| extend CustomConfigWriteScope = tostring(CmdletResultValue.CustomConfigWriteScope.Name)\\r\\n| extend RecipientWriteScope = case(CmdletResultValue.RecipientWriteScope==\\\"0\\\",\\\"None\\\",CmdletResultValue.RecipientWriteScope==\\\"2\\\",\\\"Organization\\\",CmdletResultValue.RecipientWriteScope==\\\"3\\\",\\\"MyGAL\\\", CmdletResultValue.RecipientWriteScope==\\\"4\\\",\\\"Self\\\",CmdletResultValue.RecipientWriteScope==\\\"7\\\", \\\"CustomRecipientScope\\\",CmdletResultValue.RecipientWriteScope==\\\"8\\\",\\\"MyDistributionGroups\\\",\\\"NotApplicable\\\")\\r\\n| extend ConfigWriteScope = case(CmdletResultValue.ConfigWriteScope==\\\"0\\\",\\\"None\\\",CmdletResultValue.ConfigWriteScope==\\\"7\\\",\\\"CustomConfigScope\\\",CmdletResultValue.ConfigWriteScope==\\\"10\\\",\\\"OrganizationConfig\\\",\\\"NotApplicable\\\")\\r\\n| extend ConfigReadScope = iff(CmdletResultValue.ConfigReadScope == \\\"0\\\" , \\\"None\\\", \\\"OrganizationConfig\\\")\\r\\n| extend RecipientReadScope = case(CmdletResultValue.RecipientReadScope==\\\"2\\\",\\\"Organization\\\",CmdletResultValue.RecipientReadScope==\\\"3\\\",\\\"MyGAL\\\",CmdletResultValue.RecipientReadScope==\\\"4\\\",\\\"Self\\\",\\\"NotApplicable\\\")\\r\\n| extend Status= tostring(CmdletResultValue.Enabled)\\r\\n| extend RoleAssignmentDelegationType = iff(CmdletResultValue.RoleAssignmentDelegationType ==\\\"6\\\" , \\\"Delegating\\\", \\\"Regular\\\")\\r\\n| project Name,Role,RoleAssigneeName, RoleAssignmentDelegationType,Status,CustomRecipientWriteScope, CustomConfigWriteScope, RecipientWriteScope, ConfigWriteScope, ConfigReadScope, RecipientReadScope,WhenCreated, WhenChanged\\r\\n| sort by RoleAssigneeName asc\\r\\n\",\"size\":1,\"showAnalytics\":true,\"showExportToExcel\":true,\"queryType\":0,\"resourceType\":\"microsoft.operationalinsights/workspaces\",\"gridSettings\":{\"formatters\":[{\"columnMatch\":\"CmdletName\",\"formatter\":0,\"formatOptions\":{\"customColumnWidthSetting\":\"31.5ch\"}},{\"columnMatch\":\"Total\",\"formatter\":0,\"formatOptions\":{\"customColumnWidthSetting\":\"9.3ch\"}},{\"columnMatch\":\"Count\",\"formatter\":21,\"formatOptions\":{\"palette\":\"blue\",\"customColumnWidthSetting\":\"330px\"}},{\"columnMatch\":\"Anomalies\",\"formatter\":10,\"formatOptions\":{\"palette\":\"redBright\",\"customColumnWidthSetting\":\"330px\"}}],\"rowLimit\":10000,\"filter\":true,\"sortBy\":[{\"itemKey\":\"RoleAssigneeName\",\"sortOrder\":1}]},\"sortBy\":[{\"itemKey\":\"RoleAssigneeName\",\"sortOrder\":1}]},\"name\":\"query - 2\",\"styleSettings\":{\"showBorder\":true}}]},\"name\":\"Custom Delegations on User Accounts\"},{\"type\":12,\"content\":{\"version\":\"NotebookGroup/1.0\",\"groupType\":\"editable\",\"title\":\"Custom Delegation on Groups\",\"items\":[{\"type\":1,\"content\":{\"json\":\"This section displays custom delegations set on groups.\"},\"name\":\"text - 2\"},{\"type\":1,\"content\":{\"json\":\"This section displays all the nonstandard delegations done for standard and nonstandard groups. Indeed, default groups have a list of default delegations but an Exchange administrators can add also new roles to the default groups.\\r\\n\\r\\nThis status is done by comparing current delegation with the default delegations for latest export of default Exchange 2019 delegation located in the public GitHub of the project.\\r\\n\\r\\n\\r\\nUsual results :\\r\\n\\r\\n - Delegations done for role group Organization Management to role like Mailbox Import Export or Mailbox Search (by default this delegation is not configured)\\r\\n\\r\\n - Delegation done by mistake\\r\\n\\r\\n - Suspicious delegations\\r\\n\\r\\nDetailed information for the user accounts present in the groups will be displayed in the sections below.\\r\\n\\r\\nView RBAC effective permissions\\r\\n\\r\\nGet-ManagementRoleAssignment\\r\\n\\r\\nUnderstanding Role Based Access Control \\r\\n\",\"style\":\"info\"},\"conditionalVisibility\":{\"parameterName\":\"Help\",\"comparison\":\"isEqualTo\",\"value\":\"Yes\"},\"name\":\"text - 3\"},{\"type\":9,\"content\":{\"version\":\"KqlParameterItem/1.0\",\"parameters\":[{\"id\":\"c548eb09-54e3-41bf-a99d-be3534f7018b\",\"version\":\"KqlParameterItem/1.0\",\"name\":\"RoleAssignee\",\"type\":2,\"query\":\"let DefMRA = externaldata (Name:string)[h\\\"https://raw.githubusercontent.com/nlepagnez/ESI-PublicContent/main/Operations/Watchlists/StandardMRA.csv\\\"]with(format=\\\"csv\\\",ignoreFirstRecord=true)| summarize make_list(Name);\\r\\nExchangeConfiguration(SpecificSectionList=\\\"MRA\\\",SpecificConfigurationDate=\\\"{DateOfConfiguration:value}\\\",SpecificConfigurationEnv={EnvironmentList})\\r\\n| where CmdletResultValue.Name !in (DefMRA) and CmdletResultValue.RoleAssigneeType == \\\"10\\\" or CmdletResultValue.RoleAssigneeType == \\\"2\\\" or CmdletResultValue.RoleAssigneeType == \\\"12\\\"\\r\\n| project CmdletResultValue\\r\\n| extend RoleAssigneeName = tostring(CmdletResultValue.RoleAssigneeName)\\r\\n| distinct RoleAssigneeName\",\"typeSettings\":{\"showDefault\":false},\"queryType\":0,\"resourceType\":\"microsoft.operationalinsights/workspaces\",\"rowLimit\":10000},{\"id\":\"4194717a-4a09-4c73-b02d-b1ac8587619d\",\"version\":\"KqlParameterItem/1.0\",\"name\":\"Role\",\"type\":2,\"query\":\"ExchangeConfiguration(SpecificSectionList=\\\"MRA\\\",SpecificConfigurationDate=\\\"{DateOfConfiguration:value}\\\",SpecificConfigurationEnv={EnvironmentList})\\r\\n|extend Role=tostring (CmdletResultValue.Role.Name)\\r\\n| distinct Role\\r\\n| sort by Role asc\",\"queryType\":0,\"resourceType\":\"microsoft.operationalinsights/workspaces\"}],\"style\":\"pills\",\"queryType\":0,\"resourceType\":\"microsoft.operationalinsights/workspaces\"},\"name\":\"parameters - 4\"},{\"type\":3,\"content\":{\"version\":\"KqlItem/1.0\",\"query\":\"let DefMRA = externaldata (Name:string)[h\\\"https://raw.githubusercontent.com/nlepagnez/ESI-PublicContent/main/Operations/Watchlists/StandardMRA.csv\\\"]with(format=\\\"csv\\\",ignoreFirstRecord=true)| summarize make_list(Name);\\r\\nlet RoleG = ExchangeConfiguration(SpecificSectionList=\\\"MRA\\\",SpecificConfigurationDate=\\\"{DateOfConfiguration:value}\\\",SpecificConfigurationEnv={EnvironmentList})\\r\\n| project RoleAssigneeName=tostring(CmdletResultValue.Name);\\r\\nExchangeConfiguration(SpecificSectionList=\\\"MRA\\\",SpecificConfigurationDate=\\\"{DateOfConfiguration:value}\\\",SpecificConfigurationEnv={EnvironmentList})\\r\\n| where CmdletResultValue.RoleAssigneeName endswith \\\"{RoleAssignee}\\\" \\r\\n| where CmdletResultValue.Role.Name contains \\\"{Role}\\\"\\r\\n| where CmdletResultValue.Name !in (DefMRA) and CmdletResultValue.RoleAssigneeType == \\\"10\\\" or CmdletResultValue.RoleAssigneeType == \\\"2\\\" or CmdletResultValue.RoleAssigneeType == \\\"12\\\"\\r\\n| extend Name = tostring(CmdletResultValue.Name)\\r\\n| extend Role = tostring(CmdletResultValue.Role.Name)\\r\\n| extend RoleAssigneeName = tostring(CmdletResultValue.RoleAssigneeName)\\r\\n| extend LinkedGroup = iff(tostring(CmdletResultValue.RoleAssigneeType)==\\\"12\\\", \\\"Yes\\\",\\\"No\\\")\\r\\n|lookup RoleG on RoleAssigneeName \\r\\n//| extend LinkedGroup = iff(tostring(LinkedGroup)==\\\"12\\\", \\\"Yes\\\",\\\"No\\\")\\r\\n| extend RoleAssignmentDelegationType = iff(CmdletResultValue.RoleAssignmentDelegationType ==\\\"6\\\" , \\\"Delegating\\\", \\\"Regular\\\")\\r\\n| extend CustomRecipientWriteScope = tostring(CmdletResultValue.CustomRecipientWriteScope.Name)\\r\\n| extend CustomConfigWriteScope = tostring(CmdletResultValue.CustomConfigWriteScope.Name)\\r\\n| extend RecipientWriteScope = case(CmdletResultValue.RecipientWriteScope==\\\"0\\\",\\\"None\\\",CmdletResultValue.RecipientWriteScope==\\\"2\\\",\\\"Organization\\\",CmdletResultValue.RecipientWriteScope==\\\"3\\\",\\\"MyGAL\\\", CmdletResultValue.RecipientWriteScope==\\\"4\\\",\\\"Self\\\",CmdletResultValue.RecipientWriteScope==\\\"7\\\", \\\"CustomRecipientScope\\\",CmdletResultValue.RecipientWriteScope==\\\"8\\\",\\\"MyDistributionGroups\\\",\\\"NotApplicable\\\")\\r\\n| extend ConfigWriteScope = case(CmdletResultValue.ConfigWriteScope==\\\"0\\\",\\\"None\\\",CmdletResultValue.ConfigWriteScope==\\\"7\\\",\\\"CustomConfigScope\\\",CmdletResultValue.ConfigWriteScope==\\\"10\\\",\\\"OrganizationConfig\\\",\\\"NotApplicable\\\")\\r\\n| extend ConfigReadScope = iff(CmdletResultValue.ConfigReadScope == \\\"0\\\" , \\\"None\\\", \\\"OrganizationConfig\\\")\\r\\n| extend RecipientReadScope = case(CmdletResultValue.RecipientReadScope==\\\"2\\\",\\\"Organization\\\",CmdletResultValue.RecipientReadScope==\\\"3\\\",\\\"MyGAL\\\",CmdletResultValue.RecipientReadScope==\\\"4\\\",\\\"Self\\\",\\\"NotApplicable\\\")\\r\\n| extend Status= tostring(CmdletResultValue.Enabled)\\r\\n| project Name,Role,RoleAssigneeName,LinkedGroup, RoleAssignmentDelegationType,Status,CustomRecipientWriteScope, CustomConfigWriteScope, RecipientWriteScope, ConfigWriteScope, ConfigReadScope, RecipientReadScope,WhenCreated, WhenChanged\\r\\n| sort by RoleAssigneeName asc\",\"size\":1,\"showAnalytics\":true,\"showExportToExcel\":true,\"queryType\":0,\"resourceType\":\"microsoft.operationalinsights/workspaces\",\"gridSettings\":{\"rowLimit\":10000,\"filter\":true}},\"name\":\"query - 1\",\"styleSettings\":{\"showBorder\":true}}]},\"name\":\"Custom Delegation on Groups\"}]},\"conditionalVisibility\":{\"parameterName\":\"selected\",\"comparison\":\"isEqualTo\",\"value\":\"RBACDelegation\"},\"name\":\"Custom Delegation\"},{\"type\":12,\"content\":{\"version\":\"NotebookGroup/1.0\",\"groupType\":\"editable\",\"title\":\"Information for Role Assignee\",\"items\":[{\"type\":12,\"content\":{\"version\":\"NotebookGroup/1.0\",\"groupType\":\"editable\",\"title\":\"Information for Role Assignee User account\",\"items\":[{\"type\":1,\"content\":{\"json\":\"In the previous section, custom delegations for user have been displayed.\\r\\n\\r\\nThis section display detailed information for the accounts found in the previous. Once you know that an account has a high privilege delegations, you may want to have additional information like Last Logon, Password Last Set...\\r\\n\\r\\nSelect a user un the dropdown list.\\r\\n\\r\\n❌ : for last logon displayed when user logged or the last logon is greater than 180 days\\r\\n\\r\\n❌ : for password last set displayed when last password set greater than 366 days\"},\"name\":\"text - 0\"},{\"type\":1,\"content\":{\"json\":\"This section displays details information for user accounts found with non standard delegations :\\r\\n - Last logon\\r\\n - Last Password changed\\r\\n - Account enabled\\r\\n\\r\\nYou may find old service accounts that are no more used, or with a last password set very old...\",\"style\":\"info\"},\"conditionalVisibility\":{\"parameterName\":\"Help\",\"comparison\":\"isEqualTo\",\"value\":\"Yes\"},\"name\":\"text - 3\"},{\"type\":9,\"content\":{\"version\":\"KqlParameterItem/1.0\",\"parameters\":[{\"id\":\"27e4c2e9-d113-4bf9-808f-0f8f68b5152e\",\"version\":\"KqlParameterItem/1.0\",\"name\":\"RoleAssignee\",\"type\":2,\"isRequired\":true,\"query\":\"let DefMRA = externaldata (Name:string)[h\\\"https://raw.githubusercontent.com/nlepagnez/ESI-PublicContent/main/Operations/Watchlists/StandardMRA.csv\\\"]with(format=\\\"csv\\\",ignoreFirstRecord=true)| summarize make_list(Name);\\r\\nExchangeConfiguration(SpecificSectionList=\\\"MRA\\\",SpecificConfigurationDate=\\\"{DateOfConfiguration:value}\\\",SpecificConfigurationEnv={EnvironmentList})\\r\\n| where CmdletResultValue.Name !in (DefMRA) and CmdletResultValue.RoleAssigneeType == \\\"0\\\"\\r\\n| project CmdletResultValue\\r\\n| extend RoleAssigneeName = tostring(CmdletResultValue.RoleAssigneeName)\\r\\n| distinct RoleAssigneeName\",\"typeSettings\":{\"showDefault\":false},\"queryType\":0,\"resourceType\":\"microsoft.operationalinsights/workspaces\"},{\"id\":\"10c2eb2f-2cf2-4650-a9f1-3ee646acaebb\",\"version\":\"KqlParameterItem/1.0\",\"name\":\"LastLogon\",\"label\":\"Last Logon\",\"type\":10,\"isRequired\":true,\"jsonData\":\"[ {\\\"value\\\": \\\"0d\\\", \\\"label\\\": \\\"No filter\\\",\\\"selected\\\":true},\\r\\n{ \\\"value\\\": \\\"90d\\\", \\\"label\\\": \\\"90d\\\" },\\r\\n { \\\"value\\\": \\\"180d\\\", \\\"label\\\": \\\"6m\\\" },\\r\\n { \\\"value\\\": \\\"365d\\\", \\\"label\\\": \\\"1y\\\" },\\r\\n{ \\\"value\\\": \\\"730d\\\", \\\"label\\\": \\\"2y\\\" },\\r\\n{ \\\"value\\\": \\\"1085d\\\", \\\"label\\\": \\\"3y\\\" },\\r\\n{ \\\"value\\\": \\\"1097d\\\", \\\"label\\\": \\\"more than 3y\\\"},\\r\\n{ \\\"value\\\": \\\"3650d\\\", \\\"label\\\": \\\"more than 10y\\\"}\\r\\n]\"},{\"id\":\"6f7128ee-2f2c-421d-bc9f-37aee85fb214\",\"version\":\"KqlParameterItem/1.0\",\"name\":\"PasswordLast\",\"label\":\"Password Last Set\",\"type\":10,\"isRequired\":true,\"jsonData\":\"[{ \\\"value\\\": \\\"0d\\\", \\\"label\\\": \\\"No filter\\\",\\\"selected\\\":true },\\r\\n { \\\"value\\\": \\\"365d\\\", \\\"label\\\": \\\"1y\\\" },\\r\\n{ \\\"value\\\": \\\"730d\\\", \\\"label\\\": \\\"2y\\\" },\\r\\n{ \\\"value\\\": \\\"1095d\\\", \\\"label\\\": \\\"3y\\\" },\\r\\n{ \\\"value\\\": \\\"1097d\\\", \\\"label\\\": \\\"more than 3y\\\"},\\r\\n{ \\\"value\\\": \\\"3650d\\\", \\\"label\\\": \\\"more than 10y\\\"}\\r\\n]\"}],\"style\":\"pills\",\"queryType\":0,\"resourceType\":\"microsoft.operationalinsights/workspaces\"},\"name\":\"parameters - 1\"},{\"type\":3,\"content\":{\"version\":\"KqlItem/1.0\",\"query\":\"ExchangeConfiguration(SpecificSectionList=\\\"DirectRoleAssignments\\\",SpecificConfigurationDate=\\\"{DateOfConfiguration:value}\\\",SpecificConfigurationEnv={EnvironmentList})\\r\\n| where CmdletResultValue.SamAccountName contains \\\"{RoleAssignee}\\\"\\r\\n| where todatetime (CmdletResultValue.LastPwdSetString) < ago({PasswordLast}) or tostring (CmdletResultValue.LastPwdSetString) == \\\"\\\"\\r\\n| where todatetime (CmdletResultValue.LastLogonString) < ago({LastLogon}) or tostring (CmdletResultValue.LastLogonString) == \\\"\\\"\\r\\n| project CmdletResultValue\\r\\n| extend ManagementRoleAssignment = tostring(CmdletResultValue.Parentgroup)\\r\\n| extend Account = tostring(CmdletResultValue.SamAccountName)\\r\\n| extend ObjectClass = tostring(CmdletResultValue.ObjectClass)\\r\\n| extend LastLogon = tostring(CmdletResultValue.LastLogonString)\\r\\n| extend LastLogon = iif(ObjectClass==\\\"group\\\" or ObjectClass==\\\"computer\\\" or ObjectClass==\\\"Local User\\\" or ObjectClass==\\\"computer\\\",\\\"N/A\\\", iif ( todatetime (CmdletResultValue.LastLogonString) > ago(180d), CmdletResultValue.LastLogonString,iff (LastLogon==\\\"\\\", \\\"❌ Never logged\\\",strcat(\\\"❌\\\",LastLogon))))\\r\\n| extend LastPwdSet = CmdletResultValue.LastPwdSetString\\r\\n| extend LastPwdSet = iif(ObjectClass==\\\"group\\\" or ObjectClass==\\\"computer\\\" or ObjectClass==\\\"Local User\\\" or ObjectClass==\\\"computer\\\",\\\"N/A\\\",iif ( todatetime (CmdletResultValue.LastPwdSetString) > ago(366d), CmdletResultValue.LastPwdSetString,iff (LastPwdSet==\\\"\\\", \\\"❌ Password never set\\\",strcat(\\\"❌\\\",LastPwdSet))))\\r\\n| extend Enabled = tostring(CmdletResultValue.Enabled)\\r\\n| extend DN = tostring(CmdletResultValue.DN)\\r\\n| project-away CmdletResultValue\\r\\n| sort by Account asc\",\"size\":1,\"showAnalytics\":true,\"color\":\"green\",\"showExportToExcel\":true,\"queryType\":0,\"resourceType\":\"microsoft.operationalinsights/workspaces\",\"gridSettings\":{\"rowLimit\":10000,\"filter\":true,\"sortBy\":[{\"itemKey\":\"ManagementRoleAssignment\",\"sortOrder\":1}]},\"sortBy\":[{\"itemKey\":\"ManagementRoleAssignment\",\"sortOrder\":1}]},\"name\":\"query - 2\",\"styleSettings\":{\"showBorder\":true}}]},\"name\":\"Information for Role Assignee User account\"},{\"type\":12,\"content\":{\"version\":\"NotebookGroup/1.0\",\"groupType\":\"editable\",\"title\":\"Information for Role Assignee group\",\"items\":[{\"type\":1,\"content\":{\"json\":\"Details information for Group delegation\\r\\nIn the previous section, custom delegations for groups have been displayed.\\r\\n\\r\\nThis section display detailed information for the accounts found in the group displayed in the previuos section. Once you know that an account has a high privilege delegations, you may want to have additional information like Last Logon, Password Last Set...\\r\\n\\r\\nSelect a group un the dropdown list.\\r\\n\\r\\n❌ : for last logon displayed when user logged or the last logon is greater than 180 days\\r\\n\\r\\n❌ : for password last set displayed when last password set greater than 366 days\"},\"name\":\"text - 0\"},{\"type\":1,\"content\":{\"json\":\"This section displays details information for user accounts included in the found groups with non standard delegation : \\r\\n\\r\\n - Last logon\\r\\n - Last Password changed\\r\\n - Account enabled\\r\\n\\r\\nYou may find old service accounts that are no more used, or with a last password set very old...\",\"style\":\"info\"},\"conditionalVisibility\":{\"parameterName\":\"Help\",\"comparison\":\"isEqualTo\",\"value\":\"Yes\"},\"name\":\"text - 3\"},{\"type\":9,\"content\":{\"version\":\"KqlParameterItem/1.0\",\"parameters\":[{\"id\":\"75c3cdf3-d0c3-46c3-83ae-429979774234\",\"version\":\"KqlParameterItem/1.0\",\"name\":\"RoleAssignee\",\"type\":2,\"isRequired\":true,\"query\":\"let DefMRA = externaldata (Name:string)[h\\\"https://raw.githubusercontent.com/nlepagnez/ESI-PublicContent/main/Operations/Watchlists/StandardMRA.csv\\\"]with(format=\\\"csv\\\",ignoreFirstRecord=true)| summarize make_list(Name);\\r\\nExchangeConfiguration(SpecificSectionList=\\\"MRA\\\",SpecificConfigurationDate=\\\"{DateOfConfiguration:value}\\\",SpecificConfigurationEnv={EnvironmentList})\\r\\n| where CmdletResultValue.Name !in (DefMRA) and CmdletResultValue.RoleAssigneeType == \\\"10\\\" or CmdletResultValue.RoleAssigneeType == \\\"2\\\"\\r\\n| project CmdletResultValue\\r\\n| extend RoleAssigneeName = tostring(CmdletResultValue.RoleAssigneeName)\\r\\n| distinct RoleAssigneeName\",\"typeSettings\":{\"showDefault\":false},\"queryType\":0,\"resourceType\":\"microsoft.operationalinsights/workspaces\"},{\"id\":\"1a3b374c-0467-4fd9-b2fc-edebd0a97302\",\"version\":\"KqlParameterItem/1.0\",\"name\":\"LastLogon\",\"label\":\"Last Logon\",\"type\":10,\"isRequired\":true,\"typeSettings\":{\"showDefault\":false},\"jsonData\":\"[ {\\\"value\\\": \\\"0d\\\", \\\"label\\\": \\\"No filter\\\",\\\"selected\\\":true},\\r\\n{ \\\"value\\\": \\\"90d\\\", \\\"label\\\": \\\"90d\\\" },\\r\\n { \\\"value\\\": \\\"180d\\\", \\\"label\\\": \\\"6m\\\" },\\r\\n { \\\"value\\\": \\\"365d\\\", \\\"label\\\": \\\"1y\\\" },\\r\\n{ \\\"value\\\": \\\"730d\\\", \\\"label\\\": \\\"2y\\\" },\\r\\n{ \\\"value\\\": \\\"1085d\\\", \\\"label\\\": \\\"3y\\\" },\\r\\n{ \\\"value\\\": \\\"1097d\\\", \\\"label\\\": \\\"more than 3y\\\"},\\r\\n{ \\\"value\\\": \\\"3650d\\\", \\\"label\\\": \\\"more than 10y\\\"}\\r\\n]\"},{\"id\":\"170db194-195f-4991-b726-6c0658562616\",\"version\":\"KqlParameterItem/1.0\",\"name\":\"PasswordLast\",\"type\":10,\"isRequired\":true,\"jsonData\":\"[{ \\\"value\\\": \\\"0d\\\", \\\"label\\\": \\\"No filter\\\",\\\"selected\\\":true },\\r\\n { \\\"value\\\": \\\"365d\\\", \\\"label\\\": \\\"1y\\\" },\\r\\n{ \\\"value\\\": \\\"730d\\\", \\\"label\\\": \\\"2y\\\" },\\r\\n{ \\\"value\\\": \\\"1095d\\\", \\\"label\\\": \\\"3y\\\" },\\r\\n{ \\\"value\\\": \\\"1097d\\\", \\\"label\\\": \\\"more than 3y\\\"},\\r\\n{ \\\"value\\\": \\\"3650d\\\", \\\"label\\\": \\\"more than 10y\\\"}\\r\\n]\"}],\"style\":\"pills\",\"queryType\":0,\"resourceType\":\"microsoft.operationalinsights/workspaces\"},\"name\":\"parameters - 1\"},{\"type\":3,\"content\":{\"version\":\"KqlItem/1.0\",\"query\":\"ExchangeConfiguration(SpecificSectionList=\\\"ExGroup\\\",SpecificConfigurationDate=\\\"{DateOfConfiguration:value}\\\",SpecificConfigurationEnv={EnvironmentList})\\r\\n| where CmdletResultValue.Parentgroup contains \\\"{RoleAssignee}\\\"\\r\\n| where todatetime (CmdletResultValue.LastPwdSetString) < ago({PasswordLast}) or tostring (CmdletResultValue.LastPwdSetString) == \\\"\\\"\\r\\n| where todatetime (CmdletResultValue.LastLogonString) < ago({LastLogon}) or tostring (CmdletResultValue.LastLogonString) == \\\"\\\"\\r\\n| where CmdletResultValue.Level != 0\\r\\n| project CmdletResultValue\\r\\n| extend Level_ = tostring(CmdletResultValue.Level)\\r\\n| extend Parentgroup = tostring(CmdletResultValue.Parentgroup)\\r\\n| extend MemberPath = tostring(CmdletResultValue.MemberPath)\\r\\n| extend ObjectClass = tostring(CmdletResultValue.ObjectClass)\\r\\n| extend LastLogon = tostring(CmdletResultValue.LastLogonString)\\r\\n| extend LastLogon = iif(ObjectClass==\\\"group\\\" or ObjectClass==\\\"computer\\\" or ObjectClass==\\\"Local User\\\" or ObjectClass==\\\"computer\\\",\\\"N/A\\\", iif ( todatetime (CmdletResultValue.LastLogonString) > ago(180d), CmdletResultValue.LastLogonString,iff (LastLogon==\\\"\\\", \\\"❌ Never logged\\\",strcat(\\\"❌\\\",LastLogon))))\\r\\n| extend LastPwdSet = CmdletResultValue.LastPwdSetString\\r\\n| extend LastPwdSet = iif(ObjectClass==\\\"group\\\" or ObjectClass==\\\"computer\\\" or ObjectClass==\\\"Local User\\\" or ObjectClass==\\\"computer\\\",\\\"N/A\\\",iif ( todatetime (CmdletResultValue.LastPwdSetString) > ago(366d), CmdletResultValue.LastPwdSetString,iff (LastPwdSet==\\\"\\\", \\\"❌ Password never set\\\",strcat(\\\"❌\\\",LastPwdSet))))\\r\\n| extend Enabled = tostring(CmdletResultValue.Enabled)\\r\\n| extend DN = tostring(CmdletResultValue.DN)\\r\\n| project-away CmdletResultValue, Level_,Parentgroup\\r\\n| sort by MemberPath asc\",\"size\":1,\"showAnalytics\":true,\"showExportToExcel\":true,\"queryType\":0,\"resourceType\":\"microsoft.operationalinsights/workspaces\",\"gridSettings\":{\"rowLimit\":10000,\"filter\":true}},\"name\":\"query - 2\",\"styleSettings\":{\"showBorder\":true}}]},\"name\":\"Information for Role Assignee group\"}]},\"conditionalVisibility\":{\"parameterName\":\"selected\",\"comparison\":\"isEqualTo\",\"value\":\"RBACDelegation\"},\"name\":\"Information for Role Assignee\"},{\"type\":12,\"content\":{\"version\":\"NotebookGroup/1.0\",\"groupType\":\"editable\",\"title\":\"Linked Groups information\",\"items\":[{\"type\":12,\"content\":{\"version\":\"NotebookGroup/1.0\",\"groupType\":\"editable\",\"title\":\"Information for Linked Groups\",\"items\":[{\"type\":1,\"content\":{\"json\":\"Display associated remote forest's group for Linked Group\"},\"name\":\"text - 0\"},{\"type\":3,\"content\":{\"version\":\"KqlItem/1.0\",\"query\":\"ExchangeConfiguration(SpecificSectionList=\\\"RoleGroup\\\",SpecificConfigurationDate=\\\"{DateOfConfiguration:value}\\\",SpecificConfigurationEnv={EnvironmentList})\\r\\n| where CmdletResultValue.RoleGroupType == \\\"1\\\"\\r\\n//| extend ManagementRoleAssignment = tostring(CmdletResultValue.Name)\\r\\n| extend RoleAssigneeName = tostring(CmdletResultValue.Name)\\r\\n| extend LinkedGroup = tostring(CmdletResultValue.LinkedGroup)\\r\\n//| extend LinkedGroup = iff(tostring(CmdletResultValue.RoleAssigneeType)==\\\"12\\\", \\\"Yes\\\",\\\"No\\\")\\r\\n//|lookup RoleG on RoleAssigneeName \\r\\n//| extend LinkedGroup = iff(tostring(LinkedGroup)==\\\"12\\\", \\\"Yes\\\",\\\"No\\\")\\r\\n| project RoleAssigneeName, LinkedGroup, WhenCreated, WhenChanged\\r\\n| sort by RoleAssigneeName asc\",\"size\":1,\"showAnalytics\":true,\"color\":\"green\",\"showExportToExcel\":true,\"queryType\":0,\"resourceType\":\"microsoft.operationalinsights/workspaces\",\"gridSettings\":{\"rowLimit\":10000,\"filter\":true}},\"name\":\"query - 2\",\"styleSettings\":{\"showBorder\":true}}]},\"name\":\"Information for Linked Groups\"}]},\"conditionalVisibility\":{\"parameterName\":\"selected\",\"comparison\":\"isEqualTo\",\"value\":\"RBACDelegation\"},\"name\":\"Linked Groups information\",\"styleSettings\":{\"showBorder\":true}},{\"type\":12,\"content\":{\"version\":\"NotebookGroup/1.0\",\"groupType\":\"editable\",\"items\":[{\"type\":12,\"content\":{\"version\":\"NotebookGroup/1.0\",\"groupType\":\"editable\",\"items\":[{\"type\":3,\"content\":{\"version\":\"KqlItem/1.0\",\"query\":\"let StandardGroup = dynamic([\\\"Compliance Management\\\", \\\"Delegated Setup\\\",\\\"Discovery Management\\\",\\\"Help Desk\\\",\\\"Hygiene Management\\\",\\\"Organization Management\\\",\\\"Public Folder Management\\\",\\\"Recipient Management\\\",\\\"Records Management\\\",\\\"Security Administrator\\\",\\\"Security Reader\\\",\\\"Server Management\\\",\\\"UM Management\\\",\\\"View-Only Organization Management\\\"]);\\r\\nExchangeConfiguration(SpecificSectionList=\\\"ExGroup\\\",SpecificConfigurationDate=\\\"{DateOfConfiguration:value}\\\",SpecificConfigurationEnv={EnvironmentList})\\r\\n| where CmdletResultValue.Parentgroup in (StandardGroup)\\r\\n| project CmdletResultValue\\r\\n| extend Parentgroup = tostring(CmdletResultValue.Parentgroup)\\r\\n| summarize Total = count()-1 by Parentgroup\\r\\n| extend Comment = case (Total>0 and Parentgroup contains \\\"Discovery Management\\\", \\\"❌ This group should be empty Just in time should be used\\\", Total>5 and Parentgroup contains \\\"Organization Management\\\", \\\"❌ The content of this group should limited to only Level 3 Administrators\\\", Total>0 and Parentgroup contains \\\"Hygiene Management\\\", \\\"❌ This group should be empty or only contains Exchange server and/or Exchange antivirus Spam accounts\\\", \\\"Remember to regularly review the content of the group\\\")\\r\\n| sort by Parentgroup asc\",\"size\":3,\"showAnalytics\":true,\"title\":\"Numbers of members for high privileges groups\",\"showExportToExcel\":true,\"queryType\":0,\"resourceType\":\"microsoft.operationalinsights/workspaces\",\"gridSettings\":{\"rowLimit\":10000,\"filter\":true}},\"name\":\"query - 1\",\"styleSettings\":{\"showBorder\":true}},{\"type\":12,\"content\":{\"version\":\"NotebookGroup/1.0\",\"groupType\":\"editable\",\"title\":\"Explanations\",\"expandable\":true,\"items\":[{\"type\":1,\"content\":{\"json\":\"All the default Exchange groups located in the default Exchange OU : Microsoft Exchange Security Groups are displayed with their number of members.\\r\\n\\r\\nIt is very important to monitor the content of Exchange groups and raise an alert when a new member is added.\\r\\n\\r\\nFor critical groups, a warning is display if the number exceeded a define thresold :\\r\\n - Discovery Management: This group should be empty, so a warning is displayed when the group is not empty\\r\\n\\r\\n - Organization Management : This group should only contain only Exchange expert. No service account should be member of this groupe. A warning is display when the total numer of member exceeded 5\\r\\n - Hygiene Management : This group can acces and moidify the content of all mailboxes using EWS. A warning is display when the group is not empty. This warning can be ignored if the accounts are the Antispam service account or Exchange servers Computer accounts\"},\"name\":\"text - 0\"}]},\"name\":\"group - 1\"}]},\"name\":\"Summarize Number of Member Per Group\"},{\"type\":1,\"content\":{\"json\":\"❌ : for last logon displayed when user logged or the last logon is greater than 180 days\\r\\n\\r\\n❌ : for password last set displayed when last password set greater than 366 days\"},\"name\":\"text - 3\"},{\"type\":9,\"content\":{\"version\":\"KqlParameterItem/1.0\",\"parameters\":[{\"id\":\"7c281d60-8434-4636-b85e-aef6296f1107\",\"version\":\"KqlParameterItem/1.0\",\"name\":\"LastLogon\",\"label\":\"Last Logon\",\"type\":10,\"isRequired\":true,\"jsonData\":\"[ {\\\"value\\\": \\\"0d\\\", \\\"label\\\": \\\"No filter\\\",\\\"selected\\\":true},\\r\\n{ \\\"value\\\": \\\"90d\\\", \\\"label\\\": \\\"90d\\\" },\\r\\n { \\\"value\\\": \\\"180d\\\", \\\"label\\\": \\\"6m\\\" },\\r\\n { \\\"value\\\": \\\"365d\\\", \\\"label\\\": \\\"1y\\\" },\\r\\n{ \\\"value\\\": \\\"730d\\\", \\\"label\\\": \\\"2y\\\" },\\r\\n{ \\\"value\\\": \\\"1085d\\\", \\\"label\\\": \\\"3y\\\" },\\r\\n{ \\\"value\\\": \\\"1097d\\\", \\\"label\\\": \\\"more than 3y\\\"},\\r\\n{ \\\"value\\\": \\\"3650d\\\", \\\"label\\\": \\\"more than 10y\\\"}\\r\\n]\",\"timeContext\":{\"durationMs\":86400000}},{\"id\":\"e122a0de-1395-4002-96f9-cc057c257518\",\"version\":\"KqlParameterItem/1.0\",\"name\":\"PasswordLast\",\"label\":\"Password Last Set\",\"type\":10,\"isRequired\":true,\"jsonData\":\"[{ \\\"value\\\": \\\"0d\\\", \\\"label\\\": \\\"No filter\\\",\\\"selected\\\":true },\\r\\n { \\\"value\\\": \\\"365d\\\", \\\"label\\\": \\\"1y\\\" },\\r\\n{ \\\"value\\\": \\\"730d\\\", \\\"label\\\": \\\"2y\\\" },\\r\\n{ \\\"value\\\": \\\"1095d\\\", \\\"label\\\": \\\"3y\\\" },\\r\\n{ \\\"value\\\": \\\"1097d\\\", \\\"label\\\": \\\"more than 3y\\\"},\\r\\n{ \\\"value\\\": \\\"3650d\\\", \\\"label\\\": \\\"more than 10y\\\"}\\r\\n]\",\"timeContext\":{\"durationMs\":86400000}}],\"style\":\"pills\",\"queryType\":0,\"resourceType\":\"microsoft.operationalinsights/workspaces\"},\"name\":\"parameters - 4\"},{\"type\":3,\"content\":{\"version\":\"KqlItem/1.0\",\"query\":\"let StandardGroup = dynamic([\\\"Compliance Management\\\", \\\"Delegated Setup\\\",\\\"Discovery Management\\\",\\\"Help Desk\\\",\\\"Hygiene Management\\\",\\\"Organization Management\\\",\\\"Public Folder Management\\\",\\\"Recipient Management\\\",\\\"Records Management\\\",\\\"Security Administrator\\\",\\\"Security Reader\\\",\\\"Server Management\\\",\\\"UM Management\\\",\\\"View-Only Organization Management\\\"]);\\r\\nExchangeConfiguration(SpecificSectionList=\\\"ExGroup\\\",SpecificConfigurationDate=\\\"{DateOfConfiguration:value}\\\",SpecificConfigurationEnv={EnvironmentList})\\r\\n| where CmdletResultValue.Parentgroup in (StandardGroup)\\r\\n| where todatetime (CmdletResultValue.LastPwdSetString) < ago({PasswordLast}) or tostring (CmdletResultValue.LastPwdSetString) == \\\"\\\"\\r\\n| where todatetime (CmdletResultValue.LastLogonString) < ago({LastLogon}) or tostring (CmdletResultValue.LastLogonString) == \\\"\\\"\\r\\n| project CmdletResultValue\\r\\n| extend Parentgroup = tostring(CmdletResultValue.Parentgroup)\\r\\n| extend MemberPath = tostring(CmdletResultValue.MemberPath)\\r\\n| extend Level = tostring(CmdletResultValue.Level)\\r\\n| where Level !=0\\r\\n| extend ObjectClass = tostring(CmdletResultValue.ObjectClass)\\r\\n| extend LastLogon = tostring(CmdletResultValue.LastLogonString)\\r\\n| extend LastLogon = iif(ObjectClass==\\\"group\\\" or ObjectClass==\\\"computer\\\" or ObjectClass==\\\"Local User\\\" or ObjectClass==\\\"computer\\\",\\\"N/A\\\", iif ( todatetime (CmdletResultValue.LastLogonString) > ago(180d), CmdletResultValue.LastLogonString,iff (LastLogon==\\\"\\\", \\\"❌ Never logged\\\",strcat(\\\"❌\\\",LastLogon))))\\r\\n| extend LastPwdSet = CmdletResultValue.LastPwdSetString\\r\\n| extend LastPwdSet = iif(ObjectClass==\\\"group\\\" or ObjectClass==\\\"computer\\\" or ObjectClass==\\\"Local User\\\" or ObjectClass==\\\"computer\\\",\\\"N/A\\\",iif ( todatetime (CmdletResultValue.LastPwdSetString) > ago(366d), CmdletResultValue.LastPwdSetString,iff (LastPwdSet==\\\"\\\", \\\"❌ Password never set\\\",strcat(\\\"❌\\\",LastPwdSet))))\\r\\n| extend Enabled = tostring(CmdletResultValue.Enabled)\\r\\n| extend DN = tostring(CmdletResultValue.DN)\\r\\n| project-away CmdletResultValue\\r\\n| sort by MemberPath asc\",\"size\":3,\"showAnalytics\":true,\"title\":\"Default Exchange groups content\",\"queryType\":0,\"resourceType\":\"microsoft.operationalinsights/workspaces\",\"gridSettings\":{\"formatters\":[{\"columnMatch\":\"$gen_group\",\"formatter\":1},{\"columnMatch\":\"ParentGroup\",\"formatter\":1},{\"columnMatch\":\"Parentgroup\",\"formatter\":5},{\"columnMatch\":\"Group\",\"formatter\":1}],\"rowLimit\":10000,\"filter\":true,\"hierarchySettings\":{\"treeType\":1,\"groupBy\":[\"Parentgroup\"],\"finalBy\":\"Parentgroup\"},\"labelSettings\":[{\"columnId\":\"Parentgroup\",\"label\":\"ParentGroup\"}]}},\"name\":\"query - 1\",\"styleSettings\":{\"showBorder\":true}},{\"type\":12,\"content\":{\"version\":\"NotebookGroup/1.0\",\"groupType\":\"editable\",\"title\":\"Explanations\",\"expandable\":true,\"items\":[{\"type\":1,\"content\":{\"json\":\"This section the content of the groups with details informations.\\r\\n\\r\\nIt is recommended to check the Last logon and last password change informations.\"},\"name\":\"text - 0\"}]},\"name\":\"group - 2\"}]},\"conditionalVisibility\":{\"parameterName\":\"selected\",\"comparison\":\"isEqualTo\",\"value\":\"DefaultGroup\"},\"name\":\"group - 4\"},{\"type\":12,\"content\":{\"version\":\"NotebookGroup/1.0\",\"groupType\":\"editable\",\"title\":\"Let start with Least Privileges with RBAC\",\"items\":[{\"type\":1,\"content\":{\"json\":\"# Workbook goals\\r\\nThe goals of this workbook is to show you the current RBAC delegation\\r\\n\\r\\n\\r\\nThis workbook will display :\\r\\n\\r\\n - NonStandrd RBAC delegation\\r\\n\\r\\n - Exchange default group content\\r\\n\\r\\n - Analysis of the actions performed by Organization Management members to remove them from the groups\\r\\n\\r\\n----\\r\\n\\r\\n## Tabs\\r\\n\\r\\n### Current RBAC Delegation\\r\\n\\r\\nThis tab will show all the nonstandard RBAC delegation.\\r\\n\\r\\n**Most of the time RBAC are done and forgotten... This tab will provide a clear statut of the delegation and help with the remediation.**\\r\\n\\r\\nBy nonstandard, it means that the current delegation are compared to the delegation from Exchange 2019 CU11.\\r\\n\\r\\nNonstandard delegation for standard groups like Organization Management will also be displayed.\\r\\n\\r\\nDetail information for found will be displayed : Last logon, last password changed...\\r\\n\\r\\n### Default Group content\\r\\n\\r\\nThis tab will show the number of members for default Exchange groups and their content.\\r\\n\\r\\nMost of the time, the content of common Exchange groups but Exchange is shipped with many groups that have very high privileges and its interesting to see that they are not empty as expected.\"},\"name\":\"text - 0\"}]},\"conditionalVisibility\":{\"parameterName\":\"selected\",\"comparison\":\"isEqualTo\",\"value\":\"start\"},\"name\":\"group - 6\"},{\"type\":12,\"content\":{\"version\":\"NotebookGroup/1.0\",\"groupType\":\"editable\",\"title\":\"Custom Role details\",\"items\":[{\"type\":12,\"content\":{\"version\":\"NotebookGroup/1.0\",\"groupType\":\"editable\",\"title\":\"List of Custom Roles\",\"items\":[{\"type\":1,\"content\":{\"json\":\"This section shows the Custom management roles that exist in your environnment and the name of the parent's role\"},\"name\":\"text - 0\"},{\"type\":1,\"content\":{\"json\":\"Liste of existing Custom roles\"},\"customWidth\":\"50\",\"name\":\"text - 5\"},{\"type\":1,\"content\":{\"json\":\"List of Custom with a Management Role Assignement (associated with a group or a user). Display the target account and scope if set\"},\"customWidth\":\"50\",\"name\":\"text - 6\"},{\"type\":3,\"content\":{\"version\":\"KqlItem/1.0\",\"query\":\"ExchangeConfiguration(SpecificSectionList=\\\"MRCustom\\\",SpecificConfigurationDate=\\\"{DateOfConfiguration:value}\\\",SpecificConfigurationEnv={EnvironmentList},Target = \\\"On-Premises\\\")\\r\\n| extend Identity = CmdletResultValue.Name\\r\\n| extend ParentRole = CmdletResultValue.Parent.Name\\r\\n| extend WhenCreated = WhenCreated\\r\\n| project Identity, ParentRole, WhenCreated, WhenChanged\",\"size\":0,\"showAnalytics\":true,\"timeContext\":{\"durationMs\":86400000},\"showExportToExcel\":true,\"queryType\":0,\"resourceType\":\"microsoft.operationalinsights/workspaces\",\"gridSettings\":{\"rowLimit\":10000,\"filter\":true}},\"customWidth\":\"50\",\"name\":\"query - 1\",\"styleSettings\":{\"showBorder\":true}},{\"type\":3,\"content\":{\"version\":\"KqlItem/1.0\",\"query\":\"ExchangeConfiguration(SpecificSectionList=\\\"MRA\\\",SpecificConfigurationDate=\\\"{DateOfConfiguration:value}\\\",SpecificConfigurationEnv={EnvironmentList},Target = \\\"On-Premises\\\")\\r\\n| where CmdletResultValue.Role.Parent.Parent == \\\"Roles\\\"\\r\\n| where CmdletResultValue.RoleAssignmentDelegationType <> 6\\r\\n| extend RoleAssigneeName = tostring(CmdletResultValue.RoleAssigneeName)\\r\\n| extend Role = tostring(CmdletResultValue.Role.Name)\\r\\n//| extend Scope = tostring(CmdletResultValue.RecipientWriteScope)\\r\\n| extend Scope = tostring(CmdletResultValue.CustomRecipientWriteScope.Name)\\r\\n//| project Role = tostring(CmdletResultValue.Role.Name)\\r\\n| distinct Role,RoleAssigneeName,Scope\\r\\n| project Role,RoleAssigneeName,Scope\",\"size\":1,\"showAnalytics\":true,\"timeContext\":{\"durationMs\":86400000},\"showExportToExcel\":true,\"queryType\":0,\"resourceType\":\"microsoft.operationalinsights/workspaces\",\"gridSettings\":{\"rowLimit\":10000,\"filter\":true}},\"customWidth\":\"50\",\"name\":\"query - 4\",\"styleSettings\":{\"showBorder\":true}},{\"type\":3,\"content\":{\"version\":\"KqlItem/1.0\",\"query\":\"let MRcustomRoles = (ExchangeConfiguration(SpecificSectionList=\\\"MRCustom\\\", SpecificConfigurationDate=\\\"{DateOfConfiguration:value}\\\",SpecificConfigurationEnv={EnvironmentList},Target = \\\"On-Premises\\\")\\r\\n| project Role = tostring(CmdletResultValue.Name));\\r\\nExchangeConfiguration(SpecificSectionList=\\\"MRA\\\", SpecificConfigurationDate=\\\"{DateOfConfiguration:value}\\\",SpecificConfigurationEnv={EnvironmentList},Target = \\\"On-Premises\\\")\\r\\n| where CmdletResultValue.Role.Parent.Parent == \\\"Roles\\\"\\r\\n| where CmdletResultValue.RoleAssignmentDelegationType <> 6\\r\\n| extend RoleAssigneeName = tostring(CmdletResultValue.RoleAssigneeName)\\r\\n| extend Scope = tostring(CmdletResultValue.CustomRecipientWriteScope.Name)\\r\\n| project Role = tostring(CmdletResultValue.Role.Name), Scope, RoleAssigneeName\\r\\n| join kind=fullouter (MRcustomRoles) on Role\\r\\n| project Role = Role1, Scope, RoleAssigneeName,Comment = iff(Role == \\\"\\\", \\\"⚠️ No existing delegation for this role\\\", \\\"✅ This role is delegated with a Management Role Assignment\\\")\",\"size\":0,\"showAnalytics\":true,\"timeContext\":{\"durationMs\":86400000},\"showExportToExcel\":true,\"queryType\":0,\"resourceType\":\"microsoft.operationalinsights/workspaces\",\"gridSettings\":{\"rowLimit\":10000,\"filter\":true}},\"customWidth\":\"50\",\"name\":\"query - 2\",\"styleSettings\":{\"showBorder\":true}},{\"type\":3,\"content\":{\"version\":\"KqlItem/1.0\",\"query\":\"let MRcustomRoles = (ExchangeConfiguration(SpecificSectionList=\\\"MRCustom\\\", SpecificConfigurationDate=\\\"{DateOfConfiguration:value}\\\",SpecificConfigurationEnv={EnvironmentList},Target = \\\"On-Premises\\\")\\r\\n | project Role = tostring(CmdletResultValue.Name));\\r\\nExchangeConfiguration(SpecificSectionList=\\\"MRA\\\", SpecificConfigurationDate=\\\"{DateOfConfiguration:value}\\\",SpecificConfigurationEnv={EnvironmentList},Target = \\\"On-Premises\\\")\\r\\n| where CmdletResultValue.Role.Parent.Parent == \\\"Roles\\\"\\r\\n| where CmdletResultValue.RoleAssignmentDelegationType <> 6\\r\\n| project Role = tostring(CmdletResultValue.Role.Name)\\r\\n| join kind=fullouter (MRcustomRoles) on Role\\r\\n| summarize acount = count() by iff( Role==\\\"\\\",\\\"Number of non assigned roles\\\", Role)\",\"size\":0,\"showAnalytics\":true,\"timeContext\":{\"durationMs\":86400000},\"showExportToExcel\":true,\"queryType\":0,\"resourceType\":\"microsoft.operationalinsights/workspaces\",\"visualization\":\"piechart\"},\"customWidth\":\"50\",\"name\":\"query - 3\"}]},\"name\":\"List of Custom Roles\"},{\"type\":12,\"content\":{\"version\":\"NotebookGroup/1.0\",\"groupType\":\"editable\",\"title\":\"Custom Roles delegation on group\",\"items\":[{\"type\":1,\"content\":{\"json\":\"This section shows delegation associated with the Custom Roles\"},\"name\":\"text - 0\"},{\"type\":3,\"content\":{\"version\":\"KqlItem/1.0\",\"query\":\"ExchangeConfiguration(SpecificSectionList=\\\"MRA\\\",SpecificConfigurationDate=\\\"{DateOfConfiguration:value}\\\",SpecificConfigurationEnv={EnvironmentList},Target = \\\"On-Premises\\\")\\r\\n| where CmdletResultValue.Role.Parent.Parent == \\\"Roles\\\"\\r\\n| where CmdletResultValue.RoleAssignmentDelegationType <> 6\\r\\n| extend Role = tostring(CmdletResultValue.Role.Name)\\r\\n| extend RoleAssigneeType = case(CmdletResultValue.RoleAssigneeType== \\\"0\\\" or CmdletResultValue.RoleAssigneeType== \\\"2\\\" , \\\"User\\\", CmdletResultValue.RoleAssigneeType== \\\"10\\\",\\\"Group\\\",\\\"LinkedGroup\\\")\\r\\n| extend CustomRecipientWriteScope = tostring(CmdletResultValue.CustomRecipientWriteScope.Name)\\r\\n| extend CustomConfigWriteScope = tostring(CmdletResultValue.CustomConfigWriteScope.Name)\\r\\n| extend RecipientWriteScope = case(CmdletResultValue.RecipientWriteScope==\\\"0\\\",\\\"None\\\",CmdletResultValue.RecipientWriteScope==\\\"2\\\",\\\"Organization\\\",CmdletResultValue.RecipientWriteScope==\\\"3\\\",\\\"MyGAL\\\", CmdletResultValue.RecipientWriteScope==\\\"4\\\",\\\"Self\\\",CmdletResultValue.RecipientWriteScope==\\\"7\\\", \\\"CustomRecipientScope\\\",CmdletResultValue.RecipientWriteScope==\\\"8\\\",\\\"MyDistributionGroups\\\",\\\"NotApplicable\\\")\\r\\n| extend ConfigWriteScope = case(CmdletResultValue.ConfigWriteScope==\\\"0\\\",\\\"None\\\",CmdletResultValue.ConfigWriteScope==\\\"7\\\",\\\"CustomConfigScope\\\",CmdletResultValue.ConfigWriteScope==\\\"10\\\",\\\"OrganizationConfig\\\",\\\"NotApplicable\\\")\\r\\n| extend ConfigReadScope = iff(CmdletResultValue.ConfigReadScope == \\\"0\\\" , \\\"None\\\", \\\"OrganizationConfig\\\")\\r\\n| extend RecipientReadScope = case(CmdletResultValue.RecipientReadScope==\\\"2\\\",\\\"Organization\\\",CmdletResultValue.RecipientReadScope==\\\"3\\\",\\\"MyGAL\\\",CmdletResultValue.RecipientReadScope==\\\"4\\\",\\\"Self\\\",\\\"NotApplicable\\\")\\r\\n| extend ManagementRoleAssignement = tostring(CmdletResultValue.Name)\\r\\n| extend RoleAssignmentDelegationType = iff(CmdletResultValue.RoleAssignmentDelegationType ==\\\"6\\\" , \\\"Delegating\\\", \\\"Regular\\\") \\r\\n| extend RoleAssigneeName = iff( RoleAssigneeType == \\\"User\\\", strcat(\\\"🧑‍🦰 \\\",tostring(CmdletResultValue.RoleAssigneeName)), strcat(\\\"👪 \\\", tostring(CmdletResultValue.RoleAssigneeName)) )\\r\\n| project RoleAssigneeName, Role, RoleAssigneeType, CustomRecipientWriteScope, CustomConfigWriteScope, RecipientWriteScope, ConfigWriteScope, ConfigReadScope, RecipientReadScope, ManagementRoleAssignement, RoleAssignmentDelegationType, WhenCreated, WhenChanged\\r\\n\",\"size\":1,\"showAnalytics\":true,\"timeContext\":{\"durationMs\":86400000},\"showExportToExcel\":true,\"queryType\":0,\"resourceType\":\"microsoft.operationalinsights/workspaces\",\"gridSettings\":{\"rowLimit\":10000,\"filter\":true}},\"name\":\"query - 1\"}]},\"name\":\"group - 2\"},{\"type\":12,\"content\":{\"version\":\"NotebookGroup/1.0\",\"groupType\":\"editable\",\"title\":\"Details for Custom Roles Cmdlets \",\"items\":[{\"type\":1,\"content\":{\"json\":\"This section displays for the chosen custom management roles all Cmdlets and their parameters associated with this custom role.\\r\\nRemember that for a cmdlet, some parameters can be removed.\"},\"name\":\"text - 0\"},{\"type\":9,\"content\":{\"version\":\"KqlParameterItem/1.0\",\"parameters\":[{\"id\":\"07c8ac83-371d-4702-ab66-72aeb2a20053\",\"version\":\"KqlParameterItem/1.0\",\"name\":\"CustomRole\",\"type\":2,\"isRequired\":true,\"query\":\" ExchangeConfiguration(SpecificSectionList=\\\"MRCustom\\\",SpecificConfigurationDate=\\\"{DateOfConfiguration:value}\\\",SpecificConfigurationEnv={EnvironmentList},Target = \\\"On-Premises\\\")\\r\\n| extend Identity = CmdletResultValue.Name\\r\\n| project Identity\",\"typeSettings\":{\"showDefault\":false},\"timeContext\":{\"durationMs\":86400000},\"queryType\":0,\"resourceType\":\"microsoft.operationalinsights/workspaces\"}],\"style\":\"pills\",\"queryType\":0,\"resourceType\":\"microsoft.operationalinsights/workspaces\"},\"name\":\"parameters - 2\"},{\"type\":3,\"content\":{\"version\":\"KqlItem/1.0\",\"query\":\"let SelectedRole = toscalar ( ExchangeConfiguration(SpecificSectionList=\\\"MRCustom\\\",SpecificConfigurationDate=\\\"{DateOfConfiguration:value}\\\",SpecificConfigurationEnv={EnvironmentList},Target = \\\"On-Premises\\\")\\r\\n| extend Identity = CmdletResultValue.Name\\r\\n| where Identity contains \\\"{CustomRole}\\\"\\r\\n| extend ParentRole = CmdletResultValue.Parent.Name\\r\\n| project ParentRole);\\r\\nlet DefMRA = externaldata (Role:string,CmdletCount:string,Parameters:string )[h\\\"https://raw.githubusercontent.com/nlepagnez/ESI-PublicContent/main/Operations/Watchlists/RBACRoleCmdlet.csv\\\"]with(format=\\\"csv\\\",ignoreFirstRecord=true)| where Role == SelectedRole | summarize CmdletCount=count() by Role;\\r\\nExchangeConfiguration(SpecificSectionList=\\\"MRCustomDetails\\\",SpecificConfigurationDate=\\\"{DateOfConfiguration:value}\\\",SpecificConfigurationEnv={EnvironmentList},Target = \\\"On-Premises\\\")\\r\\n| where (replace_string(replace_string(tostring(split(CmdletResultValue.Role.DistinguishedName,\\\",\\\",0)),\\\"[\\\\\\\"CN=\\\",\\\"\\\"),\\\"\\\\\\\"]\\\",\\\"\\\")) contains \\\"{CustomRole}\\\"\\r\\n| extend CustomRoleName = replace_string(replace_string(tostring(split(CmdletResultValue.Role.DistinguishedName,\\\",\\\",0)),\\\"[\\\\\\\"CN=\\\",\\\"\\\"),\\\"\\\\\\\"]\\\",\\\"\\\")\\r\\n| extend CmdletName = CmdletResultValue.Name\\r\\n| extend Parameters = CmdletResultValue.Parameters\\r\\n| project CmdletName,Parameters,ParentRole = SelectedRole\",\"size\":1,\"showAnalytics\":true,\"timeContext\":{\"durationMs\":86400000},\"showExportToExcel\":true,\"queryType\":0,\"resourceType\":\"microsoft.operationalinsights/workspaces\",\"gridSettings\":{\"formatters\":[{\"columnMatch\":\"Parameters\",\"formatter\":0,\"formatOptions\":{\"customColumnWidthSetting\":\"100ch\"}}],\"rowLimit\":10000,\"filter\":true}},\"customWidth\":\"70\",\"name\":\"query - 1\",\"styleSettings\":{\"showBorder\":true}},{\"type\":3,\"content\":{\"version\":\"KqlItem/1.0\",\"query\":\"let SelectedRole = toscalar ( ExchangeConfiguration(SpecificSectionList=\\\"MRCustom\\\",SpecificConfigurationDate=\\\"{DateOfConfiguration:value}\\\",SpecificConfigurationEnv={EnvironmentList},Target = \\\"On-Premises\\\")\\r\\n| extend Identity = CmdletResultValue.Name\\r\\n| where Identity contains \\\"{CustomRole}\\\"\\r\\n| extend ParentRole = CmdletResultValue.Parent.Name\\r\\n| project ParentRole);\\r\\nlet DefMRA = externaldata (Role:string,CmdletCount:string,Parameters:string )[h\\\"https://raw.githubusercontent.com/nlepagnez/ESI-PublicContent/main/Operations/Watchlists/RBACRoleCmdlet.csv\\\"]with(format=\\\"csv\\\",ignoreFirstRecord=true)| where Role == SelectedRole | summarize CmdletCount=count() by Role;\\r\\nlet MRCustomD = ExchangeConfiguration(SpecificSectionList=\\\"MRCustomDetails\\\",SpecificConfigurationDate=\\\"{DateOfConfiguration:value}\\\",SpecificConfigurationEnv={EnvironmentList},Target = \\\"On-Premises\\\")\\r\\n| where (replace_string(replace_string(tostring(split(CmdletResultValue.Role.DistinguishedName,\\\",\\\",0)),\\\"[\\\\\\\"CN=\\\",\\\"\\\"),\\\"\\\\\\\"]\\\",\\\"\\\")) contains \\\"{CustomRole}\\\"\\r\\n| extend Role = replace_string(replace_string(tostring(split(CmdletResultValue.Role.DistinguishedName,\\\",\\\",0)),\\\"[\\\\\\\"CN=\\\",\\\"\\\"),\\\"\\\\\\\"]\\\",\\\"\\\")\\r\\n| extend CmdletName = CmdletResultValue.Name\\r\\n| extend ParentRole = tostring(SelectedRole)\\r\\n| summarize CmdletCount = count() by Role, ParentRole\\r\\n| project Role,CmdletCount;\\r\\nunion MRCustomD, DefMRA\",\"size\":0,\"timeContext\":{\"durationMs\":86400000},\"queryType\":0,\"resourceType\":\"microsoft.operationalinsights/workspaces\",\"visualization\":\"piechart\"},\"customWidth\":\"30\",\"name\":\"query - 3\"},{\"type\":1,\"content\":{\"json\":\"List of Cmdlets ( Get- command have been removed to clarify the information) with :\\r\\nCustomParamCount : number of parameters for the Cmdlet in the custom role\\r\\nDefaultCmdletNumberofParam : number of parameters for the Cmdlet in the default role\\r\\n\"},\"name\":\"text - 5\"},{\"type\":3,\"content\":{\"version\":\"KqlItem/1.0\",\"query\":\"let SelectedRole = toscalar ( ExchangeConfiguration(SpecificSectionList=\\\"MRCustom\\\",SpecificConfigurationDate=\\\"{DateOfConfiguration:value}\\\",SpecificConfigurationEnv={EnvironmentList},Target = \\\"On-Premises\\\")\\r\\n| extend Identity = CmdletResultValue.Name\\r\\n| where Identity contains \\\"{CustomRole}\\\"\\r\\n| extend ParentRole = CmdletResultValue.Parent.Name\\r\\n| project ParentRole);\\r\\nlet DefMRA = externaldata (Role:string,Name:string,Parameters:string )[h\\\"https://raw.githubusercontent.com/nlepagnez/ESI-PublicContent/main/Operations/Watchlists/RBACRoleCmdlet.csv\\\"]with(format=\\\"csv\\\",ignoreFirstRecord=true)| where Role == SelectedRole | mv-expand split(todynamic(Parameters),\\\";\\\")| summarize ParamCount = count() by Name;\\r\\nExchangeConfiguration(SpecificSectionList=\\\"MRCustomDetails\\\",SpecificConfigurationDate=\\\"{DateOfConfiguration:value}\\\",SpecificConfigurationEnv={EnvironmentList},Target = \\\"On-Premises\\\")\\r\\n| where (replace_string(replace_string(tostring(split(CmdletResultValue.Role.DistinguishedName,\\\",\\\",0)),\\\"[\\\\\\\"CN=\\\",\\\"\\\"),\\\"\\\\\\\"]\\\",\\\"\\\")) contains \\\"{CustomRole}\\\"\\r\\n| extend CustomRoleName = replace_string(replace_string(tostring(split(CmdletResultValue.Role.DistinguishedName,\\\",\\\",0)),\\\"[\\\\\\\"CN=\\\",\\\"\\\"),\\\"\\\\\\\"]\\\",\\\"\\\")\\r\\n| extend CmdletName = tostring(CmdletResultValue.Name)\\r\\n| where CmdletName !contains \\\"get-\\\"\\r\\n| extend Parameters = CmdletResultValue.Parameters\\r\\n| extend ParentRole = tostring(SelectedRole)\\r\\n| mv-expand split(todynamic(Parameters),\\\";\\\")\\r\\n| summarize ParamCount = count() by CmdletName, ParentRole\\r\\n| join (DefMRA) on $left.CmdletName == $right.Name\\r\\n| project CmdletName, CustomParamCount = ParamCount , DefaultCmdletNumberofParam = ParamCount1\",\"size\":1,\"showAnalytics\":true,\"timeContext\":{\"durationMs\":86400000},\"showExportToExcel\":true,\"queryType\":0,\"resourceType\":\"microsoft.operationalinsights/workspaces\",\"gridSettings\":{\"rowLimit\":10000,\"filter\":true,\"sortBy\":[{\"itemKey\":\"DefaultCmdletNumberofParam\",\"sortOrder\":1}]},\"sortBy\":[{\"itemKey\":\"DefaultCmdletNumberofParam\",\"sortOrder\":1}]},\"name\":\"query - 4\",\"styleSettings\":{\"showBorder\":true}}]},\"name\":\"Details for Custom Roles Cmdlets \"}]},\"conditionalVisibility\":{\"parameterName\":\"selected\",\"comparison\":\"isEqualTo\",\"value\":\"CustomRole\"},\"name\":\"Custom Role\",\"styleSettings\":{\"showBorder\":true}}],\"fromTemplateId\":\"sentinel-MicrosoftExchangeLeastPrivilegewithRBAC\",\"$schema\":\"https://github.com/Microsoft/Application-Insights-Workbooks/blob/master/schema/workbook.json\"}\r\n", + "serializedData": "{\"version\":\"Notebook/1.0\",\"items\":[{\"type\":9,\"content\":{\"version\":\"KqlParameterItem/1.0\",\"parameters\":[{\"id\":\"743317e2-ebcf-4958-861d-4ff97fc7cce1\",\"version\":\"KqlParameterItem/1.0\",\"name\":\"EnvironmentList\",\"label\":\"Environment\",\"type\":2,\"isRequired\":true,\"multiSelect\":true,\"quote\":\"'\",\"delimiter\":\",\",\"query\":\"ExchangeEnvironmentList(Target=\\\"On-Premises\\\") | where ESIEnvironment != \\\"\\\"\",\"typeSettings\":{\"limitSelectTo\":1,\"showDefault\":false},\"queryType\":0,\"resourceType\":\"microsoft.operationalinsights/workspaces\"},{\"id\":\"a88b4e41-eb2f-41bf-92d8-27c83650a4b8\",\"version\":\"KqlParameterItem/1.0\",\"name\":\"DateOfConfiguration\",\"label\":\"Collection time\",\"type\":2,\"isRequired\":true,\"query\":\"let _configurationEnv = split(iff(isnull({EnvironmentList}) or isempty({EnvironmentList}) or tolower({EnvironmentList}) == \\\"all\\\",\\\"All\\\",tostring({EnvironmentList})),',');\\r\\nESIExchangeConfig_CL\\r\\n| extend ScopedEnvironment = iff(_configurationEnv contains \\\"All\\\", \\\"All\\\",ESIEnvironment_s) \\r\\n| where ScopedEnvironment in (_configurationEnv)\\r\\n| extend Collection = format_datetime(todatetime(EntryDate_s), 'yyyy-MM-dd')\\r\\n| summarize Collection = max(Collection)\\r\\n| project Collection = \\\"lastdate\\\", Selected = true\\r\\n| join kind= fullouter ( ESIExchangeConfig_CL | extend ScopedEnvironment = iff(_configurationEnv contains \\\"All\\\", \\\"All\\\",ESIEnvironment_s) \\r\\n | where ScopedEnvironment in (_configurationEnv)\\r\\n | where TimeGenerated > ago(90d)\\r\\n | extend Collection = format_datetime(todatetime(EntryDate_s), 'yyyy-MM-dd')\\r\\n | summarize by Collection \\r\\n | join kind= fullouter ( ESIExchangeConfig_CL | extend ScopedEnvironment = iff(_configurationEnv contains \\\"All\\\", \\\"All\\\",ESIEnvironment_s) \\r\\n | where ScopedEnvironment in (_configurationEnv)\\r\\n | where TimeGenerated > ago(90d)\\r\\n | extend Collection = format_datetime(todatetime(EntryDate_s), 'yyyy-MM-dd')\\r\\n | extend PreciseCollection = format_datetime(todatetime(EntryDate_s), 'yyyy-MM-dd HH:mm ')\\r\\n | summarize by PreciseCollection, Collection \\r\\n | join kind=leftouter (\\r\\n ESIExchangeConfig_CL | extend ScopedEnvironment = iff(_configurationEnv contains \\\"All\\\", \\\"All\\\",ESIEnvironment_s) \\r\\n | where ScopedEnvironment in (_configurationEnv)\\r\\n | where TimeGenerated > ago(90d)\\r\\n | extend Collection = format_datetime(todatetime(EntryDate_s), 'yyyy-MM-dd')\\r\\n | extend PreciseCollection = format_datetime(todatetime(EntryDate_s), 'yyyy-MM-dd HH:mm')\\r\\n | summarize by PreciseCollection, Collection \\r\\n | summarize count() by Collection\\r\\n ) on Collection\\r\\n ) on Collection\\r\\n) on Collection\\r\\n| project Value = iif(Selected,Collection,iif(count_ > 1,PreciseCollection,Collection1)), Label = iif(Selected,\\\"Last Known date\\\",iif(count_ > 1,PreciseCollection,Collection1)), Selected\\r\\n| sort by Selected, Value desc\",\"typeSettings\":{\"showDefault\":false},\"queryType\":0,\"resourceType\":\"microsoft.operationalinsights/workspaces\"},{\"id\":\"8ac96eb3-918b-4a36-bcc4-df50d8f46175\",\"version\":\"KqlParameterItem/1.0\",\"name\":\"Help\",\"label\":\"Show Help\",\"type\":10,\"isRequired\":true,\"query\":\"{\\\"version\\\":\\\"1.0.0\\\",\\\"content\\\":\\\"[\\\\r\\\\n { \\\\\\\"value\\\\\\\": \\\\\\\"Yes\\\\\\\", \\\\\\\"label\\\\\\\": \\\\\\\"Yes\\\\\\\"},\\\\r\\\\n {\\\\\\\"value\\\\\\\": \\\\\\\"No\\\\\\\", \\\\\\\"label\\\\\\\": \\\\\\\"No\\\\\\\", \\\\\\\"selected\\\\\\\":true }\\\\r\\\\n]\\\\r\\\\n\\\"}\",\"timeContext\":{\"durationMs\":2592000000},\"queryType\":8}],\"style\":\"above\",\"queryType\":0,\"resourceType\":\"microsoft.operationalinsights/workspaces\"},\"name\":\"TimeRange\"},{\"type\":1,\"content\":{\"json\":\"This workbook displayed the custom RBAC delegations: on default groups, on Custom Roles groups, Using custom roles.
\\r\\nSelect your Exchange Organization and adjust the time range.\\r\\nBy default, the Help won't be displayed. To display the help, choose Yes on the toogle buttom \\\"Show Help\\\"\",\"style\":\"info\"},\"name\":\"text - 8\"},{\"type\":11,\"content\":{\"version\":\"LinkItem/1.0\",\"style\":\"tabs\",\"links\":[{\"id\":\"e59f0f7f-fd05-4ec8-9f59-e4d9c3b589f2\",\"cellValue\":\"selected\",\"linkTarget\":\"parameter\",\"linkLabel\":\"Current RBAC Delegation\",\"subTarget\":\"RBACDelegation\",\"preText\":\"RBAC Delegation\",\"postText\":\"\",\"style\":\"link\"},{\"id\":\"67739913-b364-4071-864d-faf4d94c9ad6\",\"cellValue\":\"selected\",\"linkTarget\":\"parameter\",\"linkLabel\":\"Custom Roles\",\"subTarget\":\"CustomRole\",\"style\":\"link\"},{\"id\":\"8def944a-53fe-4544-bc8f-5b3ca66eda34\",\"cellValue\":\"selected\",\"linkTarget\":\"parameter\",\"linkLabel\":\"Default Groups content\",\"subTarget\":\"DefaultGroup\",\"preText\":\"Default Group\",\"style\":\"link\"},{\"id\":\"5eeebe10-be67-4f8a-9d91-4bc6c70c3e16\",\"cellValue\":\"selected\",\"linkTarget\":\"parameter\",\"linkLabel\":\"Workbook Help\",\"subTarget\":\"start\",\"style\":\"link\"}]},\"name\":\"links - 3\"},{\"type\":12,\"content\":{\"version\":\"NotebookGroup/1.0\",\"groupType\":\"editable\",\"title\":\"Custom Delegations\",\"items\":[{\"type\":1,\"content\":{\"json\":\"The current delegations are compared to an export of default delegations done on Exchange 2019.\\r\\nTo find which is used for the comparaison please follow this link.\\r\\nThe export is located on the public GitHub of the project.\\r\\n\\r\\ncheck this link : https://aka.ms/esiwatchlist\\r\\n\\r\\nIt will be updated by the team project.\\r\\n\",\"style\":\"info\"},\"name\":\"text - 2\"},{\"type\":12,\"content\":{\"version\":\"NotebookGroup/1.0\",\"groupType\":\"editable\",\"title\":\"Custom Delegations on User Accounts\",\"items\":[{\"type\":1,\"content\":{\"json\":\"This section displays custom delegations set directly on User Accounts.\"},\"name\":\"text - 2 - Copy\"},{\"type\":1,\"content\":{\"json\":\"This section displays all the nonstandard delegations done directly to a user account.\\r\\n\\r\\nDetailed information for the user accounts will be displayed.\\r\\n\\r\\nThis status is done by comparing current delegation with the default delegations for latest export of default Exchange 2019 delegation located in the public GitHub of the project.\\r\\n\\r\\nThese types of delegations are not visible on the Exchange Admin Center.\\r\\n\\r\\nUsual results :\\r\\n\\r\\n - Delegations done directly to service account. Being able to see this delegation will help to sanityze the environment as some delegations may be no more necessary\\r\\n\\r\\n - Delegation done by mistake directly to Administrator Accounts\\r\\n\\r\\n - Suspicious delegations\\r\\n\\r\\nDetailed information for the user accounts will be displayed in the sections below.\\r\\n\\r\\nView RBAC effective permissions\\r\\n\\r\\nGet-ManagementRoleAssignment\\r\\n\\r\\nUnderstanding Role Based Access Control\\r\\n\",\"style\":\"info\"},\"conditionalVisibility\":{\"parameterName\":\"Help\",\"comparison\":\"isEqualTo\",\"value\":\"Yes\"},\"name\":\"text - 3\"},{\"type\":9,\"content\":{\"version\":\"KqlParameterItem/1.0\",\"parameters\":[{\"id\":\"d9d4e0a2-b75d-4825-9f4e-7606516500e1\",\"version\":\"KqlParameterItem/1.0\",\"name\":\"RoleAssignee\",\"type\":2,\"query\":\"let DefMRA = externaldata (Name:string)[h\\\"https://raw.githubusercontent.com/nlepagnez/ESI-PublicContent/main/Operations/Watchlists/StandardMRA.csv\\\"]with(format=\\\"csv\\\",ignoreFirstRecord=true)| summarize make_list(Name);\\r\\nExchangeConfiguration(SpecificSectionList=\\\"MRA\\\",SpecificConfigurationDate=\\\"{DateOfConfiguration:value}\\\",SpecificConfigurationEnv={EnvironmentList})\\r\\n| where CmdletResultValue.Name !in (DefMRA) and CmdletResultValue.RoleAssigneeType == \\\"0\\\"\\r\\n| project CmdletResultValue\\r\\n| extend RoleAssigneeName = tostring(CmdletResultValue.RoleAssigneeName)\\r\\n| distinct RoleAssigneeName\\r\\n\",\"typeSettings\":{\"showDefault\":false},\"queryType\":0,\"resourceType\":\"microsoft.operationalinsights/workspaces\"},{\"id\":\"46c608de-033d-4c4f-99e6-2784439cfa18\",\"version\":\"KqlParameterItem/1.0\",\"name\":\"Role\",\"type\":2,\"query\":\"ExchangeConfiguration(SpecificSectionList=\\\"MRA\\\",SpecificConfigurationDate=\\\"{DateOfConfiguration:value}\\\",SpecificConfigurationEnv={EnvironmentList})\\r\\n|extend Role=tostring (CmdletResultValue.Role.Name)\\r\\n| distinct Role\\r\\n| sort by Role asc\",\"typeSettings\":{\"showDefault\":false},\"queryType\":0,\"resourceType\":\"microsoft.operationalinsights/workspaces\"}],\"style\":\"pills\",\"queryType\":0,\"resourceType\":\"microsoft.operationalinsights/workspaces\"},\"name\":\"parameters - 5\"},{\"type\":3,\"content\":{\"version\":\"KqlItem/1.0\",\"query\":\"let DefMRA = externaldata (Name:string)[h\\\"https://raw.githubusercontent.com/nlepagnez/ESI-PublicContent/main/Operations/Watchlists/StandardMRA.csv\\\"]with(format=\\\"csv\\\",ignoreFirstRecord=true)| summarize make_list(Name);\\r\\nExchangeConfiguration(SpecificSectionList=\\\"MRA\\\",SpecificConfigurationDate=\\\"{DateOfConfiguration:value}\\\",SpecificConfigurationEnv={EnvironmentList})\\r\\n| where CmdletResultValue.RoleAssigneeName endswith \\\"{RoleAssignee}\\\" \\r\\n| where CmdletResultValue.Role.Name contains \\\"{Role}\\\"\\r\\n| where CmdletResultValue.Name !in (DefMRA) and CmdletResultValue.RoleAssigneeType == \\\"0\\\" and CmdletResultValue.Name !contains \\\"Deleg\\\"\\r\\n| extend Name = tostring(CmdletResultValue.Name)\\r\\n| extend Role = tostring(CmdletResultValue.Role.Name)\\r\\n| extend RoleAssigneeName = tostring(CmdletResultValue.RoleAssigneeName)\\r\\n| extend CustomRecipientWriteScope = tostring(CmdletResultValue.CustomRecipientWriteScope.Name)\\r\\n| extend CustomConfigWriteScope = tostring(CmdletResultValue.CustomConfigWriteScope.Name)\\r\\n| extend RecipientWriteScope = case(CmdletResultValue.RecipientWriteScope==\\\"0\\\",\\\"None\\\",CmdletResultValue.RecipientWriteScope==\\\"2\\\",\\\"Organization\\\",CmdletResultValue.RecipientWriteScope==\\\"3\\\",\\\"MyGAL\\\", CmdletResultValue.RecipientWriteScope==\\\"4\\\",\\\"Self\\\",CmdletResultValue.RecipientWriteScope==\\\"7\\\", \\\"CustomRecipientScope\\\",CmdletResultValue.RecipientWriteScope==\\\"8\\\",\\\"MyDistributionGroups\\\",\\\"NotApplicable\\\")\\r\\n| extend ConfigWriteScope = case(CmdletResultValue.ConfigWriteScope==\\\"0\\\",\\\"None\\\",CmdletResultValue.ConfigWriteScope==\\\"7\\\",\\\"CustomConfigScope\\\",CmdletResultValue.ConfigWriteScope==\\\"10\\\",\\\"OrganizationConfig\\\",\\\"NotApplicable\\\")\\r\\n| extend ConfigReadScope = iff(CmdletResultValue.ConfigReadScope == \\\"0\\\" , \\\"None\\\", \\\"OrganizationConfig\\\")\\r\\n| extend RecipientReadScope = case(CmdletResultValue.RecipientReadScope==\\\"2\\\",\\\"Organization\\\",CmdletResultValue.RecipientReadScope==\\\"3\\\",\\\"MyGAL\\\",CmdletResultValue.RecipientReadScope==\\\"4\\\",\\\"Self\\\",\\\"NotApplicable\\\")\\r\\n| extend Status= tostring(CmdletResultValue.Enabled)\\r\\n| extend RoleAssignmentDelegationType = iff(CmdletResultValue.RoleAssignmentDelegationType ==\\\"6\\\" , \\\"Delegating\\\", \\\"Regular\\\")\\r\\n| project Name,Role,RoleAssigneeName, RoleAssignmentDelegationType,Status,CustomRecipientWriteScope, CustomConfigWriteScope, RecipientWriteScope, ConfigWriteScope, ConfigReadScope, RecipientReadScope,WhenCreated, WhenChanged\\r\\n| sort by RoleAssigneeName asc\\r\\n\",\"size\":1,\"showAnalytics\":true,\"showExportToExcel\":true,\"queryType\":0,\"resourceType\":\"microsoft.operationalinsights/workspaces\",\"gridSettings\":{\"formatters\":[{\"columnMatch\":\"CmdletName\",\"formatter\":0,\"formatOptions\":{\"customColumnWidthSetting\":\"31.5ch\"}},{\"columnMatch\":\"Total\",\"formatter\":0,\"formatOptions\":{\"customColumnWidthSetting\":\"9.3ch\"}},{\"columnMatch\":\"Count\",\"formatter\":21,\"formatOptions\":{\"palette\":\"blue\",\"customColumnWidthSetting\":\"330px\"}},{\"columnMatch\":\"Anomalies\",\"formatter\":10,\"formatOptions\":{\"palette\":\"redBright\",\"customColumnWidthSetting\":\"330px\"}}],\"rowLimit\":10000,\"filter\":true,\"sortBy\":[{\"itemKey\":\"RoleAssigneeName\",\"sortOrder\":1}]},\"sortBy\":[{\"itemKey\":\"RoleAssigneeName\",\"sortOrder\":1}]},\"name\":\"query - 2\",\"styleSettings\":{\"showBorder\":true}}]},\"name\":\"Custom Delegations on User Accounts\"},{\"type\":12,\"content\":{\"version\":\"NotebookGroup/1.0\",\"groupType\":\"editable\",\"title\":\"Custom Delegation on Groups\",\"items\":[{\"type\":1,\"content\":{\"json\":\"This section displays custom delegations set on groups.\"},\"name\":\"text - 2\"},{\"type\":1,\"content\":{\"json\":\"This section displays all the nonstandard delegations done for standard and nonstandard groups. Indeed, default groups have a list of default delegations but an Exchange administrators can add also new roles to the default groups.\\r\\n\\r\\nThis status is done by comparing current delegation with the default delegations for latest export of default Exchange 2019 delegation located in the public GitHub of the project.\\r\\n\\r\\n\\r\\nUsual results :\\r\\n\\r\\n - Delegations done for role group Organization Management to role like Mailbox Import Export or Mailbox Search (by default this delegation is not configured)\\r\\n\\r\\n - Delegation done by mistake\\r\\n\\r\\n - Suspicious delegations\\r\\n\\r\\nDetailed information for the user accounts present in the groups will be displayed in the sections below.\\r\\n\\r\\nView RBAC effective permissions\\r\\n\\r\\nGet-ManagementRoleAssignment\\r\\n\\r\\nUnderstanding Role Based Access Control \\r\\n\",\"style\":\"info\"},\"conditionalVisibility\":{\"parameterName\":\"Help\",\"comparison\":\"isEqualTo\",\"value\":\"Yes\"},\"name\":\"text - 3\"},{\"type\":9,\"content\":{\"version\":\"KqlParameterItem/1.0\",\"parameters\":[{\"id\":\"c548eb09-54e3-41bf-a99d-be3534f7018b\",\"version\":\"KqlParameterItem/1.0\",\"name\":\"RoleAssignee\",\"type\":2,\"query\":\"let DefMRA = externaldata (Name:string)[h\\\"https://raw.githubusercontent.com/nlepagnez/ESI-PublicContent/main/Operations/Watchlists/StandardMRA.csv\\\"]with(format=\\\"csv\\\",ignoreFirstRecord=true)| summarize make_list(Name);\\r\\nExchangeConfiguration(SpecificSectionList=\\\"MRA\\\",SpecificConfigurationDate=\\\"{DateOfConfiguration:value}\\\",SpecificConfigurationEnv={EnvironmentList})\\r\\n| where CmdletResultValue.Name !in (DefMRA) and CmdletResultValue.RoleAssigneeType == \\\"10\\\" or CmdletResultValue.RoleAssigneeType == \\\"2\\\" or CmdletResultValue.RoleAssigneeType == \\\"12\\\"\\r\\n| project CmdletResultValue\\r\\n| extend RoleAssigneeName = tostring(CmdletResultValue.RoleAssigneeName)\\r\\n| distinct RoleAssigneeName\",\"typeSettings\":{\"showDefault\":false},\"queryType\":0,\"resourceType\":\"microsoft.operationalinsights/workspaces\",\"rowLimit\":10000},{\"id\":\"4194717a-4a09-4c73-b02d-b1ac8587619d\",\"version\":\"KqlParameterItem/1.0\",\"name\":\"Role\",\"type\":2,\"query\":\"ExchangeConfiguration(SpecificSectionList=\\\"MRA\\\",SpecificConfigurationDate=\\\"{DateOfConfiguration:value}\\\",SpecificConfigurationEnv={EnvironmentList})\\r\\n|extend Role=tostring (CmdletResultValue.Role.Name)\\r\\n| distinct Role\\r\\n| sort by Role asc\",\"queryType\":0,\"resourceType\":\"microsoft.operationalinsights/workspaces\"}],\"style\":\"pills\",\"queryType\":0,\"resourceType\":\"microsoft.operationalinsights/workspaces\"},\"name\":\"parameters - 4\"},{\"type\":3,\"content\":{\"version\":\"KqlItem/1.0\",\"query\":\"let DefMRA = externaldata (Name:string)[h\\\"https://raw.githubusercontent.com/nlepagnez/ESI-PublicContent/main/Operations/Watchlists/StandardMRA.csv\\\"]with(format=\\\"csv\\\",ignoreFirstRecord=true)| summarize make_list(Name);\\r\\nlet RoleG = ExchangeConfiguration(SpecificSectionList=\\\"MRA\\\",SpecificConfigurationDate=\\\"{DateOfConfiguration:value}\\\",SpecificConfigurationEnv={EnvironmentList})\\r\\n| project RoleAssigneeName=tostring(CmdletResultValue.Name);\\r\\nExchangeConfiguration(SpecificSectionList=\\\"MRA\\\",SpecificConfigurationDate=\\\"{DateOfConfiguration:value}\\\",SpecificConfigurationEnv={EnvironmentList})\\r\\n| where CmdletResultValue.RoleAssigneeName endswith \\\"{RoleAssignee}\\\" \\r\\n| where CmdletResultValue.Role.Name contains \\\"{Role}\\\"\\r\\n| where CmdletResultValue.Name !in (DefMRA) and CmdletResultValue.RoleAssigneeType == \\\"10\\\" or CmdletResultValue.RoleAssigneeType == \\\"2\\\" or CmdletResultValue.RoleAssigneeType == \\\"12\\\"\\r\\n| extend Name = tostring(CmdletResultValue.Name)\\r\\n| extend Role = tostring(CmdletResultValue.Role.Name)\\r\\n| extend RoleAssigneeName = tostring(CmdletResultValue.RoleAssigneeName)\\r\\n| extend LinkedGroup = iff(tostring(CmdletResultValue.RoleAssigneeType)==\\\"12\\\", \\\"Yes\\\",\\\"No\\\")\\r\\n|lookup RoleG on RoleAssigneeName \\r\\n//| extend LinkedGroup = iff(tostring(LinkedGroup)==\\\"12\\\", \\\"Yes\\\",\\\"No\\\")\\r\\n| extend RoleAssignmentDelegationType = iff(CmdletResultValue.RoleAssignmentDelegationType ==\\\"6\\\" , \\\"Delegating\\\", \\\"Regular\\\")\\r\\n| extend CustomRecipientWriteScope = tostring(CmdletResultValue.CustomRecipientWriteScope.Name)\\r\\n| extend CustomConfigWriteScope = tostring(CmdletResultValue.CustomConfigWriteScope.Name)\\r\\n| extend RecipientWriteScope = case(CmdletResultValue.RecipientWriteScope==\\\"0\\\",\\\"None\\\",CmdletResultValue.RecipientWriteScope==\\\"2\\\",\\\"Organization\\\",CmdletResultValue.RecipientWriteScope==\\\"3\\\",\\\"MyGAL\\\", CmdletResultValue.RecipientWriteScope==\\\"4\\\",\\\"Self\\\",CmdletResultValue.RecipientWriteScope==\\\"7\\\", \\\"CustomRecipientScope\\\",CmdletResultValue.RecipientWriteScope==\\\"8\\\",\\\"MyDistributionGroups\\\",\\\"NotApplicable\\\")\\r\\n| extend ConfigWriteScope = case(CmdletResultValue.ConfigWriteScope==\\\"0\\\",\\\"None\\\",CmdletResultValue.ConfigWriteScope==\\\"7\\\",\\\"CustomConfigScope\\\",CmdletResultValue.ConfigWriteScope==\\\"10\\\",\\\"OrganizationConfig\\\",\\\"NotApplicable\\\")\\r\\n| extend ConfigReadScope = iff(CmdletResultValue.ConfigReadScope == \\\"0\\\" , \\\"None\\\", \\\"OrganizationConfig\\\")\\r\\n| extend RecipientReadScope = case(CmdletResultValue.RecipientReadScope==\\\"2\\\",\\\"Organization\\\",CmdletResultValue.RecipientReadScope==\\\"3\\\",\\\"MyGAL\\\",CmdletResultValue.RecipientReadScope==\\\"4\\\",\\\"Self\\\",\\\"NotApplicable\\\")\\r\\n| extend Status= tostring(CmdletResultValue.Enabled)\\r\\n| project Name,Role,RoleAssigneeName,LinkedGroup, RoleAssignmentDelegationType,Status,CustomRecipientWriteScope, CustomConfigWriteScope, RecipientWriteScope, ConfigWriteScope, ConfigReadScope, RecipientReadScope,WhenCreated, WhenChanged\\r\\n| sort by RoleAssigneeName asc\",\"size\":1,\"showAnalytics\":true,\"showExportToExcel\":true,\"queryType\":0,\"resourceType\":\"microsoft.operationalinsights/workspaces\",\"gridSettings\":{\"rowLimit\":10000,\"filter\":true}},\"name\":\"query - 1\",\"styleSettings\":{\"showBorder\":true}}]},\"name\":\"Custom Delegation on Groups\"}]},\"conditionalVisibility\":{\"parameterName\":\"selected\",\"comparison\":\"isEqualTo\",\"value\":\"RBACDelegation\"},\"name\":\"Custom Delegation\"},{\"type\":12,\"content\":{\"version\":\"NotebookGroup/1.0\",\"groupType\":\"editable\",\"title\":\"Information for Role Assignee\",\"items\":[{\"type\":12,\"content\":{\"version\":\"NotebookGroup/1.0\",\"groupType\":\"editable\",\"title\":\"Information for Role Assignee User account\",\"items\":[{\"type\":1,\"content\":{\"json\":\"In the previous section, custom delegations for user have been displayed.\\r\\n\\r\\nThis section display detailed information for the accounts found in the previous. Once you know that an account has a high privilege delegations, you may want to have additional information like Last Logon, Password Last Set...\\r\\n\\r\\nSelect a user un the dropdown list.\\r\\n\\r\\n❌ : for last logon displayed when user logged or the last logon is greater than 180 days\\r\\n\\r\\n❌ : for password last set displayed when last password set greater than 366 days\"},\"name\":\"text - 0\"},{\"type\":1,\"content\":{\"json\":\"This section displays details information for user accounts found with non standard delegations :\\r\\n - Last logon\\r\\n - Last Password changed\\r\\n - Account enabled\\r\\n\\r\\nYou may find old service accounts that are no more used, or with a last password set very old...\",\"style\":\"info\"},\"conditionalVisibility\":{\"parameterName\":\"Help\",\"comparison\":\"isEqualTo\",\"value\":\"Yes\"},\"name\":\"text - 3\"},{\"type\":9,\"content\":{\"version\":\"KqlParameterItem/1.0\",\"parameters\":[{\"id\":\"27e4c2e9-d113-4bf9-808f-0f8f68b5152e\",\"version\":\"KqlParameterItem/1.0\",\"name\":\"RoleAssignee\",\"type\":2,\"isRequired\":true,\"query\":\"let DefMRA = externaldata (Name:string)[h\\\"https://raw.githubusercontent.com/nlepagnez/ESI-PublicContent/main/Operations/Watchlists/StandardMRA.csv\\\"]with(format=\\\"csv\\\",ignoreFirstRecord=true)| summarize make_list(Name);\\r\\nExchangeConfiguration(SpecificSectionList=\\\"MRA\\\",SpecificConfigurationDate=\\\"{DateOfConfiguration:value}\\\",SpecificConfigurationEnv={EnvironmentList})\\r\\n| where CmdletResultValue.Name !in (DefMRA) and CmdletResultValue.RoleAssigneeType == \\\"0\\\"\\r\\n| project CmdletResultValue\\r\\n| extend RoleAssigneeName = tostring(CmdletResultValue.RoleAssigneeName)\\r\\n| distinct RoleAssigneeName\",\"typeSettings\":{\"showDefault\":false},\"queryType\":0,\"resourceType\":\"microsoft.operationalinsights/workspaces\"},{\"id\":\"10c2eb2f-2cf2-4650-a9f1-3ee646acaebb\",\"version\":\"KqlParameterItem/1.0\",\"name\":\"LastLogon\",\"label\":\"Last Logon\",\"type\":10,\"isRequired\":true,\"jsonData\":\"[ {\\\"value\\\": \\\"0d\\\", \\\"label\\\": \\\"No filter\\\",\\\"selected\\\":true},\\r\\n{ \\\"value\\\": \\\"90d\\\", \\\"label\\\": \\\"90d\\\" },\\r\\n { \\\"value\\\": \\\"180d\\\", \\\"label\\\": \\\"6m\\\" },\\r\\n { \\\"value\\\": \\\"365d\\\", \\\"label\\\": \\\"1y\\\" },\\r\\n{ \\\"value\\\": \\\"730d\\\", \\\"label\\\": \\\"2y\\\" },\\r\\n{ \\\"value\\\": \\\"1085d\\\", \\\"label\\\": \\\"3y\\\" },\\r\\n{ \\\"value\\\": \\\"1097d\\\", \\\"label\\\": \\\"more than 3y\\\"},\\r\\n{ \\\"value\\\": \\\"3650d\\\", \\\"label\\\": \\\"more than 10y\\\"}\\r\\n]\"},{\"id\":\"6f7128ee-2f2c-421d-bc9f-37aee85fb214\",\"version\":\"KqlParameterItem/1.0\",\"name\":\"PasswordLast\",\"label\":\"Password Last Set\",\"type\":10,\"isRequired\":true,\"jsonData\":\"[{ \\\"value\\\": \\\"0d\\\", \\\"label\\\": \\\"No filter\\\",\\\"selected\\\":true },\\r\\n { \\\"value\\\": \\\"365d\\\", \\\"label\\\": \\\"1y\\\" },\\r\\n{ \\\"value\\\": \\\"730d\\\", \\\"label\\\": \\\"2y\\\" },\\r\\n{ \\\"value\\\": \\\"1095d\\\", \\\"label\\\": \\\"3y\\\" },\\r\\n{ \\\"value\\\": \\\"1097d\\\", \\\"label\\\": \\\"more than 3y\\\"},\\r\\n{ \\\"value\\\": \\\"3650d\\\", \\\"label\\\": \\\"more than 10y\\\"}\\r\\n]\"}],\"style\":\"pills\",\"queryType\":0,\"resourceType\":\"microsoft.operationalinsights/workspaces\"},\"name\":\"parameters - 1\"},{\"type\":3,\"content\":{\"version\":\"KqlItem/1.0\",\"query\":\"ExchangeConfiguration(SpecificSectionList=\\\"DirectRoleAssignments\\\",SpecificConfigurationDate=\\\"{DateOfConfiguration:value}\\\",SpecificConfigurationEnv={EnvironmentList})\\r\\n| where CmdletResultValue.SamAccountName contains \\\"{RoleAssignee}\\\"\\r\\n| where todatetime (CmdletResultValue.LastPwdSetString) < ago({PasswordLast}) or tostring (CmdletResultValue.LastPwdSetString) == \\\"\\\"\\r\\n| where todatetime (CmdletResultValue.LastLogonString) < ago({LastLogon}) or tostring (CmdletResultValue.LastLogonString) == \\\"\\\"\\r\\n| project CmdletResultValue\\r\\n| extend ManagementRoleAssignment = tostring(CmdletResultValue.Parentgroup)\\r\\n| extend Account = tostring(CmdletResultValue.SamAccountName)\\r\\n| extend ObjectClass = tostring(CmdletResultValue.ObjectClass)\\r\\n| extend LastLogon = tostring(CmdletResultValue.LastLogonString)\\r\\n| extend LastLogon = iif(ObjectClass==\\\"group\\\" or ObjectClass==\\\"computer\\\" or ObjectClass==\\\"Local User\\\" or ObjectClass==\\\"computer\\\",\\\"N/A\\\", iif ( todatetime (CmdletResultValue.LastLogonString) > ago(180d), CmdletResultValue.LastLogonString,iff (LastLogon==\\\"\\\", \\\"❌ Never logged\\\",strcat(\\\"❌\\\",LastLogon))))\\r\\n| extend LastPwdSet = CmdletResultValue.LastPwdSetString\\r\\n| extend LastPwdSet = iif(ObjectClass==\\\"group\\\" or ObjectClass==\\\"computer\\\" or ObjectClass==\\\"Local User\\\" or ObjectClass==\\\"computer\\\",\\\"N/A\\\",iif ( todatetime (CmdletResultValue.LastPwdSetString) > ago(366d), CmdletResultValue.LastPwdSetString,iff (LastPwdSet==\\\"\\\", \\\"❌ Password never set\\\",strcat(\\\"❌\\\",LastPwdSet))))\\r\\n| extend Enabled = tostring(CmdletResultValue.Enabled)\\r\\n| extend DN = tostring(CmdletResultValue.DN)\\r\\n| project-away CmdletResultValue\\r\\n| sort by Account asc\",\"size\":1,\"showAnalytics\":true,\"color\":\"green\",\"showExportToExcel\":true,\"queryType\":0,\"resourceType\":\"microsoft.operationalinsights/workspaces\",\"gridSettings\":{\"rowLimit\":10000,\"filter\":true,\"sortBy\":[{\"itemKey\":\"ManagementRoleAssignment\",\"sortOrder\":1}]},\"sortBy\":[{\"itemKey\":\"ManagementRoleAssignment\",\"sortOrder\":1}]},\"name\":\"query - 2\",\"styleSettings\":{\"showBorder\":true}}]},\"name\":\"Information for Role Assignee User account\"},{\"type\":12,\"content\":{\"version\":\"NotebookGroup/1.0\",\"groupType\":\"editable\",\"title\":\"Information for Role Assignee group\",\"items\":[{\"type\":1,\"content\":{\"json\":\"Details information for Group delegation\\r\\nIn the previous section, custom delegations for groups have been displayed.\\r\\n\\r\\nThis section display detailed information for the accounts found in the group displayed in the previuos section. Once you know that an account has a high privilege delegations, you may want to have additional information like Last Logon, Password Last Set...\\r\\n\\r\\nSelect a group un the dropdown list.\\r\\n\\r\\n❌ : for last logon displayed when user logged or the last logon is greater than 180 days\\r\\n\\r\\n❌ : for password last set displayed when last password set greater than 366 days\"},\"name\":\"text - 0\"},{\"type\":1,\"content\":{\"json\":\"This section displays details information for user accounts included in the found groups with non standard delegation : \\r\\n\\r\\n - Last logon\\r\\n - Last Password changed\\r\\n - Account enabled\\r\\n\\r\\nYou may find old service accounts that are no more used, or with a last password set very old...\",\"style\":\"info\"},\"conditionalVisibility\":{\"parameterName\":\"Help\",\"comparison\":\"isEqualTo\",\"value\":\"Yes\"},\"name\":\"text - 3\"},{\"type\":9,\"content\":{\"version\":\"KqlParameterItem/1.0\",\"parameters\":[{\"id\":\"75c3cdf3-d0c3-46c3-83ae-429979774234\",\"version\":\"KqlParameterItem/1.0\",\"name\":\"RoleAssignee\",\"type\":2,\"isRequired\":true,\"query\":\"let DefMRA = externaldata (Name:string)[h\\\"https://raw.githubusercontent.com/nlepagnez/ESI-PublicContent/main/Operations/Watchlists/StandardMRA.csv\\\"]with(format=\\\"csv\\\",ignoreFirstRecord=true)| summarize make_list(Name);\\r\\nExchangeConfiguration(SpecificSectionList=\\\"MRA\\\",SpecificConfigurationDate=\\\"{DateOfConfiguration:value}\\\",SpecificConfigurationEnv={EnvironmentList})\\r\\n| where CmdletResultValue.Name !in (DefMRA) and CmdletResultValue.RoleAssigneeType == \\\"10\\\" or CmdletResultValue.RoleAssigneeType == \\\"2\\\"\\r\\n| project CmdletResultValue\\r\\n| extend RoleAssigneeName = tostring(CmdletResultValue.RoleAssigneeName)\\r\\n| distinct RoleAssigneeName\",\"typeSettings\":{\"showDefault\":false},\"queryType\":0,\"resourceType\":\"microsoft.operationalinsights/workspaces\"},{\"id\":\"1a3b374c-0467-4fd9-b2fc-edebd0a97302\",\"version\":\"KqlParameterItem/1.0\",\"name\":\"LastLogon\",\"label\":\"Last Logon\",\"type\":10,\"isRequired\":true,\"typeSettings\":{\"showDefault\":false},\"jsonData\":\"[ {\\\"value\\\": \\\"0d\\\", \\\"label\\\": \\\"No filter\\\",\\\"selected\\\":true},\\r\\n{ \\\"value\\\": \\\"90d\\\", \\\"label\\\": \\\"90d\\\" },\\r\\n { \\\"value\\\": \\\"180d\\\", \\\"label\\\": \\\"6m\\\" },\\r\\n { \\\"value\\\": \\\"365d\\\", \\\"label\\\": \\\"1y\\\" },\\r\\n{ \\\"value\\\": \\\"730d\\\", \\\"label\\\": \\\"2y\\\" },\\r\\n{ \\\"value\\\": \\\"1085d\\\", \\\"label\\\": \\\"3y\\\" },\\r\\n{ \\\"value\\\": \\\"1097d\\\", \\\"label\\\": \\\"more than 3y\\\"},\\r\\n{ \\\"value\\\": \\\"3650d\\\", \\\"label\\\": \\\"more than 10y\\\"}\\r\\n]\"},{\"id\":\"170db194-195f-4991-b726-6c0658562616\",\"version\":\"KqlParameterItem/1.0\",\"name\":\"PasswordLast\",\"type\":10,\"isRequired\":true,\"jsonData\":\"[{ \\\"value\\\": \\\"0d\\\", \\\"label\\\": \\\"No filter\\\",\\\"selected\\\":true },\\r\\n { \\\"value\\\": \\\"365d\\\", \\\"label\\\": \\\"1y\\\" },\\r\\n{ \\\"value\\\": \\\"730d\\\", \\\"label\\\": \\\"2y\\\" },\\r\\n{ \\\"value\\\": \\\"1095d\\\", \\\"label\\\": \\\"3y\\\" },\\r\\n{ \\\"value\\\": \\\"1097d\\\", \\\"label\\\": \\\"more than 3y\\\"},\\r\\n{ \\\"value\\\": \\\"3650d\\\", \\\"label\\\": \\\"more than 10y\\\"}\\r\\n]\"}],\"style\":\"pills\",\"queryType\":0,\"resourceType\":\"microsoft.operationalinsights/workspaces\"},\"name\":\"parameters - 1\"},{\"type\":3,\"content\":{\"version\":\"KqlItem/1.0\",\"query\":\"ExchangeConfiguration(SpecificSectionList=\\\"ExGroup\\\",SpecificConfigurationDate=\\\"{DateOfConfiguration:value}\\\",SpecificConfigurationEnv={EnvironmentList})\\r\\n| where CmdletResultValue.Parentgroup contains \\\"{RoleAssignee}\\\"\\r\\n| where todatetime (CmdletResultValue.LastPwdSetString) < ago({PasswordLast}) or tostring (CmdletResultValue.LastPwdSetString) == \\\"\\\"\\r\\n| where todatetime (CmdletResultValue.LastLogonString) < ago({LastLogon}) or tostring (CmdletResultValue.LastLogonString) == \\\"\\\"\\r\\n| where CmdletResultValue.Level != 0\\r\\n| project CmdletResultValue\\r\\n| extend Level_ = tostring(CmdletResultValue.Level)\\r\\n| extend Parentgroup = tostring(CmdletResultValue.Parentgroup)\\r\\n| extend MemberPath = tostring(CmdletResultValue.MemberPath)\\r\\n| extend ObjectClass = tostring(CmdletResultValue.ObjectClass)\\r\\n| extend LastLogon = tostring(CmdletResultValue.LastLogonString)\\r\\n| extend LastLogon = iif(ObjectClass==\\\"group\\\" or ObjectClass==\\\"computer\\\" or ObjectClass==\\\"Local User\\\" or ObjectClass==\\\"computer\\\",\\\"N/A\\\", iif ( todatetime (CmdletResultValue.LastLogonString) > ago(180d), CmdletResultValue.LastLogonString,iff (LastLogon==\\\"\\\", \\\"❌ Never logged\\\",strcat(\\\"❌\\\",LastLogon))))\\r\\n| extend LastPwdSet = CmdletResultValue.LastPwdSetString\\r\\n| extend LastPwdSet = iif(ObjectClass==\\\"group\\\" or ObjectClass==\\\"computer\\\" or ObjectClass==\\\"Local User\\\" or ObjectClass==\\\"computer\\\",\\\"N/A\\\",iif ( todatetime (CmdletResultValue.LastPwdSetString) > ago(366d), CmdletResultValue.LastPwdSetString,iff (LastPwdSet==\\\"\\\", \\\"❌ Password never set\\\",strcat(\\\"❌\\\",LastPwdSet))))\\r\\n| extend Enabled = tostring(CmdletResultValue.Enabled)\\r\\n| extend DN = tostring(CmdletResultValue.DN)\\r\\n| project-away CmdletResultValue, Level_,Parentgroup\\r\\n| sort by MemberPath asc\",\"size\":1,\"showAnalytics\":true,\"showExportToExcel\":true,\"queryType\":0,\"resourceType\":\"microsoft.operationalinsights/workspaces\",\"gridSettings\":{\"rowLimit\":10000,\"filter\":true}},\"name\":\"query - 2\",\"styleSettings\":{\"showBorder\":true}}]},\"name\":\"Information for Role Assignee group\"}]},\"conditionalVisibility\":{\"parameterName\":\"selected\",\"comparison\":\"isEqualTo\",\"value\":\"RBACDelegation\"},\"name\":\"Information for Role Assignee\"},{\"type\":12,\"content\":{\"version\":\"NotebookGroup/1.0\",\"groupType\":\"editable\",\"title\":\"Linked Groups information\",\"items\":[{\"type\":12,\"content\":{\"version\":\"NotebookGroup/1.0\",\"groupType\":\"editable\",\"title\":\"Information for Linked Groups\",\"items\":[{\"type\":1,\"content\":{\"json\":\"Display associated remote forest's group for Linked Group\"},\"name\":\"text - 0\"},{\"type\":3,\"content\":{\"version\":\"KqlItem/1.0\",\"query\":\"ExchangeConfiguration(SpecificSectionList=\\\"RoleGroup\\\",SpecificConfigurationDate=\\\"{DateOfConfiguration:value}\\\",SpecificConfigurationEnv={EnvironmentList})\\r\\n| where CmdletResultValue.RoleGroupType == \\\"1\\\"\\r\\n//| extend ManagementRoleAssignment = tostring(CmdletResultValue.Name)\\r\\n| extend RoleAssigneeName = tostring(CmdletResultValue.Name)\\r\\n| extend LinkedGroup = tostring(CmdletResultValue.LinkedGroup)\\r\\n//| extend LinkedGroup = iff(tostring(CmdletResultValue.RoleAssigneeType)==\\\"12\\\", \\\"Yes\\\",\\\"No\\\")\\r\\n//|lookup RoleG on RoleAssigneeName \\r\\n//| extend LinkedGroup = iff(tostring(LinkedGroup)==\\\"12\\\", \\\"Yes\\\",\\\"No\\\")\\r\\n| project RoleAssigneeName, LinkedGroup, WhenCreated, WhenChanged\\r\\n| sort by RoleAssigneeName asc\",\"size\":1,\"showAnalytics\":true,\"color\":\"green\",\"showExportToExcel\":true,\"queryType\":0,\"resourceType\":\"microsoft.operationalinsights/workspaces\",\"gridSettings\":{\"rowLimit\":10000,\"filter\":true}},\"name\":\"query - 2\",\"styleSettings\":{\"showBorder\":true}}]},\"name\":\"Information for Linked Groups\"}]},\"conditionalVisibility\":{\"parameterName\":\"selected\",\"comparison\":\"isEqualTo\",\"value\":\"RBACDelegation\"},\"name\":\"Linked Groups information\",\"styleSettings\":{\"showBorder\":true}},{\"type\":12,\"content\":{\"version\":\"NotebookGroup/1.0\",\"groupType\":\"editable\",\"items\":[{\"type\":12,\"content\":{\"version\":\"NotebookGroup/1.0\",\"groupType\":\"editable\",\"items\":[{\"type\":3,\"content\":{\"version\":\"KqlItem/1.0\",\"query\":\"let StandardGroup = dynamic([\\\"Compliance Management\\\", \\\"Delegated Setup\\\",\\\"Discovery Management\\\",\\\"Help Desk\\\",\\\"Hygiene Management\\\",\\\"Organization Management\\\",\\\"Public Folder Management\\\",\\\"Recipient Management\\\",\\\"Records Management\\\",\\\"Security Administrator\\\",\\\"Security Reader\\\",\\\"Server Management\\\",\\\"UM Management\\\",\\\"View-Only Organization Management\\\"]);\\r\\nExchangeConfiguration(SpecificSectionList=\\\"ExGroup\\\",SpecificConfigurationDate=\\\"{DateOfConfiguration:value}\\\",SpecificConfigurationEnv={EnvironmentList})\\r\\n| where CmdletResultValue.Parentgroup in (StandardGroup)\\r\\n| project CmdletResultValue\\r\\n| extend Parentgroup = tostring(CmdletResultValue.Parentgroup)\\r\\n| summarize Total = count()-1 by Parentgroup\\r\\n| extend Comment = case (Total>0 and Parentgroup contains \\\"Discovery Management\\\", \\\"❌ This group should be empty Just in time should be used\\\", Total>5 and Parentgroup contains \\\"Organization Management\\\", \\\"❌ The content of this group should limited to only Level 3 Administrators\\\", Total>0 and Parentgroup contains \\\"Hygiene Management\\\", \\\"❌ This group should be empty or only contains Exchange server and/or Exchange antivirus Spam accounts\\\", \\\"Remember to regularly review the content of the group\\\")\\r\\n| sort by Parentgroup asc\",\"size\":3,\"showAnalytics\":true,\"title\":\"Numbers of members for high privileges groups\",\"showExportToExcel\":true,\"queryType\":0,\"resourceType\":\"microsoft.operationalinsights/workspaces\",\"gridSettings\":{\"rowLimit\":10000,\"filter\":true}},\"name\":\"query - 1\",\"styleSettings\":{\"showBorder\":true}},{\"type\":12,\"content\":{\"version\":\"NotebookGroup/1.0\",\"groupType\":\"editable\",\"title\":\"Explanations\",\"expandable\":true,\"items\":[{\"type\":1,\"content\":{\"json\":\"All the default Exchange groups located in the default Exchange OU : Microsoft Exchange Security Groups are displayed with their number of members.\\r\\n\\r\\nIt is very important to monitor the content of Exchange groups and raise an alert when a new member is added.\\r\\n\\r\\nFor critical groups, a warning is display if the number exceeded a define thresold :\\r\\n - Discovery Management: This group should be empty, so a warning is displayed when the group is not empty\\r\\n\\r\\n - Organization Management : This group should only contain only Exchange expert. No service account should be member of this groupe. A warning is display when the total numer of member exceeded 5\\r\\n - Hygiene Management : This group can acces and moidify the content of all mailboxes using EWS. A warning is display when the group is not empty. This warning can be ignored if the accounts are the Antispam service account or Exchange servers Computer accounts\"},\"name\":\"text - 0\"}]},\"name\":\"group - 1\"}]},\"name\":\"Summarize Number of Member Per Group\"},{\"type\":1,\"content\":{\"json\":\"❌ : for last logon displayed when user logged or the last logon is greater than 180 days\\r\\n\\r\\n❌ : for password last set displayed when last password set greater than 366 days\"},\"name\":\"text - 3\"},{\"type\":9,\"content\":{\"version\":\"KqlParameterItem/1.0\",\"parameters\":[{\"id\":\"7c281d60-8434-4636-b85e-aef6296f1107\",\"version\":\"KqlParameterItem/1.0\",\"name\":\"LastLogon\",\"label\":\"Last Logon\",\"type\":10,\"isRequired\":true,\"jsonData\":\"[ {\\\"value\\\": \\\"0d\\\", \\\"label\\\": \\\"No filter\\\",\\\"selected\\\":true},\\r\\n{ \\\"value\\\": \\\"90d\\\", \\\"label\\\": \\\"90d\\\" },\\r\\n { \\\"value\\\": \\\"180d\\\", \\\"label\\\": \\\"6m\\\" },\\r\\n { \\\"value\\\": \\\"365d\\\", \\\"label\\\": \\\"1y\\\" },\\r\\n{ \\\"value\\\": \\\"730d\\\", \\\"label\\\": \\\"2y\\\" },\\r\\n{ \\\"value\\\": \\\"1085d\\\", \\\"label\\\": \\\"3y\\\" },\\r\\n{ \\\"value\\\": \\\"1097d\\\", \\\"label\\\": \\\"more than 3y\\\"},\\r\\n{ \\\"value\\\": \\\"3650d\\\", \\\"label\\\": \\\"more than 10y\\\"}\\r\\n]\",\"timeContext\":{\"durationMs\":86400000}},{\"id\":\"e122a0de-1395-4002-96f9-cc057c257518\",\"version\":\"KqlParameterItem/1.0\",\"name\":\"PasswordLast\",\"label\":\"Password Last Set\",\"type\":10,\"isRequired\":true,\"jsonData\":\"[{ \\\"value\\\": \\\"0d\\\", \\\"label\\\": \\\"No filter\\\",\\\"selected\\\":true },\\r\\n { \\\"value\\\": \\\"365d\\\", \\\"label\\\": \\\"1y\\\" },\\r\\n{ \\\"value\\\": \\\"730d\\\", \\\"label\\\": \\\"2y\\\" },\\r\\n{ \\\"value\\\": \\\"1095d\\\", \\\"label\\\": \\\"3y\\\" },\\r\\n{ \\\"value\\\": \\\"1097d\\\", \\\"label\\\": \\\"more than 3y\\\"},\\r\\n{ \\\"value\\\": \\\"3650d\\\", \\\"label\\\": \\\"more than 10y\\\"}\\r\\n]\",\"timeContext\":{\"durationMs\":86400000}}],\"style\":\"pills\",\"queryType\":0,\"resourceType\":\"microsoft.operationalinsights/workspaces\"},\"name\":\"parameters - 4\"},{\"type\":3,\"content\":{\"version\":\"KqlItem/1.0\",\"query\":\"let StandardGroup = dynamic([\\\"Compliance Management\\\", \\\"Delegated Setup\\\",\\\"Discovery Management\\\",\\\"Help Desk\\\",\\\"Hygiene Management\\\",\\\"Organization Management\\\",\\\"Public Folder Management\\\",\\\"Recipient Management\\\",\\\"Records Management\\\",\\\"Security Administrator\\\",\\\"Security Reader\\\",\\\"Server Management\\\",\\\"UM Management\\\",\\\"View-Only Organization Management\\\"]);\\r\\nExchangeConfiguration(SpecificSectionList=\\\"ExGroup\\\",SpecificConfigurationDate=\\\"{DateOfConfiguration:value}\\\",SpecificConfigurationEnv={EnvironmentList})\\r\\n| where CmdletResultValue.Parentgroup in (StandardGroup)\\r\\n| where todatetime (CmdletResultValue.LastPwdSetString) < ago({PasswordLast}) or tostring (CmdletResultValue.LastPwdSetString) == \\\"\\\"\\r\\n| where todatetime (CmdletResultValue.LastLogonString) < ago({LastLogon}) or tostring (CmdletResultValue.LastLogonString) == \\\"\\\"\\r\\n| project CmdletResultValue\\r\\n| extend Parentgroup = tostring(CmdletResultValue.Parentgroup)\\r\\n| extend MemberPath = tostring(CmdletResultValue.MemberPath)\\r\\n| extend Level = tostring(CmdletResultValue.Level)\\r\\n| where Level !=0\\r\\n| extend ObjectClass = tostring(CmdletResultValue.ObjectClass)\\r\\n| extend LastLogon = tostring(CmdletResultValue.LastLogonString)\\r\\n| extend LastLogon = iif(ObjectClass==\\\"group\\\" or ObjectClass==\\\"computer\\\" or ObjectClass==\\\"Local User\\\" or ObjectClass==\\\"computer\\\",\\\"N/A\\\", iif ( todatetime (CmdletResultValue.LastLogonString) > ago(180d), CmdletResultValue.LastLogonString,iff (LastLogon==\\\"\\\", \\\"❌ Never logged\\\",strcat(\\\"❌\\\",LastLogon))))\\r\\n| extend LastPwdSet = CmdletResultValue.LastPwdSetString\\r\\n| extend LastPwdSet = iif(ObjectClass==\\\"group\\\" or ObjectClass==\\\"computer\\\" or ObjectClass==\\\"Local User\\\" or ObjectClass==\\\"computer\\\",\\\"N/A\\\",iif ( todatetime (CmdletResultValue.LastPwdSetString) > ago(366d), CmdletResultValue.LastPwdSetString,iff (LastPwdSet==\\\"\\\", \\\"❌ Password never set\\\",strcat(\\\"❌\\\",LastPwdSet))))\\r\\n| extend Enabled = tostring(CmdletResultValue.Enabled)\\r\\n| extend DN = tostring(CmdletResultValue.DN)\\r\\n| project-away CmdletResultValue\\r\\n| sort by MemberPath asc\",\"size\":3,\"showAnalytics\":true,\"title\":\"Default Exchange groups content\",\"queryType\":0,\"resourceType\":\"microsoft.operationalinsights/workspaces\",\"gridSettings\":{\"formatters\":[{\"columnMatch\":\"$gen_group\",\"formatter\":1},{\"columnMatch\":\"ParentGroup\",\"formatter\":1},{\"columnMatch\":\"Parentgroup\",\"formatter\":5},{\"columnMatch\":\"Group\",\"formatter\":1}],\"rowLimit\":10000,\"filter\":true,\"hierarchySettings\":{\"treeType\":1,\"groupBy\":[\"Parentgroup\"],\"finalBy\":\"Parentgroup\"},\"labelSettings\":[{\"columnId\":\"Parentgroup\",\"label\":\"ParentGroup\"}]}},\"name\":\"query - 1\",\"styleSettings\":{\"showBorder\":true}},{\"type\":12,\"content\":{\"version\":\"NotebookGroup/1.0\",\"groupType\":\"editable\",\"title\":\"Explanations\",\"expandable\":true,\"items\":[{\"type\":1,\"content\":{\"json\":\"This section the content of the groups with details informations.\\r\\n\\r\\nIt is recommended to check the Last logon and last password change informations.\"},\"name\":\"text - 0\"}]},\"name\":\"group - 2\"}]},\"conditionalVisibility\":{\"parameterName\":\"selected\",\"comparison\":\"isEqualTo\",\"value\":\"DefaultGroup\"},\"name\":\"group - 4\"},{\"type\":12,\"content\":{\"version\":\"NotebookGroup/1.0\",\"groupType\":\"editable\",\"title\":\"Let start with Least Privileges with RBAC\",\"items\":[{\"type\":1,\"content\":{\"json\":\"# Workbook goals\\r\\nThe goals of this workbook is to show you the current RBAC delegation\\r\\n\\r\\n\\r\\nThis workbook will display :\\r\\n\\r\\n - NonStandrd RBAC delegation\\r\\n\\r\\n - Exchange default group content\\r\\n\\r\\n - Analysis of the actions performed by Organization Management members to remove them from the groups\\r\\n\\r\\n----\\r\\n\\r\\n## Tabs\\r\\n\\r\\n### Current RBAC Delegation\\r\\n\\r\\nThis tab will show all the nonstandard RBAC delegation.\\r\\n\\r\\n**Most of the time RBAC are done and forgotten... This tab will provide a clear statut of the delegation and help with the remediation.**\\r\\n\\r\\nBy nonstandard, it means that the current delegation are compared to the delegation from Exchange 2019 CU11.\\r\\n\\r\\nNonstandard delegation for standard groups like Organization Management will also be displayed.\\r\\n\\r\\nDetail information for found will be displayed : Last logon, last password changed...\\r\\n\\r\\n### Default Group content\\r\\n\\r\\nThis tab will show the number of members for default Exchange groups and their content.\\r\\n\\r\\nMost of the time, the content of common Exchange groups but Exchange is shipped with many groups that have very high privileges and its interesting to see that they are not empty as expected.\"},\"name\":\"text - 0\"}]},\"conditionalVisibility\":{\"parameterName\":\"selected\",\"comparison\":\"isEqualTo\",\"value\":\"start\"},\"name\":\"group - 6\"},{\"type\":12,\"content\":{\"version\":\"NotebookGroup/1.0\",\"groupType\":\"editable\",\"title\":\"Custom Role details\",\"items\":[{\"type\":12,\"content\":{\"version\":\"NotebookGroup/1.0\",\"groupType\":\"editable\",\"title\":\"List of Custom Roles\",\"items\":[{\"type\":1,\"content\":{\"json\":\"This section shows the Custom management roles that exist in your environnment and the name of the parent's role\"},\"name\":\"text - 0\"},{\"type\":1,\"content\":{\"json\":\"Liste of existing Custom roles\"},\"customWidth\":\"50\",\"name\":\"text - 5\"},{\"type\":1,\"content\":{\"json\":\"List of Custom with a Management Role Assignement (associated with a group or a user). Display the target account and scope if set\"},\"customWidth\":\"50\",\"name\":\"text - 6\"},{\"type\":3,\"content\":{\"version\":\"KqlItem/1.0\",\"query\":\"ExchangeConfiguration(SpecificSectionList=\\\"MRCustom\\\",SpecificConfigurationDate=\\\"{DateOfConfiguration:value}\\\",SpecificConfigurationEnv={EnvironmentList},Target = \\\"On-Premises\\\")\\r\\n| extend Identity = CmdletResultValue.Name\\r\\n| extend ParentRole = CmdletResultValue.Parent.Name\\r\\n| extend WhenCreated = WhenCreated\\r\\n| project Identity, ParentRole, WhenCreated, WhenChanged\",\"size\":0,\"showAnalytics\":true,\"timeContext\":{\"durationMs\":86400000},\"showExportToExcel\":true,\"queryType\":0,\"resourceType\":\"microsoft.operationalinsights/workspaces\",\"gridSettings\":{\"rowLimit\":10000,\"filter\":true}},\"customWidth\":\"50\",\"name\":\"query - 1\",\"styleSettings\":{\"showBorder\":true}},{\"type\":3,\"content\":{\"version\":\"KqlItem/1.0\",\"query\":\"ExchangeConfiguration(SpecificSectionList=\\\"MRA\\\",SpecificConfigurationDate=\\\"{DateOfConfiguration:value}\\\",SpecificConfigurationEnv={EnvironmentList},Target = \\\"On-Premises\\\")\\r\\n| where CmdletResultValue.Role.Parent.Parent == \\\"Roles\\\"\\r\\n| where CmdletResultValue.RoleAssignmentDelegationType <> 6\\r\\n| extend RoleAssigneeName = tostring(CmdletResultValue.RoleAssigneeName)\\r\\n| extend Role = tostring(CmdletResultValue.Role.Name)\\r\\n//| extend Scope = tostring(CmdletResultValue.RecipientWriteScope)\\r\\n| extend Scope = tostring(CmdletResultValue.CustomRecipientWriteScope.Name)\\r\\n//| project Role = tostring(CmdletResultValue.Role.Name)\\r\\n| distinct Role,RoleAssigneeName,Scope\\r\\n| project Role,RoleAssigneeName,Scope\",\"size\":1,\"showAnalytics\":true,\"timeContext\":{\"durationMs\":86400000},\"showExportToExcel\":true,\"queryType\":0,\"resourceType\":\"microsoft.operationalinsights/workspaces\",\"gridSettings\":{\"rowLimit\":10000,\"filter\":true}},\"customWidth\":\"50\",\"name\":\"query - 4\",\"styleSettings\":{\"showBorder\":true}},{\"type\":3,\"content\":{\"version\":\"KqlItem/1.0\",\"query\":\"let MRcustomRoles = (ExchangeConfiguration(SpecificSectionList=\\\"MRCustom\\\", SpecificConfigurationDate=\\\"{DateOfConfiguration:value}\\\",SpecificConfigurationEnv={EnvironmentList},Target = \\\"On-Premises\\\")\\r\\n| project Role = tostring(CmdletResultValue.Name));\\r\\nExchangeConfiguration(SpecificSectionList=\\\"MRA\\\", SpecificConfigurationDate=\\\"{DateOfConfiguration:value}\\\",SpecificConfigurationEnv={EnvironmentList},Target = \\\"On-Premises\\\")\\r\\n| where CmdletResultValue.Role.Parent.Parent == \\\"Roles\\\"\\r\\n| where CmdletResultValue.RoleAssignmentDelegationType <> 6\\r\\n| extend RoleAssigneeName = tostring(CmdletResultValue.RoleAssigneeName)\\r\\n| extend Scope = tostring(CmdletResultValue.CustomRecipientWriteScope.Name)\\r\\n| project Role = tostring(CmdletResultValue.Role.Name), Scope, RoleAssigneeName\\r\\n| join kind=fullouter (MRcustomRoles) on Role\\r\\n| project Role = Role1, Scope, RoleAssigneeName,Comment = iff(Role == \\\"\\\", \\\"⚠️ No existing delegation for this role\\\", \\\"✅ This role is delegated with a Management Role Assignment\\\")\",\"size\":0,\"showAnalytics\":true,\"timeContext\":{\"durationMs\":86400000},\"showExportToExcel\":true,\"queryType\":0,\"resourceType\":\"microsoft.operationalinsights/workspaces\",\"gridSettings\":{\"rowLimit\":10000,\"filter\":true}},\"customWidth\":\"50\",\"name\":\"query - 2\",\"styleSettings\":{\"showBorder\":true}},{\"type\":3,\"content\":{\"version\":\"KqlItem/1.0\",\"query\":\"let MRcustomRoles = (ExchangeConfiguration(SpecificSectionList=\\\"MRCustom\\\", SpecificConfigurationDate=\\\"{DateOfConfiguration:value}\\\",SpecificConfigurationEnv={EnvironmentList},Target = \\\"On-Premises\\\")\\r\\n | project Role = tostring(CmdletResultValue.Name));\\r\\nExchangeConfiguration(SpecificSectionList=\\\"MRA\\\", SpecificConfigurationDate=\\\"{DateOfConfiguration:value}\\\",SpecificConfigurationEnv={EnvironmentList},Target = \\\"On-Premises\\\")\\r\\n| where CmdletResultValue.Role.Parent.Parent == \\\"Roles\\\"\\r\\n| where CmdletResultValue.RoleAssignmentDelegationType <> 6\\r\\n| project Role = tostring(CmdletResultValue.Role.Name)\\r\\n| join kind=fullouter (MRcustomRoles) on Role\\r\\n| summarize acount = count() by iff( Role==\\\"\\\",\\\"Number of non assigned roles\\\", Role)\",\"size\":0,\"showAnalytics\":true,\"timeContext\":{\"durationMs\":86400000},\"showExportToExcel\":true,\"queryType\":0,\"resourceType\":\"microsoft.operationalinsights/workspaces\",\"visualization\":\"piechart\"},\"customWidth\":\"50\",\"name\":\"query - 3\"}]},\"name\":\"List of Custom Roles\"},{\"type\":12,\"content\":{\"version\":\"NotebookGroup/1.0\",\"groupType\":\"editable\",\"title\":\"Custom Roles delegation on group\",\"items\":[{\"type\":1,\"content\":{\"json\":\"This section shows delegation associated with the Custom Roles\"},\"name\":\"text - 0\"},{\"type\":3,\"content\":{\"version\":\"KqlItem/1.0\",\"query\":\"ExchangeConfiguration(SpecificSectionList=\\\"MRA\\\",SpecificConfigurationDate=\\\"{DateOfConfiguration:value}\\\",SpecificConfigurationEnv={EnvironmentList},Target = \\\"On-Premises\\\")\\r\\n| where CmdletResultValue.Role.Parent.Parent == \\\"Roles\\\"\\r\\n| where CmdletResultValue.RoleAssignmentDelegationType <> 6\\r\\n| extend Role = tostring(CmdletResultValue.Role.Name)\\r\\n| extend RoleAssigneeType = case(CmdletResultValue.RoleAssigneeType== \\\"0\\\" or CmdletResultValue.RoleAssigneeType== \\\"2\\\" , \\\"User\\\", CmdletResultValue.RoleAssigneeType== \\\"10\\\",\\\"Group\\\",\\\"LinkedGroup\\\")\\r\\n| extend CustomRecipientWriteScope = tostring(CmdletResultValue.CustomRecipientWriteScope.Name)\\r\\n| extend CustomConfigWriteScope = tostring(CmdletResultValue.CustomConfigWriteScope.Name)\\r\\n| extend RecipientWriteScope = case(CmdletResultValue.RecipientWriteScope==\\\"0\\\",\\\"None\\\",CmdletResultValue.RecipientWriteScope==\\\"2\\\",\\\"Organization\\\",CmdletResultValue.RecipientWriteScope==\\\"3\\\",\\\"MyGAL\\\", CmdletResultValue.RecipientWriteScope==\\\"4\\\",\\\"Self\\\",CmdletResultValue.RecipientWriteScope==\\\"7\\\", \\\"CustomRecipientScope\\\",CmdletResultValue.RecipientWriteScope==\\\"8\\\",\\\"MyDistributionGroups\\\",\\\"NotApplicable\\\")\\r\\n| extend ConfigWriteScope = case(CmdletResultValue.ConfigWriteScope==\\\"0\\\",\\\"None\\\",CmdletResultValue.ConfigWriteScope==\\\"7\\\",\\\"CustomConfigScope\\\",CmdletResultValue.ConfigWriteScope==\\\"10\\\",\\\"OrganizationConfig\\\",\\\"NotApplicable\\\")\\r\\n| extend ConfigReadScope = iff(CmdletResultValue.ConfigReadScope == \\\"0\\\" , \\\"None\\\", \\\"OrganizationConfig\\\")\\r\\n| extend RecipientReadScope = case(CmdletResultValue.RecipientReadScope==\\\"2\\\",\\\"Organization\\\",CmdletResultValue.RecipientReadScope==\\\"3\\\",\\\"MyGAL\\\",CmdletResultValue.RecipientReadScope==\\\"4\\\",\\\"Self\\\",\\\"NotApplicable\\\")\\r\\n| extend ManagementRoleAssignement = tostring(CmdletResultValue.Name)\\r\\n| extend RoleAssignmentDelegationType = iff(CmdletResultValue.RoleAssignmentDelegationType ==\\\"6\\\" , \\\"Delegating\\\", \\\"Regular\\\") \\r\\n| extend RoleAssigneeName = iff( RoleAssigneeType == \\\"User\\\", strcat(\\\"🧑‍🦰 \\\",tostring(CmdletResultValue.RoleAssigneeName)), strcat(\\\"👪 \\\", tostring(CmdletResultValue.RoleAssigneeName)) )\\r\\n| project RoleAssigneeName, Role, RoleAssigneeType, CustomRecipientWriteScope, CustomConfigWriteScope, RecipientWriteScope, ConfigWriteScope, ConfigReadScope, RecipientReadScope, ManagementRoleAssignement, RoleAssignmentDelegationType, WhenCreated, WhenChanged\\r\\n\",\"size\":1,\"showAnalytics\":true,\"timeContext\":{\"durationMs\":86400000},\"showExportToExcel\":true,\"queryType\":0,\"resourceType\":\"microsoft.operationalinsights/workspaces\",\"gridSettings\":{\"rowLimit\":10000,\"filter\":true}},\"name\":\"query - 1\"}]},\"name\":\"group - 2\"},{\"type\":12,\"content\":{\"version\":\"NotebookGroup/1.0\",\"groupType\":\"editable\",\"title\":\"Details for Custom Roles Cmdlets \",\"items\":[{\"type\":1,\"content\":{\"json\":\"This section displays for the chosen custom management roles all Cmdlets and their parameters associated with this custom role.\\r\\nRemember that for a cmdlet, some parameters can be removed.\"},\"name\":\"text - 0\"},{\"type\":9,\"content\":{\"version\":\"KqlParameterItem/1.0\",\"parameters\":[{\"id\":\"07c8ac83-371d-4702-ab66-72aeb2a20053\",\"version\":\"KqlParameterItem/1.0\",\"name\":\"CustomRole\",\"type\":2,\"isRequired\":true,\"query\":\" ExchangeConfiguration(SpecificSectionList=\\\"MRCustom\\\",SpecificConfigurationDate=\\\"{DateOfConfiguration:value}\\\",SpecificConfigurationEnv={EnvironmentList},Target = \\\"On-Premises\\\")\\r\\n| extend Identity = CmdletResultValue.Name\\r\\n| project Identity\",\"typeSettings\":{\"showDefault\":false},\"timeContext\":{\"durationMs\":86400000},\"queryType\":0,\"resourceType\":\"microsoft.operationalinsights/workspaces\"}],\"style\":\"pills\",\"queryType\":0,\"resourceType\":\"microsoft.operationalinsights/workspaces\"},\"name\":\"parameters - 2\"},{\"type\":3,\"content\":{\"version\":\"KqlItem/1.0\",\"query\":\"let SelectedRole = toscalar ( ExchangeConfiguration(SpecificSectionList=\\\"MRCustom\\\",SpecificConfigurationDate=\\\"{DateOfConfiguration:value}\\\",SpecificConfigurationEnv={EnvironmentList},Target = \\\"On-Premises\\\")\\r\\n| extend Identity = CmdletResultValue.Name\\r\\n| where Identity contains \\\"{CustomRole}\\\"\\r\\n| extend ParentRole = CmdletResultValue.Parent.Name\\r\\n| project ParentRole);\\r\\nlet DefMRA = externaldata (Role:string,CmdletCount:string,Parameters:string )[h\\\"https://raw.githubusercontent.com/nlepagnez/ESI-PublicContent/main/Operations/Watchlists/RBACRoleCmdlet.csv\\\"]with(format=\\\"csv\\\",ignoreFirstRecord=true)| where Role == SelectedRole | summarize CmdletCount=count() by Role;\\r\\nExchangeConfiguration(SpecificSectionList=\\\"MRCustomDetails\\\",SpecificConfigurationDate=\\\"{DateOfConfiguration:value}\\\",SpecificConfigurationEnv={EnvironmentList},Target = \\\"On-Premises\\\")\\r\\n| where (replace_string(replace_string(tostring(split(CmdletResultValue.Role.DistinguishedName,\\\",\\\",0)),\\\"[\\\\\\\"CN=\\\",\\\"\\\"),\\\"\\\\\\\"]\\\",\\\"\\\")) contains \\\"{CustomRole}\\\"\\r\\n| extend CustomRoleName = replace_string(replace_string(tostring(split(CmdletResultValue.Role.DistinguishedName,\\\",\\\",0)),\\\"[\\\\\\\"CN=\\\",\\\"\\\"),\\\"\\\\\\\"]\\\",\\\"\\\")\\r\\n| extend CmdletName = CmdletResultValue.Name\\r\\n| extend Parameters = CmdletResultValue.Parameters\\r\\n| project CmdletName,Parameters,ParentRole = SelectedRole\",\"size\":1,\"showAnalytics\":true,\"timeContext\":{\"durationMs\":86400000},\"showExportToExcel\":true,\"queryType\":0,\"resourceType\":\"microsoft.operationalinsights/workspaces\",\"gridSettings\":{\"formatters\":[{\"columnMatch\":\"Parameters\",\"formatter\":0,\"formatOptions\":{\"customColumnWidthSetting\":\"100ch\"}}],\"rowLimit\":10000,\"filter\":true}},\"customWidth\":\"70\",\"name\":\"query - 1\",\"styleSettings\":{\"showBorder\":true}},{\"type\":3,\"content\":{\"version\":\"KqlItem/1.0\",\"query\":\"let SelectedRole = toscalar ( ExchangeConfiguration(SpecificSectionList=\\\"MRCustom\\\",SpecificConfigurationDate=\\\"{DateOfConfiguration:value}\\\",SpecificConfigurationEnv={EnvironmentList},Target = \\\"On-Premises\\\")\\r\\n| extend Identity = CmdletResultValue.Name\\r\\n| where Identity contains \\\"{CustomRole}\\\"\\r\\n| extend ParentRole = CmdletResultValue.Parent.Name\\r\\n| project ParentRole);\\r\\nlet DefMRA = externaldata (Role:string,CmdletCount:string,Parameters:string )[h\\\"https://raw.githubusercontent.com/nlepagnez/ESI-PublicContent/main/Operations/Watchlists/RBACRoleCmdlet.csv\\\"]with(format=\\\"csv\\\",ignoreFirstRecord=true)| where Role == SelectedRole | summarize CmdletCount=count() by Role;\\r\\nlet MRCustomD = ExchangeConfiguration(SpecificSectionList=\\\"MRCustomDetails\\\",SpecificConfigurationDate=\\\"{DateOfConfiguration:value}\\\",SpecificConfigurationEnv={EnvironmentList},Target = \\\"On-Premises\\\")\\r\\n| where (replace_string(replace_string(tostring(split(CmdletResultValue.Role.DistinguishedName,\\\",\\\",0)),\\\"[\\\\\\\"CN=\\\",\\\"\\\"),\\\"\\\\\\\"]\\\",\\\"\\\")) contains \\\"{CustomRole}\\\"\\r\\n| extend Role = replace_string(replace_string(tostring(split(CmdletResultValue.Role.DistinguishedName,\\\",\\\",0)),\\\"[\\\\\\\"CN=\\\",\\\"\\\"),\\\"\\\\\\\"]\\\",\\\"\\\")\\r\\n| extend CmdletName = CmdletResultValue.Name\\r\\n| extend ParentRole = tostring(SelectedRole)\\r\\n| summarize CmdletCount = count() by Role, ParentRole\\r\\n| project Role,CmdletCount;\\r\\nunion MRCustomD, DefMRA\",\"size\":0,\"timeContext\":{\"durationMs\":86400000},\"queryType\":0,\"resourceType\":\"microsoft.operationalinsights/workspaces\",\"visualization\":\"piechart\"},\"customWidth\":\"30\",\"name\":\"query - 3\"},{\"type\":1,\"content\":{\"json\":\"List of Cmdlets ( Get- command have been removed to clarify the information) with :\\r\\nCustomParamCount : number of parameters for the Cmdlet in the custom role\\r\\nDefaultCmdletNumberofParam : number of parameters for the Cmdlet in the default role\\r\\n\"},\"name\":\"text - 5\"},{\"type\":3,\"content\":{\"version\":\"KqlItem/1.0\",\"query\":\"let SelectedRole = toscalar ( ExchangeConfiguration(SpecificSectionList=\\\"MRCustom\\\",SpecificConfigurationDate=\\\"{DateOfConfiguration:value}\\\",SpecificConfigurationEnv={EnvironmentList},Target = \\\"On-Premises\\\")\\r\\n| extend Identity = CmdletResultValue.Name\\r\\n| where Identity contains \\\"{CustomRole}\\\"\\r\\n| extend ParentRole = CmdletResultValue.Parent.Name\\r\\n| project ParentRole);\\r\\nlet DefMRA = externaldata (Role:string,Name:string,Parameters:string )[h\\\"https://raw.githubusercontent.com/nlepagnez/ESI-PublicContent/main/Operations/Watchlists/RBACRoleCmdlet.csv\\\"]with(format=\\\"csv\\\",ignoreFirstRecord=true)| where Role == SelectedRole | mv-expand split(todynamic(Parameters),\\\";\\\")| summarize ParamCount = count() by Name;\\r\\nExchangeConfiguration(SpecificSectionList=\\\"MRCustomDetails\\\",SpecificConfigurationDate=\\\"{DateOfConfiguration:value}\\\",SpecificConfigurationEnv={EnvironmentList},Target = \\\"On-Premises\\\")\\r\\n| where (replace_string(replace_string(tostring(split(CmdletResultValue.Role.DistinguishedName,\\\",\\\",0)),\\\"[\\\\\\\"CN=\\\",\\\"\\\"),\\\"\\\\\\\"]\\\",\\\"\\\")) contains \\\"{CustomRole}\\\"\\r\\n| extend CustomRoleName = replace_string(replace_string(tostring(split(CmdletResultValue.Role.DistinguishedName,\\\",\\\",0)),\\\"[\\\\\\\"CN=\\\",\\\"\\\"),\\\"\\\\\\\"]\\\",\\\"\\\")\\r\\n| extend CmdletName = tostring(CmdletResultValue.Name)\\r\\n| where CmdletName !contains \\\"get-\\\"\\r\\n| extend Parameters = CmdletResultValue.Parameters\\r\\n| extend ParentRole = tostring(SelectedRole)\\r\\n| mv-expand split(todynamic(Parameters),\\\";\\\")\\r\\n| summarize ParamCount = count() by CmdletName, ParentRole\\r\\n| join (DefMRA) on $left.CmdletName == $right.Name\\r\\n| project CmdletName, CustomParamCount = ParamCount , DefaultCmdletNumberofParam = ParamCount1\",\"size\":1,\"showAnalytics\":true,\"timeContext\":{\"durationMs\":86400000},\"showExportToExcel\":true,\"queryType\":0,\"resourceType\":\"microsoft.operationalinsights/workspaces\",\"gridSettings\":{\"rowLimit\":10000,\"filter\":true,\"sortBy\":[{\"itemKey\":\"DefaultCmdletNumberofParam\",\"sortOrder\":1}]},\"sortBy\":[{\"itemKey\":\"DefaultCmdletNumberofParam\",\"sortOrder\":1}]},\"name\":\"query - 4\",\"styleSettings\":{\"showBorder\":true}}]},\"name\":\"Details for Custom Roles Cmdlets \"}]},\"conditionalVisibility\":{\"parameterName\":\"selected\",\"comparison\":\"isEqualTo\",\"value\":\"CustomRole\"},\"name\":\"Custom Role\",\"styleSettings\":{\"showBorder\":true}}],\"fromTemplateId\":\"sentinel-MicrosoftExchangeLeastPrivilegewithRBAC\",\"$schema\":\"https://github.com/Microsoft/Application-Insights-Workbooks/blob/master/schema/workbook.json\"}\r\n", "version": "1.0", "sourceId": "[variables('workspaceResourceId')]", "category": "sentinel" @@ -2767,7 +2767,7 @@ }, "properties": { "displayName": "[parameters('workbook4-name')]", - "serializedData": "{\"version\":\"Notebook/1.0\",\"items\":[{\"type\":1,\"content\":{\"json\":\"# Microsoft Exchange Security Review\"},\"name\":\"text - 2\"},{\"type\":9,\"content\":{\"version\":\"KqlParameterItem/1.0\",\"parameters\":[{\"id\":\"743317e2-ebcf-4958-861d-4ff97fc7cce1\",\"version\":\"KqlParameterItem/1.0\",\"name\":\"EnvironmentList\",\"label\":\"Environment\",\"type\":2,\"isRequired\":true,\"multiSelect\":true,\"quote\":\"'\",\"delimiter\":\",\",\"query\":\"ESI_ExchConfigAvailableEnvironments(Target=\\\"On-Premises\\\") | where ESIEnvironment != \\\"\\\"\",\"typeSettings\":{\"limitSelectTo\":1,\"showDefault\":false},\"queryType\":0,\"resourceType\":\"microsoft.operationalinsights/workspaces\"},{\"id\":\"a88b4e41-eb2f-41bf-92d8-27c83650a4b8\",\"version\":\"KqlParameterItem/1.0\",\"name\":\"DateOfConfiguration\",\"label\":\"Collection time\",\"type\":2,\"isRequired\":true,\"query\":\"let _configurationEnv = split(iff(isnull({EnvironmentList}) or isempty({EnvironmentList}) or tolower({EnvironmentList}) == \\\"all\\\",\\\"All\\\",tostring({EnvironmentList})),',');\\r\\nESIExchangeConfig_CL\\r\\n| extend ScopedEnvironment = iff(_configurationEnv contains \\\"All\\\", \\\"All\\\",ESIEnvironment_s) \\r\\n| where ScopedEnvironment in (_configurationEnv)\\r\\n| extend Collection = format_datetime(todatetime(EntryDate_s), 'yyyy-MM-dd')\\r\\n| summarize Collection = max(Collection)\\r\\n| project Collection = \\\"lastdate\\\", Selected = true\\r\\n| join kind= fullouter ( ESIExchangeConfig_CL | extend ScopedEnvironment = iff(_configurationEnv contains \\\"All\\\", \\\"All\\\",ESIEnvironment_s) \\r\\n | where ScopedEnvironment in (_configurationEnv)\\r\\n | where TimeGenerated > ago(90d)\\r\\n | extend Collection = format_datetime(todatetime(EntryDate_s), 'yyyy-MM-dd')\\r\\n | summarize by Collection \\r\\n | join kind= fullouter ( ESIExchangeConfig_CL | extend ScopedEnvironment = iff(_configurationEnv contains \\\"All\\\", \\\"All\\\",ESIEnvironment_s) \\r\\n | where ScopedEnvironment in (_configurationEnv)\\r\\n | where TimeGenerated > ago(90d)\\r\\n | extend Collection = format_datetime(todatetime(EntryDate_s), 'yyyy-MM-dd')\\r\\n | extend PreciseCollection = format_datetime(todatetime(EntryDate_s), 'yyyy-MM-dd HH:mm ')\\r\\n | summarize by PreciseCollection, Collection \\r\\n | join kind=leftouter (\\r\\n ESIExchangeConfig_CL | extend ScopedEnvironment = iff(_configurationEnv contains \\\"All\\\", \\\"All\\\",ESIEnvironment_s) \\r\\n | where ScopedEnvironment in (_configurationEnv)\\r\\n | where TimeGenerated > ago(90d)\\r\\n | extend Collection = format_datetime(todatetime(EntryDate_s), 'yyyy-MM-dd')\\r\\n | extend PreciseCollection = format_datetime(todatetime(EntryDate_s), 'yyyy-MM-dd HH:mm')\\r\\n | summarize by PreciseCollection, Collection \\r\\n | summarize count() by Collection\\r\\n ) on Collection\\r\\n ) on Collection\\r\\n) on Collection\\r\\n| project Value = iif(Selected,Collection,iif(count_ > 1,PreciseCollection,Collection1)), Label = iif(Selected,\\\"Last Known date\\\",iif(count_ > 1,PreciseCollection,Collection1)), Selected\\r\\n| sort by Selected, Value desc\",\"typeSettings\":{\"showDefault\":false},\"queryType\":0,\"resourceType\":\"microsoft.operationalinsights/workspaces\"},{\"id\":\"8ac96eb3-918b-4a36-bcc4-df50d8f46175\",\"version\":\"KqlParameterItem/1.0\",\"name\":\"Help\",\"label\":\"Show Help\",\"type\":10,\"isRequired\":true,\"query\":\"{\\\"version\\\":\\\"1.0.0\\\",\\\"content\\\":\\\"[\\\\r\\\\n { \\\\\\\"value\\\\\\\": \\\\\\\"Yes\\\\\\\", \\\\\\\"label\\\\\\\": \\\\\\\"Yes\\\\\\\"},\\\\r\\\\n {\\\\\\\"value\\\\\\\": \\\\\\\"No\\\\\\\", \\\\\\\"label\\\\\\\": \\\\\\\"No\\\\\\\", \\\\\\\"selected\\\\\\\":true }\\\\r\\\\n]\\\\r\\\\n\\\"}\",\"timeContext\":{\"durationMs\":2592000000},\"queryType\":8}],\"style\":\"above\",\"queryType\":0,\"resourceType\":\"microsoft.operationalinsights/workspaces\"},\"name\":\"TimeRange\"},{\"type\":1,\"content\":{\"json\":\"This workbook helps review your Exchange Security configuration.\\r\\nSelect your Exchange Organization and adjust the time range.\\r\\nBy default, the Help won't be displayed. To display the help, choose Yes on the toogle buttom \\\"Show Help\\\"\",\"style\":\"info\"},\"name\":\"text - 9\"},{\"type\":11,\"content\":{\"version\":\"LinkItem/1.0\",\"style\":\"tabs\",\"links\":[{\"id\":\"34188faf-7a02-4697-9b36-2afa986afc0f\",\"cellValue\":\"selected\",\"linkTarget\":\"parameter\",\"linkLabel\":\"Mailbox Access\",\"subTarget\":\"Delegation\",\"postText\":\"t\",\"style\":\"link\",\"icon\":\"3\",\"linkIsContextBlade\":true},{\"id\":\"be02c735-6150-4b6e-a386-b2b023e754e5\",\"cellValue\":\"selected\",\"linkTarget\":\"parameter\",\"linkLabel\":\"Exchange & AD Groups\",\"subTarget\":\"ExchAD\",\"style\":\"link\"},{\"id\":\"30dc6820-339d-4fa9-ad79-5d79816a5cab\",\"cellValue\":\"selected\",\"linkTarget\":\"parameter\",\"linkLabel\":\"Local Administrators\",\"subTarget\":\"Server\",\"style\":\"link\"},{\"id\":\"571fa2a4-1f1e-44a2-ada0-ccfb31b9abbb\",\"cellValue\":\"selected\",\"linkTarget\":\"parameter\",\"linkLabel\":\"Exchange Security Configuration\",\"subTarget\":\"SecConf\",\"style\":\"link\"},{\"id\":\"26c68d90-925b-4c3c-a837-e3cecd489b2d\",\"cellValue\":\"selected\",\"linkTarget\":\"parameter\",\"linkLabel\":\"Transport Configuration\",\"subTarget\":\"Transport\",\"style\":\"link\"},{\"id\":\"eb2888ca-7fa6-4e82-88db-1bb3663a801e\",\"cellValue\":\"selected\",\"linkTarget\":\"parameter\",\"linkLabel\":\"Workbook Summary\",\"subTarget\":\"Start\",\"style\":\"link\"}]},\"name\":\"TopMenuTabs\"},{\"type\":12,\"content\":{\"version\":\"NotebookGroup/1.0\",\"groupType\":\"editable\",\"items\":[{\"type\":1,\"content\":{\"json\":\"# Workbook goals\\r\\n\\r\\nThe goal of this workbook is to outline key security configurations of your Exchange on-premises environment.\\r\\n\\r\\nMost of Exchange organizations have were installed years ago (sometimes more than 10 years). Many configurations have been done and might not have been documented. For most environments, the core commitment was maintaining a high availability of the users’ mailboxes putting aside other consideration (even security considerations). Recommended security practices have also evolved since the first released and a regular review is necessary.\\r\\n\\r\\nThis workbook is designed to show your Exchange organization is configured with a security point of view. Indeed, some configurations easy to display as there are no UI available.\\r\\n\\r\\nFor each configuration, you will find explanations and recommendations when applicable.\\r\\n\\r\\n- This workbook does not pretend to show you every weak Security configurations, but the most common issues and known to be used by attackers. \\r\\n- It will not show you if you have been comprised, but will help you identify unexpected configuration.\\r\\n\\r\\n----\\r\\n\\r\\n## Quick reminder of how Exchange works\\r\\n\\r\\nDuring Exchange installation two very important groups are created :\\r\\n- Exchange Trusted Subsystem : Contain all the computer accounts for Exchange Server\\r\\n- Exchange Windows Permissions : Contain the group Exchange trusted Subsystem\\r\\n\\r\\nThese groups have :\\r\\n- Very high privileges in ALL AD domains including the root domain\\r\\n- Right on any Exchange including mailboxes\\r\\n\\r\\nAs each Exchange server computer account is member of Exchange Trusted Subsystem, it means by taking control of the computer account or being System on an Exchange server you will gain access to all the permissions granted to Exchange Trusted Subsystem and Exchange Windows Permissions.\\r\\n\\r\\nTo protect AD and Exchange, it is very important to ensure the following:\\r\\n- There is a very limited number of persons that are local Administrator on Exchange server\\r\\n- To protect user right like : Act part of the operating System, Debug\\r\\n\\r\\nEvery service account or application that have high privileges on Exchange need to be considered as sensitive\\r\\n\\r\\n** 💡 Exchange servers need to be considered as very sensitive servers**\\r\\n\\r\\n-----\\r\\n\\r\\n\\r\\n## Tabs\\r\\n\\r\\n### Mailbox Access\\r\\n\\r\\nThis tab will show you several top sensitive delegations that allow an account to access, modify, act as another user, search, export the content of a mailbox.\\r\\n\\r\\n### Exchange & AD Groups\\r\\n\\r\\nThis tab will show you the members of Exchange groups and Sensitive AD groups.\\r\\n\\r\\n### Local Administrators\\r\\n\\r\\nThis tab will show you the non standard content of the local Administrators group. Remember that a member of the local Administrators group can take control of the computer account of the server and then it will have all the permissions associated with Exchange Trusted Subsytem and Exchange Windows Permissions\\r\\n\\r\\nThe information is displayed with different views : \\r\\n- List of nonstandard users\\r\\n- Number of servers with a nonstandard a user\\r\\n- Nonstandard groups content\\r\\n- For each user important information are displayed like last logon, last password set, enabled\\r\\n\\r\\n### Exchange Security configuration\\r\\n\\r\\nThis tab will show you some important configuration for your Exchange Organization\\r\\n- Status of Admin Audit Log configuration\\r\\n- Status of POP and IMAP configuration : especially, is Plaintext Authentication configured ?\\r\\n- Nonstandard permissions on the Exchange container in the Configuration Partition\\r\\n\\r\\n### Transport Configuration\\r\\n\\r\\nThis tab will show you the configuration of the main Transport components\\r\\n- Receive Connectors configured with Anonymous and/or Open Relay\\r\\n- Remote Domain Autoforward configuration\\r\\n- Transport Rules configured with BlindCopyTo, SendTo, RedirectTo\\r\\n- Journal Rule and Journal Recipient configurations\\r\\n- Accepted Domains with *\\r\\n\\r\\n\"},\"name\":\"WorkbookInfo\"}]},\"conditionalVisibility\":{\"parameterName\":\"selected\",\"comparison\":\"isEqualTo\",\"value\":\"Start\"},\"name\":\"InformationTab\"},{\"type\":12,\"content\":{\"version\":\"NotebookGroup/1.0\",\"groupType\":\"editable\",\"title\":\"Security Configuration for the Exchange environment\",\"items\":[{\"type\":1,\"content\":{\"json\":\"This tab displays several security information regarding the organization or server's configuration.\"},\"name\":\"text - 12\"},{\"type\":1,\"content\":{\"json\":\"This section display the Exchange version and the CU installed.\\r\\n\\r\\nFor the latest build number, check this link : Exchange Build Numbers\\r\\n\\r\\nThis section is built from a file located in the public github repository.\\r\\nThe repository is manually updated by the team project when new CU/SU are released.\\r\\n\",\"style\":\"info\"},\"conditionalVisibility\":{\"parameterName\":\"Help\",\"comparison\":\"isEqualTo\",\"value\":\"Yes\"},\"name\":\"ServerVersionCheckHelp\"},{\"type\":3,\"content\":{\"version\":\"KqlItem/1.0\",\"query\":\"let ExchCUSU = externaldata (Productname:string, CU:string, SU:string, BuildNbAll:string, BuilCUNb:string, Major:string, CUBuildNb:string, SUBuildNb:string)[h\\\"https://raw.githubusercontent.com/nlepagnez/ESI-PublicContent/main/Operations/Watchlists/ExchBuildNumber.csv\\\"]with(format=\\\"csv\\\",ignoreFirstRecord=true)| project Productname,CU,SU,BuildNbAll,BuilCUNb,Major,CUBuildNb,SUBuildNb;\\r\\n//ExchangeConfiguration(SpecificSectionList=\\\"ExchangeServers\\\",SpecificConfigurationDate=\\\"{DateOfConfiguration:value}\\\",SpecificConfigurationEnv={EnvironmentList},Target = \\\"On-Premises\\\")\\r\\n//| extend VersionNumber = strcat(CmdletResultValue.AdminDisplayVersion.Major,\\\".\\\",CmdletResultValue.AdminDisplayVersion.Minor,\\\".\\\",CmdletResultValue.AdminDisplayVersion.Build)\\r\\nExchangeConfiguration(SpecificSectionList=\\\"ExchVersion\\\",SpecificConfigurationDate=\\\"{DateOfConfiguration:value}\\\",SpecificConfigurationEnv={EnvironmentList},Target = \\\"On-Premises\\\")\\r\\n| extend VersionNumber = tostring(CmdletResultValue.ProductVersion)\\r\\n| extend Server = tostring(ProcessedByServer_s)\\r\\n| extend CmdletResultType = tostring(CmdletResultType)\\r\\n| join kind= leftouter (ExchCUSU) on $left.VersionNumber == $right.BuildNbAll\\r\\n| distinct Server,VersionNumber,Productname,CU,SU,CmdletResultType\\r\\n| extend Server = strcat(\\\"💻 \\\",Server)\\r\\n| extend Productname = case ( VersionNumber startswith \\\"15.02\\\", \\\"Exchange 2019\\\", VersionNumber startswith \\\"15.01\\\", \\\"Exchange 2016\\\", VersionNumber startswith \\\"15.00\\\",\\\"Exchange 2013\\\", \\\"Exchange 2010\\\")\\r\\n| extend CU = iff(CmdletResultType <>\\\"Success\\\", \\\"Unable to retrieve information from server\\\", iff(CU <> \\\"\\\", CU, \\\"New CU or SU not yet in the List\\\"))\\r\\n| extend SU = iff(CmdletResultType <>\\\"Success\\\", \\\"Unable to retrieve information from server\\\", iff( SU <> \\\"\\\", SU, \\\"New CU or SU not yet in the List\\\"))\\r\\n|project-away CmdletResultType\\r\\n| sort by Server asc\\r\\n\",\"size\":1,\"showAnalytics\":true,\"title\":\"Exchange servers CU-SU level\",\"showExportToExcel\":true,\"queryType\":0,\"resourceType\":\"microsoft.operationalinsights/workspaces\",\"gridSettings\":{\"rowLimit\":10000,\"filter\":true}},\"customWidth\":\"50\",\"name\":\"ExchangeServersList\",\"styleSettings\":{\"showBorder\":true}},{\"type\":3,\"content\":{\"version\":\"KqlItem/1.0\",\"query\":\"let ExchCUSU = externaldata (Productname:string, CU:string, SU:string, BuildNbAll:string, BuilCUNb:string, Major:string, CUBuildNb:string, SUBuildNb:string)[h\\\"https://raw.githubusercontent.com/nlepagnez/ESI-PublicContent/main/Operations/Watchlists/ExchBuildNumber.csv\\\"]with(format=\\\"csv\\\",ignoreFirstRecord=true)| project Productname,CU,SU,BuildNbAll,BuilCUNb,Major,CUBuildNb,SUBuildNb;\\r\\nExchangeConfiguration(SpecificSectionList=\\\"ExchVersion\\\",SpecificConfigurationDate=\\\"{DateOfConfiguration:value}\\\",SpecificConfigurationEnv={EnvironmentList},Target = \\\"On-Premises\\\")\\r\\n//| extend VersionNumber = strcat(CmdletResultValue.AdminDisplayVersion.Major,\\\".\\\",CmdletResultValue.AdminDisplayVersion.Minor,\\\".\\\",CmdletResultValue.AdminDisplayVersion.Build)\\r\\n| extend VersionNumber = tostring(CmdletResultValue.ProductVersion)\\r\\n| extend Server = tostring(CmdletResultValue.Server)\\r\\n| join kind= leftouter (ExchCUSU) on $left.VersionNumber == $right.BuildNbAll\\r\\n| extend CU = iff( CU <> \\\"\\\", CU, \\\"New CU/SU not yet in the CU List\\\")\\r\\n| extend Version =strcat (VersionNumber,\\\"-\\\",CU,\\\"-\\\",SU)\\r\\n| summarize dcount(Server) by Version\",\"size\":0,\"showAnalytics\":true,\"title\":\"Version break down\",\"showExportToExcel\":true,\"queryType\":0,\"resourceType\":\"microsoft.operationalinsights/workspaces\",\"visualization\":\"piechart\"},\"customWidth\":\"50\",\"name\":\"ExchangeServerVersionPie\"},{\"type\":12,\"content\":{\"version\":\"NotebookGroup/1.0\",\"groupType\":\"editable\",\"title\":\"Admin Audit Log configuration\",\"items\":[{\"type\":1,\"content\":{\"json\":\"The Admin Audit log stores all the actions performed on Exchange Servers (except read actions such as Get/Test).\\r\\n\\r\\nAdmin Audit Log \\r\\n\\r\\nManage Admin Audit Log \\r\\n\\r\\n\\r\\nThis can be used to track \\r\\n- Unexpected behaviors\\r\\n- Who did a modification\\r\\n- Real actions performed by an account (the output could be used with to identify the necessary privileges)\\r\\n\\r\\nℹ️ Recommendations\\r\\n- Ensure that Admin Audit Log is not disabled\\r\\n- Ensure that critical Cmdlets have not been excluded\\r\\n- Ensure that AdminAuditLogCmdlets is set to * (list of audited Cmdlets)\\r\\n- Review the retention configuration for the Admin Audit Log content\",\"style\":\"info\"},\"conditionalVisibility\":{\"parameterName\":\"Help\",\"comparison\":\"isEqualTo\",\"value\":\"Yes\"},\"name\":\"AdminAuditHelp\"},{\"type\":1,\"content\":{\"json\":\"Here the main settings for the Admin Audit Log. Remember that AdminAudit log need to be enabled and no cmdlet should be excluded. Also check the retention limit.\"},\"name\":\"text - 0\"},{\"type\":3,\"content\":{\"version\":\"KqlItem/1.0\",\"query\":\"let SensitiveCMDLet = externaldata (Cmdlet:string, UserOriented:string, Parameters:string)[h\\\"https://raw.githubusercontent.com/nlepagnez/ESI-PublicContent/main/Operations/Watchlists/CmdletWatchlist.csv\\\"]with(format=\\\"csv\\\",ignoreFirstRecord=true)| project Cmdlet,UserOriented,Parameters;\\r\\nlet AAL = (ExchangeConfiguration(SpecificSectionList=\\\"AdminAuditLog\\\",SpecificConfigurationDate=\\\"{DateOfConfiguration:value}\\\",SpecificConfigurationEnv={EnvironmentList},Target = \\\"On-Premises\\\")\\r\\n| extend AdminAuditLogExcludedCmdlets = CmdletResultValue.AdminAuditLogExcludedCmdlets\\r\\n| project AdminAuditLogExcludedCmdlets);\\r\\nlet SentsitivecmdletTrack = toscalar(SensitiveCMDLet | where Cmdlet has_any ( AAL)| project Cmdlet);\\r\\nExchangeConfiguration(SpecificSectionList=\\\"AdminAuditLog\\\",SpecificConfigurationDate=\\\"{DateOfConfiguration:value}\\\",SpecificConfigurationEnv={EnvironmentList},Target = \\\"On-Premises\\\")\\r\\n| project CmdletResultValue\\r\\n| extend AdminAuditLogEnabled = iff(CmdletResultValue.AdminAuditLogEnabled == \\\"FALSE\\\", \\\" ❌ Disabled, High Risk\\\", \\\"✅ Enabled\\\")\\r\\n| extend AdminAuditLogAgeLimit = tostring(CmdletResultValue.AdminAuditLogAgeLimit)\\r\\n| extend AdminAuditLogAgeLimit = substring(AdminAuditLogAgeLimit,8)\\r\\n| extend AdminAuditLogAgeLimit =substring(AdminAuditLogAgeLimit,0,indexof(AdminAuditLogAgeLimit, ','))\\r\\n| extend AdminAuditLogAgeLimit = iff(toint(AdminAuditLogAgeLimit) == 0,strcat(\\\"❌ No AdminAuditlog recorded \\\",AdminAuditLogAgeLimit), iff(toint(AdminAuditLogAgeLimit) <=30,strcat(\\\"⚠️ Value to low except if exported \\\",AdminAuditLogAgeLimit), strcat(\\\"✅\\\",AdminAuditLogAgeLimit)))\\r\\n| extend AdminAuditLogCmdlets = tostring(CmdletResultValue.AdminAuditLogCmdlets)\\r\\n| extend AdminAuditLogCmdlets = substring(AdminAuditLogCmdlets,2)\\r\\n| extend AdminAuditLogCmdlets = substring(AdminAuditLogCmdlets,0,indexof(AdminAuditLogCmdlets, '\\\"]') )\\r\\n| extend AdminAuditLogCmdlets = replace_string(AdminAuditLogCmdlets,'\\\"',\\\"\\\")\\r\\n| extend Comment_AdminAuditLogCmdlets = iff( AdminAuditLogCmdlets == \\\"*\\\",\\\"✅ Default configuration\\\",\\\"❌ if AdminAuditLogCmdlets empty no logging else only AdminAuditLogCmdlets will be logged\\\")\\r\\n| extend AdminAuditLogExcludedCmdlets = tostring(CmdletResultValue.AdminAuditLogExcludedCmdlets)\\r\\n| extend AdminAuditLogExcludedCmdlets = substring(AdminAuditLogExcludedCmdlets,2)\\r\\n| extend AdminAuditLogExcludedCmdlets = substring(AdminAuditLogExcludedCmdlets,0,indexof(AdminAuditLogExcludedCmdlets, ']'))\\r\\n| extend AdminAuditLogExcludedCmdlets = replace_string(AdminAuditLogExcludedCmdlets,'\\\"',\\\"\\\")\\r\\n//| extend Cmdlet = replace_string(AdminAuditLogExcludedCmdlets,'\\\"',\\\"\\\")\\r\\n//| extend AALECSplit = tostring(split(AdminAuditLogExcludedCmdlets,\\\",\\\"))\\r\\n| project-away CmdletResultValue\\r\\n| extend Comment_AdminAuditLogExcludedCmdlet = case( isnotempty( SentsitivecmdletTrack ),\\\"❌ Some excluded CmdLets are part of Sensitive Cmdlets\\\",AdminAuditLogExcludedCmdlets <>\\\"\\\",\\\"⚠️ Some Cmdlets are excluded \\\",\\\"✅ No Excluded CmdLet\\\")\",\"size\":1,\"showAnalytics\":true,\"showExportToExcel\":true,\"queryType\":0,\"resourceType\":\"microsoft.operationalinsights/workspaces\",\"gridSettings\":{\"formatters\":[{\"columnMatch\":\"Comment_AdminAuditLogCmdlets\",\"formatter\":0,\"formatOptions\":{\"customColumnWidthSetting\":\"70ch\"}}],\"rowLimit\":10000,\"sortBy\":[{\"itemKey\":\"AdminAuditLogCmdlets\",\"sortOrder\":1}]},\"sortBy\":[{\"itemKey\":\"AdminAuditLogCmdlets\",\"sortOrder\":1}]},\"name\":\"query - 1\",\"styleSettings\":{\"showBorder\":true}}]},\"name\":\"group - 0Admin Audit Log configuration\"},{\"type\":12,\"content\":{\"version\":\"NotebookGroup/1.0\",\"groupType\":\"editable\"},\"name\":\"POP authentication configuration\"},{\"type\":1,\"content\":{\"json\":\"### POP authentication configuration\"},\"name\":\"text - 11\"},{\"type\":1,\"content\":{\"json\":\"If the POP Service is started, the LoginType should not set to Plaintext. This means that the password will be sent in clear on the network. As POP is enabled by default on all the mailboxes, this represents a high security risk.\\r\\n\\r\\nPOP Authentication\\r\\n- **PlainText** TLS encryption is not required on port 110. Usernames and passwords are sent unencrypted unless the underlying connection is encrypted by using TLS or SSL.\\r\\n- **PlainTextAuthentication** TLS encryption is not required on port 110. However, Basic authentication is permitted only on a port that uses TLS or SSL encryption.\\r\\n- **SecureLogin** Connection on port 110 must use TLS encryption before authenticating.\\r\\n\\r\\nℹ️ Recommendations\\r\\nDisable POP on all mailboxes except those who need to actually use this protocol.\\r\\nSet the authentication to SecureLogin or at least to PlainTextAuthentication and configure the application.\\r\\n\\r\\nIf the application is not able to perform this type of authentication:\\r\\n- Ensure that POP is disabled on all the mailboxes except those who really need it \\r\\n- Monitor the POP connections\\r\\n- Change the password of the application on a regular basis\\r\\n\\r\\nRecommended Reading : \\r\\n\\r\\nConfiguring Authentication for POP3 and IMAP4\\r\\n \\r\\n Set-PopSettings\\r\\n\\r\\n\\r\\nIn order to track mailboxes that are currently using POP\\r\\n- Enable POP logging\\r\\n- Set-PopSettings -Server SRV1 -ProtocolLogEnabled verbose\\r\\n- Several weeks later, analyze the log content\\r\\n- Default location : - Get-PopSettings -server SRV1 | fl server,*log*\\r\\n- Check for connection and authentication\\r\\n\",\"style\":\"info\"},\"conditionalVisibility\":{\"parameterName\":\"Help\",\"comparison\":\"isEqualTo\",\"value\":\"Yes\"},\"name\":\"PopServiceHelp\"},{\"type\":3,\"content\":{\"version\":\"KqlItem/1.0\",\"query\":\"ExchangeConfiguration(SpecificSectionList=\\\"PopSettings\\\",SpecificConfigurationDate=\\\"{DateOfConfiguration:value}\\\",SpecificConfigurationEnv={EnvironmentList},Target = \\\"On-Premises\\\")\\r\\n| extend ServerName = tostring(CmdletResultValue.Server.Name)\\r\\n| join kind = leftouter(ExchangeConfiguration(SpecificSectionList=\\\"POPIMAPServicesStatus\\\",SpecificConfigurationDate=\\\"{DateOfConfiguration:value}\\\",SpecificConfigurationEnv={EnvironmentList},Target = \\\"On-Premises\\\")\\r\\n| where CmdletResultValue.Name contains (\\\"MSExchangePop3\\\")\\r\\n| project ServerName= tostring(CmdletResultValue.Server), ServiceName=CmdletResultValue.Name, Status=CmdletResultValue.StatusString,StartupType=CmdletResultValue.StartTypeString\\r\\n| join (ExchangeConfiguration(SpecificSectionList=\\\"POPIMAPServicesStatus\\\",SpecificConfigurationDate=\\\"{DateOfConfiguration:value}\\\",SpecificConfigurationEnv={EnvironmentList},Target = \\\"On-Premises\\\")\\r\\n| where CmdletResultValue.Name contains (\\\"MSExchangePop3BE\\\" )\\r\\n| project ServerName= tostring(CmdletResultValue.Server), ServiceName=CmdletResultValue.Name, Status=CmdletResultValue.StatusString,StartupType=CmdletResultValue.StartTypeString) on ServerName) on ServerName\\r\\n| extend ServerName = tostring(CmdletResultValue.Server.Name)\\r\\n| extend LoginType = iff(CmdletResultValue.LoginType== 1 , \\\"⛔ PlainText, High Risk\\\", iff(CmdletResultValue.LoginType== 2, \\\"⚠️ PlainTextAuthentication\\\",\\\"✅ SecureLogin\\\"))\\r\\n| extend ProtocolLogEnabled = tostring(CmdletResultValue.ProtocolLogEnabled)\\r\\n| extend ServiceName = iff(tostring(ServiceName)==\\\"\\\", \\\"Service Status not retrieved\\\",tostring(ServiceName))\\r\\n| extend Status = tostring(Status)\\r\\n| extend BackendEndService= tostring(ServiceName1)\\r\\n| extend StartupType = tostring(StartupType)\\r\\n| extend BEStatus = tostring(Status1)\\r\\n| extend BEStartupType = tostring(StartupType1)\\r\\n| project ServerName,LoginType,ServiceName,Status,StartupType,BackendEndService,BEStatus,BEStartupType,ProtocolLogEnabled\\r\\n| sort by ServerName asc\",\"size\":1,\"showAnalytics\":true,\"title\":\"Pop Authentication : should not be set as Plaintext\",\"showExportToExcel\":true,\"queryType\":0,\"resourceType\":\"microsoft.operationalinsights/workspaces\",\"gridSettings\":{\"formatters\":[{\"columnMatch\":\"LoginType\",\"formatter\":5},{\"columnMatch\":\"Count\",\"formatter\":0,\"formatOptions\":{\"aggregation\":\"Sum\"}}],\"rowLimit\":10000,\"filter\":true,\"hierarchySettings\":{\"treeType\":1,\"groupBy\":[\"LoginType\"],\"finalBy\":\"LoginType\"}}},\"name\":\"PopSettingsQuery\",\"styleSettings\":{\"showBorder\":true}},{\"type\":1,\"content\":{\"json\":\"### IMAP authentication configuration\"},\"name\":\"IMAPTitle\"},{\"type\":1,\"content\":{\"json\":\"If the IMAP Service is started, the LoginType should not set to Plaintext. This means that the passwords will be sent in clear over the network. As IMAP is enabled by default on all the mailboxes, this is a high security risk.\\r\\n\\r\\nIMAP Authentication\\r\\n- **PlainText** TLS encryption is not required on port 110. User name and password are sent unencrypted unless the underlying connection is encrypted by using TLS or SSL.\\r\\n- **PlainTextAuthentication** TLS encryption is not required on port 143. However, Basic authentication is permitted only on a port that uses TLS or SSL encryption.\\r\\n- **SecureLogin** Connection on port 143 must use TLS encryption before authenticating.\\r\\n\\r\\nℹ️ Recommendations \\r\\nDisable IMAP on all mailboxes except those which needs to use this protocol. Set the authentication to SecureLogin or at least to PlainTextAuthentication and configure the application accordingly.\\r\\n\\r\\nIf the application is not able to perform this type of authentication:\\r\\n- Ensure that IMAP is disable on all the mailboxes except those who really need it \\r\\n- Monitor the connection\\r\\n- Regularly, change the password of the application\\r\\n\\r\\nRecommended Reading : \\r\\n\\r\\nConfiguring Authentication for POP3 and IMAP4\\r\\n\\r\\n Set-IMAPSettings\\r\\n\\r\\n\\r\\n\\r\\nIn order to track mailboxes that are currently using IMAP\\r\\n- Enable IMAP logging\\r\\n- Set-IMAPSettings -Server SRV1 -ProtocolLogEnabled verbose\\r\\n- Several weeks later, analyze the log content\\r\\n- Default location : Get-IMAPSettings -server SRV1 | fl server,*log*\\r\\n- Check for connection and authentication\\r\\n\",\"style\":\"info\"},\"conditionalVisibility\":{\"parameterName\":\"Help\",\"comparison\":\"isEqualTo\",\"value\":\"Yes\"},\"name\":\"IMAPHelp\"},{\"type\":3,\"content\":{\"version\":\"KqlItem/1.0\",\"query\":\"ExchangeConfiguration(SpecificSectionList=\\\"IMAPSettings\\\",SpecificConfigurationDate=\\\"{DateOfConfiguration:value}\\\",SpecificConfigurationEnv={EnvironmentList},Target = \\\"On-Premises\\\")\\r\\n| extend ServerName = tostring(CmdletResultValue.Server.Name)\\r\\n| join kind = leftouter(ExchangeConfiguration(SpecificSectionList=\\\"POPIMAPServicesStatus\\\",SpecificConfigurationDate=\\\"{DateOfConfiguration:value}\\\",SpecificConfigurationEnv={EnvironmentList},Target = \\\"On-Premises\\\")\\r\\n| where CmdletResultValue.Name contains (\\\"MSExchangeIMAP4\\\")\\r\\n| project ServerName= tostring(CmdletResultValue.Server), ServiceName=CmdletResultValue.Name, Status=CmdletResultValue.StatusString,StartupType=CmdletResultValue.StartTypeString\\r\\n| join (ExchangeConfiguration(SpecificSectionList=\\\"POPIMAPServicesStatus\\\",SpecificConfigurationDate=\\\"{DateOfConfiguration:value}\\\",SpecificConfigurationEnv={EnvironmentList},Target = \\\"On-Premises\\\")\\r\\n| where CmdletResultValue.Name contains (\\\"MSExchangeIMAP4BE\\\" )\\r\\n| project ServerName= tostring(CmdletResultValue.Server), ServiceName=CmdletResultValue.Name, Status=CmdletResultValue.StatusString,StartupType=CmdletResultValue.StartTypeString) on ServerName) on ServerName\\r\\n| extend ServerName = tostring(CmdletResultValue.Server.Name)\\r\\n| extend LoginType = iff(CmdletResultValue.LoginType== 1 , \\\"⛔ PlainText, High Risk\\\", iff(CmdletResultValue.LoginType== 2, \\\"⚠️ PlainTextAuthentication\\\",\\\"✅ SecureLogin\\\"))\\r\\n| extend ProtocolLogEnabled = tostring(CmdletResultValue.ProtocolLogEnabled)\\r\\n| extend ServiceName = iff(tostring(ServiceName)==\\\"\\\", \\\"Service Status not retrieved\\\",tostring(ServiceName))\\r\\n| extend Status = tostring(Status)\\r\\n| extend BackendEndService= tostring(ServiceName1)\\r\\n| extend StartupType = tostring(StartupType)\\r\\n| extend BEStatus = tostring(Status1)\\r\\n| extend BEStartupType = tostring(StartupType1)\\r\\n| project ServerName,LoginType,ServiceName,Status,StartupType,BackendEndService,BEStatus,BEStartupType,ProtocolLogEnabled\\r\\n| sort by ServerName asc\",\"size\":1,\"showAnalytics\":true,\"title\":\"IMAP Authentication : should not be set as Plaintext\",\"showExportToExcel\":true,\"queryType\":0,\"resourceType\":\"microsoft.operationalinsights/workspaces\",\"gridSettings\":{\"formatters\":[{\"columnMatch\":\"LoginType\",\"formatter\":5}],\"rowLimit\":10000,\"filter\":true,\"hierarchySettings\":{\"treeType\":1,\"groupBy\":[\"LoginType\"],\"finalBy\":\"LoginType\"}}},\"name\":\"IMAPSettingsQuery\",\"styleSettings\":{\"showBorder\":true}},{\"type\":12,\"content\":{\"version\":\"NotebookGroup/1.0\",\"groupType\":\"editable\",\"title\":\"Nonstandard permissions on Configuration Partitions\",\"items\":[{\"type\":1,\"content\":{\"json\":\"This section highlights nonstandard permissions on Configuration Partition for Exchange container. By selecting Yes for Generic All buttom only delegation set for Generic All will be display. Standard, Deny and inherited permissions have been removed\"},\"name\":\"text - 0\"},{\"type\":1,\"content\":{\"json\":\"During the lifetime of an Exchange Organization, many permissions may have been set on Exchange containers in the Configuration Partition.\\r\\nThis section displayed all the nonstandard permissions found on the most important Exchange containers :\\r\\n - Groups from legacy Exchange versions (Exchange Enterprise Servers, Exchange Domain Servers,...)\\r\\n - SID for deleted accounts\\r\\n - Old service accounts (that may not have been disabled or removed...)\\r\\n \\r\\nWhen an administrator run setup /prepareAD, his account will be granted Generic All at the top-level Exchange container\\r\\n\\r\\nBy default, this section only displayed the Generic All permissions.\\r\\n \\r\\nThis section is built by removing all the standard AD and Exchange groups.\\r\\n\\r\\n Exchange 2013 deployment permissions reference\\r\\n \\r\\n\",\"style\":\"info\"},\"conditionalVisibility\":{\"parameterName\":\"Help\",\"comparison\":\"isEqualTo\",\"value\":\"Yes\"},\"name\":\"text - 3\"},{\"type\":9,\"content\":{\"version\":\"KqlParameterItem/1.0\",\"parameters\":[{\"id\":\"80f9134a-420f-47c9-b171-1ca8e72efa3e\",\"version\":\"KqlParameterItem/1.0\",\"name\":\"GenericAll\",\"type\":10,\"isRequired\":true,\"jsonData\":\"[\\r\\n { \\\"value\\\": \\\"True\\\", \\\"label\\\": \\\"Yes\\\" },\\r\\n { \\\"value\\\": \\\"True,False\\\", \\\"label\\\": \\\"No\\\", \\\"selected\\\":true }\\r\\n]\"},{\"id\":\"29e2005c-3bd4-4bb8-be63-053d11abe1d4\",\"version\":\"KqlParameterItem/1.0\",\"name\":\"NonStandardPermissions\",\"type\":10,\"isRequired\":true,\"typeSettings\":{\"showDefault\":false},\"jsonData\":\"[\\r\\n { \\\"value\\\": \\\"True\\\", \\\"label\\\": \\\"Yes\\\", \\\"selected\\\":true },\\r\\n { \\\"value\\\": \\\"True,False\\\", \\\"label\\\": \\\"No\\\"}\\r\\n]\"}],\"style\":\"pills\",\"queryType\":0,\"resourceType\":\"microsoft.operationalinsights/workspaces\"},\"name\":\"parameters - 1\"},{\"type\":3,\"content\":{\"version\":\"KqlItem/1.0\",\"query\":\"let StandardGroup = dynamic([\\\"Authenticated Users\\\", \\\"Domain Admins\\\", \\\"Enterprise Admins\\\",\\\"Schema Admins\\\", \\\"Exchange Trusted Subsystem\\\", \\\"Exchange Servers\\\",\\\"Organization Management\\\", \\\"Public Folder Management\\\",\\\"Delegated Setup\\\", \\\"ANONYMOUS LOGON\\\", \\\"NETWORK SERVICE\\\", \\\"SYSTEM\\\", \\\"Everyone\\\",\\\"Managed Availability Servers\\\"]);\\r\\nlet Exchsrv =ExchangeConfiguration(SpecificSectionList=\\\"ExchangeServers\\\",SpecificConfigurationDate=\\\"{DateOfConfiguration:value}\\\",SpecificConfigurationEnv={EnvironmentList},Target = \\\"On-Premises\\\")| summarize make_list(CmdletResultValue.Name);\\r\\nExchangeConfiguration(SpecificSectionList=\\\"PartConfPerm\\\",SpecificConfigurationDate=\\\"{DateOfConfiguration:value}\\\",SpecificConfigurationEnv={EnvironmentList},Target = \\\"On-Premises\\\")\\r\\n| project CmdletResultValue\\r\\n| where CmdletResultValue.Deny !contains \\\"True\\\" and CmdletResultValue.IsInherited !contains \\\"True\\\"\\r\\n| where (CmdletResultValue.AccessRights == \\\"[983551]\\\") in ({GenericAll})\\r\\n| where not (CmdletResultValue.UserString has_any (StandardGroup)) in ({NonStandardPermissions})\\r\\n| where not (CmdletResultValue.UserString has_any (Exchsrv))in ({NonStandardPermissions})\\r\\n| extend Name = tostring(CmdletResultValue.Identity.Name)\\r\\n| extend Account = tostring(CmdletResultValue.UserString )\\r\\n| extend AccessRights = iff (tostring(CmdletResultValue.AccessRightsString) contains \\\"GenericAll\\\", strcat (\\\"❌ \\\",tostring(CmdletResultValue.AccessRightsString)), tostring(CmdletResultValue.AccessRightsString))\\r\\n| extend ExtendedRights = iff (tostring(CmdletResultValue.ExtendedRightsString) contains \\\"-As\\\", strcat (\\\"❌ \\\",tostring(CmdletResultValue.ExtendedRightsString)), tostring(CmdletResultValue.ExtendedRightsString))\\r\\n| extend InheritanceType = tostring(CmdletResultValue.InheritanceType)\\r\\n| extend DN = tostring(CmdletResultValue.Identity.DistinguishedName)\\r\\n| project-away CmdletResultValue\\r\\n| sort by DN desc\",\"size\":1,\"showAnalytics\":true,\"showExportToExcel\":true,\"queryType\":0,\"resourceType\":\"microsoft.operationalinsights/workspaces\",\"gridSettings\":{\"rowLimit\":10000,\"filter\":true,\"sortBy\":[{\"itemKey\":\"AccessRights\",\"sortOrder\":1}]},\"sortBy\":[{\"itemKey\":\"AccessRights\",\"sortOrder\":1}]},\"name\":\"query - 2\",\"styleSettings\":{\"showBorder\":true}}]},\"name\":\"Nonstandard permissions on Configuration Partitions\"}]},\"conditionalVisibility\":{\"parameterName\":\"selected\",\"comparison\":\"isEqualTo\",\"value\":\"SecConf\"},\"name\":\"Security Configuration for the Exchange environment\"},{\"type\":12,\"content\":{\"version\":\"NotebookGroup/1.0\",\"groupType\":\"editable\",\"items\":[{\"type\":1,\"content\":{\"json\":\"This tab displays important security configurations that allow access to all or partial mailboxes' content - Direct delegations are not listed - Example :
\\r\\n- Permissions Full Access \\r\\n- Permission on mailboxes folders\\r\\n\"},\"name\":\"text - 6\"},{\"type\":3,\"content\":{\"version\":\"KqlItem/1.0\",\"query\":\"ExchangeConfiguration(SpecificSectionList=\\\"MRA\\\",SpecificConfigurationDate=\\\"{DateOfConfiguration:value}\\\",SpecificConfigurationEnv={EnvironmentList})\\r\\n//| where CmdletResultValue.Name !contains \\\"Deleg\\\" and CmdletResultValue.RoleAssigneeName != \\\"Hygiene Management\\\" and CmdletResultValue.RoleAssigneeName != \\\"Exchange Online-ApplicationAccount\\\" and CmdletResultValue.RoleAssigneeName != \\\"Discovery Management\\\"\\r\\n| where CmdletResultValue.Name !contains \\\"Deleg\\\" \\r\\n| where CmdletResultValue.RoleAssigneeName !in (\\\"Hygiene Management\\\",\\\"Exchange Online-ApplicationAccount\\\",\\\"Discovery Management\\\")\\r\\n| where CmdletResultValue.Role.Name contains \\\"Export\\\" or CmdletResultValue.Role.Name contains \\\"Impersonation\\\" or (CmdletResultValue.Role.Name contains \\\"Search\\\" and CmdletResultValue.Role.Name !contains \\\"MailboxSearchApplication\\\")\\r\\n| summarize dcount(tostring(CmdletResultValue.RoleAssigneeName)) by role=tostring(CmdletResultValue.Role.Name)\",\"size\":1,\"showAnalytics\":true,\"title\":\"Number of delegations for sensitive RBAC roles\",\"showExportToExcel\":true,\"queryType\":0,\"resourceType\":\"microsoft.operationalinsights/workspaces\",\"visualization\":\"tiles\",\"tileSettings\":{\"titleContent\":{\"columnMatch\":\"role\",\"formatter\":1},\"leftContent\":{\"columnMatch\":\"dcount_CmdletResultValue_RoleAssigneeName\",\"formatter\":12,\"formatOptions\":{\"palette\":\"auto\"},\"numberFormat\":{\"unit\":17,\"options\":{\"style\":\"decimal\",\"maximumFractionDigits\":2,\"maximumSignificantDigits\":3}}},\"showBorder\":true,\"sortCriteriaField\":\"role\",\"sortOrderField\":1}},\"name\":\"MRAQuery\"},{\"type\":12,\"content\":{\"version\":\"NotebookGroup/1.0\",\"groupType\":\"editable\",\"title\":\"Application Impersonation Role\",\"items\":[{\"type\":1,\"content\":{\"json\":\"This delegation allows the delegated account to access and modify the content of every mailboxes using EWS.\"},\"name\":\"text - 0\"},{\"type\":1,\"content\":{\"json\":\"**ApplicationImpersonation** is a RBAC role that allows access (read and modify) to the content of all mailboxes using EWS. \\r\\n\\r\\n⚡ This role is very powerfull.\\r\\n\\r\\nIt should be carefully delegated. When a delegation is necessary, RBAC scopes should be configured to limit the list of impacted mailboxes.\\r\\n\\r\\nHelp for the role Application Impersonation\\r\\n\\r\\nIt is common (but not recommended) to see service accounts from backup solution, antivirus software, MDM... with this delegation.\\r\\n\\r\\nNote that the default configuration to the group Hygiene Management is excluded. This group is a sensitive group. Remember to monitor the content of this group.\",\"style\":\"info\"},\"conditionalVisibility\":{\"parameterName\":\"Help\",\"comparison\":\"isEqualTo\",\"value\":\"Yes\"},\"name\":\"text - 2\"},{\"type\":3,\"content\":{\"version\":\"KqlItem/1.0\",\"query\":\"ExchangeConfiguration(SpecificSectionList=\\\"MRA\\\",SpecificConfigurationDate=\\\"{DateOfConfiguration:value}\\\",SpecificConfigurationEnv={EnvironmentList})\\r\\n| where CmdletResultValue.Role.Name contains \\\"Impersonation\\\" and CmdletResultValue.RoleAssigneeName != \\\"Hygiene Management\\\" and CmdletResultValue.Name !contains \\\"Deleg\\\"\\r\\n//| extend RoleAssigneeName = tostring(CmdletResultValue.RoleAssigneeName)\\r\\n| extend RoleAssigneeType = case(CmdletResultValue.RoleAssigneeType== \\\"0\\\" or CmdletResultValue.RoleAssigneeType== \\\"2\\\" , \\\"User\\\", CmdletResultValue.RoleAssigneeType== \\\"10\\\",\\\"Group\\\",\\\"LinkedGroup\\\")\\r\\n| extend CustomRecipientWriteScope = tostring(CmdletResultValue.CustomRecipientWriteScope.Name)\\r\\n| extend CustomConfigWriteScope = tostring(CmdletResultValue.CustomConfigWriteScope.Name)\\r\\n| extend RecipientWriteScope = case(CmdletResultValue.RecipientWriteScope==\\\"0\\\",\\\"None\\\",CmdletResultValue.RecipientWriteScope==\\\"2\\\",\\\"Organization\\\",CmdletResultValue.RecipientWriteScope==\\\"3\\\",\\\"MyGAL\\\", CmdletResultValue.RecipientWriteScope==\\\"4\\\",\\\"Self\\\",CmdletResultValue.RecipientWriteScope==\\\"7\\\", \\\"CustomRecipientScope\\\",CmdletResultValue.RecipientWriteScope==\\\"8\\\",\\\"MyDistributionGroups\\\",\\\"NotApplicable\\\")\\r\\n| extend ConfigWriteScope = case(CmdletResultValue.ConfigWriteScope==\\\"0\\\",\\\"None\\\",CmdletResultValue.ConfigWriteScope==\\\"7\\\",\\\"CustomConfigScope\\\",CmdletResultValue.ConfigWriteScope==\\\"10\\\",\\\"OrganizationConfig\\\",\\\"NotApplicable\\\")\\r\\n| extend ConfigReadScope = iff(CmdletResultValue.ConfigReadScope == \\\"0\\\" , \\\"None\\\", \\\"OrganizationConfig\\\")\\r\\n| extend RecipientReadScope = case(CmdletResultValue.RecipientReadScope==\\\"2\\\",\\\"Organization\\\",CmdletResultValue.RecipientReadScope==\\\"3\\\",\\\"MyGAL\\\",CmdletResultValue.RecipientReadScope==\\\"4\\\",\\\"Self\\\",\\\"NotApplicable\\\")\\r\\n| extend ManagementRoleAssignement = tostring(CmdletResultValue.Name)\\r\\n| extend Status= tostring(CmdletResultValue.Enabled)\\r\\n| extend RoleAssignmentDelegationType = iff(CmdletResultValue.RoleAssignmentDelegationType ==\\\"6\\\" , \\\"Delegating\\\", \\\"Regular\\\") \\r\\n| extend RoleAssigneeName = iff( RoleAssigneeType == \\\"User\\\", strcat(\\\"🧑‍🦰 \\\",tostring(CmdletResultValue.RoleAssigneeName)), strcat(\\\"👪 \\\", tostring(CmdletResultValue.RoleAssigneeName)) )\\r\\n| project RoleAssigneeName, RoleAssigneeType, Status,CustomRecipientWriteScope, CustomConfigWriteScope, RecipientWriteScope, ConfigWriteScope, ConfigReadScope, RecipientReadScope, ManagementRoleAssignement, RoleAssignmentDelegationType, WhenCreated, WhenChanged\",\"size\":1,\"showAnalytics\":true,\"showExportToExcel\":true,\"queryType\":0,\"resourceType\":\"microsoft.operationalinsights/workspaces\",\"gridSettings\":{\"rowLimit\":10000,\"filter\":true}},\"name\":\"query - 1\",\"styleSettings\":{\"showBorder\":true}}]},\"name\":\"Application Impersonation Role\"},{\"type\":12,\"content\":{\"version\":\"NotebookGroup/1.0\",\"groupType\":\"editable\",\"title\":\"Mailbox Import Export Role\",\"items\":[{\"type\":1,\"content\":{\"json\":\"This delegation allows to export the content all mailboxes in a scope in PST file.\\r\\nExcluded from the result as default configuration :\\r\\nDelegating delegation to Organization Management\\r\\n\"},\"name\":\"text - 0\"},{\"type\":1,\"content\":{\"json\":\"**Mailbox Import Export** is a RBAC role that allows an account to export the content of any maibox in a PST. It also allows search in all mailboxes.\\r\\n\\r\\n⚡ This role is very powerfull.\\r\\n\\r\\nBy default, this role is not delegated to any user or group. The members of the group Organization Management by default do not have this role but are able to delegate it.\\r\\n\\r\\nHelp for the role Mailbox Import Export\\r\\n\\r\\nℹ️ Recommendations\\r\\n\\r\\nIf you temporarily need this delegation, consider the following:\\r\\n- create an empty group with this delegation\\r\\n- monitor the group content and alert when the group modified\\r\\n- add administrators in this group only for a short period of time.\\r\\n\",\"style\":\"info\"},\"conditionalVisibility\":{\"parameterName\":\"Help\",\"comparison\":\"isEqualTo\",\"value\":\"Yes\"},\"name\":\"ExportRoleHelp\"},{\"type\":3,\"content\":{\"version\":\"KqlItem/1.0\",\"query\":\"ExchangeConfiguration(SpecificSectionList=\\\"MRA\\\",SpecificConfigurationDate=\\\"{DateOfConfiguration:value}\\\",SpecificConfigurationEnv={EnvironmentList},Target = \\\"On-Premises\\\")\\r\\n| where CmdletResultValue.Role.Name contains \\\"export\\\" and CmdletResultValue.Name !contains \\\"Deleg\\\"\\r\\n| extend RoleAssigneeType = case(CmdletResultValue.RoleAssigneeType== \\\"0\\\" or CmdletResultValue.RoleAssigneeType== \\\"2\\\" , \\\"User\\\", CmdletResultValue.RoleAssigneeType== \\\"10\\\",\\\"Group\\\",\\\"LinkedGroup\\\")\\r\\n| extend CustomRecipientWriteScope = tostring(CmdletResultValue.CustomRecipientWriteScope.Name)\\r\\n| extend CustomConfigWriteScope = tostring(CmdletResultValue.CustomConfigWriteScope.Name)\\r\\n| extend RecipientWriteScope = case(CmdletResultValue.RecipientWriteScope==\\\"0\\\",\\\"None\\\",CmdletResultValue.RecipientWriteScope==\\\"2\\\",\\\"Organization\\\",CmdletResultValue.RecipientWriteScope==\\\"3\\\",\\\"MyGAL\\\", CmdletResultValue.RecipientWriteScope==\\\"4\\\",\\\"Self\\\",CmdletResultValue.RecipientWriteScope==\\\"7\\\", \\\"CustomRecipientScope\\\",CmdletResultValue.RecipientWriteScope==\\\"8\\\",\\\"MyDistributionGroups\\\",\\\"NotApplicable\\\")\\r\\n| extend ConfigWriteScope = case(CmdletResultValue.ConfigWriteScope==\\\"0\\\",\\\"None\\\",CmdletResultValue.ConfigWriteScope==\\\"7\\\",\\\"CustomConfigScope\\\",CmdletResultValue.ConfigWriteScope==\\\"10\\\",\\\"OrganizationConfig\\\",\\\"NotApplicable\\\")\\r\\n| extend ConfigReadScope = iff(CmdletResultValue.ConfigReadScope == \\\"0\\\" , \\\"None\\\", \\\"OrganizationConfig\\\")\\r\\n| extend RecipientReadScope = case(CmdletResultValue.RecipientReadScope==\\\"2\\\",\\\"Organization\\\",CmdletResultValue.RecipientReadScope==\\\"3\\\",\\\"MyGAL\\\",CmdletResultValue.RecipientReadScope==\\\"4\\\",\\\"Self\\\",\\\"NotApplicable\\\")\\r\\n| extend ManagementRoleAssignement = tostring(CmdletResultValue.Name)\\r\\n| extend Status= tostring(CmdletResultValue.Enabled)\\r\\n| extend RoleAssignmentDelegationType = iff(CmdletResultValue.RoleAssignmentDelegationType ==\\\"6\\\" , \\\"Delegating\\\", \\\"Regular\\\") \\r\\n| extend RoleAssigneeName = iff( RoleAssigneeType == \\\"User\\\", strcat(\\\"🧑‍🦰 \\\",tostring(CmdletResultValue.RoleAssigneeName)), strcat(\\\"👪 \\\", tostring(CmdletResultValue.RoleAssigneeName)) )\\r\\n| project RoleAssigneeName, RoleAssigneeType,Status, CustomRecipientWriteScope, CustomConfigWriteScope, RecipientWriteScope, ConfigWriteScope, ConfigReadScope, RecipientReadScope, ManagementRoleAssignement, RoleAssignmentDelegationType, WhenCreated, WhenChanged\",\"size\":1,\"showAnalytics\":true,\"showExportToExcel\":true,\"queryType\":0,\"resourceType\":\"microsoft.operationalinsights/workspaces\",\"gridSettings\":{\"rowLimit\":10000,\"filter\":true,\"sortBy\":[{\"itemKey\":\"ConfigWriteScope\",\"sortOrder\":1}]},\"sortBy\":[{\"itemKey\":\"ConfigWriteScope\",\"sortOrder\":1}]},\"name\":\"query - 1\",\"styleSettings\":{\"showBorder\":true}}]},\"name\":\"Mailbox Import Export Role\"},{\"type\":12,\"content\":{\"version\":\"NotebookGroup/1.0\",\"groupType\":\"editable\",\"title\":\"Mailbox Search Role\",\"items\":[{\"type\":1,\"content\":{\"json\":\"This delegation allows to search inside all or in a scope of mailboxes and export the result in PST.\\r\\nExcluded from the result as default configuration :\\r\\nDelegating delegation to Organization Management\\r\\nExchange Online-ApplicationAccount\\r\\nDiscovery Management has been excluded\\r\\n\"},\"name\":\"text - 0\"},{\"type\":1,\"content\":{\"json\":\"**Mailbox Search** is an RBAC role that allows an account to search in any mailbox and export the results to a PST.\\r\\n\\r\\n⚡ This role is very powerful.\\r\\n\\r\\nBy default, this role is only delegated to the group Discovery Management. The members of the group Organization Management do not have this role but are able to delegate it.\\r\\n\\r\\nHelp for the role Mailbox Search\\r\\n\\r\\nℹ️ Recommendations\\r\\n\\r\\nIf you temporarily need this delegation, consider the following:\\r\\n\\r\\n- add the administrators in the Discovery Management group\\r\\n- monitor the group content and alert when the group modified\\r\\n- add administrators in this group only for a short period of time\\r\\n\",\"style\":\"info\"},\"conditionalVisibility\":{\"parameterName\":\"Help\",\"comparison\":\"isEqualTo\",\"value\":\"Yes\"},\"name\":\"SearchRBACHelp\"},{\"type\":3,\"content\":{\"version\":\"KqlItem/1.0\",\"query\":\"ExchangeConfiguration(SpecificSectionList=\\\"MRA\\\",SpecificConfigurationDate=\\\"{DateOfConfiguration:value}\\\",SpecificConfigurationEnv={EnvironmentList},Target = \\\"On-Premises\\\")\\r\\n| where CmdletResultValue.Role.Name contains \\\"search\\\" and CmdletResultValue.Name !contains \\\"Deleg\\\"\\r\\n| where CmdletResultValue.RoleAssigneeName != \\\"Exchange Online-ApplicationAccount\\\" and CmdletResultValue.RoleAssigneeName != \\\"Discovery Management\\\"\\r\\n| extend RoleAssigneeType = case(CmdletResultValue.RoleAssigneeType== \\\"0\\\" or CmdletResultValue.RoleAssigneeType== \\\"2\\\" , \\\"User\\\", CmdletResultValue.RoleAssigneeType== \\\"10\\\",\\\"Group\\\",\\\"LinkedGroup\\\")\\r\\n| extend CustomRecipientWriteScope = tostring(CmdletResultValue.CustomRecipientWriteScope.Name)\\r\\n| extend CustomConfigWriteScope = tostring(CmdletResultValue.CustomConfigWriteScope.Name)\\r\\n| extend RecipientWriteScope = case(CmdletResultValue.RecipientWriteScope==\\\"0\\\",\\\"None\\\",CmdletResultValue.RecipientWriteScope==\\\"2\\\",\\\"Organization\\\",CmdletResultValue.RecipientWriteScope==\\\"3\\\",\\\"MyGAL\\\", CmdletResultValue.RecipientWriteScope==\\\"4\\\",\\\"Self\\\",CmdletResultValue.RecipientWriteScope==\\\"7\\\", \\\"CustomRecipientScope\\\",CmdletResultValue.RecipientWriteScope==\\\"8\\\",\\\"MyDistributionGroups\\\",\\\"NotApplicable\\\")\\r\\n| extend ConfigWriteScope = case(CmdletResultValue.ConfigWriteScope==\\\"0\\\",\\\"None\\\",CmdletResultValue.ConfigWriteScope==\\\"7\\\",\\\"CustomConfigScope\\\",CmdletResultValue.ConfigWriteScope==\\\"10\\\",\\\"OrganizationConfig\\\",\\\"NotApplicable\\\")\\r\\n| extend ConfigReadScope = iff(CmdletResultValue.ConfigReadScope == \\\"0\\\" , \\\"None\\\", \\\"OrganizationConfig\\\")\\r\\n| extend RecipientReadScope = case(CmdletResultValue.RecipientReadScope==\\\"2\\\",\\\"Organization\\\",CmdletResultValue.RecipientReadScope==\\\"3\\\",\\\"MyGAL\\\",CmdletResultValue.RecipientReadScope==\\\"4\\\",\\\"Self\\\",\\\"NotApplicable\\\")\\r\\n| extend ManagementRoleAssignement = tostring(CmdletResultValue.Name)\\r\\n| extend Status= tostring(CmdletResultValue.Enabled)\\r\\n| extend RoleAssignmentDelegationType = iff(CmdletResultValue.RoleAssignmentDelegationType ==\\\"6\\\" , \\\"Delegating\\\", \\\"Regular\\\") \\r\\n| extend RoleAssigneeName = iff( RoleAssigneeType == \\\"User\\\", strcat(\\\"🧑‍🦰 \\\",tostring(CmdletResultValue.RoleAssigneeName)), strcat(\\\"👪 \\\", tostring(CmdletResultValue.RoleAssigneeName)) )\\r\\n| project RoleAssigneeName, RoleAssigneeType, Status,CustomRecipientWriteScope, CustomConfigWriteScope, RecipientWriteScope, ConfigWriteScope, ConfigReadScope, RecipientReadScope, ManagementRoleAssignement, RoleAssignmentDelegationType, WhenCreated, WhenChanged\",\"size\":1,\"showAnalytics\":true,\"showExportToExcel\":true,\"queryType\":0,\"resourceType\":\"microsoft.operationalinsights/workspaces\",\"gridSettings\":{\"rowLimit\":10000,\"filter\":true,\"sortBy\":[{\"itemKey\":\"ConfigWriteScope\",\"sortOrder\":1}]},\"sortBy\":[{\"itemKey\":\"ConfigWriteScope\",\"sortOrder\":1}]},\"name\":\"query - 1\",\"styleSettings\":{\"showBorder\":true}}]},\"name\":\"Mailbox Search Role\"},{\"type\":12,\"content\":{\"version\":\"NotebookGroup/1.0\",\"groupType\":\"editable\",\"title\":\"ReceiveAs/SendAs Extended Right on databases\",\"items\":[{\"type\":1,\"content\":{\"json\":\"These are delegations at the database level.\\r\\n\\r\\n**Receive As Extended Right on database's objects in the Configuration**\\r\\n\\r\\nWhen an account has **ReceiveAs** permissions on a database's object, it can open and view the content of any mailboxes on that database.\\r\\n\\r\\nHelp for Receive As Permission\\r\\n\\r\\n\\r\\nℹ️ Recommendations\\r\\n\\r\\nDo not set this permission on databases. When an application requires this permission, ensure that the application account’s password is well protected and known by a very limited number of person.Change the password as often as possible.\\r\\n\\r\\n**Send As Extended Right on database objects in the Configuration**\\r\\n\\r\\n\\r\\nWhen an account has **SendAs** permissions on a database's object, it can send messages from all the mailboxes contained in this database. The messages that are sent from a mailbox will appear as if the mailbox owner sent them.\\r\\n\\r\\nHelp for Send As Permission\\r\\n\\r\\n\\r\\nℹ️ Recommendations\\r\\n\\r\\nDo not set this permission on databases. When an application requires this permission, ensure that the application account’s password is well protected and known by a very limited number of person.Change the password as often as possible.\\r\\n\",\"style\":\"info\"},\"conditionalVisibility\":{\"parameterName\":\"Help\",\"comparison\":\"isEqualTo\",\"value\":\"Yes\"},\"name\":\"SendAsHelp\"},{\"type\":3,\"content\":{\"version\":\"KqlItem/1.0\",\"query\":\"ExchangeConfiguration(SpecificSectionList=\\\"MailboxDatabaseReceiveAs\\\",SpecificConfigurationDate=\\\"{DateOfConfiguration:value}\\\",SpecificConfigurationEnv={EnvironmentList},Target = \\\"On-Premises\\\")\\r\\n| union ExchangeConfiguration(SpecificSectionList=\\\"MailboxDatabaseSendAs\\\",SpecificConfigurationDate=\\\"{DateOfConfiguration:value}\\\",SpecificConfigurationEnv={EnvironmentList},Target = \\\"On-Premises\\\")\\r\\n| where CmdletResultValue <> \\\"{'Error':'EmptyResult'}\\\"\\r\\n| summarize dcount(tostring(CmdletResultValue.UserString)) by iff( tostring(Section) contains \\\"MailboxDatabaseReceiveAs\\\",\\\"ReceiveAs Unique Acct\\\",\\\"SendAs Unique Acct\\\")\",\"size\":1,\"showAnalytics\":true,\"title\":\"Number of accounts with ReceiveAs/SendAs delegations\",\"showExportToExcel\":true,\"queryType\":0,\"resourceType\":\"microsoft.operationalinsights/workspaces\",\"visualization\":\"tiles\",\"tileSettings\":{\"titleContent\":{\"columnMatch\":\"Column1\",\"formatter\":1},\"leftContent\":{\"columnMatch\":\"dcount_CmdletResultValue_UserString\",\"formatter\":12,\"formatOptions\":{\"palette\":\"auto\"},\"numberFormat\":{\"unit\":17,\"options\":{\"style\":\"decimal\",\"maximumFractionDigits\":2,\"maximumSignificantDigits\":3}}},\"showBorder\":true,\"sortCriteriaField\":\"Column1\",\"sortOrderField\":1}},\"customWidth\":\"50\",\"name\":\"ReceiveAsUsersTiles\"},{\"type\":3,\"content\":{\"version\":\"KqlItem/1.0\",\"query\":\"ExchangeConfiguration(SpecificSectionList=\\\"MailboxDatabaseReceiveAs\\\",SpecificConfigurationDate=\\\"{DateOfConfiguration:value}\\\",SpecificConfigurationEnv={EnvironmentList},Target = \\\"On-Premises\\\")\\r\\n| union ExchangeConfiguration(SpecificSectionList=\\\"MailboxDatabaseSendAs\\\",SpecificConfigurationDate=\\\"{DateOfConfiguration:value}\\\",SpecificConfigurationEnv={EnvironmentList},Target = \\\"On-Premises\\\")\\r\\n| where CmdletResultValue <> \\\"{'Error':'EmptyResult'}\\\"\\r\\n| summarize dcount(tostring(CmdletResultValue.Identity.Name)) by iff( tostring(Section) contains \\\"MailboxDatabaseReceiveAs\\\",\\\"ReceiveAs Unique DB\\\",\\\"SendAs Unique DB\\\")\",\"size\":1,\"showAnalytics\":true,\"title\":\"ReceiveAs/SendAs database delegations\",\"color\":\"purple\",\"showExportToExcel\":true,\"queryType\":0,\"resourceType\":\"microsoft.operationalinsights/workspaces\",\"visualization\":\"tiles\",\"tileSettings\":{\"titleContent\":{\"columnMatch\":\"Column1\",\"formatter\":1},\"leftContent\":{\"columnMatch\":\"dcount_CmdletResultValue_Identity_Name\",\"formatter\":12,\"formatOptions\":{\"palette\":\"auto\"},\"numberFormat\":{\"unit\":17,\"options\":{\"style\":\"decimal\",\"maximumFractionDigits\":2,\"maximumSignificantDigits\":3}}},\"showBorder\":true,\"sortCriteriaField\":\"Column1\",\"sortOrderField\":1}},\"customWidth\":\"50\",\"name\":\"ReceiveAsTiles\",\"styleSettings\":{\"margin\":\"25\"}},{\"type\":3,\"content\":{\"version\":\"KqlItem/1.0\",\"query\":\"ExchangeConfiguration(SpecificSectionList=\\\"MailboxDatabaseReceiveAs\\\",SpecificConfigurationDate=\\\"{DateOfConfiguration:value}\\\",SpecificConfigurationEnv={EnvironmentList},Target = \\\"On-Premises\\\")\\r\\n| project CmdletResultValue\\r\\n| where CmdletResultValue <> \\\"{'Error':'EmptyResult'}\\\"\\r\\n| extend Account = tostring(CmdletResultValue.UserString)\\r\\n| extend DatabaseName = tostring(CmdletResultValue.Identity.Name)\\r\\n| summarize Count =count() by Account,DatabaseName\\r\\n| project Account,Count,DatabaseName\\r\\n\",\"size\":1,\"showAnalytics\":true,\"title\":\"ReceiveAs Extended Right on databases\",\"noDataMessage\":\"No Receive-As delegation\",\"noDataMessageStyle\":3,\"showExportToExcel\":true,\"queryType\":0,\"resourceType\":\"microsoft.operationalinsights/workspaces\",\"gridSettings\":{\"formatters\":[{\"columnMatch\":\"Account\",\"formatter\":5},{\"columnMatch\":\"Count\",\"formatter\":8,\"formatOptions\":{\"palette\":\"blue\",\"aggregation\":\"Sum\"}}],\"rowLimit\":10000,\"filter\":true,\"hierarchySettings\":{\"treeType\":1,\"groupBy\":[\"Account\"],\"finalBy\":\"Account\"},\"sortBy\":[{\"itemKey\":\"$gen_count_$gen_group_0\",\"sortOrder\":1}],\"labelSettings\":[{\"columnId\":\"Account\",\"comment\":\"Account and the number of databases on which it has delegation \"}]},\"sortBy\":[{\"itemKey\":\"$gen_count_$gen_group_0\",\"sortOrder\":1}]},\"customWidth\":\"50\",\"name\":\"MailboxDatabaseReceiveAsGrid\",\"styleSettings\":{\"showBorder\":true}},{\"type\":3,\"content\":{\"version\":\"KqlItem/1.0\",\"query\":\"ExchangeConfiguration(SpecificSectionList=\\\"MailboxDatabaseSendAs\\\",SpecificConfigurationDate=\\\"{DateOfConfiguration:value}\\\",SpecificConfigurationEnv={EnvironmentList},Target = \\\"On-Premises\\\")\\r\\n| project CmdletResultValue\\r\\n| where CmdletResultValue <> \\\"{'Error':'EmptyResult'}\\\"\\r\\n| extend Account = tostring(CmdletResultValue.UserString)\\r\\n| extend DatabaseName = tostring(CmdletResultValue.Identity.Name)\\r\\n| summarize Count =count() by Account, DatabaseName\\r\\n| project Account, Count, DatabaseName\",\"size\":1,\"showAnalytics\":true,\"title\":\"SendAs Extended Right on databases\",\"noDataMessage\":\"No Send-As delegation\",\"noDataMessageStyle\":3,\"showExportToExcel\":true,\"queryType\":0,\"resourceType\":\"microsoft.operationalinsights/workspaces\",\"gridSettings\":{\"formatters\":[{\"columnMatch\":\"Account\",\"formatter\":5},{\"columnMatch\":\"Count\",\"formatter\":8,\"formatOptions\":{\"palette\":\"blue\",\"aggregation\":\"Sum\",\"compositeBarSettings\":{\"labelText\":\"\"}}}],\"rowLimit\":10000,\"filter\":true,\"hierarchySettings\":{\"treeType\":1,\"groupBy\":[\"Account\"],\"finalBy\":\"Account\"},\"labelSettings\":[{\"columnId\":\"Account\",\"comment\":\"Account and the number of databases on which it has delegation \"}]}},\"customWidth\":\"50\",\"name\":\"MailboxDatabaseSendAsGrid\",\"styleSettings\":{\"showBorder\":true}}]},\"name\":\"ReceiveSendAs\"}]},\"conditionalVisibility\":{\"parameterName\":\"selected\",\"comparison\":\"isEqualTo\",\"value\":\"Delegation\"},\"name\":\"Importantsecurityconfiguration\"},{\"type\":12,\"content\":{\"version\":\"NotebookGroup/1.0\",\"groupType\":\"editable\",\"title\":\"Local Administrators\",\"items\":[{\"type\":1,\"content\":{\"json\":\"The following section will display the content of the local Administrators group for each server\\r\\n\\r\\n** When content refer to groups from other forests, none or partial information will be displayed and the number of Administrators may be inconsistent. **\\r\\n\\r\\nMost of the sections display the same information but with differents sorting, displays...\"},\"name\":\"text - 12\"},{\"type\":1,\"content\":{\"json\":\"Only Exchange administrators should be members of the local Administrators group of Exchange servers.\\r\\n\\r\\nYou need to review the content of the local Administrators group on a regular basis.\\r\\n\\r\\nIt is considered a high security risk to have a discrepancy of members between the servers. \\r\\n\\r\\nIt is not recommended to have more than one local administrator accounts. Furthermore, the password should be unique on each server and regularly changed. A solution like LAPS could be used to manage the local administrator password.\\r\\n\\r\\nOnly Exchange administrators should be able to logon on Exchange servers.\\r\\n\\r\\nHere the default content of the local Administrators group for an Exchange server \\r\\n:\\r\\n- Administrator (this account can be renamed)\\r\\n- Domain Admins\\r\\n- Exchange Trusted Subsystem\\r\\n- Organization Management\\r\\n\\r\\n**Service accounts should not be members of the local Administrators group**. If it is necessary, you need to ensure that the account is dedicated to Exchange. If the service account opens sessions on other servers, it can be used for lateral movements. \\r\\n\",\"style\":\"info\"},\"conditionalVisibility\":{\"parameterName\":\"Help\",\"comparison\":\"isEqualTo\",\"value\":\"Yes\"},\"name\":\"LocalAdminsHelp\"},{\"type\":9,\"content\":{\"version\":\"KqlParameterItem/1.0\",\"parameters\":[{\"id\":\"dfffbaa4-5888-41c2-b039-dafb6110260c\",\"version\":\"KqlParameterItem/1.0\",\"name\":\"Limited\",\"type\":10,\"isRequired\":true,\"typeSettings\":{\"showDefault\":false},\"jsonData\":\"[{ \\\"value\\\": \\\"True\\\", \\\"label\\\": \\\"Yes\\\" },\\r\\n { \\\"value\\\": \\\"True,False\\\", \\\"label\\\": \\\"No\\\", \\\"selected\\\":true }\\r\\n]\"}],\"style\":\"pills\",\"queryType\":0,\"resourceType\":\"microsoft.operationalinsights/workspaces\"},\"name\":\"parameters - 7\"},{\"type\":1,\"content\":{\"json\":\"**Top 10 servers with high number of unique local Administrators members**\"},\"name\":\"text - 13\"},{\"type\":3,\"content\":{\"version\":\"KqlItem/1.0\",\"query\":\"let StandardGroup = dynamic([\\\"Administrator\\\", \\\"Domain Admins\\\",\\\"Exchange Trusted Subsystem\\\",\\\"Organization Management\\\", \\\"Admins du domaine\\\"]);\\r\\nExchangeConfiguration(SpecificSectionList=\\\"LocalAminGroup\\\",SpecificConfigurationDate=\\\"{DateOfConfiguration:value}\\\",SpecificConfigurationEnv={EnvironmentList},Target = \\\"On-Premises\\\")\\r\\n| where CmdletResultValue.Level != 0\\r\\n| where not (CmdletResultValue.MemberPath has_any (StandardGroup)) in ({Limited})\\r\\n| project CmdletResultValue\\r\\n| extend Parentgroup = trim_end(@'\\\\\\\\Local Administrators',tostring(CmdletResultValue.Parentgroup))\\r\\n| extend MemberPath = tostring(CmdletResultValue.MemberPath)\\r\\n| extend ObjectClass = tostring(CmdletResultValue.ObjectClass)\\r\\n| where ObjectClass !contains \\\"group\\\"\\r\\n| summarize dcount(MemberPath) by Parentgroup\\r\\n| top 10 by dcount_MemberPath\\r\\n| sort by dcount_MemberPath\",\"size\":4,\"queryType\":0,\"resourceType\":\"microsoft.operationalinsights/workspaces\",\"visualization\":\"tiles\",\"tileSettings\":{\"titleContent\":{\"columnMatch\":\"Parentgroup\",\"formatter\":1},\"leftContent\":{\"columnMatch\":\"dcount_MemberPath\",\"formatter\":12,\"formatOptions\":{\"palette\":\"auto\"},\"numberFormat\":{\"unit\":17,\"options\":{\"style\":\"decimal\",\"maximumFractionDigits\":2,\"maximumSignificantDigits\":3}}},\"showBorder\":false}},\"name\":\"query - 9\"},{\"type\":12,\"content\":{\"version\":\"NotebookGroup/1.0\",\"groupType\":\"editable\",\"title\":\"Click to see number of unique members for all servers\",\"expandable\":true,\"items\":[{\"type\":1,\"content\":{\"json\":\"Number of unique members for all servers\"},\"name\":\"text - 0\"},{\"type\":3,\"content\":{\"version\":\"KqlItem/1.0\",\"query\":\"let StandardGroup = dynamic([\\\"Administrator\\\", \\\"Domain Admins\\\",\\\"Exchange Trusted Subsystem\\\",\\\"Organization Management\\\", \\\"Admins du domaine\\\"]);\\r\\nExchangeConfiguration(SpecificSectionList=\\\"LocalAminGroup\\\",SpecificConfigurationDate=\\\"{DateOfConfiguration:value}\\\",SpecificConfigurationEnv={EnvironmentList},Target = \\\"On-Premises\\\")\\r\\n| where CmdletResultValue.Level != 0\\r\\n| where not (CmdletResultValue.MemberPath has_any (StandardGroup)) in ({Limited})\\r\\n| project CmdletResultValue\\r\\n| extend Parentgroup = trim_end(@'\\\\\\\\Local Administrators',tostring(CmdletResultValue.Parentgroup))\\r\\n| extend MemberPath = tostring(CmdletResultValue.MemberPath)\\r\\n| extend ObjectClass = tostring(CmdletResultValue.ObjectClass)\\r\\n| where ObjectClass !contains \\\"group\\\"\\r\\n| summarize dcount(MemberPath) by Parentgroup\\r\\n| sort by dcount_MemberPath\",\"size\":4,\"queryType\":0,\"resourceType\":\"microsoft.operationalinsights/workspaces\",\"visualization\":\"tiles\",\"tileSettings\":{\"titleContent\":{\"columnMatch\":\"Parentgroup\",\"formatter\":1},\"leftContent\":{\"columnMatch\":\"dcount_MemberPath\",\"formatter\":12,\"formatOptions\":{\"palette\":\"auto\"},\"numberFormat\":{\"unit\":17,\"options\":{\"style\":\"decimal\",\"maximumFractionDigits\":2,\"maximumSignificantDigits\":3}}},\"showBorder\":false}},\"name\":\"query - 9 - Copy\"}]},\"name\":\"All servers number of members\"},{\"type\":3,\"content\":{\"version\":\"KqlItem/1.0\",\"query\":\"let allsrv = ExchangeConfiguration(SpecificSectionList=\\\"ExchangeServers\\\", SpecificConfigurationDate=\\\"{DateOfConfiguration:value}\\\",SpecificConfigurationEnv={EnvironmentList}, Target = \\\"On-Premises\\\") | where \\r\\nCmdletResultValue.IsMailboxServer== true | extend Name=tostring(CmdletResultValue.Name);\\r\\nExchangeConfiguration(SpecificSectionList=\\\"LocalAminGroup\\\", SpecificConfigurationDate=\\\"{DateOfConfiguration:value}\\\",SpecificConfigurationEnv={EnvironmentList}, Target = \\\"On-Premises\\\") \\r\\n| where CmdletResultValue.Level == 1\\r\\n| project CmdletResultValue\\r\\n| extend MemberPath = tostring(CmdletResultValue.MemberPath)\\r\\n| extend Name = tostring(trim_end(@'\\\\\\\\Local Administrators', tostring(CmdletResultValue.Parentgroup)))\\r\\n| distinct Name\\r\\n| project Name\\r\\n| join kind=rightanti (allsrv) on Name\\r\\n| project CmdletResultValue.Name\",\"size\":4,\"title\":\"Servers not reachable\",\"noDataMessage\":\"All server were successfully analyzed\",\"noDataMessageStyle\":3,\"queryType\":0,\"resourceType\":\"microsoft.operationalinsights/workspaces\",\"visualization\":\"tiles\",\"tileSettings\":{\"titleContent\":{\"columnMatch\":\"CmdletResultValue_Name\",\"formatter\":1,\"numberFormat\":{\"unit\":0,\"options\":{\"style\":\"decimal\"}}},\"showBorder\":true}},\"name\":\"query - 9 - Copy\"},{\"type\":3,\"content\":{\"version\":\"KqlItem/1.0\",\"query\":\"ExchangeConfiguration(SpecificSectionList=\\\"ExchangeServers\\\", SpecificConfigurationDate=\\\"{DateOfConfiguration:value}\\\",SpecificConfigurationEnv={EnvironmentList}, Target = \\\"On-Premises\\\")\\r\\n| where CmdletResultValue.ServerRole <> 64\\r\\n| count\\r\\n\",\"size\":4,\"title\":\"Number of servers\",\"queryType\":0,\"resourceType\":\"microsoft.operationalinsights/workspaces\",\"visualization\":\"tiles\",\"tileSettings\":{\"titleContent\":{\"columnMatch\":\"Count\",\"formatter\":1,\"numberFormat\":{\"unit\":0,\"options\":{\"style\":\"decimal\"}}},\"showBorder\":false}},\"customWidth\":\"50\",\"name\":\"query - 9 - Copy - Copy\"},{\"type\":3,\"content\":{\"version\":\"KqlItem/1.0\",\"query\":\"ExchangeConfiguration(SpecificSectionList=\\\"LocalAminGroup\\\", SpecificConfigurationDate=\\\"{DateOfConfiguration:value}\\\",SpecificConfigurationEnv={EnvironmentList}, Target = \\\"On-Premises\\\")\\r\\n| where CmdletResultValue.Level == 1\\r\\n| project CmdletResultValue\\r\\n| extend MemberPath = tostring(CmdletResultValue.MemberPath)\\r\\n| extend Parentgroup = trim_end(@'\\\\\\\\Local Administrators', tostring(CmdletResultValue.Parentgroup))\\r\\n| distinct Parentgroup = Parentgroup\\r\\n| count \",\"size\":4,\"title\":\"Number of Analyzed servers\",\"queryType\":0,\"resourceType\":\"microsoft.operationalinsights/workspaces\",\"visualization\":\"tiles\",\"tileSettings\":{\"titleContent\":{\"columnMatch\":\"Count\",\"formatter\":1,\"numberFormat\":{\"unit\":0,\"options\":{\"style\":\"decimal\"}}},\"showBorder\":false}},\"customWidth\":\"50\",\"name\":\"query - 9 - Copy - Copy - Copy\"},{\"type\":1,\"content\":{\"json\":\"This view shows each nonstandard user account that is member (directly or by a group) of the local Administrators group per server.\\r\\n\\r\\nConsider reviewing:\\r\\n- **nonstandard members** the Memberpath help to understand from which group the user comprised\\r\\n- **inconsistent memebrs** across servers\\r\\n\\r\\nNote that content from Trusted forests might not be displayed. \",\"style\":\"info\"},\"conditionalVisibility\":{\"parameterName\":\"Help\",\"comparison\":\"isEqualTo\",\"value\":\"Yes\"},\"name\":\"LocalAdminPerServersHelp\"},{\"type\":3,\"content\":{\"version\":\"KqlItem/1.0\",\"query\":\"let StandardGroup = dynamic([\\\"Administrator\\\", \\\"Domain Admins\\\",\\\"Exchange Trusted Subsystem\\\",\\\"Organization Management\\\", \\\"Admins du domaine\\\"]);\\r\\nExchangeConfiguration(SpecificSectionList=\\\"LocalAminGroup\\\",SpecificConfigurationDate=\\\"{DateOfConfiguration:value}\\\",SpecificConfigurationEnv={EnvironmentList},Target = \\\"On-Premises\\\")\\r\\n| where CmdletResultValue.Level != 0 \\r\\n| where not (CmdletResultValue.MemberPath has_any (StandardGroup))\\r\\n| project CmdletResultValue\\r\\n| extend Parentgroup = trim_end(@'\\\\\\\\Local Administrators',tostring(CmdletResultValue.Parentgroup))\\r\\n| extend MemberPath = tostring(CmdletResultValue.MemberPath)\\r\\n| extend Level = tostring(CmdletResultValue.Level)\\r\\n| extend ObjectClass = tostring(CmdletResultValue.ObjectClass)\\r\\n| extend LastLogon = tostring(CmdletResultValue.LastLogonString)\\r\\n| extend LastPwdSet = tostring(CmdletResultValue.LastPwdSetString)\\r\\n| extend Enabled = tostring(CmdletResultValue.Enabled)\\r\\n| extend DN = tostring(CmdletResultValue.DN)\\r\\n| summarize Count=count() by MemberPath,Parentgroup,Level,ObjectClass,LastLogon,LastPwdSet,Enabled,DN\\r\\n| project Parentgroup = strcat(\\\"💻 \\\",Parentgroup),Count,MemberPath,Level,ObjectClass,LastLogon,LastPwdSet,Enabled,DN\\r\\n| sort by Parentgroup asc \",\"size\":1,\"showAnalytics\":true,\"title\":\" Total Non standard Groups and accounts including nested groups\",\"showExportToExcel\":true,\"queryType\":0,\"resourceType\":\"microsoft.operationalinsights/workspaces\",\"gridSettings\":{\"formatters\":[{\"columnMatch\":\"Parentgroup\",\"formatter\":5,\"formatOptions\":{\"aggregation\":\"Count\"}},{\"columnMatch\":\"Count\",\"formatter\":4,\"formatOptions\":{\"palette\":\"blue\",\"aggregation\":\"Sum\"}}],\"rowLimit\":10000,\"filter\":true,\"hierarchySettings\":{\"treeType\":1,\"groupBy\":[\"Parentgroup\"],\"finalBy\":\"Parentgroup\"},\"sortBy\":[{\"itemKey\":\"MemberPath\",\"sortOrder\":1}],\"labelSettings\":[{\"columnId\":\"Parentgroup\",\"label\":\"Server\"}]},\"sortBy\":[{\"itemKey\":\"MemberPath\",\"sortOrder\":1}]},\"name\":\"LocalAdminPerServers\",\"styleSettings\":{\"showBorder\":true}},{\"type\":3,\"content\":{\"version\":\"KqlItem/1.0\",\"query\":\"let StandardGroup = dynamic([\\\"Administrator\\\", \\\"Domain Admins\\\",\\\"Exchange Trusted Subsystem\\\",\\\"Organization Management\\\", \\\"Admins du domaine\\\"]);\\r\\nExchangeConfiguration(SpecificSectionList=\\\"LocalAminGroup\\\",SpecificConfigurationDate=\\\"{DateOfConfiguration:value}\\\",SpecificConfigurationEnv={EnvironmentList},Target = \\\"On-Premises\\\")\\r\\n| where CmdletResultValue.Level == 1\\r\\n| where not (CmdletResultValue.MemberPath has_any (StandardGroup))\\r\\n| project CmdletResultValue\\r\\n| extend Parentgroup = trim_end(@'\\\\\\\\Local Administrators',tostring(CmdletResultValue.Parentgroup))\\r\\n| extend ObjectClass = tostring(CmdletResultValue.ObjectClass)\\r\\n| extend MemberPath = tostring(CmdletResultValue.MemberPath)\\r\\n| extend MemberPath = case( ObjectClass == \\\"group\\\", strcat( \\\"👪 \\\", MemberPath), ObjectClass == \\\"computer\\\", strcat( \\\"💻 \\\", MemberPath), strcat( \\\"🧑‍🦰 \\\", MemberPath) )\\r\\n| project-away CmdletResultValue\\r\\n//| summarize Count=count(), Servers=make_set(Parentgroup) by MemberPath\\r\\n| summarize Count=count() by MemberPath,Parentgroup \\r\\n| sort by Count desc\",\"size\":1,\"showAnalytics\":true,\"title\":\"Non Standard accounts summary\",\"showExportToExcel\":true,\"queryType\":0,\"resourceType\":\"microsoft.operationalinsights/workspaces\",\"gridSettings\":{\"formatters\":[{\"columnMatch\":\"Group\",\"formatter\":1},{\"columnMatch\":\"MemberPath\",\"formatter\":5},{\"columnMatch\":\"Count\",\"formatter\":4,\"formatOptions\":{\"palette\":\"blue\"}},{\"columnMatch\":\"Member\",\"formatter\":1}],\"rowLimit\":10000,\"filter\":true,\"hierarchySettings\":{\"treeType\":1,\"groupBy\":[\"MemberPath\"],\"expandTopLevel\":false},\"labelSettings\":[{\"columnId\":\"MemberPath\",\"label\":\"MemberPath\"},{\"columnId\":\"Parentgroup\",\"label\":\"Servers\"},{\"columnId\":\"Count\",\"label\":\"Nb Servers\"}]}},\"name\":\"LocalAdminCount\",\"styleSettings\":{\"showBorder\":true}},{\"type\":1,\"content\":{\"json\":\"##### Select a server to display its content\\r\\n\\r\\nBy default only the non-standard members are displayed. \\r\\n\\r\\n❌ : for last logon displayed when user logged or the last logon is greater than 180 days\\r\\n\\r\\n❌ : for password last set displayed when last password set greater than 365 days\"},\"name\":\"text - 0\"},{\"type\":9,\"content\":{\"version\":\"KqlParameterItem/1.0\",\"parameters\":[{\"id\":\"19e606d9-7f3e-4d2f-a314-892da571e50a\",\"version\":\"KqlParameterItem/1.0\",\"name\":\"Server\",\"type\":2,\"query\":\"ExchangeConfiguration(SpecificSectionList=\\\"LocalAminGroup\\\", SpecificConfigurationDate=\\\"{DateOfConfiguration:value}\\\",SpecificConfigurationEnv={EnvironmentList}, Target = \\\"On-Premises\\\")\\r\\n| where CmdletResultValue.Level == 1\\r\\n| project CmdletResultValue\\r\\n| extend MemberPath = tostring(CmdletResultValue.MemberPath)\\r\\n| extend Parentgroup = trim_end(@'\\\\\\\\Local Administrators', tostring(CmdletResultValue.Parentgroup))\\r\\n| distinct Parentgroup = Parentgroup\",\"typeSettings\":{\"showDefault\":false},\"queryType\":0,\"resourceType\":\"microsoft.operationalinsights/workspaces\"},{\"id\":\"05ef4f1c-4cf4-406f-9fb2-9ee30dc93abd\",\"version\":\"KqlParameterItem/1.0\",\"name\":\"Limited\",\"label\":\"Show only nonstandard members\",\"type\":10,\"description\":\"Show only non standard members\",\"isRequired\":true,\"typeSettings\":{\"showDefault\":false},\"jsonData\":\"[{ \\\"value\\\": \\\"True\\\", \\\"label\\\": \\\"Yes\\\" },\\r\\n { \\\"value\\\": \\\"True,False\\\", \\\"label\\\": \\\"No\\\", \\\"selected\\\":true }\\r\\n]\",\"value\":\"True\"},{\"id\":\"901bf975-426f-486b-82de-ff0d64f139bb\",\"version\":\"KqlParameterItem/1.0\",\"name\":\"LastLogon\",\"label\":\"Last Logon\",\"type\":10,\"isRequired\":true,\"typeSettings\":{\"showDefault\":false},\"jsonData\":\"[ {\\\"value\\\": \\\"0d\\\", \\\"label\\\": \\\"No filter\\\",\\\"selected\\\":true},\\r\\n{ \\\"value\\\": \\\"90d\\\", \\\"label\\\": \\\"90d\\\" },\\r\\n { \\\"value\\\": \\\"180d\\\", \\\"label\\\": \\\"6m\\\" },\\r\\n { \\\"value\\\": \\\"365d\\\", \\\"label\\\": \\\"1y\\\" },\\r\\n{ \\\"value\\\": \\\"730d\\\", \\\"label\\\": \\\"2y\\\" },\\r\\n{ \\\"value\\\": \\\"1085d\\\", \\\"label\\\": \\\"3y\\\" },\\r\\n{ \\\"value\\\": \\\"1097d\\\", \\\"label\\\": \\\"more than 3y\\\"},\\r\\n{ \\\"value\\\": \\\"3650d\\\", \\\"label\\\": \\\"more than 10y\\\"}\\r\\n]\"},{\"id\":\"2f7a613f-8749-44c9-b8be-844964badef8\",\"version\":\"KqlParameterItem/1.0\",\"name\":\"PasswordLast\",\"label\":\"Password Last Set\",\"type\":10,\"isRequired\":true,\"typeSettings\":{\"showDefault\":false},\"jsonData\":\"[{ \\\"value\\\": \\\"0d\\\", \\\"label\\\": \\\"No filter\\\",\\\"selected\\\":true },\\r\\n { \\\"value\\\": \\\"365d\\\", \\\"label\\\": \\\"1y\\\" },\\r\\n{ \\\"value\\\": \\\"730d\\\", \\\"label\\\": \\\"2y\\\" },\\r\\n{ \\\"value\\\": \\\"1095d\\\", \\\"label\\\": \\\"3y\\\" },\\r\\n{ \\\"value\\\": \\\"1097d\\\", \\\"label\\\": \\\"more than 3y\\\"},\\r\\n{ \\\"value\\\": \\\"3650d\\\", \\\"label\\\": \\\"more than 10y\\\"}\\r\\n]\"}],\"style\":\"pills\",\"queryType\":0,\"resourceType\":\"microsoft.operationalinsights/workspaces\"},\"name\":\"parameters - 1\"},{\"type\":3,\"content\":{\"version\":\"KqlItem/1.0\",\"query\":\"let StandardGroup = dynamic([\\\"Administrator\\\", \\\"Domain Admins\\\",\\\"Exchange Trusted Subsystem\\\",\\\"Organization Management\\\", \\\"Admins du domaine\\\"]);\\r\\nExchangeConfiguration(SpecificSectionList=\\\"LocalAminGroup\\\",SpecificConfigurationDate=\\\"{DateOfConfiguration:value}\\\",SpecificConfigurationEnv={EnvironmentList},Target = \\\"On-Premises\\\")\\r\\n| where CmdletResultValue.Level != 0 \\r\\n| where CmdletResultValue.Parentgroup contains \\\"{Server}\\\"\\r\\n| where not (CmdletResultValue.MemberPath has_any (StandardGroup)) in ({Limited})\\r\\n| where todatetime (CmdletResultValue.LastPwdSetString) < ago({PasswordLast}) or tostring (CmdletResultValue.LastPwdSetString) == \\\"\\\"\\r\\n| where todatetime (CmdletResultValue.LastLogonString) < ago({LastLogon}) or tostring (CmdletResultValue.LastLogonString) == \\\"\\\"\\r\\n| project CmdletResultValue\\r\\n| extend Parentgroup = trim_end(@'\\\\\\\\Local Administrators',tostring(CmdletResultValue.Parentgroup))\\r\\n| extend MemberPath = tostring(CmdletResultValue.MemberPath)\\r\\n| extend Level = tostring(CmdletResultValue.Level)\\r\\n| extend ObjectClass = tostring(CmdletResultValue.ObjectClass)\\r\\n| extend LastLogon = tostring(CmdletResultValue.LastLogonString)\\r\\n| extend LastLogon = iif(ObjectClass==\\\"group\\\" or ObjectClass==\\\"computer\\\" or ObjectClass==\\\"Local User\\\" or ObjectClass==\\\"computer\\\",\\\"N/A\\\",iif ( todatetime (CmdletResultValue.LastLogonString) > ago(180d), CmdletResultValue.LastLogonString,iff (LastLogon==\\\"\\\", \\\"❌ Never logged\\\",strcat(\\\"❌\\\",LastLogon))))\\r\\n| extend LastPwdSet = CmdletResultValue.LastPwdSetString\\r\\n| extend LastPwdSet = iif(ObjectClass==\\\"group\\\" or ObjectClass==\\\"computer\\\" or ObjectClass==\\\"Local User\\\" or ObjectClass==\\\"computer\\\",\\\"N/A\\\",iif ( todatetime (CmdletResultValue.LastPwdSetString) > ago(365d), CmdletResultValue.LastPwdSetString,iff (LastPwdSet==\\\"\\\", \\\"❌ Password never set\\\",strcat(\\\"❌\\\",LastPwdSet))))\\r\\n | extend Enabled = tostring(CmdletResultValue.Enabled)\\r\\n| extend DN = tostring(CmdletResultValue.DN)\\r\\n| project-away CmdletResultValue\\r\\n| sort by MemberPath asc\\r\\n| project-away Parentgroup\",\"size\":1,\"showAnalytics\":true,\"title\":\"Local Administrators group content\",\"showExportToExcel\":true,\"queryType\":0,\"resourceType\":\"microsoft.operationalinsights/workspaces\",\"gridSettings\":{\"rowLimit\":10000,\"filter\":true,\"sortBy\":[{\"itemKey\":\"MemberPath\",\"sortOrder\":1}]},\"sortBy\":[{\"itemKey\":\"MemberPath\",\"sortOrder\":1}]},\"conditionalVisibility\":{\"parameterName\":\"Server\",\"comparison\":\"isNotEqualTo\",\"value\":\"\"},\"name\":\"AdGroups\",\"styleSettings\":{\"showBorder\":true}}]},\"conditionalVisibility\":{\"parameterName\":\"selected\",\"comparison\":\"isEqualTo\",\"value\":\"Server\"},\"name\":\"Local Administrators\"},{\"type\":12,\"content\":{\"version\":\"NotebookGroup/1.0\",\"groupType\":\"editable\",\"title\":\"Exchange and AD GRoup\",\"items\":[{\"type\":1,\"content\":{\"json\":\"This tab displays the content of high privilege groups in Exchange and AD.\"},\"name\":\"text - 7\"},{\"type\":1,\"content\":{\"json\":\"The **Exchange Trusted Subsystem** group is one the two most sensistive groups in Exchange. This group has all privileges in Exchange and very high privileges in AD.\\r\\n\\r\\nExchange 2013 deployment permissions reference\\r\\n\\r\\nThis group should only contains computer accounts for each Exchange servers. When the DAG has an IP and a CNO, it is acceptable to have the DAG's computer account.\\r\\n\\r\\nThis section only shows direct nonstandard members.\",\"style\":\"info\"},\"customWidth\":\"50\",\"conditionalVisibility\":{\"parameterName\":\"Help\",\"comparison\":\"isEqualTo\",\"value\":\"Yes\"},\"name\":\"ExchangeTrustedSubsystemHelp\"},{\"type\":1,\"content\":{\"json\":\"The **Exchange Windows Permissions** group is one the two most sensistive groups in Exchange. This group has very high privileges in AD.\\r\\n\\r\\nExchange 2013 deployment permissions reference\\r\\n\\r\\nThis group should only contains the group Exchange Trusted SubSystem. This section only shows direct nonstandard members. \",\"style\":\"info\"},\"customWidth\":\"50\",\"conditionalVisibility\":{\"parameterName\":\"Help\",\"comparison\":\"isEqualTo\",\"value\":\"Yes\"},\"name\":\"WindowsPermissionGroupTileHelp\"},{\"type\":3,\"content\":{\"version\":\"KqlItem/1.0\",\"query\":\"let ETSValidcontent = union kind=outer (ExchangeConfiguration(SpecificSectionList=\\\"ExchangeServers\\\",SpecificConfigurationDate=\\\"{DateOfConfiguration:value}\\\",SpecificConfigurationEnv={EnvironmentList},Target = \\\"On-Premises\\\")| project Name = tostring(CmdletResultValue.Name)), (ExchangeConfiguration(SpecificSectionList=\\\"DAG\\\",SpecificConfigurationDate=\\\"{DateOfConfiguration:value}\\\",SpecificConfigurationEnv={EnvironmentList},Target = \\\"On-Premises\\\")| project Name = tostring(Identity));\\r\\nExchangeConfiguration(SpecificSectionList=\\\"ETS\\\",SpecificConfigurationDate=\\\"{DateOfConfiguration:value}\\\",SpecificConfigurationEnv={EnvironmentList},Target = \\\"On-Premises\\\")\\r\\n| where CmdletResultValue.Name !in (ETSValidcontent)\\r\\n| summarize MyCount=countif( CmdletResultType == \\\"Success\\\") by CmdletResultType\\r\\n| project Result = iff ( CmdletResultType == \\\"Success\\\", tostring(MyCount), \\\"\\\")\",\"size\":1,\"showAnalytics\":true,\"title\":\"Exchange Trusted SubSystem group nonstandard member count\",\"noDataMessage\":\"Content of group as Expected\",\"noDataMessageStyle\":3,\"showExportToExcel\":true,\"queryType\":0,\"resourceType\":\"microsoft.operationalinsights/workspaces\",\"visualization\":\"tiles\",\"tileSettings\":{\"titleContent\":{\"columnMatch\":\"CmdletResultValue_Name\",\"formatter\":1},\"leftContent\":{\"columnMatch\":\"Result\",\"formatter\":12,\"formatOptions\":{\"palette\":\"hotCold\"},\"numberFormat\":{\"unit\":17,\"options\":{\"style\":\"decimal\",\"maximumFractionDigits\":2,\"maximumSignificantDigits\":3},\"emptyValCustomText\":\"ScriptError\"}},\"showBorder\":true}},\"customWidth\":\"50\",\"name\":\"ExchangeServersTileGroup1Query\"},{\"type\":3,\"content\":{\"version\":\"KqlItem/1.0\",\"query\":\"let ETScontent = ExchangeConfiguration(SpecificSectionList=\\\"ETS\\\", SpecificConfigurationDate=\\\"{DateOfConfiguration:value}\\\",SpecificConfigurationEnv={EnvironmentList}, Target = \\\"On-Premises\\\") | project Name = tostring(CmdletResultValue.Name);\\r\\nExchangeConfiguration(SpecificSectionList=\\\"EWP\\\",SpecificConfigurationDate=\\\"{DateOfConfiguration:value}\\\",SpecificConfigurationEnv={EnvironmentList},Target = \\\"On-Premises\\\")\\r\\n| where CmdletResultValue.Name !in (ETScontent) and CmdletResultValue.Name != \\\"Exchange Trusted Subsystem\\\"\\r\\n| extend Result = iff ( CmdletResultType == \\\"Success\\\", \\\"\\\", \\\"Error in the script unable to retrieve value\\\")\\r\\n| summarize MyCount=countif( CmdletResultType == \\\"Success\\\") by CmdletResultType\\r\\n| project Result = iff ( CmdletResultType == \\\"Success\\\", tostring(MyCount), \\\"\\\")\\r\\n\",\"size\":1,\"showAnalytics\":true,\"title\":\"Exchange Windows Permissions group direct nonstandard members (Exchange Trusted subsystem non standard content not included)\",\"noDataMessage\":\"Content of group as expected\",\"noDataMessageStyle\":3,\"showExportToExcel\":true,\"queryType\":0,\"resourceType\":\"microsoft.operationalinsights/workspaces\",\"visualization\":\"tiles\",\"tileSettings\":{\"titleContent\":{\"columnMatch\":\"CmdletResultValue_Name\",\"formatter\":1},\"leftContent\":{\"columnMatch\":\"Result\",\"formatter\":12,\"formatOptions\":{\"palette\":\"hotCold\"},\"numberFormat\":{\"unit\":17,\"options\":{\"style\":\"decimal\",\"maximumFractionDigits\":2,\"maximumSignificantDigits\":3},\"emptyValCustomText\":\"ScriptError\"}},\"showBorder\":true}},\"customWidth\":\"50\",\"name\":\"ExchangeServersTileGroup2Query\"},{\"type\":12,\"content\":{\"version\":\"NotebookGroup/1.0\",\"groupType\":\"editable\",\"title\":\"Exchange Windows Permissions direct nonstandard content (Exchange Trusted subsystem non standard content not included)\",\"items\":[{\"type\":3,\"content\":{\"version\":\"KqlItem/1.0\",\"query\":\"let ETSValidcontnet = union kind=outer (ExchangeConfiguration(SpecificSectionList=\\\"ExchangeServers\\\",SpecificConfigurationDate=\\\"{DateOfConfiguration:value}\\\",SpecificConfigurationEnv={EnvironmentList},Target = \\\"On-Premises\\\")| project Name = tostring(CmdletResultValue.Name)), (ExchangeConfiguration(SpecificSectionList=\\\"DAG\\\",SpecificConfigurationDate=\\\"{DateOfConfiguration:value}\\\",SpecificConfigurationEnv={EnvironmentList},Target = \\\"On-Premises\\\")| project Name = tostring(Identity));\\r\\nExchangeConfiguration(SpecificSectionList=\\\"ETS\\\",SpecificConfigurationDate=\\\"{DateOfConfiguration:value}\\\",SpecificConfigurationEnv={EnvironmentList},Target = \\\"On-Premises\\\")\\r\\n| where CmdletResultValue.Name !in (ETSValidcontnet)\\r\\n//| extend Name = strcat (\\\"⛔\\\",tostring(CmdletResultValue.Name))\\r\\n| extend Name = iff(CmdletResultType == \\\"Success\\\", strcat (\\\"⛔\\\",tostring(CmdletResultValue.Name)),\\\"Script was unable to retrieve data\\\")\\r\\n| project Name \",\"size\":1,\"showAnalytics\":true,\"title\":\"Exchange Trusted SubSystem nonstandard content\",\"noDataMessage\":\"Content of Exchange Trusted SubSystem as Expected\",\"noDataMessageStyle\":3,\"showExportToExcel\":true,\"queryType\":0,\"resourceType\":\"microsoft.operationalinsights/workspaces\",\"gridSettings\":{\"rowLimit\":10000}},\"customWidth\":\"50\",\"name\":\"ETSDetails\",\"styleSettings\":{\"showBorder\":true}},{\"type\":3,\"content\":{\"version\":\"KqlItem/1.0\",\"query\":\"let ETScontent = ExchangeConfiguration(SpecificSectionList=\\\"ETS\\\", SpecificConfigurationDate=\\\"{DateOfConfiguration:value}\\\",SpecificConfigurationEnv={EnvironmentList}, Target = \\\"On-Premises\\\") | project Name = tostring(CmdletResultValue.Name);\\r\\nExchangeConfiguration(SpecificSectionList=\\\"EWP\\\",SpecificConfigurationDate=\\\"{DateOfConfiguration:value}\\\",SpecificConfigurationEnv={EnvironmentList},Target = \\\"On-Premises\\\")\\r\\n| where CmdletResultValue.Name !in (ETScontent) and CmdletResultValue.Name != \\\"Exchange Trusted Subsystem\\\"\\r\\n//| extend Name = strcat (\\\"⛔\\\",tostring(CmdletResultValue.Name))\\r\\n| extend Name = iff(CmdletResultType == \\\"Success\\\", strcat (\\\"⛔\\\",tostring(CmdletResultValue.Name)),\\\"Script was unable to retrieve data\\\")\\r\\n| project Name \",\"size\":1,\"showAnalytics\":true,\"title\":\"Exchange Windows Permissions direct nonstandard content (Exchange Trusted subsystem non standard content not included)\",\"noDataMessage\":\"Content of Exchange Windows Permissions as Expected\",\"noDataMessageStyle\":3,\"showExportToExcel\":true,\"queryType\":0,\"resourceType\":\"microsoft.operationalinsights/workspaces\"},\"customWidth\":\"50\",\"name\":\"WindowsPermissionsQuery\",\"styleSettings\":{\"showBorder\":true}}]},\"name\":\"ETS and WP Grids\"},{\"type\":12,\"content\":{\"version\":\"NotebookGroup/1.0\",\"groupType\":\"editable\",\"title\":\"Exchange groups from old Exchange version\",\"items\":[{\"type\":1,\"content\":{\"json\":\"ℹ️ Recommendations\\r\\n\\r\\n- Groups from old Exchange version should have been removed\\r\\n- List of old groups \\r\\n\\t- Exchange Organization Administrators\\r\\n\\t- Exchange Recipient Administrators\\r\\n\\t- Exchange Public Folder Administrators\\r\\n\\t- Exchange Server Administrator\\r\\n\\t- Exchange View-Only Administrator\\r\\n\\t- Exchange Enterprise Servers (located in the root domain)\\r\\n\\t- Exchange Domain Servers : one group per domain\\r\\n\\r\\n\\r\\nHelp for Built-in role groups\",\"style\":\"info\"},\"conditionalVisibility\":{\"parameterName\":\"Help\",\"comparison\":\"isEqualTo\",\"value\":\"Yes\"},\"name\":\"text - 0\"},{\"type\":12,\"content\":{\"version\":\"NotebookGroup/1.0\",\"groupType\":\"editable\",\"items\":[{\"type\":3,\"content\":{\"version\":\"KqlItem/1.0\",\"query\":\"\\r\\nlet OldVGroup = (ExchangeConfiguration(SpecificSectionList=\\\"ADGroup\\\", SpecificConfigurationDate=\\\"{DateOfConfiguration:value}\\\", SpecificConfigurationEnv={EnvironmentList}, Target = \\\"On-Premises\\\")| where CmdletResultValue.Parentgroup == \\\"Exchange Enterprise Servers\\\" or CmdletResultValue.Parentgroup == \\\"Exchange Services\\\"| extend Parentgroup = tostring(CmdletResultValue.Parentgroup));\\r\\nExchangeConfiguration(SpecificSectionList=\\\"ExGroup\\\", SpecificConfigurationDate=\\\"{DateOfConfiguration:value}\\\", SpecificConfigurationEnv={EnvironmentList}, Target = \\\"On-Premises\\\") \\r\\n| extend Parentgroup = tostring(CmdletResultValue.Parentgroup)\\r\\n| where CmdletResultValue.Parentgroup in (\\\"Exchange Organization Administrators\\\", \\\"Exchange Recipient Administrators\\\", \\\"Exchange Public Folder Administrators\\\", \\\"Exchange Server Administrator\\\", \\\"Exchange View-Only Administrator\\\") |union OldVGroup\\r\\n| where CmdletResultValue.Level != 0 and CmdletResultValue.ObjectClass !contains \\\"group\\\"\\r\\n| extend MemberPath= tostring(split(tostring(CmdletResultValue.MemberPath), \\\"\\\\\\\\\\\")[countof(tostring(CmdletResultValue.MemberPath), \\\"\\\\\\\\\\\")])\\r\\n| summarize dcount(tostring(MemberPath)) by Parentgroup = tostring(CmdletResultValue.Parentgroup)\\r\\n| sort by dcount_MemberPath\\r\\n\\r\\n\\r\\n\",\"size\":4,\"showAnalytics\":true,\"noDataMessage\":\"No groups from old versions found\",\"noDataMessageStyle\":3,\"showExportToExcel\":true,\"queryType\":0,\"resourceType\":\"microsoft.operationalinsights/workspaces\",\"visualization\":\"tiles\",\"tileSettings\":{\"titleContent\":{\"columnMatch\":\"Parentgroup\",\"formatter\":1},\"leftContent\":{\"columnMatch\":\"dcount_MemberPath\",\"formatter\":12,\"formatOptions\":{\"palette\":\"auto\"}},\"showBorder\":true}},\"name\":\"query - 0\"}]},\"name\":\"ExchangeGroupsList\"},{\"type\":12,\"content\":{\"version\":\"NotebookGroup/1.0\",\"groupType\":\"editable\",\"title\":\"Expand details on the content of old groups\",\"expandable\":true,\"expanded\":false,\"items\":[{\"type\":9,\"content\":{\"version\":\"KqlParameterItem/1.0\",\"parameters\":[{\"id\":\"b4b7a6ad-381a-48d6-9938-bf7cb812b474\",\"version\":\"KqlParameterItem/1.0\",\"name\":\"Group\",\"type\":2,\"query\":\"let OldVGroup = (ExchangeConfiguration(SpecificSectionList=\\\"ADGroup\\\", SpecificConfigurationDate=\\\"{DateOfConfiguration:value}\\\", SpecificConfigurationEnv={EnvironmentList}, Target = \\\"On-Premises\\\")| where CmdletResultValue.Parentgroup == \\\"Exchange Enterprise Servers\\\" or CmdletResultValue.Parentgroup == \\\"Exchange Services\\\"| extend Parentgroup = tostring(CmdletResultValue.Parentgroup));\\r\\nExchangeConfiguration(SpecificSectionList=\\\"ExGroup\\\", SpecificConfigurationDate=\\\"{DateOfConfiguration:value}\\\", SpecificConfigurationEnv={EnvironmentList}, Target = \\\"On-Premises\\\") \\r\\n| extend Parentgroup = tostring(CmdletResultValue.Parentgroup)\\r\\n| where CmdletResultValue.Parentgroup in (\\\"Exchange Organization Administrators\\\", \\\"Exchange Recipient Administrators\\\", \\\"Exchange Public Folder Administrators\\\", \\\"Exchange Server Administrator\\\", \\\"Exchange View-Only Administrator\\\") |union OldVGroup\\r\\n| project CmdletResultValue\\r\\n| extend GroupName = tostring(CmdletResultValue.Parentgroup)\\r\\n| distinct GroupName\\r\\n| sort by GroupName asc\\r\\n\",\"typeSettings\":{\"showDefault\":false},\"queryType\":0,\"resourceType\":\"microsoft.operationalinsights/workspaces\"},{\"id\":\"a695df39-1965-479a-ad0f-b4d3d168aaed\",\"version\":\"KqlParameterItem/1.0\",\"name\":\"LastLogon\",\"label\":\"Last Logon\",\"type\":10,\"isRequired\":true,\"jsonData\":\"[ {\\\"value\\\": \\\"0d\\\", \\\"label\\\": \\\"No filter\\\",\\\"selected\\\":true},\\r\\n{ \\\"value\\\": \\\"90d\\\", \\\"label\\\": \\\"90d\\\" },\\r\\n { \\\"value\\\": \\\"180d\\\", \\\"label\\\": \\\"6m\\\" },\\r\\n { \\\"value\\\": \\\"365d\\\", \\\"label\\\": \\\"1y\\\" },\\r\\n{ \\\"value\\\": \\\"730d\\\", \\\"label\\\": \\\"2y\\\" },\\r\\n{ \\\"value\\\": \\\"1085d\\\", \\\"label\\\": \\\"3y\\\" },\\r\\n{ \\\"value\\\": \\\"1097d\\\", \\\"label\\\": \\\"more than 3y\\\"},\\r\\n{ \\\"value\\\": \\\"3650d\\\", \\\"label\\\": \\\"more than 10y\\\"}\\r\\n]\\r\\n\"},{\"id\":\"2d69bad8-0904-467a-86e6-cb0923520c18\",\"version\":\"KqlParameterItem/1.0\",\"name\":\"PasswordLast\",\"label\":\"Password Last Set\",\"type\":10,\"isRequired\":true,\"jsonData\":\"[{ \\\"value\\\": \\\"0d\\\", \\\"label\\\": \\\"No filter\\\",\\\"selected\\\":true },\\r\\n { \\\"value\\\": \\\"365d\\\", \\\"label\\\": \\\"1y\\\" },\\r\\n{ \\\"value\\\": \\\"730d\\\", \\\"label\\\": \\\"2y\\\" },\\r\\n{ \\\"value\\\": \\\"1095d\\\", \\\"label\\\": \\\"3y\\\" },\\r\\n{ \\\"value\\\": \\\"1097d\\\", \\\"label\\\": \\\"more than 3y\\\"},\\r\\n{ \\\"value\\\": \\\"3650d\\\", \\\"label\\\": \\\"more than 10y\\\"}\\r\\n]\"}],\"style\":\"pills\",\"queryType\":0,\"resourceType\":\"microsoft.operationalinsights/workspaces\"},\"name\":\"parameters - 3\"},{\"type\":1,\"content\":{\"json\":\"Old Exchange groups content groups (Extract for the OU \\\"Microsoft Exchange Security Groups\\\").\\r\\nSelect a group to display detailed information of its contents.\\r\\nLevel attribute helps you understand the level of nested groups.\\r\\n\\r\\n❌ : for last logon displayed when user logged or the last logon is greater than 180 days\\r\\n\\r\\n❌ : for password last set displayed when last password set greater than 365 days\"},\"name\":\"text - 2\"},{\"type\":3,\"content\":{\"version\":\"KqlItem/1.0\",\"query\":\"let OldVGroupEES = (ExchangeConfiguration(SpecificSectionList=\\\"ADGroup\\\", SpecificConfigurationDate=\\\"{DateOfConfiguration:value}\\\", SpecificConfigurationEnv={EnvironmentList}, Target = \\\"On-Premises\\\")\\r\\n | where (CmdletResultValue.Parentgroup == \\\"Exchange Enterprise Servers\\\" and CmdletResultValue.MemberPath != @\\\"Exchange Enterprise Servers\\\\Exchange Domain Servers\\\") or CmdletResultValue.Parentgroup == \\\"Exchange Services\\\"\\r\\n | extend Parentgroup = tostring(CmdletResultValue.Parentgroup)\\r\\n | extend MemberPath = tostring(CmdletResultValue.MemberPath)\\r\\n | extend DN = tostring(CmdletResultValue.DN)\\r\\n | extend Level = tostring(CmdletResultValue.Level)\\r\\n | extend ObjectClass = tostring(CmdletResultValue.ObjectClass)\\r\\n | extend Enabled = tostring(CmdletResultValue.Enabled) );\\r\\nlet OldVGroupEDS = (ExchangeConfiguration(SpecificSectionList=\\\"ADGroup\\\", SpecificConfigurationDate=\\\"lastdate\\\", SpecificConfigurationEnv='B13', Target = \\\"On-Premises\\\")\\r\\n | where CmdletResultValue.Parentgroup == \\\"Exchange Enterprise Servers\\\" and CmdletResultValue.Level ==0\\r\\n | extend Parentgroup = tostring(CmdletResultValue.Parentgroup)\\r\\n| mv-expand CmdletResultValue.Members\\r\\n| where CmdletResultValue_Members.objectClass == \\\"group\\\"\\r\\n| project Parentgroup, MemberPath= strcat(Parentgroup,\\\"\\\\\\\\\\\", CmdletResultValue_Members.name), Level = tostring(1), ObjectClass = tostring(CmdletResultValue_Members.objectClass), DN = tostring(CmdletResultValue_Members.DistinguishedName), ObjectGuid = tostring(CmdletResultValue_Members.ObjectGuid)| join kind=inner ( ExchangeConfiguration(SpecificSectionList=\\\"ADGroup\\\", SpecificConfigurationDate=\\\"lastdate\\\", SpecificConfigurationEnv='B13', Target = \\\"On-Premises\\\")\\r\\n | where CmdletResultValue.Parentgroup == \\\"Exchange Enterprise Servers\\\"\\r\\n | extend Parentgroup = tostring(CmdletResultValue.Parentgroup)\\r\\n | extend ObjectGuid = tostring(CmdletResultValue.ObjectGuid)) on ObjectGuid) ;\\r\\nExchangeConfiguration(SpecificSectionList=\\\"ExGroup\\\", SpecificConfigurationDate=\\\"lastdate\\\", SpecificConfigurationEnv='B13', Target = \\\"On-Premises\\\") \\r\\n| extend Parentgroup = tostring(CmdletResultValue.Parentgroup)\\r\\n| where CmdletResultValue.Parentgroup in (\\\"Exchange Organization Administrators\\\", \\\"Exchange Recipient Administrators\\\", \\\"Exchange Public Folder Administrators\\\", \\\"Exchange Server Administrator\\\", \\\"Exchange View-Only Administrator\\\")\\r\\n| extend MemberPath = tostring(CmdletResultValue.MemberPath)\\r\\n| extend Level = tostring(CmdletResultValue.Level)\\r\\n| extend ObjectClass = tostring(CmdletResultValue.ObjectClass)\\r\\n| extend Enabled = tostring(CmdletResultValue.Enabled)\\r\\n| extend DN = tostring(CmdletResultValue.DN)\\r\\n| union OldVGroupEES,OldVGroupEDS\\r\\n| search CmdletResultValue.Parentgroup == \\\"{Group}\\\"\\r\\n| where todatetime (CmdletResultValue.LastPwdSetString) < ago(0d) or tostring (CmdletResultValue.LastPwdSetString) == \\\"\\\"\\r\\n| where todatetime (CmdletResultValue.LastLogonString) < ago(0d) or tostring (CmdletResultValue.LastLogonString) == \\\"\\\"\\r\\n| sort by tostring(CmdletResultValue.MemberPath) asc \\r\\n| where CmdletResultValue.Level != 0\\r\\n//| extend DN = tostring(CmdletResultValue.DN)\\r\\n| extend LastLogon = tostring(CmdletResultValue.LastLogonString)\\r\\n| extend LastLogon = iif(ObjectClass == \\\"group\\\" or ObjectClass == \\\"computer\\\" or ObjectClass == \\\"Local User\\\" or ObjectClass == \\\"computer\\\", \\\"N/A\\\", iif (todatetime (CmdletResultValue.LastLogonString) > ago(180d), CmdletResultValue.LastLogonString, iff (LastLogon == \\\"\\\", \\\"❌ Never logged\\\", strcat(\\\"❌\\\", LastLogon))))\\r\\n| extend LastPwdSet = CmdletResultValue.LastPwdSetString\\r\\n| extend LastPwdSet = iif(ObjectClass == \\\"group\\\" or ObjectClass == \\\"computer\\\" or ObjectClass == \\\"Local User\\\" or ObjectClass == \\\"computer\\\", \\\"N/A\\\", iif (todatetime (CmdletResultValue.LastPwdSetString) > ago(366d), CmdletResultValue.LastPwdSetString, iff (LastPwdSet == \\\"\\\", \\\"❌ Password never set\\\", strcat(\\\"❌\\\", LastPwdSet))))\\r\\n| extend MemberPath = case(ObjectClass == \\\"group\\\", strcat(\\\"👪 \\\", MemberPath), ObjectClass == \\\"computer\\\", strcat(\\\"💻 \\\", MemberPath), strcat(\\\"🧑‍🦰 \\\", MemberPath))\\r\\n| project Parentgroup, MemberPath, Level, ObjectClass,LastLogon, LastPwdSet ,Enabled,DN\\r\\n\",\"size\":1,\"showAnalytics\":true,\"noDataMessage\":\"The query returned no results.\",\"showExportToExcel\":true,\"queryType\":0,\"resourceType\":\"microsoft.operationalinsights/workspaces\",\"gridSettings\":{\"formatters\":[{\"columnMatch\":\"CmdletResultValue\",\"formatter\":5},{\"columnMatch\":\"Parentgroup\",\"formatter\":5},{\"columnMatch\":\"LastPwdSet\",\"formatter\":0,\"numberFormat\":{\"unit\":0,\"options\":{\"style\":\"decimal\"}}},{\"columnMatch\":\"ParentId\",\"formatter\":5},{\"columnMatch\":\"Id\",\"formatter\":5}],\"rowLimit\":10000,\"filter\":true}},\"showPin\":true,\"name\":\"ExchangeServersGroupsGrid\",\"styleSettings\":{\"showBorder\":true}}]},\"name\":\"group - 5\"}]},\"name\":\"Exchange group from old Exchange versions\"},{\"type\":12,\"content\":{\"version\":\"NotebookGroup/1.0\",\"groupType\":\"editable\",\"title\":\"Exchange group\",\"items\":[{\"type\":1,\"content\":{\"json\":\"ℹ️ Recommendations\\r\\n\\r\\n- Ensure that no service account are a member of the high privilege groups. Use RBAC to delegate the exact required permissions.\\r\\n- Limit the usage of nested group for administration.\\r\\n- Ensure that accounts are given only the required pernissions to execute their tasks.\\r\\n- Use just in time administration principle by adding users in a group only when they need the permissions, then remove them when their operation is over.\\r\\n- Limit the number of Organization management members. When you review the Admin Audit logs you might see that the administrators rarely needed Organization Management privileges.\\r\\n- Monitor the content of the following groups:\\r\\n - Organization Management\\r\\n - Recipient Management (Member of this group have at least the following rights : set-mailbox, Add-MailboxPermission)\\r\\n - Discovery Management\\r\\n - Server Management\\r\\n - Hygiene Management\\r\\n - Exchange Servers\\r\\n - Exchange Trusted Subsystem \\r\\n - Exchange Windows Permissions\\r\\n - xxx High privilege group (not an exhaustive list)\\r\\n - All RBAC groups that have high roles delegation\\r\\n - All nested groups in high privileges groups\\r\\n - Note that this is not a complete list. The content of all the groups that have high privileges should be monitored.\\r\\n- Each time a new RBAC group is created, decide if the content of this groups should be monitored\\r\\n- Periodically review the members of the groups\\r\\n\\r\\nHelp for Built-in role groups\",\"style\":\"info\"},\"conditionalVisibility\":{\"parameterName\":\"Help\",\"comparison\":\"isEqualTo\",\"value\":\"Yes\"},\"name\":\"text - 0\"},{\"type\":12,\"content\":{\"version\":\"NotebookGroup/1.0\",\"groupType\":\"editable\",\"title\":\"Summary content of most important groups\",\"items\":[{\"type\":3,\"content\":{\"version\":\"KqlItem/1.0\",\"query\":\"ExchangeConfiguration(SpecificSectionList=\\\"ExGroup\\\",SpecificConfigurationDate=\\\"{DateOfConfiguration:value}\\\",SpecificConfigurationEnv={EnvironmentList},Target = \\\"On-Premises\\\")\\r\\n| project CmdletResultValue\\r\\n| where CmdletResultValue.Level != 0 and CmdletResultValue.ObjectClass !contains \\\"group\\\"\\r\\n| extend MemberPath= tostring(split(tostring(CmdletResultValue.MemberPath),\\\"\\\\\\\\\\\")[countof(tostring(CmdletResultValue.MemberPath),\\\"\\\\\\\\\\\")])\\r\\n| summarize dcount(tostring(MemberPath)) by Parentgroup = tostring(CmdletResultValue.Parentgroup)\\r\\n| where Parentgroup in (\\\"Organization Management\\\", \\\"Compliance Management\\\", \\\"Discovery Management\\\", \\\"Server Management\\\", \\\"Recipient Manangement\\\",\\\"Security Administrator\\\", \\\"Hygiene Management\\\", \\\"Public Folder Manangement\\\", \\\"Records Manangement\\\") or Parentgroup contains \\\"Impersonation\\\" or Parentgroup contains \\\"Export\\\"\\r\\n| sort by dcount_MemberPath\\r\\n\\r\\n\",\"size\":4,\"showAnalytics\":true,\"showExportToExcel\":true,\"queryType\":0,\"resourceType\":\"microsoft.operationalinsights/workspaces\",\"visualization\":\"tiles\",\"tileSettings\":{\"titleContent\":{\"columnMatch\":\"Parentgroup\",\"formatter\":1},\"leftContent\":{\"columnMatch\":\"dcount_MemberPath\",\"formatter\":12,\"formatOptions\":{\"palette\":\"auto\"}},\"showBorder\":true}},\"name\":\"query - 0\"},{\"type\":12,\"content\":{\"version\":\"NotebookGroup/1.0\",\"groupType\":\"editable\",\"title\":\"Expand for summary content for all groups located in the OU Exchange Security Groups\",\"expandable\":true,\"items\":[{\"type\":3,\"content\":{\"version\":\"KqlItem/1.0\",\"query\":\"ExchangeConfiguration(SpecificSectionList=\\\"ExGroup\\\",SpecificConfigurationDate=\\\"{DateOfConfiguration:value}\\\",SpecificConfigurationEnv={EnvironmentList},Target = \\\"On-Premises\\\")\\r\\n| project CmdletResultValue\\r\\n| where CmdletResultValue.Level != 0 and CmdletResultValue.ObjectClass !contains \\\"group\\\"\\r\\n| extend MemberPath= tostring(split(tostring(CmdletResultValue.MemberPath),\\\"\\\\\\\\\\\")[countof(tostring(CmdletResultValue.MemberPath),\\\"\\\\\\\\\\\")])\\r\\n| summarize dcount(tostring(MemberPath)) by Parentgroup = tostring(CmdletResultValue.Parentgroup)\\r\\n| sort by dcount_MemberPath desc\\r\\n\\r\\n\",\"size\":1,\"showAnalytics\":true,\"title\":\"OU Exchange Security Groups\",\"showExportToExcel\":true,\"queryType\":0,\"resourceType\":\"microsoft.operationalinsights/workspaces\",\"visualization\":\"tiles\",\"tileSettings\":{\"titleContent\":{\"columnMatch\":\"Parentgroup\",\"formatter\":1},\"leftContent\":{\"columnMatch\":\"dcount_MemberPath\",\"formatter\":12,\"formatOptions\":{\"palette\":\"auto\"}},\"showBorder\":true}},\"showPin\":false,\"name\":\"query - 0 - Copy\"}]},\"name\":\"All groups\"}]},\"name\":\"ExchangeGroupsList\"},{\"type\":9,\"content\":{\"version\":\"KqlParameterItem/1.0\",\"parameters\":[{\"id\":\"b4b7a6ad-381a-48d6-9938-bf7cb812b474\",\"version\":\"KqlParameterItem/1.0\",\"name\":\"Group\",\"type\":2,\"query\":\"ExchangeConfiguration(SpecificSectionList=\\\"ExGroup\\\",SpecificConfigurationDate=\\\"{DateOfConfiguration:value}\\\",SpecificConfigurationEnv={EnvironmentList},Target = \\\"On-Premises\\\")\\r\\n//| where CmdletResultValue.Parentgroup != \\\"Exchange Trusted Subsystem\\\"\\r\\n//| where CmdletResultValue.Parentgroup != \\\"Exchange Windows Permissions\\\"\\r\\n| project CmdletResultValue\\r\\n| extend GroupName = tostring(CmdletResultValue.Parentgroup)\\r\\n| distinct GroupName\\r\\n| sort by GroupName asc\\r\\n\",\"typeSettings\":{\"showDefault\":false},\"showExportToExcel\":true,\"showAnalytics\":true,\"queryType\":0,\"resourceType\":\"microsoft.operationalinsights/workspaces\"},{\"id\":\"f3b935d7-b78f-41d2-94bc-f8c878a13260\",\"version\":\"KqlParameterItem/1.0\",\"name\":\"LastLogon\",\"label\":\"Last Logon >\",\"type\":10,\"isRequired\":true,\"multiSelect\":true,\"quote\":\"'\",\"delimiter\":\",\",\"typeSettings\":{\"showDefault\":false},\"jsonData\":\"[ {\\\"value\\\": \\\"0d\\\", \\\"label\\\": \\\"No filter\\\",\\\"selected\\\":true},\\r\\n{ \\\"value\\\": \\\"90d\\\", \\\"label\\\": \\\"90d\\\" },\\r\\n { \\\"value\\\": \\\"180d\\\", \\\"label\\\": \\\"6m\\\" },\\r\\n { \\\"value\\\": \\\"365d\\\", \\\"label\\\": \\\"1y\\\" },\\r\\n{ \\\"value\\\": \\\"730d\\\", \\\"label\\\": \\\"2y\\\" },\\r\\n{ \\\"value\\\": \\\"1085d\\\", \\\"label\\\": \\\"3y\\\" },\\r\\n{ \\\"value\\\": \\\"1097d\\\", \\\"label\\\": \\\"more than 3y\\\"},\\r\\n{ \\\"value\\\": \\\"3650d\\\", \\\"label\\\": \\\"more than 10y\\\"}\\r\\n]\"},{\"id\":\"3343688f-e609-4822-b4ed-cdd50b77d948\",\"version\":\"KqlParameterItem/1.0\",\"name\":\"PasswordLast\",\"label\":\"Password Last Set >\",\"type\":10,\"isRequired\":true,\"typeSettings\":{\"showDefault\":false},\"jsonData\":\"[{ \\\"value\\\": \\\"0d\\\", \\\"label\\\": \\\"No filter\\\",\\\"selected\\\":true },\\r\\n { \\\"value\\\": \\\"365d\\\", \\\"label\\\": \\\"1y\\\" },\\r\\n{ \\\"value\\\": \\\"730d\\\", \\\"label\\\": \\\"2y\\\" },\\r\\n{ \\\"value\\\": \\\"1095d\\\", \\\"label\\\": \\\"3y\\\" },\\r\\n{ \\\"value\\\": \\\"1097d\\\", \\\"label\\\": \\\"more than 3y\\\"},\\r\\n{ \\\"value\\\": \\\"3650d\\\", \\\"label\\\": \\\"more than 10y\\\"}\\r\\n]\"}],\"style\":\"pills\",\"queryType\":0,\"resourceType\":\"microsoft.operationalinsights/workspaces\"},\"name\":\"parameters - 3\"},{\"type\":1,\"content\":{\"json\":\"Exchange groups content (Extract for the OU \\\"Microsoft Exchange Security Groups\\\").\\r\\nSelect a group to display detailed information of its contents.\\r\\nLevel attribute helps you understand the level of nested groups.\\r\\n\\r\\n❌ : for last logon displayed when user logged or the last logon is greater than 180 days\\r\\n\\r\\n❌ : for password last set displayed when last password set greater than 365 days\"},\"name\":\"text - 2\"},{\"type\":3,\"content\":{\"version\":\"KqlItem/1.0\",\"query\":\"ExchangeConfiguration(SpecificSectionList=\\\"ExGroup\\\",SpecificConfigurationDate=\\\"{DateOfConfiguration:value}\\\",SpecificConfigurationEnv={EnvironmentList},Target = \\\"On-Premises\\\")\\r\\n| search CmdletResultValue.Parentgroup == \\\"{Group}\\\"\\r\\n| where todatetime (CmdletResultValue.LastPwdSetString) < ago({PasswordLast}) or tostring (CmdletResultValue.LastPwdSetString) == \\\"\\\"\\r\\n| where todatetime (CmdletResultValue.LastLogonString) < ago({LastLogon}) or tostring (CmdletResultValue.LastLogonString) == \\\"\\\"\\r\\n| where CmdletResultValue.Level != 0\\r\\n| sort by tostring(CmdletResultValue.MemberPath) asc \\r\\n| project CmdletResultValue\\r\\n| extend Parentgroup = tostring(CmdletResultValue.Parentgroup)\\r\\n| extend MemberPath = tostring(CmdletResultValue.MemberPath)\\r\\n| extend Level = tostring(CmdletResultValue.Level)\\r\\n| extend ObjectClass = tostring(CmdletResultValue.ObjectClass)\\r\\n| extend LastLogon = tostring(CmdletResultValue.LastLogonString)\\r\\n| extend LastLogon = iif(ObjectClass==\\\"group\\\" or ObjectClass==\\\"computer\\\" or ObjectClass==\\\"Local User\\\" or ObjectClass==\\\"computer\\\",\\\"N/A\\\",iif ( todatetime (CmdletResultValue.LastLogonString) > ago(180d), CmdletResultValue.LastLogonString,iff (LastLogon==\\\"\\\", \\\"❌ No logon\\\",strcat(\\\"❌\\\",LastLogon))))\\r\\n| extend LastPwdSet = CmdletResultValue.LastPwdSetString\\r\\n| extend LastPwdSet = iif(ObjectClass==\\\"group\\\" or ObjectClass==\\\"computer\\\" or ObjectClass==\\\"Local User\\\" or ObjectClass==\\\"computer\\\",\\\"N/A\\\",iif ( todatetime (CmdletResultValue.LastPwdSetString) > ago(366d), CmdletResultValue.LastPwdSetString,iff (LastPwdSet==\\\"\\\", \\\"❌ No logon\\\",strcat(\\\"❌\\\",LastPwdSet))))\\r\\n| extend Enabled = tostring(CmdletResultValue.Enabled)\\r\\n| extend DN = tostring(CmdletResultValue.DN)\\r\\n| sort by MemberPath asc\\r\\n//| extend MemberPath = case( ObjectClass == \\\"group\\\", strcat( \\\"👪 \\\", MemberPath), ObjectClass == \\\"computer\\\", strcat( \\\"💻 \\\", MemberPath), strcat( \\\"🧑‍🦰 \\\", MemberPath) )\\r\\n| project-away CmdletResultValue,Parentgroup\",\"size\":3,\"showAnalytics\":true,\"showExportToExcel\":true,\"queryType\":0,\"resourceType\":\"microsoft.operationalinsights/workspaces\",\"gridSettings\":{\"rowLimit\":10000,\"filter\":true,\"sortBy\":[{\"itemKey\":\"MemberPath\",\"sortOrder\":1}]},\"sortBy\":[{\"itemKey\":\"MemberPath\",\"sortOrder\":1}]},\"name\":\"ExchangeServersGroupsGrid\",\"styleSettings\":{\"showBorder\":true}}]},\"name\":\"Exchange group\"},{\"type\":12,\"content\":{\"version\":\"NotebookGroup/1.0\",\"groupType\":\"editable\",\"title\":\"AD Group\",\"items\":[{\"type\":1,\"content\":{\"json\":\"High privileges AD groups can take control of Exchange by adding any accounts in the Exchange groups.\\r\\n\\r\\nNote that the members of the Account Operators are able to manage every AD group (except those protected by AdminSDHolder). This means they can manage the content of every high privilege Exchange groups.\\r\\n\\r\\nℹ️ It is recommended to not use this group and to monitor its changes.\\r\\n\",\"style\":\"info\"},\"conditionalVisibility\":{\"parameterName\":\"Help\",\"comparison\":\"isEqualTo\",\"value\":\"Yes\"},\"name\":\"ADGroupHelp\"},{\"type\":9,\"content\":{\"version\":\"KqlParameterItem/1.0\",\"parameters\":[{\"id\":\"268bd356-7d05-41c3-9867-00c6ab198c5a\",\"version\":\"KqlParameterItem/1.0\",\"name\":\"Group\",\"type\":2,\"query\":\"ExchangeConfiguration(SpecificSectionList=\\\"ADGroup\\\",SpecificConfigurationDate=\\\"{DateOfConfiguration:value}\\\",SpecificConfigurationEnv={EnvironmentList},Target = \\\"On-Premises\\\")\\r\\n| project CmdletResultValue\\r\\n| extend GroupName = tostring(CmdletResultValue.Parentgroup)\\r\\n| distinct GroupName\\r\\n| sort by GroupName asc\\r\\n\",\"typeSettings\":{\"showDefault\":false},\"showExportToExcel\":true,\"showAnalytics\":true,\"queryType\":0,\"resourceType\":\"microsoft.operationalinsights/workspaces\",\"gridSettings\":{\"rowLimit\":10000}},{\"id\":\"9d02cad2-f4c5-418d-976f-b88b56f80cb5\",\"version\":\"KqlParameterItem/1.0\",\"name\":\"LastLogon\",\"label\":\"Last Logon\",\"type\":10,\"isRequired\":true,\"typeSettings\":{\"showDefault\":false},\"jsonData\":\"[ {\\\"value\\\": \\\"0d\\\", \\\"label\\\": \\\"No filter\\\",\\\"selected\\\":true},\\r\\n{ \\\"value\\\": \\\"90d\\\", \\\"label\\\": \\\"90d\\\" },\\r\\n { \\\"value\\\": \\\"180d\\\", \\\"label\\\": \\\"6m\\\" },\\r\\n { \\\"value\\\": \\\"365d\\\", \\\"label\\\": \\\"1y\\\" },\\r\\n{ \\\"value\\\": \\\"730d\\\", \\\"label\\\": \\\"2y\\\" },\\r\\n{ \\\"value\\\": \\\"1085d\\\", \\\"label\\\": \\\"3y\\\" },\\r\\n{ \\\"value\\\": \\\"1097d\\\", \\\"label\\\": \\\"more than 3y\\\"},\\r\\n{ \\\"value\\\": \\\"3650d\\\", \\\"label\\\": \\\"more than 10y\\\"}\\r\\n]\"},{\"id\":\"9e591429-d8ea-40c2-80c1-2426c72c92d5\",\"version\":\"KqlParameterItem/1.0\",\"name\":\"PasswordLast\",\"label\":\"Password Last Set\",\"type\":10,\"isRequired\":true,\"typeSettings\":{\"showDefault\":false},\"jsonData\":\"[{ \\\"value\\\": \\\"0d\\\", \\\"label\\\": \\\"No filter\\\",\\\"selected\\\":true },\\r\\n { \\\"value\\\": \\\"365d\\\", \\\"label\\\": \\\"1y\\\" },\\r\\n{ \\\"value\\\": \\\"730d\\\", \\\"label\\\": \\\"2y\\\" },\\r\\n{ \\\"value\\\": \\\"1095d\\\", \\\"label\\\": \\\"3y\\\" },\\r\\n{ \\\"value\\\": \\\"1097d\\\", \\\"label\\\": \\\"more than 3y\\\"},\\r\\n{ \\\"value\\\": \\\"3650d\\\", \\\"label\\\": \\\"more than 10y\\\"}\\r\\n]\"}],\"style\":\"pills\",\"queryType\":0,\"resourceType\":\"microsoft.operationalinsights/workspaces\"},\"name\":\"parameters - 1\"},{\"type\":1,\"content\":{\"json\":\"Overview of high privileges AD Groups' content.\\r\\nSelect a group to display detailed information of its contents.\\r\\nLevel attribute helps you understand the level of nested groups.\\r\\n\\r\\n❌ : for last logon displayed when user logged or the last logon is greater than 180 days\\r\\n\\r\\n❌ : for password last set displayed when last password set greater than 365 days\"},\"name\":\"text - 0\"},{\"type\":3,\"content\":{\"version\":\"KqlItem/1.0\",\"query\":\"ExchangeConfiguration(SpecificSectionList=\\\"ADGroup\\\",SpecificConfigurationDate=\\\"{DateOfConfiguration:value}\\\",SpecificConfigurationEnv={EnvironmentList},Target = \\\"On-Premises\\\")\\r\\n| search CmdletResultValue.Parentgroup == \\\"{Group}\\\"\\r\\n| where todatetime (CmdletResultValue.LastPwdSetString) < ago({PasswordLast}) or tostring (CmdletResultValue.LastPwdSetString) == \\\"\\\"\\r\\n| where todatetime (CmdletResultValue.LastLogonString) < ago({LastLogon}) or tostring (CmdletResultValue.LastLogonString) == \\\"\\\"\\r\\n| where CmdletResultValue.Level != 0\\r\\n| sort by tostring(CmdletResultValue.MemberPath) asc \\r\\n| project CmdletResultValue\\r\\n| extend Parentgroup = tostring(CmdletResultValue.Parentgroup)\\r\\n| extend MemberPath = tostring(CmdletResultValue.MemberPath)\\r\\n| extend Level = tostring(CmdletResultValue.Level)\\r\\n| extend ObjectClass = tostring(CmdletResultValue.ObjectClass)\\r\\n| extend LastLogon = tostring(CmdletResultValue.LastLogonString)\\r\\n| extend LastLogon = iif(ObjectClass==\\\"group\\\" or ObjectClass==\\\"computer\\\" or ObjectClass==\\\"Local User\\\" or ObjectClass==\\\"computer\\\",\\\"N/A\\\",iif ( todatetime (CmdletResultValue.LastLogonString) > ago(180d), CmdletResultValue.LastLogonString,iff (LastLogon==\\\"\\\", \\\"❌ No logon\\\",strcat(\\\"❌\\\",LastLogon))))\\r\\n| extend LastPwdSet = CmdletResultValue.LastPwdSetString\\r\\n| extend LastPwdSet = iif(ObjectClass==\\\"group\\\" or ObjectClass==\\\"computer\\\" or ObjectClass==\\\"Local User\\\" or ObjectClass==\\\"computer\\\",\\\"N/A\\\",iif ( todatetime (CmdletResultValue.LastPwdSetString) > ago(366d), CmdletResultValue.LastPwdSetString,iff (LastPwdSet==\\\"\\\", \\\"❌ No logon\\\",strcat(\\\"❌\\\",LastPwdSet))))\\r\\n| extend Enabled = tostring(CmdletResultValue.Enabled)\\r\\n| extend DN = tostring(CmdletResultValue.DN)\\r\\n| sort by MemberPath asc\\r\\n//| extend MemberPath = case( ObjectClass == \\\"group\\\", strcat( \\\"👪 \\\", MemberPath), ObjectClass == \\\"computer\\\", strcat( \\\"💻 \\\", MemberPath), strcat( \\\"🧑‍🦰 \\\", MemberPath) )\\r\\n| project-away CmdletResultValue,Parentgroup\",\"size\":3,\"showAnalytics\":true,\"showExportToExcel\":true,\"queryType\":0,\"resourceType\":\"microsoft.operationalinsights/workspaces\",\"gridSettings\":{\"formatters\":[{\"columnMatch\":\"CmdletResultValue\",\"formatter\":5},{\"columnMatch\":\"Parentgroup\",\"formatter\":5}],\"rowLimit\":10000,\"filter\":true}},\"name\":\"query - 2\",\"styleSettings\":{\"showBorder\":true}}]},\"name\":\"AD Group\"}]},\"conditionalVisibility\":{\"parameterName\":\"selected\",\"comparison\":\"isEqualTo\",\"value\":\"ExchAD\"},\"name\":\"Exchange and AD GRoup\"},{\"type\":12,\"content\":{\"version\":\"NotebookGroup/1.0\",\"groupType\":\"editable\",\"title\":\"Transport Security configuration\",\"items\":[{\"type\":1,\"content\":{\"json\":\"This tab displays differents security configuration for transport components.\"},\"name\":\"text - 10\"},{\"type\":12,\"content\":{\"version\":\"NotebookGroup/1.0\",\"groupType\":\"editable\",\"title\":\"Receive Connectors\",\"items\":[{\"type\":3,\"content\":{\"version\":\"KqlItem/1.0\",\"query\":\"ExchangeConfiguration(SpecificSectionList=\\\"ReceiveConnector\\\",SpecificConfigurationDate=\\\"{DateOfConfiguration:value}\\\",SpecificConfigurationEnv={EnvironmentList},Target = \\\"On-Premises\\\")\\r\\n| where CmdletResultValue.PermissionGroupsString contains \\\"Anonymous\\\"\\r\\n| summarize Count = countif (CmdletResultValue.PermissionGroupsString contains \\\"Anonymous\\\") by Name,tostring(CmdletResultValue.Server.Name)\\r\\n\",\"size\":0,\"title\":\"Anonymous Configuration\",\"queryType\":0,\"resourceType\":\"microsoft.operationalinsights/workspaces\",\"visualization\":\"piechart\",\"chartSettings\":{\"yAxis\":[\"Count\"],\"group\":\"CmdletResultValue_Server_Name\",\"ySettings\":{\"numberFormatSettings\":{\"unit\":0,\"options\":{\"style\":\"decimal\",\"useGrouping\":true}}}}},\"customWidth\":\"33\",\"name\":\"query - 0\"},{\"type\":3,\"content\":{\"version\":\"KqlItem/1.0\",\"query\":\"ExchangeConfiguration(SpecificSectionList=\\\"RCAnonymous\\\",SpecificConfigurationDate=\\\"{DateOfConfiguration:value}\\\",SpecificConfigurationEnv={EnvironmentList},Target = \\\"On-Premises\\\")\\r\\n| extend Identity = tostring(Identity)\\r\\n|summarize count() by Identity\",\"size\":0,\"title\":\"OpenRelay with \\\"ms-Exch-SMTP-Accept-Any-Recipient\\\" for Anonymous\",\"queryType\":0,\"resourceType\":\"microsoft.operationalinsights/workspaces\",\"visualization\":\"piechart\"},\"customWidth\":\"33\",\"name\":\"query - 1\"},{\"type\":3,\"content\":{\"version\":\"KqlItem/1.0\",\"query\":\"ExchangeConfiguration(SpecificSectionList=\\\"ReceiveConnector\\\",SpecificConfigurationDate=\\\"{DateOfConfiguration:value}\\\",SpecificConfigurationEnv={EnvironmentList},Target = \\\"On-Premises\\\")\\r\\n| where CmdletResultValue.AuthMechanismString contains (\\\"ExternalAuthoritative\\\")\\r\\n| extend Server = tostring(CmdletResultValue.Server.Name)\\r\\n| summarize count() by Name,Server\\r\\n\",\"size\":0,\"title\":\"Open Relay using with Externally Secure\",\"queryType\":0,\"resourceType\":\"microsoft.operationalinsights/workspaces\",\"visualization\":\"piechart\"},\"customWidth\":\"33\",\"name\":\"query - 2\"}]},\"name\":\"group - 8\"},{\"type\":12,\"content\":{\"version\":\"NotebookGroup/1.0\",\"groupType\":\"editable\",\"title\":\"Receive Connectors OpenRelay using Extended Right \\\"ms-Exch-SMTP-Accept-Any-Recipient\\\" for Anonymous\",\"items\":[{\"type\":1,\"content\":{\"json\":\"This view shows all **Receive Connectors** configured configured as Open Relay with the Extended Rights \\\"ms-Exch-SMTP-Accept-Any-Recipient\\\" set on the Receive Connector object in the Configuration partition.\\r\\n\\r\\n\\r\\nRemember that with this configuration, the Exchange servers can be used to send emails outside the organization. Depending on the configuration, the connectors may be protected by IPs. However, IP protection is not safe configuration.\\r\\n\\r\\nYou can check if the \\\"ms-Exch-SMTP-Accept-Any-Recipient\\\" ExtendedRights has been added on the Receive connector for Anonymous with PowerShell: `Get-ReceiveConnector | Get-ADPermission | ? {$_.ExtendedRights -like \\\"ms-Exch-SMTP-Accept-Any-Recipient\\\"}`\\r\\n\\r\\nAllow anonymous relay on Exchange server\\r\\n\\r\\nSee the section \\\"Receive Connectors with Anonymous Permission\\\" for additional information regarding Anonymous authentication and IP protection.\",\"style\":\"info\"},\"conditionalVisibility\":{\"parameterName\":\"Help\",\"comparison\":\"isEqualTo\",\"value\":\"Yes\"},\"name\":\"ReceiveConnectorsHelp\"},{\"type\":9,\"content\":{\"version\":\"KqlParameterItem/1.0\",\"parameters\":[{\"id\":\"fa5f9749-d6f8-436f-ae00-cba306713bac\",\"version\":\"KqlParameterItem/1.0\",\"name\":\"Server\",\"type\":2,\"query\":\"ExchangeConfiguration(SpecificSectionList=\\\"ExchangeServers\\\",SpecificConfigurationDate=\\\"{DateOfConfiguration:value}\\\",SpecificConfigurationEnv={EnvironmentList},Target = \\\"On-Premises\\\")\\r\\n| project CmdletResultValue\\r\\n| where CmdletResultValue.ServerRole <> \\\"64\\\"\\r\\n| extend SRVName = tostring(CmdletResultValue.Name)\\r\\n| distinct SRVName\\r\\n| sort by SRVName asc\",\"typeSettings\":{\"showDefault\":false},\"timeContext\":{\"durationMs\":86400000},\"queryType\":0,\"resourceType\":\"microsoft.operationalinsights/workspaces\"},{\"id\":\"14912e83-60a1-4a21-a34b-500d4662a666\",\"version\":\"KqlParameterItem/1.0\",\"name\":\"NoIPRestriction\",\"type\":10,\"isRequired\":true,\"typeSettings\":{\"showDefault\":false},\"jsonData\":\"[\\r\\n { \\\"value\\\": \\\"True\\\", \\\"label\\\": \\\"Yes\\\" },\\r\\n { \\\"value\\\": \\\"True,False\\\", \\\"label\\\": \\\"No\\\", \\\"selected\\\":\\\"False\\\" }\\r\\n]\",\"timeContext\":{\"durationMs\":86400000}}],\"style\":\"pills\",\"queryType\":0,\"resourceType\":\"microsoft.operationalinsights/workspaces\"},\"name\":\"parameters - 2\"},{\"type\":1,\"content\":{\"json\":\"The toogle buttom help you to sort by:\\r\\n\\r\\n- Server\\r\\n- Receive connectors with no IP restrictions\"},\"name\":\"text - 3\"},{\"type\":3,\"content\":{\"version\":\"KqlItem/1.0\",\"query\":\"ExchangeConfiguration(SpecificSectionList=\\\"RCAnonymous\\\",SpecificConfigurationDate=\\\"{DateOfConfiguration:value}\\\",SpecificConfigurationEnv={EnvironmentList},Target = \\\"On-Premises\\\")\\r\\n| project Identity,CmdletResultValue\\r\\n| extend Identity = tostring(Identity)\\r\\n| extend Server = replace_string(replace_string(tostring(split(CmdletResultValue.DistinguishedName,\\\",\\\",3)),\\\"[\\\\\\\"CN=\\\",\\\"\\\"),\\\"\\\\\\\"]\\\",\\\"\\\")\\r\\n|join kind=leftouter ( ExchangeConfiguration(SpecificSectionList=\\\"ReceiveConnector\\\",SpecificConfigurationDate=\\\"{DateOfConfiguration:value}\\\",SpecificConfigurationEnv={EnvironmentList},Target = \\\"On-Premises\\\") ) on $left.Identity == $right.Name\\r\\n| where CmdletResultValue1.Server.Name contains \\\"{Server}\\\"\\r\\n| where (CmdletResultValue1.RemoteIPRanges contains \\\"0.0.0.0\\\" or CmdletResultValue1.RemoteIPRanges contains \\\"ffff:ffff:ffff:ffff:ffff:ffff:ffff:ffff\\\") in ({NoIPRestriction})\\r\\n| where CmdletResultValue1.PermissionGroupsString contains \\\"Anonymous\\\" //> 12 and CmdletResultValue.PermissionGroups != 14 and CmdletResultValue.PermissionGroups != 16\\r\\n| extend Server = tostring(CmdletResultValue1.Server.Name)\\r\\n| extend Name = tostring(CmdletResultValue1.Name)\\r\\n| extend TransportRole = iff(CmdletResultValue1.TransportRole== \\\"32\\\" , \\\"HubTransport\\\", \\\"FrontendTransport\\\")\\r\\n| extend Enabled = tostring(CmdletResultValue1.Enabled)\\r\\n| extend PermissionGroups = tostring(CmdletResultValue1.PermissionGroupsString) \\r\\n| extend AuthMechanism = tostring(CmdletResultValue1.AuthMechanismString)\\r\\n| mv-expand RemoteIPall=CmdletResultValue1.RemoteIPRanges\\r\\n| mv-expand BindingAllall=CmdletResultValue1.Bindings\\r\\n| extend RemoteIP= RemoteIPall.Expression\\r\\n| extend IP= strcat (BindingAllall.Address,\\\"-\\\",BindingAllall.Port)\\r\\n| summarize Bindings = make_set(tostring(IP)),RemoteIPRange = make_set(tostring(RemoteIP)) by Server,Name,TransportRole,Enabled,PermissionGroups,AuthMechanism\\r\\n| sort by Server asc\",\"size\":1,\"showAnalytics\":true,\"showExportToExcel\":true,\"queryType\":0,\"resourceType\":\"microsoft.operationalinsights/workspaces\",\"gridSettings\":{\"rowLimit\":10000,\"filter\":true,\"sortBy\":[{\"itemKey\":\"Server\",\"sortOrder\":1}]},\"sortBy\":[{\"itemKey\":\"Server\",\"sortOrder\":1}]},\"name\":\"RCAnonymousQuery\",\"styleSettings\":{\"showBorder\":true}}]},\"name\":\"Receive Connectors OpenRelay using Extended Right \\\"ms-Exch-SMTP-Accept-Any-Recipient\\\" for Anonymous\"},{\"type\":12,\"content\":{\"version\":\"NotebookGroup/1.0\",\"groupType\":\"editable\",\"title\":\"Receive Connectors OpenRelay using Authentication ExternalAuthoritative\",\"items\":[{\"type\":1,\"content\":{\"json\":\"This view shows all Receive Connectors configured with authentication set to Externally Secure. With this configuration the Receive connector will be allow as Open Relay.\\r\\n\\r\\nRemember that with this configuration, the Exchange servers can be used to send emails outside the organization. Depending on the configuration, the connectors may be protected by IP. However, IP protection is not safe configuration.\\r\\n\\r\\n\\r\\nAllow anonymous relay on Exchange server\\r\\n\\r\\nSee the section \\\"Receive Connectors with Anonymous Permission\\\" for additional information regarding Anonymous authentication and IP protection.\\r\\n\",\"style\":\"info\"},\"conditionalVisibility\":{\"parameterName\":\"Help\",\"comparison\":\"isEqualTo\",\"value\":\"Yes\"},\"name\":\"ReceiveConnectorsHelp\"},{\"type\":9,\"content\":{\"version\":\"KqlParameterItem/1.0\",\"parameters\":[{\"id\":\"195a66a1-7aa2-4564-bd3b-233049d6f101\",\"version\":\"KqlParameterItem/1.0\",\"name\":\"Server\",\"type\":2,\"query\":\"ExchangeConfiguration(SpecificSectionList=\\\"ExchangeServers\\\",SpecificConfigurationDate=\\\"{DateOfConfiguration:value}\\\",SpecificConfigurationEnv={EnvironmentList},Target = \\\"On-Premises\\\")\\r\\n| project CmdletResultValue\\r\\n| where CmdletResultValue.ServerRole <> \\\"64\\\"\\r\\n| extend SRVName = tostring(CmdletResultValue.Name)\\r\\n| distinct SRVName\\r\\n| sort by SRVName asc\",\"typeSettings\":{\"showDefault\":false},\"queryType\":0,\"resourceType\":\"microsoft.operationalinsights/workspaces\"},{\"id\":\"4ef1d2a2-a13f-4bd4-9e66-2d9a15ad8a7a\",\"version\":\"KqlParameterItem/1.0\",\"name\":\"NoIPRestriction\",\"type\":10,\"description\":\"See Receive Connectors with no IP restriction\",\"isRequired\":true,\"jsonData\":\"[\\r\\n { \\\"value\\\": \\\"True\\\", \\\"label\\\": \\\"Yes\\\" },\\r\\n { \\\"value\\\": \\\"True,False\\\", \\\"label\\\": \\\"No\\\", \\\"selected\\\":\\\"False\\\" }\\r\\n]\"}],\"style\":\"pills\",\"queryType\":0,\"resourceType\":\"microsoft.operationalinsights/workspaces\"},\"name\":\"parameters - 3\"},{\"type\":1,\"content\":{\"json\":\"The toogle buttom help you to sort by:\\r\\n\\r\\n- Server\\r\\n- Receive connectors with no IP restrictions\"},\"name\":\"text - 3\"},{\"type\":3,\"content\":{\"version\":\"KqlItem/1.0\",\"query\":\"ExchangeConfiguration(SpecificSectionList=\\\"ReceiveConnector\\\",SpecificConfigurationDate=\\\"{DateOfConfiguration:value}\\\",SpecificConfigurationEnv={EnvironmentList},Target = \\\"On-Premises\\\")\\r\\n| where CmdletResultValue.Server.Name contains \\\"{Server}\\\"\\r\\n| where (CmdletResultValue.RemoteIPRanges contains \\\"0.0.0.0\\\" or CmdletResultValue.RemoteIPRanges contains \\\"ffff:ffff:ffff:ffff:ffff:ffff:ffff:ffff\\\") in ({NoIPRestriction})\\r\\n| where CmdletResultValue.AuthMechanismString contains \\\"ExternalAuthoritative\\\" //> 12 and CmdletResultValue.PermissionGroups != 14 and CmdletResultValue.PermissionGroups != 16\\r\\n| project CmdletResultValue\\r\\n| extend Server = tostring(CmdletResultValue.Server.Name)\\r\\n| extend Name = tostring(CmdletResultValue.Name)\\r\\n| extend TransportRole = iff(CmdletResultValue.TransportRole== \\\"32\\\" , \\\"HubTransport\\\", \\\"FrontendTransport\\\")\\r\\n| extend Enabled = tostring(CmdletResultValue.Enabled)\\r\\n| extend PermissionGroups = tostring(CmdletResultValue.PermissionGroupsString)\\r\\n//| extend Bindings = iif(tostring(parse_json(tostring(CmdletResultValue.Bindings))[1].Port )!=\\\"\\\",tostring(strcat(tostring(parse_json(tostring(CmdletResultValue.Bindings))[0].Address),\\\"-\\\",tostring(parse_json(tostring(CmdletResultValue.Bindings))[0].Port),\\\",\\\",tostring(parse_json(tostring(CmdletResultValue.Bindings))[1].Address),\\\"-\\\",tostring(parse_json(tostring(CmdletResultValue.Bindings))[1].Port))),tostring(strcat(tostring(parse_json(tostring(CmdletResultValue.Bindings))[0].Address),\\\"-\\\",tostring(parse_json(tostring(CmdletResultValue.Bindings))[0].Port))))\\r\\n//| extend RemoteIPRanges = tostring(CmdletResultValue.RemoteIPRanges)\\r\\n| extend AuthMechanism = tostring(CmdletResultValue.AuthMechanismString)\\r\\n| mv-expand RemoteIPall=CmdletResultValue.RemoteIPRanges\\r\\n| mv-expand BindingAllall=CmdletResultValue.Bindings\\r\\n| extend RemoteIP= RemoteIPall.Expression\\r\\n| extend IP= strcat (BindingAllall.Address,\\\"-\\\",BindingAllall.Port)\\r\\n| summarize Bindings = make_set(tostring(IP)),RemoteIPRange = make_set(tostring(RemoteIP)) by Server,Name,TransportRole,Enabled,PermissionGroups,AuthMechanism\\r\\n| sort by Server asc\\r\\n\",\"size\":1,\"showAnalytics\":true,\"title\":\"Receive Connectors configure with Externally Secured Authentication\",\"showExportToExcel\":true,\"queryType\":0,\"resourceType\":\"microsoft.operationalinsights/workspaces\",\"gridSettings\":{\"rowLimit\":10000,\"filter\":true,\"sortBy\":[{\"itemKey\":\"Server\",\"sortOrder\":1}]},\"sortBy\":[{\"itemKey\":\"Server\",\"sortOrder\":1}]},\"name\":\"query - 2\",\"styleSettings\":{\"showBorder\":true}}]},\"name\":\"Security Transport Configuration\"},{\"type\":12,\"content\":{\"version\":\"NotebookGroup/1.0\",\"groupType\":\"editable\",\"title\":\"Receive Connectors with Anonymous Permission\",\"items\":[{\"type\":1,\"content\":{\"json\":\"This view shows all Receive Connectors configured with Anonymous authentication. It is not recommended to configure connectors with Anonymous authentication.\\r\\n\\r\\nWhen configured with Anonymous and No Ip Restriction, any machine can initiate an SMTP session with the Receive Connectors. This can then be used send emails (SPAM/Virus/Phishing....) to all the mailboxes in the organization. The mail will be seen as an internal mail and might bypass some protections.\\r\\n\\r\\nIf you absolute need this configuration because some of your application does not support Authentication, it is strongly recommended to limit the IP addresses that can establish SMTP sessions with Exchange. Do not use range of subnet.\\r\\n\\r\\nThis section has an option button to display \\r\\n All Receive Connectors with Anonymous (No)\\r\\n All Receive Connectors with Anonymous and with no IP Restriction (Yes)\",\"style\":\"info\"},\"conditionalVisibility\":{\"parameterName\":\"Help\",\"comparison\":\"isEqualTo\",\"value\":\"Yes\"},\"name\":\"ReceiveConnectorsHelp\"},{\"type\":9,\"content\":{\"version\":\"KqlParameterItem/1.0\",\"parameters\":[{\"id\":\"195a66a1-7aa2-4564-bd3b-233049d6f101\",\"version\":\"KqlParameterItem/1.0\",\"name\":\"Server\",\"type\":2,\"query\":\"ExchangeConfiguration(SpecificSectionList=\\\"ExchangeServers\\\",SpecificConfigurationDate=\\\"{DateOfConfiguration:value}\\\",SpecificConfigurationEnv={EnvironmentList},Target = \\\"On-Premises\\\")\\r\\n| project CmdletResultValue\\r\\n| where CmdletResultValue.ServerRole <> \\\"64\\\"\\r\\n| extend SRVName = tostring(CmdletResultValue.Name)\\r\\n| distinct SRVName\\r\\n| sort by SRVName asc\",\"typeSettings\":{\"showDefault\":false},\"queryType\":0,\"resourceType\":\"microsoft.operationalinsights/workspaces\"},{\"id\":\"bcb24a01-9242-4fec-b30a-02b0583cbc87\",\"version\":\"KqlParameterItem/1.0\",\"name\":\"NoIPRestriction\",\"type\":10,\"isRequired\":true,\"typeSettings\":{\"showDefault\":false},\"jsonData\":\"[\\r\\n { \\\"value\\\": \\\"True\\\", \\\"label\\\": \\\"Yes\\\" },\\r\\n { \\\"value\\\": \\\"True,False\\\", \\\"label\\\": \\\"No\\\", \\\"selected\\\":\\\"False\\\" }\\r\\n]\"}],\"style\":\"pills\",\"queryType\":0,\"resourceType\":\"microsoft.operationalinsights/workspaces\"},\"name\":\"parameters - 3\"},{\"type\":1,\"content\":{\"json\":\"The toogle buttom help you to sort by:\\r\\n\\r\\n- Server\\r\\n- Receive connectors with no IP restrictions\"},\"name\":\"text - 3 - Copy\"},{\"type\":3,\"content\":{\"version\":\"KqlItem/1.0\",\"query\":\"ExchangeConfiguration(SpecificSectionList=\\\"ReceiveConnector\\\",SpecificConfigurationDate=\\\"{DateOfConfiguration:value}\\\",SpecificConfigurationEnv={EnvironmentList},Target = \\\"On-Premises\\\")\\r\\n| where CmdletResultValue.Server.Name contains \\\"{Server}\\\"\\r\\n| where (CmdletResultValue.RemoteIPRanges contains \\\"0.0.0.0\\\" or CmdletResultValue.RemoteIPRanges contains \\\"ffff:ffff:ffff:ffff:ffff:ffff:ffff:ffff\\\") in ({NoIPRestriction})\\r\\n| where CmdletResultValue.PermissionGroupsString contains \\\"Anonymous\\\" //> 12 and CmdletResultValue.PermissionGroups != 14 and CmdletResultValue.PermissionGroups != 16\\r\\n| project CmdletResultValue\\r\\n| extend Server = tostring(CmdletResultValue.Server.Name)\\r\\n| extend Name = tostring(CmdletResultValue.Name)\\r\\n| extend TransportRole = iff(CmdletResultValue.TransportRole== \\\"32\\\" , \\\"HubTransport\\\", \\\"FrontendTransport\\\")\\r\\n| extend Enabled = tostring(CmdletResultValue.Enabled)\\r\\n| extend PermissionGroups = tostring(CmdletResultValue.PermissionGroupsString) \\r\\n| extend AuthMechanism = tostring(CmdletResultValue.AuthMechanismString)\\r\\n| mv-expand RemoteIPall=CmdletResultValue.RemoteIPRanges\\r\\n| mv-expand BindingAllall=CmdletResultValue.Bindings\\r\\n| extend RemoteIP= RemoteIPall.Expression\\r\\n| extend IP= strcat (BindingAllall.Address,\\\"-\\\",BindingAllall.Port)\\r\\n| summarize Bindings = make_set(tostring(IP)),RemoteIPRange = make_set(tostring(RemoteIP)) by Server,Name,TransportRole,Enabled,PermissionGroups,AuthMechanism\\r\\n| sort by Server asc\\r\\n\",\"size\":1,\"showAnalytics\":true,\"title\":\"Receive Connectors configure with Anonymous Permission\",\"showExportToExcel\":true,\"queryType\":0,\"resourceType\":\"microsoft.operationalinsights/workspaces\",\"gridSettings\":{\"rowLimit\":10000,\"filter\":true,\"sortBy\":[{\"itemKey\":\"Server\",\"sortOrder\":1}]},\"sortBy\":[{\"itemKey\":\"Server\",\"sortOrder\":1}]},\"name\":\"query - 2\",\"styleSettings\":{\"showBorder\":true}}]},\"name\":\"Receive Connectors configure with Anonymous Permission\"},{\"type\":12,\"content\":{\"version\":\"NotebookGroup/1.0\",\"groupType\":\"editable\",\"title\":\"Transport Rules with specific actions to monitor\",\"items\":[{\"type\":1,\"content\":{\"json\":\"A common way used by attackers to exfiltrate data is to set Transport Rules that send all or sensitive messages outside the organization or to a mailbox where they already have full control.\\r\\n\\r\\nThis section shows your Transport rules with sentitive actions that can lead to data leaks:\\r\\n- BlindCopyTo\\r\\n- RedirectMessageTo\\r\\n- CopyTo\\r\\n\\r\\n\\r\\nFor more information :\\r\\nMail flow rules in Exchange Serve\\r\\n\",\"style\":\"info\"},\"conditionalVisibility\":{\"parameterName\":\"Help\",\"comparison\":\"isEqualTo\",\"value\":\"Yes\"},\"name\":\"TransportRulesHelp\"},{\"type\":3,\"content\":{\"version\":\"KqlItem/1.0\",\"query\":\"ExchangeConfiguration(SpecificSectionList=\\\"TransportRule\\\",SpecificConfigurationDate=\\\"{DateOfConfiguration:value}\\\",SpecificConfigurationEnv={EnvironmentList},Target = \\\"On-Premises\\\")\\r\\n| project CmdletResultValue\\r\\n| extend Identity = iif( CmdletResultValue.Identity contains \\\"OrgHierarchyToIgnore\\\",tostring(CmdletResultValue.Identity.Name),tostring(CmdletResultValue.Identity))\\r\\n//| extend State = tostring(CmdletResultValue.State)\\r\\n| extend Status= iff ( tostring(CmdletResultValue.State)== \\\"Enabled\\\" or tostring(CmdletResultValue.State)== \\\"1\\\" , \\\"Enabled\\\",iff(tostring(CmdletResultValue.State)==\\\"\\\",\\\"\\\", \\\"Disabled\\\"))\\r\\n| extend SentTo = tostring(CmdletResultValue.SentToString)\\r\\n| extend BlindCopyTo = tostring(CmdletResultValue.BlindCopyToString)\\r\\n| extend CopyTo = tostring(CmdletResultValue.CopyToString)\\r\\n| extend RedirectMessageTo = tostring(CmdletResultValue.RedirectMessageToString)\\r\\n| extend Mode = tostring(CmdletResultValue.Identity.Mode)\\r\\n| project-away CmdletResultValue\\r\\n| sort by Identity asc\\r\\n| sort by Status desc\",\"size\":1,\"showAnalytics\":true,\"showExportToExcel\":true,\"queryType\":0,\"resourceType\":\"microsoft.operationalinsights/workspaces\",\"gridSettings\":{\"rowLimit\":10000,\"filter\":true}},\"name\":\"query - 1\",\"styleSettings\":{\"showBorder\":true}}]},\"name\":\"Transport Rules actions to monitor\"},{\"type\":1,\"content\":{\"json\":\"### Journal Mailboxes\"},\"name\":\"JournalMailboxHelp\"},{\"type\":1,\"content\":{\"json\":\"The **Journal Mailboxes** contain emails sent and received by specific or all users. The content of these mailboxes is very sensitives.\\r\\n\\r\\nJournal Rules should be reviewed to check if they are still needed. Mailbox audit should be set on these mailboxes. Also by default, no one should access to these mailboxes.\\r\\n\\r\\nThen, it is recommended to regularly check who have Full Access mailbox or Receive As on these mailboxes.\\r\\nAdditional information :\\r\\n\\r\\nJournaling in Exchange Server\\r\\n\\r\\nJournaling procedures\\r\\n\\r\\n\\r\\nMailbox audit logging in Exchange Server\\r\\n\\r\\n\\r\\n\",\"style\":\"info\"},\"conditionalVisibility\":{\"parameterName\":\"Help\",\"comparison\":\"isEqualTo\",\"value\":\"Yes\"},\"name\":\"JournalHelp\"},{\"type\":3,\"content\":{\"version\":\"KqlItem/1.0\",\"query\":\"ExchangeConfiguration(SpecificSectionList=\\\"JournalRule\\\",SpecificConfigurationDate=\\\"{DateOfConfiguration:value}\\\",SpecificConfigurationEnv={EnvironmentList},Target = \\\"On-Premises\\\")\\r\\n| project CmdletResultValue\\r\\n| extend Identity = tostring(CmdletResultValue.Identity)\\r\\n| extend Status= iff ( tostring(CmdletResultValue.Enabled)== \\\"Enabled\\\" or tostring(CmdletResultValue.Enabled)== \\\"1\\\" , \\\"Enabled\\\", iff(tostring(CmdletResultValue.Enabled)==\\\"\\\",\\\"\\\", \\\"Disabled\\\"))\\r\\n//| extend Enabled = tostring(CmdletResultValue.Enabled)\\r\\n| extend JournalEmailAddress = tostring(CmdletResultValue.JournalEmailAddress)\\r\\n| extend Recipient = tostring(CmdletResultValue.Recipient)\\r\\n| sort by Identity asc\\r\\n| sort by Status desc\\r\\n| project-away CmdletResultValue\\r\\n\",\"size\":1,\"showAnalytics\":true,\"title\":\"Journal Rules configured in your environment\",\"showExportToExcel\":true,\"queryType\":0,\"resourceType\":\"microsoft.operationalinsights/workspaces\",\"gridSettings\":{\"rowLimit\":10000,\"filter\":true}},\"name\":\"JournalQuery\",\"styleSettings\":{\"showBorder\":true}},{\"type\":12,\"content\":{\"version\":\"NotebookGroup/1.0\",\"groupType\":\"editable\",\"title\":\"Journal Recipients on mailbox databases configured in your environment\",\"items\":[{\"type\":1,\"content\":{\"json\":\"As Journal Recipient on databases send all the mail send to users in this database to a specific mailbox. The content of these mailboxes is very sensitive.\\r\\n\\r\\nJournal Recipients configuration should be reviewed to check if they are still needed. Mailbox audit should be set on these mailboxes. No one should have access to these mailboxes by default.\\r\\n\\r\\nIt is recommended to regularly check who have Full Access or Receive As on these mailboxes.\\r\\n\\r\\nAdditional information :\\r\\n\\r\\nJournaling in Exchange Server\\r\\n\\r\\nJournaling procedures\\r\\n\\r\\n\\r\\nMailbox audit logging in Exchange Server\\r\\n\",\"style\":\"info\"},\"conditionalVisibility\":{\"parameterName\":\"Help\",\"comparison\":\"isEqualTo\",\"value\":\"Yes\"},\"name\":\"JournalRecipientsHelp\"},{\"type\":3,\"content\":{\"version\":\"KqlItem/1.0\",\"query\":\"ExchangeConfiguration(SpecificSectionList=\\\"MbxDBJournaling\\\",SpecificConfigurationDate=\\\"{DateOfConfiguration:value}\\\",SpecificConfigurationEnv={EnvironmentList},Target = \\\"On-Premises\\\")\\r\\n| where CmdletResultValue.JournalRecipient !=\\\"\\\"\\r\\n| project CmdletResultValue\\r\\n| extend Identity = tostring(CmdletResultValue.Identity.Name)\\r\\n| extend Enabled = tostring(CmdletResultValue.Enabled)\\r\\n| extend JournalRecipient = tostring(CmdletResultValue.JournalRecipient)\\r\\n| project-away CmdletResultValue\\r\\n| sort by Identity asc\\r\\n\",\"size\":1,\"showAnalytics\":true,\"showExportToExcel\":true,\"queryType\":0,\"resourceType\":\"microsoft.operationalinsights/workspaces\"},\"name\":\"query - 1\",\"styleSettings\":{\"showBorder\":true}}]},\"name\":\"JournalRecipientsGroup\"},{\"type\":12,\"content\":{\"version\":\"NotebookGroup/1.0\",\"groupType\":\"editable\",\"title\":\"Remote Domain Autofoward Configuration - * should not allow AutoForwardEnabled\",\"items\":[{\"type\":1,\"content\":{\"json\":\"If **AutoForwardEnabled** is set to True for an SMTP domain, then users in Outlook are allowed to set automatic transfer of all their emails to addresses in this domain.\\r\\n\\r\\nWhen the Default Remote domain is set to * and has the AutoForwardEnabled set True, any user can configure an Outlook rule to automatically forward all emails to any SMTP domain domains outside the organization. This is a high risk configuration as it might allow accounts to leak information. \\r\\n\\r\\nAlso, when setting AutoForwardEnabled to a specific domain, it is strongly recommended enable TLS encryption.\\r\\n\\r\\nAdditional information:\\r\\n\\r\\nRemote Domains\\r\\n\",\"style\":\"info\"},\"conditionalVisibility\":{\"parameterName\":\"Help\",\"comparison\":\"isEqualTo\",\"value\":\"Yes\"},\"name\":\"AutoForwardHelp\"},{\"type\":3,\"content\":{\"version\":\"KqlItem/1.0\",\"query\":\"ExchangeConfiguration(SpecificSectionList=\\\"RemoteDomain\\\",SpecificConfigurationDate=\\\"{DateOfConfiguration:value}\\\",SpecificConfigurationEnv={EnvironmentList},Target = \\\"On-Premises\\\")\\r\\n| project CmdletResultValue\\r\\n| extend Name = tostring(CmdletResultValue.Name)\\r\\n| extend Address = tostring(CmdletResultValue.DomainName.Address)\\r\\n| extend AutoForwardEnabled = iff (CmdletResultValue.AutoForwardEnabled== \\\"true\\\" and CmdletResultValue.Address == \\\"*\\\", strcat (\\\"❌\\\",tostring(CmdletResultValue.AutoForwardEnabled)),iff(CmdletResultValue.AutoForwardEnabled== \\\"true\\\" and CmdletResultValue.Address != \\\"*\\\", strcat (\\\"⚠️\\\",tostring(CmdletResultValue.AutoForwardEnabled)),strcat (\\\"✅\\\",tostring(CmdletResultValue.AutoForwardEnabled))))\\r\\n| project-away CmdletResultValue\\r\\n| sort by Address asc \",\"size\":1,\"showAnalytics\":true,\"showExportToExcel\":true,\"queryType\":0,\"resourceType\":\"microsoft.operationalinsights/workspaces\",\"gridSettings\":{\"rowLimit\":10000,\"filter\":true}},\"name\":\"query - 1\",\"styleSettings\":{\"showBorder\":true}},{\"type\":1,\"content\":{\"json\":\"Accepted domains set to * authorize Open Relay.\\r\\n\\r\\nMore information:\\r\\n\\r\\nAccepted domains\\r\\n\",\"style\":\"info\"},\"conditionalVisibility\":{\"parameterName\":\"Help\",\"comparison\":\"isEqualTo\",\"value\":\"Yes\"},\"name\":\"text - 3\"},{\"type\":3,\"content\":{\"version\":\"KqlItem/1.0\",\"query\":\"ExchangeConfiguration(SpecificSectionList=\\\"AcceptedDomain\\\",SpecificConfigurationDate=\\\"{DateOfConfiguration:value}\\\",SpecificConfigurationEnv={EnvironmentList},Target = \\\"On-Premises\\\")\\r\\n| project CmdletResultValue\\r\\n| where CmdletResultValue.DomainName.Address == \\\"*\\\"\\r\\n| extend Name = tostring(CmdletResultValue.Name)\\r\\n| extend Address = tostring(CmdletResultValue.DomainName.Address)\\r\\n| extend Address = \\\"* : ❌ OpenRelay configuration\\\"\\r\\n| extend DomainType = case(CmdletResultValue.DomainType==\\\"0\\\",\\\"Authoritative Domain\\\",CmdletResultValue.DomainType==\\\"1\\\",\\\"ExternalRelay\\\",CmdletResultValue.DomainType==\\\"2\\\",\\\"InternalRelay\\\",\\\"NotApplicable\\\")\\r\\n| project-away CmdletResultValue\",\"size\":1,\"showAnalytics\":true,\"title\":\"Accepted domain with *\",\"noDataMessage\":\"Accepted Domain * not confirgured (no Open Relay)\",\"noDataMessageStyle\":3,\"showExportToExcel\":true,\"queryType\":0,\"resourceType\":\"microsoft.operationalinsights/workspaces\",\"gridSettings\":{\"rowLimit\":10000,\"filter\":true}},\"name\":\"query - 4\",\"styleSettings\":{\"showBorder\":true}}]},\"name\":\"ForwardGroup\"}]},\"conditionalVisibility\":{\"parameterName\":\"selected\",\"comparison\":\"isEqualTo\",\"value\":\"Transport\"},\"name\":\"Transport Security configuration\"}],\"fromTemplateId\":\"sentinel-MicrosoftExchangeSecurityReview\",\"$schema\":\"https://github.com/Microsoft/Application-Insights-Workbooks/blob/master/schema/workbook.json\"}\r\n", + "serializedData": "{\"version\":\"Notebook/1.0\",\"items\":[{\"type\":1,\"content\":{\"json\":\"# Microsoft Exchange Security Review\"},\"name\":\"text - 2\"},{\"type\":9,\"content\":{\"version\":\"KqlParameterItem/1.0\",\"parameters\":[{\"id\":\"743317e2-ebcf-4958-861d-4ff97fc7cce1\",\"version\":\"KqlParameterItem/1.0\",\"name\":\"EnvironmentList\",\"label\":\"Environment\",\"type\":2,\"isRequired\":true,\"multiSelect\":true,\"quote\":\"'\",\"delimiter\":\",\",\"query\":\"ExchangeEnvironmentList(Target=\\\"On-Premises\\\") | where ESIEnvironment != \\\"\\\"\",\"typeSettings\":{\"limitSelectTo\":1,\"showDefault\":false},\"queryType\":0,\"resourceType\":\"microsoft.operationalinsights/workspaces\"},{\"id\":\"a88b4e41-eb2f-41bf-92d8-27c83650a4b8\",\"version\":\"KqlParameterItem/1.0\",\"name\":\"DateOfConfiguration\",\"label\":\"Collection time\",\"type\":2,\"isRequired\":true,\"query\":\"let _configurationEnv = split(iff(isnull({EnvironmentList}) or isempty({EnvironmentList}) or tolower({EnvironmentList}) == \\\"all\\\",\\\"All\\\",tostring({EnvironmentList})),',');\\r\\nESIExchangeConfig_CL\\r\\n| extend ScopedEnvironment = iff(_configurationEnv contains \\\"All\\\", \\\"All\\\",ESIEnvironment_s) \\r\\n| where ScopedEnvironment in (_configurationEnv)\\r\\n| extend Collection = format_datetime(todatetime(EntryDate_s), 'yyyy-MM-dd')\\r\\n| summarize Collection = max(Collection)\\r\\n| project Collection = \\\"lastdate\\\", Selected = true\\r\\n| join kind= fullouter ( ESIExchangeConfig_CL | extend ScopedEnvironment = iff(_configurationEnv contains \\\"All\\\", \\\"All\\\",ESIEnvironment_s) \\r\\n | where ScopedEnvironment in (_configurationEnv)\\r\\n | where TimeGenerated > ago(90d)\\r\\n | extend Collection = format_datetime(todatetime(EntryDate_s), 'yyyy-MM-dd')\\r\\n | summarize by Collection \\r\\n | join kind= fullouter ( ESIExchangeConfig_CL | extend ScopedEnvironment = iff(_configurationEnv contains \\\"All\\\", \\\"All\\\",ESIEnvironment_s) \\r\\n | where ScopedEnvironment in (_configurationEnv)\\r\\n | where TimeGenerated > ago(90d)\\r\\n | extend Collection = format_datetime(todatetime(EntryDate_s), 'yyyy-MM-dd')\\r\\n | extend PreciseCollection = format_datetime(todatetime(EntryDate_s), 'yyyy-MM-dd HH:mm ')\\r\\n | summarize by PreciseCollection, Collection \\r\\n | join kind=leftouter (\\r\\n ESIExchangeConfig_CL | extend ScopedEnvironment = iff(_configurationEnv contains \\\"All\\\", \\\"All\\\",ESIEnvironment_s) \\r\\n | where ScopedEnvironment in (_configurationEnv)\\r\\n | where TimeGenerated > ago(90d)\\r\\n | extend Collection = format_datetime(todatetime(EntryDate_s), 'yyyy-MM-dd')\\r\\n | extend PreciseCollection = format_datetime(todatetime(EntryDate_s), 'yyyy-MM-dd HH:mm')\\r\\n | summarize by PreciseCollection, Collection \\r\\n | summarize count() by Collection\\r\\n ) on Collection\\r\\n ) on Collection\\r\\n) on Collection\\r\\n| project Value = iif(Selected,Collection,iif(count_ > 1,PreciseCollection,Collection1)), Label = iif(Selected,\\\"Last Known date\\\",iif(count_ > 1,PreciseCollection,Collection1)), Selected\\r\\n| sort by Selected, Value desc\",\"typeSettings\":{\"showDefault\":false},\"queryType\":0,\"resourceType\":\"microsoft.operationalinsights/workspaces\"},{\"id\":\"8ac96eb3-918b-4a36-bcc4-df50d8f46175\",\"version\":\"KqlParameterItem/1.0\",\"name\":\"Help\",\"label\":\"Show Help\",\"type\":10,\"isRequired\":true,\"query\":\"{\\\"version\\\":\\\"1.0.0\\\",\\\"content\\\":\\\"[\\\\r\\\\n { \\\\\\\"value\\\\\\\": \\\\\\\"Yes\\\\\\\", \\\\\\\"label\\\\\\\": \\\\\\\"Yes\\\\\\\"},\\\\r\\\\n {\\\\\\\"value\\\\\\\": \\\\\\\"No\\\\\\\", \\\\\\\"label\\\\\\\": \\\\\\\"No\\\\\\\", \\\\\\\"selected\\\\\\\":true }\\\\r\\\\n]\\\\r\\\\n\\\"}\",\"timeContext\":{\"durationMs\":2592000000},\"queryType\":8}],\"style\":\"above\",\"queryType\":0,\"resourceType\":\"microsoft.operationalinsights/workspaces\"},\"name\":\"TimeRange\"},{\"type\":1,\"content\":{\"json\":\"This workbook helps review your Exchange Security configuration.\\r\\nSelect your Exchange Organization and adjust the time range.\\r\\nBy default, the Help won't be displayed. To display the help, choose Yes on the toogle buttom \\\"Show Help\\\"\",\"style\":\"info\"},\"name\":\"text - 9\"},{\"type\":11,\"content\":{\"version\":\"LinkItem/1.0\",\"style\":\"tabs\",\"links\":[{\"id\":\"34188faf-7a02-4697-9b36-2afa986afc0f\",\"cellValue\":\"selected\",\"linkTarget\":\"parameter\",\"linkLabel\":\"Mailbox Access\",\"subTarget\":\"Delegation\",\"postText\":\"t\",\"style\":\"link\",\"icon\":\"3\",\"linkIsContextBlade\":true},{\"id\":\"be02c735-6150-4b6e-a386-b2b023e754e5\",\"cellValue\":\"selected\",\"linkTarget\":\"parameter\",\"linkLabel\":\"Exchange & AD Groups\",\"subTarget\":\"ExchAD\",\"style\":\"link\"},{\"id\":\"30dc6820-339d-4fa9-ad79-5d79816a5cab\",\"cellValue\":\"selected\",\"linkTarget\":\"parameter\",\"linkLabel\":\"Local Administrators\",\"subTarget\":\"Server\",\"style\":\"link\"},{\"id\":\"571fa2a4-1f1e-44a2-ada0-ccfb31b9abbb\",\"cellValue\":\"selected\",\"linkTarget\":\"parameter\",\"linkLabel\":\"Exchange Security Configuration\",\"subTarget\":\"SecConf\",\"style\":\"link\"},{\"id\":\"26c68d90-925b-4c3c-a837-e3cecd489b2d\",\"cellValue\":\"selected\",\"linkTarget\":\"parameter\",\"linkLabel\":\"Transport Configuration\",\"subTarget\":\"Transport\",\"style\":\"link\"},{\"id\":\"eb2888ca-7fa6-4e82-88db-1bb3663a801e\",\"cellValue\":\"selected\",\"linkTarget\":\"parameter\",\"linkLabel\":\"Workbook Summary\",\"subTarget\":\"Start\",\"style\":\"link\"}]},\"name\":\"TopMenuTabs\"},{\"type\":12,\"content\":{\"version\":\"NotebookGroup/1.0\",\"groupType\":\"editable\",\"items\":[{\"type\":1,\"content\":{\"json\":\"# Workbook goals\\r\\n\\r\\nThe goal of this workbook is to outline key security configurations of your Exchange on-premises environment.\\r\\n\\r\\nMost of Exchange organizations have were installed years ago (sometimes more than 10 years). Many configurations have been done and might not have been documented. For most environments, the core commitment was maintaining a high availability of the users’ mailboxes putting aside other consideration (even security considerations). Recommended security practices have also evolved since the first released and a regular review is necessary.\\r\\n\\r\\nThis workbook is designed to show your Exchange organization is configured with a security point of view. Indeed, some configurations easy to display as there are no UI available.\\r\\n\\r\\nFor each configuration, you will find explanations and recommendations when applicable.\\r\\n\\r\\n- This workbook does not pretend to show you every weak Security configurations, but the most common issues and known to be used by attackers. \\r\\n- It will not show you if you have been comprised, but will help you identify unexpected configuration.\\r\\n\\r\\n----\\r\\n\\r\\n## Quick reminder of how Exchange works\\r\\n\\r\\nDuring Exchange installation two very important groups are created :\\r\\n- Exchange Trusted Subsystem : Contain all the computer accounts for Exchange Server\\r\\n- Exchange Windows Permissions : Contain the group Exchange trusted Subsystem\\r\\n\\r\\nThese groups have :\\r\\n- Very high privileges in ALL AD domains including the root domain\\r\\n- Right on any Exchange including mailboxes\\r\\n\\r\\nAs each Exchange server computer account is member of Exchange Trusted Subsystem, it means by taking control of the computer account or being System on an Exchange server you will gain access to all the permissions granted to Exchange Trusted Subsystem and Exchange Windows Permissions.\\r\\n\\r\\nTo protect AD and Exchange, it is very important to ensure the following:\\r\\n- There is a very limited number of persons that are local Administrator on Exchange server\\r\\n- To protect user right like : Act part of the operating System, Debug\\r\\n\\r\\nEvery service account or application that have high privileges on Exchange need to be considered as sensitive\\r\\n\\r\\n** 💡 Exchange servers need to be considered as very sensitive servers**\\r\\n\\r\\n-----\\r\\n\\r\\n\\r\\n## Tabs\\r\\n\\r\\n### Mailbox Access\\r\\n\\r\\nThis tab will show you several top sensitive delegations that allow an account to access, modify, act as another user, search, export the content of a mailbox.\\r\\n\\r\\n### Exchange & AD Groups\\r\\n\\r\\nThis tab will show you the members of Exchange groups and Sensitive AD groups.\\r\\n\\r\\n### Local Administrators\\r\\n\\r\\nThis tab will show you the non standard content of the local Administrators group. Remember that a member of the local Administrators group can take control of the computer account of the server and then it will have all the permissions associated with Exchange Trusted Subsytem and Exchange Windows Permissions\\r\\n\\r\\nThe information is displayed with different views : \\r\\n- List of nonstandard users\\r\\n- Number of servers with a nonstandard a user\\r\\n- Nonstandard groups content\\r\\n- For each user important information are displayed like last logon, last password set, enabled\\r\\n\\r\\n### Exchange Security configuration\\r\\n\\r\\nThis tab will show you some important configuration for your Exchange Organization\\r\\n- Status of Admin Audit Log configuration\\r\\n- Status of POP and IMAP configuration : especially, is Plaintext Authentication configured ?\\r\\n- Nonstandard permissions on the Exchange container in the Configuration Partition\\r\\n\\r\\n### Transport Configuration\\r\\n\\r\\nThis tab will show you the configuration of the main Transport components\\r\\n- Receive Connectors configured with Anonymous and/or Open Relay\\r\\n- Remote Domain Autoforward configuration\\r\\n- Transport Rules configured with BlindCopyTo, SendTo, RedirectTo\\r\\n- Journal Rule and Journal Recipient configurations\\r\\n- Accepted Domains with *\\r\\n\\r\\n\"},\"name\":\"WorkbookInfo\"}]},\"conditionalVisibility\":{\"parameterName\":\"selected\",\"comparison\":\"isEqualTo\",\"value\":\"Start\"},\"name\":\"InformationTab\"},{\"type\":12,\"content\":{\"version\":\"NotebookGroup/1.0\",\"groupType\":\"editable\",\"title\":\"Security Configuration for the Exchange environment\",\"items\":[{\"type\":1,\"content\":{\"json\":\"This tab displays several security information regarding the organization or server's configuration.\"},\"name\":\"text - 12\"},{\"type\":1,\"content\":{\"json\":\"This section display the Exchange version and the CU installed.\\r\\n\\r\\nFor the latest build number, check this link : Exchange Build Numbers\\r\\n\\r\\nThis section is built from a file located in the public github repository.\\r\\nThe repository is manually updated by the team project when new CU/SU are released.\\r\\n\",\"style\":\"info\"},\"conditionalVisibility\":{\"parameterName\":\"Help\",\"comparison\":\"isEqualTo\",\"value\":\"Yes\"},\"name\":\"ServerVersionCheckHelp\"},{\"type\":3,\"content\":{\"version\":\"KqlItem/1.0\",\"query\":\"let ExchCUSU = externaldata (Productname:string, CU:string, SU:string, BuildNbAll:string, BuilCUNb:string, Major:string, CUBuildNb:string, SUBuildNb:string)[h\\\"https://raw.githubusercontent.com/nlepagnez/ESI-PublicContent/main/Operations/Watchlists/ExchBuildNumber.csv\\\"]with(format=\\\"csv\\\",ignoreFirstRecord=true)| project Productname,CU,SU,BuildNbAll,BuilCUNb,Major,CUBuildNb,SUBuildNb;\\r\\n//ExchangeConfiguration(SpecificSectionList=\\\"ExchangeServers\\\",SpecificConfigurationDate=\\\"{DateOfConfiguration:value}\\\",SpecificConfigurationEnv={EnvironmentList},Target = \\\"On-Premises\\\")\\r\\n//| extend VersionNumber = strcat(CmdletResultValue.AdminDisplayVersion.Major,\\\".\\\",CmdletResultValue.AdminDisplayVersion.Minor,\\\".\\\",CmdletResultValue.AdminDisplayVersion.Build)\\r\\nExchangeConfiguration(SpecificSectionList=\\\"ExchVersion\\\",SpecificConfigurationDate=\\\"{DateOfConfiguration:value}\\\",SpecificConfigurationEnv={EnvironmentList},Target = \\\"On-Premises\\\")\\r\\n| extend VersionNumber = tostring(CmdletResultValue.ProductVersion)\\r\\n| extend Server = tostring(ProcessedByServer_s)\\r\\n| extend CmdletResultType = tostring(CmdletResultType)\\r\\n| join kind= leftouter (ExchCUSU) on $left.VersionNumber == $right.BuildNbAll\\r\\n| distinct Server,VersionNumber,Productname,CU,SU,CmdletResultType\\r\\n| extend Server = strcat(\\\"💻 \\\",Server)\\r\\n| extend Productname = case ( VersionNumber startswith \\\"15.02\\\", \\\"Exchange 2019\\\", VersionNumber startswith \\\"15.01\\\", \\\"Exchange 2016\\\", VersionNumber startswith \\\"15.00\\\",\\\"Exchange 2013\\\", \\\"Exchange 2010\\\")\\r\\n| extend CU = iff(CmdletResultType <>\\\"Success\\\", \\\"Unable to retrieve information from server\\\", iff(CU <> \\\"\\\", CU, \\\"New CU or SU not yet in the List\\\"))\\r\\n| extend SU = iff(CmdletResultType <>\\\"Success\\\", \\\"Unable to retrieve information from server\\\", iff( SU <> \\\"\\\", SU, \\\"New CU or SU not yet in the List\\\"))\\r\\n|project-away CmdletResultType\\r\\n| sort by Server asc\\r\\n\",\"size\":1,\"showAnalytics\":true,\"title\":\"Exchange servers CU-SU level\",\"showExportToExcel\":true,\"queryType\":0,\"resourceType\":\"microsoft.operationalinsights/workspaces\",\"gridSettings\":{\"rowLimit\":10000,\"filter\":true}},\"customWidth\":\"50\",\"name\":\"ExchangeServersList\",\"styleSettings\":{\"showBorder\":true}},{\"type\":3,\"content\":{\"version\":\"KqlItem/1.0\",\"query\":\"let ExchCUSU = externaldata (Productname:string, CU:string, SU:string, BuildNbAll:string, BuilCUNb:string, Major:string, CUBuildNb:string, SUBuildNb:string)[h\\\"https://raw.githubusercontent.com/nlepagnez/ESI-PublicContent/main/Operations/Watchlists/ExchBuildNumber.csv\\\"]with(format=\\\"csv\\\",ignoreFirstRecord=true)| project Productname,CU,SU,BuildNbAll,BuilCUNb,Major,CUBuildNb,SUBuildNb;\\r\\nExchangeConfiguration(SpecificSectionList=\\\"ExchVersion\\\",SpecificConfigurationDate=\\\"{DateOfConfiguration:value}\\\",SpecificConfigurationEnv={EnvironmentList},Target = \\\"On-Premises\\\")\\r\\n//| extend VersionNumber = strcat(CmdletResultValue.AdminDisplayVersion.Major,\\\".\\\",CmdletResultValue.AdminDisplayVersion.Minor,\\\".\\\",CmdletResultValue.AdminDisplayVersion.Build)\\r\\n| extend VersionNumber = tostring(CmdletResultValue.ProductVersion)\\r\\n| extend Server = tostring(CmdletResultValue.Server)\\r\\n| join kind= leftouter (ExchCUSU) on $left.VersionNumber == $right.BuildNbAll\\r\\n| extend CU = iff( CU <> \\\"\\\", CU, \\\"New CU/SU not yet in the CU List\\\")\\r\\n| extend Version =strcat (VersionNumber,\\\"-\\\",CU,\\\"-\\\",SU)\\r\\n| summarize dcount(Server) by Version\",\"size\":0,\"showAnalytics\":true,\"title\":\"Version break down\",\"showExportToExcel\":true,\"queryType\":0,\"resourceType\":\"microsoft.operationalinsights/workspaces\",\"visualization\":\"piechart\"},\"customWidth\":\"50\",\"name\":\"ExchangeServerVersionPie\"},{\"type\":12,\"content\":{\"version\":\"NotebookGroup/1.0\",\"groupType\":\"editable\",\"title\":\"Admin Audit Log configuration\",\"items\":[{\"type\":1,\"content\":{\"json\":\"The Admin Audit log stores all the actions performed on Exchange Servers (except read actions such as Get/Test).\\r\\n\\r\\nAdmin Audit Log \\r\\n\\r\\nManage Admin Audit Log \\r\\n\\r\\n\\r\\nThis can be used to track \\r\\n- Unexpected behaviors\\r\\n- Who did a modification\\r\\n- Real actions performed by an account (the output could be used with to identify the necessary privileges)\\r\\n\\r\\nℹ️ Recommendations\\r\\n- Ensure that Admin Audit Log is not disabled\\r\\n- Ensure that critical Cmdlets have not been excluded\\r\\n- Ensure that AdminAuditLogCmdlets is set to * (list of audited Cmdlets)\\r\\n- Review the retention configuration for the Admin Audit Log content\",\"style\":\"info\"},\"conditionalVisibility\":{\"parameterName\":\"Help\",\"comparison\":\"isEqualTo\",\"value\":\"Yes\"},\"name\":\"AdminAuditHelp\"},{\"type\":1,\"content\":{\"json\":\"Here the main settings for the Admin Audit Log. Remember that AdminAudit log need to be enabled and no cmdlet should be excluded. Also check the retention limit.\"},\"name\":\"text - 0\"},{\"type\":3,\"content\":{\"version\":\"KqlItem/1.0\",\"query\":\"let SensitiveCMDLet = externaldata (Cmdlet:string, UserOriented:string, Parameters:string)[h\\\"https://raw.githubusercontent.com/nlepagnez/ESI-PublicContent/main/Operations/Watchlists/CmdletWatchlist.csv\\\"]with(format=\\\"csv\\\",ignoreFirstRecord=true)| project Cmdlet,UserOriented,Parameters;\\r\\nlet AAL = (ExchangeConfiguration(SpecificSectionList=\\\"AdminAuditLog\\\",SpecificConfigurationDate=\\\"{DateOfConfiguration:value}\\\",SpecificConfigurationEnv={EnvironmentList},Target = \\\"On-Premises\\\")\\r\\n| extend AdminAuditLogExcludedCmdlets = CmdletResultValue.AdminAuditLogExcludedCmdlets\\r\\n| project AdminAuditLogExcludedCmdlets);\\r\\nlet SentsitivecmdletTrack = toscalar(SensitiveCMDLet | where Cmdlet has_any ( AAL)| project Cmdlet);\\r\\nExchangeConfiguration(SpecificSectionList=\\\"AdminAuditLog\\\",SpecificConfigurationDate=\\\"{DateOfConfiguration:value}\\\",SpecificConfigurationEnv={EnvironmentList},Target = \\\"On-Premises\\\")\\r\\n| project CmdletResultValue\\r\\n| extend AdminAuditLogEnabled = iff(CmdletResultValue.AdminAuditLogEnabled == \\\"FALSE\\\", \\\" ❌ Disabled, High Risk\\\", \\\"✅ Enabled\\\")\\r\\n| extend AdminAuditLogAgeLimit = tostring(CmdletResultValue.AdminAuditLogAgeLimit)\\r\\n| extend AdminAuditLogAgeLimit = substring(AdminAuditLogAgeLimit,8)\\r\\n| extend AdminAuditLogAgeLimit =substring(AdminAuditLogAgeLimit,0,indexof(AdminAuditLogAgeLimit, ','))\\r\\n| extend AdminAuditLogAgeLimit = iff(toint(AdminAuditLogAgeLimit) == 0,strcat(\\\"❌ No AdminAuditlog recorded \\\",AdminAuditLogAgeLimit), iff(toint(AdminAuditLogAgeLimit) <=30,strcat(\\\"⚠️ Value to low except if exported \\\",AdminAuditLogAgeLimit), strcat(\\\"✅\\\",AdminAuditLogAgeLimit)))\\r\\n| extend AdminAuditLogCmdlets = tostring(CmdletResultValue.AdminAuditLogCmdlets)\\r\\n| extend AdminAuditLogCmdlets = substring(AdminAuditLogCmdlets,2)\\r\\n| extend AdminAuditLogCmdlets = substring(AdminAuditLogCmdlets,0,indexof(AdminAuditLogCmdlets, '\\\"]') )\\r\\n| extend AdminAuditLogCmdlets = replace_string(AdminAuditLogCmdlets,'\\\"',\\\"\\\")\\r\\n| extend Comment_AdminAuditLogCmdlets = iff( AdminAuditLogCmdlets == \\\"*\\\",\\\"✅ Default configuration\\\",\\\"❌ if AdminAuditLogCmdlets empty no logging else only AdminAuditLogCmdlets will be logged\\\")\\r\\n| extend AdminAuditLogExcludedCmdlets = tostring(CmdletResultValue.AdminAuditLogExcludedCmdlets)\\r\\n| extend AdminAuditLogExcludedCmdlets = substring(AdminAuditLogExcludedCmdlets,2)\\r\\n| extend AdminAuditLogExcludedCmdlets = substring(AdminAuditLogExcludedCmdlets,0,indexof(AdminAuditLogExcludedCmdlets, ']'))\\r\\n| extend AdminAuditLogExcludedCmdlets = replace_string(AdminAuditLogExcludedCmdlets,'\\\"',\\\"\\\")\\r\\n//| extend Cmdlet = replace_string(AdminAuditLogExcludedCmdlets,'\\\"',\\\"\\\")\\r\\n//| extend AALECSplit = tostring(split(AdminAuditLogExcludedCmdlets,\\\",\\\"))\\r\\n| project-away CmdletResultValue\\r\\n| extend Comment_AdminAuditLogExcludedCmdlet = case( isnotempty( SentsitivecmdletTrack ),\\\"❌ Some excluded CmdLets are part of Sensitive Cmdlets\\\",AdminAuditLogExcludedCmdlets <>\\\"\\\",\\\"⚠️ Some Cmdlets are excluded \\\",\\\"✅ No Excluded CmdLet\\\")\",\"size\":1,\"showAnalytics\":true,\"showExportToExcel\":true,\"queryType\":0,\"resourceType\":\"microsoft.operationalinsights/workspaces\",\"gridSettings\":{\"formatters\":[{\"columnMatch\":\"Comment_AdminAuditLogCmdlets\",\"formatter\":0,\"formatOptions\":{\"customColumnWidthSetting\":\"70ch\"}}],\"rowLimit\":10000,\"sortBy\":[{\"itemKey\":\"AdminAuditLogCmdlets\",\"sortOrder\":1}]},\"sortBy\":[{\"itemKey\":\"AdminAuditLogCmdlets\",\"sortOrder\":1}]},\"name\":\"query - 1\",\"styleSettings\":{\"showBorder\":true}}]},\"name\":\"group - 0Admin Audit Log configuration\"},{\"type\":12,\"content\":{\"version\":\"NotebookGroup/1.0\",\"groupType\":\"editable\"},\"name\":\"POP authentication configuration\"},{\"type\":1,\"content\":{\"json\":\"### POP authentication configuration\"},\"name\":\"text - 11\"},{\"type\":1,\"content\":{\"json\":\"If the POP Service is started, the LoginType should not set to Plaintext. This means that the password will be sent in clear on the network. As POP is enabled by default on all the mailboxes, this represents a high security risk.\\r\\n\\r\\nPOP Authentication\\r\\n- **PlainText** TLS encryption is not required on port 110. Usernames and passwords are sent unencrypted unless the underlying connection is encrypted by using TLS or SSL.\\r\\n- **PlainTextAuthentication** TLS encryption is not required on port 110. However, Basic authentication is permitted only on a port that uses TLS or SSL encryption.\\r\\n- **SecureLogin** Connection on port 110 must use TLS encryption before authenticating.\\r\\n\\r\\nℹ️ Recommendations\\r\\nDisable POP on all mailboxes except those who need to actually use this protocol.\\r\\nSet the authentication to SecureLogin or at least to PlainTextAuthentication and configure the application.\\r\\n\\r\\nIf the application is not able to perform this type of authentication:\\r\\n- Ensure that POP is disabled on all the mailboxes except those who really need it \\r\\n- Monitor the POP connections\\r\\n- Change the password of the application on a regular basis\\r\\n\\r\\nRecommended Reading : \\r\\n\\r\\nConfiguring Authentication for POP3 and IMAP4\\r\\n \\r\\n Set-PopSettings\\r\\n\\r\\n\\r\\nIn order to track mailboxes that are currently using POP\\r\\n- Enable POP logging\\r\\n- Set-PopSettings -Server SRV1 -ProtocolLogEnabled verbose\\r\\n- Several weeks later, analyze the log content\\r\\n- Default location : - Get-PopSettings -server SRV1 | fl server,*log*\\r\\n- Check for connection and authentication\\r\\n\",\"style\":\"info\"},\"conditionalVisibility\":{\"parameterName\":\"Help\",\"comparison\":\"isEqualTo\",\"value\":\"Yes\"},\"name\":\"PopServiceHelp\"},{\"type\":3,\"content\":{\"version\":\"KqlItem/1.0\",\"query\":\"ExchangeConfiguration(SpecificSectionList=\\\"PopSettings\\\",SpecificConfigurationDate=\\\"{DateOfConfiguration:value}\\\",SpecificConfigurationEnv={EnvironmentList},Target = \\\"On-Premises\\\")\\r\\n| extend ServerName = tostring(CmdletResultValue.Server.Name)\\r\\n| join kind = leftouter(ExchangeConfiguration(SpecificSectionList=\\\"POPIMAPServicesStatus\\\",SpecificConfigurationDate=\\\"{DateOfConfiguration:value}\\\",SpecificConfigurationEnv={EnvironmentList},Target = \\\"On-Premises\\\")\\r\\n| where CmdletResultValue.Name contains (\\\"MSExchangePop3\\\")\\r\\n| project ServerName= tostring(CmdletResultValue.Server), ServiceName=CmdletResultValue.Name, Status=CmdletResultValue.StatusString,StartupType=CmdletResultValue.StartTypeString\\r\\n| join (ExchangeConfiguration(SpecificSectionList=\\\"POPIMAPServicesStatus\\\",SpecificConfigurationDate=\\\"{DateOfConfiguration:value}\\\",SpecificConfigurationEnv={EnvironmentList},Target = \\\"On-Premises\\\")\\r\\n| where CmdletResultValue.Name contains (\\\"MSExchangePop3BE\\\" )\\r\\n| project ServerName= tostring(CmdletResultValue.Server), ServiceName=CmdletResultValue.Name, Status=CmdletResultValue.StatusString,StartupType=CmdletResultValue.StartTypeString) on ServerName) on ServerName\\r\\n| extend ServerName = tostring(CmdletResultValue.Server.Name)\\r\\n| extend LoginType = iff(CmdletResultValue.LoginType== 1 , \\\"⛔ PlainText, High Risk\\\", iff(CmdletResultValue.LoginType== 2, \\\"⚠️ PlainTextAuthentication\\\",\\\"✅ SecureLogin\\\"))\\r\\n| extend ProtocolLogEnabled = tostring(CmdletResultValue.ProtocolLogEnabled)\\r\\n| extend ServiceName = iff(tostring(ServiceName)==\\\"\\\", \\\"Service Status not retrieved\\\",tostring(ServiceName))\\r\\n| extend Status = tostring(Status)\\r\\n| extend BackendEndService= tostring(ServiceName1)\\r\\n| extend StartupType = tostring(StartupType)\\r\\n| extend BEStatus = tostring(Status1)\\r\\n| extend BEStartupType = tostring(StartupType1)\\r\\n| project ServerName,LoginType,ServiceName,Status,StartupType,BackendEndService,BEStatus,BEStartupType,ProtocolLogEnabled\\r\\n| sort by ServerName asc\",\"size\":1,\"showAnalytics\":true,\"title\":\"Pop Authentication : should not be set as Plaintext\",\"showExportToExcel\":true,\"queryType\":0,\"resourceType\":\"microsoft.operationalinsights/workspaces\",\"gridSettings\":{\"formatters\":[{\"columnMatch\":\"LoginType\",\"formatter\":5},{\"columnMatch\":\"Count\",\"formatter\":0,\"formatOptions\":{\"aggregation\":\"Sum\"}}],\"rowLimit\":10000,\"filter\":true,\"hierarchySettings\":{\"treeType\":1,\"groupBy\":[\"LoginType\"],\"finalBy\":\"LoginType\"}}},\"name\":\"PopSettingsQuery\",\"styleSettings\":{\"showBorder\":true}},{\"type\":1,\"content\":{\"json\":\"### IMAP authentication configuration\"},\"name\":\"IMAPTitle\"},{\"type\":1,\"content\":{\"json\":\"If the IMAP Service is started, the LoginType should not set to Plaintext. This means that the passwords will be sent in clear over the network. As IMAP is enabled by default on all the mailboxes, this is a high security risk.\\r\\n\\r\\nIMAP Authentication\\r\\n- **PlainText** TLS encryption is not required on port 110. User name and password are sent unencrypted unless the underlying connection is encrypted by using TLS or SSL.\\r\\n- **PlainTextAuthentication** TLS encryption is not required on port 143. However, Basic authentication is permitted only on a port that uses TLS or SSL encryption.\\r\\n- **SecureLogin** Connection on port 143 must use TLS encryption before authenticating.\\r\\n\\r\\nℹ️ Recommendations \\r\\nDisable IMAP on all mailboxes except those which needs to use this protocol. Set the authentication to SecureLogin or at least to PlainTextAuthentication and configure the application accordingly.\\r\\n\\r\\nIf the application is not able to perform this type of authentication:\\r\\n- Ensure that IMAP is disable on all the mailboxes except those who really need it \\r\\n- Monitor the connection\\r\\n- Regularly, change the password of the application\\r\\n\\r\\nRecommended Reading : \\r\\n\\r\\nConfiguring Authentication for POP3 and IMAP4\\r\\n\\r\\n Set-IMAPSettings\\r\\n\\r\\n\\r\\n\\r\\nIn order to track mailboxes that are currently using IMAP\\r\\n- Enable IMAP logging\\r\\n- Set-IMAPSettings -Server SRV1 -ProtocolLogEnabled verbose\\r\\n- Several weeks later, analyze the log content\\r\\n- Default location : Get-IMAPSettings -server SRV1 | fl server,*log*\\r\\n- Check for connection and authentication\\r\\n\",\"style\":\"info\"},\"conditionalVisibility\":{\"parameterName\":\"Help\",\"comparison\":\"isEqualTo\",\"value\":\"Yes\"},\"name\":\"IMAPHelp\"},{\"type\":3,\"content\":{\"version\":\"KqlItem/1.0\",\"query\":\"ExchangeConfiguration(SpecificSectionList=\\\"IMAPSettings\\\",SpecificConfigurationDate=\\\"{DateOfConfiguration:value}\\\",SpecificConfigurationEnv={EnvironmentList},Target = \\\"On-Premises\\\")\\r\\n| extend ServerName = tostring(CmdletResultValue.Server.Name)\\r\\n| join kind = leftouter(ExchangeConfiguration(SpecificSectionList=\\\"POPIMAPServicesStatus\\\",SpecificConfigurationDate=\\\"{DateOfConfiguration:value}\\\",SpecificConfigurationEnv={EnvironmentList},Target = \\\"On-Premises\\\")\\r\\n| where CmdletResultValue.Name contains (\\\"MSExchangeIMAP4\\\")\\r\\n| project ServerName= tostring(CmdletResultValue.Server), ServiceName=CmdletResultValue.Name, Status=CmdletResultValue.StatusString,StartupType=CmdletResultValue.StartTypeString\\r\\n| join (ExchangeConfiguration(SpecificSectionList=\\\"POPIMAPServicesStatus\\\",SpecificConfigurationDate=\\\"{DateOfConfiguration:value}\\\",SpecificConfigurationEnv={EnvironmentList},Target = \\\"On-Premises\\\")\\r\\n| where CmdletResultValue.Name contains (\\\"MSExchangeIMAP4BE\\\" )\\r\\n| project ServerName= tostring(CmdletResultValue.Server), ServiceName=CmdletResultValue.Name, Status=CmdletResultValue.StatusString,StartupType=CmdletResultValue.StartTypeString) on ServerName) on ServerName\\r\\n| extend ServerName = tostring(CmdletResultValue.Server.Name)\\r\\n| extend LoginType = iff(CmdletResultValue.LoginType== 1 , \\\"⛔ PlainText, High Risk\\\", iff(CmdletResultValue.LoginType== 2, \\\"⚠️ PlainTextAuthentication\\\",\\\"✅ SecureLogin\\\"))\\r\\n| extend ProtocolLogEnabled = tostring(CmdletResultValue.ProtocolLogEnabled)\\r\\n| extend ServiceName = iff(tostring(ServiceName)==\\\"\\\", \\\"Service Status not retrieved\\\",tostring(ServiceName))\\r\\n| extend Status = tostring(Status)\\r\\n| extend BackendEndService= tostring(ServiceName1)\\r\\n| extend StartupType = tostring(StartupType)\\r\\n| extend BEStatus = tostring(Status1)\\r\\n| extend BEStartupType = tostring(StartupType1)\\r\\n| project ServerName,LoginType,ServiceName,Status,StartupType,BackendEndService,BEStatus,BEStartupType,ProtocolLogEnabled\\r\\n| sort by ServerName asc\",\"size\":1,\"showAnalytics\":true,\"title\":\"IMAP Authentication : should not be set as Plaintext\",\"showExportToExcel\":true,\"queryType\":0,\"resourceType\":\"microsoft.operationalinsights/workspaces\",\"gridSettings\":{\"formatters\":[{\"columnMatch\":\"LoginType\",\"formatter\":5}],\"rowLimit\":10000,\"filter\":true,\"hierarchySettings\":{\"treeType\":1,\"groupBy\":[\"LoginType\"],\"finalBy\":\"LoginType\"}}},\"name\":\"IMAPSettingsQuery\",\"styleSettings\":{\"showBorder\":true}},{\"type\":12,\"content\":{\"version\":\"NotebookGroup/1.0\",\"groupType\":\"editable\",\"title\":\"Nonstandard permissions on Configuration Partitions\",\"items\":[{\"type\":1,\"content\":{\"json\":\"This section highlights nonstandard permissions on Configuration Partition for Exchange container. By selecting Yes for Generic All buttom only delegation set for Generic All will be display. Standard, Deny and inherited permissions have been removed\"},\"name\":\"text - 0\"},{\"type\":1,\"content\":{\"json\":\"During the lifetime of an Exchange Organization, many permissions may have been set on Exchange containers in the Configuration Partition.\\r\\nThis section displayed all the nonstandard permissions found on the most important Exchange containers :\\r\\n - Groups from legacy Exchange versions (Exchange Enterprise Servers, Exchange Domain Servers,...)\\r\\n - SID for deleted accounts\\r\\n - Old service accounts (that may not have been disabled or removed...)\\r\\n \\r\\nWhen an administrator run setup /prepareAD, his account will be granted Generic All at the top-level Exchange container\\r\\n\\r\\nBy default, this section only displayed the Generic All permissions.\\r\\n \\r\\nThis section is built by removing all the standard AD and Exchange groups.\\r\\n\\r\\n Exchange 2013 deployment permissions reference\\r\\n \\r\\n\",\"style\":\"info\"},\"conditionalVisibility\":{\"parameterName\":\"Help\",\"comparison\":\"isEqualTo\",\"value\":\"Yes\"},\"name\":\"text - 3\"},{\"type\":9,\"content\":{\"version\":\"KqlParameterItem/1.0\",\"parameters\":[{\"id\":\"80f9134a-420f-47c9-b171-1ca8e72efa3e\",\"version\":\"KqlParameterItem/1.0\",\"name\":\"GenericAll\",\"type\":10,\"isRequired\":true,\"jsonData\":\"[\\r\\n { \\\"value\\\": \\\"True\\\", \\\"label\\\": \\\"Yes\\\" },\\r\\n { \\\"value\\\": \\\"True,False\\\", \\\"label\\\": \\\"No\\\", \\\"selected\\\":true }\\r\\n]\"},{\"id\":\"29e2005c-3bd4-4bb8-be63-053d11abe1d4\",\"version\":\"KqlParameterItem/1.0\",\"name\":\"NonStandardPermissions\",\"type\":10,\"isRequired\":true,\"typeSettings\":{\"showDefault\":false},\"jsonData\":\"[\\r\\n { \\\"value\\\": \\\"True\\\", \\\"label\\\": \\\"Yes\\\", \\\"selected\\\":true },\\r\\n { \\\"value\\\": \\\"True,False\\\", \\\"label\\\": \\\"No\\\"}\\r\\n]\"}],\"style\":\"pills\",\"queryType\":0,\"resourceType\":\"microsoft.operationalinsights/workspaces\"},\"name\":\"parameters - 1\"},{\"type\":3,\"content\":{\"version\":\"KqlItem/1.0\",\"query\":\"let StandardGroup = dynamic([\\\"Authenticated Users\\\", \\\"Domain Admins\\\", \\\"Enterprise Admins\\\",\\\"Schema Admins\\\", \\\"Exchange Trusted Subsystem\\\", \\\"Exchange Servers\\\",\\\"Organization Management\\\", \\\"Public Folder Management\\\",\\\"Delegated Setup\\\", \\\"ANONYMOUS LOGON\\\", \\\"NETWORK SERVICE\\\", \\\"SYSTEM\\\", \\\"Everyone\\\",\\\"Managed Availability Servers\\\"]);\\r\\nlet Exchsrv =ExchangeConfiguration(SpecificSectionList=\\\"ExchangeServers\\\",SpecificConfigurationDate=\\\"{DateOfConfiguration:value}\\\",SpecificConfigurationEnv={EnvironmentList},Target = \\\"On-Premises\\\")| summarize make_list(CmdletResultValue.Name);\\r\\nExchangeConfiguration(SpecificSectionList=\\\"PartConfPerm\\\",SpecificConfigurationDate=\\\"{DateOfConfiguration:value}\\\",SpecificConfigurationEnv={EnvironmentList},Target = \\\"On-Premises\\\")\\r\\n| project CmdletResultValue\\r\\n| where CmdletResultValue.Deny !contains \\\"True\\\" and CmdletResultValue.IsInherited !contains \\\"True\\\"\\r\\n| where (CmdletResultValue.AccessRights == \\\"[983551]\\\") in ({GenericAll})\\r\\n| where not (CmdletResultValue.UserString has_any (StandardGroup)) in ({NonStandardPermissions})\\r\\n| where not (CmdletResultValue.UserString has_any (Exchsrv))in ({NonStandardPermissions})\\r\\n| extend Name = tostring(CmdletResultValue.Identity.Name)\\r\\n| extend Account = tostring(CmdletResultValue.UserString )\\r\\n| extend AccessRights = iff (tostring(CmdletResultValue.AccessRightsString) contains \\\"GenericAll\\\", strcat (\\\"❌ \\\",tostring(CmdletResultValue.AccessRightsString)), tostring(CmdletResultValue.AccessRightsString))\\r\\n| extend ExtendedRights = iff (tostring(CmdletResultValue.ExtendedRightsString) contains \\\"-As\\\", strcat (\\\"❌ \\\",tostring(CmdletResultValue.ExtendedRightsString)), tostring(CmdletResultValue.ExtendedRightsString))\\r\\n| extend InheritanceType = tostring(CmdletResultValue.InheritanceType)\\r\\n| extend DN = tostring(CmdletResultValue.Identity.DistinguishedName)\\r\\n| project-away CmdletResultValue\\r\\n| sort by DN desc\",\"size\":1,\"showAnalytics\":true,\"showExportToExcel\":true,\"queryType\":0,\"resourceType\":\"microsoft.operationalinsights/workspaces\",\"gridSettings\":{\"rowLimit\":10000,\"filter\":true,\"sortBy\":[{\"itemKey\":\"AccessRights\",\"sortOrder\":1}]},\"sortBy\":[{\"itemKey\":\"AccessRights\",\"sortOrder\":1}]},\"name\":\"query - 2\",\"styleSettings\":{\"showBorder\":true}}]},\"name\":\"Nonstandard permissions on Configuration Partitions\"}]},\"conditionalVisibility\":{\"parameterName\":\"selected\",\"comparison\":\"isEqualTo\",\"value\":\"SecConf\"},\"name\":\"Security Configuration for the Exchange environment\"},{\"type\":12,\"content\":{\"version\":\"NotebookGroup/1.0\",\"groupType\":\"editable\",\"items\":[{\"type\":1,\"content\":{\"json\":\"This tab displays important security configurations that allow access to all or partial mailboxes' content - Direct delegations are not listed - Example :
\\r\\n- Permissions Full Access \\r\\n- Permission on mailboxes folders\\r\\n\"},\"name\":\"text - 6\"},{\"type\":3,\"content\":{\"version\":\"KqlItem/1.0\",\"query\":\"ExchangeConfiguration(SpecificSectionList=\\\"MRA\\\",SpecificConfigurationDate=\\\"{DateOfConfiguration:value}\\\",SpecificConfigurationEnv={EnvironmentList})\\r\\n//| where CmdletResultValue.Name !contains \\\"Deleg\\\" and CmdletResultValue.RoleAssigneeName != \\\"Hygiene Management\\\" and CmdletResultValue.RoleAssigneeName != \\\"Exchange Online-ApplicationAccount\\\" and CmdletResultValue.RoleAssigneeName != \\\"Discovery Management\\\"\\r\\n| where CmdletResultValue.Name !contains \\\"Deleg\\\" \\r\\n| where CmdletResultValue.RoleAssigneeName !in (\\\"Hygiene Management\\\",\\\"Exchange Online-ApplicationAccount\\\",\\\"Discovery Management\\\")\\r\\n| where CmdletResultValue.Role.Name contains \\\"Export\\\" or CmdletResultValue.Role.Name contains \\\"Impersonation\\\" or (CmdletResultValue.Role.Name contains \\\"Search\\\" and CmdletResultValue.Role.Name !contains \\\"MailboxSearchApplication\\\")\\r\\n| summarize dcount(tostring(CmdletResultValue.RoleAssigneeName)) by role=tostring(CmdletResultValue.Role.Name)\",\"size\":1,\"showAnalytics\":true,\"title\":\"Number of delegations for sensitive RBAC roles\",\"showExportToExcel\":true,\"queryType\":0,\"resourceType\":\"microsoft.operationalinsights/workspaces\",\"visualization\":\"tiles\",\"tileSettings\":{\"titleContent\":{\"columnMatch\":\"role\",\"formatter\":1},\"leftContent\":{\"columnMatch\":\"dcount_CmdletResultValue_RoleAssigneeName\",\"formatter\":12,\"formatOptions\":{\"palette\":\"auto\"},\"numberFormat\":{\"unit\":17,\"options\":{\"style\":\"decimal\",\"maximumFractionDigits\":2,\"maximumSignificantDigits\":3}}},\"showBorder\":true,\"sortCriteriaField\":\"role\",\"sortOrderField\":1}},\"name\":\"MRAQuery\"},{\"type\":12,\"content\":{\"version\":\"NotebookGroup/1.0\",\"groupType\":\"editable\",\"title\":\"Application Impersonation Role\",\"items\":[{\"type\":1,\"content\":{\"json\":\"This delegation allows the delegated account to access and modify the content of every mailboxes using EWS.\"},\"name\":\"text - 0\"},{\"type\":1,\"content\":{\"json\":\"**ApplicationImpersonation** is a RBAC role that allows access (read and modify) to the content of all mailboxes using EWS. \\r\\n\\r\\n⚡ This role is very powerfull.\\r\\n\\r\\nIt should be carefully delegated. When a delegation is necessary, RBAC scopes should be configured to limit the list of impacted mailboxes.\\r\\n\\r\\nHelp for the role Application Impersonation\\r\\n\\r\\nIt is common (but not recommended) to see service accounts from backup solution, antivirus software, MDM... with this delegation.\\r\\n\\r\\nNote that the default configuration to the group Hygiene Management is excluded. This group is a sensitive group. Remember to monitor the content of this group.\",\"style\":\"info\"},\"conditionalVisibility\":{\"parameterName\":\"Help\",\"comparison\":\"isEqualTo\",\"value\":\"Yes\"},\"name\":\"text - 2\"},{\"type\":3,\"content\":{\"version\":\"KqlItem/1.0\",\"query\":\"ExchangeConfiguration(SpecificSectionList=\\\"MRA\\\",SpecificConfigurationDate=\\\"{DateOfConfiguration:value}\\\",SpecificConfigurationEnv={EnvironmentList})\\r\\n| where CmdletResultValue.Role.Name contains \\\"Impersonation\\\" and CmdletResultValue.RoleAssigneeName != \\\"Hygiene Management\\\" and CmdletResultValue.Name !contains \\\"Deleg\\\"\\r\\n//| extend RoleAssigneeName = tostring(CmdletResultValue.RoleAssigneeName)\\r\\n| extend RoleAssigneeType = case(CmdletResultValue.RoleAssigneeType== \\\"0\\\" or CmdletResultValue.RoleAssigneeType== \\\"2\\\" , \\\"User\\\", CmdletResultValue.RoleAssigneeType== \\\"10\\\",\\\"Group\\\",\\\"LinkedGroup\\\")\\r\\n| extend CustomRecipientWriteScope = tostring(CmdletResultValue.CustomRecipientWriteScope.Name)\\r\\n| extend CustomConfigWriteScope = tostring(CmdletResultValue.CustomConfigWriteScope.Name)\\r\\n| extend RecipientWriteScope = case(CmdletResultValue.RecipientWriteScope==\\\"0\\\",\\\"None\\\",CmdletResultValue.RecipientWriteScope==\\\"2\\\",\\\"Organization\\\",CmdletResultValue.RecipientWriteScope==\\\"3\\\",\\\"MyGAL\\\", CmdletResultValue.RecipientWriteScope==\\\"4\\\",\\\"Self\\\",CmdletResultValue.RecipientWriteScope==\\\"7\\\", \\\"CustomRecipientScope\\\",CmdletResultValue.RecipientWriteScope==\\\"8\\\",\\\"MyDistributionGroups\\\",\\\"NotApplicable\\\")\\r\\n| extend ConfigWriteScope = case(CmdletResultValue.ConfigWriteScope==\\\"0\\\",\\\"None\\\",CmdletResultValue.ConfigWriteScope==\\\"7\\\",\\\"CustomConfigScope\\\",CmdletResultValue.ConfigWriteScope==\\\"10\\\",\\\"OrganizationConfig\\\",\\\"NotApplicable\\\")\\r\\n| extend ConfigReadScope = iff(CmdletResultValue.ConfigReadScope == \\\"0\\\" , \\\"None\\\", \\\"OrganizationConfig\\\")\\r\\n| extend RecipientReadScope = case(CmdletResultValue.RecipientReadScope==\\\"2\\\",\\\"Organization\\\",CmdletResultValue.RecipientReadScope==\\\"3\\\",\\\"MyGAL\\\",CmdletResultValue.RecipientReadScope==\\\"4\\\",\\\"Self\\\",\\\"NotApplicable\\\")\\r\\n| extend ManagementRoleAssignement = tostring(CmdletResultValue.Name)\\r\\n| extend Status= tostring(CmdletResultValue.Enabled)\\r\\n| extend RoleAssignmentDelegationType = iff(CmdletResultValue.RoleAssignmentDelegationType ==\\\"6\\\" , \\\"Delegating\\\", \\\"Regular\\\") \\r\\n| extend RoleAssigneeName = iff( RoleAssigneeType == \\\"User\\\", strcat(\\\"🧑‍🦰 \\\",tostring(CmdletResultValue.RoleAssigneeName)), strcat(\\\"👪 \\\", tostring(CmdletResultValue.RoleAssigneeName)) )\\r\\n| project RoleAssigneeName, RoleAssigneeType, Status,CustomRecipientWriteScope, CustomConfigWriteScope, RecipientWriteScope, ConfigWriteScope, ConfigReadScope, RecipientReadScope, ManagementRoleAssignement, RoleAssignmentDelegationType, WhenCreated, WhenChanged\",\"size\":1,\"showAnalytics\":true,\"showExportToExcel\":true,\"queryType\":0,\"resourceType\":\"microsoft.operationalinsights/workspaces\",\"gridSettings\":{\"rowLimit\":10000,\"filter\":true}},\"name\":\"query - 1\",\"styleSettings\":{\"showBorder\":true}}]},\"name\":\"Application Impersonation Role\"},{\"type\":12,\"content\":{\"version\":\"NotebookGroup/1.0\",\"groupType\":\"editable\",\"title\":\"Mailbox Import Export Role\",\"items\":[{\"type\":1,\"content\":{\"json\":\"This delegation allows to export the content all mailboxes in a scope in PST file.\\r\\nExcluded from the result as default configuration :\\r\\nDelegating delegation to Organization Management\\r\\n\"},\"name\":\"text - 0\"},{\"type\":1,\"content\":{\"json\":\"**Mailbox Import Export** is a RBAC role that allows an account to export the content of any maibox in a PST. It also allows search in all mailboxes.\\r\\n\\r\\n⚡ This role is very powerfull.\\r\\n\\r\\nBy default, this role is not delegated to any user or group. The members of the group Organization Management by default do not have this role but are able to delegate it.\\r\\n\\r\\nHelp for the role Mailbox Import Export\\r\\n\\r\\nℹ️ Recommendations\\r\\n\\r\\nIf you temporarily need this delegation, consider the following:\\r\\n- create an empty group with this delegation\\r\\n- monitor the group content and alert when the group modified\\r\\n- add administrators in this group only for a short period of time.\\r\\n\",\"style\":\"info\"},\"conditionalVisibility\":{\"parameterName\":\"Help\",\"comparison\":\"isEqualTo\",\"value\":\"Yes\"},\"name\":\"ExportRoleHelp\"},{\"type\":3,\"content\":{\"version\":\"KqlItem/1.0\",\"query\":\"ExchangeConfiguration(SpecificSectionList=\\\"MRA\\\",SpecificConfigurationDate=\\\"{DateOfConfiguration:value}\\\",SpecificConfigurationEnv={EnvironmentList},Target = \\\"On-Premises\\\")\\r\\n| where CmdletResultValue.Role.Name contains \\\"export\\\" and CmdletResultValue.Name !contains \\\"Deleg\\\"\\r\\n| extend RoleAssigneeType = case(CmdletResultValue.RoleAssigneeType== \\\"0\\\" or CmdletResultValue.RoleAssigneeType== \\\"2\\\" , \\\"User\\\", CmdletResultValue.RoleAssigneeType== \\\"10\\\",\\\"Group\\\",\\\"LinkedGroup\\\")\\r\\n| extend CustomRecipientWriteScope = tostring(CmdletResultValue.CustomRecipientWriteScope.Name)\\r\\n| extend CustomConfigWriteScope = tostring(CmdletResultValue.CustomConfigWriteScope.Name)\\r\\n| extend RecipientWriteScope = case(CmdletResultValue.RecipientWriteScope==\\\"0\\\",\\\"None\\\",CmdletResultValue.RecipientWriteScope==\\\"2\\\",\\\"Organization\\\",CmdletResultValue.RecipientWriteScope==\\\"3\\\",\\\"MyGAL\\\", CmdletResultValue.RecipientWriteScope==\\\"4\\\",\\\"Self\\\",CmdletResultValue.RecipientWriteScope==\\\"7\\\", \\\"CustomRecipientScope\\\",CmdletResultValue.RecipientWriteScope==\\\"8\\\",\\\"MyDistributionGroups\\\",\\\"NotApplicable\\\")\\r\\n| extend ConfigWriteScope = case(CmdletResultValue.ConfigWriteScope==\\\"0\\\",\\\"None\\\",CmdletResultValue.ConfigWriteScope==\\\"7\\\",\\\"CustomConfigScope\\\",CmdletResultValue.ConfigWriteScope==\\\"10\\\",\\\"OrganizationConfig\\\",\\\"NotApplicable\\\")\\r\\n| extend ConfigReadScope = iff(CmdletResultValue.ConfigReadScope == \\\"0\\\" , \\\"None\\\", \\\"OrganizationConfig\\\")\\r\\n| extend RecipientReadScope = case(CmdletResultValue.RecipientReadScope==\\\"2\\\",\\\"Organization\\\",CmdletResultValue.RecipientReadScope==\\\"3\\\",\\\"MyGAL\\\",CmdletResultValue.RecipientReadScope==\\\"4\\\",\\\"Self\\\",\\\"NotApplicable\\\")\\r\\n| extend ManagementRoleAssignement = tostring(CmdletResultValue.Name)\\r\\n| extend Status= tostring(CmdletResultValue.Enabled)\\r\\n| extend RoleAssignmentDelegationType = iff(CmdletResultValue.RoleAssignmentDelegationType ==\\\"6\\\" , \\\"Delegating\\\", \\\"Regular\\\") \\r\\n| extend RoleAssigneeName = iff( RoleAssigneeType == \\\"User\\\", strcat(\\\"🧑‍🦰 \\\",tostring(CmdletResultValue.RoleAssigneeName)), strcat(\\\"👪 \\\", tostring(CmdletResultValue.RoleAssigneeName)) )\\r\\n| project RoleAssigneeName, RoleAssigneeType,Status, CustomRecipientWriteScope, CustomConfigWriteScope, RecipientWriteScope, ConfigWriteScope, ConfigReadScope, RecipientReadScope, ManagementRoleAssignement, RoleAssignmentDelegationType, WhenCreated, WhenChanged\",\"size\":1,\"showAnalytics\":true,\"showExportToExcel\":true,\"queryType\":0,\"resourceType\":\"microsoft.operationalinsights/workspaces\",\"gridSettings\":{\"rowLimit\":10000,\"filter\":true,\"sortBy\":[{\"itemKey\":\"ConfigWriteScope\",\"sortOrder\":1}]},\"sortBy\":[{\"itemKey\":\"ConfigWriteScope\",\"sortOrder\":1}]},\"name\":\"query - 1\",\"styleSettings\":{\"showBorder\":true}}]},\"name\":\"Mailbox Import Export Role\"},{\"type\":12,\"content\":{\"version\":\"NotebookGroup/1.0\",\"groupType\":\"editable\",\"title\":\"Mailbox Search Role\",\"items\":[{\"type\":1,\"content\":{\"json\":\"This delegation allows to search inside all or in a scope of mailboxes and export the result in PST.\\r\\nExcluded from the result as default configuration :\\r\\nDelegating delegation to Organization Management\\r\\nExchange Online-ApplicationAccount\\r\\nDiscovery Management has been excluded\\r\\n\"},\"name\":\"text - 0\"},{\"type\":1,\"content\":{\"json\":\"**Mailbox Search** is an RBAC role that allows an account to search in any mailbox and export the results to a PST.\\r\\n\\r\\n⚡ This role is very powerful.\\r\\n\\r\\nBy default, this role is only delegated to the group Discovery Management. The members of the group Organization Management do not have this role but are able to delegate it.\\r\\n\\r\\nHelp for the role Mailbox Search\\r\\n\\r\\nℹ️ Recommendations\\r\\n\\r\\nIf you temporarily need this delegation, consider the following:\\r\\n\\r\\n- add the administrators in the Discovery Management group\\r\\n- monitor the group content and alert when the group modified\\r\\n- add administrators in this group only for a short period of time\\r\\n\",\"style\":\"info\"},\"conditionalVisibility\":{\"parameterName\":\"Help\",\"comparison\":\"isEqualTo\",\"value\":\"Yes\"},\"name\":\"SearchRBACHelp\"},{\"type\":3,\"content\":{\"version\":\"KqlItem/1.0\",\"query\":\"ExchangeConfiguration(SpecificSectionList=\\\"MRA\\\",SpecificConfigurationDate=\\\"{DateOfConfiguration:value}\\\",SpecificConfigurationEnv={EnvironmentList},Target = \\\"On-Premises\\\")\\r\\n| where CmdletResultValue.Role.Name contains \\\"search\\\" and CmdletResultValue.Name !contains \\\"Deleg\\\"\\r\\n| where CmdletResultValue.RoleAssigneeName != \\\"Exchange Online-ApplicationAccount\\\" and CmdletResultValue.RoleAssigneeName != \\\"Discovery Management\\\"\\r\\n| extend RoleAssigneeType = case(CmdletResultValue.RoleAssigneeType== \\\"0\\\" or CmdletResultValue.RoleAssigneeType== \\\"2\\\" , \\\"User\\\", CmdletResultValue.RoleAssigneeType== \\\"10\\\",\\\"Group\\\",\\\"LinkedGroup\\\")\\r\\n| extend CustomRecipientWriteScope = tostring(CmdletResultValue.CustomRecipientWriteScope.Name)\\r\\n| extend CustomConfigWriteScope = tostring(CmdletResultValue.CustomConfigWriteScope.Name)\\r\\n| extend RecipientWriteScope = case(CmdletResultValue.RecipientWriteScope==\\\"0\\\",\\\"None\\\",CmdletResultValue.RecipientWriteScope==\\\"2\\\",\\\"Organization\\\",CmdletResultValue.RecipientWriteScope==\\\"3\\\",\\\"MyGAL\\\", CmdletResultValue.RecipientWriteScope==\\\"4\\\",\\\"Self\\\",CmdletResultValue.RecipientWriteScope==\\\"7\\\", \\\"CustomRecipientScope\\\",CmdletResultValue.RecipientWriteScope==\\\"8\\\",\\\"MyDistributionGroups\\\",\\\"NotApplicable\\\")\\r\\n| extend ConfigWriteScope = case(CmdletResultValue.ConfigWriteScope==\\\"0\\\",\\\"None\\\",CmdletResultValue.ConfigWriteScope==\\\"7\\\",\\\"CustomConfigScope\\\",CmdletResultValue.ConfigWriteScope==\\\"10\\\",\\\"OrganizationConfig\\\",\\\"NotApplicable\\\")\\r\\n| extend ConfigReadScope = iff(CmdletResultValue.ConfigReadScope == \\\"0\\\" , \\\"None\\\", \\\"OrganizationConfig\\\")\\r\\n| extend RecipientReadScope = case(CmdletResultValue.RecipientReadScope==\\\"2\\\",\\\"Organization\\\",CmdletResultValue.RecipientReadScope==\\\"3\\\",\\\"MyGAL\\\",CmdletResultValue.RecipientReadScope==\\\"4\\\",\\\"Self\\\",\\\"NotApplicable\\\")\\r\\n| extend ManagementRoleAssignement = tostring(CmdletResultValue.Name)\\r\\n| extend Status= tostring(CmdletResultValue.Enabled)\\r\\n| extend RoleAssignmentDelegationType = iff(CmdletResultValue.RoleAssignmentDelegationType ==\\\"6\\\" , \\\"Delegating\\\", \\\"Regular\\\") \\r\\n| extend RoleAssigneeName = iff( RoleAssigneeType == \\\"User\\\", strcat(\\\"🧑‍🦰 \\\",tostring(CmdletResultValue.RoleAssigneeName)), strcat(\\\"👪 \\\", tostring(CmdletResultValue.RoleAssigneeName)) )\\r\\n| project RoleAssigneeName, RoleAssigneeType, Status,CustomRecipientWriteScope, CustomConfigWriteScope, RecipientWriteScope, ConfigWriteScope, ConfigReadScope, RecipientReadScope, ManagementRoleAssignement, RoleAssignmentDelegationType, WhenCreated, WhenChanged\",\"size\":1,\"showAnalytics\":true,\"showExportToExcel\":true,\"queryType\":0,\"resourceType\":\"microsoft.operationalinsights/workspaces\",\"gridSettings\":{\"rowLimit\":10000,\"filter\":true,\"sortBy\":[{\"itemKey\":\"ConfigWriteScope\",\"sortOrder\":1}]},\"sortBy\":[{\"itemKey\":\"ConfigWriteScope\",\"sortOrder\":1}]},\"name\":\"query - 1\",\"styleSettings\":{\"showBorder\":true}}]},\"name\":\"Mailbox Search Role\"},{\"type\":12,\"content\":{\"version\":\"NotebookGroup/1.0\",\"groupType\":\"editable\",\"title\":\"ReceiveAs/SendAs Extended Right on databases\",\"items\":[{\"type\":1,\"content\":{\"json\":\"These are delegations at the database level.\\r\\n\\r\\n**Receive As Extended Right on database's objects in the Configuration**\\r\\n\\r\\nWhen an account has **ReceiveAs** permissions on a database's object, it can open and view the content of any mailboxes on that database.\\r\\n\\r\\nHelp for Receive As Permission\\r\\n\\r\\n\\r\\nℹ️ Recommendations\\r\\n\\r\\nDo not set this permission on databases. When an application requires this permission, ensure that the application account’s password is well protected and known by a very limited number of person.Change the password as often as possible.\\r\\n\\r\\n**Send As Extended Right on database objects in the Configuration**\\r\\n\\r\\n\\r\\nWhen an account has **SendAs** permissions on a database's object, it can send messages from all the mailboxes contained in this database. The messages that are sent from a mailbox will appear as if the mailbox owner sent them.\\r\\n\\r\\nHelp for Send As Permission\\r\\n\\r\\n\\r\\nℹ️ Recommendations\\r\\n\\r\\nDo not set this permission on databases. When an application requires this permission, ensure that the application account’s password is well protected and known by a very limited number of person.Change the password as often as possible.\\r\\n\",\"style\":\"info\"},\"conditionalVisibility\":{\"parameterName\":\"Help\",\"comparison\":\"isEqualTo\",\"value\":\"Yes\"},\"name\":\"SendAsHelp\"},{\"type\":3,\"content\":{\"version\":\"KqlItem/1.0\",\"query\":\"ExchangeConfiguration(SpecificSectionList=\\\"MailboxDatabaseReceiveAs\\\",SpecificConfigurationDate=\\\"{DateOfConfiguration:value}\\\",SpecificConfigurationEnv={EnvironmentList},Target = \\\"On-Premises\\\")\\r\\n| union ExchangeConfiguration(SpecificSectionList=\\\"MailboxDatabaseSendAs\\\",SpecificConfigurationDate=\\\"{DateOfConfiguration:value}\\\",SpecificConfigurationEnv={EnvironmentList},Target = \\\"On-Premises\\\")\\r\\n| where CmdletResultValue <> \\\"{'Error':'EmptyResult'}\\\"\\r\\n| summarize dcount(tostring(CmdletResultValue.UserString)) by iff( tostring(Section) contains \\\"MailboxDatabaseReceiveAs\\\",\\\"ReceiveAs Unique Acct\\\",\\\"SendAs Unique Acct\\\")\",\"size\":1,\"showAnalytics\":true,\"title\":\"Number of accounts with ReceiveAs/SendAs delegations\",\"showExportToExcel\":true,\"queryType\":0,\"resourceType\":\"microsoft.operationalinsights/workspaces\",\"visualization\":\"tiles\",\"tileSettings\":{\"titleContent\":{\"columnMatch\":\"Column1\",\"formatter\":1},\"leftContent\":{\"columnMatch\":\"dcount_CmdletResultValue_UserString\",\"formatter\":12,\"formatOptions\":{\"palette\":\"auto\"},\"numberFormat\":{\"unit\":17,\"options\":{\"style\":\"decimal\",\"maximumFractionDigits\":2,\"maximumSignificantDigits\":3}}},\"showBorder\":true,\"sortCriteriaField\":\"Column1\",\"sortOrderField\":1}},\"customWidth\":\"50\",\"name\":\"ReceiveAsUsersTiles\"},{\"type\":3,\"content\":{\"version\":\"KqlItem/1.0\",\"query\":\"ExchangeConfiguration(SpecificSectionList=\\\"MailboxDatabaseReceiveAs\\\",SpecificConfigurationDate=\\\"{DateOfConfiguration:value}\\\",SpecificConfigurationEnv={EnvironmentList},Target = \\\"On-Premises\\\")\\r\\n| union ExchangeConfiguration(SpecificSectionList=\\\"MailboxDatabaseSendAs\\\",SpecificConfigurationDate=\\\"{DateOfConfiguration:value}\\\",SpecificConfigurationEnv={EnvironmentList},Target = \\\"On-Premises\\\")\\r\\n| where CmdletResultValue <> \\\"{'Error':'EmptyResult'}\\\"\\r\\n| summarize dcount(tostring(CmdletResultValue.Identity.Name)) by iff( tostring(Section) contains \\\"MailboxDatabaseReceiveAs\\\",\\\"ReceiveAs Unique DB\\\",\\\"SendAs Unique DB\\\")\",\"size\":1,\"showAnalytics\":true,\"title\":\"ReceiveAs/SendAs database delegations\",\"color\":\"purple\",\"showExportToExcel\":true,\"queryType\":0,\"resourceType\":\"microsoft.operationalinsights/workspaces\",\"visualization\":\"tiles\",\"tileSettings\":{\"titleContent\":{\"columnMatch\":\"Column1\",\"formatter\":1},\"leftContent\":{\"columnMatch\":\"dcount_CmdletResultValue_Identity_Name\",\"formatter\":12,\"formatOptions\":{\"palette\":\"auto\"},\"numberFormat\":{\"unit\":17,\"options\":{\"style\":\"decimal\",\"maximumFractionDigits\":2,\"maximumSignificantDigits\":3}}},\"showBorder\":true,\"sortCriteriaField\":\"Column1\",\"sortOrderField\":1}},\"customWidth\":\"50\",\"name\":\"ReceiveAsTiles\",\"styleSettings\":{\"margin\":\"25\"}},{\"type\":3,\"content\":{\"version\":\"KqlItem/1.0\",\"query\":\"ExchangeConfiguration(SpecificSectionList=\\\"MailboxDatabaseReceiveAs\\\",SpecificConfigurationDate=\\\"{DateOfConfiguration:value}\\\",SpecificConfigurationEnv={EnvironmentList},Target = \\\"On-Premises\\\")\\r\\n| project CmdletResultValue\\r\\n| where CmdletResultValue <> \\\"{'Error':'EmptyResult'}\\\"\\r\\n| extend Account = tostring(CmdletResultValue.UserString)\\r\\n| extend DatabaseName = tostring(CmdletResultValue.Identity.Name)\\r\\n| summarize Count =count() by Account,DatabaseName\\r\\n| project Account,Count,DatabaseName\\r\\n\",\"size\":1,\"showAnalytics\":true,\"title\":\"ReceiveAs Extended Right on databases\",\"noDataMessage\":\"No Receive-As delegation\",\"noDataMessageStyle\":3,\"showExportToExcel\":true,\"queryType\":0,\"resourceType\":\"microsoft.operationalinsights/workspaces\",\"gridSettings\":{\"formatters\":[{\"columnMatch\":\"Account\",\"formatter\":5},{\"columnMatch\":\"Count\",\"formatter\":8,\"formatOptions\":{\"palette\":\"blue\",\"aggregation\":\"Sum\"}}],\"rowLimit\":10000,\"filter\":true,\"hierarchySettings\":{\"treeType\":1,\"groupBy\":[\"Account\"],\"finalBy\":\"Account\"},\"sortBy\":[{\"itemKey\":\"$gen_count_$gen_group_0\",\"sortOrder\":1}],\"labelSettings\":[{\"columnId\":\"Account\",\"comment\":\"Account and the number of databases on which it has delegation \"}]},\"sortBy\":[{\"itemKey\":\"$gen_count_$gen_group_0\",\"sortOrder\":1}]},\"customWidth\":\"50\",\"name\":\"MailboxDatabaseReceiveAsGrid\",\"styleSettings\":{\"showBorder\":true}},{\"type\":3,\"content\":{\"version\":\"KqlItem/1.0\",\"query\":\"ExchangeConfiguration(SpecificSectionList=\\\"MailboxDatabaseSendAs\\\",SpecificConfigurationDate=\\\"{DateOfConfiguration:value}\\\",SpecificConfigurationEnv={EnvironmentList},Target = \\\"On-Premises\\\")\\r\\n| project CmdletResultValue\\r\\n| where CmdletResultValue <> \\\"{'Error':'EmptyResult'}\\\"\\r\\n| extend Account = tostring(CmdletResultValue.UserString)\\r\\n| extend DatabaseName = tostring(CmdletResultValue.Identity.Name)\\r\\n| summarize Count =count() by Account, DatabaseName\\r\\n| project Account, Count, DatabaseName\",\"size\":1,\"showAnalytics\":true,\"title\":\"SendAs Extended Right on databases\",\"noDataMessage\":\"No Send-As delegation\",\"noDataMessageStyle\":3,\"showExportToExcel\":true,\"queryType\":0,\"resourceType\":\"microsoft.operationalinsights/workspaces\",\"gridSettings\":{\"formatters\":[{\"columnMatch\":\"Account\",\"formatter\":5},{\"columnMatch\":\"Count\",\"formatter\":8,\"formatOptions\":{\"palette\":\"blue\",\"aggregation\":\"Sum\",\"compositeBarSettings\":{\"labelText\":\"\"}}}],\"rowLimit\":10000,\"filter\":true,\"hierarchySettings\":{\"treeType\":1,\"groupBy\":[\"Account\"],\"finalBy\":\"Account\"},\"labelSettings\":[{\"columnId\":\"Account\",\"comment\":\"Account and the number of databases on which it has delegation \"}]}},\"customWidth\":\"50\",\"name\":\"MailboxDatabaseSendAsGrid\",\"styleSettings\":{\"showBorder\":true}}]},\"name\":\"ReceiveSendAs\"}]},\"conditionalVisibility\":{\"parameterName\":\"selected\",\"comparison\":\"isEqualTo\",\"value\":\"Delegation\"},\"name\":\"Importantsecurityconfiguration\"},{\"type\":12,\"content\":{\"version\":\"NotebookGroup/1.0\",\"groupType\":\"editable\",\"title\":\"Local Administrators\",\"items\":[{\"type\":1,\"content\":{\"json\":\"The following section will display the content of the local Administrators group for each server\\r\\n\\r\\n** When content refer to groups from other forests, none or partial information will be displayed and the number of Administrators may be inconsistent. **\\r\\n\\r\\nMost of the sections display the same information but with differents sorting, displays...\"},\"name\":\"text - 12\"},{\"type\":1,\"content\":{\"json\":\"Only Exchange administrators should be members of the local Administrators group of Exchange servers.\\r\\n\\r\\nYou need to review the content of the local Administrators group on a regular basis.\\r\\n\\r\\nIt is considered a high security risk to have a discrepancy of members between the servers. \\r\\n\\r\\nIt is not recommended to have more than one local administrator accounts. Furthermore, the password should be unique on each server and regularly changed. A solution like LAPS could be used to manage the local administrator password.\\r\\n\\r\\nOnly Exchange administrators should be able to logon on Exchange servers.\\r\\n\\r\\nHere the default content of the local Administrators group for an Exchange server \\r\\n:\\r\\n- Administrator (this account can be renamed)\\r\\n- Domain Admins\\r\\n- Exchange Trusted Subsystem\\r\\n- Organization Management\\r\\n\\r\\n**Service accounts should not be members of the local Administrators group**. If it is necessary, you need to ensure that the account is dedicated to Exchange. If the service account opens sessions on other servers, it can be used for lateral movements. \\r\\n\",\"style\":\"info\"},\"conditionalVisibility\":{\"parameterName\":\"Help\",\"comparison\":\"isEqualTo\",\"value\":\"Yes\"},\"name\":\"LocalAdminsHelp\"},{\"type\":9,\"content\":{\"version\":\"KqlParameterItem/1.0\",\"parameters\":[{\"id\":\"dfffbaa4-5888-41c2-b039-dafb6110260c\",\"version\":\"KqlParameterItem/1.0\",\"name\":\"Limited\",\"type\":10,\"isRequired\":true,\"typeSettings\":{\"showDefault\":false},\"jsonData\":\"[{ \\\"value\\\": \\\"True\\\", \\\"label\\\": \\\"Yes\\\" },\\r\\n { \\\"value\\\": \\\"True,False\\\", \\\"label\\\": \\\"No\\\", \\\"selected\\\":true }\\r\\n]\"}],\"style\":\"pills\",\"queryType\":0,\"resourceType\":\"microsoft.operationalinsights/workspaces\"},\"name\":\"parameters - 7\"},{\"type\":1,\"content\":{\"json\":\"**Top 10 servers with high number of unique local Administrators members**\"},\"name\":\"text - 13\"},{\"type\":3,\"content\":{\"version\":\"KqlItem/1.0\",\"query\":\"let StandardGroup = dynamic([\\\"Administrator\\\", \\\"Domain Admins\\\",\\\"Exchange Trusted Subsystem\\\",\\\"Organization Management\\\", \\\"Admins du domaine\\\"]);\\r\\nExchangeConfiguration(SpecificSectionList=\\\"LocalAminGroup\\\",SpecificConfigurationDate=\\\"{DateOfConfiguration:value}\\\",SpecificConfigurationEnv={EnvironmentList},Target = \\\"On-Premises\\\")\\r\\n| where CmdletResultValue.Level != 0\\r\\n| where not (CmdletResultValue.MemberPath has_any (StandardGroup)) in ({Limited})\\r\\n| project CmdletResultValue\\r\\n| extend Parentgroup = trim_end(@'\\\\\\\\Local Administrators',tostring(CmdletResultValue.Parentgroup))\\r\\n| extend MemberPath = tostring(CmdletResultValue.MemberPath)\\r\\n| extend ObjectClass = tostring(CmdletResultValue.ObjectClass)\\r\\n| where ObjectClass !contains \\\"group\\\"\\r\\n| summarize dcount(MemberPath) by Parentgroup\\r\\n| top 10 by dcount_MemberPath\\r\\n| sort by dcount_MemberPath\",\"size\":4,\"queryType\":0,\"resourceType\":\"microsoft.operationalinsights/workspaces\",\"visualization\":\"tiles\",\"tileSettings\":{\"titleContent\":{\"columnMatch\":\"Parentgroup\",\"formatter\":1},\"leftContent\":{\"columnMatch\":\"dcount_MemberPath\",\"formatter\":12,\"formatOptions\":{\"palette\":\"auto\"},\"numberFormat\":{\"unit\":17,\"options\":{\"style\":\"decimal\",\"maximumFractionDigits\":2,\"maximumSignificantDigits\":3}}},\"showBorder\":false}},\"name\":\"query - 9\"},{\"type\":12,\"content\":{\"version\":\"NotebookGroup/1.0\",\"groupType\":\"editable\",\"title\":\"Click to see number of unique members for all servers\",\"expandable\":true,\"items\":[{\"type\":1,\"content\":{\"json\":\"Number of unique members for all servers\"},\"name\":\"text - 0\"},{\"type\":3,\"content\":{\"version\":\"KqlItem/1.0\",\"query\":\"let StandardGroup = dynamic([\\\"Administrator\\\", \\\"Domain Admins\\\",\\\"Exchange Trusted Subsystem\\\",\\\"Organization Management\\\", \\\"Admins du domaine\\\"]);\\r\\nExchangeConfiguration(SpecificSectionList=\\\"LocalAminGroup\\\",SpecificConfigurationDate=\\\"{DateOfConfiguration:value}\\\",SpecificConfigurationEnv={EnvironmentList},Target = \\\"On-Premises\\\")\\r\\n| where CmdletResultValue.Level != 0\\r\\n| where not (CmdletResultValue.MemberPath has_any (StandardGroup)) in ({Limited})\\r\\n| project CmdletResultValue\\r\\n| extend Parentgroup = trim_end(@'\\\\\\\\Local Administrators',tostring(CmdletResultValue.Parentgroup))\\r\\n| extend MemberPath = tostring(CmdletResultValue.MemberPath)\\r\\n| extend ObjectClass = tostring(CmdletResultValue.ObjectClass)\\r\\n| where ObjectClass !contains \\\"group\\\"\\r\\n| summarize dcount(MemberPath) by Parentgroup\\r\\n| sort by dcount_MemberPath\",\"size\":4,\"queryType\":0,\"resourceType\":\"microsoft.operationalinsights/workspaces\",\"visualization\":\"tiles\",\"tileSettings\":{\"titleContent\":{\"columnMatch\":\"Parentgroup\",\"formatter\":1},\"leftContent\":{\"columnMatch\":\"dcount_MemberPath\",\"formatter\":12,\"formatOptions\":{\"palette\":\"auto\"},\"numberFormat\":{\"unit\":17,\"options\":{\"style\":\"decimal\",\"maximumFractionDigits\":2,\"maximumSignificantDigits\":3}}},\"showBorder\":false}},\"name\":\"query - 9 - Copy\"}]},\"name\":\"All servers number of members\"},{\"type\":3,\"content\":{\"version\":\"KqlItem/1.0\",\"query\":\"let allsrv = ExchangeConfiguration(SpecificSectionList=\\\"ExchangeServers\\\", SpecificConfigurationDate=\\\"{DateOfConfiguration:value}\\\",SpecificConfigurationEnv={EnvironmentList}, Target = \\\"On-Premises\\\") | where \\r\\nCmdletResultValue.IsMailboxServer== true | extend Name=tostring(CmdletResultValue.Name);\\r\\nExchangeConfiguration(SpecificSectionList=\\\"LocalAminGroup\\\", SpecificConfigurationDate=\\\"{DateOfConfiguration:value}\\\",SpecificConfigurationEnv={EnvironmentList}, Target = \\\"On-Premises\\\") \\r\\n| where CmdletResultValue.Level == 1\\r\\n| project CmdletResultValue\\r\\n| extend MemberPath = tostring(CmdletResultValue.MemberPath)\\r\\n| extend Name = tostring(trim_end(@'\\\\\\\\Local Administrators', tostring(CmdletResultValue.Parentgroup)))\\r\\n| distinct Name\\r\\n| project Name\\r\\n| join kind=rightanti (allsrv) on Name\\r\\n| project CmdletResultValue.Name\",\"size\":4,\"title\":\"Servers not reachable\",\"noDataMessage\":\"All server were successfully analyzed\",\"noDataMessageStyle\":3,\"queryType\":0,\"resourceType\":\"microsoft.operationalinsights/workspaces\",\"visualization\":\"tiles\",\"tileSettings\":{\"titleContent\":{\"columnMatch\":\"CmdletResultValue_Name\",\"formatter\":1,\"numberFormat\":{\"unit\":0,\"options\":{\"style\":\"decimal\"}}},\"showBorder\":true}},\"name\":\"query - 9 - Copy\"},{\"type\":3,\"content\":{\"version\":\"KqlItem/1.0\",\"query\":\"ExchangeConfiguration(SpecificSectionList=\\\"ExchangeServers\\\", SpecificConfigurationDate=\\\"{DateOfConfiguration:value}\\\",SpecificConfigurationEnv={EnvironmentList}, Target = \\\"On-Premises\\\")\\r\\n| where CmdletResultValue.ServerRole <> 64\\r\\n| count\\r\\n\",\"size\":4,\"title\":\"Number of servers\",\"queryType\":0,\"resourceType\":\"microsoft.operationalinsights/workspaces\",\"visualization\":\"tiles\",\"tileSettings\":{\"titleContent\":{\"columnMatch\":\"Count\",\"formatter\":1,\"numberFormat\":{\"unit\":0,\"options\":{\"style\":\"decimal\"}}},\"showBorder\":false}},\"customWidth\":\"50\",\"name\":\"query - 9 - Copy - Copy\"},{\"type\":3,\"content\":{\"version\":\"KqlItem/1.0\",\"query\":\"ExchangeConfiguration(SpecificSectionList=\\\"LocalAminGroup\\\", SpecificConfigurationDate=\\\"{DateOfConfiguration:value}\\\",SpecificConfigurationEnv={EnvironmentList}, Target = \\\"On-Premises\\\")\\r\\n| where CmdletResultValue.Level == 1\\r\\n| project CmdletResultValue\\r\\n| extend MemberPath = tostring(CmdletResultValue.MemberPath)\\r\\n| extend Parentgroup = trim_end(@'\\\\\\\\Local Administrators', tostring(CmdletResultValue.Parentgroup))\\r\\n| distinct Parentgroup = Parentgroup\\r\\n| count \",\"size\":4,\"title\":\"Number of Analyzed servers\",\"queryType\":0,\"resourceType\":\"microsoft.operationalinsights/workspaces\",\"visualization\":\"tiles\",\"tileSettings\":{\"titleContent\":{\"columnMatch\":\"Count\",\"formatter\":1,\"numberFormat\":{\"unit\":0,\"options\":{\"style\":\"decimal\"}}},\"showBorder\":false}},\"customWidth\":\"50\",\"name\":\"query - 9 - Copy - Copy - Copy\"},{\"type\":1,\"content\":{\"json\":\"This view shows each nonstandard user account that is member (directly or by a group) of the local Administrators group per server.\\r\\n\\r\\nConsider reviewing:\\r\\n- **nonstandard members** the Memberpath help to understand from which group the user comprised\\r\\n- **inconsistent memebrs** across servers\\r\\n\\r\\nNote that content from Trusted forests might not be displayed. \",\"style\":\"info\"},\"conditionalVisibility\":{\"parameterName\":\"Help\",\"comparison\":\"isEqualTo\",\"value\":\"Yes\"},\"name\":\"LocalAdminPerServersHelp\"},{\"type\":3,\"content\":{\"version\":\"KqlItem/1.0\",\"query\":\"let StandardGroup = dynamic([\\\"Administrator\\\", \\\"Domain Admins\\\",\\\"Exchange Trusted Subsystem\\\",\\\"Organization Management\\\", \\\"Admins du domaine\\\"]);\\r\\nExchangeConfiguration(SpecificSectionList=\\\"LocalAminGroup\\\",SpecificConfigurationDate=\\\"{DateOfConfiguration:value}\\\",SpecificConfigurationEnv={EnvironmentList},Target = \\\"On-Premises\\\")\\r\\n| where CmdletResultValue.Level != 0 \\r\\n| where not (CmdletResultValue.MemberPath has_any (StandardGroup))\\r\\n| project CmdletResultValue\\r\\n| extend Parentgroup = trim_end(@'\\\\\\\\Local Administrators',tostring(CmdletResultValue.Parentgroup))\\r\\n| extend MemberPath = tostring(CmdletResultValue.MemberPath)\\r\\n| extend Level = tostring(CmdletResultValue.Level)\\r\\n| extend ObjectClass = tostring(CmdletResultValue.ObjectClass)\\r\\n| extend LastLogon = tostring(CmdletResultValue.LastLogonString)\\r\\n| extend LastPwdSet = tostring(CmdletResultValue.LastPwdSetString)\\r\\n| extend Enabled = tostring(CmdletResultValue.Enabled)\\r\\n| extend DN = tostring(CmdletResultValue.DN)\\r\\n| summarize Count=count() by MemberPath,Parentgroup,Level,ObjectClass,LastLogon,LastPwdSet,Enabled,DN\\r\\n| project Parentgroup = strcat(\\\"💻 \\\",Parentgroup),Count,MemberPath,Level,ObjectClass,LastLogon,LastPwdSet,Enabled,DN\\r\\n| sort by Parentgroup asc \",\"size\":1,\"showAnalytics\":true,\"title\":\" Total Non standard Groups and accounts including nested groups\",\"showExportToExcel\":true,\"queryType\":0,\"resourceType\":\"microsoft.operationalinsights/workspaces\",\"gridSettings\":{\"formatters\":[{\"columnMatch\":\"Parentgroup\",\"formatter\":5,\"formatOptions\":{\"aggregation\":\"Count\"}},{\"columnMatch\":\"Count\",\"formatter\":4,\"formatOptions\":{\"palette\":\"blue\",\"aggregation\":\"Sum\"}}],\"rowLimit\":10000,\"filter\":true,\"hierarchySettings\":{\"treeType\":1,\"groupBy\":[\"Parentgroup\"],\"finalBy\":\"Parentgroup\"},\"sortBy\":[{\"itemKey\":\"MemberPath\",\"sortOrder\":1}],\"labelSettings\":[{\"columnId\":\"Parentgroup\",\"label\":\"Server\"}]},\"sortBy\":[{\"itemKey\":\"MemberPath\",\"sortOrder\":1}]},\"name\":\"LocalAdminPerServers\",\"styleSettings\":{\"showBorder\":true}},{\"type\":3,\"content\":{\"version\":\"KqlItem/1.0\",\"query\":\"let StandardGroup = dynamic([\\\"Administrator\\\", \\\"Domain Admins\\\",\\\"Exchange Trusted Subsystem\\\",\\\"Organization Management\\\", \\\"Admins du domaine\\\"]);\\r\\nExchangeConfiguration(SpecificSectionList=\\\"LocalAminGroup\\\",SpecificConfigurationDate=\\\"{DateOfConfiguration:value}\\\",SpecificConfigurationEnv={EnvironmentList},Target = \\\"On-Premises\\\")\\r\\n| where CmdletResultValue.Level == 1\\r\\n| where not (CmdletResultValue.MemberPath has_any (StandardGroup))\\r\\n| project CmdletResultValue\\r\\n| extend Parentgroup = trim_end(@'\\\\\\\\Local Administrators',tostring(CmdletResultValue.Parentgroup))\\r\\n| extend ObjectClass = tostring(CmdletResultValue.ObjectClass)\\r\\n| extend MemberPath = tostring(CmdletResultValue.MemberPath)\\r\\n| extend MemberPath = case( ObjectClass == \\\"group\\\", strcat( \\\"👪 \\\", MemberPath), ObjectClass == \\\"computer\\\", strcat( \\\"💻 \\\", MemberPath), strcat( \\\"🧑‍🦰 \\\", MemberPath) )\\r\\n| project-away CmdletResultValue\\r\\n//| summarize Count=count(), Servers=make_set(Parentgroup) by MemberPath\\r\\n| summarize Count=count() by MemberPath,Parentgroup \\r\\n| sort by Count desc\",\"size\":1,\"showAnalytics\":true,\"title\":\"Non Standard accounts summary\",\"showExportToExcel\":true,\"queryType\":0,\"resourceType\":\"microsoft.operationalinsights/workspaces\",\"gridSettings\":{\"formatters\":[{\"columnMatch\":\"Group\",\"formatter\":1},{\"columnMatch\":\"MemberPath\",\"formatter\":5},{\"columnMatch\":\"Count\",\"formatter\":4,\"formatOptions\":{\"palette\":\"blue\"}},{\"columnMatch\":\"Member\",\"formatter\":1}],\"rowLimit\":10000,\"filter\":true,\"hierarchySettings\":{\"treeType\":1,\"groupBy\":[\"MemberPath\"],\"expandTopLevel\":false},\"labelSettings\":[{\"columnId\":\"MemberPath\",\"label\":\"MemberPath\"},{\"columnId\":\"Parentgroup\",\"label\":\"Servers\"},{\"columnId\":\"Count\",\"label\":\"Nb Servers\"}]}},\"name\":\"LocalAdminCount\",\"styleSettings\":{\"showBorder\":true}},{\"type\":1,\"content\":{\"json\":\"##### Select a server to display its content\\r\\n\\r\\nBy default only the non-standard members are displayed. \\r\\n\\r\\n❌ : for last logon displayed when user logged or the last logon is greater than 180 days\\r\\n\\r\\n❌ : for password last set displayed when last password set greater than 365 days\"},\"name\":\"text - 0\"},{\"type\":9,\"content\":{\"version\":\"KqlParameterItem/1.0\",\"parameters\":[{\"id\":\"19e606d9-7f3e-4d2f-a314-892da571e50a\",\"version\":\"KqlParameterItem/1.0\",\"name\":\"Server\",\"type\":2,\"query\":\"ExchangeConfiguration(SpecificSectionList=\\\"LocalAminGroup\\\", SpecificConfigurationDate=\\\"{DateOfConfiguration:value}\\\",SpecificConfigurationEnv={EnvironmentList}, Target = \\\"On-Premises\\\")\\r\\n| where CmdletResultValue.Level == 1\\r\\n| project CmdletResultValue\\r\\n| extend MemberPath = tostring(CmdletResultValue.MemberPath)\\r\\n| extend Parentgroup = trim_end(@'\\\\\\\\Local Administrators', tostring(CmdletResultValue.Parentgroup))\\r\\n| distinct Parentgroup = Parentgroup\",\"typeSettings\":{\"showDefault\":false},\"queryType\":0,\"resourceType\":\"microsoft.operationalinsights/workspaces\"},{\"id\":\"05ef4f1c-4cf4-406f-9fb2-9ee30dc93abd\",\"version\":\"KqlParameterItem/1.0\",\"name\":\"Limited\",\"label\":\"Show only nonstandard members\",\"type\":10,\"description\":\"Show only non standard members\",\"isRequired\":true,\"typeSettings\":{\"showDefault\":false},\"jsonData\":\"[{ \\\"value\\\": \\\"True\\\", \\\"label\\\": \\\"Yes\\\" },\\r\\n { \\\"value\\\": \\\"True,False\\\", \\\"label\\\": \\\"No\\\", \\\"selected\\\":true }\\r\\n]\",\"value\":\"True\"},{\"id\":\"901bf975-426f-486b-82de-ff0d64f139bb\",\"version\":\"KqlParameterItem/1.0\",\"name\":\"LastLogon\",\"label\":\"Last Logon\",\"type\":10,\"isRequired\":true,\"typeSettings\":{\"showDefault\":false},\"jsonData\":\"[ {\\\"value\\\": \\\"0d\\\", \\\"label\\\": \\\"No filter\\\",\\\"selected\\\":true},\\r\\n{ \\\"value\\\": \\\"90d\\\", \\\"label\\\": \\\"90d\\\" },\\r\\n { \\\"value\\\": \\\"180d\\\", \\\"label\\\": \\\"6m\\\" },\\r\\n { \\\"value\\\": \\\"365d\\\", \\\"label\\\": \\\"1y\\\" },\\r\\n{ \\\"value\\\": \\\"730d\\\", \\\"label\\\": \\\"2y\\\" },\\r\\n{ \\\"value\\\": \\\"1085d\\\", \\\"label\\\": \\\"3y\\\" },\\r\\n{ \\\"value\\\": \\\"1097d\\\", \\\"label\\\": \\\"more than 3y\\\"},\\r\\n{ \\\"value\\\": \\\"3650d\\\", \\\"label\\\": \\\"more than 10y\\\"}\\r\\n]\"},{\"id\":\"2f7a613f-8749-44c9-b8be-844964badef8\",\"version\":\"KqlParameterItem/1.0\",\"name\":\"PasswordLast\",\"label\":\"Password Last Set\",\"type\":10,\"isRequired\":true,\"typeSettings\":{\"showDefault\":false},\"jsonData\":\"[{ \\\"value\\\": \\\"0d\\\", \\\"label\\\": \\\"No filter\\\",\\\"selected\\\":true },\\r\\n { \\\"value\\\": \\\"365d\\\", \\\"label\\\": \\\"1y\\\" },\\r\\n{ \\\"value\\\": \\\"730d\\\", \\\"label\\\": \\\"2y\\\" },\\r\\n{ \\\"value\\\": \\\"1095d\\\", \\\"label\\\": \\\"3y\\\" },\\r\\n{ \\\"value\\\": \\\"1097d\\\", \\\"label\\\": \\\"more than 3y\\\"},\\r\\n{ \\\"value\\\": \\\"3650d\\\", \\\"label\\\": \\\"more than 10y\\\"}\\r\\n]\"}],\"style\":\"pills\",\"queryType\":0,\"resourceType\":\"microsoft.operationalinsights/workspaces\"},\"name\":\"parameters - 1\"},{\"type\":3,\"content\":{\"version\":\"KqlItem/1.0\",\"query\":\"let StandardGroup = dynamic([\\\"Administrator\\\", \\\"Domain Admins\\\",\\\"Exchange Trusted Subsystem\\\",\\\"Organization Management\\\", \\\"Admins du domaine\\\"]);\\r\\nExchangeConfiguration(SpecificSectionList=\\\"LocalAminGroup\\\",SpecificConfigurationDate=\\\"{DateOfConfiguration:value}\\\",SpecificConfigurationEnv={EnvironmentList},Target = \\\"On-Premises\\\")\\r\\n| where CmdletResultValue.Level != 0 \\r\\n| where CmdletResultValue.Parentgroup contains \\\"{Server}\\\"\\r\\n| where not (CmdletResultValue.MemberPath has_any (StandardGroup)) in ({Limited})\\r\\n| where todatetime (CmdletResultValue.LastPwdSetString) < ago({PasswordLast}) or tostring (CmdletResultValue.LastPwdSetString) == \\\"\\\"\\r\\n| where todatetime (CmdletResultValue.LastLogonString) < ago({LastLogon}) or tostring (CmdletResultValue.LastLogonString) == \\\"\\\"\\r\\n| project CmdletResultValue\\r\\n| extend Parentgroup = trim_end(@'\\\\\\\\Local Administrators',tostring(CmdletResultValue.Parentgroup))\\r\\n| extend MemberPath = tostring(CmdletResultValue.MemberPath)\\r\\n| extend Level = tostring(CmdletResultValue.Level)\\r\\n| extend ObjectClass = tostring(CmdletResultValue.ObjectClass)\\r\\n| extend LastLogon = tostring(CmdletResultValue.LastLogonString)\\r\\n| extend LastLogon = iif(ObjectClass==\\\"group\\\" or ObjectClass==\\\"computer\\\" or ObjectClass==\\\"Local User\\\" or ObjectClass==\\\"computer\\\",\\\"N/A\\\",iif ( todatetime (CmdletResultValue.LastLogonString) > ago(180d), CmdletResultValue.LastLogonString,iff (LastLogon==\\\"\\\", \\\"❌ Never logged\\\",strcat(\\\"❌\\\",LastLogon))))\\r\\n| extend LastPwdSet = CmdletResultValue.LastPwdSetString\\r\\n| extend LastPwdSet = iif(ObjectClass==\\\"group\\\" or ObjectClass==\\\"computer\\\" or ObjectClass==\\\"Local User\\\" or ObjectClass==\\\"computer\\\",\\\"N/A\\\",iif ( todatetime (CmdletResultValue.LastPwdSetString) > ago(365d), CmdletResultValue.LastPwdSetString,iff (LastPwdSet==\\\"\\\", \\\"❌ Password never set\\\",strcat(\\\"❌\\\",LastPwdSet))))\\r\\n | extend Enabled = tostring(CmdletResultValue.Enabled)\\r\\n| extend DN = tostring(CmdletResultValue.DN)\\r\\n| project-away CmdletResultValue\\r\\n| sort by MemberPath asc\\r\\n| project-away Parentgroup\",\"size\":1,\"showAnalytics\":true,\"title\":\"Local Administrators group content\",\"showExportToExcel\":true,\"queryType\":0,\"resourceType\":\"microsoft.operationalinsights/workspaces\",\"gridSettings\":{\"rowLimit\":10000,\"filter\":true,\"sortBy\":[{\"itemKey\":\"MemberPath\",\"sortOrder\":1}]},\"sortBy\":[{\"itemKey\":\"MemberPath\",\"sortOrder\":1}]},\"conditionalVisibility\":{\"parameterName\":\"Server\",\"comparison\":\"isNotEqualTo\",\"value\":\"\"},\"name\":\"AdGroups\",\"styleSettings\":{\"showBorder\":true}}]},\"conditionalVisibility\":{\"parameterName\":\"selected\",\"comparison\":\"isEqualTo\",\"value\":\"Server\"},\"name\":\"Local Administrators\"},{\"type\":12,\"content\":{\"version\":\"NotebookGroup/1.0\",\"groupType\":\"editable\",\"title\":\"Exchange and AD GRoup\",\"items\":[{\"type\":1,\"content\":{\"json\":\"This tab displays the content of high privilege groups in Exchange and AD.\"},\"name\":\"text - 7\"},{\"type\":1,\"content\":{\"json\":\"The **Exchange Trusted Subsystem** group is one the two most sensistive groups in Exchange. This group has all privileges in Exchange and very high privileges in AD.\\r\\n\\r\\nExchange 2013 deployment permissions reference\\r\\n\\r\\nThis group should only contains computer accounts for each Exchange servers. When the DAG has an IP and a CNO, it is acceptable to have the DAG's computer account.\\r\\n\\r\\nThis section only shows direct nonstandard members.\",\"style\":\"info\"},\"customWidth\":\"50\",\"conditionalVisibility\":{\"parameterName\":\"Help\",\"comparison\":\"isEqualTo\",\"value\":\"Yes\"},\"name\":\"ExchangeTrustedSubsystemHelp\"},{\"type\":1,\"content\":{\"json\":\"The **Exchange Windows Permissions** group is one the two most sensistive groups in Exchange. This group has very high privileges in AD.\\r\\n\\r\\nExchange 2013 deployment permissions reference\\r\\n\\r\\nThis group should only contains the group Exchange Trusted SubSystem. This section only shows direct nonstandard members. \",\"style\":\"info\"},\"customWidth\":\"50\",\"conditionalVisibility\":{\"parameterName\":\"Help\",\"comparison\":\"isEqualTo\",\"value\":\"Yes\"},\"name\":\"WindowsPermissionGroupTileHelp\"},{\"type\":3,\"content\":{\"version\":\"KqlItem/1.0\",\"query\":\"let ETSValidcontent = union kind=outer (ExchangeConfiguration(SpecificSectionList=\\\"ExchangeServers\\\",SpecificConfigurationDate=\\\"{DateOfConfiguration:value}\\\",SpecificConfigurationEnv={EnvironmentList},Target = \\\"On-Premises\\\")| project Name = tostring(CmdletResultValue.Name)), (ExchangeConfiguration(SpecificSectionList=\\\"DAG\\\",SpecificConfigurationDate=\\\"{DateOfConfiguration:value}\\\",SpecificConfigurationEnv={EnvironmentList},Target = \\\"On-Premises\\\")| project Name = tostring(Identity));\\r\\nExchangeConfiguration(SpecificSectionList=\\\"ETS\\\",SpecificConfigurationDate=\\\"{DateOfConfiguration:value}\\\",SpecificConfigurationEnv={EnvironmentList},Target = \\\"On-Premises\\\")\\r\\n| where CmdletResultValue.Name !in (ETSValidcontent)\\r\\n| summarize MyCount=countif( CmdletResultType == \\\"Success\\\") by CmdletResultType\\r\\n| project Result = iff ( CmdletResultType == \\\"Success\\\", tostring(MyCount), \\\"\\\")\",\"size\":1,\"showAnalytics\":true,\"title\":\"Exchange Trusted SubSystem group nonstandard member count\",\"noDataMessage\":\"Content of group as Expected\",\"noDataMessageStyle\":3,\"showExportToExcel\":true,\"queryType\":0,\"resourceType\":\"microsoft.operationalinsights/workspaces\",\"visualization\":\"tiles\",\"tileSettings\":{\"titleContent\":{\"columnMatch\":\"CmdletResultValue_Name\",\"formatter\":1},\"leftContent\":{\"columnMatch\":\"Result\",\"formatter\":12,\"formatOptions\":{\"palette\":\"hotCold\"},\"numberFormat\":{\"unit\":17,\"options\":{\"style\":\"decimal\",\"maximumFractionDigits\":2,\"maximumSignificantDigits\":3},\"emptyValCustomText\":\"ScriptError\"}},\"showBorder\":true}},\"customWidth\":\"50\",\"name\":\"ExchangeServersTileGroup1Query\"},{\"type\":3,\"content\":{\"version\":\"KqlItem/1.0\",\"query\":\"let ETScontent = ExchangeConfiguration(SpecificSectionList=\\\"ETS\\\", SpecificConfigurationDate=\\\"{DateOfConfiguration:value}\\\",SpecificConfigurationEnv={EnvironmentList}, Target = \\\"On-Premises\\\") | project Name = tostring(CmdletResultValue.Name);\\r\\nExchangeConfiguration(SpecificSectionList=\\\"EWP\\\",SpecificConfigurationDate=\\\"{DateOfConfiguration:value}\\\",SpecificConfigurationEnv={EnvironmentList},Target = \\\"On-Premises\\\")\\r\\n| where CmdletResultValue.Name !in (ETScontent) and CmdletResultValue.Name != \\\"Exchange Trusted Subsystem\\\"\\r\\n| extend Result = iff ( CmdletResultType == \\\"Success\\\", \\\"\\\", \\\"Error in the script unable to retrieve value\\\")\\r\\n| summarize MyCount=countif( CmdletResultType == \\\"Success\\\") by CmdletResultType\\r\\n| project Result = iff ( CmdletResultType == \\\"Success\\\", tostring(MyCount), \\\"\\\")\\r\\n\",\"size\":1,\"showAnalytics\":true,\"title\":\"Exchange Windows Permissions group direct nonstandard members (Exchange Trusted subsystem non standard content not included)\",\"noDataMessage\":\"Content of group as expected\",\"noDataMessageStyle\":3,\"showExportToExcel\":true,\"queryType\":0,\"resourceType\":\"microsoft.operationalinsights/workspaces\",\"visualization\":\"tiles\",\"tileSettings\":{\"titleContent\":{\"columnMatch\":\"CmdletResultValue_Name\",\"formatter\":1},\"leftContent\":{\"columnMatch\":\"Result\",\"formatter\":12,\"formatOptions\":{\"palette\":\"hotCold\"},\"numberFormat\":{\"unit\":17,\"options\":{\"style\":\"decimal\",\"maximumFractionDigits\":2,\"maximumSignificantDigits\":3},\"emptyValCustomText\":\"ScriptError\"}},\"showBorder\":true}},\"customWidth\":\"50\",\"name\":\"ExchangeServersTileGroup2Query\"},{\"type\":12,\"content\":{\"version\":\"NotebookGroup/1.0\",\"groupType\":\"editable\",\"title\":\"Exchange Windows Permissions direct nonstandard content (Exchange Trusted subsystem non standard content not included)\",\"items\":[{\"type\":3,\"content\":{\"version\":\"KqlItem/1.0\",\"query\":\"let ETSValidcontnet = union kind=outer (ExchangeConfiguration(SpecificSectionList=\\\"ExchangeServers\\\",SpecificConfigurationDate=\\\"{DateOfConfiguration:value}\\\",SpecificConfigurationEnv={EnvironmentList},Target = \\\"On-Premises\\\")| project Name = tostring(CmdletResultValue.Name)), (ExchangeConfiguration(SpecificSectionList=\\\"DAG\\\",SpecificConfigurationDate=\\\"{DateOfConfiguration:value}\\\",SpecificConfigurationEnv={EnvironmentList},Target = \\\"On-Premises\\\")| project Name = tostring(Identity));\\r\\nExchangeConfiguration(SpecificSectionList=\\\"ETS\\\",SpecificConfigurationDate=\\\"{DateOfConfiguration:value}\\\",SpecificConfigurationEnv={EnvironmentList},Target = \\\"On-Premises\\\")\\r\\n| where CmdletResultValue.Name !in (ETSValidcontnet)\\r\\n//| extend Name = strcat (\\\"⛔\\\",tostring(CmdletResultValue.Name))\\r\\n| extend Name = iff(CmdletResultType == \\\"Success\\\", strcat (\\\"⛔\\\",tostring(CmdletResultValue.Name)),\\\"Script was unable to retrieve data\\\")\\r\\n| project Name \",\"size\":1,\"showAnalytics\":true,\"title\":\"Exchange Trusted SubSystem nonstandard content\",\"noDataMessage\":\"Content of Exchange Trusted SubSystem as Expected\",\"noDataMessageStyle\":3,\"showExportToExcel\":true,\"queryType\":0,\"resourceType\":\"microsoft.operationalinsights/workspaces\",\"gridSettings\":{\"rowLimit\":10000}},\"customWidth\":\"50\",\"name\":\"ETSDetails\",\"styleSettings\":{\"showBorder\":true}},{\"type\":3,\"content\":{\"version\":\"KqlItem/1.0\",\"query\":\"let ETScontent = ExchangeConfiguration(SpecificSectionList=\\\"ETS\\\", SpecificConfigurationDate=\\\"{DateOfConfiguration:value}\\\",SpecificConfigurationEnv={EnvironmentList}, Target = \\\"On-Premises\\\") | project Name = tostring(CmdletResultValue.Name);\\r\\nExchangeConfiguration(SpecificSectionList=\\\"EWP\\\",SpecificConfigurationDate=\\\"{DateOfConfiguration:value}\\\",SpecificConfigurationEnv={EnvironmentList},Target = \\\"On-Premises\\\")\\r\\n| where CmdletResultValue.Name !in (ETScontent) and CmdletResultValue.Name != \\\"Exchange Trusted Subsystem\\\"\\r\\n//| extend Name = strcat (\\\"⛔\\\",tostring(CmdletResultValue.Name))\\r\\n| extend Name = iff(CmdletResultType == \\\"Success\\\", strcat (\\\"⛔\\\",tostring(CmdletResultValue.Name)),\\\"Script was unable to retrieve data\\\")\\r\\n| project Name \",\"size\":1,\"showAnalytics\":true,\"title\":\"Exchange Windows Permissions direct nonstandard content (Exchange Trusted subsystem non standard content not included)\",\"noDataMessage\":\"Content of Exchange Windows Permissions as Expected\",\"noDataMessageStyle\":3,\"showExportToExcel\":true,\"queryType\":0,\"resourceType\":\"microsoft.operationalinsights/workspaces\"},\"customWidth\":\"50\",\"name\":\"WindowsPermissionsQuery\",\"styleSettings\":{\"showBorder\":true}}]},\"name\":\"ETS and WP Grids\"},{\"type\":12,\"content\":{\"version\":\"NotebookGroup/1.0\",\"groupType\":\"editable\",\"title\":\"Exchange groups from old Exchange version\",\"items\":[{\"type\":1,\"content\":{\"json\":\"ℹ️ Recommendations\\r\\n\\r\\n- Groups from old Exchange version should have been removed\\r\\n- List of old groups \\r\\n\\t- Exchange Organization Administrators\\r\\n\\t- Exchange Recipient Administrators\\r\\n\\t- Exchange Public Folder Administrators\\r\\n\\t- Exchange Server Administrator\\r\\n\\t- Exchange View-Only Administrator\\r\\n\\t- Exchange Enterprise Servers (located in the root domain)\\r\\n\\t- Exchange Domain Servers : one group per domain\\r\\n\\r\\n\\r\\nHelp for Built-in role groups\",\"style\":\"info\"},\"conditionalVisibility\":{\"parameterName\":\"Help\",\"comparison\":\"isEqualTo\",\"value\":\"Yes\"},\"name\":\"text - 0\"},{\"type\":12,\"content\":{\"version\":\"NotebookGroup/1.0\",\"groupType\":\"editable\",\"items\":[{\"type\":3,\"content\":{\"version\":\"KqlItem/1.0\",\"query\":\"\\r\\nlet OldVGroup = (ExchangeConfiguration(SpecificSectionList=\\\"ADGroup\\\", SpecificConfigurationDate=\\\"{DateOfConfiguration:value}\\\", SpecificConfigurationEnv={EnvironmentList}, Target = \\\"On-Premises\\\")| where CmdletResultValue.Parentgroup == \\\"Exchange Enterprise Servers\\\" or CmdletResultValue.Parentgroup == \\\"Exchange Services\\\"| extend Parentgroup = tostring(CmdletResultValue.Parentgroup));\\r\\nExchangeConfiguration(SpecificSectionList=\\\"ExGroup\\\", SpecificConfigurationDate=\\\"{DateOfConfiguration:value}\\\", SpecificConfigurationEnv={EnvironmentList}, Target = \\\"On-Premises\\\") \\r\\n| extend Parentgroup = tostring(CmdletResultValue.Parentgroup)\\r\\n| where CmdletResultValue.Parentgroup in (\\\"Exchange Organization Administrators\\\", \\\"Exchange Recipient Administrators\\\", \\\"Exchange Public Folder Administrators\\\", \\\"Exchange Server Administrator\\\", \\\"Exchange View-Only Administrator\\\") |union OldVGroup\\r\\n| where CmdletResultValue.Level != 0 and CmdletResultValue.ObjectClass !contains \\\"group\\\"\\r\\n| extend MemberPath= tostring(split(tostring(CmdletResultValue.MemberPath), \\\"\\\\\\\\\\\")[countof(tostring(CmdletResultValue.MemberPath), \\\"\\\\\\\\\\\")])\\r\\n| summarize dcount(tostring(MemberPath)) by Parentgroup = tostring(CmdletResultValue.Parentgroup)\\r\\n| sort by dcount_MemberPath\\r\\n\\r\\n\\r\\n\",\"size\":4,\"showAnalytics\":true,\"noDataMessage\":\"No groups from old versions found\",\"noDataMessageStyle\":3,\"showExportToExcel\":true,\"queryType\":0,\"resourceType\":\"microsoft.operationalinsights/workspaces\",\"visualization\":\"tiles\",\"tileSettings\":{\"titleContent\":{\"columnMatch\":\"Parentgroup\",\"formatter\":1},\"leftContent\":{\"columnMatch\":\"dcount_MemberPath\",\"formatter\":12,\"formatOptions\":{\"palette\":\"auto\"}},\"showBorder\":true}},\"name\":\"query - 0\"}]},\"name\":\"ExchangeGroupsList\"},{\"type\":12,\"content\":{\"version\":\"NotebookGroup/1.0\",\"groupType\":\"editable\",\"title\":\"Expand details on the content of old groups\",\"expandable\":true,\"expanded\":false,\"items\":[{\"type\":9,\"content\":{\"version\":\"KqlParameterItem/1.0\",\"parameters\":[{\"id\":\"b4b7a6ad-381a-48d6-9938-bf7cb812b474\",\"version\":\"KqlParameterItem/1.0\",\"name\":\"Group\",\"type\":2,\"query\":\"let OldVGroup = (ExchangeConfiguration(SpecificSectionList=\\\"ADGroup\\\", SpecificConfigurationDate=\\\"{DateOfConfiguration:value}\\\", SpecificConfigurationEnv={EnvironmentList}, Target = \\\"On-Premises\\\")| where CmdletResultValue.Parentgroup == \\\"Exchange Enterprise Servers\\\" or CmdletResultValue.Parentgroup == \\\"Exchange Services\\\"| extend Parentgroup = tostring(CmdletResultValue.Parentgroup));\\r\\nExchangeConfiguration(SpecificSectionList=\\\"ExGroup\\\", SpecificConfigurationDate=\\\"{DateOfConfiguration:value}\\\", SpecificConfigurationEnv={EnvironmentList}, Target = \\\"On-Premises\\\") \\r\\n| extend Parentgroup = tostring(CmdletResultValue.Parentgroup)\\r\\n| where CmdletResultValue.Parentgroup in (\\\"Exchange Organization Administrators\\\", \\\"Exchange Recipient Administrators\\\", \\\"Exchange Public Folder Administrators\\\", \\\"Exchange Server Administrator\\\", \\\"Exchange View-Only Administrator\\\") |union OldVGroup\\r\\n| project CmdletResultValue\\r\\n| extend GroupName = tostring(CmdletResultValue.Parentgroup)\\r\\n| distinct GroupName\\r\\n| sort by GroupName asc\\r\\n\",\"typeSettings\":{\"showDefault\":false},\"queryType\":0,\"resourceType\":\"microsoft.operationalinsights/workspaces\"},{\"id\":\"a695df39-1965-479a-ad0f-b4d3d168aaed\",\"version\":\"KqlParameterItem/1.0\",\"name\":\"LastLogon\",\"label\":\"Last Logon\",\"type\":10,\"isRequired\":true,\"jsonData\":\"[ {\\\"value\\\": \\\"0d\\\", \\\"label\\\": \\\"No filter\\\",\\\"selected\\\":true},\\r\\n{ \\\"value\\\": \\\"90d\\\", \\\"label\\\": \\\"90d\\\" },\\r\\n { \\\"value\\\": \\\"180d\\\", \\\"label\\\": \\\"6m\\\" },\\r\\n { \\\"value\\\": \\\"365d\\\", \\\"label\\\": \\\"1y\\\" },\\r\\n{ \\\"value\\\": \\\"730d\\\", \\\"label\\\": \\\"2y\\\" },\\r\\n{ \\\"value\\\": \\\"1085d\\\", \\\"label\\\": \\\"3y\\\" },\\r\\n{ \\\"value\\\": \\\"1097d\\\", \\\"label\\\": \\\"more than 3y\\\"},\\r\\n{ \\\"value\\\": \\\"3650d\\\", \\\"label\\\": \\\"more than 10y\\\"}\\r\\n]\\r\\n\"},{\"id\":\"2d69bad8-0904-467a-86e6-cb0923520c18\",\"version\":\"KqlParameterItem/1.0\",\"name\":\"PasswordLast\",\"label\":\"Password Last Set\",\"type\":10,\"isRequired\":true,\"jsonData\":\"[{ \\\"value\\\": \\\"0d\\\", \\\"label\\\": \\\"No filter\\\",\\\"selected\\\":true },\\r\\n { \\\"value\\\": \\\"365d\\\", \\\"label\\\": \\\"1y\\\" },\\r\\n{ \\\"value\\\": \\\"730d\\\", \\\"label\\\": \\\"2y\\\" },\\r\\n{ \\\"value\\\": \\\"1095d\\\", \\\"label\\\": \\\"3y\\\" },\\r\\n{ \\\"value\\\": \\\"1097d\\\", \\\"label\\\": \\\"more than 3y\\\"},\\r\\n{ \\\"value\\\": \\\"3650d\\\", \\\"label\\\": \\\"more than 10y\\\"}\\r\\n]\"}],\"style\":\"pills\",\"queryType\":0,\"resourceType\":\"microsoft.operationalinsights/workspaces\"},\"name\":\"parameters - 3\"},{\"type\":1,\"content\":{\"json\":\"Old Exchange groups content groups (Extract for the OU \\\"Microsoft Exchange Security Groups\\\").\\r\\nSelect a group to display detailed information of its contents.\\r\\nLevel attribute helps you understand the level of nested groups.\\r\\n\\r\\n❌ : for last logon displayed when user logged or the last logon is greater than 180 days\\r\\n\\r\\n❌ : for password last set displayed when last password set greater than 365 days\"},\"name\":\"text - 2\"},{\"type\":3,\"content\":{\"version\":\"KqlItem/1.0\",\"query\":\"let OldVGroupEES = (ExchangeConfiguration(SpecificSectionList=\\\"ADGroup\\\", SpecificConfigurationDate=\\\"{DateOfConfiguration:value}\\\", SpecificConfigurationEnv={EnvironmentList}, Target = \\\"On-Premises\\\")\\r\\n | where (CmdletResultValue.Parentgroup == \\\"Exchange Enterprise Servers\\\" and CmdletResultValue.MemberPath != @\\\"Exchange Enterprise Servers\\\\Exchange Domain Servers\\\") or CmdletResultValue.Parentgroup == \\\"Exchange Services\\\"\\r\\n | extend Parentgroup = tostring(CmdletResultValue.Parentgroup)\\r\\n | extend MemberPath = tostring(CmdletResultValue.MemberPath)\\r\\n | extend DN = tostring(CmdletResultValue.DN)\\r\\n | extend Level = tostring(CmdletResultValue.Level)\\r\\n | extend ObjectClass = tostring(CmdletResultValue.ObjectClass)\\r\\n | extend Enabled = tostring(CmdletResultValue.Enabled) );\\r\\nlet OldVGroupEDS = (ExchangeConfiguration(SpecificSectionList=\\\"ADGroup\\\", SpecificConfigurationDate=\\\"lastdate\\\", SpecificConfigurationEnv='B13', Target = \\\"On-Premises\\\")\\r\\n | where CmdletResultValue.Parentgroup == \\\"Exchange Enterprise Servers\\\" and CmdletResultValue.Level ==0\\r\\n | extend Parentgroup = tostring(CmdletResultValue.Parentgroup)\\r\\n| mv-expand CmdletResultValue.Members\\r\\n| where CmdletResultValue_Members.objectClass == \\\"group\\\"\\r\\n| project Parentgroup, MemberPath= strcat(Parentgroup,\\\"\\\\\\\\\\\", CmdletResultValue_Members.name), Level = tostring(1), ObjectClass = tostring(CmdletResultValue_Members.objectClass), DN = tostring(CmdletResultValue_Members.DistinguishedName), ObjectGuid = tostring(CmdletResultValue_Members.ObjectGuid)| join kind=inner ( ExchangeConfiguration(SpecificSectionList=\\\"ADGroup\\\", SpecificConfigurationDate=\\\"lastdate\\\", SpecificConfigurationEnv='B13', Target = \\\"On-Premises\\\")\\r\\n | where CmdletResultValue.Parentgroup == \\\"Exchange Enterprise Servers\\\"\\r\\n | extend Parentgroup = tostring(CmdletResultValue.Parentgroup)\\r\\n | extend ObjectGuid = tostring(CmdletResultValue.ObjectGuid)) on ObjectGuid) ;\\r\\nExchangeConfiguration(SpecificSectionList=\\\"ExGroup\\\", SpecificConfigurationDate=\\\"lastdate\\\", SpecificConfigurationEnv='B13', Target = \\\"On-Premises\\\") \\r\\n| extend Parentgroup = tostring(CmdletResultValue.Parentgroup)\\r\\n| where CmdletResultValue.Parentgroup in (\\\"Exchange Organization Administrators\\\", \\\"Exchange Recipient Administrators\\\", \\\"Exchange Public Folder Administrators\\\", \\\"Exchange Server Administrator\\\", \\\"Exchange View-Only Administrator\\\")\\r\\n| extend MemberPath = tostring(CmdletResultValue.MemberPath)\\r\\n| extend Level = tostring(CmdletResultValue.Level)\\r\\n| extend ObjectClass = tostring(CmdletResultValue.ObjectClass)\\r\\n| extend Enabled = tostring(CmdletResultValue.Enabled)\\r\\n| extend DN = tostring(CmdletResultValue.DN)\\r\\n| union OldVGroupEES,OldVGroupEDS\\r\\n| search CmdletResultValue.Parentgroup == \\\"{Group}\\\"\\r\\n| where todatetime (CmdletResultValue.LastPwdSetString) < ago(0d) or tostring (CmdletResultValue.LastPwdSetString) == \\\"\\\"\\r\\n| where todatetime (CmdletResultValue.LastLogonString) < ago(0d) or tostring (CmdletResultValue.LastLogonString) == \\\"\\\"\\r\\n| sort by tostring(CmdletResultValue.MemberPath) asc \\r\\n| where CmdletResultValue.Level != 0\\r\\n//| extend DN = tostring(CmdletResultValue.DN)\\r\\n| extend LastLogon = tostring(CmdletResultValue.LastLogonString)\\r\\n| extend LastLogon = iif(ObjectClass == \\\"group\\\" or ObjectClass == \\\"computer\\\" or ObjectClass == \\\"Local User\\\" or ObjectClass == \\\"computer\\\", \\\"N/A\\\", iif (todatetime (CmdletResultValue.LastLogonString) > ago(180d), CmdletResultValue.LastLogonString, iff (LastLogon == \\\"\\\", \\\"❌ Never logged\\\", strcat(\\\"❌\\\", LastLogon))))\\r\\n| extend LastPwdSet = CmdletResultValue.LastPwdSetString\\r\\n| extend LastPwdSet = iif(ObjectClass == \\\"group\\\" or ObjectClass == \\\"computer\\\" or ObjectClass == \\\"Local User\\\" or ObjectClass == \\\"computer\\\", \\\"N/A\\\", iif (todatetime (CmdletResultValue.LastPwdSetString) > ago(366d), CmdletResultValue.LastPwdSetString, iff (LastPwdSet == \\\"\\\", \\\"❌ Password never set\\\", strcat(\\\"❌\\\", LastPwdSet))))\\r\\n| extend MemberPath = case(ObjectClass == \\\"group\\\", strcat(\\\"👪 \\\", MemberPath), ObjectClass == \\\"computer\\\", strcat(\\\"💻 \\\", MemberPath), strcat(\\\"🧑‍🦰 \\\", MemberPath))\\r\\n| project Parentgroup, MemberPath, Level, ObjectClass,LastLogon, LastPwdSet ,Enabled,DN\\r\\n\",\"size\":1,\"showAnalytics\":true,\"noDataMessage\":\"The query returned no results.\",\"showExportToExcel\":true,\"queryType\":0,\"resourceType\":\"microsoft.operationalinsights/workspaces\",\"gridSettings\":{\"formatters\":[{\"columnMatch\":\"CmdletResultValue\",\"formatter\":5},{\"columnMatch\":\"Parentgroup\",\"formatter\":5},{\"columnMatch\":\"LastPwdSet\",\"formatter\":0,\"numberFormat\":{\"unit\":0,\"options\":{\"style\":\"decimal\"}}},{\"columnMatch\":\"ParentId\",\"formatter\":5},{\"columnMatch\":\"Id\",\"formatter\":5}],\"rowLimit\":10000,\"filter\":true}},\"showPin\":true,\"name\":\"ExchangeServersGroupsGrid\",\"styleSettings\":{\"showBorder\":true}}]},\"name\":\"group - 5\"}]},\"name\":\"Exchange group from old Exchange versions\"},{\"type\":12,\"content\":{\"version\":\"NotebookGroup/1.0\",\"groupType\":\"editable\",\"title\":\"Exchange group\",\"items\":[{\"type\":1,\"content\":{\"json\":\"ℹ️ Recommendations\\r\\n\\r\\n- Ensure that no service account are a member of the high privilege groups. Use RBAC to delegate the exact required permissions.\\r\\n- Limit the usage of nested group for administration.\\r\\n- Ensure that accounts are given only the required pernissions to execute their tasks.\\r\\n- Use just in time administration principle by adding users in a group only when they need the permissions, then remove them when their operation is over.\\r\\n- Limit the number of Organization management members. When you review the Admin Audit logs you might see that the administrators rarely needed Organization Management privileges.\\r\\n- Monitor the content of the following groups:\\r\\n - Organization Management\\r\\n - Recipient Management (Member of this group have at least the following rights : set-mailbox, Add-MailboxPermission)\\r\\n - Discovery Management\\r\\n - Server Management\\r\\n - Hygiene Management\\r\\n - Exchange Servers\\r\\n - Exchange Trusted Subsystem \\r\\n - Exchange Windows Permissions\\r\\n - xxx High privilege group (not an exhaustive list)\\r\\n - All RBAC groups that have high roles delegation\\r\\n - All nested groups in high privileges groups\\r\\n - Note that this is not a complete list. The content of all the groups that have high privileges should be monitored.\\r\\n- Each time a new RBAC group is created, decide if the content of this groups should be monitored\\r\\n- Periodically review the members of the groups\\r\\n\\r\\nHelp for Built-in role groups\",\"style\":\"info\"},\"conditionalVisibility\":{\"parameterName\":\"Help\",\"comparison\":\"isEqualTo\",\"value\":\"Yes\"},\"name\":\"text - 0\"},{\"type\":12,\"content\":{\"version\":\"NotebookGroup/1.0\",\"groupType\":\"editable\",\"title\":\"Summary content of most important groups\",\"items\":[{\"type\":3,\"content\":{\"version\":\"KqlItem/1.0\",\"query\":\"ExchangeConfiguration(SpecificSectionList=\\\"ExGroup\\\",SpecificConfigurationDate=\\\"{DateOfConfiguration:value}\\\",SpecificConfigurationEnv={EnvironmentList},Target = \\\"On-Premises\\\")\\r\\n| project CmdletResultValue\\r\\n| where CmdletResultValue.Level != 0 and CmdletResultValue.ObjectClass !contains \\\"group\\\"\\r\\n| extend MemberPath= tostring(split(tostring(CmdletResultValue.MemberPath),\\\"\\\\\\\\\\\")[countof(tostring(CmdletResultValue.MemberPath),\\\"\\\\\\\\\\\")])\\r\\n| summarize dcount(tostring(MemberPath)) by Parentgroup = tostring(CmdletResultValue.Parentgroup)\\r\\n| where Parentgroup in (\\\"Organization Management\\\", \\\"Compliance Management\\\", \\\"Discovery Management\\\", \\\"Server Management\\\", \\\"Recipient Manangement\\\",\\\"Security Administrator\\\", \\\"Hygiene Management\\\", \\\"Public Folder Manangement\\\", \\\"Records Manangement\\\") or Parentgroup contains \\\"Impersonation\\\" or Parentgroup contains \\\"Export\\\"\\r\\n| sort by dcount_MemberPath\\r\\n\\r\\n\",\"size\":4,\"showAnalytics\":true,\"showExportToExcel\":true,\"queryType\":0,\"resourceType\":\"microsoft.operationalinsights/workspaces\",\"visualization\":\"tiles\",\"tileSettings\":{\"titleContent\":{\"columnMatch\":\"Parentgroup\",\"formatter\":1},\"leftContent\":{\"columnMatch\":\"dcount_MemberPath\",\"formatter\":12,\"formatOptions\":{\"palette\":\"auto\"}},\"showBorder\":true}},\"name\":\"query - 0\"},{\"type\":12,\"content\":{\"version\":\"NotebookGroup/1.0\",\"groupType\":\"editable\",\"title\":\"Expand for summary content for all groups located in the OU Exchange Security Groups\",\"expandable\":true,\"items\":[{\"type\":3,\"content\":{\"version\":\"KqlItem/1.0\",\"query\":\"ExchangeConfiguration(SpecificSectionList=\\\"ExGroup\\\",SpecificConfigurationDate=\\\"{DateOfConfiguration:value}\\\",SpecificConfigurationEnv={EnvironmentList},Target = \\\"On-Premises\\\")\\r\\n| project CmdletResultValue\\r\\n| where CmdletResultValue.Level != 0 and CmdletResultValue.ObjectClass !contains \\\"group\\\"\\r\\n| extend MemberPath= tostring(split(tostring(CmdletResultValue.MemberPath),\\\"\\\\\\\\\\\")[countof(tostring(CmdletResultValue.MemberPath),\\\"\\\\\\\\\\\")])\\r\\n| summarize dcount(tostring(MemberPath)) by Parentgroup = tostring(CmdletResultValue.Parentgroup)\\r\\n| sort by dcount_MemberPath desc\\r\\n\\r\\n\",\"size\":1,\"showAnalytics\":true,\"title\":\"OU Exchange Security Groups\",\"showExportToExcel\":true,\"queryType\":0,\"resourceType\":\"microsoft.operationalinsights/workspaces\",\"visualization\":\"tiles\",\"tileSettings\":{\"titleContent\":{\"columnMatch\":\"Parentgroup\",\"formatter\":1},\"leftContent\":{\"columnMatch\":\"dcount_MemberPath\",\"formatter\":12,\"formatOptions\":{\"palette\":\"auto\"}},\"showBorder\":true}},\"showPin\":false,\"name\":\"query - 0 - Copy\"}]},\"name\":\"All groups\"}]},\"name\":\"ExchangeGroupsList\"},{\"type\":9,\"content\":{\"version\":\"KqlParameterItem/1.0\",\"parameters\":[{\"id\":\"b4b7a6ad-381a-48d6-9938-bf7cb812b474\",\"version\":\"KqlParameterItem/1.0\",\"name\":\"Group\",\"type\":2,\"query\":\"ExchangeConfiguration(SpecificSectionList=\\\"ExGroup\\\",SpecificConfigurationDate=\\\"{DateOfConfiguration:value}\\\",SpecificConfigurationEnv={EnvironmentList},Target = \\\"On-Premises\\\")\\r\\n//| where CmdletResultValue.Parentgroup != \\\"Exchange Trusted Subsystem\\\"\\r\\n//| where CmdletResultValue.Parentgroup != \\\"Exchange Windows Permissions\\\"\\r\\n| project CmdletResultValue\\r\\n| extend GroupName = tostring(CmdletResultValue.Parentgroup)\\r\\n| distinct GroupName\\r\\n| sort by GroupName asc\\r\\n\",\"typeSettings\":{\"showDefault\":false},\"showExportToExcel\":true,\"showAnalytics\":true,\"queryType\":0,\"resourceType\":\"microsoft.operationalinsights/workspaces\"},{\"id\":\"f3b935d7-b78f-41d2-94bc-f8c878a13260\",\"version\":\"KqlParameterItem/1.0\",\"name\":\"LastLogon\",\"label\":\"Last Logon >\",\"type\":10,\"isRequired\":true,\"multiSelect\":true,\"quote\":\"'\",\"delimiter\":\",\",\"typeSettings\":{\"showDefault\":false},\"jsonData\":\"[ {\\\"value\\\": \\\"0d\\\", \\\"label\\\": \\\"No filter\\\",\\\"selected\\\":true},\\r\\n{ \\\"value\\\": \\\"90d\\\", \\\"label\\\": \\\"90d\\\" },\\r\\n { \\\"value\\\": \\\"180d\\\", \\\"label\\\": \\\"6m\\\" },\\r\\n { \\\"value\\\": \\\"365d\\\", \\\"label\\\": \\\"1y\\\" },\\r\\n{ \\\"value\\\": \\\"730d\\\", \\\"label\\\": \\\"2y\\\" },\\r\\n{ \\\"value\\\": \\\"1085d\\\", \\\"label\\\": \\\"3y\\\" },\\r\\n{ \\\"value\\\": \\\"1097d\\\", \\\"label\\\": \\\"more than 3y\\\"},\\r\\n{ \\\"value\\\": \\\"3650d\\\", \\\"label\\\": \\\"more than 10y\\\"}\\r\\n]\"},{\"id\":\"3343688f-e609-4822-b4ed-cdd50b77d948\",\"version\":\"KqlParameterItem/1.0\",\"name\":\"PasswordLast\",\"label\":\"Password Last Set >\",\"type\":10,\"isRequired\":true,\"typeSettings\":{\"showDefault\":false},\"jsonData\":\"[{ \\\"value\\\": \\\"0d\\\", \\\"label\\\": \\\"No filter\\\",\\\"selected\\\":true },\\r\\n { \\\"value\\\": \\\"365d\\\", \\\"label\\\": \\\"1y\\\" },\\r\\n{ \\\"value\\\": \\\"730d\\\", \\\"label\\\": \\\"2y\\\" },\\r\\n{ \\\"value\\\": \\\"1095d\\\", \\\"label\\\": \\\"3y\\\" },\\r\\n{ \\\"value\\\": \\\"1097d\\\", \\\"label\\\": \\\"more than 3y\\\"},\\r\\n{ \\\"value\\\": \\\"3650d\\\", \\\"label\\\": \\\"more than 10y\\\"}\\r\\n]\"}],\"style\":\"pills\",\"queryType\":0,\"resourceType\":\"microsoft.operationalinsights/workspaces\"},\"name\":\"parameters - 3\"},{\"type\":1,\"content\":{\"json\":\"Exchange groups content (Extract for the OU \\\"Microsoft Exchange Security Groups\\\").\\r\\nSelect a group to display detailed information of its contents.\\r\\nLevel attribute helps you understand the level of nested groups.\\r\\n\\r\\n❌ : for last logon displayed when user logged or the last logon is greater than 180 days\\r\\n\\r\\n❌ : for password last set displayed when last password set greater than 365 days\"},\"name\":\"text - 2\"},{\"type\":3,\"content\":{\"version\":\"KqlItem/1.0\",\"query\":\"ExchangeConfiguration(SpecificSectionList=\\\"ExGroup\\\",SpecificConfigurationDate=\\\"{DateOfConfiguration:value}\\\",SpecificConfigurationEnv={EnvironmentList},Target = \\\"On-Premises\\\")\\r\\n| search CmdletResultValue.Parentgroup == \\\"{Group}\\\"\\r\\n| where todatetime (CmdletResultValue.LastPwdSetString) < ago({PasswordLast}) or tostring (CmdletResultValue.LastPwdSetString) == \\\"\\\"\\r\\n| where todatetime (CmdletResultValue.LastLogonString) < ago({LastLogon}) or tostring (CmdletResultValue.LastLogonString) == \\\"\\\"\\r\\n| where CmdletResultValue.Level != 0\\r\\n| sort by tostring(CmdletResultValue.MemberPath) asc \\r\\n| project CmdletResultValue\\r\\n| extend Parentgroup = tostring(CmdletResultValue.Parentgroup)\\r\\n| extend MemberPath = tostring(CmdletResultValue.MemberPath)\\r\\n| extend Level = tostring(CmdletResultValue.Level)\\r\\n| extend ObjectClass = tostring(CmdletResultValue.ObjectClass)\\r\\n| extend LastLogon = tostring(CmdletResultValue.LastLogonString)\\r\\n| extend LastLogon = iif(ObjectClass==\\\"group\\\" or ObjectClass==\\\"computer\\\" or ObjectClass==\\\"Local User\\\" or ObjectClass==\\\"computer\\\",\\\"N/A\\\",iif ( todatetime (CmdletResultValue.LastLogonString) > ago(180d), CmdletResultValue.LastLogonString,iff (LastLogon==\\\"\\\", \\\"❌ No logon\\\",strcat(\\\"❌\\\",LastLogon))))\\r\\n| extend LastPwdSet = CmdletResultValue.LastPwdSetString\\r\\n| extend LastPwdSet = iif(ObjectClass==\\\"group\\\" or ObjectClass==\\\"computer\\\" or ObjectClass==\\\"Local User\\\" or ObjectClass==\\\"computer\\\",\\\"N/A\\\",iif ( todatetime (CmdletResultValue.LastPwdSetString) > ago(366d), CmdletResultValue.LastPwdSetString,iff (LastPwdSet==\\\"\\\", \\\"❌ No logon\\\",strcat(\\\"❌\\\",LastPwdSet))))\\r\\n| extend Enabled = tostring(CmdletResultValue.Enabled)\\r\\n| extend DN = tostring(CmdletResultValue.DN)\\r\\n| sort by MemberPath asc\\r\\n//| extend MemberPath = case( ObjectClass == \\\"group\\\", strcat( \\\"👪 \\\", MemberPath), ObjectClass == \\\"computer\\\", strcat( \\\"💻 \\\", MemberPath), strcat( \\\"🧑‍🦰 \\\", MemberPath) )\\r\\n| project-away CmdletResultValue,Parentgroup\",\"size\":3,\"showAnalytics\":true,\"showExportToExcel\":true,\"queryType\":0,\"resourceType\":\"microsoft.operationalinsights/workspaces\",\"gridSettings\":{\"rowLimit\":10000,\"filter\":true,\"sortBy\":[{\"itemKey\":\"MemberPath\",\"sortOrder\":1}]},\"sortBy\":[{\"itemKey\":\"MemberPath\",\"sortOrder\":1}]},\"name\":\"ExchangeServersGroupsGrid\",\"styleSettings\":{\"showBorder\":true}}]},\"name\":\"Exchange group\"},{\"type\":12,\"content\":{\"version\":\"NotebookGroup/1.0\",\"groupType\":\"editable\",\"title\":\"AD Group\",\"items\":[{\"type\":1,\"content\":{\"json\":\"High privileges AD groups can take control of Exchange by adding any accounts in the Exchange groups.\\r\\n\\r\\nNote that the members of the Account Operators are able to manage every AD group (except those protected by AdminSDHolder). This means they can manage the content of every high privilege Exchange groups.\\r\\n\\r\\nℹ️ It is recommended to not use this group and to monitor its changes.\\r\\n\",\"style\":\"info\"},\"conditionalVisibility\":{\"parameterName\":\"Help\",\"comparison\":\"isEqualTo\",\"value\":\"Yes\"},\"name\":\"ADGroupHelp\"},{\"type\":9,\"content\":{\"version\":\"KqlParameterItem/1.0\",\"parameters\":[{\"id\":\"268bd356-7d05-41c3-9867-00c6ab198c5a\",\"version\":\"KqlParameterItem/1.0\",\"name\":\"Group\",\"type\":2,\"query\":\"ExchangeConfiguration(SpecificSectionList=\\\"ADGroup\\\",SpecificConfigurationDate=\\\"{DateOfConfiguration:value}\\\",SpecificConfigurationEnv={EnvironmentList},Target = \\\"On-Premises\\\")\\r\\n| project CmdletResultValue\\r\\n| extend GroupName = tostring(CmdletResultValue.Parentgroup)\\r\\n| distinct GroupName\\r\\n| sort by GroupName asc\\r\\n\",\"typeSettings\":{\"showDefault\":false},\"showExportToExcel\":true,\"showAnalytics\":true,\"queryType\":0,\"resourceType\":\"microsoft.operationalinsights/workspaces\",\"gridSettings\":{\"rowLimit\":10000}},{\"id\":\"9d02cad2-f4c5-418d-976f-b88b56f80cb5\",\"version\":\"KqlParameterItem/1.0\",\"name\":\"LastLogon\",\"label\":\"Last Logon\",\"type\":10,\"isRequired\":true,\"typeSettings\":{\"showDefault\":false},\"jsonData\":\"[ {\\\"value\\\": \\\"0d\\\", \\\"label\\\": \\\"No filter\\\",\\\"selected\\\":true},\\r\\n{ \\\"value\\\": \\\"90d\\\", \\\"label\\\": \\\"90d\\\" },\\r\\n { \\\"value\\\": \\\"180d\\\", \\\"label\\\": \\\"6m\\\" },\\r\\n { \\\"value\\\": \\\"365d\\\", \\\"label\\\": \\\"1y\\\" },\\r\\n{ \\\"value\\\": \\\"730d\\\", \\\"label\\\": \\\"2y\\\" },\\r\\n{ \\\"value\\\": \\\"1085d\\\", \\\"label\\\": \\\"3y\\\" },\\r\\n{ \\\"value\\\": \\\"1097d\\\", \\\"label\\\": \\\"more than 3y\\\"},\\r\\n{ \\\"value\\\": \\\"3650d\\\", \\\"label\\\": \\\"more than 10y\\\"}\\r\\n]\"},{\"id\":\"9e591429-d8ea-40c2-80c1-2426c72c92d5\",\"version\":\"KqlParameterItem/1.0\",\"name\":\"PasswordLast\",\"label\":\"Password Last Set\",\"type\":10,\"isRequired\":true,\"typeSettings\":{\"showDefault\":false},\"jsonData\":\"[{ \\\"value\\\": \\\"0d\\\", \\\"label\\\": \\\"No filter\\\",\\\"selected\\\":true },\\r\\n { \\\"value\\\": \\\"365d\\\", \\\"label\\\": \\\"1y\\\" },\\r\\n{ \\\"value\\\": \\\"730d\\\", \\\"label\\\": \\\"2y\\\" },\\r\\n{ \\\"value\\\": \\\"1095d\\\", \\\"label\\\": \\\"3y\\\" },\\r\\n{ \\\"value\\\": \\\"1097d\\\", \\\"label\\\": \\\"more than 3y\\\"},\\r\\n{ \\\"value\\\": \\\"3650d\\\", \\\"label\\\": \\\"more than 10y\\\"}\\r\\n]\"}],\"style\":\"pills\",\"queryType\":0,\"resourceType\":\"microsoft.operationalinsights/workspaces\"},\"name\":\"parameters - 1\"},{\"type\":1,\"content\":{\"json\":\"Overview of high privileges AD Groups' content.\\r\\nSelect a group to display detailed information of its contents.\\r\\nLevel attribute helps you understand the level of nested groups.\\r\\n\\r\\n❌ : for last logon displayed when user logged or the last logon is greater than 180 days\\r\\n\\r\\n❌ : for password last set displayed when last password set greater than 365 days\"},\"name\":\"text - 0\"},{\"type\":3,\"content\":{\"version\":\"KqlItem/1.0\",\"query\":\"ExchangeConfiguration(SpecificSectionList=\\\"ADGroup\\\",SpecificConfigurationDate=\\\"{DateOfConfiguration:value}\\\",SpecificConfigurationEnv={EnvironmentList},Target = \\\"On-Premises\\\")\\r\\n| search CmdletResultValue.Parentgroup == \\\"{Group}\\\"\\r\\n| where todatetime (CmdletResultValue.LastPwdSetString) < ago({PasswordLast}) or tostring (CmdletResultValue.LastPwdSetString) == \\\"\\\"\\r\\n| where todatetime (CmdletResultValue.LastLogonString) < ago({LastLogon}) or tostring (CmdletResultValue.LastLogonString) == \\\"\\\"\\r\\n| where CmdletResultValue.Level != 0\\r\\n| sort by tostring(CmdletResultValue.MemberPath) asc \\r\\n| project CmdletResultValue\\r\\n| extend Parentgroup = tostring(CmdletResultValue.Parentgroup)\\r\\n| extend MemberPath = tostring(CmdletResultValue.MemberPath)\\r\\n| extend Level = tostring(CmdletResultValue.Level)\\r\\n| extend ObjectClass = tostring(CmdletResultValue.ObjectClass)\\r\\n| extend LastLogon = tostring(CmdletResultValue.LastLogonString)\\r\\n| extend LastLogon = iif(ObjectClass==\\\"group\\\" or ObjectClass==\\\"computer\\\" or ObjectClass==\\\"Local User\\\" or ObjectClass==\\\"computer\\\",\\\"N/A\\\",iif ( todatetime (CmdletResultValue.LastLogonString) > ago(180d), CmdletResultValue.LastLogonString,iff (LastLogon==\\\"\\\", \\\"❌ No logon\\\",strcat(\\\"❌\\\",LastLogon))))\\r\\n| extend LastPwdSet = CmdletResultValue.LastPwdSetString\\r\\n| extend LastPwdSet = iif(ObjectClass==\\\"group\\\" or ObjectClass==\\\"computer\\\" or ObjectClass==\\\"Local User\\\" or ObjectClass==\\\"computer\\\",\\\"N/A\\\",iif ( todatetime (CmdletResultValue.LastPwdSetString) > ago(366d), CmdletResultValue.LastPwdSetString,iff (LastPwdSet==\\\"\\\", \\\"❌ No logon\\\",strcat(\\\"❌\\\",LastPwdSet))))\\r\\n| extend Enabled = tostring(CmdletResultValue.Enabled)\\r\\n| extend DN = tostring(CmdletResultValue.DN)\\r\\n| sort by MemberPath asc\\r\\n//| extend MemberPath = case( ObjectClass == \\\"group\\\", strcat( \\\"👪 \\\", MemberPath), ObjectClass == \\\"computer\\\", strcat( \\\"💻 \\\", MemberPath), strcat( \\\"🧑‍🦰 \\\", MemberPath) )\\r\\n| project-away CmdletResultValue,Parentgroup\",\"size\":3,\"showAnalytics\":true,\"showExportToExcel\":true,\"queryType\":0,\"resourceType\":\"microsoft.operationalinsights/workspaces\",\"gridSettings\":{\"formatters\":[{\"columnMatch\":\"CmdletResultValue\",\"formatter\":5},{\"columnMatch\":\"Parentgroup\",\"formatter\":5}],\"rowLimit\":10000,\"filter\":true}},\"name\":\"query - 2\",\"styleSettings\":{\"showBorder\":true}}]},\"name\":\"AD Group\"}]},\"conditionalVisibility\":{\"parameterName\":\"selected\",\"comparison\":\"isEqualTo\",\"value\":\"ExchAD\"},\"name\":\"Exchange and AD GRoup\"},{\"type\":12,\"content\":{\"version\":\"NotebookGroup/1.0\",\"groupType\":\"editable\",\"title\":\"Transport Security configuration\",\"items\":[{\"type\":1,\"content\":{\"json\":\"This tab displays differents security configuration for transport components.\"},\"name\":\"text - 10\"},{\"type\":12,\"content\":{\"version\":\"NotebookGroup/1.0\",\"groupType\":\"editable\",\"title\":\"Receive Connectors\",\"items\":[{\"type\":3,\"content\":{\"version\":\"KqlItem/1.0\",\"query\":\"ExchangeConfiguration(SpecificSectionList=\\\"ReceiveConnector\\\",SpecificConfigurationDate=\\\"{DateOfConfiguration:value}\\\",SpecificConfigurationEnv={EnvironmentList},Target = \\\"On-Premises\\\")\\r\\n| where CmdletResultValue.PermissionGroupsString contains \\\"Anonymous\\\"\\r\\n| summarize Count = countif (CmdletResultValue.PermissionGroupsString contains \\\"Anonymous\\\") by Name,tostring(CmdletResultValue.Server.Name)\\r\\n\",\"size\":0,\"title\":\"Anonymous Configuration\",\"queryType\":0,\"resourceType\":\"microsoft.operationalinsights/workspaces\",\"visualization\":\"piechart\",\"chartSettings\":{\"yAxis\":[\"Count\"],\"group\":\"CmdletResultValue_Server_Name\",\"ySettings\":{\"numberFormatSettings\":{\"unit\":0,\"options\":{\"style\":\"decimal\",\"useGrouping\":true}}}}},\"customWidth\":\"33\",\"name\":\"query - 0\"},{\"type\":3,\"content\":{\"version\":\"KqlItem/1.0\",\"query\":\"ExchangeConfiguration(SpecificSectionList=\\\"RCAnonymous\\\",SpecificConfigurationDate=\\\"{DateOfConfiguration:value}\\\",SpecificConfigurationEnv={EnvironmentList},Target = \\\"On-Premises\\\")\\r\\n| extend Identity = tostring(Identity)\\r\\n|summarize count() by Identity\",\"size\":0,\"title\":\"OpenRelay with \\\"ms-Exch-SMTP-Accept-Any-Recipient\\\" for Anonymous\",\"queryType\":0,\"resourceType\":\"microsoft.operationalinsights/workspaces\",\"visualization\":\"piechart\"},\"customWidth\":\"33\",\"name\":\"query - 1\"},{\"type\":3,\"content\":{\"version\":\"KqlItem/1.0\",\"query\":\"ExchangeConfiguration(SpecificSectionList=\\\"ReceiveConnector\\\",SpecificConfigurationDate=\\\"{DateOfConfiguration:value}\\\",SpecificConfigurationEnv={EnvironmentList},Target = \\\"On-Premises\\\")\\r\\n| where CmdletResultValue.AuthMechanismString contains (\\\"ExternalAuthoritative\\\")\\r\\n| extend Server = tostring(CmdletResultValue.Server.Name)\\r\\n| summarize count() by Name,Server\\r\\n\",\"size\":0,\"title\":\"Open Relay using with Externally Secure\",\"queryType\":0,\"resourceType\":\"microsoft.operationalinsights/workspaces\",\"visualization\":\"piechart\"},\"customWidth\":\"33\",\"name\":\"query - 2\"}]},\"name\":\"group - 8\"},{\"type\":12,\"content\":{\"version\":\"NotebookGroup/1.0\",\"groupType\":\"editable\",\"title\":\"Receive Connectors OpenRelay using Extended Right \\\"ms-Exch-SMTP-Accept-Any-Recipient\\\" for Anonymous\",\"items\":[{\"type\":1,\"content\":{\"json\":\"This view shows all **Receive Connectors** configured configured as Open Relay with the Extended Rights \\\"ms-Exch-SMTP-Accept-Any-Recipient\\\" set on the Receive Connector object in the Configuration partition.\\r\\n\\r\\n\\r\\nRemember that with this configuration, the Exchange servers can be used to send emails outside the organization. Depending on the configuration, the connectors may be protected by IPs. However, IP protection is not safe configuration.\\r\\n\\r\\nYou can check if the \\\"ms-Exch-SMTP-Accept-Any-Recipient\\\" ExtendedRights has been added on the Receive connector for Anonymous with PowerShell: `Get-ReceiveConnector | Get-ADPermission | ? {$_.ExtendedRights -like \\\"ms-Exch-SMTP-Accept-Any-Recipient\\\"}`\\r\\n\\r\\nAllow anonymous relay on Exchange server\\r\\n\\r\\nSee the section \\\"Receive Connectors with Anonymous Permission\\\" for additional information regarding Anonymous authentication and IP protection.\",\"style\":\"info\"},\"conditionalVisibility\":{\"parameterName\":\"Help\",\"comparison\":\"isEqualTo\",\"value\":\"Yes\"},\"name\":\"ReceiveConnectorsHelp\"},{\"type\":9,\"content\":{\"version\":\"KqlParameterItem/1.0\",\"parameters\":[{\"id\":\"fa5f9749-d6f8-436f-ae00-cba306713bac\",\"version\":\"KqlParameterItem/1.0\",\"name\":\"Server\",\"type\":2,\"query\":\"ExchangeConfiguration(SpecificSectionList=\\\"ExchangeServers\\\",SpecificConfigurationDate=\\\"{DateOfConfiguration:value}\\\",SpecificConfigurationEnv={EnvironmentList},Target = \\\"On-Premises\\\")\\r\\n| project CmdletResultValue\\r\\n| where CmdletResultValue.ServerRole <> \\\"64\\\"\\r\\n| extend SRVName = tostring(CmdletResultValue.Name)\\r\\n| distinct SRVName\\r\\n| sort by SRVName asc\",\"typeSettings\":{\"showDefault\":false},\"timeContext\":{\"durationMs\":86400000},\"queryType\":0,\"resourceType\":\"microsoft.operationalinsights/workspaces\"},{\"id\":\"14912e83-60a1-4a21-a34b-500d4662a666\",\"version\":\"KqlParameterItem/1.0\",\"name\":\"NoIPRestriction\",\"type\":10,\"isRequired\":true,\"typeSettings\":{\"showDefault\":false},\"jsonData\":\"[\\r\\n { \\\"value\\\": \\\"True\\\", \\\"label\\\": \\\"Yes\\\" },\\r\\n { \\\"value\\\": \\\"True,False\\\", \\\"label\\\": \\\"No\\\", \\\"selected\\\":\\\"False\\\" }\\r\\n]\",\"timeContext\":{\"durationMs\":86400000}}],\"style\":\"pills\",\"queryType\":0,\"resourceType\":\"microsoft.operationalinsights/workspaces\"},\"name\":\"parameters - 2\"},{\"type\":1,\"content\":{\"json\":\"The toogle buttom help you to sort by:\\r\\n\\r\\n- Server\\r\\n- Receive connectors with no IP restrictions\"},\"name\":\"text - 3\"},{\"type\":3,\"content\":{\"version\":\"KqlItem/1.0\",\"query\":\"ExchangeConfiguration(SpecificSectionList=\\\"RCAnonymous\\\",SpecificConfigurationDate=\\\"{DateOfConfiguration:value}\\\",SpecificConfigurationEnv={EnvironmentList},Target = \\\"On-Premises\\\")\\r\\n| project Identity,CmdletResultValue\\r\\n| extend Identity = tostring(Identity)\\r\\n| extend Server = replace_string(replace_string(tostring(split(CmdletResultValue.DistinguishedName,\\\",\\\",3)),\\\"[\\\\\\\"CN=\\\",\\\"\\\"),\\\"\\\\\\\"]\\\",\\\"\\\")\\r\\n|join kind=leftouter ( ExchangeConfiguration(SpecificSectionList=\\\"ReceiveConnector\\\",SpecificConfigurationDate=\\\"{DateOfConfiguration:value}\\\",SpecificConfigurationEnv={EnvironmentList},Target = \\\"On-Premises\\\") ) on $left.Identity == $right.Name\\r\\n| where CmdletResultValue1.Server.Name contains \\\"{Server}\\\"\\r\\n| where (CmdletResultValue1.RemoteIPRanges contains \\\"0.0.0.0\\\" or CmdletResultValue1.RemoteIPRanges contains \\\"ffff:ffff:ffff:ffff:ffff:ffff:ffff:ffff\\\") in ({NoIPRestriction})\\r\\n| where CmdletResultValue1.PermissionGroupsString contains \\\"Anonymous\\\" //> 12 and CmdletResultValue.PermissionGroups != 14 and CmdletResultValue.PermissionGroups != 16\\r\\n| extend Server = tostring(CmdletResultValue1.Server.Name)\\r\\n| extend Name = tostring(CmdletResultValue1.Name)\\r\\n| extend TransportRole = iff(CmdletResultValue1.TransportRole== \\\"32\\\" , \\\"HubTransport\\\", \\\"FrontendTransport\\\")\\r\\n| extend Enabled = tostring(CmdletResultValue1.Enabled)\\r\\n| extend PermissionGroups = tostring(CmdletResultValue1.PermissionGroupsString) \\r\\n| extend AuthMechanism = tostring(CmdletResultValue1.AuthMechanismString)\\r\\n| mv-expand RemoteIPall=CmdletResultValue1.RemoteIPRanges\\r\\n| mv-expand BindingAllall=CmdletResultValue1.Bindings\\r\\n| extend RemoteIP= RemoteIPall.Expression\\r\\n| extend IP= strcat (BindingAllall.Address,\\\"-\\\",BindingAllall.Port)\\r\\n| summarize Bindings = make_set(tostring(IP)),RemoteIPRange = make_set(tostring(RemoteIP)) by Server,Name,TransportRole,Enabled,PermissionGroups,AuthMechanism\\r\\n| sort by Server asc\",\"size\":1,\"showAnalytics\":true,\"showExportToExcel\":true,\"queryType\":0,\"resourceType\":\"microsoft.operationalinsights/workspaces\",\"gridSettings\":{\"rowLimit\":10000,\"filter\":true,\"sortBy\":[{\"itemKey\":\"Server\",\"sortOrder\":1}]},\"sortBy\":[{\"itemKey\":\"Server\",\"sortOrder\":1}]},\"name\":\"RCAnonymousQuery\",\"styleSettings\":{\"showBorder\":true}}]},\"name\":\"Receive Connectors OpenRelay using Extended Right \\\"ms-Exch-SMTP-Accept-Any-Recipient\\\" for Anonymous\"},{\"type\":12,\"content\":{\"version\":\"NotebookGroup/1.0\",\"groupType\":\"editable\",\"title\":\"Receive Connectors OpenRelay using Authentication ExternalAuthoritative\",\"items\":[{\"type\":1,\"content\":{\"json\":\"This view shows all Receive Connectors configured with authentication set to Externally Secure. With this configuration the Receive connector will be allow as Open Relay.\\r\\n\\r\\nRemember that with this configuration, the Exchange servers can be used to send emails outside the organization. Depending on the configuration, the connectors may be protected by IP. However, IP protection is not safe configuration.\\r\\n\\r\\n\\r\\nAllow anonymous relay on Exchange server\\r\\n\\r\\nSee the section \\\"Receive Connectors with Anonymous Permission\\\" for additional information regarding Anonymous authentication and IP protection.\\r\\n\",\"style\":\"info\"},\"conditionalVisibility\":{\"parameterName\":\"Help\",\"comparison\":\"isEqualTo\",\"value\":\"Yes\"},\"name\":\"ReceiveConnectorsHelp\"},{\"type\":9,\"content\":{\"version\":\"KqlParameterItem/1.0\",\"parameters\":[{\"id\":\"195a66a1-7aa2-4564-bd3b-233049d6f101\",\"version\":\"KqlParameterItem/1.0\",\"name\":\"Server\",\"type\":2,\"query\":\"ExchangeConfiguration(SpecificSectionList=\\\"ExchangeServers\\\",SpecificConfigurationDate=\\\"{DateOfConfiguration:value}\\\",SpecificConfigurationEnv={EnvironmentList},Target = \\\"On-Premises\\\")\\r\\n| project CmdletResultValue\\r\\n| where CmdletResultValue.ServerRole <> \\\"64\\\"\\r\\n| extend SRVName = tostring(CmdletResultValue.Name)\\r\\n| distinct SRVName\\r\\n| sort by SRVName asc\",\"typeSettings\":{\"showDefault\":false},\"queryType\":0,\"resourceType\":\"microsoft.operationalinsights/workspaces\"},{\"id\":\"4ef1d2a2-a13f-4bd4-9e66-2d9a15ad8a7a\",\"version\":\"KqlParameterItem/1.0\",\"name\":\"NoIPRestriction\",\"type\":10,\"description\":\"See Receive Connectors with no IP restriction\",\"isRequired\":true,\"jsonData\":\"[\\r\\n { \\\"value\\\": \\\"True\\\", \\\"label\\\": \\\"Yes\\\" },\\r\\n { \\\"value\\\": \\\"True,False\\\", \\\"label\\\": \\\"No\\\", \\\"selected\\\":\\\"False\\\" }\\r\\n]\"}],\"style\":\"pills\",\"queryType\":0,\"resourceType\":\"microsoft.operationalinsights/workspaces\"},\"name\":\"parameters - 3\"},{\"type\":1,\"content\":{\"json\":\"The toogle buttom help you to sort by:\\r\\n\\r\\n- Server\\r\\n- Receive connectors with no IP restrictions\"},\"name\":\"text - 3\"},{\"type\":3,\"content\":{\"version\":\"KqlItem/1.0\",\"query\":\"ExchangeConfiguration(SpecificSectionList=\\\"ReceiveConnector\\\",SpecificConfigurationDate=\\\"{DateOfConfiguration:value}\\\",SpecificConfigurationEnv={EnvironmentList},Target = \\\"On-Premises\\\")\\r\\n| where CmdletResultValue.Server.Name contains \\\"{Server}\\\"\\r\\n| where (CmdletResultValue.RemoteIPRanges contains \\\"0.0.0.0\\\" or CmdletResultValue.RemoteIPRanges contains \\\"ffff:ffff:ffff:ffff:ffff:ffff:ffff:ffff\\\") in ({NoIPRestriction})\\r\\n| where CmdletResultValue.AuthMechanismString contains \\\"ExternalAuthoritative\\\" //> 12 and CmdletResultValue.PermissionGroups != 14 and CmdletResultValue.PermissionGroups != 16\\r\\n| project CmdletResultValue\\r\\n| extend Server = tostring(CmdletResultValue.Server.Name)\\r\\n| extend Name = tostring(CmdletResultValue.Name)\\r\\n| extend TransportRole = iff(CmdletResultValue.TransportRole== \\\"32\\\" , \\\"HubTransport\\\", \\\"FrontendTransport\\\")\\r\\n| extend Enabled = tostring(CmdletResultValue.Enabled)\\r\\n| extend PermissionGroups = tostring(CmdletResultValue.PermissionGroupsString)\\r\\n//| extend Bindings = iif(tostring(parse_json(tostring(CmdletResultValue.Bindings))[1].Port )!=\\\"\\\",tostring(strcat(tostring(parse_json(tostring(CmdletResultValue.Bindings))[0].Address),\\\"-\\\",tostring(parse_json(tostring(CmdletResultValue.Bindings))[0].Port),\\\",\\\",tostring(parse_json(tostring(CmdletResultValue.Bindings))[1].Address),\\\"-\\\",tostring(parse_json(tostring(CmdletResultValue.Bindings))[1].Port))),tostring(strcat(tostring(parse_json(tostring(CmdletResultValue.Bindings))[0].Address),\\\"-\\\",tostring(parse_json(tostring(CmdletResultValue.Bindings))[0].Port))))\\r\\n//| extend RemoteIPRanges = tostring(CmdletResultValue.RemoteIPRanges)\\r\\n| extend AuthMechanism = tostring(CmdletResultValue.AuthMechanismString)\\r\\n| mv-expand RemoteIPall=CmdletResultValue.RemoteIPRanges\\r\\n| mv-expand BindingAllall=CmdletResultValue.Bindings\\r\\n| extend RemoteIP= RemoteIPall.Expression\\r\\n| extend IP= strcat (BindingAllall.Address,\\\"-\\\",BindingAllall.Port)\\r\\n| summarize Bindings = make_set(tostring(IP)),RemoteIPRange = make_set(tostring(RemoteIP)) by Server,Name,TransportRole,Enabled,PermissionGroups,AuthMechanism\\r\\n| sort by Server asc\\r\\n\",\"size\":1,\"showAnalytics\":true,\"title\":\"Receive Connectors configure with Externally Secured Authentication\",\"showExportToExcel\":true,\"queryType\":0,\"resourceType\":\"microsoft.operationalinsights/workspaces\",\"gridSettings\":{\"rowLimit\":10000,\"filter\":true,\"sortBy\":[{\"itemKey\":\"Server\",\"sortOrder\":1}]},\"sortBy\":[{\"itemKey\":\"Server\",\"sortOrder\":1}]},\"name\":\"query - 2\",\"styleSettings\":{\"showBorder\":true}}]},\"name\":\"Security Transport Configuration\"},{\"type\":12,\"content\":{\"version\":\"NotebookGroup/1.0\",\"groupType\":\"editable\",\"title\":\"Receive Connectors with Anonymous Permission\",\"items\":[{\"type\":1,\"content\":{\"json\":\"This view shows all Receive Connectors configured with Anonymous authentication. It is not recommended to configure connectors with Anonymous authentication.\\r\\n\\r\\nWhen configured with Anonymous and No Ip Restriction, any machine can initiate an SMTP session with the Receive Connectors. This can then be used send emails (SPAM/Virus/Phishing....) to all the mailboxes in the organization. The mail will be seen as an internal mail and might bypass some protections.\\r\\n\\r\\nIf you absolute need this configuration because some of your application does not support Authentication, it is strongly recommended to limit the IP addresses that can establish SMTP sessions with Exchange. Do not use range of subnet.\\r\\n\\r\\nThis section has an option button to display \\r\\n All Receive Connectors with Anonymous (No)\\r\\n All Receive Connectors with Anonymous and with no IP Restriction (Yes)\",\"style\":\"info\"},\"conditionalVisibility\":{\"parameterName\":\"Help\",\"comparison\":\"isEqualTo\",\"value\":\"Yes\"},\"name\":\"ReceiveConnectorsHelp\"},{\"type\":9,\"content\":{\"version\":\"KqlParameterItem/1.0\",\"parameters\":[{\"id\":\"195a66a1-7aa2-4564-bd3b-233049d6f101\",\"version\":\"KqlParameterItem/1.0\",\"name\":\"Server\",\"type\":2,\"query\":\"ExchangeConfiguration(SpecificSectionList=\\\"ExchangeServers\\\",SpecificConfigurationDate=\\\"{DateOfConfiguration:value}\\\",SpecificConfigurationEnv={EnvironmentList},Target = \\\"On-Premises\\\")\\r\\n| project CmdletResultValue\\r\\n| where CmdletResultValue.ServerRole <> \\\"64\\\"\\r\\n| extend SRVName = tostring(CmdletResultValue.Name)\\r\\n| distinct SRVName\\r\\n| sort by SRVName asc\",\"typeSettings\":{\"showDefault\":false},\"queryType\":0,\"resourceType\":\"microsoft.operationalinsights/workspaces\"},{\"id\":\"bcb24a01-9242-4fec-b30a-02b0583cbc87\",\"version\":\"KqlParameterItem/1.0\",\"name\":\"NoIPRestriction\",\"type\":10,\"isRequired\":true,\"typeSettings\":{\"showDefault\":false},\"jsonData\":\"[\\r\\n { \\\"value\\\": \\\"True\\\", \\\"label\\\": \\\"Yes\\\" },\\r\\n { \\\"value\\\": \\\"True,False\\\", \\\"label\\\": \\\"No\\\", \\\"selected\\\":\\\"False\\\" }\\r\\n]\"}],\"style\":\"pills\",\"queryType\":0,\"resourceType\":\"microsoft.operationalinsights/workspaces\"},\"name\":\"parameters - 3\"},{\"type\":1,\"content\":{\"json\":\"The toogle buttom help you to sort by:\\r\\n\\r\\n- Server\\r\\n- Receive connectors with no IP restrictions\"},\"name\":\"text - 3 - Copy\"},{\"type\":3,\"content\":{\"version\":\"KqlItem/1.0\",\"query\":\"ExchangeConfiguration(SpecificSectionList=\\\"ReceiveConnector\\\",SpecificConfigurationDate=\\\"{DateOfConfiguration:value}\\\",SpecificConfigurationEnv={EnvironmentList},Target = \\\"On-Premises\\\")\\r\\n| where CmdletResultValue.Server.Name contains \\\"{Server}\\\"\\r\\n| where (CmdletResultValue.RemoteIPRanges contains \\\"0.0.0.0\\\" or CmdletResultValue.RemoteIPRanges contains \\\"ffff:ffff:ffff:ffff:ffff:ffff:ffff:ffff\\\") in ({NoIPRestriction})\\r\\n| where CmdletResultValue.PermissionGroupsString contains \\\"Anonymous\\\" //> 12 and CmdletResultValue.PermissionGroups != 14 and CmdletResultValue.PermissionGroups != 16\\r\\n| project CmdletResultValue\\r\\n| extend Server = tostring(CmdletResultValue.Server.Name)\\r\\n| extend Name = tostring(CmdletResultValue.Name)\\r\\n| extend TransportRole = iff(CmdletResultValue.TransportRole== \\\"32\\\" , \\\"HubTransport\\\", \\\"FrontendTransport\\\")\\r\\n| extend Enabled = tostring(CmdletResultValue.Enabled)\\r\\n| extend PermissionGroups = tostring(CmdletResultValue.PermissionGroupsString) \\r\\n| extend AuthMechanism = tostring(CmdletResultValue.AuthMechanismString)\\r\\n| mv-expand RemoteIPall=CmdletResultValue.RemoteIPRanges\\r\\n| mv-expand BindingAllall=CmdletResultValue.Bindings\\r\\n| extend RemoteIP= RemoteIPall.Expression\\r\\n| extend IP= strcat (BindingAllall.Address,\\\"-\\\",BindingAllall.Port)\\r\\n| summarize Bindings = make_set(tostring(IP)),RemoteIPRange = make_set(tostring(RemoteIP)) by Server,Name,TransportRole,Enabled,PermissionGroups,AuthMechanism\\r\\n| sort by Server asc\\r\\n\",\"size\":1,\"showAnalytics\":true,\"title\":\"Receive Connectors configure with Anonymous Permission\",\"showExportToExcel\":true,\"queryType\":0,\"resourceType\":\"microsoft.operationalinsights/workspaces\",\"gridSettings\":{\"rowLimit\":10000,\"filter\":true,\"sortBy\":[{\"itemKey\":\"Server\",\"sortOrder\":1}]},\"sortBy\":[{\"itemKey\":\"Server\",\"sortOrder\":1}]},\"name\":\"query - 2\",\"styleSettings\":{\"showBorder\":true}}]},\"name\":\"Receive Connectors configure with Anonymous Permission\"},{\"type\":12,\"content\":{\"version\":\"NotebookGroup/1.0\",\"groupType\":\"editable\",\"title\":\"Transport Rules with specific actions to monitor\",\"items\":[{\"type\":1,\"content\":{\"json\":\"A common way used by attackers to exfiltrate data is to set Transport Rules that send all or sensitive messages outside the organization or to a mailbox where they already have full control.\\r\\n\\r\\nThis section shows your Transport rules with sentitive actions that can lead to data leaks:\\r\\n- BlindCopyTo\\r\\n- RedirectMessageTo\\r\\n- CopyTo\\r\\n\\r\\n\\r\\nFor more information :\\r\\nMail flow rules in Exchange Serve\\r\\n\",\"style\":\"info\"},\"conditionalVisibility\":{\"parameterName\":\"Help\",\"comparison\":\"isEqualTo\",\"value\":\"Yes\"},\"name\":\"TransportRulesHelp\"},{\"type\":3,\"content\":{\"version\":\"KqlItem/1.0\",\"query\":\"ExchangeConfiguration(SpecificSectionList=\\\"TransportRule\\\",SpecificConfigurationDate=\\\"{DateOfConfiguration:value}\\\",SpecificConfigurationEnv={EnvironmentList},Target = \\\"On-Premises\\\")\\r\\n| project CmdletResultValue\\r\\n| extend Identity = iif( CmdletResultValue.Identity contains \\\"OrgHierarchyToIgnore\\\",tostring(CmdletResultValue.Identity.Name),tostring(CmdletResultValue.Identity))\\r\\n//| extend State = tostring(CmdletResultValue.State)\\r\\n| extend Status= iff ( tostring(CmdletResultValue.State)== \\\"Enabled\\\" or tostring(CmdletResultValue.State)== \\\"1\\\" , \\\"Enabled\\\",iff(tostring(CmdletResultValue.State)==\\\"\\\",\\\"\\\", \\\"Disabled\\\"))\\r\\n| extend SentTo = tostring(CmdletResultValue.SentToString)\\r\\n| extend BlindCopyTo = tostring(CmdletResultValue.BlindCopyToString)\\r\\n| extend CopyTo = tostring(CmdletResultValue.CopyToString)\\r\\n| extend RedirectMessageTo = tostring(CmdletResultValue.RedirectMessageToString)\\r\\n| extend Mode = tostring(CmdletResultValue.Identity.Mode)\\r\\n| project-away CmdletResultValue\\r\\n| sort by Identity asc\\r\\n| sort by Status desc\",\"size\":1,\"showAnalytics\":true,\"showExportToExcel\":true,\"queryType\":0,\"resourceType\":\"microsoft.operationalinsights/workspaces\",\"gridSettings\":{\"rowLimit\":10000,\"filter\":true}},\"name\":\"query - 1\",\"styleSettings\":{\"showBorder\":true}}]},\"name\":\"Transport Rules actions to monitor\"},{\"type\":1,\"content\":{\"json\":\"### Journal Mailboxes\"},\"name\":\"JournalMailboxHelp\"},{\"type\":1,\"content\":{\"json\":\"The **Journal Mailboxes** contain emails sent and received by specific or all users. The content of these mailboxes is very sensitives.\\r\\n\\r\\nJournal Rules should be reviewed to check if they are still needed. Mailbox audit should be set on these mailboxes. Also by default, no one should access to these mailboxes.\\r\\n\\r\\nThen, it is recommended to regularly check who have Full Access mailbox or Receive As on these mailboxes.\\r\\nAdditional information :\\r\\n\\r\\nJournaling in Exchange Server\\r\\n\\r\\nJournaling procedures\\r\\n\\r\\n\\r\\nMailbox audit logging in Exchange Server\\r\\n\\r\\n\\r\\n\",\"style\":\"info\"},\"conditionalVisibility\":{\"parameterName\":\"Help\",\"comparison\":\"isEqualTo\",\"value\":\"Yes\"},\"name\":\"JournalHelp\"},{\"type\":3,\"content\":{\"version\":\"KqlItem/1.0\",\"query\":\"ExchangeConfiguration(SpecificSectionList=\\\"JournalRule\\\",SpecificConfigurationDate=\\\"{DateOfConfiguration:value}\\\",SpecificConfigurationEnv={EnvironmentList},Target = \\\"On-Premises\\\")\\r\\n| project CmdletResultValue\\r\\n| extend Identity = tostring(CmdletResultValue.Identity)\\r\\n| extend Status= iff ( tostring(CmdletResultValue.Enabled)== \\\"Enabled\\\" or tostring(CmdletResultValue.Enabled)== \\\"1\\\" , \\\"Enabled\\\", iff(tostring(CmdletResultValue.Enabled)==\\\"\\\",\\\"\\\", \\\"Disabled\\\"))\\r\\n//| extend Enabled = tostring(CmdletResultValue.Enabled)\\r\\n| extend JournalEmailAddress = tostring(CmdletResultValue.JournalEmailAddress)\\r\\n| extend Recipient = tostring(CmdletResultValue.Recipient)\\r\\n| sort by Identity asc\\r\\n| sort by Status desc\\r\\n| project-away CmdletResultValue\\r\\n\",\"size\":1,\"showAnalytics\":true,\"title\":\"Journal Rules configured in your environment\",\"showExportToExcel\":true,\"queryType\":0,\"resourceType\":\"microsoft.operationalinsights/workspaces\",\"gridSettings\":{\"rowLimit\":10000,\"filter\":true}},\"name\":\"JournalQuery\",\"styleSettings\":{\"showBorder\":true}},{\"type\":12,\"content\":{\"version\":\"NotebookGroup/1.0\",\"groupType\":\"editable\",\"title\":\"Journal Recipients on mailbox databases configured in your environment\",\"items\":[{\"type\":1,\"content\":{\"json\":\"As Journal Recipient on databases send all the mail send to users in this database to a specific mailbox. The content of these mailboxes is very sensitive.\\r\\n\\r\\nJournal Recipients configuration should be reviewed to check if they are still needed. Mailbox audit should be set on these mailboxes. No one should have access to these mailboxes by default.\\r\\n\\r\\nIt is recommended to regularly check who have Full Access or Receive As on these mailboxes.\\r\\n\\r\\nAdditional information :\\r\\n\\r\\nJournaling in Exchange Server\\r\\n\\r\\nJournaling procedures\\r\\n\\r\\n\\r\\nMailbox audit logging in Exchange Server\\r\\n\",\"style\":\"info\"},\"conditionalVisibility\":{\"parameterName\":\"Help\",\"comparison\":\"isEqualTo\",\"value\":\"Yes\"},\"name\":\"JournalRecipientsHelp\"},{\"type\":3,\"content\":{\"version\":\"KqlItem/1.0\",\"query\":\"ExchangeConfiguration(SpecificSectionList=\\\"MbxDBJournaling\\\",SpecificConfigurationDate=\\\"{DateOfConfiguration:value}\\\",SpecificConfigurationEnv={EnvironmentList},Target = \\\"On-Premises\\\")\\r\\n| where CmdletResultValue.JournalRecipient !=\\\"\\\"\\r\\n| project CmdletResultValue\\r\\n| extend Identity = tostring(CmdletResultValue.Identity.Name)\\r\\n| extend Enabled = tostring(CmdletResultValue.Enabled)\\r\\n| extend JournalRecipient = tostring(CmdletResultValue.JournalRecipient)\\r\\n| project-away CmdletResultValue\\r\\n| sort by Identity asc\\r\\n\",\"size\":1,\"showAnalytics\":true,\"showExportToExcel\":true,\"queryType\":0,\"resourceType\":\"microsoft.operationalinsights/workspaces\"},\"name\":\"query - 1\",\"styleSettings\":{\"showBorder\":true}}]},\"name\":\"JournalRecipientsGroup\"},{\"type\":12,\"content\":{\"version\":\"NotebookGroup/1.0\",\"groupType\":\"editable\",\"title\":\"Remote Domain Autofoward Configuration - * should not allow AutoForwardEnabled\",\"items\":[{\"type\":1,\"content\":{\"json\":\"If **AutoForwardEnabled** is set to True for an SMTP domain, then users in Outlook are allowed to set automatic transfer of all their emails to addresses in this domain.\\r\\n\\r\\nWhen the Default Remote domain is set to * and has the AutoForwardEnabled set True, any user can configure an Outlook rule to automatically forward all emails to any SMTP domain domains outside the organization. This is a high risk configuration as it might allow accounts to leak information. \\r\\n\\r\\nAlso, when setting AutoForwardEnabled to a specific domain, it is strongly recommended enable TLS encryption.\\r\\n\\r\\nAdditional information:\\r\\n\\r\\nRemote Domains\\r\\n\",\"style\":\"info\"},\"conditionalVisibility\":{\"parameterName\":\"Help\",\"comparison\":\"isEqualTo\",\"value\":\"Yes\"},\"name\":\"AutoForwardHelp\"},{\"type\":3,\"content\":{\"version\":\"KqlItem/1.0\",\"query\":\"ExchangeConfiguration(SpecificSectionList=\\\"RemoteDomain\\\",SpecificConfigurationDate=\\\"{DateOfConfiguration:value}\\\",SpecificConfigurationEnv={EnvironmentList},Target = \\\"On-Premises\\\")\\r\\n| project CmdletResultValue\\r\\n| extend Name = tostring(CmdletResultValue.Name)\\r\\n| extend Address = tostring(CmdletResultValue.DomainName.Address)\\r\\n| extend AutoForwardEnabled = iff (CmdletResultValue.AutoForwardEnabled== \\\"true\\\" and CmdletResultValue.Address == \\\"*\\\", strcat (\\\"❌\\\",tostring(CmdletResultValue.AutoForwardEnabled)),iff(CmdletResultValue.AutoForwardEnabled== \\\"true\\\" and CmdletResultValue.Address != \\\"*\\\", strcat (\\\"⚠️\\\",tostring(CmdletResultValue.AutoForwardEnabled)),strcat (\\\"✅\\\",tostring(CmdletResultValue.AutoForwardEnabled))))\\r\\n| project-away CmdletResultValue\\r\\n| sort by Address asc \",\"size\":1,\"showAnalytics\":true,\"showExportToExcel\":true,\"queryType\":0,\"resourceType\":\"microsoft.operationalinsights/workspaces\",\"gridSettings\":{\"rowLimit\":10000,\"filter\":true}},\"name\":\"query - 1\",\"styleSettings\":{\"showBorder\":true}},{\"type\":1,\"content\":{\"json\":\"Accepted domains set to * authorize Open Relay.\\r\\n\\r\\nMore information:\\r\\n\\r\\nAccepted domains\\r\\n\",\"style\":\"info\"},\"conditionalVisibility\":{\"parameterName\":\"Help\",\"comparison\":\"isEqualTo\",\"value\":\"Yes\"},\"name\":\"text - 3\"},{\"type\":3,\"content\":{\"version\":\"KqlItem/1.0\",\"query\":\"ExchangeConfiguration(SpecificSectionList=\\\"AcceptedDomain\\\",SpecificConfigurationDate=\\\"{DateOfConfiguration:value}\\\",SpecificConfigurationEnv={EnvironmentList},Target = \\\"On-Premises\\\")\\r\\n| project CmdletResultValue\\r\\n| where CmdletResultValue.DomainName.Address == \\\"*\\\"\\r\\n| extend Name = tostring(CmdletResultValue.Name)\\r\\n| extend Address = tostring(CmdletResultValue.DomainName.Address)\\r\\n| extend Address = \\\"* : ❌ OpenRelay configuration\\\"\\r\\n| extend DomainType = case(CmdletResultValue.DomainType==\\\"0\\\",\\\"Authoritative Domain\\\",CmdletResultValue.DomainType==\\\"1\\\",\\\"ExternalRelay\\\",CmdletResultValue.DomainType==\\\"2\\\",\\\"InternalRelay\\\",\\\"NotApplicable\\\")\\r\\n| project-away CmdletResultValue\",\"size\":1,\"showAnalytics\":true,\"title\":\"Accepted domain with *\",\"noDataMessage\":\"Accepted Domain * not confirgured (no Open Relay)\",\"noDataMessageStyle\":3,\"showExportToExcel\":true,\"queryType\":0,\"resourceType\":\"microsoft.operationalinsights/workspaces\",\"gridSettings\":{\"rowLimit\":10000,\"filter\":true}},\"name\":\"query - 4\",\"styleSettings\":{\"showBorder\":true}}]},\"name\":\"ForwardGroup\"}]},\"conditionalVisibility\":{\"parameterName\":\"selected\",\"comparison\":\"isEqualTo\",\"value\":\"Transport\"},\"name\":\"Transport Security configuration\"}],\"fromTemplateId\":\"sentinel-MicrosoftExchangeSecurityReview\",\"$schema\":\"https://github.com/Microsoft/Application-Insights-Workbooks/blob/master/schema/workbook.json\"}\r\n", "version": "1.0", "sourceId": "[variables('workspaceResourceId')]", "category": "sentinel" diff --git a/Solutions/Microsoft Exchange Security - Exchange On-Premises/Parsers/ExchangeEnvironmentList.txt b/Solutions/Microsoft Exchange Security - Exchange On-Premises/Parsers/ExchangeEnvironmentList.txt index bde6f25ebdf..e3b7ba30a1c 100644 --- a/Solutions/Microsoft Exchange Security - Exchange On-Premises/Parsers/ExchangeEnvironmentList.txt +++ b/Solutions/Microsoft Exchange Security - Exchange On-Premises/Parsers/ExchangeEnvironmentList.txt @@ -11,7 +11,7 @@ // // USAGE: // 1. Open Log Analytics/Microsoft Sentinel Logs blade. Copy the query below and paste into the Logs query window. -// 2. Click the Save button above the query. A pane will appear on the right, select "as Function" from the drop down. Enter the Function Name "ESI_ExchConfigAvailableEnvironments". +// 2. Click the Save button above the query. A pane will appear on the right, select "as Function" from the drop down. Enter the Function Name "ExchangeEnvironmentList". // Parameters : 1 parameter to add during creation. // 1. Target, type string, default value "On-Premises" // 3. Function App usually take 10-15 minutes to activate. You can then use Function Alias for other queries diff --git a/Solutions/Microsoft Exchange Security - Exchange On-Premises/Workbooks/Microsoft Exchange Least Privilege with RBAC.json b/Solutions/Microsoft Exchange Security - Exchange On-Premises/Workbooks/Microsoft Exchange Least Privilege with RBAC.json index 5df60b3ffb6..a1e67bf6702 100644 --- a/Solutions/Microsoft Exchange Security - Exchange On-Premises/Workbooks/Microsoft Exchange Least Privilege with RBAC.json +++ b/Solutions/Microsoft Exchange Security - Exchange On-Premises/Workbooks/Microsoft Exchange Least Privilege with RBAC.json @@ -16,7 +16,7 @@ "multiSelect": true, "quote": "'", "delimiter": ",", - "query": "ESI_ExchConfigAvailableEnvironments(Target=\"On-Premises\") | where ESIEnvironment != \"\"", + "query": "ExchangeEnvironmentList(Target=\"On-Premises\") | where ESIEnvironment != \"\"", "typeSettings": { "limitSelectTo": 1, "showDefault": false diff --git a/Solutions/Microsoft Exchange Security - Exchange On-Premises/Workbooks/Microsoft Exchange Security Review.json b/Solutions/Microsoft Exchange Security - Exchange On-Premises/Workbooks/Microsoft Exchange Security Review.json index 57b0e06c7e7..86c7b456e03 100644 --- a/Solutions/Microsoft Exchange Security - Exchange On-Premises/Workbooks/Microsoft Exchange Security Review.json +++ b/Solutions/Microsoft Exchange Security - Exchange On-Premises/Workbooks/Microsoft Exchange Security Review.json @@ -23,7 +23,7 @@ "multiSelect": true, "quote": "'", "delimiter": ",", - "query": "ESI_ExchConfigAvailableEnvironments(Target=\"On-Premises\") | where ESIEnvironment != \"\"", + "query": "ExchangeEnvironmentList(Target=\"On-Premises\") | where ESIEnvironment != \"\"", "typeSettings": { "limitSelectTo": 1, "showDefault": false diff --git a/Solutions/Microsoft Exchange Security - Exchange Online/Data Connectors/ESI-ExchangeOnlineCollector.json b/Solutions/Microsoft Exchange Security - Exchange Online/Data Connectors/ESI-ExchangeOnlineCollector.json index 06f7580a28b..80980650cf0 100644 --- a/Solutions/Microsoft Exchange Security - Exchange Online/Data Connectors/ESI-ExchangeOnlineCollector.json +++ b/Solutions/Microsoft Exchange Security - Exchange Online/Data Connectors/ESI-ExchangeOnlineCollector.json @@ -70,7 +70,7 @@ }, "instructionSteps": [ { - "description": ">**NOTE:** This data connector depends on a parser based on a Kusto Function to work as expected. Follow the steps for each Parser to create the Kusto Functions alias : [**ExchangeConfiguration**](https://aka.ms/sentinel-ESI-ExchangeConfiguration-Online-parser) and [**ESI_ExchConfigAvailableEnvironments**](https://aka.ms/sentinel-ESI-ExchangeEnvironmentList-Online-parser) \n\n**STEP 1 - Parsers deployment**", + "description": ">**NOTE:** This data connector depends on a parser based on a Kusto Function to work as expected. Follow the steps for each Parser to create the Kusto Functions alias : [**ExchangeConfiguration**](https://aka.ms/sentinel-ESI-ExchangeConfiguration-Online-parser) and [**ExchangeEnvironmentList**](https://aka.ms/sentinel-ESI-ExchangeEnvironmentList-Online-parser) \n\n**STEP 1 - Parsers deployment**", "instructions": [ { "parameters": { @@ -89,7 +89,7 @@ "description": "Click on save button.\n Define the parameters as asked on the header of the parser file.\nClick save again." }, { - "title": "4. Reproduce the same steps for Parser **ESI_ExchConfigAvailableEnvironments**", + "title": "4. Reproduce the same steps for Parser **ExchangeEnvironmentList**", "description": "Reproduce the step 2 and 3 with the content of 'ExchangeEnvironmentList.txt' file" } ] diff --git a/Solutions/Microsoft Exchange Security - Exchange Online/Package/createUiDefinition.json b/Solutions/Microsoft Exchange Security - Exchange Online/Package/createUiDefinition.json index db0a7827149..cce5399b4ae 100644 --- a/Solutions/Microsoft Exchange Security - Exchange Online/Package/createUiDefinition.json +++ b/Solutions/Microsoft Exchange Security - Exchange Online/Package/createUiDefinition.json @@ -79,7 +79,7 @@ "name": "dataconnectors-parser-text", "type": "Microsoft.Common.TextBlock", "options": { - "text": "The solution installs two (2) parsers that transform ingested data. The transformed logs can be accessed using the ExchangeConfiguration and ESI_ExchConfigAvailableEnvironments Kusto Function aliases." + "text": "The solution installs two (2) parsers that transform ingested data. The transformed logs can be accessed using the ExchangeConfiguration and ExchangeEnvironmentList Kusto Function aliases." } } ] diff --git a/Solutions/Microsoft Exchange Security - Exchange Online/Package/mainTemplate.json b/Solutions/Microsoft Exchange Security - Exchange Online/Package/mainTemplate.json index 688c45edfce..05eb5ab9fd5 100644 --- a/Solutions/Microsoft Exchange Security - Exchange Online/Package/mainTemplate.json +++ b/Solutions/Microsoft Exchange Security - Exchange Online/Package/mainTemplate.json @@ -200,7 +200,7 @@ }, "instructionSteps": [ { - "description": ">**NOTE:** This data connector depends on a parser based on a Kusto Function to work as expected. Follow the steps for each Parser to create the Kusto Functions alias : [**ExchangeConfiguration**](https://aka.ms/sentinel-ESI-ExchangeConfiguration-Online-parser) and [**ESI_ExchConfigAvailableEnvironments**](https://aka.ms/sentinel-ESI-ExchangeEnvironmentList-Online-parser) \n\n**STEP 1 - Parsers deployment**", + "description": ">**NOTE:** This data connector depends on a parser based on a Kusto Function to work as expected. Follow the steps for each Parser to create the Kusto Functions alias : [**ExchangeConfiguration**](https://aka.ms/sentinel-ESI-ExchangeConfiguration-Online-parser) and [**ExchangeEnvironmentList**](https://aka.ms/sentinel-ESI-ExchangeEnvironmentList-Online-parser) \n\n**STEP 1 - Parsers deployment**", "instructions": [ { "parameters": { @@ -219,7 +219,7 @@ "description": "Click on save button.\n Define the parameters as asked on the header of the parser file.\nClick save again." }, { - "title": "4. Reproduce the same steps for Parser **ESI_ExchConfigAvailableEnvironments**", + "title": "4. Reproduce the same steps for Parser **ExchangeEnvironmentList**", "description": "Reproduce the step 2 and 3 with the content of 'ExchangeEnvironmentList.txt' file" } ] @@ -487,7 +487,7 @@ }, "instructionSteps": [ { - "description": ">**NOTE:** This data connector depends on a parser based on a Kusto Function to work as expected. Follow the steps for each Parser to create the Kusto Functions alias : [**ExchangeConfiguration**](https://aka.ms/sentinel-ESI-ExchangeConfiguration-Online-parser) and [**ESI_ExchConfigAvailableEnvironments**](https://aka.ms/sentinel-ESI-ExchangeEnvironmentList-Online-parser) \n\n**STEP 1 - Parsers deployment**", + "description": ">**NOTE:** This data connector depends on a parser based on a Kusto Function to work as expected. Follow the steps for each Parser to create the Kusto Functions alias : [**ExchangeConfiguration**](https://aka.ms/sentinel-ESI-ExchangeConfiguration-Online-parser) and [**ExchangeEnvironmentList**](https://aka.ms/sentinel-ESI-ExchangeEnvironmentList-Online-parser) \n\n**STEP 1 - Parsers deployment**", "instructions": [ { "parameters": { @@ -506,7 +506,7 @@ "description": "Click on save button.\n Define the parameters as asked on the header of the parser file.\nClick save again." }, { - "title": "4. Reproduce the same steps for Parser **ESI_ExchConfigAvailableEnvironments**", + "title": "4. Reproduce the same steps for Parser **ExchangeEnvironmentList**", "description": "Reproduce the step 2 and 3 with the content of 'ExchangeEnvironmentList.txt' file" } ] @@ -929,7 +929,7 @@ }, "properties": { "displayName": "[parameters('workbook1-name')]", - "serializedData": "{\"version\":\"Notebook/1.0\",\"items\":[{\"type\":11,\"content\":{\"version\":\"LinkItem/1.0\",\"style\":\"tabs\",\"links\":[{\"id\":\"e59f0f7f-fd05-4ec8-9f59-e4d9c3b589f2\",\"cellValue\":\"selected\",\"linkTarget\":\"parameter\",\"linkLabel\":\"Current RBAC Delegation\",\"subTarget\":\"RBACDelegation\",\"preText\":\"RBAC Delegation\",\"postText\":\"\",\"style\":\"link\"},{\"id\":\"26056188-7abf-4913-a927-806099e616eb\",\"cellValue\":\"selected\",\"linkTarget\":\"parameter\",\"linkLabel\":\"Custom Roles\",\"subTarget\":\"CustomRole\",\"style\":\"link\"},{\"id\":\"5eeebe10-be67-4f8a-9d91-4bc6c70c3e16\",\"cellValue\":\"selected\",\"linkTarget\":\"parameter\",\"linkLabel\":\"Workbook Help\",\"subTarget\":\"start\",\"style\":\"link\"}]},\"name\":\"links - 3\"},{\"type\":9,\"content\":{\"version\":\"KqlParameterItem/1.0\",\"parameters\":[{\"id\":\"9ae328d6-99c8-4c44-8d59-42ca4d999098\",\"version\":\"KqlParameterItem/1.0\",\"name\":\"EnvironmentList\",\"label\":\"Environment\",\"type\":2,\"isRequired\":true,\"multiSelect\":true,\"quote\":\"'\",\"delimiter\":\",\",\"query\":\"ESI_ExchConfigAvailableEnvironments(Target=\\\"Online\\\") | where ESIEnvironment != \\\"\\\"\",\"typeSettings\":{\"limitSelectTo\":1,\"showDefault\":false},\"queryType\":0,\"resourceType\":\"microsoft.operationalinsights/workspaces\"},{\"id\":\"a88b4e41-eb2f-41bf-92d8-27c83650a4b8\",\"version\":\"KqlParameterItem/1.0\",\"name\":\"DateOfConfiguration\",\"label\":\"Collection time\",\"type\":2,\"isRequired\":true,\"query\":\"let _configurationEnv = split(iff(isnull({EnvironmentList}) or isempty({EnvironmentList}) or tolower({EnvironmentList}) == \\\"all\\\",\\\"All\\\",tostring({EnvironmentList})),',');\\r\\nESIExchangeOnlineConfig_CL\\r\\n| extend ScopedEnvironment = iff(_configurationEnv contains \\\"All\\\", \\\"All\\\",ESIEnvironment_s) \\r\\n| where ScopedEnvironment in (_configurationEnv)\\r\\n| extend Collection = format_datetime(todatetime(EntryDate_s), 'yyyy-MM-dd')\\r\\n| summarize Collection = max(Collection)\\r\\n| project Collection = \\\"lastdate\\\", Selected = true\\r\\n| join kind= fullouter ( ESIExchangeOnlineConfig_CL | extend ScopedEnvironment = iff(_configurationEnv contains \\\"All\\\", \\\"All\\\",ESIEnvironment_s) \\r\\n| where ScopedEnvironment in (_configurationEnv)\\r\\n| where TimeGenerated > ago(90d)\\r\\n| extend Collection = format_datetime(todatetime(EntryDate_s), 'yyyy-MM-dd')\\r\\n| summarize by Collection\\r\\n) on Collection\\r\\n| project Value = iif(Selected,Collection,Collection1), Label = iif(Selected,\\\"Last Known date\\\",Collection1), Selected\\r\\n| sort by Selected, Value desc\",\"typeSettings\":{\"showDefault\":false},\"queryType\":0,\"resourceType\":\"microsoft.operationalinsights/workspaces\"},{\"id\":\"8ac96eb3-918b-4a36-bcc4-df50d8f46175\",\"version\":\"KqlParameterItem/1.0\",\"name\":\"Help\",\"label\":\"Show Help\",\"type\":10,\"isRequired\":true,\"query\":\"{\\\"version\\\":\\\"1.0.0\\\",\\\"content\\\":\\\"[\\\\r\\\\n { \\\\\\\"value\\\\\\\": \\\\\\\"Yes\\\\\\\", \\\\\\\"label\\\\\\\": \\\\\\\"Yes\\\\\\\"},\\\\r\\\\n {\\\\\\\"value\\\\\\\": \\\\\\\"No\\\\\\\", \\\\\\\"label\\\\\\\": \\\\\\\"No\\\\\\\", \\\\\\\"selected\\\\\\\":true }\\\\r\\\\n]\\\\r\\\\n\\\"}\",\"timeContext\":{\"durationMs\":2592000000},\"queryType\":8}],\"style\":\"above\",\"queryType\":0,\"resourceType\":\"microsoft.operationalinsights/workspaces\"},\"name\":\"TimeRange\"},{\"type\":12,\"content\":{\"version\":\"NotebookGroup/1.0\",\"groupType\":\"editable\",\"title\":\"Custom Delegation\",\"items\":[{\"type\":1,\"content\":{\"json\":\"The current delegation are compared to an export of default delegation available on Exchange Online.\\r\\n\\r\\nTo find which is used for the comparaison please follow this link.\\r\\nThe export is located on the public GitHub of the project.\\r\\n\\r\\ncheck this link : https://aka.ms/esiwatchlist\\r\\n\\r\\nIt will be updated by the team project.\",\"style\":\"info\"},\"name\":\"text - 2\"},{\"type\":12,\"content\":{\"version\":\"NotebookGroup/1.0\",\"groupType\":\"editable\",\"title\":\"Custom Delegation on User Accounts\",\"items\":[{\"type\":1,\"content\":{\"json\":\" Custom Delegation on User Accounts\"},\"name\":\"text - 2 - Copy\"},{\"type\":9,\"content\":{\"version\":\"KqlParameterItem/1.0\",\"parameters\":[{\"id\":\"d9d4e0a2-b75d-4825-9f4e-7606516500e1\",\"version\":\"KqlParameterItem/1.0\",\"name\":\"RoleAssignee\",\"type\":2,\"query\":\"let DefMRA = externaldata (Name:string)[h\\\"https://raw.githubusercontent.com/nlepagnez/ESI-PublicContent/main/Operations/Watchlists/standardMRAOnline.csv\\\"]with(format=\\\"csv\\\",ignoreFirstRecord=true)| summarize make_list(Name);\\r\\nExchangeConfiguration(SpecificSectionList=\\\"MRA\\\",SpecificConfigurationDate=\\\"{DateOfConfiguration:value}\\\",SpecificConfigurationEnv={EnvironmentList},Target = \\\"Online\\\")\\r\\n| where CmdletResultValue.Name !in (DefMRA) and CmdletResultValue.RoleAssigneeType == \\\"User\\\"\\r\\n| project CmdletResultValue\\r\\n| extend RoleAssigneeName = tostring(CmdletResultValue.RoleAssigneeName)\\r\\n| distinct RoleAssigneeName\\r\\n\",\"typeSettings\":{\"showDefault\":false},\"queryType\":0,\"resourceType\":\"microsoft.operationalinsights/workspaces\"},{\"id\":\"cf5959fa-a833-4bb2-90bd-d4c90dca5506\",\"version\":\"KqlParameterItem/1.0\",\"name\":\"Role\",\"type\":2,\"query\":\"ExchangeConfiguration(SpecificSectionList=\\\"MRA\\\",SpecificConfigurationDate=\\\"{DateOfConfiguration:value}\\\",SpecificConfigurationEnv={EnvironmentList},Target = \\\"Online\\\")\\r\\n| extend Role=tostring (CmdletResultValue.Role)\\r\\n| distinct Role\\r\\n| sort by Role asc\",\"typeSettings\":{\"showDefault\":false},\"queryType\":0,\"resourceType\":\"microsoft.operationalinsights/workspaces\"}],\"style\":\"pills\",\"queryType\":0,\"resourceType\":\"microsoft.operationalinsights/workspaces\"},\"name\":\"parameters - 5\"},{\"type\":3,\"content\":{\"version\":\"KqlItem/1.0\",\"query\":\"let DefMRA = externaldata (Name:string)[h\\\"https://raw.githubusercontent.com/nlepagnez/ESI-PublicContent/main/Operations/Watchlists/standardMRAOnline.csv\\\"]with(format=\\\"csv\\\",ignoreFirstRecord=true)| summarize make_list(Name);\\r\\nExchangeConfiguration(SpecificSectionList=\\\"MRA\\\",SpecificConfigurationDate=\\\"{DateOfConfiguration:value}\\\",SpecificConfigurationEnv={EnvironmentList},Target = \\\"Online\\\")\\r\\n| where CmdletResultValue.RoleAssigneeName endswith \\\"{RoleAssignee}\\\" \\r\\n| where CmdletResultValue.Role contains \\\"{Role}\\\"\\r\\n| where CmdletResultValue.Name !in (DefMRA) and CmdletResultValue.RoleAssigneeType == \\\"User\\\" and CmdletResultValue.Name !contains \\\"Deleg\\\"\\r\\n| project CmdletResultValue\\r\\n| extend Name = tostring(CmdletResultValue.Name)\\r\\n| extend Role = tostring(CmdletResultValue.Role)\\r\\n| extend RoleAssigneeName = tostring(CmdletResultValue.RoleAssigneeName)\\r\\n| extend CustomRecipientWriteScope = tostring(CmdletResultValue.CustomRecipientWriteScope)\\r\\n| extend CustomConfigWriteScope = tostring(CmdletResultValue.CustomConfigWriteScope)\\r\\n| extend CustomResourceScope = tostring(CmdletResultValue.CustomResourceScope)\\r\\n| extend RecipientWriteScope = CmdletResultValue.RecipientWriteScope\\r\\n| extend ConfigWriteScope = CmdletResultValue.ConfigWriteScope\\r\\n| extend Status= tostring(CmdletResultValue.Enabled)\\r\\n| project Name, Role, RoleAssigneeName,Status,CustomRecipientWriteScope,CustomConfigWriteScope,CustomResourceScope,RecipientWriteScope,ConfigWriteScope\\r\\n| sort by RoleAssigneeName asc\\r\\n\",\"size\":3,\"showAnalytics\":true,\"queryType\":0,\"resourceType\":\"microsoft.operationalinsights/workspaces\",\"gridSettings\":{\"formatters\":[{\"columnMatch\":\"CmdletName\",\"formatter\":0,\"formatOptions\":{\"customColumnWidthSetting\":\"31.5ch\"}},{\"columnMatch\":\"Total\",\"formatter\":0,\"formatOptions\":{\"customColumnWidthSetting\":\"9.3ch\"}},{\"columnMatch\":\"Count\",\"formatter\":21,\"formatOptions\":{\"palette\":\"blue\",\"customColumnWidthSetting\":\"330px\"}},{\"columnMatch\":\"Anomalies\",\"formatter\":10,\"formatOptions\":{\"palette\":\"redBright\",\"customColumnWidthSetting\":\"330px\"}}],\"rowLimit\":10000,\"filter\":true,\"sortBy\":[{\"itemKey\":\"RoleAssigneeName\",\"sortOrder\":1}]},\"sortBy\":[{\"itemKey\":\"RoleAssigneeName\",\"sortOrder\":1}]},\"name\":\"query - 2\",\"styleSettings\":{\"showBorder\":true}}]},\"name\":\"Custom Delegation on User Accounts\"},{\"type\":12,\"content\":{\"version\":\"NotebookGroup/1.0\",\"groupType\":\"editable\",\"title\":\"Explanations\",\"expandable\":true,\"items\":[{\"type\":1,\"content\":{\"json\":\"This section displays all the nonstandard delegations done directly to a user account.\\r\\n\\r\\nDetailed information for the user accounts will be displayed.\\r\\n\\r\\nThis status is done by comparing current delegation with the default delegation for Exchange 2019 CU11.\\r\\n\\r\\nThese types of delegations are not available on the Exchange Admin Center.\\r\\n\\r\\nUsual results :\\r\\n\\r\\n - Delegations done directly to service account. Being able to see this delegation will help to sanityze the environment as some delegations may be no more necessary\\r\\n\\r\\n - Delegation done by mistake directly to Administrator Accounts\\r\\n\\r\\n - Suspicious delegations\\r\\n\\r\\n\\r\\nDetailed information for the user accounts will be displayed in below sections\\r\\n\"},\"name\":\"text - 0\"}]},\"name\":\"group - 3\"},{\"type\":12,\"content\":{\"version\":\"NotebookGroup/1.0\",\"groupType\":\"editable\",\"title\":\"Custom Delegation on Groups\",\"items\":[{\"type\":1,\"content\":{\"json\":\"Custom Delegation on Groups\"},\"name\":\"text - 2\"},{\"type\":9,\"content\":{\"version\":\"KqlParameterItem/1.0\",\"parameters\":[{\"id\":\"c548eb09-54e3-41bf-a99d-be3534f7018b\",\"version\":\"KqlParameterItem/1.0\",\"name\":\"RoleAssignee\",\"type\":2,\"query\":\"let DefMRA = externaldata (Name:string)[h\\\"https://raw.githubusercontent.com/nlepagnez/ESI-PublicContent/main/Operations/Watchlists/standardMRAOnline.csv\\\"]with(format=\\\"csv\\\",ignoreFirstRecord=true)| summarize make_list(Name);\\r\\nExchangeConfiguration(SpecificSectionList=\\\"MRA\\\",SpecificConfigurationDate=\\\"{DateOfConfiguration:value}\\\",SpecificConfigurationEnv={EnvironmentList},Target = \\\"Online\\\")\\r\\n| where CmdletResultValue.Name !in (DefMRA) and CmdletResultValue.RoleAssigneeType == \\\"RoleGroup\\\" and CmdletResultValue.RoleAssigneeName !contains \\\"RIM-MailboxAdmins\\\"\\r\\n| project CmdletResultValue\\r\\n| extend RoleAssigneeName = tostring(CmdletResultValue.RoleAssigneeName)\\r\\n| distinct RoleAssigneeName\",\"typeSettings\":{\"showDefault\":false},\"queryType\":0,\"resourceType\":\"microsoft.operationalinsights/workspaces\"},{\"id\":\"f5511a2b-9bf6-48ae-a968-2d1f879c8bfa\",\"version\":\"KqlParameterItem/1.0\",\"name\":\"Role\",\"type\":2,\"query\":\"ExchangeConfiguration(SpecificSectionList=\\\"MRA\\\",SpecificConfigurationDate=\\\"{DateOfConfiguration:value}\\\",SpecificConfigurationEnv={EnvironmentList},Target = \\\"Online\\\")\\r\\n| extend Role=tostring (CmdletResultValue.Role)\\r\\n| distinct Role\\r\\n| sort by Role asc\",\"typeSettings\":{\"showDefault\":false},\"queryType\":0,\"resourceType\":\"microsoft.operationalinsights/workspaces\"}],\"style\":\"pills\",\"queryType\":0,\"resourceType\":\"microsoft.operationalinsights/workspaces\"},\"name\":\"parameters - 4\"},{\"type\":3,\"content\":{\"version\":\"KqlItem/1.0\",\"query\":\"let DefMRA = externaldata (Name:string)[h\\\"https://raw.githubusercontent.com/nlepagnez/ESI-PublicContent/main/Operations/Watchlists/standardMRAOnline.csv\\\"]with(format=\\\"csv\\\",ignoreFirstRecord=true)| summarize make_list(Name);\\r\\nlet RoleG = ExchangeConfiguration(SpecificSectionList=\\\"MRA\\\",SpecificConfigurationDate=\\\"{DateOfConfiguration:value}\\\",SpecificConfigurationEnv={EnvironmentList},Target = \\\"Online\\\")\\r\\n | project RoleAssigneeName=tostring(CmdletResultValue.Name);\\r\\nExchangeConfiguration(SpecificSectionList=\\\"MRA\\\",SpecificConfigurationDate=\\\"{DateOfConfiguration:value}\\\",SpecificConfigurationEnv={EnvironmentList},Target = \\\"Online\\\")\\r\\n| where CmdletResultValue.RoleAssigneeName endswith \\\"{RoleAssignee}\\\" \\r\\n| where CmdletResultValue.Role contains \\\"{Role}\\\"\\r\\n| where CmdletResultValue.Name !in (DefMRA) and CmdletResultValue.RoleAssigneeType == \\\"RoleGroup\\\" and CmdletResultValue.RoleAssigneeName !contains \\\"RIM-MailboxAdmins\\\" and CmdletResultValue.Name !contains \\\"Deleg\\\"\\r\\n| project CmdletResultValue\\r\\n| extend ManagementRoleAssignment = tostring(CmdletResultValue.Name)\\r\\n| extend Role = tostring(CmdletResultValue.Role)\\r\\n| extend RoleAssigneeName = tostring(CmdletResultValue.RoleAssigneeName)\\r\\n| extend Status= tostring(CmdletResultValue.Enabled)\\r\\n| extend CustomRecipientWriteScope = tostring(CmdletResultValue.CustomRecipientWriteScope)\\r\\n| extend CustomConfigWriteScope = tostring(CmdletResultValue.CustomConfigWriteScope)\\r\\n| extend CustomResourceScope = tostring(CmdletResultValue.CustomResourceScope)\\r\\n| extend RecipientWriteScope = CmdletResultValue.RecipientWriteScope\\r\\n| extend ConfigWriteScope = CmdletResultValue.ConfigWriteScope\\r\\n|lookup RoleG on RoleAssigneeName \\r\\n| project-away CmdletResultValue\\r\\n| sort by RoleAssigneeName asc\",\"size\":3,\"showAnalytics\":true,\"showExportToExcel\":true,\"queryType\":0,\"resourceType\":\"microsoft.operationalinsights/workspaces\",\"gridSettings\":{\"rowLimit\":10000,\"filter\":true,\"sortBy\":[{\"itemKey\":\"RoleAssigneeName\",\"sortOrder\":1}]},\"sortBy\":[{\"itemKey\":\"RoleAssigneeName\",\"sortOrder\":1}]},\"name\":\"query - 1\",\"styleSettings\":{\"showBorder\":true}}]},\"name\":\"Custom Delegation on Groups\"},{\"type\":12,\"content\":{\"version\":\"NotebookGroup/1.0\",\"groupType\":\"editable\",\"title\":\"Explanations\",\"expandable\":true,\"items\":[{\"type\":1,\"content\":{\"json\":\"This section displays all the nonstandard delegations done for standard and non standard groups. Indeed, default groups have a list of default delegations but an Exchange administrators can add also new roles to the default groups.\\r\\n\\r\\nThis status is done by comparing current delegation with the default delegation for Exchange 2019 CU11.\\r\\n\\r\\nUsual results :\\r\\n\\r\\n - Delegations done for Organization Management to role like Mailbox Import Export or Mailbox Search\\r\\n\\r\\n - Delegation done by mistake\\r\\n\\r\\n - Suspicious delegations\\r\\n\\r\\nDetailed information for the user accounts present in the groups will be displayed in below sections\\r\\n\"},\"name\":\"text - 0\"}]},\"name\":\"group - 4\"}]},\"conditionalVisibility\":{\"parameterName\":\"selected\",\"comparison\":\"isEqualTo\",\"value\":\"RBACDelegation\"},\"name\":\"Custom Delegation\",\"styleSettings\":{\"showBorder\":true}},{\"type\":12,\"content\":{\"version\":\"NotebookGroup/1.0\",\"groupType\":\"editable\",\"title\":\"Information for Role Assignee\",\"items\":[{\"type\":12,\"content\":{\"version\":\"NotebookGroup/1.0\",\"groupType\":\"editable\",\"title\":\"Information for Role Assignee User account\",\"items\":[{\"type\":1,\"content\":{\"json\":\"Detailed Information on User account Role Assignee\"},\"name\":\"text - 0\"},{\"type\":9,\"content\":{\"version\":\"KqlParameterItem/1.0\",\"parameters\":[{\"id\":\"27e4c2e9-d113-4bf9-808f-0f8f68b5152e\",\"version\":\"KqlParameterItem/1.0\",\"name\":\"RoleAssignee\",\"type\":2,\"isRequired\":true,\"query\":\"let DefMRA = externaldata (Name:string)[h\\\"https://raw.githubusercontent.com/nlepagnez/ESI-PublicContent/main/Operations/Watchlists/standardMRAOnline.csv\\\"]with(format=\\\"csv\\\",ignoreFirstRecord=true)| summarize make_list(Name);\\r\\nExchangeConfiguration(SpecificSectionList=\\\"MRA\\\",SpecificConfigurationDate=\\\"{DateOfConfiguration:value}\\\",SpecificConfigurationEnv={EnvironmentList},Target = \\\"Online\\\")\\r\\n| where CmdletResultValue.Name !in (DefMRA) and CmdletResultValue.RoleAssigneeType == \\\"User\\\"\\r\\n| project CmdletResultValue\\r\\n| extend RoleAssigneeName = tostring(CmdletResultValue.RoleAssigneeName)\\r\\n| distinct RoleAssigneeName\",\"typeSettings\":{\"showDefault\":false},\"queryType\":0,\"resourceType\":\"microsoft.operationalinsights/workspaces\"}],\"style\":\"pills\",\"queryType\":0,\"resourceType\":\"microsoft.operationalinsights/workspaces\"},\"name\":\"parameters - 1\"},{\"type\":3,\"content\":{\"version\":\"KqlItem/1.0\",\"query\":\"ExchangeConfiguration(SpecificSectionList=\\\"DirectRoleAssignments\\\",SpecificConfigurationDate=\\\"{DateOfConfiguration:value}\\\",SpecificConfigurationEnv={EnvironmentList},Target = \\\"Online\\\")\\r\\n| where CmdletResultValue.SamAccountName contains \\\"{RoleAssignee}\\\"\\r\\n| project CmdletResultValue\\r\\n| extend Account = tostring(CmdletResultValue.SamAccountName)\\r\\n| extend LastLogon = CmdletResultValue.LastLogonString\\r\\n| extend LastPwdSet = CmdletResultValue.LastPwdSetString\\r\\n| extend Enabled = tostring(CmdletResultValue.Enabled)\\r\\n| extend DN = tostring(CmdletResultValue.DN)\\r\\n| project-away CmdletResultValue\\r\\n| sort by Account asc\",\"size\":3,\"showAnalytics\":true,\"color\":\"green\",\"showExportToExcel\":true,\"queryType\":0,\"resourceType\":\"microsoft.operationalinsights/workspaces\"},\"name\":\"query - 2\",\"styleSettings\":{\"showBorder\":true}}]},\"name\":\"Information for Role Assignee User account\"},{\"type\":12,\"content\":{\"version\":\"NotebookGroup/1.0\",\"groupType\":\"editable\",\"title\":\"Explanations\",\"expandable\":true,\"items\":[{\"type\":1,\"content\":{\"json\":\"This section displays detailed information for user account found with non standard delegation :\\r\\n - Last logon\\r\\n - Last Password changed\\r\\n - Account enabled\"},\"name\":\"text - 0\"}]},\"name\":\"group - 2\"},{\"type\":12,\"content\":{\"version\":\"NotebookGroup/1.0\",\"groupType\":\"editable\",\"title\":\"Information for Role Assignee group\",\"items\":[{\"type\":1,\"content\":{\"json\":\"Detailed information for Group delegation\"},\"name\":\"text - 0\"},{\"type\":9,\"content\":{\"version\":\"KqlParameterItem/1.0\",\"parameters\":[{\"id\":\"75c3cdf3-d0c3-46c3-83ae-429979774234\",\"version\":\"KqlParameterItem/1.0\",\"name\":\"RoleAssignee\",\"type\":2,\"isRequired\":true,\"query\":\"let DefMRA = externaldata (Name:string)[h\\\"https://raw.githubusercontent.com/nlepagnez/ESI-PublicContent/main/Operations/Watchlists/standardMRAOnline.csv\\\"]with(format=\\\"csv\\\",ignoreFirstRecord=true)| summarize make_list(Name);\\r\\nExchangeConfiguration(SpecificSectionList=\\\"MRA\\\",SpecificConfigurationDate=\\\"{DateOfConfiguration:value}\\\",SpecificConfigurationEnv={EnvironmentList},Target = \\\"Online\\\")\\r\\n| where CmdletResultValue.Name !in (DefMRA) and CmdletResultValue.RoleAssigneeType == \\\"RoleGroup\\\" and CmdletResultValue.RoleAssigneeName !contains \\\"RIM-MailboxAdmins\\\"\\r\\n| project CmdletResultValue\\r\\n| extend RoleAssigneeName = tostring(CmdletResultValue.RoleAssigneeName)\\r\\n| distinct RoleAssigneeName\",\"typeSettings\":{\"showDefault\":false},\"queryType\":0,\"resourceType\":\"microsoft.operationalinsights/workspaces\"}],\"style\":\"pills\",\"queryType\":0,\"resourceType\":\"microsoft.operationalinsights/workspaces\"},\"name\":\"parameters - 1\"},{\"type\":3,\"content\":{\"version\":\"KqlItem/1.0\",\"query\":\"ExchangeConfiguration(SpecificSectionList=\\\"ExGroup\\\",SpecificConfigurationDate=\\\"{DateOfConfiguration:value}\\\",SpecificConfigurationEnv={EnvironmentList},Target = \\\"Online\\\")\\r\\n| where CmdletResultValue.Parentgroup contains \\\"{RoleAssignee}\\\"\\r\\n| where CmdletResultValue.Level != 0\\r\\n| project CmdletResultValue\\r\\n| extend Level_ = tostring(CmdletResultValue.Level)\\r\\n| extend Parentgroup = tostring(CmdletResultValue.Parentgroup)\\r\\n| extend MemberPath = tostring(CmdletResultValue.MemberPath)\\r\\n| extend LastLogon = CmdletResultValue.LastLogonString\\r\\n| extend LastPwdSet = CmdletResultValue.LastPwdSetString\\r\\n| extend Enabled = tostring(CmdletResultValue.Enabled)\\r\\n| extend DN = tostring(CmdletResultValue.DN)\\r\\n| project-away CmdletResultValue\\r\\n| sort by Parentgroup asc\",\"size\":3,\"showAnalytics\":true,\"showExportToExcel\":true,\"queryType\":0,\"resourceType\":\"microsoft.operationalinsights/workspaces\"},\"name\":\"query - 2\",\"styleSettings\":{\"showBorder\":true}}]},\"name\":\"Information for Role Assignee group\"},{\"type\":12,\"content\":{\"version\":\"NotebookGroup/1.0\",\"groupType\":\"editable\",\"title\":\"Explanations\",\"expandable\":true,\"items\":[{\"type\":1,\"content\":{\"json\":\"This section displays detailed information for user account present in the found groups with non standard delegation :\\r\\n - Last logon\\r\\n - Last Password changed\\r\\n - Account enabled\"},\"name\":\"text - 0\"}]},\"name\":\"group - 3\"}]},\"conditionalVisibility\":{\"parameterName\":\"selected\",\"comparison\":\"isEqualTo\",\"value\":\"RBACDelegation\"},\"name\":\"Information for Role Assignee\",\"styleSettings\":{\"showBorder\":true}},{\"type\":12,\"content\":{\"version\":\"NotebookGroup/1.0\",\"groupType\":\"editable\",\"items\":[{\"type\":1,\"content\":{\"json\":\"### How to user this tab\\r\\n**1 - Select an account** : All the Cmdlet launched by the account during the selected time frame will be displayer.\\r\\n\\r\\n**2 - Select a cmdlet** : All the roles that contain will be displayed\\r\\n\\r\\n**3 - Review the list of roles** : This table contains all the roles that contain the selected Cmdlet\\r\\n\\r\\n\",\"style\":\"info\"},\"name\":\"text - 1\"},{\"type\":1,\"content\":{\"json\":\"### How to undertand the \\\"List of Roles with this CmdLet\\\" table ? \\r\\n\\r\\n**WeightRole :** Display the wieight of this role based on its importance in terms of security risk\\r\\n\\r\\n**SumRole :** Among all the Cmdlet launched by the account during the defined time frame, this role available for x cmdlet. This role include x cmdlet run by the user.\\r\\n\\r\\n**OrgMgmtRole :** This role is really in the scope of Organization Management group. If the selected Cmdlet is not included is any other role, it make sense that this user is member of the Organization Management group\\r\\n\\r\\n \",\"style\":\"upsell\"},\"name\":\"text - 2\"},{\"type\":12,\"content\":{\"version\":\"NotebookGroup/1.0\",\"groupType\":\"editable\",\"items\":[{\"type\":3,\"content\":{\"version\":\"KqlItem/1.0\",\"query\":\"let CounUserCmdlet = (ExchangeAdminAuditLogs\\r\\n| where Status == \\\"Success\\\"\\r\\n| extend Caller = tostring(split(Caller,\\\"/\\\")[countof(Caller,\\\"/\\\")])\\r\\n| summarize Count=count() by Caller);\\r\\nExchangeConfiguration(SpecificSectionList=\\\"ExGroup\\\",SpecificConfigurationDate=\\\"{DateOfConfiguration:value}\\\",SpecificConfigurationEnv={EnvironmentList},Target = \\\"Online\\\")\\r\\n| search CmdletResultValue.Parentgroup == \\\"Organization Management\\\"\\r\\n| where CmdletResultValue.Level != 0\\r\\n| where CmdletResultValue.ObjectClass == \\\"user\\\"\\r\\n//| project CmdletResultValue,Count\\r\\n| extend Account = tostring(CmdletResultValue.SamAccountName)\\r\\n| join kind=leftouter (CounUserCmdlet) on $left.Account == $right.Caller\\r\\n| project Account,Count\\r\\n//| project-away CmdletResultValue\\r\\n| sort by Account asc\",\"size\":3,\"title\":\"Organization Management Members\",\"exportFieldName\":\"Account\",\"exportParameterName\":\"Account\",\"queryType\":0,\"resourceType\":\"microsoft.operationalinsights/workspaces\",\"gridSettings\":{\"rowLimit\":10000,\"filter\":true,\"formatters\":[{\"columnMatch\":\"Count\",\"formatter\":3,\"formatOptions\":{\"palette\":\"purple\"}}]}},\"customWidth\":\"20\",\"name\":\"query - 1\",\"styleSettings\":{\"maxWidth\":\"100%\",\"showBorder\":true}},{\"type\":3,\"content\":{\"version\":\"KqlItem/1.0\",\"query\":\"ExchangeAdminAuditLogs\\r\\n| where Caller contains \\\"{Account}\\\"\\r\\n| where Status == \\\"Success\\\"\\r\\n| distinct CmdletName\\r\\n| sort by CmdletName asc\",\"size\":3,\"title\":\"List of CmdLet run by the account\",\"exportFieldName\":\"CmdletName\",\"exportParameterName\":\"CmdletName\",\"queryType\":0,\"resourceType\":\"microsoft.operationalinsights/workspaces\",\"gridSettings\":{\"rowLimit\":10000,\"filter\":true,\"sortBy\":[{\"itemKey\":\"CmdletName\",\"sortOrder\":1}]},\"sortBy\":[{\"itemKey\":\"CmdletName\",\"sortOrder\":1}]},\"customWidth\":\"33\",\"name\":\"query - 3\",\"styleSettings\":{\"showBorder\":true}},{\"type\":3,\"content\":{\"version\":\"KqlItem/1.0\",\"query\":\"let RBACRoleCmdlet = _GetWatchlist('RBACRoleCmdlet');\\r\\nlet UserRoleList = ExchangeAdminAuditLogs | where Caller contains \\\"{Account}\\\" | where Status == \\\"Success\\\" | distinct CmdletName;\\r\\nlet countRole = (RBACRoleCmdlet | where Name has_any (UserRoleList)| summarize SumRole = count()by Role);\\r\\nlet RolevsCmdlet = (RBACRoleCmdlet | where Name has_any (UserRoleList)| summarize make_set(Name) by Role);\\r\\nRolevsCmdlet\\r\\n| join kind=leftouter ( countRole ) on Role\\r\\n| project Role,CmdletList=set_Name,SumRole\\r\\n| join kind=leftouter ( RBACRoleCmdlet ) on Role\\r\\n| where Name has \\\"{CmdletName}\\\"\\r\\n| extend PossibleRoles = Role\\r\\n| extend OrgMgmtRole = OrgM\\r\\n| extend RoleWeight = Priority\\r\\n|distinct PossibleRoles,RoleWeight,tostring(SumRole),OrgMgmtRole,tostring(CmdletList)\\r\\n|sort by SumRole,RoleWeight\\r\\n\",\"size\":3,\"title\":\"List of Roles with this CmdLet\",\"queryType\":0,\"resourceType\":\"microsoft.operationalinsights/workspaces\",\"gridSettings\":{\"rowLimit\":10000,\"filter\":true,\"sortBy\":[{\"itemKey\":\"PossibleRoles\",\"sortOrder\":1}]},\"sortBy\":[{\"itemKey\":\"PossibleRoles\",\"sortOrder\":1}]},\"customWidth\":\"40\",\"name\":\"query - 3\",\"styleSettings\":{\"margin\":\"0\",\"maxWidth\":\"100%\",\"showBorder\":true}},{\"type\":3,\"content\":{\"version\":\"KqlItem/1.0\",\"query\":\"let RBACRoleCmdlet = _GetWatchlist('RBACRoleCmdlet');\\r\\nlet UserRoleList = ExchangeAdminAuditLogs | where TimeGenerated {TimeRange} | where Caller contains \\\"{Account}\\\" | where Status == \\\"Success\\\" | distinct CmdletName;\\r\\nlet countRole = (RBACRoleCmdlet | where Name has_any (UserRoleList)| summarize SumRole = count()by Role);\\r\\nlet RolevsCmdlet = (RBACRoleCmdlet | where Name has_any (UserRoleList)| summarize make_set(Name) by Role);\\r\\nRolevsCmdlet\\r\\n| join kind=leftouter ( countRole ) on Role\\r\\n| project Role,CmdletList=set_Name,SumRole\\r\\n| join kind=leftouter ( RBACRoleCmdlet ) on Role\\r\\n| extend Roles = Role\\r\\n| extend OrgMgmtRole = OrgM\\r\\n| extend RoleWeight = Priority\\r\\n| extend CmdletList=tostring(CmdletList)\\r\\n| summarize by Roles,CmdletList,RoleWeight,tostring(SumRole),OrgMgmtRole\\r\\n| distinct Roles,RoleWeight,tostring(SumRole),OrgMgmtRole,tostring(CmdletList)\\r\\n|sort by Roles asc\",\"size\":0,\"title\":\"Recommended Roles for selected users\",\"queryType\":0,\"resourceType\":\"microsoft.operationalinsights/workspaces\",\"gridSettings\":{\"rowLimit\":10000,\"filter\":true,\"sortBy\":[{\"itemKey\":\"Roles\",\"sortOrder\":1}]},\"sortBy\":[{\"itemKey\":\"Roles\",\"sortOrder\":1}]},\"name\":\"query - 3\"}]},\"name\":\"group - 0\"}]},\"conditionalVisibility\":{\"parameterName\":\"selected\",\"comparison\":\"isEqualTo\",\"value\":\"Leastprivileges\"},\"name\":\"group - 5\"},{\"type\":12,\"content\":{\"version\":\"NotebookGroup/1.0\",\"groupType\":\"editable\",\"title\":\"Custom Role details\",\"items\":[{\"type\":12,\"content\":{\"version\":\"NotebookGroup/1.0\",\"groupType\":\"editable\",\"title\":\"List of Custom Roles\",\"items\":[{\"type\":1,\"content\":{\"json\":\"List of existing custom Roles\"},\"customWidth\":\"50\",\"name\":\"text - 3\"},{\"type\":1,\"content\":{\"json\":\"List of Custom with a Management Role Assignement (associated with a group or a user). Display the target account and scope if set\"},\"customWidth\":\"50\",\"name\":\"text - 4\"},{\"type\":3,\"content\":{\"version\":\"KqlItem/1.0\",\"query\":\"ExchangeConfiguration(SpecificSectionList=\\\"MRCustom\\\",SpecificConfigurationDate=\\\"{DateOfConfiguration:value}\\\",SpecificConfigurationEnv={EnvironmentList},Target = \\\"Online\\\")\\r\\n| extend Identity = CmdletResultValue.Name\\r\\n| extend ParentRole =split(tostring(CmdletResultValue.Parent),\\\"\\\\\\\\\\\")[1]\\r\\n| project Identity, ParentRole, WhenCreated, WhenChanged\",\"size\":0,\"showAnalytics\":true,\"timeContext\":{\"durationMs\":86400000},\"showExportToExcel\":true,\"queryType\":0,\"resourceType\":\"microsoft.operationalinsights/workspaces\"},\"customWidth\":\"50\",\"name\":\"query - 1\",\"styleSettings\":{\"showBorder\":true}},{\"type\":3,\"content\":{\"version\":\"KqlItem/1.0\",\"query\":\"let MRcustomRoles = (ExchangeConfiguration(SpecificSectionList=\\\"MRCustom\\\", SpecificConfigurationDate=\\\"{DateOfConfiguration:value}\\\",SpecificConfigurationEnv={EnvironmentList},Target = \\\"Online\\\")\\r\\n| project Role = tostring(CmdletResultValue.Name));\\r\\nExchangeConfiguration(SpecificSectionList=\\\"MRA\\\", SpecificConfigurationDate=\\\"{DateOfConfiguration:value}\\\",SpecificConfigurationEnv={EnvironmentList},Target = \\\"Online\\\")\\r\\n| extend Role = tostring(CmdletResultValue.Role)\\r\\n| extend RoleAssigneeName = tostring(CmdletResultValue.RoleAssigneeName)\\r\\n| extend Scope = tostring(CmdletResultValue.CustomRecipientWriteScope)\\r\\n| project Role, Scope, RoleAssigneeName\\r\\n| join kind=inner (MRcustomRoles) on Role\\r\\n| project Role,RoleAssigneeName,Scope\",\"size\":1,\"showAnalytics\":true,\"timeContext\":{\"durationMs\":86400000},\"showExportToExcel\":true,\"queryType\":0,\"resourceType\":\"microsoft.operationalinsights/workspaces\"},\"customWidth\":\"50\",\"name\":\"query - 2\"},{\"type\":3,\"content\":{\"version\":\"KqlItem/1.0\",\"query\":\"let MRcustomRoles = (ExchangeConfiguration(SpecificSectionList=\\\"MRCustom\\\", SpecificConfigurationDate=\\\"{DateOfConfiguration:value}\\\",SpecificConfigurationEnv={EnvironmentList},Target = \\\"Online\\\")\\r\\n| project Role = tostring(CmdletResultValue.Name));\\r\\nExchangeConfiguration(SpecificSectionList=\\\"MRA\\\", SpecificConfigurationDate=\\\"lastdate\\\", SpecificConfigurationEnv='ITSY', Target = \\\"Online\\\")\\r\\n| extend RoleAssigneeName = tostring(CmdletResultValue.RoleAssigneeName)\\r\\n| extend Scope = tostring(CmdletResultValue.CustomRecipientWriteScope)\\r\\n| project Role= tostring(CmdletResultValue.Role), Scope, RoleAssigneeName\\r\\n| join kind=rightouter (MRcustomRoles) on Role\\r\\n| project Role = Role1, Scope, RoleAssigneeName,Comment = iff(Role == \\\"\\\", \\\"⚠️ No existing delegation for this role\\\", \\\"✅ This role is delegated with a Management Role Assignment\\\")\",\"size\":0,\"showAnalytics\":true,\"timeContext\":{\"durationMs\":86400000},\"showExportToExcel\":true,\"queryType\":0,\"resourceType\":\"microsoft.operationalinsights/workspaces\"},\"customWidth\":\"50\",\"name\":\"query - 4\"},{\"type\":3,\"content\":{\"version\":\"KqlItem/1.0\",\"query\":\"let MRcustomRoles = (ExchangeConfiguration(SpecificSectionList=\\\"MRCustom\\\", SpecificConfigurationDate=\\\"{DateOfConfiguration:value}\\\",SpecificConfigurationEnv={EnvironmentList},Target = \\\"Online\\\")\\r\\n| project Role = tostring(CmdletResultValue.Name));\\r\\nExchangeConfiguration(SpecificSectionList=\\\"MRA\\\", SpecificConfigurationDate=\\\"{DateOfConfiguration:value}\\\",SpecificConfigurationEnv={EnvironmentList},Target = \\\"Online\\\")\\r\\n| project Role = tostring(CmdletResultValue.Role)\\r\\n| join kind=rightouter (MRcustomRoles) on Role\\r\\n| summarize acount = count() by iff( Role==\\\"\\\",\\\"Number of non assigned roles\\\", Role)\",\"size\":0,\"showAnalytics\":true,\"timeContext\":{\"durationMs\":86400000},\"showExportToExcel\":true,\"queryType\":0,\"resourceType\":\"microsoft.operationalinsights/workspaces\",\"visualization\":\"piechart\"},\"customWidth\":\"50\",\"name\":\"query - 5\"}]},\"name\":\"List of Custom Roles\"},{\"type\":12,\"content\":{\"version\":\"NotebookGroup/1.0\",\"groupType\":\"editable\",\"title\":\"Custom Roles delegation on group\",\"items\":[{\"type\":1,\"content\":{\"json\":\"This section shows delegation associated with the Custom Roles\"},\"name\":\"text - 0\"},{\"type\":3,\"content\":{\"version\":\"KqlItem/1.0\",\"query\":\"let MRcustomRoles = (ExchangeConfiguration(SpecificSectionList=\\\"MRCustom\\\", SpecificConfigurationDate=\\\"{DateOfConfiguration:value}\\\",SpecificConfigurationEnv={EnvironmentList},Target = \\\"Online\\\")\\r\\n| project Role = tostring(CmdletResultValue.Name));\\r\\nExchangeConfiguration(SpecificSectionList=\\\"MRA\\\", SpecificConfigurationDate=\\\"{DateOfConfiguration:value}\\\",SpecificConfigurationEnv={EnvironmentList},Target = \\\"Online\\\")\\r\\n| extend Role = tostring(CmdletResultValue.Role)\\r\\n| extend RoleAssigneeName = tostring(CmdletResultValue.RoleAssigneeName)\\r\\n| extend Status= tostring(CmdletResultValue.Enabled)\\r\\n| extend CustomRecipientWriteScope = tostring(CmdletResultValue.CustomRecipientWriteScope)\\r\\n| extend CustomConfigWriteScope = tostring(CmdletResultValue.CustomConfigWriteScope)\\r\\n| extend CustomResourceScope = tostring(CmdletResultValue.CustomResourceScope)\\r\\n| extend RecipientWriteScope = CmdletResultValue.RecipientWriteScope\\r\\n| extend ConfigWriteScope = CmdletResultValue.ConfigWriteScope\\r\\n| project RoleAssigneeName, Role, Status,CustomRecipientWriteScope, CustomConfigWriteScope,CustomResourceScope,RecipientWriteScope,ConfigWriteScope,WhenCreated, WhenChanged\\r\\n| join kind=inner (MRcustomRoles) on Role\\r\\n| project RoleAssigneeName, Role, Status,CustomRecipientWriteScope, CustomConfigWriteScope,CustomResourceScope,RecipientWriteScope,ConfigWriteScope,WhenCreated, WhenChanged\",\"size\":0,\"showAnalytics\":true,\"timeContext\":{\"durationMs\":86400000},\"showExportToExcel\":true,\"queryType\":0,\"resourceType\":\"microsoft.operationalinsights/workspaces\"},\"name\":\"query - 1\"}]},\"name\":\"group - 2\"},{\"type\":12,\"content\":{\"version\":\"NotebookGroup/1.0\",\"groupType\":\"editable\",\"title\":\"Details for Custom Roles Cmdlets \",\"items\":[{\"type\":1,\"content\":{\"json\":\"This section displays for the chosen custom management roles all Cmdlets and their parameters associated with this custom role.\\r\\nRemember that for a cmdlet, some parameters can be removed.\"},\"name\":\"text - 0\"},{\"type\":9,\"content\":{\"version\":\"KqlParameterItem/1.0\",\"parameters\":[{\"id\":\"07c8ac83-371d-4702-ab66-72aeb2a20053\",\"version\":\"KqlParameterItem/1.0\",\"name\":\"CustomRole\",\"type\":2,\"isRequired\":true,\"query\":\"ExchangeConfiguration(SpecificSectionList=\\\"MRCustom\\\",SpecificConfigurationDate=\\\"{DateOfConfiguration:value}\\\",SpecificConfigurationEnv={EnvironmentList},Target = \\\"Online\\\")\\r\\n| extend Identity = CmdletResultValue.Name\\r\\n| project Identity\",\"typeSettings\":{\"showDefault\":false},\"timeContext\":{\"durationMs\":86400000},\"queryType\":0,\"resourceType\":\"microsoft.operationalinsights/workspaces\"}],\"style\":\"pills\",\"queryType\":0,\"resourceType\":\"microsoft.operationalinsights/workspaces\"},\"name\":\"parameters - 2\"},{\"type\":3,\"content\":{\"version\":\"KqlItem/1.0\",\"query\":\"ExchangeConfiguration(SpecificSectionList=\\\"MRCustomDetails\\\",SpecificConfigurationDate=\\\"{DateOfConfiguration:value}\\\",SpecificConfigurationEnv={EnvironmentList},Target = \\\"Online\\\")\\r\\n| where (replace_string(replace_string(tostring(split(CmdletResultValue.Role.DistinguishedName,\\\",\\\",0)),\\\"[\\\\\\\"CN=\\\",\\\"\\\"),\\\"\\\\\\\"]\\\",\\\"\\\")) contains \\\"{CustomRole}\\\"\\r\\n| extend CustomRoleName = replace_string(replace_string(tostring(split(CmdletResultValue.Role.DistinguishedName,\\\",\\\",0)),\\\"[\\\\\\\"CN=\\\",\\\"\\\"),\\\"\\\\\\\"]\\\",\\\"\\\")\\r\\n| extend CmdletName = CmdletResultValue.Name\\r\\n| extend Parameters = CmdletResultValue.Parameters\\r\\n| project CmdletName,Parameters\",\"size\":1,\"showAnalytics\":true,\"timeContext\":{\"durationMs\":86400000},\"showExportToExcel\":true,\"queryType\":0,\"resourceType\":\"microsoft.operationalinsights/workspaces\"},\"name\":\"query - 1\",\"styleSettings\":{\"showBorder\":true}}]},\"name\":\"Details for Custom Roles Cmdlets \"}]},\"conditionalVisibility\":{\"parameterName\":\"selected\",\"comparison\":\"isEqualTo\",\"value\":\"CustomRole\"},\"name\":\"Custom Role\"}],\"fromTemplateId\":\"sentinel-MicrosoftExchangeLeastPrivilegewithRBAC-Online\",\"$schema\":\"https://github.com/Microsoft/Application-Insights-Workbooks/blob/master/schema/workbook.json\"}\r\n", + "serializedData": "{\"version\":\"Notebook/1.0\",\"items\":[{\"type\":11,\"content\":{\"version\":\"LinkItem/1.0\",\"style\":\"tabs\",\"links\":[{\"id\":\"e59f0f7f-fd05-4ec8-9f59-e4d9c3b589f2\",\"cellValue\":\"selected\",\"linkTarget\":\"parameter\",\"linkLabel\":\"Current RBAC Delegation\",\"subTarget\":\"RBACDelegation\",\"preText\":\"RBAC Delegation\",\"postText\":\"\",\"style\":\"link\"},{\"id\":\"26056188-7abf-4913-a927-806099e616eb\",\"cellValue\":\"selected\",\"linkTarget\":\"parameter\",\"linkLabel\":\"Custom Roles\",\"subTarget\":\"CustomRole\",\"style\":\"link\"},{\"id\":\"5eeebe10-be67-4f8a-9d91-4bc6c70c3e16\",\"cellValue\":\"selected\",\"linkTarget\":\"parameter\",\"linkLabel\":\"Workbook Help\",\"subTarget\":\"start\",\"style\":\"link\"}]},\"name\":\"links - 3\"},{\"type\":9,\"content\":{\"version\":\"KqlParameterItem/1.0\",\"parameters\":[{\"id\":\"9ae328d6-99c8-4c44-8d59-42ca4d999098\",\"version\":\"KqlParameterItem/1.0\",\"name\":\"EnvironmentList\",\"label\":\"Environment\",\"type\":2,\"isRequired\":true,\"multiSelect\":true,\"quote\":\"'\",\"delimiter\":\",\",\"query\":\"ExchangeEnvironmentList(Target=\\\"Online\\\") | where ESIEnvironment != \\\"\\\"\",\"typeSettings\":{\"limitSelectTo\":1,\"showDefault\":false},\"queryType\":0,\"resourceType\":\"microsoft.operationalinsights/workspaces\"},{\"id\":\"a88b4e41-eb2f-41bf-92d8-27c83650a4b8\",\"version\":\"KqlParameterItem/1.0\",\"name\":\"DateOfConfiguration\",\"label\":\"Collection time\",\"type\":2,\"isRequired\":true,\"query\":\"let _configurationEnv = split(iff(isnull({EnvironmentList}) or isempty({EnvironmentList}) or tolower({EnvironmentList}) == \\\"all\\\",\\\"All\\\",tostring({EnvironmentList})),',');\\r\\nESIExchangeOnlineConfig_CL\\r\\n| extend ScopedEnvironment = iff(_configurationEnv contains \\\"All\\\", \\\"All\\\",ESIEnvironment_s) \\r\\n| where ScopedEnvironment in (_configurationEnv)\\r\\n| extend Collection = format_datetime(todatetime(EntryDate_s), 'yyyy-MM-dd')\\r\\n| summarize Collection = max(Collection)\\r\\n| project Collection = \\\"lastdate\\\", Selected = true\\r\\n| join kind= fullouter ( ESIExchangeOnlineConfig_CL | extend ScopedEnvironment = iff(_configurationEnv contains \\\"All\\\", \\\"All\\\",ESIEnvironment_s) \\r\\n| where ScopedEnvironment in (_configurationEnv)\\r\\n| where TimeGenerated > ago(90d)\\r\\n| extend Collection = format_datetime(todatetime(EntryDate_s), 'yyyy-MM-dd')\\r\\n| summarize by Collection\\r\\n) on Collection\\r\\n| project Value = iif(Selected,Collection,Collection1), Label = iif(Selected,\\\"Last Known date\\\",Collection1), Selected\\r\\n| sort by Selected, Value desc\",\"typeSettings\":{\"showDefault\":false},\"queryType\":0,\"resourceType\":\"microsoft.operationalinsights/workspaces\"},{\"id\":\"8ac96eb3-918b-4a36-bcc4-df50d8f46175\",\"version\":\"KqlParameterItem/1.0\",\"name\":\"Help\",\"label\":\"Show Help\",\"type\":10,\"isRequired\":true,\"query\":\"{\\\"version\\\":\\\"1.0.0\\\",\\\"content\\\":\\\"[\\\\r\\\\n { \\\\\\\"value\\\\\\\": \\\\\\\"Yes\\\\\\\", \\\\\\\"label\\\\\\\": \\\\\\\"Yes\\\\\\\"},\\\\r\\\\n {\\\\\\\"value\\\\\\\": \\\\\\\"No\\\\\\\", \\\\\\\"label\\\\\\\": \\\\\\\"No\\\\\\\", \\\\\\\"selected\\\\\\\":true }\\\\r\\\\n]\\\\r\\\\n\\\"}\",\"timeContext\":{\"durationMs\":2592000000},\"queryType\":8}],\"style\":\"above\",\"queryType\":0,\"resourceType\":\"microsoft.operationalinsights/workspaces\"},\"name\":\"TimeRange\"},{\"type\":12,\"content\":{\"version\":\"NotebookGroup/1.0\",\"groupType\":\"editable\",\"title\":\"Custom Delegation\",\"items\":[{\"type\":1,\"content\":{\"json\":\"The current delegation are compared to an export of default delegation available on Exchange Online.\\r\\n\\r\\nTo find which is used for the comparaison please follow this link.\\r\\nThe export is located on the public GitHub of the project.\\r\\n\\r\\ncheck this link : https://aka.ms/esiwatchlist\\r\\n\\r\\nIt will be updated by the team project.\",\"style\":\"info\"},\"name\":\"text - 2\"},{\"type\":12,\"content\":{\"version\":\"NotebookGroup/1.0\",\"groupType\":\"editable\",\"title\":\"Custom Delegation on User Accounts\",\"items\":[{\"type\":1,\"content\":{\"json\":\" Custom Delegation on User Accounts\"},\"name\":\"text - 2 - Copy\"},{\"type\":9,\"content\":{\"version\":\"KqlParameterItem/1.0\",\"parameters\":[{\"id\":\"d9d4e0a2-b75d-4825-9f4e-7606516500e1\",\"version\":\"KqlParameterItem/1.0\",\"name\":\"RoleAssignee\",\"type\":2,\"query\":\"let DefMRA = externaldata (Name:string)[h\\\"https://raw.githubusercontent.com/nlepagnez/ESI-PublicContent/main/Operations/Watchlists/standardMRAOnline.csv\\\"]with(format=\\\"csv\\\",ignoreFirstRecord=true)| summarize make_list(Name);\\r\\nExchangeConfiguration(SpecificSectionList=\\\"MRA\\\",SpecificConfigurationDate=\\\"{DateOfConfiguration:value}\\\",SpecificConfigurationEnv={EnvironmentList},Target = \\\"Online\\\")\\r\\n| where CmdletResultValue.Name !in (DefMRA) and CmdletResultValue.RoleAssigneeType == \\\"User\\\"\\r\\n| project CmdletResultValue\\r\\n| extend RoleAssigneeName = tostring(CmdletResultValue.RoleAssigneeName)\\r\\n| distinct RoleAssigneeName\\r\\n\",\"typeSettings\":{\"showDefault\":false},\"queryType\":0,\"resourceType\":\"microsoft.operationalinsights/workspaces\"},{\"id\":\"cf5959fa-a833-4bb2-90bd-d4c90dca5506\",\"version\":\"KqlParameterItem/1.0\",\"name\":\"Role\",\"type\":2,\"query\":\"ExchangeConfiguration(SpecificSectionList=\\\"MRA\\\",SpecificConfigurationDate=\\\"{DateOfConfiguration:value}\\\",SpecificConfigurationEnv={EnvironmentList},Target = \\\"Online\\\")\\r\\n| extend Role=tostring (CmdletResultValue.Role)\\r\\n| distinct Role\\r\\n| sort by Role asc\",\"typeSettings\":{\"showDefault\":false},\"queryType\":0,\"resourceType\":\"microsoft.operationalinsights/workspaces\"}],\"style\":\"pills\",\"queryType\":0,\"resourceType\":\"microsoft.operationalinsights/workspaces\"},\"name\":\"parameters - 5\"},{\"type\":3,\"content\":{\"version\":\"KqlItem/1.0\",\"query\":\"let DefMRA = externaldata (Name:string)[h\\\"https://raw.githubusercontent.com/nlepagnez/ESI-PublicContent/main/Operations/Watchlists/standardMRAOnline.csv\\\"]with(format=\\\"csv\\\",ignoreFirstRecord=true)| summarize make_list(Name);\\r\\nExchangeConfiguration(SpecificSectionList=\\\"MRA\\\",SpecificConfigurationDate=\\\"{DateOfConfiguration:value}\\\",SpecificConfigurationEnv={EnvironmentList},Target = \\\"Online\\\")\\r\\n| where CmdletResultValue.RoleAssigneeName endswith \\\"{RoleAssignee}\\\" \\r\\n| where CmdletResultValue.Role contains \\\"{Role}\\\"\\r\\n| where CmdletResultValue.Name !in (DefMRA) and CmdletResultValue.RoleAssigneeType == \\\"User\\\" and CmdletResultValue.Name !contains \\\"Deleg\\\"\\r\\n| project CmdletResultValue\\r\\n| extend Name = tostring(CmdletResultValue.Name)\\r\\n| extend Role = tostring(CmdletResultValue.Role)\\r\\n| extend RoleAssigneeName = tostring(CmdletResultValue.RoleAssigneeName)\\r\\n| extend CustomRecipientWriteScope = tostring(CmdletResultValue.CustomRecipientWriteScope)\\r\\n| extend CustomConfigWriteScope = tostring(CmdletResultValue.CustomConfigWriteScope)\\r\\n| extend CustomResourceScope = tostring(CmdletResultValue.CustomResourceScope)\\r\\n| extend RecipientWriteScope = CmdletResultValue.RecipientWriteScope\\r\\n| extend ConfigWriteScope = CmdletResultValue.ConfigWriteScope\\r\\n| extend Status= tostring(CmdletResultValue.Enabled)\\r\\n| project Name, Role, RoleAssigneeName,Status,CustomRecipientWriteScope,CustomConfigWriteScope,CustomResourceScope,RecipientWriteScope,ConfigWriteScope\\r\\n| sort by RoleAssigneeName asc\\r\\n\",\"size\":3,\"showAnalytics\":true,\"queryType\":0,\"resourceType\":\"microsoft.operationalinsights/workspaces\",\"gridSettings\":{\"formatters\":[{\"columnMatch\":\"CmdletName\",\"formatter\":0,\"formatOptions\":{\"customColumnWidthSetting\":\"31.5ch\"}},{\"columnMatch\":\"Total\",\"formatter\":0,\"formatOptions\":{\"customColumnWidthSetting\":\"9.3ch\"}},{\"columnMatch\":\"Count\",\"formatter\":21,\"formatOptions\":{\"palette\":\"blue\",\"customColumnWidthSetting\":\"330px\"}},{\"columnMatch\":\"Anomalies\",\"formatter\":10,\"formatOptions\":{\"palette\":\"redBright\",\"customColumnWidthSetting\":\"330px\"}}],\"rowLimit\":10000,\"filter\":true,\"sortBy\":[{\"itemKey\":\"RoleAssigneeName\",\"sortOrder\":1}]},\"sortBy\":[{\"itemKey\":\"RoleAssigneeName\",\"sortOrder\":1}]},\"name\":\"query - 2\",\"styleSettings\":{\"showBorder\":true}}]},\"name\":\"Custom Delegation on User Accounts\"},{\"type\":12,\"content\":{\"version\":\"NotebookGroup/1.0\",\"groupType\":\"editable\",\"title\":\"Explanations\",\"expandable\":true,\"items\":[{\"type\":1,\"content\":{\"json\":\"This section displays all the nonstandard delegations done directly to a user account.\\r\\n\\r\\nDetailed information for the user accounts will be displayed.\\r\\n\\r\\nThis status is done by comparing current delegation with the default delegation for Exchange 2019 CU11.\\r\\n\\r\\nThese types of delegations are not available on the Exchange Admin Center.\\r\\n\\r\\nUsual results :\\r\\n\\r\\n - Delegations done directly to service account. Being able to see this delegation will help to sanityze the environment as some delegations may be no more necessary\\r\\n\\r\\n - Delegation done by mistake directly to Administrator Accounts\\r\\n\\r\\n - Suspicious delegations\\r\\n\\r\\n\\r\\nDetailed information for the user accounts will be displayed in below sections\\r\\n\"},\"name\":\"text - 0\"}]},\"name\":\"group - 3\"},{\"type\":12,\"content\":{\"version\":\"NotebookGroup/1.0\",\"groupType\":\"editable\",\"title\":\"Custom Delegation on Groups\",\"items\":[{\"type\":1,\"content\":{\"json\":\"Custom Delegation on Groups\"},\"name\":\"text - 2\"},{\"type\":9,\"content\":{\"version\":\"KqlParameterItem/1.0\",\"parameters\":[{\"id\":\"c548eb09-54e3-41bf-a99d-be3534f7018b\",\"version\":\"KqlParameterItem/1.0\",\"name\":\"RoleAssignee\",\"type\":2,\"query\":\"let DefMRA = externaldata (Name:string)[h\\\"https://raw.githubusercontent.com/nlepagnez/ESI-PublicContent/main/Operations/Watchlists/standardMRAOnline.csv\\\"]with(format=\\\"csv\\\",ignoreFirstRecord=true)| summarize make_list(Name);\\r\\nExchangeConfiguration(SpecificSectionList=\\\"MRA\\\",SpecificConfigurationDate=\\\"{DateOfConfiguration:value}\\\",SpecificConfigurationEnv={EnvironmentList},Target = \\\"Online\\\")\\r\\n| where CmdletResultValue.Name !in (DefMRA) and CmdletResultValue.RoleAssigneeType == \\\"RoleGroup\\\" and CmdletResultValue.RoleAssigneeName !contains \\\"RIM-MailboxAdmins\\\"\\r\\n| project CmdletResultValue\\r\\n| extend RoleAssigneeName = tostring(CmdletResultValue.RoleAssigneeName)\\r\\n| distinct RoleAssigneeName\",\"typeSettings\":{\"showDefault\":false},\"queryType\":0,\"resourceType\":\"microsoft.operationalinsights/workspaces\"},{\"id\":\"f5511a2b-9bf6-48ae-a968-2d1f879c8bfa\",\"version\":\"KqlParameterItem/1.0\",\"name\":\"Role\",\"type\":2,\"query\":\"ExchangeConfiguration(SpecificSectionList=\\\"MRA\\\",SpecificConfigurationDate=\\\"{DateOfConfiguration:value}\\\",SpecificConfigurationEnv={EnvironmentList},Target = \\\"Online\\\")\\r\\n| extend Role=tostring (CmdletResultValue.Role)\\r\\n| distinct Role\\r\\n| sort by Role asc\",\"typeSettings\":{\"showDefault\":false},\"queryType\":0,\"resourceType\":\"microsoft.operationalinsights/workspaces\"}],\"style\":\"pills\",\"queryType\":0,\"resourceType\":\"microsoft.operationalinsights/workspaces\"},\"name\":\"parameters - 4\"},{\"type\":3,\"content\":{\"version\":\"KqlItem/1.0\",\"query\":\"let DefMRA = externaldata (Name:string)[h\\\"https://raw.githubusercontent.com/nlepagnez/ESI-PublicContent/main/Operations/Watchlists/standardMRAOnline.csv\\\"]with(format=\\\"csv\\\",ignoreFirstRecord=true)| summarize make_list(Name);\\r\\nlet RoleG = ExchangeConfiguration(SpecificSectionList=\\\"MRA\\\",SpecificConfigurationDate=\\\"{DateOfConfiguration:value}\\\",SpecificConfigurationEnv={EnvironmentList},Target = \\\"Online\\\")\\r\\n | project RoleAssigneeName=tostring(CmdletResultValue.Name);\\r\\nExchangeConfiguration(SpecificSectionList=\\\"MRA\\\",SpecificConfigurationDate=\\\"{DateOfConfiguration:value}\\\",SpecificConfigurationEnv={EnvironmentList},Target = \\\"Online\\\")\\r\\n| where CmdletResultValue.RoleAssigneeName endswith \\\"{RoleAssignee}\\\" \\r\\n| where CmdletResultValue.Role contains \\\"{Role}\\\"\\r\\n| where CmdletResultValue.Name !in (DefMRA) and CmdletResultValue.RoleAssigneeType == \\\"RoleGroup\\\" and CmdletResultValue.RoleAssigneeName !contains \\\"RIM-MailboxAdmins\\\" and CmdletResultValue.Name !contains \\\"Deleg\\\"\\r\\n| project CmdletResultValue\\r\\n| extend ManagementRoleAssignment = tostring(CmdletResultValue.Name)\\r\\n| extend Role = tostring(CmdletResultValue.Role)\\r\\n| extend RoleAssigneeName = tostring(CmdletResultValue.RoleAssigneeName)\\r\\n| extend Status= tostring(CmdletResultValue.Enabled)\\r\\n| extend CustomRecipientWriteScope = tostring(CmdletResultValue.CustomRecipientWriteScope)\\r\\n| extend CustomConfigWriteScope = tostring(CmdletResultValue.CustomConfigWriteScope)\\r\\n| extend CustomResourceScope = tostring(CmdletResultValue.CustomResourceScope)\\r\\n| extend RecipientWriteScope = CmdletResultValue.RecipientWriteScope\\r\\n| extend ConfigWriteScope = CmdletResultValue.ConfigWriteScope\\r\\n|lookup RoleG on RoleAssigneeName \\r\\n| project-away CmdletResultValue\\r\\n| sort by RoleAssigneeName asc\",\"size\":3,\"showAnalytics\":true,\"showExportToExcel\":true,\"queryType\":0,\"resourceType\":\"microsoft.operationalinsights/workspaces\",\"gridSettings\":{\"rowLimit\":10000,\"filter\":true,\"sortBy\":[{\"itemKey\":\"RoleAssigneeName\",\"sortOrder\":1}]},\"sortBy\":[{\"itemKey\":\"RoleAssigneeName\",\"sortOrder\":1}]},\"name\":\"query - 1\",\"styleSettings\":{\"showBorder\":true}}]},\"name\":\"Custom Delegation on Groups\"},{\"type\":12,\"content\":{\"version\":\"NotebookGroup/1.0\",\"groupType\":\"editable\",\"title\":\"Explanations\",\"expandable\":true,\"items\":[{\"type\":1,\"content\":{\"json\":\"This section displays all the nonstandard delegations done for standard and non standard groups. Indeed, default groups have a list of default delegations but an Exchange administrators can add also new roles to the default groups.\\r\\n\\r\\nThis status is done by comparing current delegation with the default delegation for Exchange 2019 CU11.\\r\\n\\r\\nUsual results :\\r\\n\\r\\n - Delegations done for Organization Management to role like Mailbox Import Export or Mailbox Search\\r\\n\\r\\n - Delegation done by mistake\\r\\n\\r\\n - Suspicious delegations\\r\\n\\r\\nDetailed information for the user accounts present in the groups will be displayed in below sections\\r\\n\"},\"name\":\"text - 0\"}]},\"name\":\"group - 4\"}]},\"conditionalVisibility\":{\"parameterName\":\"selected\",\"comparison\":\"isEqualTo\",\"value\":\"RBACDelegation\"},\"name\":\"Custom Delegation\",\"styleSettings\":{\"showBorder\":true}},{\"type\":12,\"content\":{\"version\":\"NotebookGroup/1.0\",\"groupType\":\"editable\",\"title\":\"Information for Role Assignee\",\"items\":[{\"type\":12,\"content\":{\"version\":\"NotebookGroup/1.0\",\"groupType\":\"editable\",\"title\":\"Information for Role Assignee User account\",\"items\":[{\"type\":1,\"content\":{\"json\":\"Detailed Information on User account Role Assignee\"},\"name\":\"text - 0\"},{\"type\":9,\"content\":{\"version\":\"KqlParameterItem/1.0\",\"parameters\":[{\"id\":\"27e4c2e9-d113-4bf9-808f-0f8f68b5152e\",\"version\":\"KqlParameterItem/1.0\",\"name\":\"RoleAssignee\",\"type\":2,\"isRequired\":true,\"query\":\"let DefMRA = externaldata (Name:string)[h\\\"https://raw.githubusercontent.com/nlepagnez/ESI-PublicContent/main/Operations/Watchlists/standardMRAOnline.csv\\\"]with(format=\\\"csv\\\",ignoreFirstRecord=true)| summarize make_list(Name);\\r\\nExchangeConfiguration(SpecificSectionList=\\\"MRA\\\",SpecificConfigurationDate=\\\"{DateOfConfiguration:value}\\\",SpecificConfigurationEnv={EnvironmentList},Target = \\\"Online\\\")\\r\\n| where CmdletResultValue.Name !in (DefMRA) and CmdletResultValue.RoleAssigneeType == \\\"User\\\"\\r\\n| project CmdletResultValue\\r\\n| extend RoleAssigneeName = tostring(CmdletResultValue.RoleAssigneeName)\\r\\n| distinct RoleAssigneeName\",\"typeSettings\":{\"showDefault\":false},\"queryType\":0,\"resourceType\":\"microsoft.operationalinsights/workspaces\"}],\"style\":\"pills\",\"queryType\":0,\"resourceType\":\"microsoft.operationalinsights/workspaces\"},\"name\":\"parameters - 1\"},{\"type\":3,\"content\":{\"version\":\"KqlItem/1.0\",\"query\":\"ExchangeConfiguration(SpecificSectionList=\\\"DirectRoleAssignments\\\",SpecificConfigurationDate=\\\"{DateOfConfiguration:value}\\\",SpecificConfigurationEnv={EnvironmentList},Target = \\\"Online\\\")\\r\\n| where CmdletResultValue.SamAccountName contains \\\"{RoleAssignee}\\\"\\r\\n| project CmdletResultValue\\r\\n| extend Account = tostring(CmdletResultValue.SamAccountName)\\r\\n| extend LastLogon = CmdletResultValue.LastLogonString\\r\\n| extend LastPwdSet = CmdletResultValue.LastPwdSetString\\r\\n| extend Enabled = tostring(CmdletResultValue.Enabled)\\r\\n| extend DN = tostring(CmdletResultValue.DN)\\r\\n| project-away CmdletResultValue\\r\\n| sort by Account asc\",\"size\":3,\"showAnalytics\":true,\"color\":\"green\",\"showExportToExcel\":true,\"queryType\":0,\"resourceType\":\"microsoft.operationalinsights/workspaces\"},\"name\":\"query - 2\",\"styleSettings\":{\"showBorder\":true}}]},\"name\":\"Information for Role Assignee User account\"},{\"type\":12,\"content\":{\"version\":\"NotebookGroup/1.0\",\"groupType\":\"editable\",\"title\":\"Explanations\",\"expandable\":true,\"items\":[{\"type\":1,\"content\":{\"json\":\"This section displays detailed information for user account found with non standard delegation :\\r\\n - Last logon\\r\\n - Last Password changed\\r\\n - Account enabled\"},\"name\":\"text - 0\"}]},\"name\":\"group - 2\"},{\"type\":12,\"content\":{\"version\":\"NotebookGroup/1.0\",\"groupType\":\"editable\",\"title\":\"Information for Role Assignee group\",\"items\":[{\"type\":1,\"content\":{\"json\":\"Detailed information for Group delegation\"},\"name\":\"text - 0\"},{\"type\":9,\"content\":{\"version\":\"KqlParameterItem/1.0\",\"parameters\":[{\"id\":\"75c3cdf3-d0c3-46c3-83ae-429979774234\",\"version\":\"KqlParameterItem/1.0\",\"name\":\"RoleAssignee\",\"type\":2,\"isRequired\":true,\"query\":\"let DefMRA = externaldata (Name:string)[h\\\"https://raw.githubusercontent.com/nlepagnez/ESI-PublicContent/main/Operations/Watchlists/standardMRAOnline.csv\\\"]with(format=\\\"csv\\\",ignoreFirstRecord=true)| summarize make_list(Name);\\r\\nExchangeConfiguration(SpecificSectionList=\\\"MRA\\\",SpecificConfigurationDate=\\\"{DateOfConfiguration:value}\\\",SpecificConfigurationEnv={EnvironmentList},Target = \\\"Online\\\")\\r\\n| where CmdletResultValue.Name !in (DefMRA) and CmdletResultValue.RoleAssigneeType == \\\"RoleGroup\\\" and CmdletResultValue.RoleAssigneeName !contains \\\"RIM-MailboxAdmins\\\"\\r\\n| project CmdletResultValue\\r\\n| extend RoleAssigneeName = tostring(CmdletResultValue.RoleAssigneeName)\\r\\n| distinct RoleAssigneeName\",\"typeSettings\":{\"showDefault\":false},\"queryType\":0,\"resourceType\":\"microsoft.operationalinsights/workspaces\"}],\"style\":\"pills\",\"queryType\":0,\"resourceType\":\"microsoft.operationalinsights/workspaces\"},\"name\":\"parameters - 1\"},{\"type\":3,\"content\":{\"version\":\"KqlItem/1.0\",\"query\":\"ExchangeConfiguration(SpecificSectionList=\\\"ExGroup\\\",SpecificConfigurationDate=\\\"{DateOfConfiguration:value}\\\",SpecificConfigurationEnv={EnvironmentList},Target = \\\"Online\\\")\\r\\n| where CmdletResultValue.Parentgroup contains \\\"{RoleAssignee}\\\"\\r\\n| where CmdletResultValue.Level != 0\\r\\n| project CmdletResultValue\\r\\n| extend Level_ = tostring(CmdletResultValue.Level)\\r\\n| extend Parentgroup = tostring(CmdletResultValue.Parentgroup)\\r\\n| extend MemberPath = tostring(CmdletResultValue.MemberPath)\\r\\n| extend LastLogon = CmdletResultValue.LastLogonString\\r\\n| extend LastPwdSet = CmdletResultValue.LastPwdSetString\\r\\n| extend Enabled = tostring(CmdletResultValue.Enabled)\\r\\n| extend DN = tostring(CmdletResultValue.DN)\\r\\n| project-away CmdletResultValue\\r\\n| sort by Parentgroup asc\",\"size\":3,\"showAnalytics\":true,\"showExportToExcel\":true,\"queryType\":0,\"resourceType\":\"microsoft.operationalinsights/workspaces\"},\"name\":\"query - 2\",\"styleSettings\":{\"showBorder\":true}}]},\"name\":\"Information for Role Assignee group\"},{\"type\":12,\"content\":{\"version\":\"NotebookGroup/1.0\",\"groupType\":\"editable\",\"title\":\"Explanations\",\"expandable\":true,\"items\":[{\"type\":1,\"content\":{\"json\":\"This section displays detailed information for user account present in the found groups with non standard delegation :\\r\\n - Last logon\\r\\n - Last Password changed\\r\\n - Account enabled\"},\"name\":\"text - 0\"}]},\"name\":\"group - 3\"}]},\"conditionalVisibility\":{\"parameterName\":\"selected\",\"comparison\":\"isEqualTo\",\"value\":\"RBACDelegation\"},\"name\":\"Information for Role Assignee\",\"styleSettings\":{\"showBorder\":true}},{\"type\":12,\"content\":{\"version\":\"NotebookGroup/1.0\",\"groupType\":\"editable\",\"items\":[{\"type\":1,\"content\":{\"json\":\"### How to user this tab\\r\\n**1 - Select an account** : All the Cmdlet launched by the account during the selected time frame will be displayer.\\r\\n\\r\\n**2 - Select a cmdlet** : All the roles that contain will be displayed\\r\\n\\r\\n**3 - Review the list of roles** : This table contains all the roles that contain the selected Cmdlet\\r\\n\\r\\n\",\"style\":\"info\"},\"name\":\"text - 1\"},{\"type\":1,\"content\":{\"json\":\"### How to undertand the \\\"List of Roles with this CmdLet\\\" table ? \\r\\n\\r\\n**WeightRole :** Display the wieight of this role based on its importance in terms of security risk\\r\\n\\r\\n**SumRole :** Among all the Cmdlet launched by the account during the defined time frame, this role available for x cmdlet. This role include x cmdlet run by the user.\\r\\n\\r\\n**OrgMgmtRole :** This role is really in the scope of Organization Management group. If the selected Cmdlet is not included is any other role, it make sense that this user is member of the Organization Management group\\r\\n\\r\\n \",\"style\":\"upsell\"},\"name\":\"text - 2\"},{\"type\":12,\"content\":{\"version\":\"NotebookGroup/1.0\",\"groupType\":\"editable\",\"items\":[{\"type\":3,\"content\":{\"version\":\"KqlItem/1.0\",\"query\":\"let CounUserCmdlet = (ExchangeAdminAuditLogs\\r\\n| where Status == \\\"Success\\\"\\r\\n| extend Caller = tostring(split(Caller,\\\"/\\\")[countof(Caller,\\\"/\\\")])\\r\\n| summarize Count=count() by Caller);\\r\\nExchangeConfiguration(SpecificSectionList=\\\"ExGroup\\\",SpecificConfigurationDate=\\\"{DateOfConfiguration:value}\\\",SpecificConfigurationEnv={EnvironmentList},Target = \\\"Online\\\")\\r\\n| search CmdletResultValue.Parentgroup == \\\"Organization Management\\\"\\r\\n| where CmdletResultValue.Level != 0\\r\\n| where CmdletResultValue.ObjectClass == \\\"user\\\"\\r\\n//| project CmdletResultValue,Count\\r\\n| extend Account = tostring(CmdletResultValue.SamAccountName)\\r\\n| join kind=leftouter (CounUserCmdlet) on $left.Account == $right.Caller\\r\\n| project Account,Count\\r\\n//| project-away CmdletResultValue\\r\\n| sort by Account asc\",\"size\":3,\"title\":\"Organization Management Members\",\"exportFieldName\":\"Account\",\"exportParameterName\":\"Account\",\"queryType\":0,\"resourceType\":\"microsoft.operationalinsights/workspaces\",\"gridSettings\":{\"rowLimit\":10000,\"filter\":true,\"formatters\":[{\"columnMatch\":\"Count\",\"formatter\":3,\"formatOptions\":{\"palette\":\"purple\"}}]}},\"customWidth\":\"20\",\"name\":\"query - 1\",\"styleSettings\":{\"maxWidth\":\"100%\",\"showBorder\":true}},{\"type\":3,\"content\":{\"version\":\"KqlItem/1.0\",\"query\":\"ExchangeAdminAuditLogs\\r\\n| where Caller contains \\\"{Account}\\\"\\r\\n| where Status == \\\"Success\\\"\\r\\n| distinct CmdletName\\r\\n| sort by CmdletName asc\",\"size\":3,\"title\":\"List of CmdLet run by the account\",\"exportFieldName\":\"CmdletName\",\"exportParameterName\":\"CmdletName\",\"queryType\":0,\"resourceType\":\"microsoft.operationalinsights/workspaces\",\"gridSettings\":{\"rowLimit\":10000,\"filter\":true,\"sortBy\":[{\"itemKey\":\"CmdletName\",\"sortOrder\":1}]},\"sortBy\":[{\"itemKey\":\"CmdletName\",\"sortOrder\":1}]},\"customWidth\":\"33\",\"name\":\"query - 3\",\"styleSettings\":{\"showBorder\":true}},{\"type\":3,\"content\":{\"version\":\"KqlItem/1.0\",\"query\":\"let RBACRoleCmdlet = _GetWatchlist('RBACRoleCmdlet');\\r\\nlet UserRoleList = ExchangeAdminAuditLogs | where Caller contains \\\"{Account}\\\" | where Status == \\\"Success\\\" | distinct CmdletName;\\r\\nlet countRole = (RBACRoleCmdlet | where Name has_any (UserRoleList)| summarize SumRole = count()by Role);\\r\\nlet RolevsCmdlet = (RBACRoleCmdlet | where Name has_any (UserRoleList)| summarize make_set(Name) by Role);\\r\\nRolevsCmdlet\\r\\n| join kind=leftouter ( countRole ) on Role\\r\\n| project Role,CmdletList=set_Name,SumRole\\r\\n| join kind=leftouter ( RBACRoleCmdlet ) on Role\\r\\n| where Name has \\\"{CmdletName}\\\"\\r\\n| extend PossibleRoles = Role\\r\\n| extend OrgMgmtRole = OrgM\\r\\n| extend RoleWeight = Priority\\r\\n|distinct PossibleRoles,RoleWeight,tostring(SumRole),OrgMgmtRole,tostring(CmdletList)\\r\\n|sort by SumRole,RoleWeight\\r\\n\",\"size\":3,\"title\":\"List of Roles with this CmdLet\",\"queryType\":0,\"resourceType\":\"microsoft.operationalinsights/workspaces\",\"gridSettings\":{\"rowLimit\":10000,\"filter\":true,\"sortBy\":[{\"itemKey\":\"PossibleRoles\",\"sortOrder\":1}]},\"sortBy\":[{\"itemKey\":\"PossibleRoles\",\"sortOrder\":1}]},\"customWidth\":\"40\",\"name\":\"query - 3\",\"styleSettings\":{\"margin\":\"0\",\"maxWidth\":\"100%\",\"showBorder\":true}},{\"type\":3,\"content\":{\"version\":\"KqlItem/1.0\",\"query\":\"let RBACRoleCmdlet = _GetWatchlist('RBACRoleCmdlet');\\r\\nlet UserRoleList = ExchangeAdminAuditLogs | where TimeGenerated {TimeRange} | where Caller contains \\\"{Account}\\\" | where Status == \\\"Success\\\" | distinct CmdletName;\\r\\nlet countRole = (RBACRoleCmdlet | where Name has_any (UserRoleList)| summarize SumRole = count()by Role);\\r\\nlet RolevsCmdlet = (RBACRoleCmdlet | where Name has_any (UserRoleList)| summarize make_set(Name) by Role);\\r\\nRolevsCmdlet\\r\\n| join kind=leftouter ( countRole ) on Role\\r\\n| project Role,CmdletList=set_Name,SumRole\\r\\n| join kind=leftouter ( RBACRoleCmdlet ) on Role\\r\\n| extend Roles = Role\\r\\n| extend OrgMgmtRole = OrgM\\r\\n| extend RoleWeight = Priority\\r\\n| extend CmdletList=tostring(CmdletList)\\r\\n| summarize by Roles,CmdletList,RoleWeight,tostring(SumRole),OrgMgmtRole\\r\\n| distinct Roles,RoleWeight,tostring(SumRole),OrgMgmtRole,tostring(CmdletList)\\r\\n|sort by Roles asc\",\"size\":0,\"title\":\"Recommended Roles for selected users\",\"queryType\":0,\"resourceType\":\"microsoft.operationalinsights/workspaces\",\"gridSettings\":{\"rowLimit\":10000,\"filter\":true,\"sortBy\":[{\"itemKey\":\"Roles\",\"sortOrder\":1}]},\"sortBy\":[{\"itemKey\":\"Roles\",\"sortOrder\":1}]},\"name\":\"query - 3\"}]},\"name\":\"group - 0\"}]},\"conditionalVisibility\":{\"parameterName\":\"selected\",\"comparison\":\"isEqualTo\",\"value\":\"Leastprivileges\"},\"name\":\"group - 5\"},{\"type\":12,\"content\":{\"version\":\"NotebookGroup/1.0\",\"groupType\":\"editable\",\"title\":\"Custom Role details\",\"items\":[{\"type\":12,\"content\":{\"version\":\"NotebookGroup/1.0\",\"groupType\":\"editable\",\"title\":\"List of Custom Roles\",\"items\":[{\"type\":1,\"content\":{\"json\":\"List of existing custom Roles\"},\"customWidth\":\"50\",\"name\":\"text - 3\"},{\"type\":1,\"content\":{\"json\":\"List of Custom with a Management Role Assignement (associated with a group or a user). Display the target account and scope if set\"},\"customWidth\":\"50\",\"name\":\"text - 4\"},{\"type\":3,\"content\":{\"version\":\"KqlItem/1.0\",\"query\":\"ExchangeConfiguration(SpecificSectionList=\\\"MRCustom\\\",SpecificConfigurationDate=\\\"{DateOfConfiguration:value}\\\",SpecificConfigurationEnv={EnvironmentList},Target = \\\"Online\\\")\\r\\n| extend Identity = CmdletResultValue.Name\\r\\n| extend ParentRole =split(tostring(CmdletResultValue.Parent),\\\"\\\\\\\\\\\")[1]\\r\\n| project Identity, ParentRole, WhenCreated, WhenChanged\",\"size\":0,\"showAnalytics\":true,\"timeContext\":{\"durationMs\":86400000},\"showExportToExcel\":true,\"queryType\":0,\"resourceType\":\"microsoft.operationalinsights/workspaces\"},\"customWidth\":\"50\",\"name\":\"query - 1\",\"styleSettings\":{\"showBorder\":true}},{\"type\":3,\"content\":{\"version\":\"KqlItem/1.0\",\"query\":\"let MRcustomRoles = (ExchangeConfiguration(SpecificSectionList=\\\"MRCustom\\\", SpecificConfigurationDate=\\\"{DateOfConfiguration:value}\\\",SpecificConfigurationEnv={EnvironmentList},Target = \\\"Online\\\")\\r\\n| project Role = tostring(CmdletResultValue.Name));\\r\\nExchangeConfiguration(SpecificSectionList=\\\"MRA\\\", SpecificConfigurationDate=\\\"{DateOfConfiguration:value}\\\",SpecificConfigurationEnv={EnvironmentList},Target = \\\"Online\\\")\\r\\n| extend Role = tostring(CmdletResultValue.Role)\\r\\n| extend RoleAssigneeName = tostring(CmdletResultValue.RoleAssigneeName)\\r\\n| extend Scope = tostring(CmdletResultValue.CustomRecipientWriteScope)\\r\\n| project Role, Scope, RoleAssigneeName\\r\\n| join kind=inner (MRcustomRoles) on Role\\r\\n| project Role,RoleAssigneeName,Scope\",\"size\":1,\"showAnalytics\":true,\"timeContext\":{\"durationMs\":86400000},\"showExportToExcel\":true,\"queryType\":0,\"resourceType\":\"microsoft.operationalinsights/workspaces\"},\"customWidth\":\"50\",\"name\":\"query - 2\"},{\"type\":3,\"content\":{\"version\":\"KqlItem/1.0\",\"query\":\"let MRcustomRoles = (ExchangeConfiguration(SpecificSectionList=\\\"MRCustom\\\", SpecificConfigurationDate=\\\"{DateOfConfiguration:value}\\\",SpecificConfigurationEnv={EnvironmentList},Target = \\\"Online\\\")\\r\\n| project Role = tostring(CmdletResultValue.Name));\\r\\nExchangeConfiguration(SpecificSectionList=\\\"MRA\\\", SpecificConfigurationDate=\\\"lastdate\\\", SpecificConfigurationEnv='ITSY', Target = \\\"Online\\\")\\r\\n| extend RoleAssigneeName = tostring(CmdletResultValue.RoleAssigneeName)\\r\\n| extend Scope = tostring(CmdletResultValue.CustomRecipientWriteScope)\\r\\n| project Role= tostring(CmdletResultValue.Role), Scope, RoleAssigneeName\\r\\n| join kind=rightouter (MRcustomRoles) on Role\\r\\n| project Role = Role1, Scope, RoleAssigneeName,Comment = iff(Role == \\\"\\\", \\\"⚠️ No existing delegation for this role\\\", \\\"✅ This role is delegated with a Management Role Assignment\\\")\",\"size\":0,\"showAnalytics\":true,\"timeContext\":{\"durationMs\":86400000},\"showExportToExcel\":true,\"queryType\":0,\"resourceType\":\"microsoft.operationalinsights/workspaces\"},\"customWidth\":\"50\",\"name\":\"query - 4\"},{\"type\":3,\"content\":{\"version\":\"KqlItem/1.0\",\"query\":\"let MRcustomRoles = (ExchangeConfiguration(SpecificSectionList=\\\"MRCustom\\\", SpecificConfigurationDate=\\\"{DateOfConfiguration:value}\\\",SpecificConfigurationEnv={EnvironmentList},Target = \\\"Online\\\")\\r\\n| project Role = tostring(CmdletResultValue.Name));\\r\\nExchangeConfiguration(SpecificSectionList=\\\"MRA\\\", SpecificConfigurationDate=\\\"{DateOfConfiguration:value}\\\",SpecificConfigurationEnv={EnvironmentList},Target = \\\"Online\\\")\\r\\n| project Role = tostring(CmdletResultValue.Role)\\r\\n| join kind=rightouter (MRcustomRoles) on Role\\r\\n| summarize acount = count() by iff( Role==\\\"\\\",\\\"Number of non assigned roles\\\", Role)\",\"size\":0,\"showAnalytics\":true,\"timeContext\":{\"durationMs\":86400000},\"showExportToExcel\":true,\"queryType\":0,\"resourceType\":\"microsoft.operationalinsights/workspaces\",\"visualization\":\"piechart\"},\"customWidth\":\"50\",\"name\":\"query - 5\"}]},\"name\":\"List of Custom Roles\"},{\"type\":12,\"content\":{\"version\":\"NotebookGroup/1.0\",\"groupType\":\"editable\",\"title\":\"Custom Roles delegation on group\",\"items\":[{\"type\":1,\"content\":{\"json\":\"This section shows delegation associated with the Custom Roles\"},\"name\":\"text - 0\"},{\"type\":3,\"content\":{\"version\":\"KqlItem/1.0\",\"query\":\"let MRcustomRoles = (ExchangeConfiguration(SpecificSectionList=\\\"MRCustom\\\", SpecificConfigurationDate=\\\"{DateOfConfiguration:value}\\\",SpecificConfigurationEnv={EnvironmentList},Target = \\\"Online\\\")\\r\\n| project Role = tostring(CmdletResultValue.Name));\\r\\nExchangeConfiguration(SpecificSectionList=\\\"MRA\\\", SpecificConfigurationDate=\\\"{DateOfConfiguration:value}\\\",SpecificConfigurationEnv={EnvironmentList},Target = \\\"Online\\\")\\r\\n| extend Role = tostring(CmdletResultValue.Role)\\r\\n| extend RoleAssigneeName = tostring(CmdletResultValue.RoleAssigneeName)\\r\\n| extend Status= tostring(CmdletResultValue.Enabled)\\r\\n| extend CustomRecipientWriteScope = tostring(CmdletResultValue.CustomRecipientWriteScope)\\r\\n| extend CustomConfigWriteScope = tostring(CmdletResultValue.CustomConfigWriteScope)\\r\\n| extend CustomResourceScope = tostring(CmdletResultValue.CustomResourceScope)\\r\\n| extend RecipientWriteScope = CmdletResultValue.RecipientWriteScope\\r\\n| extend ConfigWriteScope = CmdletResultValue.ConfigWriteScope\\r\\n| project RoleAssigneeName, Role, Status,CustomRecipientWriteScope, CustomConfigWriteScope,CustomResourceScope,RecipientWriteScope,ConfigWriteScope,WhenCreated, WhenChanged\\r\\n| join kind=inner (MRcustomRoles) on Role\\r\\n| project RoleAssigneeName, Role, Status,CustomRecipientWriteScope, CustomConfigWriteScope,CustomResourceScope,RecipientWriteScope,ConfigWriteScope,WhenCreated, WhenChanged\",\"size\":0,\"showAnalytics\":true,\"timeContext\":{\"durationMs\":86400000},\"showExportToExcel\":true,\"queryType\":0,\"resourceType\":\"microsoft.operationalinsights/workspaces\"},\"name\":\"query - 1\"}]},\"name\":\"group - 2\"},{\"type\":12,\"content\":{\"version\":\"NotebookGroup/1.0\",\"groupType\":\"editable\",\"title\":\"Details for Custom Roles Cmdlets \",\"items\":[{\"type\":1,\"content\":{\"json\":\"This section displays for the chosen custom management roles all Cmdlets and their parameters associated with this custom role.\\r\\nRemember that for a cmdlet, some parameters can be removed.\"},\"name\":\"text - 0\"},{\"type\":9,\"content\":{\"version\":\"KqlParameterItem/1.0\",\"parameters\":[{\"id\":\"07c8ac83-371d-4702-ab66-72aeb2a20053\",\"version\":\"KqlParameterItem/1.0\",\"name\":\"CustomRole\",\"type\":2,\"isRequired\":true,\"query\":\"ExchangeConfiguration(SpecificSectionList=\\\"MRCustom\\\",SpecificConfigurationDate=\\\"{DateOfConfiguration:value}\\\",SpecificConfigurationEnv={EnvironmentList},Target = \\\"Online\\\")\\r\\n| extend Identity = CmdletResultValue.Name\\r\\n| project Identity\",\"typeSettings\":{\"showDefault\":false},\"timeContext\":{\"durationMs\":86400000},\"queryType\":0,\"resourceType\":\"microsoft.operationalinsights/workspaces\"}],\"style\":\"pills\",\"queryType\":0,\"resourceType\":\"microsoft.operationalinsights/workspaces\"},\"name\":\"parameters - 2\"},{\"type\":3,\"content\":{\"version\":\"KqlItem/1.0\",\"query\":\"ExchangeConfiguration(SpecificSectionList=\\\"MRCustomDetails\\\",SpecificConfigurationDate=\\\"{DateOfConfiguration:value}\\\",SpecificConfigurationEnv={EnvironmentList},Target = \\\"Online\\\")\\r\\n| where (replace_string(replace_string(tostring(split(CmdletResultValue.Role.DistinguishedName,\\\",\\\",0)),\\\"[\\\\\\\"CN=\\\",\\\"\\\"),\\\"\\\\\\\"]\\\",\\\"\\\")) contains \\\"{CustomRole}\\\"\\r\\n| extend CustomRoleName = replace_string(replace_string(tostring(split(CmdletResultValue.Role.DistinguishedName,\\\",\\\",0)),\\\"[\\\\\\\"CN=\\\",\\\"\\\"),\\\"\\\\\\\"]\\\",\\\"\\\")\\r\\n| extend CmdletName = CmdletResultValue.Name\\r\\n| extend Parameters = CmdletResultValue.Parameters\\r\\n| project CmdletName,Parameters\",\"size\":1,\"showAnalytics\":true,\"timeContext\":{\"durationMs\":86400000},\"showExportToExcel\":true,\"queryType\":0,\"resourceType\":\"microsoft.operationalinsights/workspaces\"},\"name\":\"query - 1\",\"styleSettings\":{\"showBorder\":true}}]},\"name\":\"Details for Custom Roles Cmdlets \"}]},\"conditionalVisibility\":{\"parameterName\":\"selected\",\"comparison\":\"isEqualTo\",\"value\":\"CustomRole\"},\"name\":\"Custom Role\"}],\"fromTemplateId\":\"sentinel-MicrosoftExchangeLeastPrivilegewithRBAC-Online\",\"$schema\":\"https://github.com/Microsoft/Application-Insights-Workbooks/blob/master/schema/workbook.json\"}\r\n", "version": "1.0", "sourceId": "[variables('workspaceResourceId')]", "category": "sentinel" @@ -1031,7 +1031,7 @@ }, "properties": { "displayName": "[parameters('workbook2-name')]", - "serializedData": "{\"version\":\"Notebook/1.0\",\"items\":[{\"type\":1,\"content\":{\"json\":\"# Microsoft Exchange Security Review Online\"},\"name\":\"text - 2\"},{\"type\":9,\"content\":{\"version\":\"KqlParameterItem/1.0\",\"parameters\":[{\"id\":\"9ae328d6-99c8-4c44-8d59-42ca4d999098\",\"version\":\"KqlParameterItem/1.0\",\"name\":\"EnvironmentList\",\"label\":\"Environment\",\"type\":2,\"isRequired\":true,\"multiSelect\":true,\"quote\":\"'\",\"delimiter\":\",\",\"query\":\"ESI_ExchConfigAvailableEnvironments(Target=\\\"Online\\\") | where ESIEnvironment != \\\"\\\"\",\"typeSettings\":{\"limitSelectTo\":1,\"showDefault\":false},\"queryType\":0,\"resourceType\":\"microsoft.operationalinsights/workspaces\",\"value\":[\"ITSY\"]},{\"id\":\"a88b4e41-eb2f-41bf-92d8-27c83650a4b8\",\"version\":\"KqlParameterItem/1.0\",\"name\":\"DateOfConfiguration\",\"label\":\"Collection time\",\"type\":2,\"isRequired\":true,\"query\":\"let _configurationEnv = split(iff(isnull({EnvironmentList}) or isempty({EnvironmentList}) or tolower({EnvironmentList}) == \\\"all\\\",\\\"All\\\",tostring({EnvironmentList})),',');\\r\\nESIExchangeOnlineConfig_CL\\r\\n| extend ScopedEnvironment = iff(_configurationEnv contains \\\"All\\\", \\\"All\\\",ESIEnvironment_s) \\r\\n| where ScopedEnvironment in (_configurationEnv)\\r\\n| extend Collection = format_datetime(todatetime(EntryDate_s), 'yyyy-MM-dd')\\r\\n| summarize Collection = max(Collection)\\r\\n| project Collection = \\\"lastdate\\\", Selected = true\\r\\n| join kind= fullouter ( ESIExchangeOnlineConfig_CL | extend ScopedEnvironment = iff(_configurationEnv contains \\\"All\\\", \\\"All\\\",ESIEnvironment_s) \\r\\n| where ScopedEnvironment in (_configurationEnv)\\r\\n| where TimeGenerated > ago(90d)\\r\\n| extend Collection = format_datetime(todatetime(EntryDate_s), 'yyyy-MM-dd')\\r\\n| summarize by Collection\\r\\n) on Collection\\r\\n| project Value = iif(Selected,Collection,Collection1), Label = iif(Selected,\\\"Last Known date\\\",Collection1), Selected\\r\\n| sort by Selected, Value desc\",\"typeSettings\":{\"showDefault\":false},\"queryType\":0,\"resourceType\":\"microsoft.operationalinsights/workspaces\"},{\"id\":\"8ac96eb3-918b-4a36-bcc4-df50d8f46175\",\"version\":\"KqlParameterItem/1.0\",\"name\":\"Help\",\"label\":\"Show Help\",\"type\":10,\"isRequired\":true,\"query\":\"{\\\"version\\\":\\\"1.0.0\\\",\\\"content\\\":\\\"[\\\\r\\\\n { \\\\\\\"value\\\\\\\": \\\\\\\"Yes\\\\\\\", \\\\\\\"label\\\\\\\": \\\\\\\"Yes\\\\\\\"},\\\\r\\\\n {\\\\\\\"value\\\\\\\": \\\\\\\"No\\\\\\\", \\\\\\\"label\\\\\\\": \\\\\\\"No\\\\\\\", \\\\\\\"selected\\\\\\\":true }\\\\r\\\\n]\\\\r\\\\n\\\"}\",\"timeContext\":{\"durationMs\":2592000000},\"queryType\":8}],\"style\":\"above\",\"queryType\":0,\"resourceType\":\"microsoft.operationalinsights/workspaces\"},\"name\":\"TimeRange\"},{\"type\":1,\"content\":{\"json\":\"This workbook helps review your Exchange Security configuration.\\r\\nAdjust the time range, and when needed select an item in the dropdownlist\",\"style\":\"info\"},\"name\":\"text - 9\"},{\"type\":11,\"content\":{\"version\":\"LinkItem/1.0\",\"style\":\"tabs\",\"links\":[{\"id\":\"34188faf-7a02-4697-9b36-2afa986afc0f\",\"cellValue\":\"selected\",\"linkTarget\":\"parameter\",\"linkLabel\":\"Mailbox Access\",\"subTarget\":\"Delegation\",\"postText\":\"t\",\"style\":\"link\",\"icon\":\"3\",\"linkIsContextBlade\":true},{\"id\":\"be02c735-6150-4b6e-a386-b2b023e754e5\",\"cellValue\":\"selected\",\"linkTarget\":\"parameter\",\"linkLabel\":\"EXO & Azure AD Groups\",\"subTarget\":\"ExchAD\",\"style\":\"link\"},{\"id\":\"26c68d90-925b-4c3c-a837-e3cecd489b2d\",\"cellValue\":\"selected\",\"linkTarget\":\"parameter\",\"linkLabel\":\"Transport Configuration\",\"subTarget\":\"Transport\",\"style\":\"link\"},{\"id\":\"eb2888ca-7fa6-4e82-88db-1bb3663a801e\",\"cellValue\":\"selected\",\"linkTarget\":\"parameter\",\"linkLabel\":\"Workbook Help\",\"subTarget\":\"Start\",\"style\":\"link\"}]},\"name\":\"TopMenuTabs\"},{\"type\":12,\"content\":{\"version\":\"NotebookGroup/1.0\",\"groupType\":\"editable\",\"items\":[{\"type\":1,\"content\":{\"json\":\"# Workbook goals\\r\\n\\r\\nThe goal of this workbook is to outline key security configurations of your Exchange on-premises environment.\\r\\n\\r\\nMost of Exchange organizations have were installed years ago (sometimes more than 10 years). Many configurations have been done and might not have been documented. For most environments, the core commitment was maintaining a high availability of the users’ mailboxes putting aside other consideration (even security considerations). Recommended security practices have also evolved since the first released and a regular review is necessary.\\r\\n\\r\\nThis workbook is designed to show your Exchange organization is configured with a security point of view. Indeed, some configurations easy to display as there are no UI available.\\r\\n\\r\\nFor each configuration, you will find explanations and recommendations when applicable.\\r\\n\\r\\n- This workbook does not pretend to show you every weak Security configurations, but the most common issues and known to be used by attackers. \\r\\n- It will not show you if you have been comprised, but will help you identify unexpected configuration.\\r\\n\\r\\n----\\r\\n\\r\\n## Quick reminder of how Exchange works\\r\\n\\r\\nDuring Exchange installation two very important groups are created :\\r\\n- Exchange Trusted Subsystem : Contain all the computer accounts for Exchange Server\\r\\n- Exchange Windows Permissions : Contain the group Exchange trusted Subsystem\\r\\n\\r\\nThese groups have :\\r\\n- Very high privileges in ALL AD domains including the root domain\\r\\n- Right on any Exchange including mailboxes\\r\\n\\r\\nAs each Exchange server computer account is member of Exchange Trusted Subsystem, it means by taking control of the computer account or being System on an Exchange server you will gain access to all the permissions granted to Exchange Trusted Subsystem and Exchange Windows Permissions.\\r\\n\\r\\nTo protect AD and Exchange, it is very important to ensure the following:\\r\\n- There is a very limited number of persons that are local Administrator on Exchange server\\r\\n- To protect user right like : Act part of the operating System, Debug\\r\\n\\r\\nEvery service account or application that have high privileges on Exchange need to be considered as sensitive\\r\\n\\r\\n** 💡 Exchange servers need to be considered as very sensitive servers**\\r\\n\\r\\n-----\\r\\n\\r\\n\\r\\n## Tabs\\r\\n\\r\\n### Mailbox Access\\r\\n\\r\\nThis tab will show you several top sensitive delegations that allow an account to access, modify, act as another user, search, export the content of a mailbox.\\r\\n\\r\\n### Exchange & AD Groups\\r\\n\\r\\nThis tab will show you the members of Exchange groups and Sensitive AD groups.\\r\\n\\r\\n### Local Administrators\\r\\n\\r\\nThis tab will show you the non standard content of the local Administrators group. Remember that a member of the local Administrators group can take control of the computer account of the server and then it will have all the permissions associated with Exchange Trusted Subsytem and Exchange Windows Permissions\\r\\n\\r\\nThe information is displayed with different views : \\r\\n- List of nonstandard users\\r\\n- Number of servers with a nonstandard a user\\r\\n- Nonstandard groups content\\r\\n- For each user important information are displayed like last logon, last password set, enabled\\r\\n\\r\\n### Exchange Security configuration\\r\\n\\r\\nThis tab will show you some important configuration for your Exchange Organization\\r\\n- Status of Admin Audit Log configuration\\r\\n- Status of POP and IMAP configuration : especially, is Plaintext Authentication configured ?\\r\\n- Nonstandard permissions on the Exchange container in the Configuration Partition\\r\\n\\r\\n### Transport Configuration\\r\\n\\r\\nThis tab will show you the configuration of the main Transport components\\r\\n- Receive Connectors configured with Anonymous and/or Open Relay\\r\\n- Remote Domain Autoforward configuration\\r\\n- Transport Rules configured with BlindCopyTo, SendTo, RedirectTo\\r\\n- Journal Rule and Journal Recipient configurations\\r\\n- Accepted Domains with *\\r\\n\\r\\n\"},\"name\":\"WorkbookInfo\"}]},\"conditionalVisibility\":{\"parameterName\":\"selected\",\"comparison\":\"isEqualTo\",\"value\":\"Start\"},\"name\":\"InformationTab\"},{\"type\":12,\"content\":{\"version\":\"NotebookGroup/1.0\",\"groupType\":\"editable\",\"title\":\"Display important security configurations that allow to mailboxes content (direct delegation on mailboxes are not listed (Full Access mailboxes or direct delegation on mailboxes folders)\",\"items\":[{\"type\":3,\"content\":{\"version\":\"KqlItem/1.0\",\"query\":\"ExchangeConfiguration(SpecificSectionList=\\\"MRA\\\",SpecificConfigurationDate=\\\"{DateOfConfiguration:value}\\\",SpecificConfigurationEnv={EnvironmentList},Target = \\\"Online\\\")\\r\\n| where CmdletResultValue.Name !contains \\\"Deleg\\\" and CmdletResultValue.RoleAssigneeName != \\\"Hygiene Management\\\" and CmdletResultValue.RoleAssigneeName != \\\"Exchange Online-ApplicationAccount\\\" and CmdletResultValue.RoleAssigneeName != \\\"Discovery Management\\\" and CmdletResultValue.RoleAssigneeName !contains \\\"RIM-MailboxAdmins\\\"\\r\\n| where CmdletResultValue.Role contains \\\"Export\\\" or CmdletResultValue.Role contains \\\"Impersonation\\\" or CmdletResultValue.Role contains \\\"Search\\\"\\r\\n| summarize dcount(tostring(CmdletResultValue.RoleAssigneeName)) by role=tostring(CmdletResultValue.Role)\",\"size\":3,\"title\":\"Number of accounts with sensitive RBAC roles\",\"queryType\":0,\"resourceType\":\"microsoft.operationalinsights/workspaces\",\"visualization\":\"tiles\",\"tileSettings\":{\"titleContent\":{\"columnMatch\":\"role\",\"formatter\":1},\"leftContent\":{\"columnMatch\":\"dcount_CmdletResultValue_RoleAssigneeName\",\"formatter\":12,\"formatOptions\":{\"palette\":\"auto\"},\"numberFormat\":{\"unit\":17,\"options\":{\"style\":\"decimal\",\"maximumFractionDigits\":2,\"maximumSignificantDigits\":3}}},\"showBorder\":true,\"sortCriteriaField\":\"role\",\"sortOrderField\":1}},\"name\":\"MRAQuery\"},{\"type\":1,\"content\":{\"json\":\"**ApplicationImpersonation** is an RBAC role that allows access (read and modify) to the content of all mailboxes using EWS. This role is very powerfull and should be carefully delegated. When a delegation is necessary, RBAC scopes should be configured to limit the list of impacted mailboxes.\\r\\n\\r\\nIt is common to see service accounts for backup solution, antivirus software, MDM...\\r\\n\\r\\nNote that the default configuration to the group Hygiene Management is excluded. this group is a sensitive group. Remember to monitor the content of this group\",\"style\":\"info\"},\"conditionalVisibility\":{\"parameterName\":\"Help\",\"comparison\":\"isEqualTo\",\"value\":\"Yes\"},\"name\":\"SensitiveRBACHelp\"},{\"type\":12,\"content\":{\"version\":\"NotebookGroup/1.0\",\"groupType\":\"editable\",\"title\":\"Application Impersonation Role\",\"items\":[{\"type\":1,\"content\":{\"json\":\"This delegation allows the delegated account to access and modify the content of every mailboxes using EWS.\"},\"name\":\"text - 0\"},{\"type\":3,\"content\":{\"version\":\"KqlItem/1.0\",\"query\":\"ExchangeConfiguration(SpecificSectionList=\\\"MRA\\\",SpecificConfigurationDate=\\\"{DateOfConfiguration:value}\\\",SpecificConfigurationEnv={EnvironmentList},Target = \\\"Online\\\")\\r\\n| where CmdletResultValue.Role contains \\\"Impersonation\\\" and CmdletResultValue.RoleAssigneeName != \\\"Hygiene Management\\\" and CmdletResultValue.RoleAssigneeName !contains \\\"RIM-MailboxAdmins\\\" and CmdletResultValue.Name !contains \\\"Deleg\\\"\\r\\n| extend RoleAssigneeName = tostring(CmdletResultValue.RoleAssigneeName)\\r\\n| extend RoleAssigneeType = iff(CmdletResultValue.RoleAssigneeType== \\\"User\\\" , \\\"User\\\", \\\"RoleGroup\\\")\\r\\n| extend CustomRecipientWriteScope = tostring(CmdletResultValue.CustomRecipientWriteScope)\\r\\n| extend CustomConfigWriteScope = tostring(CmdletResultValue.CustomConfigWriteScope)\\r\\n| extend CustomResourceScope = tostring(CmdletResultValue.CustomResourceScope)\\r\\n| extend RecipientWriteScope = CmdletResultValue.RecipientWriteScope\\r\\n| extend ConfigWriteScope = CmdletResultValue.ConfigWriteScope\\r\\n| extend ManagementRoleAssignement = tostring(CmdletResultValue.Name)\\r\\n| extend Status= tostring(CmdletResultValue.Enabled)\\r\\n| extend RoleAssigneeName = iff( RoleAssigneeType == \\\"User\\\", strcat(\\\"🧑‍🦰 \\\",RoleAssigneeName), strcat(\\\"👪 \\\", RoleAssigneeName) )\\r\\n| project RoleAssigneeName, RoleAssigneeType, Status,CustomRecipientWriteScope,CustomConfigWriteScope,CustomResourceScope,RecipientWriteScope,ConfigWriteScope,ManagementRoleAssignement,WhenChanged,WhenCreated\",\"size\":3,\"showAnalytics\":true,\"showExportToExcel\":true,\"queryType\":0,\"resourceType\":\"microsoft.operationalinsights/workspaces\",\"gridSettings\":{\"rowLimit\":10000,\"filter\":true}},\"name\":\"query - 1\",\"styleSettings\":{\"showBorder\":true}}]},\"name\":\"Application Impersonation Role\"},{\"type\":12,\"content\":{\"version\":\"NotebookGroup/1.0\",\"groupType\":\"editable\",\"title\":\"Mailbox Import Export Role\",\"items\":[{\"type\":1,\"content\":{\"json\":\"This delegation allows to export the content all mailboxes in a scope in PST file.\\r\\nExcluded from the result as default configuration :\\r\\nDelegating delegation to Organization Management\\r\\n\"},\"name\":\"text - 0\"},{\"type\":1,\"content\":{\"json\":\"**Mailbox Import Export** is an RBAC role that allows an account to export the content of any maibox in a PST. It also allows search in all mailboxes.\\r\\n\\r\\n⚡ This role is very powerfull.\\r\\n\\r\\nBy default, this role is not delegated to any user or group. The members of the group Organization Management by default do not have this role but are able to delegate it.\\r\\n\\r\\nℹ️ Recommendations\\r\\n\\r\\nIf you temporarily need this delegation, consider the following:\\r\\n- create an empty group with this delegation\\r\\n- monitor the group content and alert when the group modified\\r\\n- add administrators in this group only for a short period of time\",\"style\":\"info\"},\"conditionalVisibility\":{\"parameterName\":\"Help\",\"comparison\":\"isEqualTo\",\"value\":\"Yes\"},\"name\":\"SearchRBACHelp\"},{\"type\":3,\"content\":{\"version\":\"KqlItem/1.0\",\"query\":\"ExchangeConfiguration(SpecificSectionList=\\\"MRA\\\",SpecificConfigurationDate=\\\"{DateOfConfiguration:value}\\\",SpecificConfigurationEnv={EnvironmentList},Target = \\\"Online\\\")\\r\\n| where CmdletResultValue.Role contains \\\"export\\\" and CmdletResultValue.Name !contains \\\"Deleg\\\"\\r\\n| extend RoleAssigneeName = tostring(CmdletResultValue.RoleAssigneeName)\\r\\n| extend RoleAssigneeType = iff(CmdletResultValue.RoleAssigneeType== \\\"User\\\" , \\\"User\\\", \\\"RoleGroup\\\")\\r\\n| extend CustomRecipientWriteScope = tostring(CmdletResultValue.CustomRecipientWriteScope)\\r\\n| extend CustomConfigWriteScope = tostring(CmdletResultValue.CustomConfigWriteScope)\\r\\n| extend CustomResourceScope = tostring(CmdletResultValue.CustomResourceScope)\\r\\n| extend RecipientWriteScope = CmdletResultValue.RecipientWriteScope\\r\\n| extend ConfigWriteScope = CmdletResultValue.ConfigWriteScope\\r\\n| extend ManagementRoleAssignement = tostring(CmdletResultValue.Name)\\r\\n| extend Status= tostring(CmdletResultValue.Enabled)\\r\\n| extend RoleAssigneeName = iff( RoleAssigneeType == \\\"User\\\", strcat(\\\"🧑‍🦰 \\\",RoleAssigneeName), strcat(\\\"👪 \\\", RoleAssigneeName) )\\r\\n| project RoleAssigneeName, RoleAssigneeType, Status,CustomRecipientWriteScope,CustomConfigWriteScope,CustomResourceScope,RecipientWriteScope,ConfigWriteScope,ManagementRoleAssignement,WhenChanged,WhenCreated\",\"size\":3,\"showAnalytics\":true,\"showExportToExcel\":true,\"queryType\":0,\"resourceType\":\"microsoft.operationalinsights/workspaces\",\"gridSettings\":{\"rowLimit\":10000,\"filter\":true,\"sortBy\":[{\"itemKey\":\"ConfigWriteScope\",\"sortOrder\":1}]},\"sortBy\":[{\"itemKey\":\"ConfigWriteScope\",\"sortOrder\":1}]},\"name\":\"query - 1\",\"styleSettings\":{\"showBorder\":true}}]},\"name\":\"Mailbox Import Export Role\"},{\"type\":12,\"content\":{\"version\":\"NotebookGroup/1.0\",\"groupType\":\"editable\",\"title\":\"Mailbox Search Role\",\"items\":[{\"type\":1,\"content\":{\"json\":\"This delegation allows to search inside all or in a scope of mailboxes and export the result in PST.\\r\\nExcluded from the result as default configuration :\\r\\nDelegating delegation to Organization Management\\r\\nExchange Online-ApplicationAccount\\r\\nDiscovery Management has been excluded\\r\\n\"},\"name\":\"text - 0\"},{\"type\":1,\"content\":{\"json\":\"**Mailbox Search** is an RBAC role that allows an account to search in any mailbox and export the results to a PST.\\r\\n\\r\\n⚡ This role is very powerfull.\\r\\n\\r\\nBy default, this role is only delegated to the group Discovery Management. The members of the group Organization Management do not have this role but are able to delegate it.\\r\\n\\r\\nℹ️ Recommendations\\r\\n\\r\\nIf you temporarily need this delegation, consider the following:\\r\\n\\r\\n- add the administrators in the Discovery Management group\\r\\n- monitor the group content and alert when the group modified\\r\\n- add administrators in this group only for a short period of time\",\"style\":\"info\"},\"conditionalVisibility\":{\"parameterName\":\"Help\",\"comparison\":\"isEqualTo\",\"value\":\"Yes\"},\"name\":\"SearchRBACHelp\"},{\"type\":3,\"content\":{\"version\":\"KqlItem/1.0\",\"query\":\"ExchangeConfiguration(SpecificSectionList=\\\"MRA\\\",SpecificConfigurationDate=\\\"{DateOfConfiguration:value}\\\",SpecificConfigurationEnv={EnvironmentList},Target = \\\"Online\\\")\\r\\n| where CmdletResultValue.Role contains \\\"search\\\" and CmdletResultValue.Name !contains \\\"Deleg\\\"\\r\\n| where CmdletResultValue.RoleAssigneeName != \\\"Exchange Online-ApplicationAccount\\\" and CmdletResultValue.RoleAssigneeName != \\\"Discovery Management\\\"\\r\\n| extend RoleAssigneeName = tostring(CmdletResultValue.RoleAssigneeName)\\r\\n| extend RoleAssigneeType = iff(CmdletResultValue.RoleAssigneeType== \\\"User\\\" , \\\"User\\\", \\\"Group\\\")\\r\\n| extend CustomRecipientWriteScope = tostring(CmdletResultValue.CustomRecipientWriteScope)\\r\\n| extend CustomConfigWriteScope = tostring(CmdletResultValue.CustomConfigWriteScope)\\r\\n| extend CustomResourceScope = tostring(CmdletResultValue.CustomResourceScope)\\r\\n| extend RecipientWriteScope = CmdletResultValue.RecipientWriteScope\\r\\n| extend ConfigWriteScope = CmdletResultValue.ConfigWriteScope\\r\\n| extend ManagementRoleAssignement = tostring(CmdletResultValue.Name)\\r\\n| extend Status= tostring(CmdletResultValue.Enabled)\\r\\n| extend RoleAssigneeName = iff( RoleAssigneeType == \\\"User\\\", strcat(\\\"🧑‍🦰 \\\",RoleAssigneeName), strcat(\\\"👪 \\\", RoleAssigneeName) )\\r\\n| project RoleAssigneeName, RoleAssigneeType, Status,CustomRecipientWriteScope,CustomConfigWriteScope,CustomResourceScope,RecipientWriteScope,ConfigWriteScope,ManagementRoleAssignement,WhenChanged,WhenCreated\",\"size\":3,\"showAnalytics\":true,\"showExportToExcel\":true,\"queryType\":0,\"resourceType\":\"microsoft.operationalinsights/workspaces\",\"gridSettings\":{\"rowLimit\":10000,\"filter\":true,\"sortBy\":[{\"itemKey\":\"ConfigWriteScope\",\"sortOrder\":1}]},\"sortBy\":[{\"itemKey\":\"ConfigWriteScope\",\"sortOrder\":1}]},\"name\":\"query - 1\",\"styleSettings\":{\"showBorder\":true}}]},\"name\":\"Mailbox Search Role\"}]},\"conditionalVisibility\":{\"parameterName\":\"selected\",\"comparison\":\"isEqualTo\",\"value\":\"Delegation\"},\"name\":\"Importantsecurityconfiguration\"},{\"type\":12,\"content\":{\"version\":\"NotebookGroup/1.0\",\"groupType\":\"editable\",\"title\":\"Exchange and AD GRoup\",\"items\":[{\"type\":12,\"content\":{\"version\":\"NotebookGroup/1.0\",\"groupType\":\"editable\",\"title\":\"Exchange group\",\"items\":[{\"type\":1,\"content\":{\"json\":\"ℹ️ Recommendations\\r\\n\\r\\n- Ensure that no service account are a member of the high privilege groups. Use RBAC to delegate the exact required permissions.\\r\\n- Limit the usage of nested group for administration.\\r\\n- Ensure that accounts are given only the required pernissions to execute their tasks.\\r\\n- Use just in time administration principle by adding users in a group only when they need the permissions, then remove them when their operation is over.\\r\\n- Limit the number of Organization management members. When you review the Admin Audit logs you might see that the administrators rarely needed Organization Management privileges.\\r\\n- Monitor the content of the following groups:\\r\\n - TenantAdmins_-xxx (Membership in this role group is synchronized across services and managed centrally)\\r\\n - Organization Management\\r\\n - ExchangeServiceAdmins_-xxx (Membership in this role group is synchronized across services and managed centrally)\\r\\n - Recipient Management (Member of this group have at least the following rights : set-mailbox, Add-MailboxPermission)\\r\\n - Discovery Management\\r\\n - Hygiene Management\\r\\n - Security Administrator (Membership in this role group is synchronized across services and managed centrally)\\r\\n - xxx High privilege group (not an exhaustive list)\\r\\n - Compliance Management\\r\\n - All RBAC groups that have high roles delegation\\r\\n - All nested groups in high privileges groups\\r\\n - Note that this is not a complete list. The content of all the groups that have high privileges should be monitored.\\r\\n- Each time a new RBAC group is created, decide if the content of this groups should be monitored\\r\\n- Periodically review the members of the groups\",\"style\":\"info\"},\"conditionalVisibility\":{\"parameterName\":\"Help\",\"comparison\":\"isEqualTo\",\"value\":\"Yes\"},\"name\":\"text - 0\"},{\"type\":12,\"content\":{\"version\":\"NotebookGroup/1.0\",\"groupType\":\"editable\",\"title\":\"To groups - Number of direct members per group with RecipientType User\",\"items\":[{\"type\":3,\"content\":{\"version\":\"KqlItem/1.0\",\"query\":\"ExchangeConfiguration(SpecificSectionList=\\\"RoleGroupMember\\\",SpecificConfigurationDate=\\\"{DateOfConfiguration:value}\\\",SpecificConfigurationEnv={EnvironmentList},Target = \\\"Online\\\")\\r\\n| project CmdletResultValue\\r\\n//| where CmdletResultValue.RecipientType !contains \\\"group\\\"\\r\\n| extend Members= tostring(CmdletResultValue.Identity)\\r\\n| summarize dcount(tostring(Members)) by RoleGroup = tostring(CmdletResultValue.RoleGroup)\\r\\n| where RoleGroup has_any (\\\"TenantAdmins\\\",\\\"Organization Management\\\", \\\"Discovery Management\\\", \\\"Compliance Management\\\", \\\"Server Management\\\", \\\"ExchangeServiceAdmins\\\",\\\"Security Administrator\\\", \\\"SecurityAdmins\\\", \\\"Recipient Manangement\\\", \\\"Records Manangement\\\",\\\"Impersonation\\\",\\\"Export\\\")\\r\\n| sort by dcount_Members\\r\\n\",\"size\":3,\"queryType\":0,\"resourceType\":\"microsoft.operationalinsights/workspaces\",\"visualization\":\"tiles\",\"tileSettings\":{\"titleContent\":{\"columnMatch\":\"RoleGroup\",\"formatter\":1},\"leftContent\":{\"columnMatch\":\"dcount_Members\",\"formatter\":12,\"formatOptions\":{\"palette\":\"auto\"}},\"showBorder\":true,\"sortCriteriaField\":\"dcount_Members\",\"sortOrderField\":2,\"size\":\"auto\"}},\"name\":\"query - 0\"}]},\"name\":\"ExchangeGroupsList\"},{\"type\":12,\"content\":{\"version\":\"NotebookGroup/1.0\",\"groupType\":\"editable\",\"title\":\"Number of direct members per group with RecipientType User\",\"expandable\":true,\"items\":[{\"type\":3,\"content\":{\"version\":\"KqlItem/1.0\",\"query\":\"ExchangeConfiguration(SpecificSectionList=\\\"RoleGroupMember\\\",SpecificConfigurationDate=\\\"{DateOfConfiguration:value}\\\",SpecificConfigurationEnv={EnvironmentList},Target = \\\"Online\\\")\\r\\n| project CmdletResultValue\\r\\n| where CmdletResultValue.RecipientType !contains \\\"group\\\"\\r\\n| extend Members= tostring(CmdletResultValue.Identity)\\r\\n| summarize dcount(tostring(Members)) by RoleGroup = tostring(CmdletResultValue.RoleGroup)\\r\\n| sort by dcount_Members\\r\\n\",\"size\":3,\"queryType\":0,\"resourceType\":\"microsoft.operationalinsights/workspaces\",\"visualization\":\"tiles\",\"tileSettings\":{\"titleContent\":{\"columnMatch\":\"RoleGroup\",\"formatter\":1},\"leftContent\":{\"columnMatch\":\"dcount_Members\",\"formatter\":12,\"formatOptions\":{\"palette\":\"auto\"}},\"showBorder\":true,\"sortCriteriaField\":\"dcount_Members\",\"sortOrderField\":2,\"size\":\"auto\"}},\"name\":\"query - 0\"}]},\"name\":\"ExchangeGroupsList - Copy\"},{\"type\":1,\"content\":{\"json\":\"Exchange groups content (Extract for the OU \\\"Microsoft Exchange Security Groups\\\").\\r\\nSelect a group to display detailed information of its contents.\\r\\nLevel attribute helps you understand the level of nested groups.\"},\"name\":\"text - 2\"},{\"type\":9,\"content\":{\"version\":\"KqlParameterItem/1.0\",\"parameters\":[{\"id\":\"b4b7a6ad-381a-48d6-9938-bf7cb812b474\",\"version\":\"KqlParameterItem/1.0\",\"name\":\"Group\",\"type\":2,\"query\":\"ExchangeConfiguration(SpecificSectionList=\\\"RoleGroup\\\",SpecificConfigurationDate=\\\"{DateOfConfiguration:value}\\\",SpecificConfigurationEnv={EnvironmentList},Target = \\\"Online\\\")\\r\\n//| where CmdletResultValue.Parentgroup != \\\"Exchange Trusted Subsystem\\\"\\r\\n//| where CmdletResultValue.Parentgroup != \\\"Exchange Windows Permissions\\\"\\r\\n| project CmdletResultValue\\r\\n| extend GroupName = tostring(CmdletResultValue.Name)\\r\\n| distinct GroupName\\r\\n| sort by GroupName asc\\r\\n\",\"typeSettings\":{\"showDefault\":false},\"queryType\":0,\"resourceType\":\"microsoft.operationalinsights/workspaces\"}],\"style\":\"pills\",\"queryType\":0,\"resourceType\":\"microsoft.operationalinsights/workspaces\"},\"name\":\"parameters - 3\"},{\"type\":3,\"content\":{\"version\":\"KqlItem/1.0\",\"query\":\"//ExchangeConfiguration(SpecificSectionList=\\\"ExGroup\\\",SpecificConfigurationDate=\\\"{DateOfConfiguration:value}\\\",SpecificConfigurationEnv={EnvironmentList},Target = \\\"Online\\\")\\r\\nExchangeConfiguration(SpecificSectionList=\\\"RoleGroupMember\\\",SpecificConfigurationDate=\\\"{DateOfConfiguration:value}\\\",SpecificConfigurationEnv={EnvironmentList},Target = \\\"Online\\\")\\r\\n| search CmdletResultValue.RoleGroup == \\\"{Group}\\\"\\r\\n//| where CmdletResultValue.Level != 0\\r\\n| project CmdletResultValue\\r\\n| extend Members = tostring(CmdletResultValue.Identity)\\r\\n//| extend Parentgroup = tostring(CmdletResultValue.Parentgroup)\\r\\n//| extend MemberPath = tostring(CmdletResultValue.MemberPath)\\r\\n//| extend Level = tostring(CmdletResultValue.Level)\\r\\n//| extend ObjectClass = tostring(CmdletResultValue.ObjectClass)\\r\\n//| extend LastLogon = CmdletResultValue.LastLogonString\\r\\n//| extend LastLogon = iif ( todatetime (CmdletResultValue.LastLogonString) < ago(-366d), CmdletResultValue.LastLogonString,strcat(\\\"💥\\\",CmdletResultValue.LastLogonString))\\r\\n//| extend LastPwdSet = CmdletResultValue.LastPwdSetString\\r\\n//| extend Enabled = tostring(CmdletResultValue.Enabled)\\r\\n| extend Members = case( CmdletResultValue.RecipientType == \\\"Group\\\", strcat( \\\"👪 \\\", Members), strcat( \\\"🧑‍🦰 \\\", Members) )\\r\\n| extend RecipientType = tostring(CmdletResultValue.RecipientType)\",\"size\":3,\"showAnalytics\":true,\"showExportToExcel\":true,\"queryType\":0,\"resourceType\":\"microsoft.operationalinsights/workspaces\",\"gridSettings\":{\"formatters\":[{\"columnMatch\":\"CmdletResultValue\",\"formatter\":5}],\"rowLimit\":10000,\"filter\":true}},\"name\":\"ExchangeServersGroupsGrid\",\"styleSettings\":{\"showBorder\":true}}]},\"name\":\"Exchange group\"}]},\"conditionalVisibility\":{\"parameterName\":\"selected\",\"comparison\":\"isEqualTo\",\"value\":\"ExchAD\"},\"name\":\"Exchange and AD GRoup\"},{\"type\":12,\"content\":{\"version\":\"NotebookGroup/1.0\",\"groupType\":\"editable\",\"title\":\"Transport Security configuration\",\"items\":[{\"type\":12,\"content\":{\"version\":\"NotebookGroup/1.0\",\"groupType\":\"editable\",\"title\":\"Inbound Connector configuration\",\"items\":[{\"type\":1,\"content\":{\"json\":\"This section shows the configuration of the Inbound connnectors\",\"style\":\"info\"},\"conditionalVisibility\":{\"parameterName\":\"Help\",\"comparison\":\"isEqualTo\",\"value\":\"Yes\"},\"name\":\"TransportRulesHelp\"},{\"type\":3,\"content\":{\"version\":\"KqlItem/1.0\",\"query\":\"ExchangeConfiguration(SpecificSectionList=\\\"InBoundC\\\",SpecificConfigurationDate=\\\"{DateOfConfiguration:value}\\\",SpecificConfigurationEnv={EnvironmentList},Target = \\\"Online\\\")\\r\\n| project CmdletResultValue\\r\\n| extend Name = tostring(CmdletResultValue.Name)\\r\\n| extend State = tostring(CmdletResultValue.Enabled)\\r\\n| extend ConnectorType = tostring(CmdletResultValue.ConnectorType)\\r\\n| extend ConnectorSource = tostring(CmdletResultValue.ConnectorSource)\\r\\n| extend SenderIPAddresses = tostring(CmdletResultValue.SenderIPAddresses)\\r\\n| extend SenderDomains = tostring(CmdletResultValue.SenderDomains)\\r\\n| extend TrustedOrganizations = tostring(CmdletResultValue.TrustedOrganizations)\\r\\n| extend AssociatedAcceptedDomainsRequireTls = tostring(CmdletResultValue.AssociatedAcceptedDomainsRequireTls)\\r\\n| extend RestrictDomainsToIPAddresses = tostring(CmdletResultValue.RestrictDomainsToIPAddresses)\\r\\n| extend RestrictDomainsToCertificate = tostring(CmdletResultValue.RestrictDomainsToCertificate)\\r\\n| extend CloudServicesMailEnabled = tostring(CmdletResultValue.CloudServicesMailEnabled)\\r\\n| extend TreatMessagesAsInternal = tostring(CmdletResultValue.TreatMessagesAsInternal)\\r\\n| extend TlsSenderCertificateName = tostring(CmdletResultValue.TlsSenderCertificateName)\\r\\n| extend ScanAndDropRecipients = tostring(CmdletResultValue.ScanAndDropRecipients)\\r\\n| extend Comment = tostring(CmdletResultValue.Comment)\\r\\n| extend WhenChanged = tostring(CmdletResultValue.WhenChanged)\\r\\n| extend WhenCreated = tostring(CmdletResultValue.WhenCreated)\\r\\n| project-away CmdletResultValue\\r\\n| sort by Name asc\",\"size\":3,\"showAnalytics\":true,\"showExportToExcel\":true,\"queryType\":0,\"resourceType\":\"microsoft.operationalinsights/workspaces\"},\"name\":\"query - 1\",\"styleSettings\":{\"showBorder\":true}}]},\"name\":\"Inbound Connector configuration\"},{\"type\":12,\"content\":{\"version\":\"NotebookGroup/1.0\",\"groupType\":\"editable\",\"title\":\"Outbound Connector configuration\",\"items\":[{\"type\":1,\"content\":{\"json\":\"This section shows the configuration of the Outbound connnectors\",\"style\":\"info\"},\"conditionalVisibility\":{\"parameterName\":\"Help\",\"comparison\":\"isEqualTo\",\"value\":\"Yes\"},\"name\":\"TransportRulesHelp\"},{\"type\":3,\"content\":{\"version\":\"KqlItem/1.0\",\"query\":\"ExchangeConfiguration(SpecificSectionList=\\\"OutBoundC\\\",SpecificConfigurationDate=\\\"{DateOfConfiguration:value}\\\",SpecificConfigurationEnv={EnvironmentList},Target = \\\"Online\\\")\\r\\n| project CmdletResultValue\\r\\n| extend Name = tostring(CmdletResultValue.Name)\\r\\n| extend State = tostring(CmdletResultValue.Enabled)\\r\\n| extend UseMXRecord = tostring(CmdletResultValue.UseMXRecord)\\r\\n| extend ConnectorType = tostring(CmdletResultValue.ConnectorType)\\r\\n| extend ConnectorSource = tostring(CmdletResultValue.ConnectorSource)\\r\\n| extend RecipientDomains = tostring(CmdletResultValue.RecipientDomains)\\r\\n| extend SmartHosts = tostring(CmdletResultValue.SmartHosts)\\r\\n| extend TlsDomain = tostring(CmdletResultValue.TlsDomain)\\r\\n| extend TlsSettings = tostring(CmdletResultValue.TlsSettings)\\r\\n| extend IsTransportRuleScoped = tostring(CmdletResultValue.IsTransportRuleScoped)\\r\\n| extend RouteAllMessagesViaOnPremises = tostring(CmdletResultValue.RouteAllMessagesViaOnPremises)\\r\\n| extend CloudServicesMailEnabled = tostring(CmdletResultValue.CloudServicesMailEnabled)\\r\\n| extend AllAcceptedDomains = tostring(CmdletResultValue.AllAcceptedDomains)\\r\\n| extend SenderRewritingEnabled = tostring(CmdletResultValue.SenderRewritingEnabled)\\r\\n| extend TestMode = tostring(CmdletResultValue.TestMode)\\r\\n| extend LinkForModifiedConnector = tostring(CmdletResultValue.LinkForModifiedConnector)\\r\\n| extend ValidationRecipients = tostring(CmdletResultValue.ValidationRecipients)\\r\\n| extend IsValidated = tostring(CmdletResultValue.IsValidated)\\r\\n| extend LastValidationTimestamp = tostring(CmdletResultValue.LastValidationTimestamp)\\r\\n| extend Comment = tostring(CmdletResultValue.Comment)\\r\\n| extend WhenChanged = tostring(CmdletResultValue.WhenChanged)\\r\\n| extend WhenCreated = tostring(CmdletResultValue.WhenCreated)\\r\\n| project-away CmdletResultValue\\r\\n| sort by Name asc\",\"size\":3,\"showAnalytics\":true,\"showExportToExcel\":true,\"queryType\":0,\"resourceType\":\"microsoft.operationalinsights/workspaces\"},\"name\":\"query - 1\",\"styleSettings\":{\"showBorder\":true}}]},\"name\":\"Outbound Connector configuration - Copy\"},{\"type\":12,\"content\":{\"version\":\"NotebookGroup/1.0\",\"groupType\":\"editable\",\"title\":\"Transport Rules with specific actions to monitor\",\"items\":[{\"type\":1,\"content\":{\"json\":\"A common way used by attackers to exfiltrate data is to set Transport Rules that send all or sensitive messages outside the organization or to a mailbox where they already have full control.\\r\\n\\r\\nThis section shows your Transport rules with sentitive actions that can lead to data leaks:\\r\\n- BlindCopyTo\\r\\n- SentTo\\r\\n- CopyTo\",\"style\":\"info\"},\"conditionalVisibility\":{\"parameterName\":\"Help\",\"comparison\":\"isEqualTo\",\"value\":\"Yes\"},\"name\":\"TransportRulesHelp\"},{\"type\":3,\"content\":{\"version\":\"KqlItem/1.0\",\"query\":\"ExchangeConfiguration(SpecificSectionList=\\\"TransportRule\\\",SpecificConfigurationDate=\\\"{DateOfConfiguration:value}\\\",SpecificConfigurationEnv={EnvironmentList},Target = \\\"Online\\\")\\r\\n| project CmdletResultValue\\r\\n| extend Identity = iif( CmdletResultValue.Identity contains \\\"OrgHierarchyToIgnore\\\",tostring(CmdletResultValue.Identity.Name),tostring(CmdletResultValue.Identity))\\r\\n| extend State = tostring(CmdletResultValue.State)\\r\\n| extend SentTo = tostring(CmdletResultValue.SentToString)\\r\\n| extend BlindCopyTo = tostring(CmdletResultValue.BlindCopyToString)\\r\\n| extend CopyTo = tostring(CmdletResultValue.CopyToString)\\r\\n| extend RedirectMessageTo = tostring(CmdletResultValue.RedirectMessageToString)\\r\\n| extend Mode = tostring(CmdletResultValue.Identity.Mode)\\r\\n| project-away CmdletResultValue\\r\\n| sort by Identity asc\",\"size\":1,\"showAnalytics\":true,\"showExportToExcel\":true,\"queryType\":0,\"resourceType\":\"microsoft.operationalinsights/workspaces\"},\"name\":\"query - 1\",\"styleSettings\":{\"showBorder\":true}}]},\"name\":\"Transport Rules actions to monitor\"},{\"type\":12,\"content\":{\"version\":\"NotebookGroup/1.0\",\"groupType\":\"editable\",\"title\":\"Remote Domain Autofoward Configuration - * should not allow AutoForwardEnabled\",\"items\":[{\"type\":1,\"content\":{\"json\":\"If **AutoForwardEnabled** is set to True for an SMTP domain, then users in Outlook are allowed to set automatic transfer of all their emails to addresses in this domain.\\r\\n\\r\\nWhen the Default Remote domain is set to * and has the AutoForwardEnabled set True, any user can configure an Outlook rule to automatically forward all emails to any SMTP domain domains outside the organization. This is a high risk configuration as it might allow accounts to leak information. \\r\\n\\r\\nAlso, when setting AutoForwardEnabled to a specific domain, it is strongly recommended enable TLS encryption.\",\"style\":\"info\"},\"conditionalVisibility\":{\"parameterName\":\"Help\",\"comparison\":\"isEqualTo\",\"value\":\"Yes\"},\"name\":\"AutoForwardHelp\"},{\"type\":3,\"content\":{\"version\":\"KqlItem/1.0\",\"query\":\"ExchangeConfiguration(SpecificSectionList=\\\"RemoteDomain\\\",SpecificConfigurationDate=\\\"{DateOfConfiguration:value}\\\",SpecificConfigurationEnv={EnvironmentList},Target = \\\"Online\\\")\\r\\n| project CmdletResultValue\\r\\n| extend Name = tostring(CmdletResultValue.Name)\\r\\n| extend Address = tostring(CmdletResultValue.DomainName)\\r\\n| extend AutoForwardEnabled = iff (CmdletResultValue.AutoForwardEnabled== \\\"true\\\" and CmdletResultValue.DomainName == \\\"*\\\", strcat (\\\"❌ \\\",tostring(CmdletResultValue.AutoForwardEnabled)),iff(CmdletResultValue.AutoForwardEnabled== \\\"true\\\" and CmdletResultValue.DomainName != \\\"*\\\", strcat (\\\"⚠️ \\\",tostring(CmdletResultValue.AutoForwardEnabled)),strcat (\\\"✅ \\\",tostring(CmdletResultValue.AutoForwardEnabled))))\\r\\n| project-away CmdletResultValue\\r\\n| sort by Address asc \",\"size\":1,\"showAnalytics\":true,\"showExportToExcel\":true,\"queryType\":0,\"resourceType\":\"microsoft.operationalinsights/workspaces\",\"gridSettings\":{\"rowLimit\":10000,\"filter\":true}},\"name\":\"query - 1\",\"styleSettings\":{\"showBorder\":true}}]},\"name\":\"ForwardGroup\"}]},\"conditionalVisibility\":{\"parameterName\":\"selected\",\"comparison\":\"isEqualTo\",\"value\":\"Transport\"},\"name\":\"Transport Security configuration\"}],\"fromTemplateId\":\"sentinel-MicrosoftExchangeSecurityReview-Online\",\"$schema\":\"https://github.com/Microsoft/Application-Insights-Workbooks/blob/master/schema/workbook.json\"}\r\n", + "serializedData": "{\"version\":\"Notebook/1.0\",\"items\":[{\"type\":1,\"content\":{\"json\":\"# Microsoft Exchange Security Review Online\"},\"name\":\"text - 2\"},{\"type\":9,\"content\":{\"version\":\"KqlParameterItem/1.0\",\"parameters\":[{\"id\":\"9ae328d6-99c8-4c44-8d59-42ca4d999098\",\"version\":\"KqlParameterItem/1.0\",\"name\":\"EnvironmentList\",\"label\":\"Environment\",\"type\":2,\"isRequired\":true,\"multiSelect\":true,\"quote\":\"'\",\"delimiter\":\",\",\"query\":\"ExchangeEnvironmentList(Target=\\\"Online\\\") | where ESIEnvironment != \\\"\\\"\",\"typeSettings\":{\"limitSelectTo\":1,\"showDefault\":false},\"queryType\":0,\"resourceType\":\"microsoft.operationalinsights/workspaces\",\"value\":[\"ITSY\"]},{\"id\":\"a88b4e41-eb2f-41bf-92d8-27c83650a4b8\",\"version\":\"KqlParameterItem/1.0\",\"name\":\"DateOfConfiguration\",\"label\":\"Collection time\",\"type\":2,\"isRequired\":true,\"query\":\"let _configurationEnv = split(iff(isnull({EnvironmentList}) or isempty({EnvironmentList}) or tolower({EnvironmentList}) == \\\"all\\\",\\\"All\\\",tostring({EnvironmentList})),',');\\r\\nESIExchangeOnlineConfig_CL\\r\\n| extend ScopedEnvironment = iff(_configurationEnv contains \\\"All\\\", \\\"All\\\",ESIEnvironment_s) \\r\\n| where ScopedEnvironment in (_configurationEnv)\\r\\n| extend Collection = format_datetime(todatetime(EntryDate_s), 'yyyy-MM-dd')\\r\\n| summarize Collection = max(Collection)\\r\\n| project Collection = \\\"lastdate\\\", Selected = true\\r\\n| join kind= fullouter ( ESIExchangeOnlineConfig_CL | extend ScopedEnvironment = iff(_configurationEnv contains \\\"All\\\", \\\"All\\\",ESIEnvironment_s) \\r\\n| where ScopedEnvironment in (_configurationEnv)\\r\\n| where TimeGenerated > ago(90d)\\r\\n| extend Collection = format_datetime(todatetime(EntryDate_s), 'yyyy-MM-dd')\\r\\n| summarize by Collection\\r\\n) on Collection\\r\\n| project Value = iif(Selected,Collection,Collection1), Label = iif(Selected,\\\"Last Known date\\\",Collection1), Selected\\r\\n| sort by Selected, Value desc\",\"typeSettings\":{\"showDefault\":false},\"queryType\":0,\"resourceType\":\"microsoft.operationalinsights/workspaces\"},{\"id\":\"8ac96eb3-918b-4a36-bcc4-df50d8f46175\",\"version\":\"KqlParameterItem/1.0\",\"name\":\"Help\",\"label\":\"Show Help\",\"type\":10,\"isRequired\":true,\"query\":\"{\\\"version\\\":\\\"1.0.0\\\",\\\"content\\\":\\\"[\\\\r\\\\n { \\\\\\\"value\\\\\\\": \\\\\\\"Yes\\\\\\\", \\\\\\\"label\\\\\\\": \\\\\\\"Yes\\\\\\\"},\\\\r\\\\n {\\\\\\\"value\\\\\\\": \\\\\\\"No\\\\\\\", \\\\\\\"label\\\\\\\": \\\\\\\"No\\\\\\\", \\\\\\\"selected\\\\\\\":true }\\\\r\\\\n]\\\\r\\\\n\\\"}\",\"timeContext\":{\"durationMs\":2592000000},\"queryType\":8}],\"style\":\"above\",\"queryType\":0,\"resourceType\":\"microsoft.operationalinsights/workspaces\"},\"name\":\"TimeRange\"},{\"type\":1,\"content\":{\"json\":\"This workbook helps review your Exchange Security configuration.\\r\\nAdjust the time range, and when needed select an item in the dropdownlist\",\"style\":\"info\"},\"name\":\"text - 9\"},{\"type\":11,\"content\":{\"version\":\"LinkItem/1.0\",\"style\":\"tabs\",\"links\":[{\"id\":\"34188faf-7a02-4697-9b36-2afa986afc0f\",\"cellValue\":\"selected\",\"linkTarget\":\"parameter\",\"linkLabel\":\"Mailbox Access\",\"subTarget\":\"Delegation\",\"postText\":\"t\",\"style\":\"link\",\"icon\":\"3\",\"linkIsContextBlade\":true},{\"id\":\"be02c735-6150-4b6e-a386-b2b023e754e5\",\"cellValue\":\"selected\",\"linkTarget\":\"parameter\",\"linkLabel\":\"EXO & Azure AD Groups\",\"subTarget\":\"ExchAD\",\"style\":\"link\"},{\"id\":\"26c68d90-925b-4c3c-a837-e3cecd489b2d\",\"cellValue\":\"selected\",\"linkTarget\":\"parameter\",\"linkLabel\":\"Transport Configuration\",\"subTarget\":\"Transport\",\"style\":\"link\"},{\"id\":\"eb2888ca-7fa6-4e82-88db-1bb3663a801e\",\"cellValue\":\"selected\",\"linkTarget\":\"parameter\",\"linkLabel\":\"Workbook Help\",\"subTarget\":\"Start\",\"style\":\"link\"}]},\"name\":\"TopMenuTabs\"},{\"type\":12,\"content\":{\"version\":\"NotebookGroup/1.0\",\"groupType\":\"editable\",\"items\":[{\"type\":1,\"content\":{\"json\":\"# Workbook goals\\r\\n\\r\\nThe goal of this workbook is to outline key security configurations of your Exchange on-premises environment.\\r\\n\\r\\nMost of Exchange organizations have were installed years ago (sometimes more than 10 years). Many configurations have been done and might not have been documented. For most environments, the core commitment was maintaining a high availability of the users’ mailboxes putting aside other consideration (even security considerations). Recommended security practices have also evolved since the first released and a regular review is necessary.\\r\\n\\r\\nThis workbook is designed to show your Exchange organization is configured with a security point of view. Indeed, some configurations easy to display as there are no UI available.\\r\\n\\r\\nFor each configuration, you will find explanations and recommendations when applicable.\\r\\n\\r\\n- This workbook does not pretend to show you every weak Security configurations, but the most common issues and known to be used by attackers. \\r\\n- It will not show you if you have been comprised, but will help you identify unexpected configuration.\\r\\n\\r\\n----\\r\\n\\r\\n## Quick reminder of how Exchange works\\r\\n\\r\\nDuring Exchange installation two very important groups are created :\\r\\n- Exchange Trusted Subsystem : Contain all the computer accounts for Exchange Server\\r\\n- Exchange Windows Permissions : Contain the group Exchange trusted Subsystem\\r\\n\\r\\nThese groups have :\\r\\n- Very high privileges in ALL AD domains including the root domain\\r\\n- Right on any Exchange including mailboxes\\r\\n\\r\\nAs each Exchange server computer account is member of Exchange Trusted Subsystem, it means by taking control of the computer account or being System on an Exchange server you will gain access to all the permissions granted to Exchange Trusted Subsystem and Exchange Windows Permissions.\\r\\n\\r\\nTo protect AD and Exchange, it is very important to ensure the following:\\r\\n- There is a very limited number of persons that are local Administrator on Exchange server\\r\\n- To protect user right like : Act part of the operating System, Debug\\r\\n\\r\\nEvery service account or application that have high privileges on Exchange need to be considered as sensitive\\r\\n\\r\\n** 💡 Exchange servers need to be considered as very sensitive servers**\\r\\n\\r\\n-----\\r\\n\\r\\n\\r\\n## Tabs\\r\\n\\r\\n### Mailbox Access\\r\\n\\r\\nThis tab will show you several top sensitive delegations that allow an account to access, modify, act as another user, search, export the content of a mailbox.\\r\\n\\r\\n### Exchange & AD Groups\\r\\n\\r\\nThis tab will show you the members of Exchange groups and Sensitive AD groups.\\r\\n\\r\\n### Local Administrators\\r\\n\\r\\nThis tab will show you the non standard content of the local Administrators group. Remember that a member of the local Administrators group can take control of the computer account of the server and then it will have all the permissions associated with Exchange Trusted Subsytem and Exchange Windows Permissions\\r\\n\\r\\nThe information is displayed with different views : \\r\\n- List of nonstandard users\\r\\n- Number of servers with a nonstandard a user\\r\\n- Nonstandard groups content\\r\\n- For each user important information are displayed like last logon, last password set, enabled\\r\\n\\r\\n### Exchange Security configuration\\r\\n\\r\\nThis tab will show you some important configuration for your Exchange Organization\\r\\n- Status of Admin Audit Log configuration\\r\\n- Status of POP and IMAP configuration : especially, is Plaintext Authentication configured ?\\r\\n- Nonstandard permissions on the Exchange container in the Configuration Partition\\r\\n\\r\\n### Transport Configuration\\r\\n\\r\\nThis tab will show you the configuration of the main Transport components\\r\\n- Receive Connectors configured with Anonymous and/or Open Relay\\r\\n- Remote Domain Autoforward configuration\\r\\n- Transport Rules configured with BlindCopyTo, SendTo, RedirectTo\\r\\n- Journal Rule and Journal Recipient configurations\\r\\n- Accepted Domains with *\\r\\n\\r\\n\"},\"name\":\"WorkbookInfo\"}]},\"conditionalVisibility\":{\"parameterName\":\"selected\",\"comparison\":\"isEqualTo\",\"value\":\"Start\"},\"name\":\"InformationTab\"},{\"type\":12,\"content\":{\"version\":\"NotebookGroup/1.0\",\"groupType\":\"editable\",\"title\":\"Display important security configurations that allow to mailboxes content (direct delegation on mailboxes are not listed (Full Access mailboxes or direct delegation on mailboxes folders)\",\"items\":[{\"type\":3,\"content\":{\"version\":\"KqlItem/1.0\",\"query\":\"ExchangeConfiguration(SpecificSectionList=\\\"MRA\\\",SpecificConfigurationDate=\\\"{DateOfConfiguration:value}\\\",SpecificConfigurationEnv={EnvironmentList},Target = \\\"Online\\\")\\r\\n| where CmdletResultValue.Name !contains \\\"Deleg\\\" and CmdletResultValue.RoleAssigneeName != \\\"Hygiene Management\\\" and CmdletResultValue.RoleAssigneeName != \\\"Exchange Online-ApplicationAccount\\\" and CmdletResultValue.RoleAssigneeName != \\\"Discovery Management\\\" and CmdletResultValue.RoleAssigneeName !contains \\\"RIM-MailboxAdmins\\\"\\r\\n| where CmdletResultValue.Role contains \\\"Export\\\" or CmdletResultValue.Role contains \\\"Impersonation\\\" or CmdletResultValue.Role contains \\\"Search\\\"\\r\\n| summarize dcount(tostring(CmdletResultValue.RoleAssigneeName)) by role=tostring(CmdletResultValue.Role)\",\"size\":3,\"title\":\"Number of accounts with sensitive RBAC roles\",\"queryType\":0,\"resourceType\":\"microsoft.operationalinsights/workspaces\",\"visualization\":\"tiles\",\"tileSettings\":{\"titleContent\":{\"columnMatch\":\"role\",\"formatter\":1},\"leftContent\":{\"columnMatch\":\"dcount_CmdletResultValue_RoleAssigneeName\",\"formatter\":12,\"formatOptions\":{\"palette\":\"auto\"},\"numberFormat\":{\"unit\":17,\"options\":{\"style\":\"decimal\",\"maximumFractionDigits\":2,\"maximumSignificantDigits\":3}}},\"showBorder\":true,\"sortCriteriaField\":\"role\",\"sortOrderField\":1}},\"name\":\"MRAQuery\"},{\"type\":1,\"content\":{\"json\":\"**ApplicationImpersonation** is an RBAC role that allows access (read and modify) to the content of all mailboxes using EWS. This role is very powerfull and should be carefully delegated. When a delegation is necessary, RBAC scopes should be configured to limit the list of impacted mailboxes.\\r\\n\\r\\nIt is common to see service accounts for backup solution, antivirus software, MDM...\\r\\n\\r\\nNote that the default configuration to the group Hygiene Management is excluded. this group is a sensitive group. Remember to monitor the content of this group\",\"style\":\"info\"},\"conditionalVisibility\":{\"parameterName\":\"Help\",\"comparison\":\"isEqualTo\",\"value\":\"Yes\"},\"name\":\"SensitiveRBACHelp\"},{\"type\":12,\"content\":{\"version\":\"NotebookGroup/1.0\",\"groupType\":\"editable\",\"title\":\"Application Impersonation Role\",\"items\":[{\"type\":1,\"content\":{\"json\":\"This delegation allows the delegated account to access and modify the content of every mailboxes using EWS.\"},\"name\":\"text - 0\"},{\"type\":3,\"content\":{\"version\":\"KqlItem/1.0\",\"query\":\"ExchangeConfiguration(SpecificSectionList=\\\"MRA\\\",SpecificConfigurationDate=\\\"{DateOfConfiguration:value}\\\",SpecificConfigurationEnv={EnvironmentList},Target = \\\"Online\\\")\\r\\n| where CmdletResultValue.Role contains \\\"Impersonation\\\" and CmdletResultValue.RoleAssigneeName != \\\"Hygiene Management\\\" and CmdletResultValue.RoleAssigneeName !contains \\\"RIM-MailboxAdmins\\\" and CmdletResultValue.Name !contains \\\"Deleg\\\"\\r\\n| extend RoleAssigneeName = tostring(CmdletResultValue.RoleAssigneeName)\\r\\n| extend RoleAssigneeType = iff(CmdletResultValue.RoleAssigneeType== \\\"User\\\" , \\\"User\\\", \\\"RoleGroup\\\")\\r\\n| extend CustomRecipientWriteScope = tostring(CmdletResultValue.CustomRecipientWriteScope)\\r\\n| extend CustomConfigWriteScope = tostring(CmdletResultValue.CustomConfigWriteScope)\\r\\n| extend CustomResourceScope = tostring(CmdletResultValue.CustomResourceScope)\\r\\n| extend RecipientWriteScope = CmdletResultValue.RecipientWriteScope\\r\\n| extend ConfigWriteScope = CmdletResultValue.ConfigWriteScope\\r\\n| extend ManagementRoleAssignement = tostring(CmdletResultValue.Name)\\r\\n| extend Status= tostring(CmdletResultValue.Enabled)\\r\\n| extend RoleAssigneeName = iff( RoleAssigneeType == \\\"User\\\", strcat(\\\"🧑‍🦰 \\\",RoleAssigneeName), strcat(\\\"👪 \\\", RoleAssigneeName) )\\r\\n| project RoleAssigneeName, RoleAssigneeType, Status,CustomRecipientWriteScope,CustomConfigWriteScope,CustomResourceScope,RecipientWriteScope,ConfigWriteScope,ManagementRoleAssignement,WhenChanged,WhenCreated\",\"size\":3,\"showAnalytics\":true,\"showExportToExcel\":true,\"queryType\":0,\"resourceType\":\"microsoft.operationalinsights/workspaces\",\"gridSettings\":{\"rowLimit\":10000,\"filter\":true}},\"name\":\"query - 1\",\"styleSettings\":{\"showBorder\":true}}]},\"name\":\"Application Impersonation Role\"},{\"type\":12,\"content\":{\"version\":\"NotebookGroup/1.0\",\"groupType\":\"editable\",\"title\":\"Mailbox Import Export Role\",\"items\":[{\"type\":1,\"content\":{\"json\":\"This delegation allows to export the content all mailboxes in a scope in PST file.\\r\\nExcluded from the result as default configuration :\\r\\nDelegating delegation to Organization Management\\r\\n\"},\"name\":\"text - 0\"},{\"type\":1,\"content\":{\"json\":\"**Mailbox Import Export** is an RBAC role that allows an account to export the content of any maibox in a PST. It also allows search in all mailboxes.\\r\\n\\r\\n⚡ This role is very powerfull.\\r\\n\\r\\nBy default, this role is not delegated to any user or group. The members of the group Organization Management by default do not have this role but are able to delegate it.\\r\\n\\r\\nℹ️ Recommendations\\r\\n\\r\\nIf you temporarily need this delegation, consider the following:\\r\\n- create an empty group with this delegation\\r\\n- monitor the group content and alert when the group modified\\r\\n- add administrators in this group only for a short period of time\",\"style\":\"info\"},\"conditionalVisibility\":{\"parameterName\":\"Help\",\"comparison\":\"isEqualTo\",\"value\":\"Yes\"},\"name\":\"SearchRBACHelp\"},{\"type\":3,\"content\":{\"version\":\"KqlItem/1.0\",\"query\":\"ExchangeConfiguration(SpecificSectionList=\\\"MRA\\\",SpecificConfigurationDate=\\\"{DateOfConfiguration:value}\\\",SpecificConfigurationEnv={EnvironmentList},Target = \\\"Online\\\")\\r\\n| where CmdletResultValue.Role contains \\\"export\\\" and CmdletResultValue.Name !contains \\\"Deleg\\\"\\r\\n| extend RoleAssigneeName = tostring(CmdletResultValue.RoleAssigneeName)\\r\\n| extend RoleAssigneeType = iff(CmdletResultValue.RoleAssigneeType== \\\"User\\\" , \\\"User\\\", \\\"RoleGroup\\\")\\r\\n| extend CustomRecipientWriteScope = tostring(CmdletResultValue.CustomRecipientWriteScope)\\r\\n| extend CustomConfigWriteScope = tostring(CmdletResultValue.CustomConfigWriteScope)\\r\\n| extend CustomResourceScope = tostring(CmdletResultValue.CustomResourceScope)\\r\\n| extend RecipientWriteScope = CmdletResultValue.RecipientWriteScope\\r\\n| extend ConfigWriteScope = CmdletResultValue.ConfigWriteScope\\r\\n| extend ManagementRoleAssignement = tostring(CmdletResultValue.Name)\\r\\n| extend Status= tostring(CmdletResultValue.Enabled)\\r\\n| extend RoleAssigneeName = iff( RoleAssigneeType == \\\"User\\\", strcat(\\\"🧑‍🦰 \\\",RoleAssigneeName), strcat(\\\"👪 \\\", RoleAssigneeName) )\\r\\n| project RoleAssigneeName, RoleAssigneeType, Status,CustomRecipientWriteScope,CustomConfigWriteScope,CustomResourceScope,RecipientWriteScope,ConfigWriteScope,ManagementRoleAssignement,WhenChanged,WhenCreated\",\"size\":3,\"showAnalytics\":true,\"showExportToExcel\":true,\"queryType\":0,\"resourceType\":\"microsoft.operationalinsights/workspaces\",\"gridSettings\":{\"rowLimit\":10000,\"filter\":true,\"sortBy\":[{\"itemKey\":\"ConfigWriteScope\",\"sortOrder\":1}]},\"sortBy\":[{\"itemKey\":\"ConfigWriteScope\",\"sortOrder\":1}]},\"name\":\"query - 1\",\"styleSettings\":{\"showBorder\":true}}]},\"name\":\"Mailbox Import Export Role\"},{\"type\":12,\"content\":{\"version\":\"NotebookGroup/1.0\",\"groupType\":\"editable\",\"title\":\"Mailbox Search Role\",\"items\":[{\"type\":1,\"content\":{\"json\":\"This delegation allows to search inside all or in a scope of mailboxes and export the result in PST.\\r\\nExcluded from the result as default configuration :\\r\\nDelegating delegation to Organization Management\\r\\nExchange Online-ApplicationAccount\\r\\nDiscovery Management has been excluded\\r\\n\"},\"name\":\"text - 0\"},{\"type\":1,\"content\":{\"json\":\"**Mailbox Search** is an RBAC role that allows an account to search in any mailbox and export the results to a PST.\\r\\n\\r\\n⚡ This role is very powerfull.\\r\\n\\r\\nBy default, this role is only delegated to the group Discovery Management. The members of the group Organization Management do not have this role but are able to delegate it.\\r\\n\\r\\nℹ️ Recommendations\\r\\n\\r\\nIf you temporarily need this delegation, consider the following:\\r\\n\\r\\n- add the administrators in the Discovery Management group\\r\\n- monitor the group content and alert when the group modified\\r\\n- add administrators in this group only for a short period of time\",\"style\":\"info\"},\"conditionalVisibility\":{\"parameterName\":\"Help\",\"comparison\":\"isEqualTo\",\"value\":\"Yes\"},\"name\":\"SearchRBACHelp\"},{\"type\":3,\"content\":{\"version\":\"KqlItem/1.0\",\"query\":\"ExchangeConfiguration(SpecificSectionList=\\\"MRA\\\",SpecificConfigurationDate=\\\"{DateOfConfiguration:value}\\\",SpecificConfigurationEnv={EnvironmentList},Target = \\\"Online\\\")\\r\\n| where CmdletResultValue.Role contains \\\"search\\\" and CmdletResultValue.Name !contains \\\"Deleg\\\"\\r\\n| where CmdletResultValue.RoleAssigneeName != \\\"Exchange Online-ApplicationAccount\\\" and CmdletResultValue.RoleAssigneeName != \\\"Discovery Management\\\"\\r\\n| extend RoleAssigneeName = tostring(CmdletResultValue.RoleAssigneeName)\\r\\n| extend RoleAssigneeType = iff(CmdletResultValue.RoleAssigneeType== \\\"User\\\" , \\\"User\\\", \\\"Group\\\")\\r\\n| extend CustomRecipientWriteScope = tostring(CmdletResultValue.CustomRecipientWriteScope)\\r\\n| extend CustomConfigWriteScope = tostring(CmdletResultValue.CustomConfigWriteScope)\\r\\n| extend CustomResourceScope = tostring(CmdletResultValue.CustomResourceScope)\\r\\n| extend RecipientWriteScope = CmdletResultValue.RecipientWriteScope\\r\\n| extend ConfigWriteScope = CmdletResultValue.ConfigWriteScope\\r\\n| extend ManagementRoleAssignement = tostring(CmdletResultValue.Name)\\r\\n| extend Status= tostring(CmdletResultValue.Enabled)\\r\\n| extend RoleAssigneeName = iff( RoleAssigneeType == \\\"User\\\", strcat(\\\"🧑‍🦰 \\\",RoleAssigneeName), strcat(\\\"👪 \\\", RoleAssigneeName) )\\r\\n| project RoleAssigneeName, RoleAssigneeType, Status,CustomRecipientWriteScope,CustomConfigWriteScope,CustomResourceScope,RecipientWriteScope,ConfigWriteScope,ManagementRoleAssignement,WhenChanged,WhenCreated\",\"size\":3,\"showAnalytics\":true,\"showExportToExcel\":true,\"queryType\":0,\"resourceType\":\"microsoft.operationalinsights/workspaces\",\"gridSettings\":{\"rowLimit\":10000,\"filter\":true,\"sortBy\":[{\"itemKey\":\"ConfigWriteScope\",\"sortOrder\":1}]},\"sortBy\":[{\"itemKey\":\"ConfigWriteScope\",\"sortOrder\":1}]},\"name\":\"query - 1\",\"styleSettings\":{\"showBorder\":true}}]},\"name\":\"Mailbox Search Role\"}]},\"conditionalVisibility\":{\"parameterName\":\"selected\",\"comparison\":\"isEqualTo\",\"value\":\"Delegation\"},\"name\":\"Importantsecurityconfiguration\"},{\"type\":12,\"content\":{\"version\":\"NotebookGroup/1.0\",\"groupType\":\"editable\",\"title\":\"Exchange and AD GRoup\",\"items\":[{\"type\":12,\"content\":{\"version\":\"NotebookGroup/1.0\",\"groupType\":\"editable\",\"title\":\"Exchange group\",\"items\":[{\"type\":1,\"content\":{\"json\":\"ℹ️ Recommendations\\r\\n\\r\\n- Ensure that no service account are a member of the high privilege groups. Use RBAC to delegate the exact required permissions.\\r\\n- Limit the usage of nested group for administration.\\r\\n- Ensure that accounts are given only the required pernissions to execute their tasks.\\r\\n- Use just in time administration principle by adding users in a group only when they need the permissions, then remove them when their operation is over.\\r\\n- Limit the number of Organization management members. When you review the Admin Audit logs you might see that the administrators rarely needed Organization Management privileges.\\r\\n- Monitor the content of the following groups:\\r\\n - TenantAdmins_-xxx (Membership in this role group is synchronized across services and managed centrally)\\r\\n - Organization Management\\r\\n - ExchangeServiceAdmins_-xxx (Membership in this role group is synchronized across services and managed centrally)\\r\\n - Recipient Management (Member of this group have at least the following rights : set-mailbox, Add-MailboxPermission)\\r\\n - Discovery Management\\r\\n - Hygiene Management\\r\\n - Security Administrator (Membership in this role group is synchronized across services and managed centrally)\\r\\n - xxx High privilege group (not an exhaustive list)\\r\\n - Compliance Management\\r\\n - All RBAC groups that have high roles delegation\\r\\n - All nested groups in high privileges groups\\r\\n - Note that this is not a complete list. The content of all the groups that have high privileges should be monitored.\\r\\n- Each time a new RBAC group is created, decide if the content of this groups should be monitored\\r\\n- Periodically review the members of the groups\",\"style\":\"info\"},\"conditionalVisibility\":{\"parameterName\":\"Help\",\"comparison\":\"isEqualTo\",\"value\":\"Yes\"},\"name\":\"text - 0\"},{\"type\":12,\"content\":{\"version\":\"NotebookGroup/1.0\",\"groupType\":\"editable\",\"title\":\"To groups - Number of direct members per group with RecipientType User\",\"items\":[{\"type\":3,\"content\":{\"version\":\"KqlItem/1.0\",\"query\":\"ExchangeConfiguration(SpecificSectionList=\\\"RoleGroupMember\\\",SpecificConfigurationDate=\\\"{DateOfConfiguration:value}\\\",SpecificConfigurationEnv={EnvironmentList},Target = \\\"Online\\\")\\r\\n| project CmdletResultValue\\r\\n//| where CmdletResultValue.RecipientType !contains \\\"group\\\"\\r\\n| extend Members= tostring(CmdletResultValue.Identity)\\r\\n| summarize dcount(tostring(Members)) by RoleGroup = tostring(CmdletResultValue.RoleGroup)\\r\\n| where RoleGroup has_any (\\\"TenantAdmins\\\",\\\"Organization Management\\\", \\\"Discovery Management\\\", \\\"Compliance Management\\\", \\\"Server Management\\\", \\\"ExchangeServiceAdmins\\\",\\\"Security Administrator\\\", \\\"SecurityAdmins\\\", \\\"Recipient Manangement\\\", \\\"Records Manangement\\\",\\\"Impersonation\\\",\\\"Export\\\")\\r\\n| sort by dcount_Members\\r\\n\",\"size\":3,\"queryType\":0,\"resourceType\":\"microsoft.operationalinsights/workspaces\",\"visualization\":\"tiles\",\"tileSettings\":{\"titleContent\":{\"columnMatch\":\"RoleGroup\",\"formatter\":1},\"leftContent\":{\"columnMatch\":\"dcount_Members\",\"formatter\":12,\"formatOptions\":{\"palette\":\"auto\"}},\"showBorder\":true,\"sortCriteriaField\":\"dcount_Members\",\"sortOrderField\":2,\"size\":\"auto\"}},\"name\":\"query - 0\"}]},\"name\":\"ExchangeGroupsList\"},{\"type\":12,\"content\":{\"version\":\"NotebookGroup/1.0\",\"groupType\":\"editable\",\"title\":\"Number of direct members per group with RecipientType User\",\"expandable\":true,\"items\":[{\"type\":3,\"content\":{\"version\":\"KqlItem/1.0\",\"query\":\"ExchangeConfiguration(SpecificSectionList=\\\"RoleGroupMember\\\",SpecificConfigurationDate=\\\"{DateOfConfiguration:value}\\\",SpecificConfigurationEnv={EnvironmentList},Target = \\\"Online\\\")\\r\\n| project CmdletResultValue\\r\\n| where CmdletResultValue.RecipientType !contains \\\"group\\\"\\r\\n| extend Members= tostring(CmdletResultValue.Identity)\\r\\n| summarize dcount(tostring(Members)) by RoleGroup = tostring(CmdletResultValue.RoleGroup)\\r\\n| sort by dcount_Members\\r\\n\",\"size\":3,\"queryType\":0,\"resourceType\":\"microsoft.operationalinsights/workspaces\",\"visualization\":\"tiles\",\"tileSettings\":{\"titleContent\":{\"columnMatch\":\"RoleGroup\",\"formatter\":1},\"leftContent\":{\"columnMatch\":\"dcount_Members\",\"formatter\":12,\"formatOptions\":{\"palette\":\"auto\"}},\"showBorder\":true,\"sortCriteriaField\":\"dcount_Members\",\"sortOrderField\":2,\"size\":\"auto\"}},\"name\":\"query - 0\"}]},\"name\":\"ExchangeGroupsList - Copy\"},{\"type\":1,\"content\":{\"json\":\"Exchange groups content (Extract for the OU \\\"Microsoft Exchange Security Groups\\\").\\r\\nSelect a group to display detailed information of its contents.\\r\\nLevel attribute helps you understand the level of nested groups.\"},\"name\":\"text - 2\"},{\"type\":9,\"content\":{\"version\":\"KqlParameterItem/1.0\",\"parameters\":[{\"id\":\"b4b7a6ad-381a-48d6-9938-bf7cb812b474\",\"version\":\"KqlParameterItem/1.0\",\"name\":\"Group\",\"type\":2,\"query\":\"ExchangeConfiguration(SpecificSectionList=\\\"RoleGroup\\\",SpecificConfigurationDate=\\\"{DateOfConfiguration:value}\\\",SpecificConfigurationEnv={EnvironmentList},Target = \\\"Online\\\")\\r\\n//| where CmdletResultValue.Parentgroup != \\\"Exchange Trusted Subsystem\\\"\\r\\n//| where CmdletResultValue.Parentgroup != \\\"Exchange Windows Permissions\\\"\\r\\n| project CmdletResultValue\\r\\n| extend GroupName = tostring(CmdletResultValue.Name)\\r\\n| distinct GroupName\\r\\n| sort by GroupName asc\\r\\n\",\"typeSettings\":{\"showDefault\":false},\"queryType\":0,\"resourceType\":\"microsoft.operationalinsights/workspaces\"}],\"style\":\"pills\",\"queryType\":0,\"resourceType\":\"microsoft.operationalinsights/workspaces\"},\"name\":\"parameters - 3\"},{\"type\":3,\"content\":{\"version\":\"KqlItem/1.0\",\"query\":\"//ExchangeConfiguration(SpecificSectionList=\\\"ExGroup\\\",SpecificConfigurationDate=\\\"{DateOfConfiguration:value}\\\",SpecificConfigurationEnv={EnvironmentList},Target = \\\"Online\\\")\\r\\nExchangeConfiguration(SpecificSectionList=\\\"RoleGroupMember\\\",SpecificConfigurationDate=\\\"{DateOfConfiguration:value}\\\",SpecificConfigurationEnv={EnvironmentList},Target = \\\"Online\\\")\\r\\n| search CmdletResultValue.RoleGroup == \\\"{Group}\\\"\\r\\n//| where CmdletResultValue.Level != 0\\r\\n| project CmdletResultValue\\r\\n| extend Members = tostring(CmdletResultValue.Identity)\\r\\n//| extend Parentgroup = tostring(CmdletResultValue.Parentgroup)\\r\\n//| extend MemberPath = tostring(CmdletResultValue.MemberPath)\\r\\n//| extend Level = tostring(CmdletResultValue.Level)\\r\\n//| extend ObjectClass = tostring(CmdletResultValue.ObjectClass)\\r\\n//| extend LastLogon = CmdletResultValue.LastLogonString\\r\\n//| extend LastLogon = iif ( todatetime (CmdletResultValue.LastLogonString) < ago(-366d), CmdletResultValue.LastLogonString,strcat(\\\"💥\\\",CmdletResultValue.LastLogonString))\\r\\n//| extend LastPwdSet = CmdletResultValue.LastPwdSetString\\r\\n//| extend Enabled = tostring(CmdletResultValue.Enabled)\\r\\n| extend Members = case( CmdletResultValue.RecipientType == \\\"Group\\\", strcat( \\\"👪 \\\", Members), strcat( \\\"🧑‍🦰 \\\", Members) )\\r\\n| extend RecipientType = tostring(CmdletResultValue.RecipientType)\",\"size\":3,\"showAnalytics\":true,\"showExportToExcel\":true,\"queryType\":0,\"resourceType\":\"microsoft.operationalinsights/workspaces\",\"gridSettings\":{\"formatters\":[{\"columnMatch\":\"CmdletResultValue\",\"formatter\":5}],\"rowLimit\":10000,\"filter\":true}},\"name\":\"ExchangeServersGroupsGrid\",\"styleSettings\":{\"showBorder\":true}}]},\"name\":\"Exchange group\"}]},\"conditionalVisibility\":{\"parameterName\":\"selected\",\"comparison\":\"isEqualTo\",\"value\":\"ExchAD\"},\"name\":\"Exchange and AD GRoup\"},{\"type\":12,\"content\":{\"version\":\"NotebookGroup/1.0\",\"groupType\":\"editable\",\"title\":\"Transport Security configuration\",\"items\":[{\"type\":12,\"content\":{\"version\":\"NotebookGroup/1.0\",\"groupType\":\"editable\",\"title\":\"Inbound Connector configuration\",\"items\":[{\"type\":1,\"content\":{\"json\":\"This section shows the configuration of the Inbound connnectors\",\"style\":\"info\"},\"conditionalVisibility\":{\"parameterName\":\"Help\",\"comparison\":\"isEqualTo\",\"value\":\"Yes\"},\"name\":\"TransportRulesHelp\"},{\"type\":3,\"content\":{\"version\":\"KqlItem/1.0\",\"query\":\"ExchangeConfiguration(SpecificSectionList=\\\"InBoundC\\\",SpecificConfigurationDate=\\\"{DateOfConfiguration:value}\\\",SpecificConfigurationEnv={EnvironmentList},Target = \\\"Online\\\")\\r\\n| project CmdletResultValue\\r\\n| extend Name = tostring(CmdletResultValue.Name)\\r\\n| extend State = tostring(CmdletResultValue.Enabled)\\r\\n| extend ConnectorType = tostring(CmdletResultValue.ConnectorType)\\r\\n| extend ConnectorSource = tostring(CmdletResultValue.ConnectorSource)\\r\\n| extend SenderIPAddresses = tostring(CmdletResultValue.SenderIPAddresses)\\r\\n| extend SenderDomains = tostring(CmdletResultValue.SenderDomains)\\r\\n| extend TrustedOrganizations = tostring(CmdletResultValue.TrustedOrganizations)\\r\\n| extend AssociatedAcceptedDomainsRequireTls = tostring(CmdletResultValue.AssociatedAcceptedDomainsRequireTls)\\r\\n| extend RestrictDomainsToIPAddresses = tostring(CmdletResultValue.RestrictDomainsToIPAddresses)\\r\\n| extend RestrictDomainsToCertificate = tostring(CmdletResultValue.RestrictDomainsToCertificate)\\r\\n| extend CloudServicesMailEnabled = tostring(CmdletResultValue.CloudServicesMailEnabled)\\r\\n| extend TreatMessagesAsInternal = tostring(CmdletResultValue.TreatMessagesAsInternal)\\r\\n| extend TlsSenderCertificateName = tostring(CmdletResultValue.TlsSenderCertificateName)\\r\\n| extend ScanAndDropRecipients = tostring(CmdletResultValue.ScanAndDropRecipients)\\r\\n| extend Comment = tostring(CmdletResultValue.Comment)\\r\\n| extend WhenChanged = tostring(CmdletResultValue.WhenChanged)\\r\\n| extend WhenCreated = tostring(CmdletResultValue.WhenCreated)\\r\\n| project-away CmdletResultValue\\r\\n| sort by Name asc\",\"size\":3,\"showAnalytics\":true,\"showExportToExcel\":true,\"queryType\":0,\"resourceType\":\"microsoft.operationalinsights/workspaces\"},\"name\":\"query - 1\",\"styleSettings\":{\"showBorder\":true}}]},\"name\":\"Inbound Connector configuration\"},{\"type\":12,\"content\":{\"version\":\"NotebookGroup/1.0\",\"groupType\":\"editable\",\"title\":\"Outbound Connector configuration\",\"items\":[{\"type\":1,\"content\":{\"json\":\"This section shows the configuration of the Outbound connnectors\",\"style\":\"info\"},\"conditionalVisibility\":{\"parameterName\":\"Help\",\"comparison\":\"isEqualTo\",\"value\":\"Yes\"},\"name\":\"TransportRulesHelp\"},{\"type\":3,\"content\":{\"version\":\"KqlItem/1.0\",\"query\":\"ExchangeConfiguration(SpecificSectionList=\\\"OutBoundC\\\",SpecificConfigurationDate=\\\"{DateOfConfiguration:value}\\\",SpecificConfigurationEnv={EnvironmentList},Target = \\\"Online\\\")\\r\\n| project CmdletResultValue\\r\\n| extend Name = tostring(CmdletResultValue.Name)\\r\\n| extend State = tostring(CmdletResultValue.Enabled)\\r\\n| extend UseMXRecord = tostring(CmdletResultValue.UseMXRecord)\\r\\n| extend ConnectorType = tostring(CmdletResultValue.ConnectorType)\\r\\n| extend ConnectorSource = tostring(CmdletResultValue.ConnectorSource)\\r\\n| extend RecipientDomains = tostring(CmdletResultValue.RecipientDomains)\\r\\n| extend SmartHosts = tostring(CmdletResultValue.SmartHosts)\\r\\n| extend TlsDomain = tostring(CmdletResultValue.TlsDomain)\\r\\n| extend TlsSettings = tostring(CmdletResultValue.TlsSettings)\\r\\n| extend IsTransportRuleScoped = tostring(CmdletResultValue.IsTransportRuleScoped)\\r\\n| extend RouteAllMessagesViaOnPremises = tostring(CmdletResultValue.RouteAllMessagesViaOnPremises)\\r\\n| extend CloudServicesMailEnabled = tostring(CmdletResultValue.CloudServicesMailEnabled)\\r\\n| extend AllAcceptedDomains = tostring(CmdletResultValue.AllAcceptedDomains)\\r\\n| extend SenderRewritingEnabled = tostring(CmdletResultValue.SenderRewritingEnabled)\\r\\n| extend TestMode = tostring(CmdletResultValue.TestMode)\\r\\n| extend LinkForModifiedConnector = tostring(CmdletResultValue.LinkForModifiedConnector)\\r\\n| extend ValidationRecipients = tostring(CmdletResultValue.ValidationRecipients)\\r\\n| extend IsValidated = tostring(CmdletResultValue.IsValidated)\\r\\n| extend LastValidationTimestamp = tostring(CmdletResultValue.LastValidationTimestamp)\\r\\n| extend Comment = tostring(CmdletResultValue.Comment)\\r\\n| extend WhenChanged = tostring(CmdletResultValue.WhenChanged)\\r\\n| extend WhenCreated = tostring(CmdletResultValue.WhenCreated)\\r\\n| project-away CmdletResultValue\\r\\n| sort by Name asc\",\"size\":3,\"showAnalytics\":true,\"showExportToExcel\":true,\"queryType\":0,\"resourceType\":\"microsoft.operationalinsights/workspaces\"},\"name\":\"query - 1\",\"styleSettings\":{\"showBorder\":true}}]},\"name\":\"Outbound Connector configuration - Copy\"},{\"type\":12,\"content\":{\"version\":\"NotebookGroup/1.0\",\"groupType\":\"editable\",\"title\":\"Transport Rules with specific actions to monitor\",\"items\":[{\"type\":1,\"content\":{\"json\":\"A common way used by attackers to exfiltrate data is to set Transport Rules that send all or sensitive messages outside the organization or to a mailbox where they already have full control.\\r\\n\\r\\nThis section shows your Transport rules with sentitive actions that can lead to data leaks:\\r\\n- BlindCopyTo\\r\\n- SentTo\\r\\n- CopyTo\",\"style\":\"info\"},\"conditionalVisibility\":{\"parameterName\":\"Help\",\"comparison\":\"isEqualTo\",\"value\":\"Yes\"},\"name\":\"TransportRulesHelp\"},{\"type\":3,\"content\":{\"version\":\"KqlItem/1.0\",\"query\":\"ExchangeConfiguration(SpecificSectionList=\\\"TransportRule\\\",SpecificConfigurationDate=\\\"{DateOfConfiguration:value}\\\",SpecificConfigurationEnv={EnvironmentList},Target = \\\"Online\\\")\\r\\n| project CmdletResultValue\\r\\n| extend Identity = iif( CmdletResultValue.Identity contains \\\"OrgHierarchyToIgnore\\\",tostring(CmdletResultValue.Identity.Name),tostring(CmdletResultValue.Identity))\\r\\n| extend State = tostring(CmdletResultValue.State)\\r\\n| extend SentTo = tostring(CmdletResultValue.SentToString)\\r\\n| extend BlindCopyTo = tostring(CmdletResultValue.BlindCopyToString)\\r\\n| extend CopyTo = tostring(CmdletResultValue.CopyToString)\\r\\n| extend RedirectMessageTo = tostring(CmdletResultValue.RedirectMessageToString)\\r\\n| extend Mode = tostring(CmdletResultValue.Identity.Mode)\\r\\n| project-away CmdletResultValue\\r\\n| sort by Identity asc\",\"size\":1,\"showAnalytics\":true,\"showExportToExcel\":true,\"queryType\":0,\"resourceType\":\"microsoft.operationalinsights/workspaces\"},\"name\":\"query - 1\",\"styleSettings\":{\"showBorder\":true}}]},\"name\":\"Transport Rules actions to monitor\"},{\"type\":12,\"content\":{\"version\":\"NotebookGroup/1.0\",\"groupType\":\"editable\",\"title\":\"Remote Domain Autofoward Configuration - * should not allow AutoForwardEnabled\",\"items\":[{\"type\":1,\"content\":{\"json\":\"If **AutoForwardEnabled** is set to True for an SMTP domain, then users in Outlook are allowed to set automatic transfer of all their emails to addresses in this domain.\\r\\n\\r\\nWhen the Default Remote domain is set to * and has the AutoForwardEnabled set True, any user can configure an Outlook rule to automatically forward all emails to any SMTP domain domains outside the organization. This is a high risk configuration as it might allow accounts to leak information. \\r\\n\\r\\nAlso, when setting AutoForwardEnabled to a specific domain, it is strongly recommended enable TLS encryption.\",\"style\":\"info\"},\"conditionalVisibility\":{\"parameterName\":\"Help\",\"comparison\":\"isEqualTo\",\"value\":\"Yes\"},\"name\":\"AutoForwardHelp\"},{\"type\":3,\"content\":{\"version\":\"KqlItem/1.0\",\"query\":\"ExchangeConfiguration(SpecificSectionList=\\\"RemoteDomain\\\",SpecificConfigurationDate=\\\"{DateOfConfiguration:value}\\\",SpecificConfigurationEnv={EnvironmentList},Target = \\\"Online\\\")\\r\\n| project CmdletResultValue\\r\\n| extend Name = tostring(CmdletResultValue.Name)\\r\\n| extend Address = tostring(CmdletResultValue.DomainName)\\r\\n| extend AutoForwardEnabled = iff (CmdletResultValue.AutoForwardEnabled== \\\"true\\\" and CmdletResultValue.DomainName == \\\"*\\\", strcat (\\\"❌ \\\",tostring(CmdletResultValue.AutoForwardEnabled)),iff(CmdletResultValue.AutoForwardEnabled== \\\"true\\\" and CmdletResultValue.DomainName != \\\"*\\\", strcat (\\\"⚠️ \\\",tostring(CmdletResultValue.AutoForwardEnabled)),strcat (\\\"✅ \\\",tostring(CmdletResultValue.AutoForwardEnabled))))\\r\\n| project-away CmdletResultValue\\r\\n| sort by Address asc \",\"size\":1,\"showAnalytics\":true,\"showExportToExcel\":true,\"queryType\":0,\"resourceType\":\"microsoft.operationalinsights/workspaces\",\"gridSettings\":{\"rowLimit\":10000,\"filter\":true}},\"name\":\"query - 1\",\"styleSettings\":{\"showBorder\":true}}]},\"name\":\"ForwardGroup\"}]},\"conditionalVisibility\":{\"parameterName\":\"selected\",\"comparison\":\"isEqualTo\",\"value\":\"Transport\"},\"name\":\"Transport Security configuration\"}],\"fromTemplateId\":\"sentinel-MicrosoftExchangeSecurityReview-Online\",\"$schema\":\"https://github.com/Microsoft/Application-Insights-Workbooks/blob/master/schema/workbook.json\"}\r\n", "version": "1.0", "sourceId": "[variables('workspaceResourceId')]", "category": "sentinel" diff --git a/Solutions/Microsoft Exchange Security - Exchange Online/Parsers/ExchangeEnvironmentList.txt b/Solutions/Microsoft Exchange Security - Exchange Online/Parsers/ExchangeEnvironmentList.txt index bde6f25ebdf..e3b7ba30a1c 100644 --- a/Solutions/Microsoft Exchange Security - Exchange Online/Parsers/ExchangeEnvironmentList.txt +++ b/Solutions/Microsoft Exchange Security - Exchange Online/Parsers/ExchangeEnvironmentList.txt @@ -11,7 +11,7 @@ // // USAGE: // 1. Open Log Analytics/Microsoft Sentinel Logs blade. Copy the query below and paste into the Logs query window. -// 2. Click the Save button above the query. A pane will appear on the right, select "as Function" from the drop down. Enter the Function Name "ESI_ExchConfigAvailableEnvironments". +// 2. Click the Save button above the query. A pane will appear on the right, select "as Function" from the drop down. Enter the Function Name "ExchangeEnvironmentList". // Parameters : 1 parameter to add during creation. // 1. Target, type string, default value "On-Premises" // 3. Function App usually take 10-15 minutes to activate. You can then use Function Alias for other queries diff --git a/Solutions/Microsoft Exchange Security - Exchange Online/Workbooks/Microsoft Exchange Least Privilege with RBAC - Online.json b/Solutions/Microsoft Exchange Security - Exchange Online/Workbooks/Microsoft Exchange Least Privilege with RBAC - Online.json index 6db4c1c5605..fb14396d3f6 100644 --- a/Solutions/Microsoft Exchange Security - Exchange Online/Workbooks/Microsoft Exchange Least Privilege with RBAC - Online.json +++ b/Solutions/Microsoft Exchange Security - Exchange Online/Workbooks/Microsoft Exchange Least Privilege with RBAC - Online.json @@ -52,7 +52,7 @@ "multiSelect": true, "quote": "'", "delimiter": ",", - "query": "ESI_ExchConfigAvailableEnvironments(Target=\"Online\") | where ESIEnvironment != \"\"", + "query": "ExchangeEnvironmentList(Target=\"Online\") | where ESIEnvironment != \"\"", "typeSettings": { "limitSelectTo": 1, "showDefault": false diff --git a/Solutions/Microsoft Exchange Security - Exchange Online/Workbooks/Microsoft Exchange Security Review - Online.json b/Solutions/Microsoft Exchange Security - Exchange Online/Workbooks/Microsoft Exchange Security Review - Online.json index 0177d8059c3..7a07bab5a55 100644 --- a/Solutions/Microsoft Exchange Security - Exchange Online/Workbooks/Microsoft Exchange Security Review - Online.json +++ b/Solutions/Microsoft Exchange Security - Exchange Online/Workbooks/Microsoft Exchange Security Review - Online.json @@ -23,7 +23,7 @@ "multiSelect": true, "quote": "'", "delimiter": ",", - "query": "ESI_ExchConfigAvailableEnvironments(Target=\"Online\") | where ESIEnvironment != \"\"", + "query": "ExchangeEnvironmentList(Target=\"Online\") | where ESIEnvironment != \"\"", "typeSettings": { "limitSelectTo": 1, "showDefault": false From 049a53bb7b90849dd5bd5b96c1db8915dabdf662 Mon Sep 17 00:00:00 2001 From: nlepagnez Date: Mon, 21 Aug 2023 15:54:33 +0200 Subject: [PATCH 02/18] Creatye solution package --- .../Solution_MicrosoftExchangeSecurity.json | 2 +- .../Package/2.0.0.zip | Bin 66438 -> 0 bytes .../Package/2.0.1.zip | Bin 0 -> 66380 bytes .../Package/mainTemplate.json | 46 +++++++++--------- ...crosoftExchangeSecurityExchangeOnline.json | 2 +- .../Package/2.0.0.zip | Bin 24394 -> 0 bytes .../Package/2.0.1.zip | Bin 0 -> 24364 bytes .../Package/mainTemplate.json | 12 ++--- .../Solution_MicrosoftExchangeSecurity.json | 30 ------------ ...crosoftExchangeSecurityExchangeOnline.json | 23 --------- 10 files changed, 31 insertions(+), 84 deletions(-) delete mode 100644 Solutions/Microsoft Exchange Security - Exchange On-Premises/Package/2.0.0.zip create mode 100644 Solutions/Microsoft Exchange Security - Exchange On-Premises/Package/2.0.1.zip delete mode 100644 Solutions/Microsoft Exchange Security - Exchange Online/Package/2.0.0.zip create mode 100644 Solutions/Microsoft Exchange Security - Exchange Online/Package/2.0.1.zip delete mode 100644 Tools/Create-Azure-Sentinel-Solution/V2/input/Solution_MicrosoftExchangeSecurity.json delete mode 100644 Tools/Create-Azure-Sentinel-Solution/V2/input/Solution_MicrosoftExchangeSecurityExchangeOnline.json diff --git a/Solutions/Microsoft Exchange Security - Exchange On-Premises/Data/Solution_MicrosoftExchangeSecurity.json b/Solutions/Microsoft Exchange Security - Exchange On-Premises/Data/Solution_MicrosoftExchangeSecurity.json index 81fbe66e8f6..647b5cc67c7 100644 --- a/Solutions/Microsoft Exchange Security - Exchange On-Premises/Data/Solution_MicrosoftExchangeSecurity.json +++ b/Solutions/Microsoft Exchange Security - Exchange On-Premises/Data/Solution_MicrosoftExchangeSecurity.json @@ -23,7 +23,7 @@ "Analytic Rules/ServerOrientedWithUserOrientedAdministration.yaml" ], "BasePath": "C:\\Git Repositories\\Azure-Sentinel\\Solutions\\Microsoft Exchange Security - Exchange On-Premises\\", - "Version": "2.0.0", + "Version": "2.0.1", "Metadata": "SolutionMetadata.json", "TemplateSpec": true, "Is1Pconnector": false diff --git a/Solutions/Microsoft Exchange Security - Exchange On-Premises/Package/2.0.0.zip b/Solutions/Microsoft Exchange Security - Exchange On-Premises/Package/2.0.0.zip deleted file mode 100644 index a90636a8bad3b621e61ad1d1043a07a7aae811de..0000000000000000000000000000000000000000 GIT binary patch literal 0 HcmV?d00001 literal 66438 zcmZU(Q;;Y;u&zC}ZQHhO+qP}nwr$(CZQItGnf0%4?^EaE{8hO~I#szyr#k)i(+bkS zASeI;01yBS#NU*mY|Qmy#Oq8l9#iH- zh?Tfc@uGBLiE>kX%v-p8_;;{PIy5C3ac|CpwI9D10y3slwJVnovV}F@gqXj(7ccI) ze7CIUmNg=A-o1&6b+LI{hZ$>dY82q~B6bFZI6E6PH*+3y$cBapF&~K81&m9VDsxw0 z7D;Eh-xJRmSmipHi}hY)I};Nj!G(-yWK*VQ)46|Xk};V*U%rZtQ4Yo$bY?{DxJHAp4}t6yog{~#9%c$ z@|K#1$vWpU%*E`>MXnG`YSy7MkvZ+MaRdiHX)?R;{P4w!)~QVdX8kfF&ML!FOK%{Z zU<0r3Qkn`>o~AF%YSJ(PR+lVB8B#kKRi!RTA6Ydh<-4(S1rp0T;xM#lMRP+gkQ=yC zs%JJmBbVO`s9EQN4$L=p9$1(-ikPm`ay zmZcvQoe5RuDR(=kanMa&{np`33IZyZCV~ekEz?8BJr{4o^k&(xx~d zJ5D|um!y$e#-+N-#ds&AJj~8RLoI4cgIh#A{g6i z)HZ@Zo`(${JerCSmmeU>kmG#x{eGY{$y`RXH$fBOilb`Z4-`-tI}l^k{8CNcd=vS$ zq1ccOOw~FkUla&v<`#pBGSwJ~26xHF3cI2$O++H`1?UNPp9tS>_|3ltxL}a1I?EWrJfkg|Xs(b32@!g%iB`1*`F znAZbsXl-`B3x?d?OPJTNzJJ?$&!YJQA92_wD|v<$D0iMc++1b`q|@ZQh4=>kdJ#4T zi9OlTkE}6#jdz1$LjyY~<%{9Ti?Zd}hl@&ghu|5D30hOzPn zc=G*groHt_A0Eu56cw^I*)ZoSO{?YkIP~~a^n6v+96X30rdZRr&3W-s-z6gHZBL%N z;pGo2ujp=CX9T;i$VB57X=t#NsP}y@IKcgl+IgTJYt@irH(TxK%~(O?Q6ookT1BU0 zi9>-6@lq}Ki`!Hla7uR*_T!n>ACBNfePN1@os1%8bXImDNV;%ukI?!DyU5SMQ(D&R zyH|{)F{>?rw=+Cr)&m#nBzF#4kV{mrcMIPMI8PS%fu}9Mfbu3M;gCZos7Rnt@!_lzO99 z33R4)%BEUtFJU(m#{JOz53L&ocJSfEEB{_z_a?lOosAP^(^#&v!-dj`} zt`iq7r-KI>2Wv#o$z2)20ayBgee#yNi0=-j0x>he-vnUl6nNt)Qt>?9imlpMd*S)+ zia+VvSL3x+{pb~a)yN>6q)wL@NZJy0;~B5KNlX5VUKCjky+_L}e<=7X4TRx$4jGBd zj}X0&o93D@S&CZFC)(;|+Y*kxB#=Ofb-PtX{V0{l=!Xk8Vp_jI2BYpPKMi~!=4Oek`c)19E!E|##b~{wt>RNoFjudG`a7;&CQ>zGf1YCD09o!fvWBs$X4k>q}wdfuxT4L>Bw1>83h~`!h++IQonbjo`;zFmX&2d4(z^><6f}b zaIiLElYMEz9lA}HglZ~($ZID}$jb=O#mJ^W7LH*MhEdX0n^@WHW|RhJ{hSI84rgN@ zbWGSy8Yk#%2TXnp={e${%$zs#n26b*JINoTxDBL}buy(N2E(wH9BFU9rQP`adG7qQ z7O|^T4S)w2z&Uv;L0!WGuxIM>G zL%}3bhOVJvl-PYz?M}!7U>Wnk-Y3>9LV`R(Ay6>Tq{PeBQ!A36z_kFhfZAl66CcZ5 zwKHXsB<g#H*>=X|m)dOc2C~{{cQ-0tOa0)x|cHp+6mt0&Z zZz%3c!YC^ZHL9I1^o%KgDsGPKx(mr#%NvUBDhomjz=~g6$ka!wZwS6gAkHVRbtZ@JM4QR3sz76m$rvW5c{t8=I^cSFS+|S*3uIMzp!w%np?|>i2VDk}rZ|_3{gqm4dEI@OO_M9}2%{ zfBL}x;5Ur~5nRBgTNTwmoavZ_9@R46VQEtr`8RHGjjb1ZWW!q|3gmXfQ`&P-uu$Mz zLMlg5`}my}6Zd_)eLJQTV&smZe)#4DF@}Kh_!MDF&aZ^mz;moj_Dz#UV8)#RFklDg z3#Rle2Esq!>qz@`8Vv$s_9!ERGYY(%MoPC9W})VJH%GHT(br8YQNJ9dABjf6tL>1o zbC__{X&3keO2D4FK}0iX8_v692H-8wLtru?Du4I0ysuS%6^kL<#a~J0(b=f6w)>T(eMIpa?Eed-@PEaZgV~9i|4G)Fz$*X%Up6=Z;y>|aYiMbwVruJP z^G|~PkL_7htcrWi@=IieMN-hAIq~Kl$x2T(&nwpyV zZ>YZh@qe#}-252#a1k!Q8zXLVOeSgmSe%3NU&`(Z^p-7Wk?^{+e~x$)J5=e3b_eVJ zK{j{a-@Lu|aAAYIZ`{M?%9Y&-dHcl*AIxX#stHuYAbGe$#~Ss+FyQ{#qx;SG;4h85 z?u0aY;N}YuzvJnIB(C`y!WT8fi9VvjJQ~dx9kaQ_26Pq75;1?;vX^e zY2#c?uI*_)G^Hpz5G9_-kIZ4)1B1*IU%5^?>?s5!#e0=VLc+`*7l|#KOY#XI5{3Lk zKQBr=cPh(~?*Zp?#Zx#JZ+8+a^l_u_74j_=i9Z7A${Qk;ge~=ZN*BX7!t5@B8+q2B z(2ecyBK)1RG zslJI937|+uE-!rj#PLAx4%r`NSYs&ytH~Ks=nUK?Xc&9hgpc}miUEfI1s7!34uY2H zPfpiBJ^FygZ^+O+H-9H#eLfFgby|xTi6#AP+w>`%LgAz936DkkT6 zK`P3YG$mN(i=F@-&y@R#^SGb6!lLxXi;@`#-`Cg~?xc$Q<=Gz94I4KX?76h8nYIDE zhw>P;(&QiSRe6v}yex&3pkG=RR)JzAes*py!1ZPqNM7vdF=Z+T>YWRsuhr6~Q?!=H4G1QLtN1WFo&7{tn>xbm^)-q-w46U$=A zmazJA77?fD!bxOeg7#dwqXDQYBvR}ItLc$n&G_Qee-OD-L6HW`&16u;; zhbBV?8y)WoGMvFzbGB<%kuX+sv}0mH9!Z_<3R0Y>C6&dJY0lyB;{My8*1CWH0y_tS zW0ZAt;~(Ap?nQ$ivtWD0;6|^hA}hL8PL9}oCqw+?CcS<`YnEMAhvm+-gF}3Cje`Af zj`YMv+l$oIXmNyYi78a3(F&RS!@}1|UqfP3$z`sH34A6_C*Q_0o!YQ6fMZbie3nz9 zij#^wedEn7j>>LfT;YYJJ)!_iEey+tE)07EqbeXl4XSO`A_l`sVOY^C6}H7Z{;uh8 zEp8Y9S9|W4qtdvd2P%ELsaaJciLHFQN~DFTe5;vhb??l$nwMJ%C1F`=m{xhUSdOWD zTbe0F_a~~HPm`E8n6hZ<&`b~IR74Oz>QYEiVX8cFrNZDfW;1EL)c9IP+SZ?)rntD( z)_LSM#7jHS?@&RbEN15&_*%gMtNQI@RupvpnnbFhJOO#Mjdw0?-b!CTlfH~{O9^J1Wg{ntX5I#9rq>PP29WK*W81L z%keE9UTjX%f8BXUaG#r#r=Z1uXMF>0n31tF83$-$M}2$J3i<5@$m6+@$qhQfV%>t zBWI~~oeHm`>C=)En7xA6ft9=t4VavaengOCQ&j+A%V*kgS{#vuvc#QoPZFjiRT+Sr z?KxKC)4-jk zfhvf%UI8ui7(*>#^+kWFGR&T@8z5oOj|A2409Ia?AHkyhu?QX?yCf^gOE)2WXqD>o zT{jHEY~w~E{}Mea$29je3eoiaWj<3n|5g-fX@SP8M0piVC?te{COIes8cZ&#n@j>kb#@mg0g&N zf&1ITy&3n&d>JTZqoM1JjzICH#XXpiO&^ZOW9%%s8tMugiV$?WmqF-zjL^TFImwCG z2o32K+@yCVMkX!=&p`@dLg_jA`b<4tC*$n)bQ7W|em&&Kkrhj1Fvh<+q>(>R#7KLi zCRcHG0{df1wGTV3-U+DMd`VdLO!0$h(t<#`fLTF3osXytD&i~#!T|(`OiuI{jUQ$h zU5Vfs@de2Ry<*QCkd4g)Ko2O7@8uIk8F22hxAJQxUe+}nwG56BTaDJ)OD`*Jg znRya5QANsB6C7r|ZLYLHW30+;2RZb_?{3cW&jvQxUWuYpRT~Ygpddn9%=SVexeu%O ziio2+ec#+R+b=XvnqJ>fk4t{JL%ry5%s%}t#!wXd#SwB8f9akUH|S+lxOqu)(bJ;{ z=vR6cHXDY2iVJ$>MSz$VSPptKXu=`l&6^|XUv{G0eB-~hoBqb}z&b9Gb1aHroW&c_ zqR4Ux`H`gTS-pJ@VA!cd%8F@Q!k@4AGJjy;4p(nZ3m2!;Ti^u4B(W!Qe+5K!D5igo zKWSe){%Jm^-nt|%Ugj9Tq^z^EKRxFUa-8m?yR5l=scuypNdRNN7R3zia14?jTn|dW zqPSHunkiRiK=Ln+!8t*hDU8pioU#!VgsRy+-5C0ag}#bI@d==y{D-U~9bgZUQ-SyCE$Io?R*xg=m}aKk2`~lHwKzaVxZ)0O z*wZLLVB(&w)EcQT##?#S_(g(gpXBd)=2J@$?u!r*+XGTA(j2b4;x{D@Sp$_*%lgzi zj)61y)`r#SX6nc{h|FzV2<&DW@GbpK6nZPq^GeFatJB)-RxgL$=B)!C#;|bIA0WfU z0AzLaOp}r4)laJ+&ZZy+2aW)Jy%F7^zdksz3%nruO}kZi$35p!gILc<#)TX|3x__T z*sQygC;TLL41B)dU!%r8UWj{(7f)ewWV%1)4oRo^0ByU?=jTtozsPzhvy-F7YX(n3 zJH?#GxzizYTA8<*jo)_Oe@?5}=kaXqoym2{bO?o5Kt%RPc|hY2lxC0R{e=36_UD5W zSD+}$M`9s=IE?cq@jmf12zrdUNW@AowH?5T_@sj)BDn#9Lj=a#+HXCNwzsozci`>p zp|q4RNaH#!g=|wB>;a;1_i}5IoaYMMD{oSy;2ZA~>1t|lws<;IFBD)mzhA?^hGMnP zgi`CL@$lnLsW+ zHu6)h_CP6wmF@#Tq;V%!d}wi)1t1=go77OPMBhSaVkJ5*5S#1NfdEExON|NbZ7sa> z5a5C=3lioBc*UhK^Wpnlj9lOlGFgHIgCE}H#fCx9m4Sh)0M1b(J(QCj>c#7HwZqE} zG)MA(1wf%Nw?2Xdk-&I0%y?s7>DcDLjdp_Uhy?HF)EAI}5A?a!4{}|pE?4#hxgsT% z=8REAc;+c0-=u^gjX)_<36y;j^%+$uo1+ixTggFdzG{Tj=;U;%;MlkzhcTj-b2LOM zY4H{$DDHMZprkzlK}197MThdtq!q;8O~P(`oS9;yDb@l*xwG31W%W1< zaEWfqF( zbuP$mqUHz;Oc;6)X-%XU3b;Bjh4>Q@WSbfauo7f&agj2sgEM>_oUbrg?7vsqAl+HU zrJvtV$`KAMb8r#ZafBww0xQ3jSVynPd>;VEkD65@7od%WJmcGDlBMA#tb9ZRYO)HS z4&DZpf5#vuy31vh>UFs&6F8v(MsXiZpkw;FmSM!~eAVftuH8eY(d^sWL!*h^Em7;P&Aq*;KJ2Qu zPt2xULCdD60ejJ5ET5$x7g2ykuK@4WR-5PG4JANX*ZZ~7Pc$g zbuzKX6)~5u%rN>o+4izrxA$FrB+ZCt#xMDc>*-*5a!?fpP+AF|r%8JnGVK-wGpB6k zn^_-m(B}eaB~lx)sQRn8R0YkLMl3yrcd((^^0j=MgTRnUZWpadc zYS_9JO6b?_)6;lHKVVMRruw<9`hd(jCoi0BvP#Y@e~C;vh>#+578pW5-P#(~{JX{3 zCE$gMfVmFXB~D|+LO4O$3FQ*t7cSSEq$NbUpNJ*^^gjoU;8-;zkK<}uk1ceuVOY^h zFI)cVS*V&SS93W{EaEM>0#`{*WqPv~1Gd$`+h57p>e~^qO8Yl8(8N&8{CnVU_q9Phnv|LO-skCD)L)rjF)Jq(G`Z zFC;rl5uX&^5P+{M^MT-36BAMocDn{3QgmgIUTnrij7F4@+uOR112jE?MTJ+#v>;me zSbwP6+6x;2t3=LZ_xHp?$*LSBce*9N}iLfg8Lb)Lfo5Q9>2dzoD*u zUM7fIo&k_?MaV$U^z}ghfDvH?0o-80ZIr9kO0R3AzcVI0D8<+dL)w!?_tdnQRcg1A z&2+6;_OdLMf?cIb)E{ltgWRNd&|vi_8>ZtLC(pn|7z&l^42B=)9Cyd5RkccaHH>Xj z3}K;+ELl*vGV0!J{`kV87xc6oA?aEX$CYlOG}>s@?4#1es!7gZCT(Gax`|_jvrQ8> z{40M>gx?MLC}_{OOCG^>?h<5ZvBns40(Kh)k-^X$FYsl`9a_I3XgztRK%x=-y6~|& z(a@8v#8$TGaeX(#jlpntjFK$3!Wq51+^{}gUUKS9W^yRf}`v{7ig88%V)Fe$+KdJUJ^GyyusUi;1n*w%qW{>!&@2kG-3=b zl8$a`v>+uuW-CzdkV-sDcjy!`d49Y`*A~f*UruOiGFhFOr{RFdk`6gpTtJarE})M| z=$+62C6@WB?zjfSzsiYEFou^3E%$iZ@QXhnSD)PW_n@ZgLqv79wC@=uF~P*c8B_C& zVlo(sWOvvQ#~DhqtS5?NP6G($RM_55e=Z~f`dVm9ZIs^dp~f-T-hLvgxwX9+(vuf~ z@yM4=458wabcM^}D54?6 zuojS3_7j?-fZ;KFF%m<^#&E}A^2aoAHSk!ZD}ZM=PzUA`gVV*9v!v?op^=6GBLEwC zcXk)bE7MRQL5ZySC2JGz+86~`*Ub2d;**xibq;%nlP_dG<2oj5pcF52?=Aa zqJy5R?P|e+r-8m!(@iTgb=8ExrwJ>qYC{MhyF^L@tDaeDBd&-h^^NkOM~>j+)(=6f z3GO0suz!3ZC4gvwFachbu6w zNG`o2kG%9VX&wS5U5+np$xvSk9PHXf+=NM(IJ^UrhKcs2&dtqW$NWUDpc5`S#X$iV zk?!(AzLT-OFA4v)f!4bqY}+4i~g`fXs4#M9M*%H zDh_C$J!R4BYG{ZXq#Z%FrKFTvh=rosvD=n%N2N$@is;xbb&~B^m9JU9Hzv8dua-^K zBPqbCEwonil~zD8+4YQh$nmEt4ncH2`(!5fp*NyBsE@(4*OuKT|Cbh3mYPTG$ zhiasANiANnD%6R3<@TPiIo_=#^!Yrk<1b5nbB9Wm%CzpJ?UEW*m(=2O;+M0-9w$`K z8q+eIr9bPRITX*DGBoq@9)%eVa1o9%-RyGQHC2c9&mT4oZ*XX~J^ah$VZ^Dq<*Y0( z)Vw;!0*ow2G`m`k7+j$B%Lbj(Wh$=O%xW2* z9hN%%9+uu+wB#wfRIaPYqFGdA7f{ zr>CWESz$`cuEvzI?PM`rE16?n^>rzcE?u)KC0mw;shr!E1-oCFC9Zi(UeQFO*_Ff& z)d(We#DU%`c51{r1W)!6D%pAnq>F)!{}Vwm`Z1}lmWym@^o+Hy zn9p>EPKwqzXvgNdT1vRnLp8BlOnc#pbl1>SRsRcZ)z*r%4bn%N2eU%_5`2qdkefThwrLc5(2p`R5!W?;T_iJ2 zI)8YFIvcHgy7zX6-QO|ZidMLTmiZs+@Gn8G6K2Z^m&1Etd(f#m1u2u%x1+%ulQ^d6 zeBUoNa^;g~i9vgV7a7jnk1yOe%nDVL_eJ^aO)VaqBKAJ8YG%*yS?$U>Bh#fe#B^;I zI>~meSh`nUR>`kNF0&$+l}xK}v#Wl=v>zm_dm9Xt( zGh8d1K~gnwoki0tj`abN0?HTAWOZBcY#p$siqRJvNQ zSpIv=rDruioWwVsiN9V%x3?d{>9Ha@r?xk2qSZn92lKRe{1frmJlzo#bxDs*!z-!6 zdJ@JnK683&)o%-O!hZWV&~2$!4cr^l{np(T0F93O3u*Z#U`wM4tH%lq zs1DBOcuS+4MvS|K|9#3e%2-;;IMUKp#+n(fE}B@#mrV$K8fxo+{Y-(Uu2RCs zO(JbH@|Ff8D9caSEFOJ!YABp=;nz6fu5rNhwdhl){~K0x-?ghUT;qhhYGiAw{`Z6t zEdsS~+EWgf$&tSTkaB~V$_}|d2DEKA;D#lKeBP9k4Houo`%?=Ok?&%xnBeX_$4lGW-K^3pC7 zZ|nG+lYjg0l5H7`0%I+u&9w(eGzf=N;2)t>hD7>ahd+B1wYnt+sdVD^B&Qp|%Iku` zW5F1?P9@&7dm48hn8mna)#PyA)5C`GJS*ff9pP2ECA;93J(5H&w@t|ZeaW#D;~6?w zRBf2myr%l#UI6-lZ+I(z0mmY+2h=NPI4Y>5%p>XeYzy}1`fxwrP5V8g5^w}fDICNf z<}fsNklJ(mAU+r4x$e2nQk|!tk@}VCKeHZS;ClCf{oH=!)s1At#YR;N|8a3pQ&ioE zgaiWnv;Dm%eiU#6afh&aqHI2epREtzAFcI}{%Mp2WcaD11~F#X1;sO=7KFO1p9nka z#pqvF1;!%CDPK&7x5W^C`Mwpdm+ROyU%=->kk9prm{9-0GQr1iHGWg6$zMe5A0~k3 zji+Z3y}HUgehUBGI{#oZ>!RznW7c;@N`rQe*}&*+wj%0Y@xB!W<$an`m@-p*FeGc| z;ro4RFqc{dNbMRg2Bz>!03OMoW;8&}fHuNGkkCkV1Bej8yZD+h zgm~_sC&c=;jacqy)+tRj$j;)BYD01pKFJ^n(Y%uUCuFP#=r;rv=6g+5;q<@-j9}c@ ze*_6%)AVyl@&g+@y&>1Vg5FFqBIc&U{f-yhIQg&9sA2*1%~8IR`jw^}VhXgc+(s>s z9>LNmk`7f}X^|#XxT%sljVY;+s<_+DlM)5ND3Bp?uuvcUi3>LWwq{3$x~A81V@oVo z{W&0i+Zyh1%+???>ir_3Tah{yJs{`HfbT8ZU(NU)2ws1md0&4jf3-6{YvTt&HGo!` zhgB*6KALvwL?@dc&0(wA8lUV^3TN${@|j4U6AaEa3U1A=-N%IL$gacy_C-!_7gtxr z(Dg)a(hi}h`Z|=;x;my>echiW{*Ep$;?i5!3BCcoLG#NvJzd-Pf>yXXi40B{Ezniw zJn~%P$$#a`8X|p)9+yqal5k!hBHE)?#+mAxSVKjBTNriO3u|K!TbTOT!&XL`SVOBJPV`pY_En(c3eBloOikIE3+l~M2<>!n(8tNLt@5sR_9Eqj73 zJ^Y^9FniJfl2Bu;dIz3*tA{fl<#4<0e_}AOp_Dqss zj~z1X&?uC@x7+8m8kDHcSGN0G!>KY=wN`ER1`$HL6Ob;x2WTiKt2q>Z->8iU}9Krhne>s|#JB?oH>eLwrv1@7nLY&JBI*3+@? zb*z-Dn<#BzCfigkm}&zH7M`vaYzkfL_Mp)mEb>vm6BFV z?0*Z^(Z-e%uC!21@$^#0L^|lhU{lv**LgKl5th93cBx};|An%h zT~hW3kz!<`Z)aCl+>2-ZPu5nM6A&at-`KppeYvS}{jo=ucK3o#G*rM?>- z$ID^XDHX-2hihmw;(WX~VYONYSe|laJ|lFGmTOJ(InAlH#v1$o-)o*#W++&r{<*yG z4V%tVob-9j=TWG&Ya1DY<8h$=9g*SQ$?2;D%hoxu&c@j^|Ojn?a>wvo>^w{VI8VA3M-dr;T#VT6y*I_~73BtDFZZosWTh2{ps zCdj3u>xnvb9)3sY4leFJCd9?(93Eb*YvwN_Hov%o!*zFI89*QRzLQL3+d|-O@Su11 z?hZvAEHbKfWDne!P}j(&N1IlO2EqtW_Vg672Tr9^1C@r2F%rIvKTFKtNnY`#-eLKT z6%#d9hJNS@&~d#%J1xYyST1k7F@# z|K`YB7Sf}>D(9BB8>(=zF(F@7*$&C4g?El;f^X_LV^DU|zjEAP{C&&SMA`dl5Qub7 zAvlF-0({%04+FS?1DmtM|C{~Dqc}~T#9}XQ$l#PL%bRHDrt+LyYc~!7Cn2Wl;nsC@ zJ*TXklOvZdv%|3&V~)(f+2cx_Uz^RweXnffe)p;gol8q`Pa`389?0ckpXi(6_*LE! zp79zor4jBjmFu0I_}i?Ueiq;h$lCV65n|+2!WC`+B7fv8+{ z>kRL0g6OGDKCK!rdb^QWq`aPg!eAtiO`u$Pe|`P+<>lwe)u&XR#Sfb-&5Q0Yu|+{d zqrT3z&`4dY&CUZ=jYIDjy33GePD&+qfu^ax?TL+?xIfNieOpRgUGgGYX!I8f^=l}q zM=OxNr~?|sEwo54E6A=cLl#$~Afg(@!FM#Nfmj}~4V)P-9k++~Dv37kxVb#V{Ytt}(KW<96xw6$4mjfDbhbS|Gn!vC=~EMqVn|7mw&_OggAUcV{KgZmRW45b~BXvW@U ziRq@X-#v5~T<6l+!^z9_sFa>5x+K(4qX z2;ywTn#`6th^Z-|O`p6z9E@S&d$W2W9m(?N>pe^#klY`c4ScMPb2jevE2%q`gm?3K zer5Bxn7N9Pa;@HmQgBml!(SQi=uB?3VTM+eyr<&5vlMdg_-kU8H2vth^+e0=p&{X} zU%8`C7bv!Q`;=3XMCFWKKD)A|k&-w-8>-dE$zk=}pBa*PAH z<1!+B!*4`lqSjb|LX!Z9$?02D2fh?}pv+mTCSy6!O-EE*b#p+IE#znm3V^QVEn)xT zW=Zvl?oMX|G}be2N7(3JKghlItUhDbZc6aLVtfEBu3-^+wTGH?NelmBv#DH&VooUB zcw?ad7n*Uk!u}63Q+Dxd=yCY1XFlcJ=k_=OIYYm17%g-jPml743WwAfj?-KHlLvfr zA%Oj+EEmPmkl+D7;BzNo(chJm?3WPRW&eO$&-ytwW~2#gGda^UJZmfLHV1=|T*27Q zQ9+cNq@6hfh!7Gu4EX&7gtl!|Z_P4f%IbqDSMGsB?KI^)iV!=Vmk*obcj3VI;0ZSC zFR^3j^Y!rxohDW6+|>0Yf2cFT4`|bEK0klz{X^a}Ay@a=NTGPOsx3inK7QZUuHWbN ze6#q*=B~ytL~W0Z80Ra)=eoF$yBtvvdG|=pPpF@8e?BN7W%`y-fcKeq8pwb-W;-kc z3?UBnf9P0rpn$kb)26Zg75G$OL$9viTfnze3Cys-)*(j^ciK-CE7IJJkvh4f4EGfs z2WRZFIh&>&v%7j~XH?1G9%+u43`$wYl30GD?s`rQh8vry5JII{-Yyguu;@Dlx8dRo zf-(Yh!a)ENjVD+$bztuiNJK^mPd^B0vtO4O#SkY)EHzpt*cCh#!Ga^W#KweZvKMZ6 ziF3~F4PYS-KvxXPa>G5@tw_zSG-_05^bmitHh;%?@2C%gs)}*agK#25vgGb|cu|7Z zK=LuRk3cfshEx48u9EO&=zSDg8I+INParENfE(*~teW5>Uw+U^*EJe`?pZAJ*VC*S z7PVfi+6*ES1X#(EGoZw6a-BW8DxXtv^gojKcHfJz`35I9@KJE1JE8?1G6>*9L{RHS zq@c|(7J=SQz-*MAp=FRnh{7cVnj8;gh-0I@Pg}ba%X`*x{K76yo0N z4dNShNpzo%aYl}?7&9MHGw6o^VU3N9X~kWb_LuEP7U)kip>|Vs1x8_$d54h}gv_CU ztAns@(*5D#_a`t~Re*t3cPTRvxB~~l`O5wUuY2V{Jv+qc?CuICsw{So0g4CbTjM6o z$u@8)Egp%CSd+$Vn^zjjVi5MV`$~ znnpg>Al&fF_{jW#rt>Twpu%C<_?Q^Ofg^1ljwa&fWc(zhm@3LTX-LI}6)e!=uA<_N z@R3*8<|E}BA{wt!coJmnY4{fuUaISIizZ0u3#Cm|nla2S^cx8HtKMe3F0bouFIAOT z=HT4zZ88mc``$5BwBUJpogXbU^-m?6%8Mn3fswN4B;3es`PC-$*Dd|urs3Z|)B09< zdCIOU5{}b0-f@n7!FoOs!;HRlW}BFfGREsWwaXGuu9c!%G_b9Kbd|dtXMP##gVPKK zDOH1HJu8N2dT5)0%EsA}v9V;V2Py*D(OfoP>EWQ+FbU=8Poc-p)`~t7l0|` zbs(onM9ixU)eQY?);6W8(FatS+)R8s{{yrh?NId%p=9zO7e|nq@L=uRhR~ACqLc(( zCM=4wy1IB$ESojZL0ZU&E2T-(G_35l+cz0w-7ecXSoY2onI$KdRYjzlRS zkDaSHc1eZX2boj4e;c53hr5SVqtGJ>+dKmEsEp80+|4HzLdst$SyMDpgjW90t<~fe zDX|7mDB%~H1rI+pFP%5V7kL4<-6XnuuI!#^2g>c^_wgF7U@dQ2nG*aj2hYqJ}D@{X$&{y=D-w z^oj}KJ%sIIH#Y%q-Tv}-SZQaGS$1~!$I(1CAtmXnn)aquXh~}f)D&^@d6e%=af>NE z!8Ldajlwd)+N)KW=F;~rl0lsm-n@SIg=Ilw0ai>>Tq{Kqq+L;NG*K2~nSymiy3V2X zSAsa_*e~0*Gfo?}jb_s0TLoAu=Ql)v)0D|MslXm<$QtzJ9IU`jgXg4|D}QA1hNSu2 z$$}4WHnIP^)2yO?94jf zRJm_Ta>qwchjoL5g{$_gl)W9RD$z$T1)m$*B|Q_*b0nmP!eG8(Y=_yJ%`) zT`gDn(1x9u>yVS&At{<`FC#9VTy+Q=zOjS4lp?F1;f#pd+bts7?jGhl6|4J_@^2aH-$ZnAhjDk0$N%alMyF;``sk(+Ov-dQBQOqo-DI zDg!1`0&g?J^SmeDFy4NL_NYsYgpFFVK719dpSy$ig7q-MD&IL99A$&K@#QxDlrl;G zu;wZj;%%@{urFL{CK*R~Tf`Vw_zgVsdkM5+w+xSPBJcXd<~wpnCS=}lo0*UD8tKsP znMMI*=Ggu^{*dHO8`-LpjXmHCbB(2(Yof$4K*8ZcJXj@F;`GtWi_LkRFut5{C2*ly zCUaqxhyCg5sR1>n#jph}o;7FPN!?r$13-6>+>#ouW4kf|-e^5sBi~elP_2e$O{foc zqixk%w$G|*7Q$nr7OC*5D6!@7rjtN6*rAyj+?+p4dGLl8gtfc8L3*V~Hy_$_SkPv= zEO|{urbYkLnt?5S9s0v{Iikg93{vxP%5@o%igY(eo_oXCxwl?PPIX#*_}fgDNk(e> zGV#gLYY78SXp|=x$=Lqz%N37odIlN${SsqO2lj_`jM;jJF_*+9)ig2i^tG;db87Kg_`K!m#lVGejjZU>B=TPt_|q zYiKRG>MyMJajG{S8DpGjU-7&WM{UR4FHVMGcc+UhHWur2Su-A@C@75=GZh!_Wm%+> zr_Lv-HO?t+S4`!49N@Gr%3>@BP`|snY1LZAe(I+Go0w{DpB2^EI=iJb@d$Q0!nxr( z_pm;YL77b^nTXP+A*g><-#FdN*DX2$zqG+XtZ zHIla(MTXSLBpowv%5TnwOFE>aH$Y@L4IIYoc1|^Uw*8EX9625qruXpkdyIuOgEjBpWUT9zOoda$GkhMo_=S=!$b#KOtLu#@vB_ zJ_eW{ZAtXhkh+5Opf6!CBQ&RbRQ9SYC+sV~29>_RyMcSZaX&;sAt1lU+G^ZY(@?8s zX`u^)#t9GNxR#e@#jfBLy%BHArMX%zpryG+w5$C;Zr0=-znlU&S|i+>Y65AahJR!# zinP3k#e&f%ua3;PKjb>=j{8)r6R`ciZm9}!opHDAYWcE3l}!gVvffvkX_qGZ1(%wM z_FmnabY`rdM0-q=QYCpZ7WIWXfQ$Q9=Q zf*a&9rT2rR_@Fwr$(CZQH1{ZCjPLZM^BObMDt2-Ekv2V*gmN@prB@pE<_Z z781CuyCB2^2-XEY5y~YfWtTOCvxku@qoObhBZHn43At=bpN;ic@myv7lc%4N`kCoRcMHY$ zzq$X4g6f)_4sh_7t=}z)qktQjdxX_PCChRA3`0PlC>>zRheogI`${G^-$|ToDt|He=|?>sq*OmSfvofsijjKKB!9T-_(jm=NpvjjqM) zDvV1 zVvY}jW$)O3zE2P4q^yFd4&cSX7I+KBBmLHh0(R!Q*+9qS4H2~7hJsQFVc zIdBdq5I6Q6K^D+3`4F0X$Bsac&wZ<)KV5``z3zCs<&7{({xcF)EP%N-!e3gu+>}F1 ziTR#WuMOTUP!dhnuA(C?+N6RoRZ^=lDHT!`ceQq0svr;rK1dD`>Z3n?&gR$Jxs-(Rh)K%z4?Uup;?IiSdre z>D9vDzoKaWw9_ejFqHqs$0=Q%lg)mv&(c487ZT7Db&YIpqF*fy+N_3kvD+;TU2JZv zqqV=?-a(7f|B5NSd(amhyIz;9;8zyoG-^Iw>XG5t+E?)AGpY`pH7o`~dqS@8aD zZrZbucX@1+Zv;hyf4^Kkq}QNDwKucPJ(y3Wt6XoYfO6mK&C<18fxDDRH))8 zp-Wq1%$pjT&6lcvXs9tnKG>)xJ*e|b92;e= z!2bjIE0O*S_zhOE>k%`7vy+b)xL?uV9cGM%r0#Wf_l^1=4;9C&(93#GR8GvNy=v6p zFKr6Z^$}M8*EW?!VI_vI2)DW}gqTcMl5%*!DO9V0Y!w@cEqt}M8m|1g1>0E-k=JoQ z)Q>+y0CBTDwD&QX`-TVtNagmy`ZpF69^iGRVC?8Z9CE;Di9o3;&tx3MDuTH+KO1f-}-#Om1a)vB-LRJ{g%-hAB<3Y8$Ir2k_4`HDv zwlt_*S){WC5U}09ti<}5`PjJa%=y~w=6HY2u5g2<1(AFw3@d;XpB3<0S%G&XN8lw+ zVdGNH^hn=Gu*Y}7=gzg|2?9A}bToQBL1A|hjke8*aa#*1004n_b zdocK!MZ%0$?Yf(_48*aftvJ62CMP;V?hC8hGSP?v2Xj_HI&BUjL*wr5yA-PkLzb$3 z%D4`{LA0DMUvMlCpAENOyRB*I9OEzMwNQ(F5FIZJOCe?-%%bx1=%z$V`+6nbkX-uj zg1*9v=CBVP5FxOSL_zzuwrt|-qA zIJXaq*&DvQhd8;!l+COi~1O$dMy}9?X$s#p{ z%=d5ciH2mRoMww&`Db~?*N*f=xljQ)`={J(-hvjEL(Qf%`3J8_6pf7q!&3acCGFi{ zH8-Vp&7>)98hCIZj4v4q#?xZ{_qQ#jatS*X@DTt%tnq+eyb2bUXRXpM)guK%Vp32T zkCZzSB`J6N|3Gt`($Ug_#zK6?WN2Y&Kqe0636D_voDIS5+TUOyHvFnlj!d$Y$xr15 z{rXG;&=uFFZ2znwhjkONv_aP?h6({Q8Xi9ey;bN; zoL|m_gOv(#*#5I72I%OPG*7<#7j~aww}xy8XaQ4eJFG#G&--_0wDipxf$q=kAw5CB z8*Te@F{1$8Pp?JndPvkb3`a*>QNi*Ye24MDC^QaA9XMo~6U;6TU9==CTv&oKR&9JX zL~5&4WhRjU1^}NDTI!Pn%8^U{hFz1=4B7;PYpD;s#Q~xdIAg_D)Tw17CR8lxh=%;N zhC6fVpj9K+EX5xI6u{G+cGw2^^~pP+lF!##QKUC~Mm#!Rwkdo z1s$WX5E7{@2@t!I9+creLF*Pip%4>om6kpUOMM4J@0DMgl55$a`r;r6ZG!kq zCWh%MCgL;n4$+dJDs6x&7pH~J%T)+t<~Sp?s@~9LyB^bky4x?|#lP?o>M?u-w-q)K zkc0@NYRj{9-;8#d(3Y-J1{!-(p#|82SNJDc1!0CS?Bs?!jRXcEx&&bQV851CjkV7k zNz?xaI7ec0Kb)-Mw|dWa95U7NhYo?MdBm}e`pyC8xfjGf)HsUf=t@q@_b=Z_U`g0= z&VLWqhB}s+IL@qihm=YN?IRF6Lx^8JVfTvpqw97B{@|WQV_Ip-7S;0~7u36bCMVBJr1eglVzI#k}wID(2Cj1p=jRmEUq5)JP*I>3Bl{{v1;%4%S8o_RC{ z1sI~#rZpUI#?ZAl?~>asH8=k+%~zAq<~jC)HN7jOZFiAmu9fXWQ}Mi4~)^0(?oC0TuP_PUa;t4%1i==&CpFk&0w5hqXpvA?0}TgJIqL24=|+GxOER0D$ga8 z0G(eGi*&LXHK00*OLf0LOqf*x`q3x>CNwQ3G^7n%u-oH{Q(6m*l?Awoco5lybKetE zp2Dne{$bkldHgo(OMGZdl_vQjNtVp@Vwj!)7U2JHt=fT;Fby> zbi@Paj}l?UjN#4^HKG1?K<+pdJ++i27!n>c=%rpTlUgophspc(>$o+{Ne(;VecW&c zLLmi#>?&7hFT5km%%NTjFe-pIcg3DjuUrJ$1xxdfq=sJMZ<2zX&)DG0MzkUo6ZaDe zqQ~(-*)%EKz<`!P)>~t^v+Zm#%fz7CT^H-mTCpF zoSl6+T2JAw!R>ndRCVn}NCNDnC3DIO8f$)?hi^VzqDLZA?xR!Rc~Dj07`P)VXApTv zEF-^Tyy3i#--LKjc77<>D!lD4IQ-Mr=!tCF}&RSbg=BAj}*$a?c?wqF{@A-K`i(G|AWc=qC ztH;0Nq<^OZlM9!a3r;_Fjga#$n7W-n)ThE;DBG~9R~~0?_RL3n?@wdqG2vJ3Rtd(` z*??Rhn*B;E8b3={a!mTGv>5IdiPAf^gEm*XNDL(sKP1F$vj6q~9m9xgf8sI#^d8b4 z0jeQra1%DUe6$usTk!ScMeysApN+4La@ajHGmwCYu8SQeY^6kc(ayxc z%^J7U+4n$V(=9;`$Jp4RuDJ&@*E+xB_Q1WJ;q2^a&8*tx>-+iVkcwy~blM~*P4&#- zjOn{5aLfowyNOP0GcwDNQcclP2fGczXU#mS8mS@fy-(Oj-BfDP;4vJjA%VeFpU5MS z_(Oq3&qli-nDtcYDl6sATY@Nh=GXX-Yl+GY5W}pcp_05J|F)+Ss#vKp33sLQF3w%k zvEhy4i6F)*o>{bsB(>lq@^IG4HiP`Cj#5-5pfh1^WcI*Jrz1k z`cOmXjbmjhMQ$L=6rcJ}X%H;$lJr`}`_Y;6e{=@575{Vwj~YuITQevQky7fjr;V7x zji5;|7nZ4`EU6Zc%ND@JI>yu{^wKS+dJfj76_`LNIte6YDw{sS0is8?xwPuM7%j%) zQF6NeNkb95wgEDwy>)e$mzQtH=K!f(tMA`DAhv8~bOqM9XKSe|H6ysHlY*LUSIIP1srKHZ*#Bx27S*WL|BZ5W4ArVZ zN-s&bYH*O+y0oXz60yXzC9$e2lWK)W|5LB{m#vV@_OY_1$6U4bS;gjbf+0oAX4kUY zw*1~Lx0x=9$mKpP$>%o9_Sf4Ydt6GQt%`lH#JyCfm$1aTSV9<@PA2@X+Y9A(qdtwi zM#N_RtEF35nqsN9*7SpG`r}QVMcC#CTe_CkCXHMIIyWkf)eFQX+tR;osae=xvdnLP z+DcXI#49(#lJvX&Gw%hWY0XrLJ!Ws|DLHRV3ODGDx+YQ8i??AcwegOK9ZBoNKZ@Rg zNFuX|?5vfG{F6hwy2+(xtSuf(i_o>TGC^(8WLpg3e6BQ4pElBFzC2$1dD3c%R<65@ z6Gdj#nmNDZp`(po4h!aRK8q#i*DiQ)4ReZ8pg8VOdCn{23rU?^t?~kz@#mUMgoWvn_YA6UXv|} z#xwMBvJIpKkAL;jxAL;*d}NK>hG(pcpSKmAWm2#Hz>g~QaqApm7JaHE;IB!gRF{4V zwQRFsw#)nI;Fs9trahUhpX<``)Pek8@sNv)znS>h4SXnvnwgnTI+6;)NS%GdLV7rIL9 zAf5cIwp2`4}NtXneR=gCnBPV@;)P>VU*pG*$=`_ zz+B{dp+t*o+uPTsOpD*>#+Ua6ZDT=enxY^^%xql-e2?OpU}gYuqQJOAvQEVv?0JYI z6YcDuRYCSB`gph8BdD&B>x<{<+18uu+HL#ZiaS2wOmB~Kj{v^Xh$qR&ODMkSQvE9J zbD7!F4g}!Uf=oG)CUG9thb1QoKZ>O%Nnwql=gqj9F0G7V1uMNp^263jZ-36ur(Ulx z7F4f5Sp@XUk@c6!(m2`*13lU3ZR}Qva%0Ccx0+y~pIh`=Bq1|y60eB+ z=sDH7#V@fS;j#CLH|3{s`kGr^3o9PUk+?38GKH&NBt$^SS-HNde~x!xD6U z7`MOKT<;|mw%9;eIQOUJNvRo!HoC?}|52WQLrp`1dsn0MfId97r+nmXJo_WvRy$M2 zhQloH@3bUuK$kQ?4CCAWCD=}U_1dQAy6@7hmJL97Ojl388ZaxF9O%;m4A+)=xlc9) z9nu@Sm0?%K6s&mTE-4O&zGjTiq>#%K;k>*U#6=af-`|972)mlmp)S*5@9J5GBhNhz zx*GhIF9d)BHxAkvlKmP4oYiSSqHf7kxa5R5|AHdQ7E$Xrng)`^Rfe}M3}?~hgp7tI zQAa_>axkFmPAA5fGmp^1^gC=6lGpYTIlh#uTiV|C>iV#Q{R#2sn(2gzEob}|uU=B+nLebLkvZQ+o#Lda%>8{lxQu8tm!^CQ#GR@Oa=E#g>$p zP?kd$r7uGHlx-x+yx1`N@xr5 zI5E7)6dOderE1|&mXK4y59SAW&Anjzr{*SZ(@akBe;{}|I`IeVaeOve>geqJaM!LL zqDo|(uM{KOH1LgCQ)pK_+Ud)m-@_q)$RNMv_2&tTB*$8im1gK-v$D4(nnoj?D%Um= zdAmb7ss(u-W-=R1K3bH8{dusfSICS-mgn>sd@>MyIX^04wAl61Yn>f*Qfpp4 z6Hbpe;dlTBJN=fjX>HXFB-oQ#a}?1a5~Y2Xwv7U3E+%DZMWy97&C`G^={Y+228C>z zdJSq*lfM44s0D5#X}MX52I|ZAFg%``{Lwy;Oyx_;>26}1+1Ra#dqnTd((dw%9)eeEvvYR0OT}%A{cyW({R+xWwr;!LukU9sD2*<{n~vR(bp!p)U8H;nB5*!`q%tF^4l?alhyG#72%i>gPfcg`zZ z3WqVvlw?+Irg(iPS@U4P=D0(La2Ifmx2wS&+9ib9BKJT@JAv3d;1iu(B{ zJ0V{$qr1uQJ~-fGf#0)BEih;QIiyS*j29mJH3_!rzDMYn5-D!uoKIyIfD}aCi0ac^}FZo7P@h7D9^~$yTmZX3k(Kw*BQwQWAkEa6G;8b4b`WIN8LI~XMiilR2ND;M$rnvpYw_wIMV$=IUGEq;+l-(;nB*ywB4kQabzij1{A+CrSnM7 z&;ct$_$qTZH((HeyN_mo zQJH;uhNC^Q(K}BZtr4*wPZQ| zNvq4jId<)Qpm1JS-)dN8*5z~-fo9M*>U7G+1u)BfPyTs*nDtXFja%xwHuau*c%TWm zbouuI^G9*qV@Kq28g~(H84UxCOhb;#@l&(8-#nK#C**_v*Pmrb{VGVSYfmljyp_E2 zmQ&0B&+@&9NB%NpO8%_RGR;ZTCGd5!Ooy#QtZNXr$zt;Oebi>L-@8$+!zM{mJ#)3C zjZ}ZM%50ofR-UCy>jd7TQ)1B+yPkpL+NqBC+Q~lGt)sems>ifccje@=j_Tftfo0D` z6oui@qoHmkGF=sC`TcybGTjxYp{ti>YgtV~lkh32Cp(?Q{Xoo8{eZbUoaO}CXSO)wfN~&m&^waVMCR|H_wc0?|8~f`5%dy0Q5vTnKP^ z6h3L%Ri*CzMnA>%Cir7tFe|J;32hmdUs7sQ%!al|G{i5byMIqyfsEdOp;96ZvHZs0InrI2uJ5{)Yu!lM=+hk0-&dT*Yjmohls!@Zor=Q3FgD?MrMP-|$L;3d zA!~@YRtZ|+IRS?titssr$iwx_Ipu{B>X$$=CeOny>8B}V+Bi={a~jT-8RT{%oNZXY zMEbReeSdc(8o-`4Cdt97WjID8MifKxF_k+^l(~40R1pECe(S%xxb{ruHUGpq|S3M#ERen&_YjTrC(JcSw#r`w8jc`tZ2oh!x5mkLe+ z%7lmDimdC9?<1`TnHSd}+*rr+~GKl?Y@ zIC_J*?hD~#%pC^9+%5@!egj_rSerpeF&`6BWT^1b(*^ald_cbTWNL!u_RkR2!0XkI zsW`nQNYjPuG-No@h@(I1U@_lvl>J~=xyzMM+a5Ic!y{tkHLhHgE`W};+5^l*VS{BE zR+7Ijp?d>R{6~C^myh6P>5DJs4oIw>ACH>?^mYv!FE;KK0nu&yYu_;%c~oRd{g8zP zpOt0ufY>`la=NINWznnO%AV_ucgV`WBuD3^%_%$b_?n7Pam&yt6ifg9$nR78nq|VD zoIOKFR9!uA|LEYz)Bh!>Pt&3;Fi`R$+;lb2qIy3s_;=LkSuTp7$d7j_l72mSp)}X4 zLJlSa9%76fw4(RCk^mE|F26#HDZN(}{fmkzfCa@N(};6;oaezh*F|o$pWp({ZnJ>4 z^`rRQV-IfLPG*{+N!!Ljdw!xey{h91`A9+8PXV-5b4=<>mFU|DblwJu!0wk)f?*O) zV3l?|@WWwze3^2RJq7Do$4aLg-(LO(!qBda`d}kh_rQW)2)_)}vqy;ky@F3tP_K?& z1N+}B-Nt;}?9nIob9q20Vp{qN=1RC%VFYM1A(6806xTuq;0fEUW!uaJwe=}I<7jt#qBa8IEp-df%vE$|7 z|1uqq^;2cnsz#&!h}dGRe1ZO)Ky@$qAAIn0L<*`is!xkI;5>)8`2^;$ad2Q?H6|U` z9`f%DBy)7+-!-^|@6-K_ZZ*9x7@(_2&_Dc5;-Sne&fb(G#(?_+#EU=aPN(*h(uE&l zO>!yf8KO0M=rp2>>X=SNpqSgicl4NV{A2?qF-^1h@i?2jy6f0*GB~Y^%{BaAHlFQP z*1n^^?;VB`2Nqec6))`J#GrWI2t$c6pI-nv8FcaeG@h;SZS-tcpqCzFH^^89mVwOO zj{`My32pJ>83aWFYhl@i0&Boq;Kzu-LJ}Y&gy)p=uP24d(Aw)D^pTM4vm!)P5FXc z6pm zBqx98v21Z~xxcu_zt7(9_nyXVGd=nGyBv6hOJ8@K*hss-S^H>50+<*tC%$_x@vdSk zoBZqh5R-@R*Eq3mVz-8bFFL$Gq(yY5{f;2XV?~$@YGI3r|D@yAp`}dH6DUZ9H}_q_ zo$n_$@$Va2!YJ=xC0HfJp`dLL$RKocgX!fydZR(g515F5Br=*Ha2itenft+Sp!tn%^APd5 zPR5Rm&yrsjBiuo_wex$Yu)&|g-gtPGbm3<1btn?n<`-PxtyJ&lW86n>JT|vH9o`q(8mVs66i26kV}gE zwZqLDJSFglAJ+Ue)+P&&nLY+9x;`Wj2I*KtpfF4*IEDZ@oh038upBLI9~H|TPfkbI zNLq<_y3S~XY6Fc4*ii-54ZVoL0Z8vaXoRl3+9i7J8omXFnK;lq9nMoC-1NkR|Q`s@orhjS}EvZj$FkI zkVFB6{)SR;08Iz=x4+jSEBM8bz-Ve!UjZF}n!s3FpQ`!Fe0qfhqhRI2@Atw!4}+z1 zCAA8~_j9@hq9KEgO=8!vZ*n`lS>AQik4=E@G5dYL2ehL5vCPS}#mjR>NN{!23PWK% zT3|H0;yCOwjRg0ASx1;bPH@0iLz&bTU+}XI{xSZ z)Pg~KDB)%9+F_d?5C3K`Xk&eQ6O;+>IzBfU)$0r{F7Ea9RZh&fZI}F{ZslI>{)5?L z(I8Bj^RvX@(|ZJzflz9fI~#Iq?%ZDfL)qM*?`~w0d6O|yP#&1E60d|Jwa4zQB+01m zACA^EM26`WVqr0jvK+8^8$o-zJ@H=QssvA(gCk){n-cgkr2d4=RfXx@uUC#}7>SNd zSD^drEG<=o1ykuIM*ZmmjhY=J)*-VlT1#^Db%7>)^>TCZaqw|n<$KVX_Gz5-!3hG;_J_z2o=#(7Zt9AIX2?OWs2c|nk5YWF z9|~M7)!K5^M*4b(-)?cCL;TVt-!3Ea4*bY2nBo)f4p+g#Le^0lh{P~&>QA$Q1&Q<` zb-gF;`Jsmp=b_Xw>nUfSgI71#D}%G|tB_ItV9jZaHEf1(uR316@2xo6fScow>B-3T zE_1lW7Bn!G`#b}i=rmNjoV8Pz0K!>I#+;wiQ5IQ1ExT_jBA0%*K(>}0{_a}s#2b)D zGvt{YX399udWhICipdAZB?v^nPZe5j%&6oz>VOK~_k6(GM+Q!>r2~nwZL&a!CPtuw zcj+HRxsZlr2Ue0ykQfOcz2oQNps2q{RQI@N%QJW*GT?UB#VAJ82j*jPoPd|W_92#! zWo5i=ly~gg%*DkDxA#hFQRZm)g~ttY;^`4v((Z7GWwLsRC^+iXqvAe7g=ExsoO5_1 zx<5UHYBKMiQ1z|<^ZFCXgR&qUz&;=rGmcq}35o!{vv)ilBqC-?I9Dz}7GWQN@O7wr z(DB;PlbR`#FSv)Rp&Z+AT7{t|@h{hy=V-p>K6ZPAcqfPE08hE3I4p-|Er>S&W@W7% zYSd`>p@UfUBok*Mk<)h1I&n~dGG9nm>bq$VzcrF4$75YLt6^_U;N*HjD{+q;ae<#u8)#p=i$rL<}I-$#yOuqX4mpLNZO3FvJaLx@^ltK>@cv&-=qGr zo#L>!N&I~OyO7)Iyj~U!o0UFWaNXGVGd)jBR*{b92bKb9k2&4Hvs;4nf_in>!3jksFg91Gjhb zM^fXmFmj)?LoE;O4ca`~RW$7VA_3gr1wlu85(NIcHm$3%PTe--0zpBm&PRL==^CE^ z12OR}lz`-WnN4Ey40_FCLQ9dVTC&{KbKUC+|4gsB&IyXE28ezSt7Ld+ z6eSk_SOylSnrB&vQ=8wG83H?dFHk_i-EIHw*d~VC_N>SPC>=m_b6@rkJb*%eIx)`> zjma#bmyt6JoSZn~6y+KLcw_3ZB~e2=eho152pQ_MOr5^ydT3)`>qa&BzmHzS#} z0Ch`o8$X-aM!6Sawz9dd5JmsJ$M&}+ivC`xW&c-kxxbP@yJ4S7ZsFn~!e{p_UjMat zdkzkiwGzF6Y89us$AqLxl-1O?=}|`deeIyA9YK^xNz2Xuu0EYld)ab51VnN4cu+Wy4rI zh5B6K$w>KA3lW5&|HivjJD3dh<{uOiLk~Lk!F*6tzp(oxQ9|x|lGeGgY_+S4HpGSx zl1j&-nT4*IBrYUkAg=;lBgOf+t!apq2M~aiJ1#~>-T};U{~S~PkU}tT)_-=$9)YB9 zAUesUBF6nO`&?d=*rsn8PD5Ipel`nE*jd&!wZ3xq2R+{Yv1+*VH`kRMmf$8iOzC`EnCD|80TFu)M<& zyq^W2A6;ol`wK!B1_c57FYOlTW$RzQ2dtu5@1XzM$e6t4ryzev--~5}HOLPYhq!Xj zDG~F7FGt`)i>iWlG^`$o_He5@qx>w%-o=xx``c=}ac0(Bu{Jj`e_uWC2nl(v`oK}| z*|0+OQ>`wP-LbDeR*ZCmz8zP^!!qrW!ve6pn;TmmQ@}l7hORu`Il|Oaam_j{WjmJ;Lr1;$jUhFS9+^athliqFBmV5JKeDE){0V@7^S)Re&&$|D#DT-=}_ zCyeQ!iGkqp^VDa`7OfI$P8`6thlrW}wduMPoQ!Rusz4?Xuv!Q!qW}j9E}sj5=PVc! z<}P$N>BcVMv$y6cLvMbgQfhDpp$`hu{xWhS`pJPC5PvTA6i1d;VnMR%r5;8_VvE$& zhy4ip*ER615R-=CGy<}#Hl=tNwSG}j=HdJO55uC2rBlJc(9Bxakw7;zBavI4dx~F9 zp_dUW85J%aGGVlHuXDNTqu~^RQtqFZ3-gDF?gZoF{6BBv8iEg){)-~n3l(oSm#1|5Tyn-ux;lX z;$&VWutL_hx+i_-Dk6?MY#-BCNNn0JXKgi>%C`4}QSJRM0uuzDnO)>-{n|+ErG=L9 zJgtceu0)29cnOO~P_j#)+o|1ha<4|i$uv}_ftF|9-vGWTdXMq16hc$EduBJ0%k{c+ zRgDwq?L*nA_C&KMuF^*aUjwvik?0$+DKUpbU%GBZ z&6(OFAHjiLmx|?m?oN9Gp@E=Djt4PfU68-{A;lqU>`HX)!&`wgK#Kj~JH)r&W8O8J zQeM(gLNvWsR`OVVdYtlFIwQ4r4T#q%9J%P}rlPyHagHh+rKYOex8d4d7d3KIN?aG$ zxGb--WpI-JR-q1Cy|w0Jv38V93SOo^D~d>7Te4ZlwROG|H;6SJUpzGIT7bv*HK@6^X$KzY}%8XC#B}qw)aQy)kXh&PH_KKpc!-=Z*~*8~^tww5j3J)rX zht#%!FludgP*9BYcQS?on!#w{aiYP35KKI+ziSgJ!Yr;~LU5G2_#bl)-EBZqCLE9a z_MV=aiOj&PlA+umn+Fi1)21bEfiLB)dcT=v^wOx@8)$xP;Si94EfZj+9D*vdV#s{w zj3kB(8wCCZ6B0W)gUGKzJjxt30vJda1)?^rb~F;jxjR9(cx-l<0%f{E#c_IKafm`f z-#l#aWNi`3*UbB?e+M-%ak1^!8JTIhX@O;_K?X5Q?inB!yaZ?PGUQvnLxGng^ry%4C{3mZW>#A=Zkokq- zna(ksaX@{x+G7Jo?BcQmdKahe=j^l3JhbicY= zsO|I}Y~Le?50>)Al;w$|jIhT8k{aHAB*J;~wQH-|{L5cKOlw&_AKeSG7Y7$@ZsqqI zxFMRYpiVG|je}=QpKC(XvRfM|mjje8-9$yExAK;%wKIbw9$u4lAEa*X)`Sy(mcMpW|mvFqAkNu+bTjeLKsQXd+B8==0; zzt>M~-kxxg1%9)JxWc{dLGGM;@MVV3;=8htnP@wOn*kF8_`e3jI=v2IZZ?i~&p6tl zbie9;#{Ts^-wYW()hn#n?y$~`VsOyU3qLRXPP?dlW|BSB{-rLl#E*=vD{Q8LYW9uE z&NY9fS#iq%tjOCfX8uq!dimd;%8jvM%Uz#3o`xZ7C*g^p%fZ#1$OB{kE~9(|xK~bO z7tpH+xSF45uxi?EemvoA2U;edc;q|=j^}gLfAU|P3i-QO?vy`-jGb44eq8!J74u85 zSH=M=aPFlSZl&Q3rB!z22`ldv!;3amakOI8p!z;HhJ4-3tPx=vj^^%K-k@`BF2-v1CL z*W{`5CIy?erA?25vk%|rp3eM#_x}%C8Z2Id+iF>AFyPA(L)M`!~I{bR66|s%a!!&+~M(Q zF?Ln0;|AYGm{ZYXt=`0|t;0v5reFqI2u@c&0iY|~O4k{RWiDRyJTo#%V&9kk9}GXM z{@-;!LqDIp-%~$tKlM`EW z35xEQF~``5?1nO+o~O$6e?d@JO_sO{$Jf}>^`QiLUnZ4&32aE-ZWhkg@bPasy~Tb19rQQwId1Om<~ecNT{s*dySgB~;RI^b z&@Rj;H3!6Vi{q+Q{QkmOb{>3KJ^X64go(2AjITJ3i+j(qio7^`yfMV59T{RA;H@U6 zkzJ?4{)Mh^B_hE)OmJ3dfuG zkhmz{;2}it?ngbXC04@0d|g*@P;&ajE&Et@e#ZLlV+HW~@qgK|<%}ccM)DzSdJDHu z+e8Tv1@i2x$E7O-YJ}PBjucSU)J`0YjJX37k}(m$&LmwR%Q_d_popCyUE;G4W4?}A zzpA}n;+qaOY0_8bFL(=ic8==`?+O<;Ga+^);f z$KDac&CJ@UqiAgnqOv;ZnH)y0mw$5iibw*pCCk6ceexk zkG{_sz)5}ko9riD*QE&3-)cIHH?K!FXO2F=Z$3dusF0Ea(h6^pP@`X8&!gcUeh|VUtb3(R2Z({ch~38Qk>~HrrS{$Axb0u{00?#( zA7L&2mDRo>d~iXAkKj7++3eNdT3ZgBY7B8RUwMmMSUz&Z%Qh}5>c$+%J1jhyAzIA0 z%cbMXmLVJjO^zVIjwmy}f|f3oKpdK`FMWChebxFx&T;yKPDHFieJ#hnLuJ4ay@nbk z)GqYD6|n?n-b$w3D@CF0k{_gpM;AdzM9Z$dOG0lfS6wTENq|hqHDo=-wxMUj1h}s# z@r`b$TxmhUAM>`WT3*D$6>`b_*MlHjUP7g@FmFMnw)T+SGs~E@wfPJW5c&pVS0$U> zhGk*kFIyMbxBd|>IjFawCwNu(>CQ(qzxRI*G7cQDxKJ%E#fI+BrYlFlMX(aqi5H_kH1orz$MWsr7CJ) zLNF0%l^tmB7y*Ju)e|oe#V-A!(J>5v30xy3U>MxbVeTRc_wPY}c7M3%-YLkoAmh6s zb?RN&3YQ%5gtG~EAITt%{aT+D@I%yP*gV_6M%TfY{W+v5)aOHWsvzCE^=}5dAC!k4A65Beea)zJDLWB2~lgHZmj8en>pex*RF-fD^E4v zA$>*_%!v%K!|UpUx&@~jEs_fCu*~kp_$O*PvDfP&ruzn~8Rbz>s9zBM__OQVD2%e* zn_kWP9-0kb7Nmt|7f$OALN0>uq|3>pCPXlQHJc*Yv1T|@!^GZo;&^Ee#{YV(w}2mE z1T)1BXGTN?!ruO~OuxbLj{txn_z0QERW5T&d&XZaMx*liRN+ZhqY0yuI^W@*>?WRD z{|Xhu%Kc|9_S1|NYr?9<%oq$dt%o9+)}?;*N>G+_V#yUg(Ne>5;&XsqurMTCy=Le&v)DYpyd}KH2Hb z5YRzpxm`$c(Hb+^vj9Uiq#d-eCHL{51=YY^j*O3ySg-wKC> zoQs#jz`h`1>h0|Q8-LT0LYwV-Mv#w}{T|*HEGk}@r27SIE|sA6cJFP_a|yEe42T8YzY=fNsQ9V$t;>tnKPvja z0DeG$zoKEi&GsY*0u_=rW2Z0(@}Sm434ac9e5!Q|?6YCe%*cw!Kzn9Cvh97hE;F}@XO@^-r`F~JmN{&i?PW`9{e~_ zgKa%rxM}>xRc*mF0pQJ=upd%ZdjRS0;~;>_tQMIkIY_AggMAzAy)qy**Gp zIo`>=&Whqh74?CkGeF(Syvx30N=nEtP71$W_1virB*)Fp`CTP;G$>G*dQj^b6h<{w zI*>}50W(iBWB&3!y;blmnT8u9-?b&PLM&2E0t( zr&9!GHU_;Bs298s=cz2Y`vF2c_*#U+Au1+4EGrs=5h~X^6t3$<%~x@A7AtN{o>#yo z*rrAR$Xa?A1i5>Z{GP=}gar>uf_s$7d#PZYuf8H;<{>qM>Vd)%k3V;IJQJfP6cv(r zfxY0?1XVABn5MoQ55K> z$pw1_h=`8`JHhLwm8tr~r zf1O&Z?5ldC*6)<{*s7OysYY|WYu9_NvUlBXw@)|BZawVRqu{-H&(1EU3zr~@Im2t!he0py z*MnBC*9Zn-s}ppiS}Tf&!$!NiP8?J>9jNc+Hk!!+XJE)+puRJsFubjeohh56=3$XDfCsN-Nr&FGeiRc`&Y)DL2r;g;(0`w;lx zOhS~yRrM3t3Fl?QC=u}(OmqC<dI3QDKe2Dc@I5Zqb zc-LW;!)A1O0zvcQLs^%kV16$(?W%UOYQ(DF9$N(#950 z5EVx~ej7{1;Z)rF9(mdhap{vy_#?Qi#j;F;Q5jZLdO(6fc?A%Hybr=8fk=-eM$ui9 z>I0!ewe{6;23YpUJ9eStB@}NGz_>6ipSd=b+)0e4BRhz+jr|a2I1~G`+^vm&EH+fz z8l1dJF(-V}^|`<{!!C9(%3Gc-rCMT}QsIJA%Q0gyWDX*67F>rwJW=5#lk_r9Ka2sQ zUGGTy3lCi~mIm@^NlF*%61iR-R@{$UtQK;4z1xntty^)x{5#U{ z=vVQ2eb9=+ZqSHWEojy2onX*saS%7dcD)r3n(bD+0yfjCl_N6{JC4w!S&Y1SguxbKTbk4sB}wlW5SL(1 zw1~X<2X}{_cdCGFuPtVAgWuP{Z&Mi#lEK!)LY&z{o9)m|P+g6YX$i*q$>J+`Cd`)f z;#2Vyt@*IYNKd>y?t4ix+!DXyz)ep7}Ny ze(};+Xrq1Zx)=Gn_-_jVCia65fF=u6DFQGRRPi*06pJ&yC|6vHF6u}@8BKMLvCJ{( z>lPO|CKZ;vJmAG7$>=J4QLZu973Oyr7Pc^rkHy)po5rVE-)&PKAKx+9X*vx@YZ<4% z+bkajqx%ZOH0thgEuw3k&|Gz)K@Azf7-g9lG!qLxM^TRm7VXQX@;!blAw4zo&=+|nkpwn)*2klO+T@P3BUc%MgT$S(FRpMqu ze)Ou;wM!!L1If0~{T}?-{t?wn>9F|bP4UW(o$566?r!dyVyPB)qk5y!4B~pN7qs}# zU@&O3f_AOfuZPW6y**q}vGjDKSh~T}QW5c2I#g9p%SIa|wNba_X0vf9aaiy-4ka6h zl8r;jlx-YJHV!2lhmws$$qFl@Q{GiHGaF0XonHu6lk{DdI0UAe9q#GI4!5zx-L4%D z4Fn4K3cbD*AQW01{iMJ!Y%1LWGo)wgmtkat9e#x-MA@`&}1y7 zD20?jsJuM3*#Xc-F8Yk*qMMOmh$q_*RUeA^UZD%Bppu*rFru%G*K>Zi$EX%^K|a=wT9$u0OW(R{H}!-EOP1>|j?`?cHs z3MGUE-cR9dnhJRcQ-?pn=F|>SPeM0c{x;P+xClQc7qg2KejqUg&Ukv1a0-zL5+z#OHF03C} zcJ9|#@_BRizKpYXM`Dlj?D`U#!XZWwS2@4t$<+m*yFSE~bbVFN_04ka+g9zd*yW)> z=C5Klz=C#2(SC<~PSOt%B|k5b+0*pX2< z8%O7OUojPI3wA_0A1&UHHSI^UAnsDMua>aumh_~wa+n6pfJfI>3iTvL^>C&|t8io3 zv=n-Ll_%6aOT&@ieqgP}KS}?dm}yR@si*>y2Qk6sE32}u9v-D67M$Y^y&H$_)(CkKSPBXzWg-3iyk~M$}6#sK6>4z#Y4d4dA$Sbs1)83a||nAJXx| zsiD)S_0T64qJtJ^<@_O^qQ|lBJjKkYU{!lZtwGE(p!w=6?-VlPX^)=rGx}$b?E|u0OU-CzF|O zoz5fDA;`}?<1}o^iWZ>afYMxqeO-j(0wo$zdo$Kq{szB#1Ea5Fxfv&WVHCCW29V6RRpesUO0@S7gowun#SJFdu zpf(lg=-;LS9dFm%RG>>X73iv=Q&hPEU2|aty5^<=-8w7KHE*B-ozOMWMdRuZqV`;~ zAfwccKnBCABDo1u6Y&>d?*ZTBXxao19U-c|Hu9IW?#!?-P!d9{tTngk2sf z#j&PXfO*qPP@Z6^d7~S!Al+K+y5^nMu5<0bNgoS(eYG95-=N!(PNGcdQqIFm&LkjC zXPy>E=(fqqn|U0$)AtZqE61Etm7`OZO@kc~+dB;oV%j9(sFAySxfIuyjeos)sG8k= zqh9YuLELY&f)Te4Lj@vwVQXls4t{?z+65G+xXZ zR8Pp%Z8e+qE^7pA5DkM?zugOZoq8O!hQoe$71J(t9}wr~r60=t|X{WUz|KT!3H z{*mY_DQKE}`y>AW8vtAI6IlITV;_`hpZ<8H9{-MI@>gFyB(UeT<$LlvA4EPa8RK~> ze_J?&tEsXi%GMZ*4Uy>rfH(QC@ct7maWb#&rA`w}?CM#$rosW|OW5ODanMcj4JV?T zsJhr})qA~RI1IWWzY@1P{cg}7aI9~H!?54$gu|#dB#Z4@D&7e%wA_aa0G$d0jo8lZnGV9>g`(48gv-v)jfXJ z8-rS-$-3b+1_#0Ke2hj&4(6$839vyg7CGH z_Y%B;WRz*l^82vTf(6QzQ8*UK$K-+wf;$Cb7o0dKj63tTRB|rmZ|+Xn1i~f$GC!fp zwuB&*IhXkzZOVizAozF~*}#7LCr`cMY)pQdAj`AtZOp(EBF)&_(8$}I?>snn5PgW2 z@wQN$rJ|?B?+R3iCW>f6o!y-1+z$J#1{;Jy)Q7U0gI+7>^G88cZ#M@~*z2%*V+F3u zxAVn#bmd~afG6tRBIa9JC;?1A!t8vHkn2tq$5ot=Slffs3H^mkP4PbQlGrM;)cHO5 zPhjNIevo&HR~paE`Q-$8bnt`5mjnuTnu+Z*ifQbHE@R*25qiw7SCXw66UT|8qJZT74`a^M!g=iyWKEoHT$(-&})Z5XV?#; zdT-e1HCn462XYr3IW#=jgst6kBwj9Ttt@fyTF|~Cy<77Ex$P^V=7(HJgi$dv2;Kf= z0w(D!$3C)XHkA<#%#$oePq*Z~OfxQSj+l_NQM8q5Lj!MTM+#Hw>zy6V8;^GuoMVI0N<gl%O z5dQOD{_DT}%inm51_M7LKOpt1}~NO<5nI*-zq@_^Hq$Cm`6) zxR~UvbB(q$K3X*sVbR#=EuE_+GQ-H2XrSMUW(z%t$2p!%f(Jh8UcctW;gwEerNbeo z3V?|m`?e7T3b}cbuu=RxG$b>{q^Zfv!lBj$IIW@J(7Dcxb_zmC{9BCOE@rBMcW$#* z+q?#qBm>xRwKZ|Is;0>eTU(8-{b|ZO0UxP-Aa>~t6!BZ0dq>2L0bE(!yYd@;QAoF% zwRpSOa;c5cKU}am&~&8@(#NQ_N%|M%8)detvRU-SMfi>dWL2>8wQ&A#t}_~2_MjA@IY&7YzfyQZ<#M8DU9vTq$L~5Eh zLeJ~93OyT{=ejZvr4ZaVWFI5p;TIwIEMCF;A&h7%zYamf*hqD_C_x_Wd_~ElP@w{t zTZ#DL)U@Olz)~%XW<$Mm4T^FJT1CXk=XzbSqgz{6xM{gZSzhRyQw`5#~)-QyDuYp4>7MYfp zf7SrjQre}08mU#)GWgY3g#@`s;eMCS(5Q8pK+ui{s#0khl-_qv6*O8vfqDyPJo$lP zpZfX=(v5+77&}p>ts(!9vOq$@Coqb+a~_?j0_8H4M|_6KGSZncclv1b5_u5S^)nOs z52bxAK?CJPAK^FN&dyWDHw&zo{GWWP{fc#^R4ymu#ozrm&F)AFM7{HyFSXvhNk6?> zt=H%_<9ZO*>dl}P_c}qJHTZA+K5N&z?XcG-I#y{Er=yU4;BLxKXme}0hqs2iz5v+1 zS(eZz%IC?P#zhyEFqTGf8Rwky(I16{`_Uub3*S(`)T1S~O=$Xe{@Ud{F^mnL?gQ4S z58@VUwS!JO3WL_5KM2BlKMLyIZrm9(yK%49UE$p8S3~FNH!AJgL|}84H)pxZS=O(_ok&6@h z`$@k-e8LgbkL~Tx;~;;ADsuoCWBEMyCQud~wG(m=?fKeesm+dxMV5^f`Kc&H(%6fN zSu1Avskoe?UJ6a!fMy%qc*R?>lLt?qBA$7-3#lpwGo6K_LyCvmmqn)yqdE?PyC5Db zNg>;|dNZJ3Q}J!R`L=IPg48PDGJ}6WVzYvXJasd1PLz z$b7|Cj#7|epZv+u^S64{G&-o1aSGLKyLrO`Q_%YGEdfx2pRXvTGTZmwexpgmTMy-& zc#DVIMk*YzmcPYDc|Es-XQEOH?EUt(Cx(#e*f2-zYN9KAd3=PTjdRP~Ye)MsVf?5? z?5$isj)ma*;0u;(m!p%fAMQT%Yui88-fY9K{Dv(8uR@kEr{Ao8)VN zGZC#Te!#*K>#G-{Oo{7D3!kjvM3y`eZcxzuG;U4z14;S}5DsD#bWUV`yc^W~7&bMZVuvT2_H#_a1SsQ?3$eV?t=yzGzT`6;v;O9kybRFkj zDdWrCn)}*I>9Xb|MTEbpH1i>ToNI+o*ykM>1Y>~?ir5diIyxfX%074mMB~D?gv^X6GNoT`G z?vjlN-yyMd-Y9t|-H;42?(pvUfv;ftArr{-_V9@(Jf;jBD`<-7`E&LG9J%l_sVs85 zA=e;IcP=j}VXvhI`uqP*`k&&rw!-M2|7&T>MJgMGSH&s&4yYA_uH?lsM{#p&dX{-X zssacu>L2p^PI#HIZzgzc6_6BlGz--rg;jiQ>L$bsr#7Ux+Sa%5xTw|uq?Z^en^fXV zM{F7f}j`q?Gt4bitsb@P2$y6ySAD>5nij)Xc^_S~g}S zT9=$FpYdfIq#yOqMCW#ULI+V#ZGs=%tE(ce+2*>qxi0>J@_9{M16pLhGzp6NZay)w zCCF81iZxON$|8BQ>+-DTqV(k&kJgfiA|Jq6fesG>H=?zxM12=mzDyVfwhLlt-Nzbj z^ExJ27lKQd{g(;b(69{++t9Etf`%=;t;jBY@A&c{jyW~Te2d6Qa`<^%Ra{iByO8Rw zBjWzY)(jtnCk+wZRBLC%|R11wR_T^5C>_ z@ql7J_Pr>~*p|*5p#vQFfBy6T_P;ww4rt)a_AS}|@Bgwug^H~kvh_dz*CJsmHgBuW z|GR@$!P(_Me*UMwF3>9d06K+zT7v7dw_eK@Roy=5S|t9wKE=HT$*gjL5Hyj9A=x@^$rF;)%}yP(aE843SlFDM!9~>@@{0*R zUn)ixtq}?Mhj~!IYm&f8;lx>C2KJ)_-*s=G?{X?w6n^18V6|K0 z-M}p^+=E9?IRCs&rVX2o8Im-s)KaYbtFOF%E#S1>ux+^eXU|hE? zO$$TIS!H*rnlmps9fS>Zb=do`3vxtRAQsW3t%!AaQQ`avuc$b zg_C#doJOHi$wHrDYagsyB0>NveqpXg{*?|uNx?NcxCOd9r8BgVw#Gj+508&eo^la- zBXQj#FJ6fcuOM-$?cGRS8>wp}b*&*AKps z?8UHf8v*bZMS_*YffWQmzOfszZzJ|?#J*L;z5;{LL_eo5oN_Vx_Vo0nN1s5m;ukkp zPGKWOe%?~#Mqn&hOYLJQg~r?Q#zfD!*QVPd`cI04fv|``drvw4fDGtj5i-68$(W6T zXY%ys*~~}))-vtFh`-FDb9NEp$Fevm6$Zs>psJg_gGQEN1US{?p(Ibl$l&G89f39b%DO<;Ms-?+9) zAPD7qx+`%)!THb^Uq6&P8$9&A5#LrJUs+2JEso$yqoS5gi#OKTw&?erxj(>@A#4&(lfiBn!}&0L9sCGAclXPnQ5Dn_a@4qzoDj z9)1_PfUM3}Zg_wnCTvozCBI9&gO(1d11UKD3?v=jOR{Xnccg;I{b4@AO2MbDv(gU7|TO& zNNk8NO*QxwZN7ORjjHV^^p_l2>}Dw-U60>55YB#NOO5)U+V|?Y_(d*?S_FqQDdpO1 zPqH1*>S{A~%8DQ^YE6`E=pe_ZTDQO`TLxWz032KjWylp2Yk_ z22%L`LH4kUSZ{YGc-N^|K*gZclIM_>$)mO$I-hmua-tF@vCO^PC&5<8C}5YMy_BoH2FTUM(t)a40%|j5sfo}<0(!E0q3%_?A;<(MBhb5SuTiV_gIbGY z=pJ9+QF;aKk+QE$FUx6U1e8x{y$jkbf$HV7K|~-CSEdz3RMXtp-_dU_`P{Tee;iDmQX^AKUCiX z1Q#j4c_*@9s&{bYVK{Y0$L)eaxfQ+pG0R}Ss3puV<{&NcD?G}%7^WL@F&su82RkvN^0bc}BO@Y}UK15wJlt3|jqm zFX(mZanKqL``uyGjUu*6MLx@VXsOwCw*q)0W(M}ABzwjFY?e$w4K58p7qihcIYI4s z{_xLcsW3!5#6I|`0Xve&+2Fr69WeOK;4Q2=U8oM;^P4YFJq?gdls`q+2aOV--$R+H zRCrwA|K&ui8W8{#!4ArMW%fH_!;nwwwTO2AMmOp;JMCK78uV7!VSY&1i=p93QZT{bG>q$I~ZHGemqJO!Bd(7H)kb2E`5xq53-)?^yZT0WV;$LqAmfM7z z+X$m)&ZHtv>aIP2_wBcjE-t*{IL4+IM)TcxK%csNr?$*S@bCWM27!GY{Lp)-h9mUF zP2q{r`+9N3J=DtRVt;P<4$5!LPlRh%@ul;H^I^_x&`p&b?zSXn@ioZdIl}aoZ)M#t zPA&hn&ZPnGDM&$fe}IKgITQ1K3yyi7;$_QrE<3b6&D20*Ix4YRQ7pY(5wsUZ{SF&6 zgMPg?2wGvY6AYrL6~x1KE$$6low~?Px||5AQcY=9(ID}bdM+D(;E2l)(mR~({6J{lr#8y!mPix-+w3AH0({HL>QDhg;^FmD3Q zL=RtI@so^4)yD>a-W;y+Lw@L))JCy**E>z+U)T;H_PyvlO*7{GF0bh^P1CaxgH&+S z^a43#erjINsYz$+CHmGv7FJR}%}x+>rJiWE>b>4D90uL6)(Bdi zemCe3IQeLV!?54$gu|#d#BU=u8hx+a;tW?h=$7vG_)cj;)XS%ed_1F?HIN;eWdu|< z8)zRNDcu~tyyREHQ$l?{4{Kh~H9krru?S5y+}NP+uiywY=o_#KCH8#)e0LN_^=j4 z(QweL5BlL?uukBMRHUd=vF8y%lZ6v$boeI3{aVm(v^m#}no$t;n%#gkBNoN2UVqSt z*Eo?=rTkqq0o8Kh6xg8A>-C~A=nlh9&|XwS%4CI95BX3@N_JUC?Gs|<8*4gjAj5Vu+}G-6Fi&h zlgNl2M=)%ZUR)$oyeNJMIVk)l3b#?Pw}faT@uY1G(({3Xoz6~x6{fLD`dX}O$$%O!YZ;{4El!``Q( z_s}RAM~v!oB@;fy2|qm{Nvx%AIaI6Olz1B z*Fp_l2I9@-Ch-r@ausUOr+hhK(Ex&7@0iaGZaJ{^_TF;HuV6qa2!-f=%XcW`{~xE` zcgJ!kM$7;oc9@0Hx!Iu)Ky!FTBfdC%IoLsX8h>obw7EuQhqKbPpp3Emzeuxx2@ z%J&0sjvo=cqH7BUuECQlj`!ia68Vy&pUmcqm3kRIaYU$9JqP=ZPLmV zG*45w81h}wKgBuo^|A1mkIlx}Y{JYsifZ3ak;XwK68e&Cp|Llf$z|p<%3wB_JRHu! zs3MwX$BZ^-z!WnC=9Tf@MGS*J@Xn6+KmYmf{);`&th^fmsf>pZ?RR!;l4j5} zMcGgQG#-8BS=UVCXj2M#LQX}EGvEeLS0=sGAkiE}#I^!j0J_Wd1dPTpe9j|cPN01V zy?{xDW0EakGksCh!3XvR0z4fo6d++sLwVeH?TI+Ajfw@0O3jyE?RGmjLrYji}<(JcB~;)4vGu8}*6yMqrE5%Tfy^$03=@DX2aRAbNypLDDk>b200jF)Zw$?W z_mZ=e#9l{O_A*t&;^h{UO&dgIVXOtVi*pm!pjObmIIErR~O*mC*tT{ zT=J6(@n2VYFBee3gVHg;Ql@;5KL{dJ+^Za*S2HN9Y>)Ugzmdm>>E+dF3TB~k4F7$_ z;)GvIz~4x8^S^Q&8gt47o#2kE2Yib!6J{fxnlvz|OCTOcLU6=U4bErjhNXVtnAFC% z76mN}f#%5+^YeZR+Qu7H!4z|GS%^FoMY9#+Yg&Zml{gBul_RPY57dQOCwBb)&hbmi z`o^uBgGH40VP+!0u3O_@w_Fhyz?hNE(lAP>B@ipFd_xbv%k?`3r+*?A4;-~QT^`Jm zk(6t}y21Fp5!F?oh2wPV*P(YlVMBD|^Q4D(oJQGhZZ`tQa3%oR8?z6=kY5S;smk`S z_keoO0uEasv>^dlYqLKB9=8vl(z*rUR*oZ0bLYXggHbqs2fzJB&Gu`AniyX8>%H(d z1zIH+E6H$*Q;{;o8*+&k1q(Qaf=ph{23$t=C=?D--=rDDI7@vDFzx&y-nPQ=45NK# zmoauUpxv0V@Iu+ZNq51QgYU)O$#=*lr7lSBh^hFz?Gix>AL*L?J)zJc;J|vT1MzJ; z{EjcdJ~~eTsRZw9Z|mhGjc3sm;CMvNfIeR=_3KIgD{lDn!NF)`JUaaD`9M8*7XE2E z(fSeJXx*7lwtqYatddAQ2|w%-3V^61ri!>d9W%1>5__z$dn!c~5E&M6>_T(`#sA_rMGSON@k0YqEt<}RD85c3kN;#BA6Aw zO2#XEg5v>pL0R&-;115>udnFk+pOSitBnFe zMi~U~PJOF+Tk7e_B=yo#ky*1->B#cqDEs8RdYX)*shEaueCZbtv<;j!FSQuX3|sWp zUJGpyk19@kTh{($An;`P+_%;@B;n%-`_9ru;Es{Nchj&uY@k|)U6fOf6s|-se9(;p+f5&^nujv`zMEvVH za(xg8IoAV2z!jTHX#)c|0AL&9liPq8MlnD>Sp{Sxb6XkC=6-afd&weQ>RFh!t(col z=`{|&3pkJ?KH(8{R-WN)jqXqWDhbz?%6cVOtP1f#(Xi-gXw(e;v=P$2Kq2kRkqJI~ z@$7blnqn6gH@^w##AcP=e15i99A!hS3VYj4^ zo39aHLG{KAB|B7B=JTJhOxa{ajy2GG12tx`E2EjW#Xf>&mCHe4tUk$R(K*=WzG2h7 zQ2+gaCiQ;XmVt+4XE$ zRhPZewvwwN_^Uuqi64SBOoCGL73?VXTr{;E*!84)jmox1?*s3<+#6=V&cpXfnj61< zI0q*suy3JdR+v-d+gA*;<=LnN4m`PacMBD|v+3mw^!Kw-tRSIG8)@#BgEmj;wxt=; zxAh7A{FndwZ~yW)xdWML3wSL34>)PG7bqb=CVqL;%w*;#kRB@m^Qg!tNR~|a3f+tN z9*t(P`%@#8ll&Z2rfA{b@wP_7)QFqUrl=T&bDe0GD^o}BpcqrBroRW8 z&wMS48qadN^(_;gBWQNYgn(W)XWPu3kBJ0NbCeKfQB>lOQ!m102Wy)^M!BoI-T`kI5>F9muPD_q24&ABpcl$v0jOJW@0#jppvTW8_EGq-Y)q-_AOU< zUfXSLfgxQXAtardQ{)>cUUM25PPS}>m0_jS7bl+CTX4RPayl=YRTZ??|vX-}@F^(q1LmyS&BE|M*wlW9ccf z0P_yc80ul>->ICRRP8sL4MfMz7Jjc{M~nKY`QWwtF&&n?_aHe&#j$Xkrr_`G?hG?@ z)MQx?Ty(xG&r_{G;87E#e|#%(bKE`oi^ux)e$yQ5Km8vdA>rO&*5mYpCnWh~D7@zu z4XStdkAF3%>HHTj zyFEHO4H!1BK!1vyuPPqdY;CzwN)W}KA>Hw!3M5rTQBXZP<$K~3{0 z*!-G%<+8%#!xPA$q;EH+RGQnfLfCv!N-Zibmh3!J<{-k05 zk1yB|BG6e%N9Hk`!m--*4l)EJ$&^N9pprIV1d>n=tFS4bd=@!%=f@amoD35+a$_3$ zUl_pjy_VXoogJJFBqG?^@lKzfa44e56`nh(nwyB^CjbpP6xZvuT@Mu#Og59cD>n<6DxE_xW^+-%+uX&=Vmpp{UN1gQpFvL5e=T3~`A=cbLysgT(VLAbkh# z&jx?Mh7cdDLpDA$_H~}tRopfaxda;Jp~B+gF+GR;9v{wArI-t&sqps97~vU&Zl#=_ zi-AuVVY#(l{8MeR7>qUb!2dHpF~uE2#E~bPl#E&kmoZauWc3IyvAfbOL}8G3JW(-7k(V67l`i~{tT_gyNQ<*Wbd&MZ z1CF9bY>ghM{fdR?qAjCm=%>qOGG);@r#qI_WRwgh;pA#B4Ez0Vz1Q1%k5-Sf-FmCO zy&GniA4!GbHhV}74M1S+E~tq4A~aQ?NGmsnc-Mon-O8ct)CkHsKyuui1~1b~$za_^ znPb3P2q9L+m>dCA=%dKgJdzZOPcX+Sb>PIkOTMv&_X1%PKY8_i-SdK%;)p%X)kys9 zfa6-;0e=vVybp}M%g~*j6Rr?sz~2)pjWlzE_(onIWkPL^ApBndCPEXKOatc6z2Qi> z9{D@G)14e`LH`b0su69B@^|o+`(p9HX(EGPn~(Q$dQokiQPRI(T2bkXhui&}d?pur zY3xGFqN|3d`D!ew{pTkJ$b;CbjH1l$;d<$6bbVcL>7rC5kwo=eUbBs(K-1_&>Z0>y zui_fxOHma+aKqq>06oWRdT~PLD2#a`k>1^Og1(K^+SusL#+n=ZHR|}i&vkFNsa&6g z)%tUtWJ2_jU#oZ*ZmWuFvcK=uJz*UA&wroGkOlL};(i*U8`8#W&d4X4=EZ=Y_Ezmx5L39@{P&Apfd(QhkLnzBUb?hSSfL zUswWP0_q!3_{B|^!<+u%xaXnBxVl)=H&s4roCeua_aj|nf!YU5+MtvcuW!`{a0OkV z+J=H+uv=>svhI_wA z$CgCrs4l`>QAO>VcYBI8bOOb&{*jr6@8*tuSjPGxksW(sy2NE zK6|~|b%5+O+KuJaYIMPyr&klmwTgBPI?wSbKWq;DnhwX^DcHU#K=S2k*I=G^q*v3I z_#WyL)^TIrDApF}Uy$+{-F#-+7h|V4J8SLiMzvOvP;69d8`auk&DTb?<}asOb6n`X zFI%~G&y--gjCUO^*cv_F3zKhO}%&n1y}0ID^r_Jb;#JZ~`KzTH%+;zZiMU7$<|B&2a3U*VM|8FQHc zLoIc{^K9{4j7WjLRtf7XUpSHF9j|W55X(HEu0ji_))S)okmv5ofaoH;(x8Ibrentf zW(yLK3Jr@Zt06=`3N1+4eh$;wIF>$xR=I8$EJFJNZXT5478B#Zo<&+Rc5wo-T#&5Lj;K=u2)n&}H zL{6EMT}ND@RGy}n0jAnknI4^&JVE1Mav&&I>1rmRt0Uq!kxllijSYS3k7gfN@v_%S1Xzk^l8wjsD zFZhbx7qy3=L`{(Ng(G3hrJjUl5lhxkAkCW(}U4+IL z_<!{h>LgE2tH-Q@*0Rm?E`A|ysbH1>FuSS*1!NwLPAoNiF|JG7X*#s)8z)(_UBE`^?^0X z$M_!>=hIv`PxBM!OoM}LwJAFLoY;SM zfEcDDtWslCF$)F11Hp+i_Q2x{7G7MApvc^>2NR)72#h+4PiA~D!b=d)?FN7=xs%Ee z#bgflzzIYA#GHN;%wt|?jJO=6Br_9`8*gA9wll9}!oBvgHS zb(V0JY+X*UlO=k|RlZ}WLmV9B-d{olSphW8IU;Z}y|RE?B(Tn1okbrPfdP4~e5L&A z)A#31YN0_N0JE(6G&B$aoEksWl|MVa;3S)q7G*t#uN`c>?}R_yU+|R>n5)SXnpH{_#?y)85X&{mY$mV1J~%`e1RuUF zVWgN4c$!Ec;5W;l2y;5r$)|11gel<1x*f9)gc%&B=6*^$_qMR~Z|w~$_TNwsjL3q^ zkoPpDRS9QPp_`_1P*1QqwVRDe_UiJtsop`ZF^f4Zz6eJ+^hNkFxtLu%nNUX8qvR|B z@##?`e|N%x1=`J7t$N)gV`@Q4@=5GEgxl{V37;fv6q{?Qq%!%gZklB|zY*5h8x%cq zeAW)3XHW(2Rl2gAqFFIf{2;ISSZTWoHBga^P#IL|c8sD3KW0>HI~NnkarN;JC%f0Q zVD9W_b2p~GvqK>X>Ktp5R3;(bqWsVb?rn6uHDNa$)^o@O8={{-|EK>#0T?(^B8u8x zrXSd3$mJ)~gIv$x8gY>fT3qETyX%qhPTzqx+I|!q9vrB$O9nGM7aA@ZAKbg$<(();P;QQly&yJq$?(T}T&*tGU))3CH zr=o9SS8h6qVU(DtD3D+Tic0H?I7Lknn{)nDD43ga95#IZB?3=XAG`TQ5l_!un+F?z zI9GwCg~FnAx18iX=TfkoxSd~RgxaVu;#?(CLAbM&Q2KkJ(!xA-^Lv7pLZw`rFE~5C zXy6y3WKt%JAyxjI%1in119`Rj>uEB6$71!&p6MaxW>Y0$e*p2~1c>(&xqH`Lc=wdUn|X{uhHU43)#v=j%*zHh1T zPuOUM?0N5dQjtKR|3M@hrrKWToLHT> zj!E^e9fzdS>gP;LqroU0%_U?miY3Ap=2~9d4)OWWF!GU-_ym`7o++UyhvqT$J(gT6f5AoEX`U zf1un-R*}W}t6Nh+EpHDqwIA2d+PX-gaVuICq2~kuzQPdA)z_9YYscD*MS$V~y{1osMyXUq+EraB!C2V67&l zC<6uA7?Xug;F=;X?x*0Zj#u|g#@o|9zhwROG#qi7dxYl$gYE+id@>J#gusLPKi5(8 zh?NS+SQ*d;tVPS?#0Fc#GcSRw&;bp-t90f;QuA~YP7;|9!BW-ufG}ASi<~FJ6wrbn z0F{j)LgEbgM#TYWLtI)P`Gu}>q1NgUgY_*OF+Qyipw7!%P(8A|6jvC>rklQqmQb1> z^p}Tq3qjjAL0|ABr8Eu6g`@;Iv3-4~x*gg?Ad`0#_kPX?~otc+Vwh0*#H+#>9DJ*a`@#fSMh*|ujw^}3Wu~kccbX3 z;tq+uJA5G_V8&H-dTq)h+A`tcGp?jH(sVy#<%#58ck-~-mcEK+sG4F(PY*$wpuCzhAb_U+NG&Ib)X|zG|`}rE8TTu|n(pRsC(YC^w z-ROr_*AHcjytk|9hpIc!-(iTrMv1kIifN<7y5{A4qr|G9JaFL6Mv1jiVqqs6CDulX zb+<~aji1m)i8ZH#8&F~yI;30CUU7tD$$O4Odnf$7A7q}&fZ<{G00_(GcjIsnW@5LN z)N8Sfp~fJ;FlRCWpzPPfEP#goU}r}F28CqGA$pj3=>U$iJ2B+Wj^3wAWf+k*2eeCS zoP%s<$4*@k7RT|SHb%rd;dnts1Kua>Lx~fSP|9IKNj_!S*+NCh{OS>dLA}xJb^EG% zL~n8N2&Ej+Ry7a3cUO{FtROi`^AbW>U&RRKS6CzC(8flw6H&z`vp@Acrqwb*jfquF zh40Fyc}V1z&_3 zNTI0E7mDvy$q=lAM7=59CuaKOdjxf$IK0VFAI0N)z$Ww^e|)hb?t5!Nez{{C%wG}n z?~UdU4#Zt){Rpv-#2zd5fkNs1QU%V&fH>Eh9xe4foLh;?(fjpp@Ux#DKAud{$-_qv zAA<)bwRni2$R3u-ERknLqnr|W2U6|D8d^EO<{}FGP*1$?#tBD9NRE>y2NB|!_3An~ zDpb5OI-(W?KTSZRL2gU@Uw5X8L;RbB@iiu^$Z??9bHo1<(^TjSS(2$D!u#(JNj#<1 zYg?&%6_#Pr)>GQo4b9%r?3<_AW-`nhB-=+{mk@1wu{_Bxl4g0KuxT_WUg-qCxtvWd zWm1_9;Wh}jM1;2_g4&&LX!j!8eX4fVq1)o;5sFK}2aPsgqz!Rjf8OOKD5TKa=gEGn zNwwDJaxsO;!+szTehNV)_~l0luivpuv`}_;FlVZc-^t_2;Ow0Ub=PpHV0Y_(|og6H*6i zu9vSLEHGp&F^wwxpp4LdGfCny?l8Yx*j@04dn+Apn1jX~j6uq{1AT9`U6wNl5ql-J z0N-wS!Wwx35y;Cl<7DjXaAHmY=`7Sc#rD8J?wo_%Dd}Hht#OE^ad8Cu$TQZ_QO`~u`^@NmbH8xq+R-Sv0tNL_kUK4rVZ96mkIdY6G z+_}N##X^oi8J6HN&6i}FlAU2CIB@94FNMW0<^4~f7nV&kAIc^&Ps0Ymos9(&4}W1=MfH$&gQpfxa7L z9loT#N|(R8yX%f2sau&O%Qx!Up`(-8+`CU2_;Rh+- zE%Z8A5*^TFJRxT_UU3{NxvJ{-A|(ST7*geI%-WOEjIrxInN0vg;S=99V&)q#BUK!qyLJ)~ zImJrwZKPF?cfA9ZzSSEg@0j=W;N=Nl5!qEna9*H4mbTg^d=dy_aVw&W467NXXJksA zixS_m34x)-ZB@ht4Du*+FZN00F)==cGNMUd;1j$I1`z55XGr=o2C{motgS{5)i9^U z%4*bNezG7zvQF&8yO~iRy7F1u+1d4uhrm`7BOUUUcEk#%crk4Z{fR{-I^IrB4SSS0 zuK|gULXa{j_uC+{n#sbiiCRlUFxZ(9?|lOGIMVmH4EYICT${M%U0L9f;n5x!&G753 z&KVDf!$BCff_AUh3tIK45e#b0eh`PlL8o4?H9ED3;H@%BJ_GWJAVw~T{hEtNu3SBG zT~#8>s!)ES-tWA6WVb4_-Pt)!FTHwA9vb5C$enWWLQs0=u@|I)OBZgo-&~7Pa}824ajV?zo&Dh0Z+hFAqYxUka46D72?oWBM2S zUd?P-Qn2qC;>ybqFl=sFKtV!2RoCDM1qvrkd}e0?L#C7D;w^u?^~Voii+`^B#KU=B z^IDIEQg7OP<|=FQc6JXh(6{h##08uAU1$xhUD3NRg9*RYbz6^^fF=B(lOW*wdEvW(y zM@jU~6O|$g%t?xPWUx`Bv`}RXg+5zSR#H&&qdit^;$RxkwU_koUauB&JU=v(F$9z>()y7EAyRs!x@Z6 zjTk3T>YC5WWx&>-{b|ZM>APec?@xfjLe(&Di;mMaXbWB6yK%{;^tz2(oPSihhaA{(GS|D>ZZ9Zx&N@5LJt3aEW=ezgB_tmw0S0B;VI3 z$jcFv`%Hru5fg$L!ll6rrqhz`$>@%Ml%IgZM50yb*xAv+ zQsyBXhz`mnYCj-!e42W*G4BSOlV=S1Wzpd93C;_wsS|$S<9ra^xdldH0~{p;?8_9& zY9Qx@U&RX3cvAl*d~v)BbW#*{Z{>5dD^ARPvJbyx6CqfvEna)0W4tLAwgwIcI!5ab zxVn;YSys3rBU_e_t&Q;tra$jvY_e8uq#QfUrccq$X#V)J*@@E^9A3Zt0KUeHyP59Ut{k#BzZ=bB za9Gn@;e?OB6fH zVvuY@#PZQo_TG@I6RrWdH7^Q-nh(N4xh0pW7JABWWScKqw$X3rU$$to4gur(;*rq< zCZjb0+c&MJDp9CM+*M@?)kg4LJ-{_*2K3U=31`ucPRuq|c2m7+A@67qeh9C;vhCj6 zE0s}vPtc?Ni|`$Lo3ZJZzJsO+v$DLSM0Y7V;CEikvS?|c0i*?q^_tH%f^>E7MS^df z!a&{0-sc#bmkFP%EDyMa41&S|^34ee`ov)r@?knnFOgur)?A|(vUzI_b1tvH(B@rH zI>=lf<;$Npe?IW?FW!7A5exD!mzD_1)n;G8KR!D6X+!A^vc5re6%p!`Of#tu(v?MD z=aqc1atDT6rQ^WXYk82mQP&b_ef<1Sf9*XIK?m7X1fJwkTv$;AwOjnn8Gj%ukZ6su zdI%&Lo>1IQy;t+%@G5hUqC#}A2S}i34TjJ2Kpr+VdvA8y)O!^tw)I9L)cdSc>%{$_ zJ8ZI`6*q=K*sQmLUcV8C?QWg5Yaw<}X%q#zlwy4acEjJ8K$a4Yt}kk=C|=!!2}B}7 zrHGR?vPnER0@Z76Hf#;+QP7Hpt)Nxw41@k~&kNWkBWA&H zSc^M+&zt?hV3nxA>e@=oekMkme=y3ILIG%9pZul44D(5%!$zgylz9uZ7^&FzXW z$DHZpUDa#UmpV225orv&VW-|42EA^pAGBIgKN$1|Ea*! z)+v#%P@m2v!RbvN7U#lU@34Fxc-sFG@D#3DcNVc(-xzRLk-%?F0AGXr?J(fZm2J)J zsXx(e1_3uaSzT3H5^6%-PScpL9#p4v^64$ zE`~?9rb=+s^J=gdT{u9gdT(0s*0b!TXKlB%FT-9gdr6YvmNp<2>r&cmz=OhDT~qCB zKpQ5ja4qZuspIoKs$ybUMn&TYNF@tz0x+} z8_iqO?aOFMzXv3QEaL>QJfN#2#8bWxzHO%{N8UHD zA@wd&G;5&KFBDoU0tmIWRK<13>lk7ICo!YqT;79cwmEHV1am~vL_b}{ zv_>qPjIB~yO!TdO2^zI}Gl<#cD7}K4M4*)!3otJr8%HcKn}cICGO($$J>jxr5=+*!FDmz7ByWneVrx0Qkt+`KekhL2z~%W;H?)A7%}Y+6liAN= z!ZM@z_G-F8jy3manv1l2IQd_I_RYd}hd=$ZE6u}<-to-u>1x{K5<{5^vr4SXr6g1ky= ze}c{pSjhqX{M=q;rOdVftS>re#7%3%WRW>5SPc~Wp2XwHZp#bAh}VW_vgvL=pL{# z8*|*n1S2Y!`*VR#ZD}UA)bzZP^Z*Qg6b}Zv+v=QG6_ukFDx5_lXgnKW?cJU=dX_*=2$nfcrSu80? zbOkkvD@h0|jp<`IBp`j@%+?_!#o#EYFOz{2t4kfl%d>;vEtV7J^mqTR(Th#1)mYf+ z$q}1|$!Hln!S5u@HTXE6*_tQ5@I!a>w@c^QQRuDv|t~~#67^TN?6U5 z5&YQTarxn;2Xz&1-QPl3N2y@nD9-mw4dgHBgYolU{_DT}%inmfWOcTXZhxBbF_6h$ zN=KDONwlL6pdK72O6mJNHyV&GKri@MOhJw?)e43gp4*mVi=#P*Ik`*#a~HRLIU9_U z$a}&e;Fp%g?dg7EHgvW7K4BjMtoOFC>0`e96U-SWV~@QpNOK3LSSYh5DL<~{l)mli zLiohX&mW;BopdRX6_38u_l|xpZ3!RDlF>9s#=#^Vv4D1LIeRylU(r$HYtfYlU5U*{ z^R_yIh=zBTyv`jLD$4SxSYAJ+z&mx(9#XcHi1yBk@wT)kNIZBj&c^pb zhW6KQ^01xdm$!2iccsuz!(V9f5Jg?eO$kZ_km-;?2C&3^ajr=K28wy3VuCL4Luwr_ zCOr^ThOj)Nb4eP%bd?jMXBa{}gxFx;DTk~#Ys#QC=!Tsz4w}7s7_@qEC+PQ^yQaQd(xB6H;#Q3*96c%%%*BuVmg; zI@8OqVDd?9$U8BT%o~wjUshVn#@hU~m1y<&@yQo*Ey`)0l%VH}d{u8qZUvi`8{ilF z-XAaS=yi#y24VLA@s@*DzlP~kzy1Zp=x60*Ek-Yub2J!VEt%%U`1Ts9UW|U0%1q(O z8?AZ7j&Amd0ZEDZ9}CXY!>{YjhfANK<&bizBP8>@*4B%@f9_qp4@kpRdTuk>v}BS( z!fZxLLKX!BaDi>VcpB<<7W+Bt)Xo0%b$Ce-jWN~zAgsH zW*LL}3e||mPx$etoKRHHFzCv7Sc@xV7QD$UhZR9sl-yA2W2@mJ)jL~ov~#mMwbUF} zmp}rE?l+w%upp3FS>#-0ZAzNV%|_=gj{`qtLOKsK(k+P$OJ)r8%#?vTMi4O0q=9;! zJ(-FwU(;Jn8~FKcmz_V5(g$`brVsS2{DJNrE6E^Ox^H$4K{tQGB2n|!-WcGzC8DU0 zxfP9K)G@G72=cY&urkLNz38w4Ih@E9V#21g$(S?JF?hhk z?#m=rx8;kz=J~6*zsOg=@Bz&H+I784fjo{YLg;J=YV1Y19+kVy z%VezKitP_0?lma1WZ(!-*s+2`JxM`<*Dm$F5nAR_=kvSq!N-?tceH;z&Sn!)5}cpC zjI@8MhB`+AFO)fFM4@zNio{)D8{Vt04-Qc~&qh#8lya`IkD&jb2!oZLer#7lffynx zopa(~>)ufX9_BX*{_U=70xDl0fPI#{XXCtZl|KGh#+PtV*+&-52-1WLk74#M2Meb3 zr?YH|&ho&}Oc-Dh#{8x=VpvZ;#=^9q^~c;V z854^O?Ly;z=uP-Kk7!DKQYBgNwUl`Z@MkHfPr@b=yeS08d7h({Bf2VY_3`6J?_0;I_O>9HD;)Df zavshoTjGdszc%ZG(TGkx?G~X5E-sP@2*JoCIRKJqd}!F$;LO-57U@m?5fD>}jeINl z{}4dTpUGJIC2=iKS>%VTn-;y=_gdCNfD<+Ul{tiiMScvZNyE^w@;`9slNM| zb2PaCIW`Nxhz_bqPyr1ub|5Z@k57mU|SvAg-qJ-}1o=g$`~#c7fL0 z(od6udST_8L!it_IF6X}wVP?mw+^N$Uzx0ati7fWg)2#kqT0oBI=FS_RZ2Fg=zIz7tdvq?(TUkm z*_)=ax!!On;?0V5m;e7Ty}T-D`wkQ(TsjEvONe0mG6*hMQmZ&rESXhkl`fqcmgQ^a z;X2>j7^68Pt%O{zk<#f=8N=qF-)zU-V9@OigH}Cm1pU?^3WmL?*X@P%W}{PE;m|0H z7e01HC3(Nm&s1qN#sy!vgxuEkwMYeJdx)LHY=l)OC-}@?ZYwsCPxmM2JKI)>dO$a@6@sM3ooU;SRG``@YOUghF@ycyT`Q@EnkE`x7xCsa<2VsiacM( zr?x^B?v!XgKFx|gnd;+Pb*24mHm9TlcU2eK3Kh7kY*4As>@7t_%&VuZx!4yycwHX2 zYS)!-Ek3@k53lHCt`o0lGslb9v+WC1CA_dYzOA_x>TH?b?JiA$i*wcc_oWQ@4SJv2 zKApE>6NGx%3MH0uA^q0!km5bb+YA?>r{O#DahjwfBbRsX4jGQGa<@!jX|ygz#w|kk z@G5vc9SE<~7l>`(fr$R8B6B)9J9-S=2_&H27W)W=m-+W;#^Cr&@!Ad`qI1B>(YI*n z-xk$sFIY(BZLe^OqEpM6i^i}VVdqUtxZ)mTDd>rG$OTW(6kXW(#Yp!~#A{b7y~F6{ zhJCAE75?Ei-I-^Vh?gyvzFn`0q|xaO;%2)ObmLk(Xw{=;(C>A+L9G^b!a=>?i`wDq z<@Hf(HIe9{!}sg#ajzdq?I)P7uRL}A;KV8-t^V&jwHL)W%S+YGZiu9s;)52M|i_Xa*_uXAh<5x-lKx zhUvia^t=_*!Tl9JH>QJ)>0r_AVPiVjm<~3kgWK7hjp<-xI{5re2X~a411<%NtQPL@ zpT=vYv0c()kSp)$#Znqxb%R_&%L|g{!I34~D&;na^#IbV+cRIBPQq~pXqNj!MY?o~ z&6hH3pr)S>CFOpofI1v9*!ql1tgb=GTT4L#YnhJeKIFUw)Nd=`>lKR_1m<&rea!b7 z^7fUi$F1B%1UL#BBuMw`N>b|GuRQnZ-b^gdjLSS2r{k-ObY}SW=b=o8XrJP|0{#me zc@3j%d%&sSNYAS)OeRVyFD!1o8Wpb@D5JXf4h!dKy_CBcnRJ;jj!qNOyy0&qJ-j;j zm>}Ll?C=aQ^^H6UubqVbEzSHb(LCPv%Ir{2j%2=BB1sZ&GRr6)2;@RZsXsZ(t2djk z4TWS$2j`O@9)$yf%d>UV)upD&F+m`%^0!8(tV z?7}9!BIhm_p!mi?%aqFjA*8)=VXeqcF!#z)q{=$C&@dUvJGEX!y#b{?!s%HC@FQkR zut!%UC9!*qvyInw#3d02xXb)1`U>-4U59ckFPoxHAFc)&M(pqG z6an7ZQ35IlQu{Texp*4cBd;5MKG_lz0{yqB2U!5aOYt@+##h6t60Vwx52! zV&vRI&OQRlBr}C>-}D#CL=|#y%o#wgIC7xL;54!es#`gmW{`jhzDu>_B)i@b4&|1yY@mz-WG&%lEDO!|Bv7p z?ZbzJIgr(=j|=HeXmtRcc&ZZ*JAq}jFc5QFX;V01gm9U_1&v4Q6b2VQ--mo%71;o% zIU>P^1#ZI5!U>{o{&mRN69_*MHGylnfsnhzKd zh)xTB+Tzoz?-%=;8G@5?G83QL%3RqaXmaH?Rr1>aefc5a-$#Leu~@!m@LjLds-b(A zzgBrl_k^jp`t=6uHG@tqtOu>IQ4hjqYY?<+wYb&kG{R1&vjWOKPmf>n)#QsCk;Inc z?z){_XfND8DW?w-?W880bzrsD| z03ZPp5J^e4l}2jDwMF3Y;NSrG;dk%{ecAz>C6#~Wpo18+rXdb4QR+%rg$3z(bRUz^t!6l6FDjXeMo}QW z3>T7{fkxge05^Ik(r5n6oc&}7jQN>sm>OgY`f*g}r#L|ir%&zVWiNS3MU}tN)3^FF zp>TRF6P_FtVyKH%zME-_SqDb98$H0nwbBagu?KXNa7!JmETd*er3!R1_&5IKBR8rl zC0~`D7R;*v0z$t}+XZwCGo@Rq)*4l`iT66kf&qJmW03vR`u`>3{zGunTRbPb;(YAV0^I{ zBx$Gx(6`Sb>ZD!m(JGPojx98wv+Z&zW;e*)!=;gV1tJZ^U!r7sv7hvRm`?Tzn@2wT zw>~ipFpsnd5DDT;L8RQCssPNgXE5aQ38FqmT*%A+*uM74R^N3o3w6Lvs$l*31yrtq zh?Hu94JXcf7&tuTIKHzB7y`7C8^Asd0I>bTXcTrT^e~tFhXuggYcqw}lYy>x_#zPOuTW*PzTW z<#!2@XXqcKXaVErf&eY{lbKnyFoi$E)COr!hcjU+ldSQWpC)^|CV9($?)b`E;w!m= zpDSzGdGw|8@S)Rbe&smb=JA&gkDCMcXwd8)9kq`ixerI3c4q|&XvbRqZduC>q8OEn zJoZK%w+lY#bdE;NrLGZLB`*?BVqF-?D~7cl6_F=)~M`O zj{9Ow?WECNQKL4_sU?nIL#8it1Y7Fc+3AN>m^zoCD|MHsffx&>F*BwB)CL`mH*tp7 z{?sE*)SvouA7%%5;VKg3Eav@Lx`a1hcyVYQ9ma=BNM2PXRrfD1`satQ{b&&%UO;Mi z;kX5#I+k4CjVi9W^^!ySbo%v5BuNP3n3kPl*&qY&33vi5EWbH;aDyjkK&LeE6rN8% z`QvOvb3|tlhXI};(!k3+!?+{BnYy-U$C+x zq=#Gp)W~Jf+POK)sz;m!@juAzz?cue$3Dg`*#tTS2S<6^Iy*+kQZh%x5-Uo=C4hGk3xb7(KiasQQhRO^4W?|qDZ<^5SH<8x}d}lgT zmi;xU#M!^AuJt=dat*T!1NzD;KWeASBEK!+YSP{wHO>DjL7=VYrEg*U%Eq##8WmD##LiBqed^Stg|+YlVePGs(?T&qKGsZ4&pyq}hgKIo>jdB9qpV;7Ao> zk`FRmlUNd6ZZR-4A4u6*8LVXihY10dqpiO9;tTd2*aCw`=Q0458AQZ$@i;$-EGNYd z4s!DOxjEQD$^aR{5TXbo4nqljB>)eXxdYh2^XFq82otXpw^GGg@GNE@(7p-g(!*U+ z8E!bR^dfLEnihG821G1UIT{AM6EI3V$DkXA#yqzr3&NZQjOB`q^pqY|qZaE2afk(S zIX&AzN-vyxGN&^H&!Wo9=G0-Gm&DLAp|i*vF9IhDZiMDPUxyqcK0}Py=i()v1Y=69 z-;Yh|^4Imv`wBD$b3-ugAG}Jy|CL{>g0t_EoOxW9+kJ7HiZ`Jb9C|KHn<@iLr3|T% ztnM2vfvEK+d2$o)cEG|IzpYvry^#nZCF*9o0JNx*dqU3Q?Y|$~Tmn+83`Ql>Ss9LI zGTHzsD?p^FmRd*5J1!0#MT{;IL4GBSzQ5raLx$3A!_g`QT1~6A#?8({O_9Sbs4ON8!&-eXT% zfDs6%kb?5CkvT5p4{-z^^6OkiUW6D*pfW#_tROT+F-0^N9F(>OU{Uy4(McrSNy~*nKvGc_hIZnNxIik5QVfu$m`eO_ z*=Z{j#f5(kzf=?kj`tai2&I6Lj4$*Ths6x(ID2{{25eQR)M6T(3gWQAFWQWG>o8eE zhrY6wmn`G=C?mW2{t|v2MmMyez66e255`4Q+f8B9ru-fe!BG=eVJ?9MT6>GPZ}3-Y z<(`IpZXs@qdj83-=YRdr|NZZOuB56a=D+{Fij4ZI zKuH#iu5aBYh}2l0ZCV9bl?oE_L+GGE$U!k3togAIzk0Sa(9SdKht?ZMCUSYup(9k1 zV@mFess-7c|eM z`DM2&CH+9L15)HcJiLbKC}os`;TYU&F`zLp5pmd0cXT(;L=`rFf+|EpBR(7i;Q$88 z7|e0VMN<9Z!xkUWKSJA>)*65O1Iv8m*in1TYA|FNlW@m6b1}`E4`5boa`FCN;zK`p zGRa>3tx*K%?v2Cf21Q5{)w1b6>R)`!2>LCXp2kCzm>8<{Ds}as1XuR)2yBy-=3LBE^@A%SwfAeP`Sze&-5 z^=^6vPW*%}G=Js?9=5_>|5xbY-d&37ZN(qPPnaUUN9>6#8`2f7=b~40QbQT%Q~F<} zUt&6_BDtBENF%UZ!0*}uz3`f1OM}Ho7Mc$?N+iOE$z8<&SBJp@H~4@~fj8#wYp{sR zR%4ZoG(R2b0E0X8C)igw@OF7AwOGi{4+B=kPrVq+JLVgDz&DIg!v6}Ncc z;Rt-gx?r4SmC){0Jnth8DKbTWXUqb!O1I!D-C>VbUlq{UC?! z`MmFB<`bF1Dg*Be!R)dn6?N+-6-5VUeFyK)&0U6~!X=(gVlk7_EiS8=X8N7d16Tyw zMxuAIP=t>_`MlY&grxDAthJCi?JY_Xp`6o*zOA5)IG@F)jiS#P>Ge(1;X0&1sZnOvolu$q~pQ>uqr|K+L0$j~5RIQ1P!^~PKl zi`lY`?&;;3J`sL*^1aPGil?87PSQ|x{FsW5pYlpIrB<(|vJsqwK|sB2N&S-E`Sz9U zFc)!hs%DIMUU#AO8(?~@ryJ{Vgv)Kl=wD2l;aMP8A^$b zm=R&4k|e>1N-yDvi6<_DyHZ5saM{uN<{Bae3DVve@nusc(KF7Sai;Oru6-9;Wm5w2 zpQMCUAbwVu7{9KB5tFGk7BQ*v)Dx`$H499uk0C61H!U+{9dTfou(MVOfhu3FJYcc@ z52@tMx!9o?$5-_=F{3E&ayXZ0SdxpkLaNWgGx_Khznbb}PVG&Uym5c8um)iYSKj&x zTzFf(iJX9cV!)eoUh$8}CY^fXe7SeBynN+)u61Z_LjrTwMPRNOl~_9I=$SEH5*jL^ z;NP?+Q1Y>d6mQExNI?*TKZ_5Mr*F28!G{mQ=s|dc>EufYvwxwFE^=T}+JUWGO`SG_ zbd@88upIi}SWBcCp2_-;^I)V5N0FQO_XCe_!<9ugjHSlmqpy@R8LIOorTnH|<9Io% zk)V92CKq1e8q%!V_!9wD2?{b6F1K~2d=W-E`R0C)#Dez=*cj*8IQ?a>&o0tcxVXwB zjAdLvzjX(f&)_sSJypQxd;cdgH!YHF8K+E{Aw+#CIKMwz1deq^$(LxLu}65=mMIA_ ztSHzB!QwRF;ls0-T0Gw3x?gACFlQX@AGIg-G|^dnnVf#m>oE!qCl7y&z35ehtE?~} z{x7!oH!t2(^J3YOT*d;Cw$CCD{y!a(+80+x?Q?tD3jp__%M*597}LdgLlI79Akp`s z!C@JnMMeBXm{Y-jESH(4e_C7z^T;2M!8Xc_<$2^mgN?4BN{lZMS+1_(E!Say;@d_= zXyXMr_y_PBRK+MS5{J%dP}?TpO&_c1dAbh z(Tm8RIMIy=h+6!~GJiB%2tUF~5)_Je8Ks-2&v$6QlW;P_D}pQ74!3qt_S-Sni!e5~ z?0dJ>ioSN~yLMAq#oW4DJj3(Fc4~LaPS)oOXt&ePP8=8>s5fV2g#a)qfHz;en@Mp-(y)L9r)N=qcG)Er-k*hRB; z(X49GtfH<_{qs`{E_8Rnh0S)h-Cb~@*yTzD7rMLP!mR`sy6XlP_(p6=3*znRDoxl= zS1|dXeXOCI!y&)dSVO*~l>he6?g7R>jB=}lCaBa>OV(o@_sQR<_$5@%6x`A0-?k^>>$zmb;oCNRXAW&Jys$|I zAFe>gb8m{XOi-SOHoEK}eQjM$4TI-oHow_dyDE`DZXe;sekuY+S6oHyEe(EQ6t}1_ zS5Mdt&24yofzBBxsV)*<6=@}tC;uc8!5~K^WKb>TPhN_Dgy1FEc6#70pfB4Ow_7o@ zE#=c?=G0B8rnUrzWFp*vy_j)z0&g@Av54&5b8r5WGap_DFh1<>Nxfd5UF_8{KKB5V zw)B$r*aKR6+Zux3OmQ4RL#J<&m4^+dMAhL3b+=cZo}#Gw@RO-R`bw=vUE-38RMKN{ zE+T(A^k=-p%CnGDfIps{DqqI^b3yuKQd5jh)F0S5QC8@vwvn6-o2EALXQd7E-15c^ z_~O(H<_;9AlqhrVvnj#=tU$xdn>op90p?*4PRIL+s5<+mr*tiJ%$%M=yi8A6K9bon zE>g_JF)hi|Fy;$za&w|x98>++NQ7M+QzY5NG4GJ`&vnx_$D+Jz1v9OJ??&4nXC`mq zpY>uDyFe@dlr-1&23l=!wSw)iaG#~^HXJt$l>-HqNx)I7ExZb=q%2T{;5Y^+15-Vvy6&eHIU8hrVNuD#6Ku!|dXaYJ6e0c*N0 z+gZDON9~fGw0RU{-nf}Z0Cr#2P7OFI*rQ?@4>cL;S|43NF{rz(;#k696^hecr#Kf* z6q}|IOUf~$EGyOr&%B9>SYPvMrq?vTXPY0buKCeAn%j?!sB$_*HIK<0JF%9}Y)1cT zev{FEEzjAE{?)uEqyHB8kNM=0lKLO7qkqA)%wC8J3tTJA?AB@vn=MPVHes8kX3C=e zsZJ-9_tZvy6wfafgTRlkPx)FOj`%y>W>;IrTubH*wG4bwz+n2d$}Y(>$V`Yy8~~b? z3G<&a`TCYglId&lup%$Rxrb z!oa}5!C;VlHmqNKL7oRM1H)lc1_p7UC6E`MiBI==5Rz$tzs?7TH%aWG@ z20;M;0Du5+^hQ-%)FBh&hXnv=Wd#60|7SIFG%;{CQLzvlGq0B2{T?qtq+6jsLoA@&_0GmmoSN^a}` z%qa38=YQY{8KG1YeX7iXWM^X9*Ef&)8}69C?s&>SX*?p0*UeMgmiTyVPj=mvh9Y`Y zS11BUXm>_(^STFuWkR(Ckp?Op6Z0gEz53e!3OjA+x}!0%He>M3@0+YMKqoYF((>{3 z!NV(;%k!?Qb$>99{Ic&%=h%86Qv4@H#%p| z-Zsh*ZDR5_<8?1DM!)_2--k*qdavsE}UCjrjL|>qU;zud-l1T!+fRxGZ^2>cFaAF4u{j-4|cN0hgvVJ)8}4hFsT? zR4Ki_Ua#~bP+?3aVZvq{C6aQ!6_b?az)E#(OCEt4?MsDi#0GABaUsQOMw3tm))IcQI$$i0&2ZqgwS6va+D-i5)YJ4 ztR-iu&{LBo!BESGOQD@plN}>_ z8P~3d0o@_^v`nrgJ_D!EW=+H)o{}HH}V>F3zJvb58O`Bwo z>@eO)T$Dm;p5P=8w|O#n=q$tb@#gamPO+mK5V~5M&bl3K=!m#tyE?jq|NxWiTDcsVjeac znJvM=kGw8~o;A;|Zx&WE@5Ry1&Cadvv$X$a5tpD%rUO;NMp4^0AK=vmD96n`?(zx% zK*p%)06E{@y_3xtO7lc>7%nI$&YK`cul_j$ZK%#D%HN7I*%0cuMhUe{I1kZODw%-| zoW*oHM0(s__={MLz!6D*ps_}2tcE%EMs^Xv)pHOO?zYiUJGT1^>mC`1Z?X9U!bou) zJmK~^-Og&c7Z2u4k{U^qe2`w^xD21B^`@wYbivv_)?_YWQdPWg5I!oJNByG6YJ1D*VZKTJbNiEBj z?Mp_I=;bEBt7+a5%f53}l3ROChz07WoB5Bp?t^(AfJv)Qz?_K*Sj3P?N)jpvDp+Ce zG~uu*8|EvP**D5BYp@Rb#KD~uM-GQJcO#)= zcsk=6C1b7Cr;w{T!=6wL+!PK&fxx(WgLpWKBGqMQ8*e~fhScR`pMd7c=`WIPYoYRguZE_i;s z!jIY3rC4kgKYDo|HF5|?$)g2Cl9o8_SjI~)g5uwbXL%L_ui;V)Hw9nC{t&#jK_gMw zVd9q!lWY@ab72emI2*lmYhwOSTHTRm{4)@LK7nvNw9YQLZN-D;Z8uSY*1R&92sFAw`a zpMxnOuGC`M=lkwZ91LZbh_=sF7iv3daq7YofbR2gtji+w@9(F6m?`E#pk$* zX8-DMoAIW?9hoq}NJv{U0Hqp0Nyh@ArkgKQPAu3ADZ!NR1PU(*7#Vauc<8L#f%)$8 z#2}|Dc5x8(0$ZMU>Ml>X1Ve7@)F&xdXe@AXv0HkVcl5I0oPSVc7vyAfwNnn zn^)&!oAe}z8}nj1YpB>nTO%Ob!|K6Bxfp9&we+xYP@&@oKX1T>c8pw=XsqHVBiPar zTPK}l{0*44Rg#XGK%9QUwkIyy*-P~vHtl@~DJxT30_4VQ>pSTJ&JGc25oOzyCfual zV)Lk?@PdhTP}(>P2h5AU_itd2`eYu$U51U8-c~_wbXL!-EPN@N#3Px%13gD4nw zphH)LeAAWWE){;H%g-9I!#PTwX76%42WE*i8JchDyTW=-=L!i_!18}kM2yLN{M+}1 zq0c5D(1ad*Ksg1za;XerCX>$lmK~vL?EwES&oOhBVQmVjw=t?28GEsGdhB)Vr9ZKUfd~N z&XfkWZ0FOlSoPVx)>F_(*$xgsstevKK-9`uf^5&x_W&l{>BenYJ2*c#T35)GkXAza z_n>+*_dTlgp|CN$VXWgRH81m0DAtl|7H`FQ%yeyS+|K1zbWwM|I6u~aQ-DfbyeYlpvX$3TkgTd{U4vISfmd=tj1<^fE zFMFQXPrb0R>A>c$k0H%VtlH=n)Q<%kG#?B~U?l($$|4O_P8 zlyH)HmkSH*qDD{aB*BY@-hz;jrY`w{5%$=Ou(qD@@q)H@{5LO}Wfgx!IZh=O)w@X8UFbF;#2Z}ajrhiX&u85)sCNCP6pm^Vk-Qy34QQhic;V@$^(J1tA z75}v34iHVLt}W_-<$*sz3x!Azq5S?%Wj|N^lpzLx7J7!1LT92*mqtGu%?jQfwL6Kf zzHMvu*n{vLbPjFyI9>r$0cV|>%`uDgemCrRTyv7}T0EJV^O#++$e!?bL=!#_D&Z_P zWcrCo@%+`hyX}?#AIHWSqdi<#>ip}7z7K_dvp;~ha`vV^Zf?)y0+0#vZZ&Z8I@!s|$?5-w%JZk+Yc1sZ z+o-$qpVFHV;s%FAlE%0B892X%%#HvrnNk*U&l|hPuouyN<*rCKu+DE}Gq>IK>sxnc zHptuh9c->_nXTZLAFR;+T(*v?00j(^yBl<@VP6b=?(ZGCpImqT;_%CMNW(jBK7X+r zo_0v$s*eGD5d)kUm3{4DXG^gbT>*8!d*(A+W1!0U=wJnj_D5u0Y6pls(l=%( z^2tE7V-LO_zd7x5${%Bz8R<9_flv%1uA*;Ue^JJ(=rUA}mzZQw-$D3F%T z30*yM*pt0M_Cpy|UkJl$aDo&%0e21@#9lP!qrRSCfZ>0_1=+TRpk?~Z>gcOQ?^FK? z9=PS^ZzrtH<>9MLY4RlTpo9#7q2^XtpX_(^@{rhuFg~jX*YV(a{Q?m^ess0BYsWR_ zC5{!8wG{;P+o`#xZ?&>i^^mdi@qD%T4EZH4snTM9*xnD$U`|msKE(@ERM{beb4?QLT@xLk%sVfiJj&~s<2y{>0Vj4c6G*{P0N~Y{`Ojt z1DU|fl1~Zxp=oXzAX?;W>*@?#Ysz9Mxt^UB8FNLEjN#TXq`U{kvbfjK-|mM7X7u~9 zb!qfxmTnez9Fp?f$8~ZFc{zK^&9pR1&2%+RWKRSjQ3@m5p|QfEl9WLj2C4$pkXUdo zRv!79N9J25@qu2F(oZe)LB~)azMw>)s7{DMv^0V%7i;Eq#TPZcB#LYSt0!w7ae^+C zL^>*P$AvqF-H}TtuD^GhQjIV3xkElUgrQ6061cAO6Kw|9*yBuvz-F(}p2@)8I*Xg) zWJ{3sl+CIcM3nUu&4^ggJN%#Vc*}7iX`W=VJt*|>KkE%EpWQv$j7TjQkrok+pPnM+ zJ68AlQKm|<^-ld2mP8wTtl?=sc1ZEPN)5JljGM|n%XN$ACkO_5rEC8DscEeS``K%M zMX*~1CNa2%3q;Pk}Di1hZQ*Mr+QkQ zlpTWDLMq7XMPOL#n3ndO7?=8H7Adt*sNL#fWD(Ryfewahdvy|@iBacOR{iEYW2wW6M( z!~Hdx81vz;g99})s4N}D2xYq7bjJZ}9?36Bu;zdZs&E)Pcfk%DaHuoi*n0H>J?x`> zKsVS6dbViui87#ARErKZs9j-LQl^IeH?hQU%$Nf!u*Z0@f*JHZXDG@x8$r0DcY=7a zg6;nag6a2NMz~Ug>+j(Nsj=Va&5<*|2QgT|Dt6u#{55xLV&8BJ87)LM`+d_t%6f9+ z9mRd>P8%fNUIP~hB&R*V*3M4kj;x759?AwhK(&{}=E-OvPhXHY;R z^zU;t6_KXG)z-K}1EVboYRithRdH-#Q1VG=xR(tG@>(JG?xT4g5NNL?gvV_!Pz|p& z<(Y@R&~!JVvbUwH0yrOwXCp;0>7Ro|nuK(5$wz5`z#~%Pbq;v02}Eg^{zoHs_g_UA zg~$>V_2oZ5p;zY6FB|R0ILj%s!4$0etyf%g7YS^jAJnE&u`}j-!?i%wL~D;gHW~~e z7O)y3zqHwgcQ=jD5QtY|iud3vcT3N};l5bp4|nYn6@>Y_upSi3)fsNPCjRCz!!cj+ zzU6%yI~pYj8oqMBO=HIO_$9_aGU2A#b!hWcfhdbN3p(qtxJ>%*eZgIKeI#trnTU#-&sJOcJQyJJyKuB zifKs5x}!s|JP9!`rUX+bgW>qQbIyi3f+l|myX^m^V)s#sui5>qs4aj0ZsBc82XbWM zLf~xlU?!A~qpz=o{bf@A9uFr$x`Mky-hb82WHtkg$5SeaD>aPxJ32BYH)r4vwiL_1 zr#0I_RcjCNOYVstFfH0pNM}%UC`Z%Lwf^~B1%TK-&P}f1%PkxPB&wBJuJs}YVATMkRDn4;Zqd^Ox1zG zMmt7It5o{R+&0i7_gs! zvqY)Yt+g2B&%2aMPWud#uYcG}!ajHd_o5!$;$ugA4GK2SDbKswltDc5PyWt?;NIYa zUi%Os#RZfA-VPgc3cK@U%6R9Wsy1DE9qlH3yB%4CCGz!$lMOKVp;+ac4TJ+D-T6?O!24e3dQc`^6JgY z;$voyaLUR#xOh?X{~|_dy|_r2*~IQ@Y_5mtFu0rpN%A*hxx+N_!U<^egYeV&*bt#Kkq#_ydWe3K; zVVfKglGRwlUz_GIV8 zU$7&REhxX+X0AgrpOxYt5>d6=Z0YGNq_TXFp~`4T57kefiSBxUjehow+^rWz8@1Y2 zb|Nqi?w_&2-ro&!7c&-c5#O4cWM}?3Fppzq(31?ECtZdOYK$f1;)XGU3=AUV+e)dE zcxSSeS%Ft5mhevY-aC_2ih7lYj#L+rdX{8=(-wIkx6cru5?|P@+H(q!$vrosNXB3zr=XuEPV>@aB?`q+#sSO1)KfE=%@H=n#5; zez;1HceogN7bBX=?#y(4!T&dr<`<;yI)|4(_4YaUuE1QD4zCd`5&Zyf8uM10%z0(P zdN%6VZF7@euiN9r+$)p&oM|5lv4D`^fo`AD9VFEf&+h^G0rlM%FRDmYfRof#`fL>Q zQTk=8{u99OZeXz!yo|RYU#F_Mc&<6x!Uu!_fncm7@%;Nl0mkt z4E6z*zq-4zPEKy|PpRrUmP-%?;gdsqqSIR!i?NP~lV2U&6| z%DR8Q`$H~z3K1_sjKKq8_G--{Y|qHbkq2e38}HB03i;}Jw9xHi4wNJF_3y;yrIkmM zBaj%(1)1zj%AZ;uI#bM$?vY`Aop^(?ass?Gd%>&Ta|{Q_BrRM3{*AgA5y`8I zLKjdMzSE>RGH3y@ah9{~8zFCR-JEibl_3w|WZSz5#F~W$9$y;(zWk!HK(3?JWO@LO?@q&}l?~9$K$i7uKFL!5uw?9uXFjf2u(+( z9X%0ONgv?t&;|3b{?Urtb48P{UY+r~t(R6EgJY`hd4p?9Yi;0dPlt$YkFu6|M-$GR zQ-2y;F9`nPbm;_bfaeRn-@3u?_c48PWv=r$oW1L@VicgKX|%FfPs%nNvs%X*Zg5u^`LqN8-5k@RSaFl9oV5&hM#k&8ryTyQYSJ9MOxZt2G zb=0LZC2R9yG22!K!=++rvqY^F>=JeSPr(Y!a7+66$=pUD=_F+LU&qx|7^PJ3Jw%Hm9!<-dz#SmhufH6>5tvEY7Xd@dhE%OvSe^F595u3Of z%t#0q2uqwW6 zlcZwKf@=`P)FjqtOHtq(s1se}ag(vbX|O1Chp#wDQ5Kgu6m=!Znzp|ydF;_(%_TWP zlLkVy+w(r-3q}$Vm(p3)gXj#>-+f8!EGP&UwUq=qa^}>L+=-NkWe0`i`zfMRV(Wh( z%1V9Vc;v-IRRi5F!HDG@8D-`gF_EJYr6ksNZX$q9_hFG>Rq*Wy=RW4v)atuoqhaMq zne0AZ*r-@EWTuUPpiDL#yf$m_>XBld^mj1)xBt`?WX={)M0Fggsh<{#q2*_Tr=1Zn zQ8N5KP_3~e^do@iuiE$VHCyU*jC6Fx1_Y-XdSgqvGiw}~6thZgSFjqa6w6)~$J4RO z*9v>0uKJSd_YRrN?`1=EUSVV!y9&S{a~(tR;hf^^x-=wQ2)6E=El~Q^atCucz?pKrupszMF*STO-NkrCa zs9nh%0U2fYc$B!Y$^hc)U9E~5n=TCsdGmFEa=9|fOWkgrL(tH5w*B&$7aeL)#G#|4 z!$x)!U*`p{uyOopayWce4$?^CF14#>8v| z>>f~wVCfB>Bqhp>)$3g&y70~lX-X!oH1##@_n1>BB8d$t5zhegF$lgA8KJ^3SkN2R zVSkf9^$y1IlBePsP8@yl0^x6$-1!;QQn-&UOOx_Cq$MMqyxU`FnNUgsB$n+8800%Z zXp#0pb;zm*!I%oz*y+iFM@5_qZK;mZ8933}2iV+6K{v3mGeUpyBr@##w2mP0o)3_7 z_4ll0pp-Y$j`rcYKY$w{n%n&gUUnzFht2izuS|hNb^ufDG&h830@<$)teNqEtSD-* z$5@EY+_BczHW>Fl2~Y_<80iY=(+1dyHOJ_9wqY-+w0>-&VaNc$2+)(;iTuDa97vQe zZv4z%kGn8T2i7(-aHaO7VR(_n+~wvDmCd+{$sQns8NpE8F=R@@lBM9HVQ;%!eC)2T zq27AYz(QL&DfFh#NTbsH7l1_~wT?yIq@)E`P>1GR>BuWxU~2uHC`uo9i8R0~vJ{*V z^e&~>(~|Kg$|i*QrP$$WJ=Z?6j_>-CH|Rk(*RX34?`&6&hyn0CG5m5q``4Gemny3D zZ9tDI&5zvtFIK|kGD()h>8}UD(*ZL3i?nGR}!0$xWSfb>f9yb%;~tJ9b|DBIyYBnyg5$Ivqm<#ejI zsD7LCLwyq5ry>`FdMP(iA|@8+kc@u3MZQ~eBk&;~u^Z5|i+WLT&_$TNM5y0Hw8wMu zmwBj9J@Lg2h5>5PghH&dZX3R^Wk=f68k3i@jm_k6>#xzc7>CPI z8YrHhWE6Vv!<#@(Fu;>M<>LhT+juR%e(@gv&B>n7P9O>(>C5G`a=oeLVl%2k1G zq;r>tl-<5|wLc#Z<62(Q^w*atbjeK1j(U!XQPl}8o=4tUJ1kLRHB7P1Ls?oAe%Yhp zOsT_D4^L6}5rCKe7_)Uwhh38uNI!g`vv5YI`s*W~%sz%3n(GdVQh!<(CRxEyq=;u0 zicw?F6+3Zh(0aVY?$D(1cv^7+5F9JZonh7o!f0*mw^hwBoX4?ct?hn?az7yDYCkq{ zIDpfYacTgqs(J_P58EFfgYjqg!HIYOqyUnglYA{T1h1=ii&j>3SYl2FI`5)8x8f7! ztA8@q4b!^hd>{@RG2P62M1UvKR#izww$yuvTU5`cxj`mIY97{M z@Lw(@T&Sa&;_9S~2zSr~!=rhv>@YWY@R13I)d2B){_18mPlxhy^Rn{%OsUeOLsBQg zd`rKmxxN}8x%&p_PLSfHEh!SX9I{nuJ@w7m*{Sm(JF_V z&o_8IouhT=#XE>uKjCiQ;^gX~)_kz(d`C8W-SXqGlJQ*|x;$aYLkh0vonoUm-U-&2 zlxMh6A&kA)V!eZG(A61VbPpcXe&nZP%Z9MZ z)QGxc%Gfm|SL1rTg}?7`5z$+bJ)FEQ^W3t>J{GX73ePO%A*2fP7mAnj{`)htnqALg z8q7vNts-04jpBD$lN?al8MRVsqJDw++1|ei`fly5iwHX;N2Owx)Zjb_VHuq`y)@`H zhq_`te46UjRVxQ=_v^mvY>I$}MSq3>e*Tl{Qnno}sU6I5bRiXZp@HR=(*hkVHcj_& zbTf#N=Wzc?$|l(ha~TKfnu@rS1675S3u)r1fA9JmI^f=tA!%xru&`1|8%#VTfr(4f zQg-wDA6*&?#vC}bPdTcbaNI4r<>~1E8&zVvmuK@(3#WmEmMLOR4$pJV2{^=#- zJQy|JTwIHD52$b;E|>5-La8{Z^pzHW)+lmyb0kX9#P?oy7l@Vn1(W-nK0>8ZjB)QY z_9Q5~QPraU@sx+31;bH#=tUCZt9)~2(IrDPxkOfri0?<~sWkHeB3Nuqpv{b?TK{eU zTA!bPGk-Dv9DoP(9oJt(a2c6Zb}_ED>`-I&{R$*A+SvO2D-(xAqOiUC<^1ctTUlUF_@ zaAPt1&@!@IE~THfFQ7NArNG`P^hFei$56tu=vE;HAs}oOqwaDQ{y`ljyPo zyBux7*Ij>n7$b#@jYqqkZaFbBztE{;fOPcHf0H^CXB{K*w9lLdY*Fuk;^|WM6dh<$ zrxiJA5<3hjsSzu<8jMm?g#anhATlvf9()K(H{aH028O#P7BXXsZI(QE;os_;Z!pZ3 z;Bv~{V`J)&yA?ek$MV5%tXkh@Jr-VeQQK9$}ZnO-%pgWwy0%1i=lRX-k0+I7N{ zj4o%fRIN;pH)%xDHxGDBWRD0($LdAa#}}?+LbYXeH`mzS|AZEF9#0KP!-Nx3~;SayO}yV#2iOc~5kmF3*?oa0FBa3 z^;#4u4iv9SSDrC&WSyA}S8 zb46@hnKYO3#$d<-u#05z+E-CliT-jzpZ9JBvD>j&yB%$Wxdi-MEj#6kMrupQ=_UnR z*0R9j`Ma|P%e;Tp2)L9C*GW%)<>-a5J9W*6P`b-+dDw}6hQx&e8=8L~)s!*Cq|5a* zQ(PT1(c#V-5co8enN?mbRGIQCpZWiZp2r_yt9$0%-xl59;i)TD`wt5VDAi$eHJ`Ms z6P}++9aXdy6%7b{>Z+>+ngnWBS{px2J4eQ}dgo;1&Mr)Hr=DJmrE5DRtlO~ygrYCU zH?~|0hwVG7OKi!=;sW>2s%+GeW9$I-*@!uGmr-}7N?!$-`}@T)Xxf|Mhb z)Y?(*zC2JG%>yiVS(4vT8hgtXM%lb(lzM{=J^#Pgrj=L==O}(Iui8VWbCf1L?z1@6 zs?3{5Mqs#HY2F59c(yXTs=#vE?+5#Er}4mUwg>k<2eRMcf!>n2y)oL{ZvOQ1I+5#Z zx4{qEqwnKJ)7hOF7xYDnk2Pqz^J4GQ!}f4&F13K^l4qJuaIOEl2K}E)WPeUYfG6of zWtz3-(}j+K*9Om@#6KW$^F;SSy#oi49_~vxv)>YUkY?J!*8K|V2k-P#C#p)6kn_D7vI>iP@@G2XC5&- zlqa6^2aaj7WKRK`bW6?x{sP2qG%J)E+E~=-evVIjk9l)XJ)Hh>E%>y)Mdfcac)JN=d)6G=D{c;e9bVngDiFgcb&8-&$ zsE!+hqtoZhZsbvzHdlP13-@pTm<-#qaL2mBv|CFDE-?oIrpo^Mc|jJndQ8F%Gh6zHj0d@oIE z$(Cj*cc)=sb&RD%=%i6W`xt07pArJ*gUW%9nEk;>yT)2a*iIlOUEVUwdlfHoWRp#! z#*5Z$Bo-m78dH_9fc`h)n_Bq{n)<;Kv?uIFFp?bMl^VurW#Mq9w5 zw0PNnT~kJaP~Sk@@9EJ47nLo6;_K=WR40aaIdF@J7sJFfhSRs+EX2X=aepY*j)NZ6 zp%oFf-`Qdcy8nXdQO~+Z__xRM`F`sW*;idZWKna@N zk3cEL-PGr`IbSRcSle$37zRcTX5ZC#?#}m8PJ5i@H~B{^$vsp3nN*>+-91WXo+aFQ z#AiF3`KD+{&<4liNo3rQTNKMEO#3g|UD)k3BFon|N;Ci7L~ea?2V~ljCs{cI#cpNX zW9*T--0Y}#wQg-)$<;A|*JvY7jVh-!*CS}3`}B?`u^-xXKe3z;1~bqz4oRXYYtees z1ukL=YG{*3j}J$EnAon&ZYT%R?3r3GvpYoR7iI%LbN$@SEA2|^b|t}oDd|@_o0EyF z5GmL4c_0NZ={oqG`I^@BMjd8wNzr{G)-zKn=Zd!`c23=wwnJB}+53l++vxa#Y`Y%t zEef}R$vfz0tw+z-O;T7EOQ|*QcUB(>z-zEMY&WE7!51iq=EtN?0Vv@Vmz_a}DV#gD zpX|8AJYeE|vmgQHlAYy7@yS|%`4ufC>}D=^4~niA?uZ;<<0 znUP9!5duXLC@QOKNfqc)?4BZPxr~hcKsyOhY1zdAO}c=y**_4fiockZhbzBAvPX1h zJRP{Pig7dCPW$Xt?x|<_4zqS$f)@tk9bj$=lgP6<#H?Lh=yhyUipq^B>V(3XCk9fU zY$+Ou2{ylj8|E||5Qy+{iS3Q)Mn*+${=NTU;6KRh)cbZX9yv{~YY;7T23L>jhZ2WO zAC}uw<<<+Xt`OK}O^%cDpik(47vQm-IRE>?QT9WS?V_h&t!w278#~g3wT_he5stkT zcAb-1U%FuA>L4#dS<=>o30wdH3=aHm5?b9lvb$y;B6a!Bgd_XFp=ykB7WEGco|iA1 z{73%ad*3N0%l`l~b*ku@@r!?`%!%;-MrB0Y?I)uJ!sTjqgw4>wf}0kGxXA2aGXVVVPkGa46qs zV2Q|XKxn{#aOcNOW4p`oDZmF_T;JD$AE@J*V1O+`5ASZ&Un*C`IT|B%vWFP2%R2Xt zSY~q9jX9^cbW~2L5`G@(_8AOIScc=-e!{MMPW1ch8Yz)O#93d@6z4E$I{vJ~#ufyn z1!@O_0LK}Ov#066ULleT4-p)_6Vjx=FEWZEP7GV9H;=K%d&z?aL~sj_2+?KC-SQA* zpIRHiL+pbr85CuOc(7ZLn_6hqC{O7i{G_k_4D;Sn9t4#Y;HCQGM+m1$-|XX4F?6IFhmyH9~)oxqW!9~1&qZF-ZG=5#NSY<7zS}`rE zKU+2#M#KrSki=&|3)|+}dvumPB;)H`k#~3Ai?MqL#y9d)aG^M%2OKa8;y^@FXh$Za zOfltw-i*Vp6&;~voQy&eVz_p}Nz0Yd0sig8PPM@&bEC7bW+Urpdrh*#F%`^8jx#+pExbu zz$w3QATnZ361#3(nHYBqJMPzHl0lGhSMHEvcHw;x?tT7PDqbj)J+1C(XyJPzd~a;l zIP|du;fhnjPv#3Wkz@4$5e&!9%fu7{7-{FQKNd43>nkqFSW(hOM=IQ}XoV7W5fNjE zkF?4@6(Lt2S$CGq7bk5^!#}6=R92N+Fiu93CuO2mhhcW6TSv@O_B!Kvc2RwMp`yS# z1LJCIm#NR&{fwoi4#UUq@NA`_eJoX9Tp%?Fh@43$=}KbDr!uL#Waalh3HNzR?^o{O zDZ8vdJWSho%{lT8=Xp;EH~Q3`VPZDK7_H;fDoZ@RT8w5<&$0y8QRI4<_GzFCNCrx>c?u3-!=8*M|z%9gR@uLM|F(HbqIq$4R$Eo@0@eclyqK3R_-DcNxlx3rM_h8OFQ*4@qP)-ez(n8_-@d%Iw z>IXAdY51H9w+Aw(cQF&hfK9bvc{zEC zUzgaY5%0ota7$fVW*WjDRD89Rx;kUNBHj6Zf|~z8CmvmyD>!m2Vh4&$2W1E(DeGUk zI6g^yOpnG30)+N+Jk*G)l9TYIdYsKo*XJSj*FrxGWaT$X700TvMhd7xx_8u-zh{hp z%-y2{dG=u2SxwErn>N3H_bO~GGK!9Gez+QjCMCsvRg#}I3oL0302?Dt-uAK`sc$hP z#<}}WAW_-JSh_UIQ(StUL^CPkLK{{eKd~(7%t7+V3ag|@1Jx@^^(RZBER!(L$W}PD zzDkg$9C~D0w?}9~*U`*+yvqPfWPApQ@aodI#uZqjj93HS9RrovY4GiJb7c3eUJx`N z+SzeojQsvJ6mm+TBVUXt&urlSXn-5x;7W^5Iadc^>@yDG;Q~_>O{%er@Kx1!YoUuT zlN3#QPSEB$N(u5OF|m??^;ks7!RZxPetYZ2F%hw;HL~7oYl!?cyZXH#XMc`A5IMEX zF;nWEl-%*r)@EBHW#OngDQ0WNu1xUNNy6j!4>RJM)fjx{tKF2o7PR0`xdzcp1+y`j z7y6ld-Jtc&-L^XSQ*Zvv2fO^tN9)C}sDXKCpvdH3V->FS_?Dk+mr4zJ8d=Z;zi6mq zTPjxhREL?IZj%+?A!yOjBwNpT>v_c)MTj;rA=Yt8@ zYgR<;Gqe^ZMm{IMMA;Kha65RD)|&17A2jh8t4H;~i#4^8aD6e%_OU5;Qxwz+ofn!B zbOFKc@*g&#`+u>Cn=3s24?ht)Rm+k)7mYv?eg)*F_P9AIhRqJ^a-g3G=8_!KvBP0v_C8a69A7o}!=hv|xBL4`|TtY>-d zw&WT{n;y|0bO{l$(Mp&5E`xM)cX6Mv?nYRo+h+s9?f%OhUQ#D$o>!ek|9a{#=4}a- znn}bE-sCgJHEeZ6%Z8R@g%Jf<^%s_dp zRUza*vs;(FW+ir48En_OCqRfjAv8h~*z*E@X6I}MCs!db(g{FgMqzi;A*Vx-Gh zYof6i?Rn%q2HSbP1jXO(&kgFkA^B2C4p>L&(o*+IP8(QAtojJ5eV%9!N5mSW*_A&o z#ZuTZ_lS{W+g|D7i44a$p4SWqD+x&8#!f`Vcv=;x)BgjGwCYSSz` z?U+g7DHAX2Csc+@C)O_&qY2h~i(q4J*5}Z{ZVWt-7Ps>n>4Hcbns2#s|11_0s?;}` z0_vcdg6U{B#}4NlKSo*S#7ZC>EFjMMccYu}Js3XsthPhPW{ojpc=E*0NUg|ABQ#{4lciOvalQ~ouqO~ z5zpmSFP){!;j5H7&KOa(tV(Vuj;>?T)lEtb(Xm+?H{G@>16+9@vyv)aHmfu*r-`fn zqPa88$0y09FwkIowU?M2<{Y0Ll5U#m@i81PM2~z>*`IVl8I1rDD{oLn;-;g;go&B@ zCv1XGAtv7AxApo4S}w2p3KTS%7t0qN>YSx%tardjnOxmJsiB#f_!} zrgRUAUle8j_{uFqr!4TV;a;uZ_EA#_NN=&X7_`?mR4H3n>cF6Kz=1j~Wv5uODSCx% z#9DJ}tP~4ssjm?3X#PKLHhIP=rA7|Z3U#NRL|Uui8JY|uE9qu8XYkIhBK!B^@iOg} z>qM&^s5$w6+=8^ixZ8ZbaM7s3qJtJz?ekBB(xt!QQ!vussCbdD&hJUHsAKTA$(g-_ z$zPbZo8jwhl~33Ko8~09zDHJ$!TUZOdZ#g)A9$&)z>F%w)KMgTQ%iIU45zbre5# z!M7;jHw$GA{=yDHNF1r@D&^&mu9tCe^BtH4H7tN$Vay}6S@MPs1L3X;cp#LGmrSc^ z_2q~q*ThDr6hMXkU$ot0j4k2YF8J=bmZeU-_qU{2%haK=2>=hx?WP%kf|N=MedC`A_&i<)8Fd{xSYb z{vY;IR>f5NSxu`ecW?NicKQ0&bLa7ff=6*V{saHgcfdvepWwf_i|BRpfaTD3^u>u} z#K}rY4d;2GUtLI9pUWNu`nmP3J9Y?g4Pld@V!U)FiI24x;2X7hm+oPh8D!wTxC%aM z&NEZ#6V4($5HE>UiSlf7FcS>;?Xez4h1msa$ zT~?SX|Bd@I|F7;3F!Dd$-|6!I5BHb(pYCt(`QPp@;v5TGg4B)pANM!C zu&h7*Z}&I!L28}BN@~wpKh>-V)}0*Esdk#3bm&B&7+H>GshXdfXjYdbZEbdsNEqvk ziYJO}U?|SSgcC_GON?RYj9`!)aFxpvrqamz2Lgr(AenTB7?3tgK{H$j}MB z1iD1>O1VB=T5^HYxY&&dOz+HN`TMock;;+K#pgLgc^}*-m6|>8vN}jMzpste*)_4g zit@BFVzU&~&FZo;a=pI#`|14Z5gKF`%5|BUb$82Km3&!jDyzzUD)MZVZaeGdJFzBY zzJ+r>=)Ln?P4jbkx>&^VVa26S-IaEq;-$L*PZhk0O%gg6N*fy<8UU-S&-!ST&S(7I zub7)cN2k5VIYRx6{>*pJ&Xw&9;pxslQ_&vu{?O94+mFA z?6W(qn*+1Vbx`8GR}ZSpV!=Z!fVLSwZPPwpBTy^ZgxKN?O!9i923AhvWKD?hBba*l z=yE?um$fH;2yi3Lw1pM<7i&nhHtl(?4sHB~w9@bD*WCGD+PxjGpSUz{pw%E_UWE{a zAfgHapUcWo4rK`)glSEkjEttO`z{Hd5$k8JVL@kTKUdf)@;Ju}#?b~0EN8HQSZS9) z!`i-m2>)b3hon4B$1qM}tCM``@9UT{4~#_LxHH=s*{N`R&o~At^^w5LbR$1<)3>}( ziWdpG|E5c#15Ns2px+k2;g)Cd)9clmAC}V~hnlxze4Z)oXbCx=4C_inBC^f2*nw!& zd9m~i`UgK!4Z<{-i~DF}yIqD*vs=7Call+wt@>=XW@Jk>m2{h+mU@)ciIMI+$J3*ka4R~~P zQt&X@klUrWCcsdaXw5uNj29`(rhS^nBp8wzvYY?&%0183yLO}_%7*mM+CJs#^yIfR z9ceV7$vu2ZBB^UC9F*khD{buotG+CRl$S=pngx6)teFfrSkS-+4#*e$cQ^% z)RBO0+;V#Qd#&Og#bY@gLJ|-d_oQq5zv3=-jc<1QqioEQ(Ne!L6)rteq>z+bCKlQ$ z_aNHbHSV7JO0ZxnPNisjMk(^-w^D;%J*Ixpstc3fEJ)~H!*~>R@I?xY9s;^Khe&UK zbh(zVh?DTw2BX;ONYDUeVDw(&q~n@0ug}eFPO2BXlVJq=4w{eU&!R=l$(12B7WaHB zfHC7kA07Uz)eG3^hNnXcCMPgGS5j_;jOZEk=Eb-N2OeLszF?|+z$5Ge5|b`G{80_C|_4x_&* z4Q65;C|K$vrT^UPd%Zvn{$6|3_d$DvI_zD(p4n3C4n;GNq3+3%i-}H>!a$wVx4OQ)}S5 z(STt{*5e=l=u_|lbr&{{(FT(UNP-7YvF=uKU{0}2U`tmn4Td=_-+bGS_5Vz1EZ@=n z7dXe-=MSf7ed?M{AThZdPSs{OC${5@ zFDrQgNu!!#irZ`kNpHH-@25L{0zpUaDr{vQfQAi4^VJb6V=&PQhV>fnA-^&SBIOvA zRDoyRbF1SRv#xH_?sOS`jk%-jTKwDN*;h{#1qyM0#74z-&K&bfF)tbttim&(T0xN!H1~*~ z4JBZ0aZ4E|{Al4NI#=+ALycBsrP8Q_>||?!6%gw3O{_B`_jc>@XIzo{o`Z*%D#THI2hA$@kVC1_? z6N9p9U>sP3q^H%cHw_XTele*2-w`L@I zgmu*#&s;^h4v8-7T1nu!HH*uF724BM&)iFRc{zhjhoQxJC9O zIF_FgxJl=KKClar4Ve(VZ+hi;oz5+0#@-RO z37l1hWRUVjg4H2G=B$j#lIez!X~Ul-j0l+}%N6$l1w{md)zW%~z$;dHCe1}6a+=rs zd2=;w}b4Ec-gD9zUk7RBC zC3Dawtcan&4Cu3sJ&H2u;JUV(I8Y>DAq;BRgSD=+-o^=_$wwON(cp@L{JrCJul6h z?nR{Zh1}|QV@=aNnDiP_Itpxn?z|732Hu^chuFxj68>`cAbr?I^{KiW!r55oVw2;E zLZ~v;)MZsyD9$P!O2Of)k)y03cWq}QH*qzQu)QQ_WV!4$6e_v-dG>I9F~a}bB~T)Sk-*$%9;A@i!sApB=x0hvz}|4#wO zK`+VGrHDh2gk{~Udp0_;`N4D~;L3bCN@9B0A!QCBzpK1Q;- zf~;U+6kA!2`BQszECv##$ZuzO1L^V116WO$7$~m^dL7XsJmEzVGMD;7;@FYayU5VFF=FQgS5>>JeMW2?>cswSV>oei2Qa;6@IcH`h?cdd5m zUUI*BwLhs*mGQU+CJGhGPMo75)Be3E9=#F7Rzx|ocDc^&3QBER{=`#2QFp0kxVz%G zpH-?@Yyo=K?T;Ox!(4a`rv#07Z@n=|6F9rW95m9~6z8Q}ayA2HPF6-_&M}%m|F>ro ztm3W2NyIq<)E3%5j?B}gBuP+oT@~EtWWi+m+1H{>k@%81a%9NO$ zHV82U(QL8DUuxDwAA8}@p9NF22! zR$P(3HCw_?HGtL`a7iqw`6zCPXV~DmgCAF}k}4cMje#mowD_<7UjH|Edrq%#)dy0_ zF3ywMCdM7Qy$d;;du)(oT5T7{HtQxWvZVu9H<&EwlW0M%4Ai}_M58yyZEZe8>?=g7 z^VRNIBb7IG>hXh9I-(6wTIHz4b3?aC@7`L(sPzqv7cQr@65ouHX1k~JIob43T9~{F zIFt@alxhiYDd#?1BTCk|a{f;*vRcyHW1CZmG>iLZL^KI>&~*s`jhG+o64bG`=W$~ zKP+VybfxsHhZ0M{ns9%(UB98D#=Ldw7npa>#EvyTmFMR8+9amJ98ay8iZ4 zoPOhv+NfS%d1K%;mNtNDkQQhWlSp5=htC> zAAJ&%mL7h=F~2Rzh_WHk+p{KnqHMdgL~Z600|S9W$H=IOh627L*Jo-T?&ykO>ue(G ze7**UEtvo~%ucSsfKZ(#ZH=J=>elrgk@~)b1)e74`jhF3@QNcpEeicrORGrjf}kU& zDsw%TpvJZC?rv9L#A|ou$vK8}F(fuhmf*%`b*u$?$8wC*)+;y=C*Qf$cO|+(K6uoOAWuzm%Xw{8dN1yA zo>*0j0Af*tNIBvsw@fodBBSuVjHRVWq>dut&pd;!sf?xpF1`lw#xzLn`6(@>+iBDk zP`vu%e3E#GHg$Dz7V*b#Xvr^522D||w=D_1m(2lQcKmqxMhztReT~L|%xA1h>=}Lw zqqMZB&>uY<8s~!SMD8C^@7fKnO?)=ad}s;n$<)^}N$Bl?=SpthVrj2&qW^JPuQZt# z=JjVf&qocB5jqGK?)7bHdTPd=m9m~WP@?DeaLb6`_R<9Hn-7c8ArDCp-}Y3i-NDGA z#URJaoSNkI-VN;@mdb1I8e9jCc5CBP%TLWl`}(eLQfps_77!dpx<&k#{k-5mgXu1`q`rH|$ruq`ls; z0*P^^b!nvDUXgh#VQTs#U=g0z*YEmMZ(^yIE#Yd1lQk#2Z{_E#D@L zDKaFfQD(>xJJtODbU}xLZ}``}9oLEtuV;qvO%oY~?{Uw$#LORr$C0H(nUnML>mBQQ z*izvE{!+|jtH37)1ED?9c+Vdn!9dHjF~f|mm(M$N(hNOeHk$6s^|J2fV0y(k>Rg*} zgrh;JxK7ALq|r1CxdbUTn$OA3enDeaQSPH%h=s&pCGxjTH*IMHd75hb@biV4m=LuwAJYy{UuT&{u1cf& z6<>OyS&Q90sEc%8P`Y<)=Db2N@N-i>s<9eMeVz%?`4qn z+3x}EDw5CgvuYqN2c~O#$RIvEPd!t)iPbjYWXkX2CdVpgtQ!RjJ~{g`^Qg0h&#W5V z)WKXiZ!4zv-CM1{;RGpO6%>Q@p;9v58unsAhs}b{Oq9NiQ61)OXqrfxo_5}11BlED z|I|#XQ^4pnpW=r2z&KcEH3!AHB8dx^9t&Zufc4eDQ*6WStjb|tq*_y2u%hs!P z>rR)A-z5u{W~cRv&4$rci}rslmY$q2Q-)G^(nB3KGOpK;YMWD?35_m_A1&T^FK}?p z`^-|J*)>^WO+4jH!oeDoPaM3Z4_Y0i4X==|A+;Ad$9?OF`F1NzjM!vCW!;5QC-3M$ zpFm1q;V2b88%O7fFv>=xNQHZiVWS;|`f8G=-s}RhdZ`eb0pI z`!@*l#qeH7c`sD9Tk_F}bW~j@WHbzV}N=ig5O_4$9B#1#Iqb*Bbp)5jdi+VQf zMBQz~Z%veOGX2`Q&Hd2Ye%9b0*xW)m-^jaKcdus`lrAyBfcPgxvsbHe6ee!uOU9pA zM%t_a&ADtOZX6dRYR9zrPdDzLt5#3c6N5z5m9bLWzk>~Z{f(0kqiE-4YggAy-q)8c zd#XnaIZ3v`UZ#kocoupz_8##vTllh~^i(6#3i`!;X31Y0=+V{Gh!#$A5@6^>fkc#8 zT*Epl^BN5QaZFGe@gl(Qd$JogI98p5IaA&m-WA@dBf5`w%I0Ook7vHgH3AO z(?->n)(e7xbZF#=!EXSl#E{CQn0fZxlatJa6YY+H`8l|;tf$66ym?If54RM#H#^`I zY(fm8;ND-u&kNpRi3%0@R+DU7!mwh&DJ#<2vmy5YnYof#E&&J4^&Co_V%GVTtp=+$ z9;s&oh7VtoD)j9d87St;dDoS@@W5_f5 z&Kd_3}P)gfnVZd(mo>ihBe%fH!%zm zi_-2cya{z06!Dg%zM*s*D0Y*+VhOb*v%3Kq^BU_WS^gdI*nKrcmK7<3yZUOPFI$XM zYxFo+B(0oHvP2j@n2z$);sa65cs~oqi`NaInUBfeH zIj8i0S)N7Sb5|?U^5y@Os81OG6WOB5bXYs=xP-KwDxgTc$gGzDx*6v@YLFn+Hr83$ zPVmC0%ph1{=9x~jNN3wUBa}!r?(5lYn(U7FeL1fmHO$k#q$InjXV&(X3{7@V`6Z%A zbWI%$_h^vmsF?q~D1|E3SvDWKey_1p)Fd$Wo|AgE(TUj%$12tipS;DbNfV2EV%u4n zGQM7GcJ%SrY2R##*{dk#HR4!(-r{`QBS4+?giH9Wdub--yQIna)XSwFpHIMp+^bE* zqfEW3(78J5q`o)=`znmi%nM&kp##Gr<)fa|ugf|NMO>(!ptUlFqqPC6x$31``PKx( z=go&%q6Ua>NIQR(P?=%0utlK3^c(B{{bm_3>?lo zK-h7DkWu4PAW|gry$CRko+y$$tvWsN#a?xU=F-=Vp=S#v&aj2nCU?<%1i{`O}#|&}3RrctQ9xsP16WJaUQ! zWv3sZ4rnF_TRYbrQjI<|%w598czlNt%M$2|Rm*kEhU&P92HW}cU)FYZqwi_My|tPV zn{F5s>A?jKk=SlG#}2q}s7d``|KK7dKH8JdXl58lyh;Up-Ay%PF>TACl%bWEWA54V=nLp%~PRTbyp!e0Me&h ztA1H)y^KCx1K`3w(AWeE4+OhRnyQRG^GbM4MZS?(f%{>FL)ume?FZ<&E9I{V41B4`}>2~`ZZS^JSXq%;4+bmlw-7DO;`=Z!Q_$h#O} zJJ4C`bSbF13&HjJ02jW8wf&|2O4D572JEeh$+S2r!PlGBwf@=x*z{Ets!ql+O>6s)nRb0c=;SpzH%k##= z6y;l_rTyIM&=`JnMS&;3Y3dM+u6u{<`>A=wI_^u_nyw|Hs_MUYzJKWM`<&IQZZ_-h zFL54feB*CcwKo&U95Hg5jp+0D$1@pKw+r2I)g%-1nB*9cnHJNuYqQbShVPk=WS{F`lTsH@ z7eYL1V_)oTM2a)i+CYw8Gj<+uLTfk2oh3h)2Wua*{~#v@glN5DctdkrtFwkT-&dDD_poYc+au0 z8fkfa^W)Tpjyi(9VIH(q)4VRlo133FV1g|^!Lhq|X7CwZh$eYjrsJ))dwAFYhaEfe z|Fjs;#ogZy;ypfRtqA(RFDpW^uNpe&NmV-#-kS2FQ}aJ78z3~7)a;YXrUN>CcXzP; zUEk%re!$2WP9cwd-pEz*a^_;_;ub)`$O5%h8aACjN4eY($zG6nQ?BW|iaqjMsBxLw zKv3>2vrK?(C67-{Qsz$85AgC_g=mk%)$SCpE#R-Cs!k3OEHGjxQC!7_v`gHCosX~M zW_@G+WfI^s$cf*~a>?oVjt*x)F}doR$$2?Ic0dfKA?k@<0$Ach*OKL}oj?#qQRfw3NmBbg z`MvkEPelPRLfDVl|878u^ep^Od~OLyzB+=3a7MH~^JPbp1>j^yIu8o#nVwzXvb;Gt zU1UeV$Y8f#WJNs(0}m4K{Jgme5+N2+E}2Mx5UF1v>Rcx*3v_r_q_*6H2=r#)~_|6c+R;-LqBqu zTt??!zW#+@;LtXoWHi!j9o61hlkAW7Rgrys)Hv3$mCStifAdNsj{Zi>+t?i7;L1;~ zujml$89w6i(wGs4{n}~6BC2$3x)lCWcDnIX;LLy5FcpQ0&3wPEI?Hw?_B8TgfyJ0VvOS?Nz^>*GR~9V8BfTSJDk5kyx$Ki zC4dtHE1GlcRvFv-rI_0;&TCQ2?6hFzJ97+Y!5j;_0@24Y+|INdMD8*3-46J<*Civ4 z^hN!x&*QMyqI=WSO<|`guMEcL!{4f>1-Hg8PQD#DGTJ(Sdf*Q8NS`iSr3Th#8dYks__Rirn65;f{5h$f*ibKFd@-nNzVLg3- zZsAZUtyvB8H2ckLi(S4vjld`k^M?gHay;(| zqPd8`xxozin1vaDE*)@ZKjZOcre%vPXa+J90E2FaZV{Q?E!?cuQ5SuXA0HDyh(48| zA7MoeaX4{_#x&3SEI>VG8P%}WM*)2{9c_Z5t(E7ocD@4SwM{rF^@adal;@rAvh?GK zLt4nV7UnYL%0{r`?3|we(CTQJU1Zn~`S#glSHMo~BTo4Ou)iBHHzDCsv0MLB5uX8) z_7@2T&AP@)H-Km7ZNal{V1pXRafZ9)qz_RNGNVTsM+! z?sW%{shiU-$H!oGq%Wa;oTV3Y{Wl$AHU<8NeD8d4R5dD~LmydLVs|gWC z^hQlB?rqP76hq)2%*&dK%1i4N)z2Qw*W3cES{b=hMJRp5V4skh3&mBjJk`dj@kY2{YBILJ_(^E+lC4U-^&=lu- zGjG%{icrOQnWCoDXn~$W%Wv_VR486U24x9GQ0Yi@1e=v+X(*Zv$cxS~%5N7)q^%es zr?p%9D4DvpURTEC$e}`018F{|A{c9@G3wQ!)@(14>kat+Fl~v(c^xe%4#R1Go{&(> zuEm1t!Y!_tES6CG&R{qi{(_6mZPaB=p?&w!_4bt@J1D8fyL-OfnR;!Il?A$`d&dLC>QyXI?kq6 z)|mbCxk{z7#(rYKhMpS(30nV2w45kp$Zs6Hs{wam>A{oRCSSqi@D&u%6lv|$s3_cu zyhBSS)M^KMidyzjBO~YPIKMUR;Jz~8s(rw|w#d-LD#XL0UhvQ6)x6KBbKZPCwjZEd z?h_&7j?f$!kI(S?fQ>-So_g8jIFWjE@!DW);AOrN+{O=6Csm$3T`myKtdsFI%d~B_ z%yJR!^>(Lr^%xP*fmjrD@AKSqJlZVYf8*i>7XBV@s%4h-`M08STw$H#>dYXCePfdSzZ&1q2>zhE25CBzws+71IP z*mc%^2fz{(vgJ_Dtuq12|0ib?inY&eQ7)-A-$5rFM*c(j(0<6>&Q%}4f?%vIN9?S_ z03t*8lNVxmCF}T`-D%mM*Q5pE^R9p7KKYq^j;F$Z4bY!A|R)N-^>XvhW*rFO&iGW^eh z-6L^!gd}T2Ar`Eq$z?5zF&ogPLT*LPD^M-4`(^(w5Fq!%ji|$D*yq?YyO$x3)lyHd zjXY0>eGZ`x*Sc0d-t{XyIF15m4T)g*<@heTC4?@oT&kDAU1X)7Oo0cv_sh)72(}mR zJxXtaQ49N_zmR>Uu&B-tmQhNtb-oS0i+m2*-e|~u-=}7?7}v1;&mY&Pue-0Ob-w$} zNnZx(Ka9Y8ia~Ix>~pznlx@8+kgS=|b(Ld~d~u5R#$$o=#p+uw8Yn;Sh$p?a#PILx zq(`+x9uXhOWux4p1F^bD=!hm#Lm}weZG$u4kqkblR&Ky5 zL#mMSlLjUGaVLb(A*B2}G-rTu=lJR>0IUi$P!%wzHpH)l{y+QqL^<-E^aw;{{ z2td4VZsUYnN7!7@BHbKo!W^aJV=x_R^q`&rDAf!P2+<=ECQl-i(oHRh#g3c&YegV| z^1UEgDBflRTvti&?e>jb%|`<8h`Lh|UDI6cchM(mf(Kg5Iswre5)^i{yN~i8E3q|>3vFMSD(-u>wAy%HTIXJxIY8a=Tr^y zjj{7ds`hE|NL_foJr8 z=Jk4N1q|rWfRl+0!>=xm%fNzGA|vNSXn`sDrVj4sZ5MO=*m*7DVJn_Pj|Bck_D+BA zoShh5o@2BmW8p>y1$=u!PNbNCICus>IW!xBq1Ddn)1bXDE?w_g>UKxajhKspSp!@>DbST-=LP}x{n~Tx&(sVcTb59a96AouDlh$@*a0uYI z>1LG10y$V@n{C73GCi42%TAu`B>e006jpjDCq$`R8);XyZKhlko)RXUwa#A7_GSXy zScDg6^`=o%0~sif38NB3kKh}MsQm*@W-(zLbQy^N7d+`r+FRQYv!I%7t8cln+mVj> zD?kb(f4VmJF8&CIS+O3m`V29y3u(5DDU|r6YO|E%Iz%W^yoArRB-W|ci-da3pKgAsc{P*qj^NVDsJFY6q4x`qAV0y zm9b+_s)gT*wu_@&9(leud^VQSHOeFXr#XZs9j_q+nngTXk#B$=l8m7D>5#KPiI}?9 zW-(v00j^x!_kovXb#4*)FD>M}kD(&c%lk$=5L4Z zl}Ii=eV^;Xp-Uva(@DO?zEn8Y?R6Cp*d!eGEz~%3s2#0BXH3Ka1TdOI2KhzV0Hqj8 z46LXpk!{zBTW2AU=@0xj$F^g6BOf~l2PX&TI^Jco{XtbBY>ys zqo$wD!PM_!o!h@>+?z)^*xT>f#2zMYOl;23!mZyeUf^JVep^mndf1^Ls`5Y`tb|sz z5TZ=eCuJ~kj`yd)`;p2hGDFw;1-LK?tujIwAtj$_tNhO(MHL^GhTi4m3ks}vRpJv* z2G9m;&0WA&hxgvVKrM1mO)IQrlYK_*Am&Bg2ph)oDdg8OOH$mYQV1tBi4xy>{Xjg- zhfhRk1TpyN7v*JT+3L=%L;<$f$!{OjwB3OY$}lS~WFj?-LK=!eqKK%NhOib;lMws; zn!X`I_8$-MtPu$^(t(3q>#CH(&qVYwtHJvd)_5o_3%)T1WnT80j5|d`BInLUL`^|) zrj<+>K@UaO^dlpyyP2ocL~G4ZR#n3TkALkb+Knvr2)FvKAU^sGAE7yGjFb*2$4&Qd zMZZJUY_>gL-=^jTC(Hj7sxrC|AFXwQ34RpHbp7=_fDWF4H%^{ZTH-8#}eh%vU{jkUQ7`}`buMvhH$(g8{QC_oabpYL=bXiI+a)~BZ(_Gv%M zn^0_w8x#TKURzsp8vz(OU~A3dogqj$LP#DZk`DIv4@HcVd46;4q|Q@2-JnW>Xr3@S zgZq@4Q+o&x1uLFEgKoRzn>O@Gprj3alA1!=rDul(J0eelNc0CuUZHzXbZ8WpvE$rt zeF_64fLy^=&c*r?dic9I8{*l|_Vm*`W}F zDAy-R#xVYIQQITVR6Onv3dd$>nE-T0+84CyzAgW5A95bPlvHHZB(+AOij*D+3kzIHuLZqi z^Jkl3x{;sgPTo-(yiy{Lg1ZmExOCIqa~_i9PXCI~q_H(|x1@X9m7a&CNP;%&C27ry za0Hwm$5xUNI$rWP0t)->cepm4V_sgKv%dy^-ObI5A15^i4vZ}Hz~}er1i-STi3Y{U zWelOp#Q8fGBWUM;KI!`r@Wzpmv1BS{bblFR;9gwU!sktF5U$`ruWQ7zzqiNzflxqU z#Ye)KFt2d^KC!WJnmXcLx^dS3=s`rivmD|&Uof4UPAjbIO2V65scU*J-#$&aFQ1dz zcn5|X$EOCRsXoj1ioY?BLr0V274}8uOvEn{|Ft>U0P$S^^ym~usS9q;ri^n@|T-A zIp&s#Aj(Uu_^6K2?R4k%-{Ay8IQcl_-T+`OSqbO?tOW7ARB5xOhJn6)yS-G0Kr3|S zMH0#y$Tb?w0dp_9>y3faZwC=y=;!>-krrtJ^(SPo(P67~k@2z8A)pUMWkpc=MZ zmPUYWj%)CC)}sUm;@J1SN@(>?*tAULfa!mKkb;D3Z&74FwL{747QFr82KG|?gJwyY zo!cR(QvNM%%^E%AL*2fEvJw<9BGv*Nf{R*ntF)Ok>`+=~BMPs`7&A~#AZd~ai~R7C z`z^fPHpu>UDt9Y7X38L!;M5W~mEcHt}S2tgYInVObg-)4>XaIoEn zLuE)W6JmPL1EC5p`7cYcY|5(~|<-b^V^=ZFt}AJ^pXLvG*;1%?qnC#}IR?}rhZ zA{HP5MZw+hxil@y&Tbnd086QZQ=PNt`k zoXh@_dJX}l6KqJ%z#YT7B_anRAVr`{7ZVgJG0KrkNL)3w1I!kQUPi{b`PA(xwvT-l zGFVM@U&<4!m)~ixu9Q8HSx{;GUuh?urm9CLxLzT+HkmiUXN6AQJ+uZymLCDVE#78E zlY^-vbn0>*+$5sfh1Cg0o`%h_mQw>uKGkM&u1^ok6>Z-A&1YnYk#e56ay;SW5ytpH zk|W1IL^#i0HtiML-`U$xN$oSYvpfDal2B5O-F(5L*XVN<1ZkRKQ828jORcCHHtQ1w ze}N>cH&75596eAJRQqo|$lBc8r0l_w_W!(>*4E(U3BdowSRfZtc(ml+NN@!U!e z-i#0%oEE2(;;hGUGC;z1e;%Q*&d;N%+AI@&3lDY)ot}EX@qTuGK6>@;>or!4Hfg5% z(HV#r#eOz^#=PZT(@35wK9lEJBBlmcH8zq!G`h!SXPQ;$maNkDSA?BbGQJ3yJ-y#g zWX4%B6>jbwkAe{lGVw%V|H3t#ivr{Q{KNQgv#Og+E+f<8vNF0Wq*JrrdcVWoj65#Hik?=7`d$D$5%EqiQ6oCgWZF!w*ht15NvY__7Sy;X zM3ibQ=WIYPhxWQNK1$Ch|Ck@-B!kKXgNnpjHqJ?+u`Sa! zE)2nmA;|u3Sn^kYOn^7L{4ZBZM*QEpl6Utui&LGNmufW!o6#7*UR z;8+O-dB+h?K?)b=xn%`OMd55`sB;}M+#v8vT|^aoH#cs(9#Y)2Z7Np#sDQHAz&X%o zvmKKWlQr|~VSH6>ZxZa8#ND)_n#?9Q3H27!quYd-B;W8pg!}17IlU!D{Qg)|Z$U(2 z&cY4zbY@B6%IQP--i0wsu4&J|)fj={!N+}Fe-`_v8+nqF{ z@kU?)H-@Y~@Y5EWf9k;TZ_r!{Ns#$f^fTEI$|xL@H8(e3r`jRrfB6`$^ht8ziwOH-ae_GiO znXLD)x4M2wTJGO48P6UYsX(qa4)45DUl@_x=V{j0uM_xyM~f1lmh7+ zuW0;vx_>qPLd|@U^UAHE&+;(SEJ(NV5(tf9OOC09~L!w>;ieqcEz{OnPYZVY;==Hu|ziw_6j z_^^b*(>BznuP)fc%Q3xEx3PBW6tAoIG+{CX|L9)9q7Ywv_(N-yaQOXG0m}YPH@rmx z=bG)xs}NNJKHDI%{i{$bP_`Cnsb zVy2-Xc1k)}dZ%RMlT>x58Cvq2+9Yc63VwM(=Vr1lJH7M(L;uizI6_mI7B=)^AX+UW zukzPCp{m;?0n&(|C}4)lk{>dUbw81+K?3RErl8AD!696KA=@h;$=Q z>{`J%z{ojXaJs~s2NCl{%;-Fo&>w9Df8v8fn1F zU9Z!~TD*yD7~J_fBFpaS~m<}<#z9?i$ctN_H zEb`K%9RT?>fp(SsQHt_rK`TphlZZaR>7gQ)j#kMi9n>iS2fg z2puJhf5*~$8l~!F-R>zKi5nE7XW*v??$H0lNb3SoFb|w+SzbL%S}iy;xb6pg4RC>vwiy>N4dEdG-CR?gJC)N zbe#H;CWBgsbmHp)pH(AeTlpvZH_ls@*Tu5;ey*QvG|MZ!8d~2yfc`rgzoZuZXIvFc zftGd&B%xi`e%y?I@JF&FIOA~3YkkRnOQe`qUdaK8(|KJI99#P?Vy7n=4{rjs*qeV0 z&WpC*7NOh4pPXFv3|+WvtBD_Ij~HiqB1NLm^}*uVjAO1zQFUG)Bhoz+fSeXY5DpF%n~xVf=BpS8Thh7OqcsT?Q(`bg+UcMz6GA^A~tPYN!?b; z)%b_=786e5k|DBM^4hsC#)=v5dr+h-`)Is;a%-n@?*){8E(R-k`nyy`=`99Keg>+!xH!Nk_I1;> zgcz}5mQKWLqXQl*+`k8~r9)o$pAOx~UO1^B(Up-QLr?*mX&!2RVkju;d)X;IU6ve6 zIpet5xlUSBSO4Yl>z@l$oBl;#QZg5zJcIl{0AoO$zs$_Zm=C4oCa+LB)gs)oUGI1b z$r&jF=Cc#kN=u`{Km-Bx0_Hb9gPS+p#?|E?68ZBNr~?R%+Ppvi#Xn#k<@X63K9xPw zb?c|IBsG(>EQFGYQx0SX+Gi^MI2%n981OQApH2~&*%&lQpm6X$oTst~?*|C_;A;^M zhp4Lbu+V4>W~p2gQMkYtbz#NLS**%2nO^~$V4E5NAZzLE5G3(Y@_QB^5f(fs3HMP( z@TJ0YzWR!YnTOO2>In+lJpSC-@l1@GP@G8Sk?W#Y-`R0n@vRJ;>kW|U_J?)WYPN%T zSZ@R^2$kvgJKdmNtA~U3uoK3ekW|i9Mp2-jCKv1#AR;~%khgqye2gOu1U2D6YtSAg zVK&Sm^_Db;*l$|RM#-Dpgi`3O+vt_NYP9=h{dH=svajlmTEA1)W2;`;r5ergu3hi7 z%HDOm-Hvz%N_%CuNH>mxu+tngy7jPM zkLxQSh-I?Imw6cp?X8YLjS>VZX4EjGip-N{Qb5aZ*cfi^oOb=Bu=Eq1QNvAfaOJ_J z+W|?Xkfk-6;qEpNsbzU#6$qfd@sNDN*zg?eDdgbCZRTw(D%6jA&Dx+=3;OM0D`*Yl zcF>E41O8{!V4dc$9oGhA6=S2(_saNX7|fts@_R7npk6*z=p}ifEKER<&Ia1&)Py&% zW&s_E1(C3~T4ArrhC#F29r6RxZ3X<#UeN0F>YYI+Vr}6sz8=^u76auKMk8W8u6gj6 z2M13VPGZ0Ywa#$R4Tf=-gU-oX5Y}QY1=l$diw1Em>U3^&63=o&LRqap$K(#4zIaCL zZNg58sEN+ije_^)Jv+OYE?j~r<_xb@9|pa+Uk_TnULzQUtxnL5YON?94jb+6I&o0l zbfDs+V{Rvum)-@mX^Y0=Bto8VBd}TA+hG6HLW2nF4bzB=yHFN=Q85qf(Is207v`HE zAzzhmp|XP^HKU^@*1h%DQc;LyhNG&-??d2~GYL@+SM^X}C!CiJqiDoqFxK&hlPi?w zfe!v2a-*@caH33h!xV%F_)EDlWW}m6hggY76mS=gXJkIZuD$P%UxM9{!7m=T1ER4r z6qo`ZeUOfV=&__g=k4L|-MIrE#uw-q3nQH{&e_1gCN4WPto^hK4A0VWGR4C53L3#P z5F$?k!=XW;9zTqv-xY3y;gU?j@*!4G;m~j#;a!JW4x7>C353y$4`rp2lJ7Y9qbp47 z58q_MLs0i1j@dAQw0FXFc=7DCr2v58NE=%~VO1RU_-!m1hf{Iyd*o?5#HCL*;g8_5 z7R$m7My*&;`vD0CWg0*T@;(TY1R_0>7)5tYsu+YW*49_Y8DQBX@7RTomr%}00OP{6 zeCFCzaj_e@PHugi9;Y{q$az{7*vDi>;YjE-^>74LZ*XIJ;47)5oeWW7^5E1@F zcMi`AGpxGPTE8g37CMI7E!XWFX7q}I%OFrJ-t;NX=``Pc7|BF*)QfUdmzd7Q__2=b z2C7SR%?Ere>7%g|GF-skic*|1_d)NgxFPw`)Vj|j5Onyo)h_=ER=)6M;N=VHoZ3Xa zwr6S2i$--!#M+m>Me^RsD!Gpa_DduNy^9%j>Lk@^=&>?NL}<| z0?Bt+j8oIug6I$XM?L~h@A4@C23rt%XLxTM0fOf4*P@wltkKzXvYwUEDQ|iHlxnGN zN`(tfEys+-kV}ZfS#Tx-@k9ljOw!9Z{V)cIcD*C*FFbU~SeneIB}rbaOXPZWSaCmY zv0BLG^=>=nl6#{a^oK1LbUU?9yWVNnYHSr11s7tUah^qjUao*xHGOCGg5%&6$0bKr z-W0t4;jQiY|LA)aF0e2`=gUwP@st_9=2Th7gHY^5mZIiZXbiVN(Neuox4ak5b%;L+ zFAgGf5C;yeX0EDMh)(2lvjA>})o;ZC^Y2K*qhH1A^+78NyFnvjwV+k6cY;Bm#X;N* z+x1pFXtrDN3fN4mR*uX->^MS?W-;>S5r&VL@kI1k#0=eZ$dCz(da-)!kcn|tOpmEA zToRY58NaYkXPG=oC$os}Y-yTXlq9`hK%{~>(IWEZAKV>!-l+nzy|yUE4Srt(zfEO0 zNCsOE3z26JZMH)t5vR;=e5fnAi_K0GcdN zr7XZyP{q>}k}l5pqFiw)x~L-sWi(Yj#=^&-uUlO9m{eHu@_-kUB%`bFMY+aYSD4>j zpxDC1J{D)YZepKieYZ`SeSF7Yr|C2tt!144ZnJzCjQ1-H)2O@0xeWONOlh?TXi@MN zO|n_L{8%>l!8pC(J0x~Q2cTXuQ5^t&8T}f=BA0-oat|oCU%Jz%nrnqj#Ju zCXsXn^3KC7*R1$Jj6R%mq6GYf14T_!BcDSb-JKV+&ce{2tG!QJbz}=yRYh(G?SU%Qi`DopqT|pT$LX)wSq7+gBq4M(BW(PnUx#%;Ji*81OA)ahM zRDCGsm)D4}%b{qEH9iQae%E|(UU>(=eE7{|Y!OzfeZf!9gnXcZUph-GwJqa<VjE0hoxct3@+X)5F)OeX#Wn^QYTMhV?? z`P)?Q;3E8(T+A*`_<_U}IOFM2!YM>1NR)W}WI_^*de`^_|CS(s<>jnz)*Q7FZZ@R% zhJ_nT4WNM%R#pMnR8%Uhh3I~}gwo*%yRf2U*|}d|5$Mg?`!den9f>{8v+GM}3Wpd$ zT;=?lCs!AM?)nf{()Cq6*Eh?xZ(Fs;VwZ;knZJtJ01MhZz8gtOMtzWNmHj#|h=C@|0Ml;Vx~Er zrlKxL9>fHjudK?tdU%wc85(lvnaHlQYqWc#r%#$2vaS9+C_pesKYD|iqp>@UD&Q}c zA5ky4paQFG0C(&*Hh|;S)n%BWDZn;Rd`QO+r-n|S)rGuwFWWEfaa^Oyi>@Cr#*Vg&*-1cl4x}0QE?LT9-*Cu6~H-iR51JbN~x&T@i4Xo z_B0$2bpQrB$GnoeZ3Nzd5CX0c$N9I>MNA1~rSWcl+mUPx1P38Eq=g*%60?JA4uqJH zDi^;oBJE&Cge-hW8>yt!s`vT>xc=BSolIuBbvlnohaf-qjMK0sD_Vex14?rd_H_}C zlgrtN?6|9R`GiAykxrQT4M*Jbg8L|L0r}eb9KVJf1l|Ay!a1&{ucf$ZZ<-m`2pFXj z?cK!2;Rxuk6$$}Zg+EdUWpR{9NweZMZ1#QOzAxbAH_duQ0z{|Qt1Z01mnv09F;WKN z;*gsxCSbc}3MldcGT2~eAwbl#>WT}cnsf!frhqko&4bi7@2Q6!~`(ls|V>DF13u6YAB>4f%)t{zu^5Y_0K1-bPLs76P3hLE*){L9 znw@L^P5M~S^sDWl{RVB1bQ@(#yK)|0awY+hJM;89LfcJt-^}C4oxX=qTRG;G>K>i4 zY#Qu{Xy0jY5Yr|J*Nxl(%%#e!l8`N1ZZnOTd z(XX$PnM!#m;p4nun&lNNrnD)zch?2?q&Z{Gpn8g?ZmZd>cUdD~gJ>AE`t4rO>(t|* zH5~T4!>AiYD`m3Z6x*xr{H1S4FO2#f1{DwMy+P0lo1I_~MXewnwrg>3*y_}~?G?5| zRs72L-~{Y;>bWG&wS`;o6Iklx=&#`s|AES2^q55NNkP-(+aLK4*Z|mqpTG|I8vCH! z`}D^n_4s!zlfU}vA%Q)wE#H&Z`5^LX$r#U5`P;%FTuqg2QMShDY=~7C0KCb6h4-Im ziIaJiFm;+>Vpq?~J{1l)U&0>Oii2*FZ@3lRL>34(vfMb0l z9ESZ~Cmcq#A=z-(QUg!;rR82-0O+h(hLJdJnoU)Wzo|7Ts*J}UC6QQxrW)@!6C3^Y zD2&-_Nu2Xp4_K`cb(`&=Q*YOT)}X^UukP`)-Wb#xP1bFa z(``(SML0Ne&i0P$0E*2Mjz6^c%LtgtH-xX1yqDk&B%|D8mM4gnC@fIUjl$JPJ|?GJ z5Zoy=yWrMAf!&$6rP6gN4|I1DClD_2m-#7Hwj~6i%)-p?Xj3Mf1HtRV$Pf10KY8j6 zXJhi*1X-SCZ(|0&5oyNWhDIjmeCNU4gXlxFjQ@q=EERn(epjGEG*Lto>g?u3=XTg{ zHP|2wqCOPj9Q0a2pFawsdb>G@!d{2f8!K>KzMU_|qbnEV1w2vj7BSz-LJ45{5$5ZA zgj{!`IIiM^#M&O5PUtUWYKr%Xm&8_)rOxlce*z)JY9DFD8c_k9b!+uB2-lPm6I z$nRJkew7NsdW#FaoC5~oupS2Cpw%6=SR)<|SGj{w6v`8%&UI@iML?Ohb-=XHZ{q}K z`C1cwQxUNF5ZlLW1W_3nhJg?K#WxgMpNiL%n~ed=^Qz`ckYwMY0v_B3pQh2fl`wa$ z(rAtxt*F=UH0t%B-R*`!tJ$vwgI+rfI>UY#)qBH6uhCisIgq>P$f4oECXnr(Bk^*9 zY-Op0*MjyH>D`(S$ZcN(>wHlO5hHUcvQ$^YJL%syTU`v^M^-zN}rl}==f2|w0C zJr1`7fJ&{lDtp&dq%N9W7+@i>-%#TK}uD;h-?C+zZ|}@x2J$GvMj>- zs?3z%vT!s#U!56IYsv!&&3+QM#7~75IRU|T#>FIWoolq65!0%f2$aS~Z|Phukt;?< zNdx^>G+XFFJkIfCT0HPt_xd$24zF|)D_sydRRB!n*td-!P!P_OgpK0op&^+mCQVIV z77n#8z-bKyht73ov{MjV;@@I4cQJPjq^rrq4QWk@Ypj)8K6j0V4EH{HjSot~@bcVT zxoN&()AaIMs}=Dt*<_{ly46*PDrGxsxU-$L+U7N=Bt5`}tF4KvRW(g+*xG7r?N3wQ z3HV6u1F=hIporh{+&dy}4B*P*-j(0*i$c29ti{{KmP>7n{^5enfu<{MkUmDWP13(8 z-zc+HmCd3rF2Z*#Agh9v!G-gGbDh!HB9|H@{&D(&x67vN(yPa=jiw=FLKB%Zb<@z8*{CsNbA5qe&)Rp{BsJlBDSA^R995Wfhy zXYmT&4`D=G`E>{)#zv~cMJe-W=PODcg_;$>+)Bg`r=}&h0G4W5G#l!jYfzL+&?+KM zKG*At9o^cp!cEIP%JM=-z0oeO#eU-wPpzs5v7*GY?vnA9;ax@Kfs^?4mB2P|L;Ecw zdEl34Z2Wc*PTnFeyd~o@w0P5SB8YQ09c8P|ibR&NHaxYr5#tigZl_gTB% zZHK)!(XmRSI30!T19ww?LYrH|J-jvC^##E8&9a0(QBY52IWD@Wgt0V=%Q)wpkNzku z+>ajdUigOkr5-J@Z9>z(^VcrtiD7K`bRV!reGs=;s~vROQ5dua{Xr1c`%zHucH_>V z*^PU(?h5B#zZyDEzfpVFCIXwYygAEN&a#eWg=?IyoG3rnx9f4)XZ>c}j+#Mj7!4qh zlm&xESPOQ!(3oGY9QX&zR}7d6|qx z*}55OxzlEEqwHS!2*NbQC4tIdMByl$i0quu-%t7#;uDUber#`l9tZg|RG9I1~l8?#w*^6ojiE@ z6!FZvT}V}VnCUDW9a22hzAQs+7}aqQ+y(JiNebDv)tdqRn#ytO&9{B?YkPcaHtVaz zt#`cbo8u@T=9k+xMl`!9$dv{evCRY^RW0=R{FalDR7Ba{n$mv-#lEo&(8qPv`}Ky< z?^jU-yVam=sf~@6aZ_Ir4?9MifaV^J0kr_Exvi_Tgs-el~mXvsFVv)#`S- z_a>48dO!;VrXYYwn{|n$#}`1L!twOr=paw8weQ7OeDEaN`Vp51R|ppf*2jmnd9$sF zd0dF%-$+sIP)|Cxbt1|poY2mLkcDL5$|LhyMdmBEa+HD$`{YlKp1;-WsL?^Cj8mv? z+szvmn1a@aZwY`J{Cq_zmD#@c_8Uzi-g+qK#9KVvHd5h$wfrqM$}7AbJQKB3VDGoL zJu!q#$A(#BR})>~%i|*yZJb-?UOU>C3FAjCVsGX8aV!Ma2VbyUyFi_M{c!i8U)%n% z_GTM?xWaAWa zJx;H-%m&-`P8-t2cjI^C^ustn0YkyDZHdyW-4$j?q5zdpCWNmfYM}^9vWWYAQKq8g zmW2v}@(oJo0SZdnKi2bNfpcmCs*G@&Tm!^ooI>>cGYBj@BZ?zVD@3G?RQ5uh9gvzz z|L#Q4Nu_>Tn}D-iT*%@O5Mvn(TY9Ac5Vy;~eT@I`OQK}N)+>MvX7eYocN{H|*K8Qg zhS6*o%^wJ(naf|S&ukFr+CLvMwLDfUq3i(V1CHj~-PkZ!9Q-`Yve|H$e8m2L=~6WO z520eQ2eh>!|M$;-@gI5f|F5LETO(t`H*Z(efM%oO(wOfTX+hLx+93O8Ke8L-6pNK1 zbBYA7U6#1#dK9-Lv5F3*+pexc@hkYk8C!@Dnu%y#@dFl?SYN#mg-cvtTKHrQC$i*; zaD#&Gr*Uh#A4t+?fN&6_pmQSgqq;hgU5Pv_K(=0M`4nk%%*USP3OAgTw}oDtjLch^H)d1V5YgD`0X=7d zWcrq35I__eQGj=dy!5b;lnNfKqe`dw`ktun=%i=s&4Kb6--1@SqCCR&{p199bMd&P zi-$Y3T&$!n8n!G(Cnz6P%z{)&g-Q+hwKLR4@4htHrpR{I$SeHyYoGF2p?*dbW}N#; zY?? z)G_o?c1S80gH3tk@kfC_fT^dnCDpjM7DsWRa*8QVDXNdStzF#>5q~XIaRPEB7L=;A zWQ$yGDAjNs<>gkC0}#q6D{%@_rN!wmNIDxfa+hpG_zsDs^G3-#>4s#Gaff%$4}1mF z51Bxww}($W;W1_4SV2=n&!4jo;K+raNoA4a4Y>w!x^sC+341Ly(BJ=e(*G2{wG~GH z{9j93E>hVjyedxFcR;NebR{pAIf|QG)3eMAQWZdOQU8$Ncf!kzeKWyptAM1aqgkj1 zDXijaQ#T=AIJF_g)waHc$3?XUAicy$*`yL@I%3l>8HqcMC~W1rC3;)769m1;Z=Wcm zP=ueEZxXMr+O^g6iSSyTM$0ItCGVw$K4!9q{AMarjf!h&;5~&o0FrpW{*Bl4ww}|y zPhI$g5kt0s6Z0&L&XY0A&wpU6O@DD7W|tEt)w<+d`HU~yApNL+COWs<6FP``Y7_k6 zUR@P&%{JG?&2{k)l+SD88qgy1rAbiCck_vfEkUkAQ>>9HP!`FXU6*Gy7o{)Pc(j&8 z6!`$o3Uqi7xDl;gCF;Al@@2v>uw4*C>ps?Ko7XYHx)5Bt?7vLdhK6lu*oKCE5j1S! zZAEtJd&idtam=Yv=37KglEcsAs^X%0-Gx+dB~ibm%!xBuNi zazF!Twr|PyfB%;SDpYLUkgfmuzZMBov3Xl{{@)$63eGP7@$*0Zb%9pt2hb_((-K^t zy%mcKlrfKcctvoL(hV8ikkJhp-H_1&8C`hapyg1Gt?Kqc*CO%f^(pQ(NM@A_grJE; z49V7UOP-LVZg%RRg)`*M$HM093@)nPkY7yj`BE{mXpKm~Kg@#yUXuh)D(8vdpEphU zEhn5r=jcbLl>y7|O2XxsywBiT1nzlu=;w!UGDbgLW3_&ur=o|c=wK}@P4p>&n#U9< z6LB|oNFdL`kDOjygdewzPfX_>i^`mVzq+8DUd)?=>*m`y84kBdvA~Z5oqA0A>%$=1 zo^Vt@=PxsWht9Hg`oLMG=o|h#^)AHv%jNShBMNNSMLK~xYkXh3B3-9{^CHbUoqHCB zlJTXZmdFd|Ha(!q@+FQp^8&i0leJZ@X1z|uo&KQNsyE`G*YCB0RwL{Ny+Jz+qDHgV z>NINo?qHQ{bDyy@apNZGfFNpc%65KoNEw2A2H}VB%KIe|T>0q@YTv3IaDxnUE*i zRt)&kl(e(xH-XEOX90p#$-?m@clwth0)yGq<$B?gJ8oO;32XKe{YPc2a4s719m+PE z&&qCzB$oASu^Yh6CHP1X&BM)J_D^xP+msT<{ki=XT7@$%?lN=NQEmbvfU%`|@Xjh!Hweo5tIhquJSzk$# zM&%M8b4!w#$X|fBq!Jq~UI3H1fXgqUn^mjiD4e`o=QIkHN*4MITl-+u5)lGW@e6Y` z@~?CNN(!#o!7b3;DV?E>v^D;rd3bz$@|26v8;R={dGShocm;_|ZSO|v+DKg+scRLf zE2oef$!jBdZ6vRiB`-Qf*+%SoZTY2aM6cUq$SX196+|zG>(NI1y7k@Oh+m(%_+?Vc zjR>|8!8Rh;$|9I?nAWTW`}QR#FtahZ9wgat_WR#oVG$!NdP7HZA4kNHDk-&nJDpy> zoTMMGd~d)fHVSuy%VW+b)i=MOBocz3zJBn9WG{w=+X#TSC=#qB4y+&m@{QeyeH*cF zBlfK#_7xa}Ci*#j;gpNfx2LBsJ^BQi6~DN-ata$M^7ED=Hv(h9T52CdDKy@WHzs<< zy*Awz(SK4T41`4l+I!0R2V_7Oi;(d(NXBdwJd>w4&t^sfu$E~TM*L+KowJJ&KbFNo zsW2#316AGZ9b9q-8zC78js+D6e&AF9{5-S0!6+TBS z;Q#x7=UM-xsQuuP_kc^-&L%{gj$>%^<9oh-uo>CbLq&#OG1=td_8Vsx9Cmh=POhK} zxl9l2cAv}#pRA64vfJbJ0eVymwfiEcmd8bExyM<}`y}Qw-s4CTf*WZO+6Uof@_oK2 zjas7-)avlR%L#+ZY>rO=OK^2KY68p4{l>Lb0zoL>(_M)Z3eJbV`1+yT+2En?jrg_- z`N~>)XmK1jvD=5+{GVg#AMhFTB>|6D4qssfc>`dflLW~T%;1lIl3o9nUF}yuT8 zvnL7Nmi7;RKbx?(Ct{0tv-iA#HpD)9^UC=_kWb8Fz-&=PU>v-hu!{sz8z|12PR_!y zi0H^L`GLw*_UuHpq6`-(YB9XYp+_*Jm{ya}{egv}ZlvGY_+KNDe}PLF=w!^_j~SG! zqk+%a=rRL9(e>R6p@yx@TkU%+gF9b18ePencUTGnfY?hX@GP&PNw+!PD=vs!b6NB+ z9AzmC135HJFJ?WXsb8LG0_IIGRoXe*8G83uI7JXSvLklMxf&ZsAPG{Q^IfX2`QsaE zcBmF&ep_)yjxYFTWD+YJ?F8A`=QL-x_A3u1uzkl)VVPi6^@2APB=;4Rp5P1lGMt_- z{tl_&uRNKXcOT#+N|1m1X;(iAE+WQHHAgHr9aM+0g#M9sqxkJx`SGD_QQ8OGnBa4H zdKQs$7l?wem5xDl+)XMp5KcJnFIy&!9L_s=LH7Cs}~L1SrmClTiU8e7XcM+3XVTBxTTO@bJ6P1!Q%;a>E1sFkzEwE%{yI9kg^v z9Z13HXCUeLUXo=qzB?7?6l)}+beU68dj!BZcz#r}$dSlC&0GEGo=eHH*@q6U3aOefpGRCTWZw*)V^2G#V>ME)FL>fNh#N6dy?&dR#%&`Q&t3VQEQ@PLkBrN)w%^n z*)r(z1K{9NF#FLdQwFk$`QbD?vku;a^CadcGLXXe53+|<#Cp3k!Mjey0xAZjmOO{7 zOdhr6(B)Z2E>&W^d%0r<+;N_c{JMjv{?~_BdxCkdieTdUPz}%E(%_d%2)xCYj*7&k zvKM2Mw>6|LHWYa+p$^`3`UC~}wJzm&AS2A8z!#?pcES^{dbX{npg zg#>!Cd!cSxyCFykC^gW#Y_CzP_k&uCW9S}V-%)x6?c^XRhJR%;49ROWET1E|whDr) z7NZSwFnQer)sy3$+~%w(TU1ds82Sa&!^~3*IHsf|{^F$Y+f|R8>OivJ?3`a*Vn>4l zaj6Hjo8Ddq(xZEEnk(Chs*3aU+WRBx5u#_?qOw@c>X_F>~yAejy8=kNGo14 zhMH9gq@_@$r}#~JLVfd(VU|!-i$7G~0|XZ-zl$fbgsOLN-%M`!UO4 zzNk0Muj(K_@k>2Qz8JVH)3IBM0Max_J-}=XN~8nP-H1;QesagJD~tbf5$JREJwz%k z)vkz0xAHrzH=Rbe)oj+gtP!w5Gz?n(b}#64>T%E-4*T6<)QuvxN{v3to@goFbw>ku zBW4B`s3d#E{%n>^Krt>&LKm~qG&wQ+ zH7EyJ`$@|Td4ZB_JR6O+3g&98Ma*{&&F1d6({z-6U=!C{QH~`XjnEPdKMut2%9Eh@ z8JAT3hpKpx;}&ljpid&cgRy1t=W{B~IFiX7bV!UpOq6_^ZCfrg#j(K5Ul_@Dq0x44 z-y?(ITbYb75^7Jdltm8%RR*C6f#8R4+`!iL(Pu;T?e?0{ zR{y>%{`EFsxlOpajWBxVOe*4}?%D%*-+ue(;=(JAV{Ce1G~bN}^r_2(YRhZ{|LzZN z5ZKqj550$KI6`0C6rLEpuNPO`L#>Q1_UDENq5Q`DL^yaAUpiknALh&komI*0ZcB0& zUxOT;BTR4kR@VLE)bd~JTpIA6f)r%;2Uz%&GcoVC;GX9xUbbxKvP0Y7ObsNaqtdGt z#nRgqL3?4;@328L=+}FLpcOVd!61rSK|E~N;@+^;sf!Gy%ZZ>W;gnVz4bpF^=kg*3 zQ<*Pr{sbE#M}G~E_z$%E;ts(NdC!t>f8;-40|4uO0z&f|`#=XB@y8?e_;+}bz+Zj! zkieeTmhZ{yd=UAxWQ^yj{B7Y7uBOTfNw!88bx80h0C)Xh?MkmrDR#UWbcsUfnr(V?`yc%dnhP$Lq? ze>%&iqKw7`^Cr+t^zii+KgoDheQW^e&EXn9jb_?MT$BVdma%qSvZkKhi^jMuLb=^n{(Z$83kdl z*$r4TVo}`c^#_f3jT1Rl3g1N&P%RfufejkHUM~uR?l9~GE!JxUyH|&$I?b?G ztFtvuL0JPtE^^o6Ps1{}-bdly_T3s7Q@1ID-ro{oj#1cV1~oKB6G(F}kE z*7^i9gJ)BH5*e}M2!@T)i;HB67sU@D2Zi56;Wi33mJsbiUihB#mXQ3wX^9#5h)%Mf z|KcB@J@6eqiOU&^>0X#6F<%MZY69THU&4U01+JsU4&*Ok#;+hc<^p`1H0#Rc1RO8H zFB9j7HXHUn9leJ}$v9$Er7M~6DNgw52_Z`@3MTx|v)L$|NYRHQ!20GsZLHOGc<>u%mx|y0(*~um%%~C+{$#?Md+AtXwI-`fX2j8#;|*q zS(#t538#hVKcn>x{ZiPCMD64YFTYe&0)` zydf7B0CT4y=5YtcHc3a4gckbdyD?zUkleXx4h4|ZsXoKaMR6ZairnT)ZKKY(xFWm) z=Aa53xOw|+(#jMxPgA%U@?FtC#X0l!vGA9V&Bobm!pv%lYTr+h#z8$2`jYIQu{WN{ zW#%)=U^bXS9L~Y0C^Z`{_?dyq8pOc0$QOZ%4?O}Gb}05Zm75~&HG;OE{zG z6hKmGQ2eV|@{Z|wVRYxcuiEHijzH+E5>8@$s_2>G=$1eL;YtuLT5pYv&HvJi_^xmY z#un4Bp-9t@bV_*3jDac;%O&xxNTtFoOQQri8;VbEQdNagS**sWoB?8;R5;N%P@{*T zuM-Goz}6(mki`P|TC1f-iB~pwu85O7gF^7rzXm1p7p949$V}lCzY=UPoB=GF8Lk7vR(cgkMX*-$-=xzj7QJbIJsr;Et;Ye2Xs=W+R@OG%%=3ARb3TaKup! z&S&X{rGDX<)W)|K3oXlm<|!5P^L`52#v4?@6f<&Jh&&XfvlZfNT7>15I106u^QjaM z)P-3mcKrU%@k`43#;u!!MU?kpW+K3@TjO81+z%JPn32uWFiNN;5G$_yK@Y#n^*aWq ze?OkU0gTt@aNAPy4Xq!~myOMMJ5 z?ffC$w!-lYV}56sF?KYd-I%iQLfODccfpr~@5SE9cgQ8BE=cZ(srbC@LO}{2>6-mL zq0k}Vz*XYkXVDbkctp;CK3^>L>q-7AZus-T!DwVW zI{fbWKs|UC{%JbV`Vrq~-I-6ee>?}Ql1M!XKkO0;fT$y;inu)^+S428jL^5fnsl@!U_&#_5DT0i_`* z9VannHQUa;DzxSD55MzIzVq{C@#S*(xD39UzOSY&{3-YLSntkMw`^QfU{cSM9# ze6&jo2R-j1m=(WD#w&bPgBZ_0kfOS+i3~$@1eU`{cZOnvA2Vn1*kB=@$>Q z4V*PEwHVGkTlCgm3vCdO>P~xG*8XH5@MS2BLPz!XZmoemdO88{BzN`~e_nTg-l4~f zzt8=I^v|2_UTZECJp4}hHWqN<*S~@GCo`cfl0ANhcT&*tOc=)$E&~>84ND~+e1m;| z$9u!C=^5Wd{OdV#eGmva*8@Yq6`M+F1A{gIU>o9-+khBGF+e_91!N~@5jViy)SzX|EYW|iK2ezsTS4EzJd9IRdi7~VeZvbSZ*KJW>p zRON%@fAESK7wYI%RynR zKFMa$IoRgDVbi@+mQA+}J(#Z8lH6s)!pYcFYoVmm?rnJG_@Vr^`v`^%DG4H1Mj=s z8)m@H!}m#=8^3-y2PY-4Z=q#Ym{a82R}6FJ*{B2#Jh^pu3l+Mv>E#Uc_p?!~AffCU zY3`SUHc#ocr5Vz<^$Gp_m;d^2|MEAv1DRX(JqpREr4xb%8MFG&fGZ4Zkp&oK#zLS5;Jshpow?KhhZM90n+ey?Iji~6bg;I;cP9hSWJAUQ_G zv2dHF;P3733^R1pWN{B%biOOkQ>{PXQ4^$pd@FHt+&%e=$NKet(;VwR{U0D9;oe~G z7}0yyq4Ts(1H~e>JD+{3XjNR#o&dg`!2hmTbCc;5XLOO$qAA*WN>9cn`O| zio;pOV4R&|pAUWb={lu{DEv;}mW+UE2lqRo8aue9k{pO2Yumj?w&1v%4Bg#f0vnL3 zMs%0)*eK)T{&;ldZjX*m1BT5j(4QjbtBOZ9TU&0F5`?fCF2JvqyDh;tyP5a!%>s&5 zgkT=(+5NjwP}4jLHoxXxxvcQ`@B}g_>Dx^ymFD)W5H??wQj3a1l%X(Ed#)K3Y!6*E7Bjmkj}nHaqYb%>s5Y8iRj}{vI&f!hBXd6)!WhG zp}nYPL%KD+UePc#TvTjl9$~~jRSyEfVX=(Nf(kn@64ifkn5n=#_w|(k4%BwPWmndn z*a8T?cp*$rb@D}AODF1{ihBZ%ak+Y6q4mq`L6&T(;rQj6%A3-b8o;1Ku-m=Y1%?ep z9%lO0S6-FA93F=Cs$(3J-!2SuBBDq@B?Ojvkj~KxoN~U2_GqDzzz8=|8YzEfk<^mH zj8NTy9(L0ETXI#%-3vB^2y~Xxk$KFfaIAK{gA4&lGNln2sH6=Tfh3f}Ds0LppG8jH z`7s6>C&NUIe3*v*7X~nWucdZtX9s5ki3oOfywj&A9Exaih38JH<|ZQf2|$Am#r1k^ z*F!}I>;VN`$XOG8!zs_kqA&jGj9*O zcO4L$Q(6-KZ_^Lp`s#aMhglNY_?BekeLkJycU1Bu^hAhDC~CCi;Az8ZkfKj7LtNs} z9p|$A|M&Ddxgx zD!e^2MtBCHTPdgKV&D@-SZ=Ks|5TeS24hV<@c+zDOmW8$apcJ+C8HL?Wz19@Sv|r_ z?5=bR5t?oS8b|;sb@lP`uuV-vEDoR4KRb_HalIxCR|%Ibk)`GXPt*-k5gSJ86|^BIJw#j!+yV8 z@AbCcqt)YVx8AC6?}pjsM^a(9%^p%i0}xod3o2s12u&3z(#nk?-u0ktw{j>uHG*;u zkQ_Is!OQegGFZ1!<{0o6LWq?yCPx4j`Y5t9k0gcS6U?zn9XN6Cl5ecxy+GK+PhNdr z_q^bxIATw8H4=Y2;JB7|z#oJo?*n7+GIVF>gewFY@b`pDBhB0(zLD2QnM9i-2>%y= ziO>Wl(}4MNZ#WXJNB$1)bSFn!(7(f$YD62O{2hGdzF0hPn#kbS=HtDbUQ}CWl=SbH zR#f`p;dVbKpUK5u8oSW4=&Ipqz8Xtv|M`gl@*uV6!Ha2>*vF65p zjXHksbKTo*D%vMuwf=0P1nf5U9d10)_rC=4h$F_?G$iFI{ zR9|6?uT8_J;q-Im7nZ=6fcgd$esR;~@TR{w?s+IOt}fQ}O_h%tr$M&V{YckXp!NZi zHYlaV>s$2!TtQc;wxOUHY&(lmA3AGimnad#v$KiH!uSZ{3@+xV4eg@h=Lw(iBs#w` zr!<`~xjc1W=*vh^Xv_x7DkprgzP_?2`sq_qZlw|agd|VDs*13Z0t}RF7`eZMmJQmU z65>@GL|oZ%oEucLWo3G{_iR$ov>`A{tJ;zZDmLu-Ms#f67^#D%WBVLbY^~;fQL(j} zYuB&|?S)ja;odLOu_e(ts*5mJR8hO;-JW6%oj@_He`KcNyE!GBJaD2^st)g9n&U1Xq51T{3ro(Y}3btDBZlzK8mRb=;UYinRs$7o>bfH=mjI#n|c1&RRRWQLR-Z6dTprMzywB z^R-c}`OB%+92a`;%T})4GbNZV<6TD!wnmRP13~6wsx-J~o{N%pZON!%Ex(&qBznB` z;AXP%NT$!+^}dD-#aJVZU$~&w4>ZK`b4lbKfNG7Z{h*2_&l`-mZ#R{yIFYt*7bp_~ z32B_iS9qmK##|=AP)i-~JX<^$BT}HRRl@qp7fxh($E#a1#4-=4tIz_f^@ONCt zAi4;zG^k*<>DaM=*@6V5Lc`+9Y6#JfLJLy1pTl%Ej-}6_RifJki_pG+n+K)1#l$$U zXOWhSU7Ua{mpb|Fnjdn^(k}?7ULRcK9F;G2cXzkdI48$Phz5Weu&FY+y=w4c6yu#& zOV*u1{4u}s!xCGCGn5Yay&1&pa+F?y#2;vY2fRlv)Q=+;n9a{c6|gdGk%AOj zdwJ&u!mG{;zGC-9?I9>p)1*Y}EvMeA4g2+GD-2qV+AwH!qkb@`ck4kt3VW>E;HcLm zc2sE;1-d{*$clozOc2qs8iznk`F%0OZ+{e$ov#hJjEK+ks}DS78{J5lwW(|D?VZpZ9(UewA0KKF&?mn;Ieq+0gPMbS zm5!Mji-zZHO)qw(P3esu0}pe~Chxud<+Nt9wZ2mKLtmz6fVv3ZvA2-5!J+Fw1;a`q z`XG=(OCVSGXyUfgpfF|GpiGm9_ljRARU&jM$sx)|#V?MtV|4{_e`t>B3Tnmdl&|P6 zCW3c=?Dv}OcKr=b3u}J=l=It9mPQn$UPr$`M@WB|r)ejia1f*+m*T( zilGV`%i|cRLC@&GE3>uT z+0k=vu6aPAbsRsfB2jtHDguPope39NHh zXVJ$+U_f3gUn#%(^!<60T4>M*z$~ji4Gly9r^XL;<NR4>`+L8I>(wMl}U)VC_l71s;C(eT|IY3%h zLM)*q6`1!`n06_7FPAk#%$2NWb3Hql<{qBtD<8lbENAutgOifsaS2ON+IF8l#&XUP z6=&aq(&^-ZqFUi9GW@(PbM?Iw0z1R`2P6bv!iFb zySpOovw1j-HH0(lspy;7m77jt7$qhu3M3eTqSE>zPEk|D=A1tj3g)I9hYg>9iNI6U z$8LU6#M5)v=E24v&Q)M(p|B|3Ehl-;xfCoXZs%7Sp*AXvI9G{O5bi7`l>T0*v@lQI z{GOntP$}2u3(k%&8u*1MnUu+5NR>aQ@=`whKwho>dYX*iu~uHk#W$h#xAUBg0;AN>KGo52-fFn}(N3q19@Kc*m4NUzxe#tQ??OABC<$|~TneuosM2$$ zL$K(WskYZSCsrq}V^aNV$04b-`Z?3mXfR4ga|xM?Vu`SYxt15VLwr6ojC`adKEb8j z_%Qz?T$GN68?wRpEXNQLoQdn=mBOTWFD6Vba?yQ@y=8iV$p7nafBuXA_&@*o|NMWk z(L6&|Q8#0C^|${I^|6!;uw4vUvD^5CImr+dzmy~TCG5|4@h!hV?R@*x`;K$ymm{Y? z7iE0B)*bR2Cr0+;A1JqyRb;XL>ef_H%iF_D?Z@@Awk}d=+=^C3=s5uZuwT;BuUVs# zdX&`OxU+%AK~p&-pbNm;KK%Of

X`i+kr|nF|>&vv_^Rg9i~8?)#_ke$FY64i^Wg z)FWzAYSLLkUE^HTogHtkvSzF+n;Z*A`SmS$Lr(@jU zmr>*t9GvAhSgT1X%0NLj#$=%rxTc7U`ziRUp;5SP|Rexa*esI@x8V0{Zmj8E$WsPpm`RF5n# z#TCY}>83BDC6wj|{pDfZLeTb2&=)*ODNRFiAt^ylY+v80ZihAz$mAWxz2CNmr<(8H zlIkCp+XPot*=$rS%PBxMDwbYR4jL^Vi6jaaz?sQ zvAn(;6^lQ|YuH|8n(Y#9$5lI6ql#yqcI8&pJLJcVd%$ZC8DEsv=3!tGt*x3<)K_QuPh#qEMI)LNsP7JxT zqxY#&8Ahbd0qv3+=OEkJu~Qd>#c_P7jS=xqI9^cEfcFXeP~t=+lyaC*l22K7wop+r zzk0-AP;WGQ-M*?G(OX`#4I87bKjsC4j*JLb}oUN^DvYS=5pwn0dN-(=Xb_L zfLgHzjJVW8!55(hQYb3)h2ncvG6d@&QEy83iJ3n69zh)_4sSBlNAdU`unB#~A78A9 z``%iRU+&lj^H;?Dd!zY-194YcKSJyyvB!#ipip|hRDrWGAkMX>M@xMV=T@R}^nU#t z{OqTPk0+CK^6=5a$KZiUEgm8$vWI0dOXOM6D5nJ8fmD03hE~q6xrhQk)D!Q!al+9N zlH=sbL4-JFy}C}03Kg%6j;IB}PZQ8+klPaf*PW^25dS7&e2vK}avUi3-0;7|G!^ILM+E(gbg=Ltu^_2E?L$fzD`{rr3nGEv=$@bCLB}AKEEKjnFq*-1l zY#PmpS31FOE@zWVnN(&&xDCQB5#cR~pmygQ+P#Q&pQ>GT=(hNIgyK^0L8HwVX+zxC zpLcl)3MusVd9vSXQmys5Tuhj(T%DvYRBw(` z815OVKJeS;sT7t2Lrg9E9w1E^5yg7N(L;7B($hrsjLkUr06wc!l@xpb)&8 z;2YnpfTdo{wE+C`jE&zCJHcPE@3%FRn7&3sfG;XEXt3ogejFE;n^a0u{Wgw%nW>*ebQ3k(@cOrr`vC?mArOp>^aJIpT^b{G8N-b%+C=AbbLV~{fL zK;K(!m*osX#9oOlz_%NoutuIh1oAS?I2rpooS0KUIt%qqu{|)5JLe#GO8Qrz*@Wy% z5^U2{Ey%tgqqmjB{YX1u1~|tu@wv=<9_i%xmW=36( z*F>Io+s+JsjvQkPcW$tGv5+HBh9!7R^Cg+4WM^0j4jlUNOJOlgdH)mWg=N#shq8&x z)3U{b{Rhsvf-7MT4cb2bT}|T z0rlH)GUQWYpzj7*hcBtG(&g{&?z&@0>Q*Mn^38eyuJX!{+48E-bE#S(7jrg?w@}^D zewhhHewWTf_(95d3%w4OLBra1e&Apxx{Bf>u3h1cO?$AH?Bs(5csJjZQ5hc&m((&wzX) zh>;6ozvd#6D_4(PSCz=JDwLn7_dBm1*{#ZKcXm$GORrv&hlV&ja;IFp5R~3|>;-Ay z(uJGtH`ij694)M4sY8|TP_cp~{Fp~HMU#a^C#g#>o_R5jff%ETJ1(b3p)=3>%Y%^a zmjb0M3hgP@nEu7SS2J6d6zqG3xbiXt44YdPP>_&M)ipRmfx<}>pV^tfkm)43c*`Ge z{qe)s;-Bk2@o=8kyw+o()SEV+xyqWno!!F=^esFbalvMO7g|GWSM)B-V8SzrP4a_+ zjaLHnfT7`j&Zx2hk|HE8!ZB_5j#$@ldM@^ZxFKGWbu#DrjmaB1*@>9k~fGP>g*<)RXMr`f+KCt@J*ay=TTme z#S~o=0E~=G?qd$L&>c|i5|vF8Y^#Yh&UjmKGU52nrHph!!OMg`i|x4(&Mfxdu#X?g zyo}^8k!TeVzNoI3GlJ zZh=wQ07nS{`!a>H8pwI!SFyr0p45K{UmWiOofL)LTlw7ViW766?87hFLCgKZo2*qEDaQ`8=~Hwwnm@j5cH;B} zhu1GZfUoi5Zm6BRACVGmekUb)(~h3c|Lo{_nd`akd7kf*uWh=I>+fsp=&Kd+^GW#v zH2>(ijk6X~W_m8Ozxy8^9yNW$Z4vaO!Lu?9QYoy15N44fSXFY8_fFF(KRC}hwkW2F zXOvQoD~Bx3??$s2+*ij8i7AdrqSAeKexIjyZu?GcvF*Puq`FT_xXZWPJy&;^zexvp zV@cllrW3sJ62;E47$n;ev3&HDy*K3Qglj-<&5OdI=7X?MZpme;g`V;o+2)IuZS>pu zmo3_?L%_Jccx3c|$!JZ$_D$=lN)+l5cU74}wGn(*4{*(y0ljo|!dbMV6SIw#-BfQ{ z$U7Q@AHplIY`gdNN@Wz^6ZB~RB7Dc*W^B5p@1QBdtSs*+(OrrT_?;KCELvJ<0BJ#D zz2>uxAYI*ik>DGrFi>~0_c_MqWy0qw%L8s9gP?GLd~-sAK5-a@e3(wtOC*@DHP`5c zY~EVKoXhJkw0T#Q4l>tA`SRz@pAWqJi#MN2#De_Gr6q!Lwb@tjkB<(1+E99ftZz_V zMT9yf(@g4vbY;=kc_m-0+=1a%={T_US{|fs)U`xfA3y)oUwe;4&_Om8fhTzs7giKO z?G}G?#vh0ZBwAyv9s)^*Clt3+@726Gyvp38s1P0O0TL)$gW>Z$kcUmp-kY5^^x&vIidQ#b0+EPNDdJ>}Y!VNSK=oRi4O_!{6ttpYD`?d^!=OJLG=e^3%~~Awo8cf{ z0oC=O8;wx&sSyEl=;ZZtfdM)oicFHr{35J>?KwaH!;0zgb=5qAW^8T0Rv!%e-FDDw z@Lg^7I)k9sh*>Zk*5VG|^JafASY>OaM#|b;c<$vd^qpMews=1|*0dJSSxZkyKhVOt zqH@2S+tr`bw|JLtIREGDgfq(WUOE@mI^q1Vyp#Hs(TTHzZgUP4jS3yqYrQ!jG%NMc z@0RzFM+8$}bGzcpF=sk?SM?h8rB020L>j|x*r_*%L9g5D2d!4r4+gyf3wo_qztb9o zTQ8i=LBP#UR#%mlgql#d(=_I*2h}NEy%)@m-mkszEZzD^r^TPP z@m4D&`D)z=&0%qxi{a6&sS+IZyc#S<7Y@SyNk*Hk+j(1yt>Tnqa^>iB$*>X>qPysc#s_&12aAj)pL${AYi{bb0;P!9>9 z*NO~-n&>%uue440Mzfgn_xMP4u)STtviz*_C0=}#=Y9RTZjec;e&gX5fdE#zMfw-{ z9??_RCMkJ!jJuVw>AbC?e)7G_Lu78r?W2R6 z?mf?K#gFE}k@w9jc{G-aVMh;Q-oHxKX6HD=q%W6~**(twU?Cgjmn`D@&48WXzNWF^`%^K+R3x(E-077joRdF5iI)+%lNzAA?m-pbA zZB82-!5on^(N9+~tq}_+W2=-F6Md^+f<~?03}SXUO0VE15ol$`0?Z4@#t{q5=HM8O z3~cHwxuqrmjlH~YqlB62+pfZ;t&hm?h5B7}(U1%>H!2Thrb8>CnXJGCyK{8#4K4TB zJAO%SYu@4W7rw{?#`|KIQ<;DbbJ2;f9u`O3Er2W2H6oV)FS5dd^Bv)b7@EYG8N9#$UrDs`;ctlmC2V9L7-WT^I zZ)rBS8VmU0<>$%*B=yJ3Q(0RYXTDL+(&Vi|;3YMu-|)Q1GTY=I#N{!0nVT@ajf~$U zNN&{U{dqDlx(BSx#vFGs!HCM`{#>9_Tbju&H9fB+Jph9r#e;$FwmK(d8&0_4gtx#6 z8xBr*^XgI8*>jvad5G3<>Kyvl>oI(F6Bx72y?1l(tuoCo;oi%!U3>{qT4qK$GJJYu z`TWm+kI*he7E1~eT|tfFN)p0KWBS+)2}mC}vvmkbF*pk9%Vglh>QYDX^6VgZi{*ql z{oTK7^kUO$H5PVya>S-#GFrwCxw+tNE_h4Qx@f%@ybYaPg-+hSgjkK_*11V1)-Tz+`zL0!dL_qPz%Q7YIsiu3(a1Nlq(VEp`-|N3wL@;BZq zS)DDU+n;893}o_`(ov;R67A>%s0YW1Qu;p6jRvF(&%A>(`j{{O1arp8*kf-C(%iu* z7Rszi%8x5KrEj~s5I*tp^G9e&CtV6;#iK9vy`!H?TfzskWHb$uaWF|oETA1*&fX2? zS9H|)T6E<>S7P(gyseHPqT!t-uXD!|ulXde?^aG53bNXZQT#muz}e%H_t1kQ{BRxe zn)~xr1h#7N2m6*lQan_MlpOJv>({Az;a$9uRZo+XW~v>uCuQoU0U zO^t1t%MxBogTP{rP-r@zArzXs`9YysDLcR$2`SIi!Cka4T8NHYL|>xFNFgdi+rI3Q zli00lF&fG+A^$zt{t=BR>2UQP-Z(5YRM{i%Q|rO5in2T^me)@y@J?N{hm5)U4Xv+=!2?MTp5Ioql$M$3gp?cn zLN`eUvnj*kE17qd&h+vtn0yi&@=lB-^G2lCmzCDCu{M8gC0adxeDZ}{i*lMLCFuDg zU)39uTfwH~2KdFk_s5GndR=0wLD)S&yyc+PuVMPsuYUnC`dK+yi_uHv91X@-OQv}- zzP(1O7o(r0GE;c+Mr$6iqnkZqKvH7<$Aa_p@auZ>;nHVlIiy_b2+2IJwe_O!pL-YY z1JZDnp4&_|Et#ayFlM{yoILZg4|yxqK=BQAdPeC`^!N0=`uD(*kVU}&TwvQTo`$-e z#eU8@xhBLvUvMtfS4Vg&KAR=kIg6hYJT&w-vt<6^P<`a>xAkhb$#@LD!b|#;eM!e- zz3A_tf(!RZ-y1A8to`lXw32R(`{T(YdHrRqw!vSr7S3ABl?8!S+4(wH`D$$3`nIz0 z^5>qVx8%aLuZsb)S;nBgLN(&?6MpF*YsA?27Z3qW#t70f1rEEN-_wR?wg%M(9NH) zNYuQwHwL(Fi74u0ZiOgnGN(Y4n$CjTgt!M7z-eV5bqp*Nf_$wxtjzI6FFLG14kvPj zn6T+=GUkkQ3?A^X`!b2uZ8@c^P{OHztgmga5qEW_dHyQyFY?tdd;l}Qc3tmMAdlmU z5IP%z8hcT$N98W_G8t>QV*A60dkqRL892fdcC6q~Pf}3ewM%_(gqFF~`TTBt@bTr^ z9qk{Fv)M$H1m|ZjBkiB6q0W)O3uVq3Q7GM+B5@bkhWG00gG1ELvk?>%rJQT*Bk2Dp z!eFJRAKR5sAclxa=bSj$x_4B8hxtu{f4l3NfXdegV4o%L**Gs;rH?F~4bz7}k@Iu`n%Y{V_M3G*%!4A4HbGD?Tqq zRt9Yye0U&37~uB{^#O-T5id++_g)pD*O!eb0IZvFQ@l{Q==1z)n6MD69#pj+KgU~| zcQE642vQDNMW_gT#>C=6yU@5FdK13RBbpMQR7n7hy6Qq#u30 zMse_r{>X!Sw)4S{k}QJVxpIOgF3zr3-(H<@n3?mPb@9#|Zwdi&p66)gh_1?8ef;>* z`_^%)y)6jl3dj7AoQE^YmN??uug&^kG@?^ayG5vii;H9eLNGE(4uB*Y9~$;GI5T#N zMS7Ee1jJNgBi~B?KLil-XL43d&_UWk1Fawds>)Yb08txG1QiXKcR>is;+)Pv`cEPP z9PSU=qydZwjcu{-0b7k3mr;wjEpg8|jvR*XPm;z7m%~R_`U#b3Qp73I7lwXrB5p=^ z8*!8K?Gq|Ns_#DL98E4jjt$3C-H&#CfjX;eQm0^wXrEURe3&5GZpJjw9xL?Pi+tt%GUGS0<|;Yp>};;Yw1XsCKbj z`Oegc+r7)d`3)npU!wX^UnT>^jxV?z$7z?~gQQ<6ZB2LH*RP9u$@vi^+Esi`?8vR% zsyCq?dZ@>3Fdq@e0c<(5_z>QrxGW^35GxY+#dqbdSTKYu;A6wQHq2|e4sM-!m6A;= zI$uINE2Y#}bYeDC_NJ+9t~VTtc(Wqi<^MlSFRu#Pz5_)Gmkz@F5+c~X41x=m)G7`Y zOJ)^XrAw!VW%-(UxX$-B#%K;nDLBBPKf?+S} zb$emG+33_(I5f)Qg^yiPN#1YtGgTUmalscZA-8pXEmA?*9%3gk8)4PS2|n|e+lo!( z)BOoL`2r%JjMLR@wwj$DKUl0&>vNXWXas{6i-RbR+qFTr8~0l`9rIN2oUM3VHsMi@ z9zGjP{XD{>O!I9X8np?D`hy9H`Z9#j?%_*tCUDbuQLIv(B8&v8udrMIf z^Xh49F7`zaUY7^1+I8hyi;u7C!z((O>%=SC%<s&+bf)+=+tuNqA@H-*m=_uuDHio3VI?Pa={ZcMHe=H zG19#g@!FM2?=ZT#Vc)7(g@3qBcjj3o;$@4aZ`W%gX>@vnxY_Om-MH2cTJ@+I^n0Cd zP^(3qa8U2}qIURtd41GcO(c5g@cp{IRTcj?ribhCuTQ!PwIA0SQ5ZLZVJiZZ?ZrXA z+ZhIfUT@Iu412X`&|U#$m0h^eXtWxgsN0D8jd+zKvW%7CCJ)QT#^C7Tv%%9lwK3GI+8AEEhkz~i0fbUJ znn6na*+VJ1ZcGQaVLGrpJ#WQyaDRo*jp<-xI#_gj*q9DBrh|>?;C41=V>;NF4nBX= z!5!u1fJ?z5tA#uKr}0{8Y?rhc4qbTBc*V4>@lE_1g;g zdc`6Jf%#luAM?G2ynQ9>aVs|w0gi$O3DW(#l9YP)E6;tpHxtV<<1!D%>GmZ}^)@53deBCWyBXJ3IqSeIrl8YbRlUOEZ5^BvGCS0hBbjfONRq^x%rc4x z0=ZC9>QBz{>doeBLm^ob0(v{g@zB7fdv+3qm~|ZU&w%1;;+uRX+vaDCq6INBP&O(@ z^%s|H{EC5Y>qEk&I2ipR3t$a{lV_(dgM$dH!@G$hpe}D86yfGUakW2x)IzSSzv<%)N3Hsj|*3G)zYFPOTSF zZ$N2}aC(*j{D|2S?9mlTN$eiuY~!^ZaY>4!!0X+a(B$Qmf>!l0?lQlMzQR0M*P$HC z%ciK)hpRz`5&JtkMSyp9lz_^C)P4R*PqxH_K>sc3K^DO9QoPMd*B;~e zdi=IA#jA>;?Wdow7&-TlvyXr>$xNZ!H~ob&QH2~Fa|VzrjvQz*IF0Or>Q>IC86;qW z?@}!}$*yEisKx|3P1pr4v`dMhC-D`e85MuDuYF zw*{e`WH15b|06g?`|u%Q4rI0J<3hRp?4Q)Pu0u8U*cHEpBx>jj+?{tbnr5 z)8m(XHTmL3B(deVyKZL}+6%W&%ISpua{6HWj?gamY$@%+e*#07cJw^WUm1=w@I!s- zPEGZ6bx|T^bD9#hq|}Kg)pIx3 zd%v|8`xyIH`wDx`0YCyIAd-@7s}m_*jx7R*2L}hhhwtEL8sXp)XRef2SdgAa4>1|t zYKBAhqLQg-l?BqPa3O^mXzb5IaHIDkeeTcP*-wVRSdhDhsYSM+A4g4oiW9VO`ZP{n z_0y+RRQVe{eWyPY3TM|c;mJV}hPqhoyP39_bzpS6(IYHeJFCDxdqhVGx7ESQGHP~J zsz4`$f8|d;aigkIidETd!@LS0AoTmRT|k%AY14oBD+ZTq<{rc6oAMvrAb5k(uetH( zQyDwctxt}#!^3Y`w`VysEiVpN#dMGBBz|0<^ywN|ACbQl@^p>a(hwNIsy^O;{Eh=8+ZwB0-WXh?Lt`6@Xdx42E1jLDa{H3wik;+t*&%9(W#R zp$^!g3f7-rK;;^UNU0XsaN>S|fx}mh<2$>6AwVm+F_}!k&+Ow(phbg;=9TH~A^AFP zX*Hx_`%GYp?aR;Ud%)ERWlIEFOLiwJ)66=X8kc9wCgT}c`ge}ETC1%}xJLqYTL|HS z&bXN41RJ4y4a$r%ewPq=j{ZT47BGGx2+(FfnVD4!Q}{DXZIJeKITNNb$r_LOd9t@_ zlDGWlj<38UzLG2Wdu1)VPrh^?KX$v$SFYQ0j=y|->7$>Ks4u9*?`7?g|vp zjI1} zgV|h4#6HT_Cl%-@KI|IU%+H>rd|2u+$LH;+$Iph5s@C1D$u_M;Ha#%cw0tEH3brl; zx;M_LbTF$4iSo6Wb~ zcSO~&=AZh!A%bBt8lUg|SY3MOog|7ldGF}*SCL1=5(#UqDXhC;<%B7l&E{ud!E{5E z;#9eQa;c;0Y4c8BoiE)4UAit?x+6Qc&dDIGSF43uTPsh1|Xr ze@|Gt4=URlmEX$oP^_t)G`cTp)W$ir#qn#%^yQ9V%X~XO{jdsC=Q4Dq?h-W+W5G0L z#uR|sqNDL9?&v0%`oxI_(_kLJ>;NxZMS`3qyg$p9@D>X%4y~iZ_)rPStE!~x{^iBs z{P0Z>FOtIxNDVK%Zo{XEC6{-jifeBD^pHNCe!UV&Qi3?4Wv5s+$iRC7o&XEWZw?;b z;t3kiDNTHZ=hILAI2+R((H$mHh^L5%+mQ=w_0S)=ct#!xizpLxZ?jn_`9v@B1&6zs zQG3ukqZSLO?!o-g^qQ_#)f^y9Z&HTIrpw0#UtAT7#)WzV_Xpc)HIvA$kWU)h>@+*g zFQ&d9R81DcsXy0BO?4*8*Bfp{z5|KRo~KMXlSMEN_!*cRK+fIvUq#K@nXuZF`L^Py zZ2vEaBzC;)j+b47hbW!O?s(Y}UUoPd_Kw|7*Ll)A21gwGBWHNjah*4>!>UmuiwWjUcca%)F!ZHnBo z@)tWk>#ujgXRTTz_d;@I9NQ0z&=S?*MKo(BarH$)rNe%nmeDn zqYsD#LAL)3R(6c^kOzPoxeQu6H)nbEh_fL62e};>^Wpa-z}O|5K!@PsC~sS5$LLr} z=1Mw99(ReiA-G}eyWTCkaY52}0kW|$aTMCA4Nlt;SCeTOD@LT95~x{fMM=1X@GfFO zu(0sQhvXXxRlkEq<000(iZb--!3Z3$PC_4cT7k*K+s*@33S z7ETSS!c1jf7>1S&a5hb$f#=up^~(T;n|O2sE#d5X3SLhIS%QzGBn~~Rq%?#rFXz}< zEr-RJBo7Yp%SA$vmJYNm$t_^5z!GwvQ#D&x0mF(2Jmzv)?$goFJPJ+GL>r#vhHuW5GA2mQWYV~@)vsDveYkW1-;gZF zTNY4c+FDW^sX|QhL56D*E27IS28QMXDZ49!wLIW3A)sos)fZoU!Tt=kz~Irj3_#@u z5%F9+E)F8gNwI^2f_#2%4t9_-K!z}cD1w;7P(oiRz{6$k0Cw>F`Gg0;#OuVZREZWm zOV~%WZ;H9}aFAKJ>5jm&sPghTby(-8F|=IhEcUM#p&N&{Li3+*B90NC zBSsu>@e)shF(uX?BqnwF>jvh11sa37A(-|zUM1lF%CB|7*`L##MO;?ceQ}qHJJ1V` zd=I8gwE?D5hD=Ca_l=f7)Vf2S?BLxFSQz8Cbqk|65+S5Q-E0?t7FF^<$XUGow}YE2 zK#G;YsAM{8!_izu8z5yRh%^&Z1CuIfeH}ViILb3@xq^0FF2|6eh%LpA&@xOZl4Vq8 zZGcw;KUM^T8F!=)_$jA_7wm9e#Lt|6+X==`roO4}F5>$j>{6pk=OCmZAqX-`LpP~b z9rb9ugcV+mZ_eJB(sFXi75@fM6v0cr_6i`D%)!aH6pD%>)JLIa5Sp21q;|^pgiBv( zFq9CZ6^knPRbM`~G9ax8M0ap>EyZ_mbY(cYT@Wt6%Kg| zvTRGw-C|ke!hsFoyo%5)pL%mdT}2djKTvAJj3K+@wLVs~s%!rP&r#E82R)tD!ropK& ziCX-k&4jlOlQnecD{FblGJc;jva9be;nz`oOAG2N;JEc*Tuim?2%9?cdqf0B4z9vn z0t>YEmTcePuhhx|4g1_e+(276=2soK#Uj6D!=-7k&d8KyIk|N(f7?Q)7+M#IBu=X+ zu9#R*Q**II+p?N6RhFkdAcLoi)9^2O0pRkLdAXN2n=SL=#&z}llU>jM`k(*%-~U`m zRZYx)|8o@?%~gStEErwix=j$NwLaUl3b3jaB;<$CL4%NkVm4UwV;}zR+s;5c&#fO? zZycG(_-L91M1H}$Vkw?ks2BxEwQ4WUJ;9iR%je)6%!$G#A+c^_e===m# zh=fLRI1Hm943r6&>5tDhBJ z{Sdl_k1(^3lSA+w7o$lzhaT?zrKsL^^6~m9Q^fa)J&|QYy2A54 z^lDCODC2xa|Eu&%LI+i(Hxmps~F(wC|uwM zAJ8fEulf60EatM+SY<2APe(ey;Ld^x_7yI?U0zBp7V`7MfK~BRKf&@|^9?;LD5N@U&{XW9Zz0Tit^@dOJ=n4KR)RgxKS>{h|wMm#dGicr5 zH0J&=ZIqUNki+(3-uE)|iA-UYf%k=AcG;53x^F?wm`Ujt zmsO0DeW&yQ7J;^r=zSs-;UiEnZ+}@C0sG_#AR?-if9}zyISAeK%^i++FK*ObYv1e~Nr=Y@&!>q;0gomyiN(<;wA(F#!Wz_k7t!qRusGDFrC2Zjkd zYlRS~^3}=%790GKN#2}`9g1;$RbLY`is~+hbBUHExp*t2`dxS?AH9;-Q+>>7yp7X0 z?(db>AWY$^TVH_-@9H;^6Yx(AcyrDx`4QQqQ(v4f_g>^u*i>pkcM8*a5TX%5z3{G>iQw0LP_kSXD(<0fnamth%Le!Un^9Qp<=vrr# ze2E4cdyI!|nUWC0ih_+0EXe{M0X$2n#p5lm`%U&ObFZWQqt2w6B|1wk)6)<7eMX_- z^x=<*AHR-ql@$iW|H1bD;wO7*UMyRh%UB@N_Id2X|ED8T`{L@Tb8b(20pLFJc*5>W zW4Z)yD8k7MB>FxwI4t9{sFjw|@*?)3!NylmCB_$s zELS)1mYXO<@g1WgwDE!*{3Cb`s$!HEi$mu$C~fG7_{TPt9Lbz(A^S$k9NFGasYr+g z?Hho-aSHIxXj|N2JF>nUT1wW6&1Gm@V3(Lc$2l^Zo8cUqCSfR|s#^Z&W*Yp*!fuwv zRkzbKa_#)tldrAMy4~Zddib@;fR?t71&bki(Tg~kxbdwBh+6!~GJiB%2tUF~5)_Je8Ks-2&-ZA*lV~!-D}rm- z4!3qt_Pa6H%P29o><72iioSLkcy?1+#oW1CJj08{c4~LWPB!2RXt&ePPFxrs>a@s* zGF0))!q~fuzl!*)Mh)15u`&dJ-fJ1((v4&zvDgSRJ*1&^j6l@SH@>nE!aS?35#dR*< zlbSvn@kexKFYdDyr~knd{3~=9Q!FGMWy}&N1kWB!<)7kJ^hLMBpk*!Qcz|&*@yA$b zBgV}QGU71s*Ew|upf0xC!UK$d80FRpO;D+&maNaZ-qXKM@k^+jDY#?6zwJ!K*K^5= z!?zvy&K%lccwv(aK3su}7ycAynV>umZS>ed_S&YJ8V1kFY<|11c2y#Q+&;pM{Y(Um zuDFWYTUz|WC~i?!vpS%=*i@-~; z?exK2Kwq{mZnt7)Tgs=)%&D7FO>GGb$wasTdokncg#LIQVG-H;7ykSwcRsoaVSL!% zlX|^5yVz@DeC`n@ZR;iNvq!Y_wmkyBnc_HthR)t3D-Rn^g{s33>Ta(*Jw;jd;U`yx z^p#qTy2K?Fsieo^T*Se26wG*um1hyB0Dn9?RlZCH=YsUfrKT92s6ViAs;tmaZ6gI6 zI;J-9FG?Hcx#f);@WrVg&Rr;0B~j+wXH$d$Sb>I@I|a#V0p?K{O|SP;QBC%3U+G%t zm^nR#c$uECdL*-JT%=ftV_K4_Va%7{u31D(Z+HCQD+y;dFW zLYog6+U#vxXtQU;l+{9;X3mP$4sBZH+(l^9`m$YUa~Im&+R)}2U1p80a%EoF9{W%l zW-%(UtWC*IotgUm7=*on1#W;6QN^P8OhYkAIQ^snbVIsLc5f6OP3RMh`?9sNtDW%feUSm0V?X17*b z*lbzqwF%oSHCGn(Pjxz>yr(e^;$(iY7=}S|bIRBHaKzv3IXxYGr*noz4!$U0F#B3% zm*g2_Cd4ET0L{yUC(6ldTFHzvqx5Z?Vr|sbT^eFe?MyG{#cV{2`D`)gtBC&i2l)5@ zP)h*<6aW+e000O8a(oq6(_JP1C&7XSbN000000RSKX00000003ihWnpw> zRcSY5VRU6KYIARHP)h{{000000ssO4ga7~lvH}4B006{7 Bz;XZp literal 0 HcmV?d00001 diff --git a/Solutions/Microsoft Exchange Security - Exchange On-Premises/Package/mainTemplate.json b/Solutions/Microsoft Exchange Security - Exchange On-Premises/Package/mainTemplate.json index c9b544ea61a..7be8d76dde3 100644 --- a/Solutions/Microsoft Exchange Security - Exchange On-Premises/Package/mainTemplate.json +++ b/Solutions/Microsoft Exchange Security - Exchange On-Premises/Package/mainTemplate.json @@ -74,7 +74,7 @@ "dataConnectorId1": "[extensionResourceId(resourceId('Microsoft.OperationalInsights/workspaces', parameters('workspace')), 'Microsoft.SecurityInsights/dataConnectors', variables('_dataConnectorContentId1'))]", "_dataConnectorId1": "[variables('dataConnectorId1')]", "dataConnectorTemplateSpecName1": "[concat(parameters('workspace'),'-dc-',uniquestring(variables('_dataConnectorContentId1')))]", - "dataConnectorVersion1": "2.0.0", + "dataConnectorVersion1": "2.0.1", "uiConfigId2": "ESI-ExchangeOnPremisesCollector", "_uiConfigId2": "[variables('uiConfigId2')]", "dataConnectorContentId2": "ESI-ExchangeOnPremisesCollector", @@ -166,7 +166,7 @@ "[resourceId('Microsoft.Resources/templateSpecs', variables('dataConnectorTemplateSpecName1'))]" ], "properties": { - "description": "Microsoft Exchange Security - Exchange On-Premises data connector with template version 2.0.0", + "description": "Microsoft Exchange Security - Exchange On-Premises data connector with template version 2.0.1", "mainTemplate": { "$schema": "https://schema.management.azure.com/schemas/2019-04-01/deploymentTemplate.json#", "contentVersion": "[variables('dataConnectorVersion1')]", @@ -846,7 +846,7 @@ ], "metadata": { "id": "5738bef7-b6c0-4fec-ba0b-ac728bef83a9", - "version": "2.0.0", + "version": "2.0.1", "kind": "dataConnector", "source": { "kind": "solution", @@ -1623,7 +1623,7 @@ "[resourceId('Microsoft.Resources/templateSpecs', variables('dataConnectorTemplateSpecName2'))]" ], "properties": { - "description": "Microsoft Exchange Security - Exchange On-Premises data connector with template version 2.0.0", + "description": "Microsoft Exchange Security - Exchange On-Premises data connector with template version 2.0.1", "mainTemplate": { "$schema": "https://schema.management.azure.com/schemas/2019-04-01/deploymentTemplate.json#", "contentVersion": "[variables('dataConnectorVersion2')]", @@ -2064,7 +2064,7 @@ "[resourceId('Microsoft.Resources/templateSpecs', variables('parserTemplateSpecName1'))]" ], "properties": { - "description": "ExchangeAdminAuditLogs Data Parser with template version 2.0.0", + "description": "ExchangeAdminAuditLogs Data Parser with template version 2.0.1", "mainTemplate": { "$schema": "https://schema.management.azure.com/schemas/2019-04-01/deploymentTemplate.json#", "contentVersion": "[variables('parserVersion1')]", @@ -2193,7 +2193,7 @@ "[resourceId('Microsoft.Resources/templateSpecs', variables('parserTemplateSpecName2'))]" ], "properties": { - "description": "ExchangeConfiguration Data Parser with template version 2.0.0", + "description": "ExchangeConfiguration Data Parser with template version 2.0.1", "mainTemplate": { "$schema": "https://schema.management.azure.com/schemas/2019-04-01/deploymentTemplate.json#", "contentVersion": "[variables('parserVersion2')]", @@ -2324,7 +2324,7 @@ "[resourceId('Microsoft.Resources/templateSpecs', variables('parserTemplateSpecName3'))]" ], "properties": { - "description": "ExchangeEnvironmentList Data Parser with template version 2.0.0", + "description": "ExchangeEnvironmentList Data Parser with template version 2.0.1", "mainTemplate": { "$schema": "https://schema.management.azure.com/schemas/2019-04-01/deploymentTemplate.json#", "contentVersion": "[variables('parserVersion3')]", @@ -2438,8 +2438,8 @@ "hidden-sentinelContentType": "Workbook" }, "properties": { - "description": "Microsoft Exchange Security - On-Premises Workbook with template", - "displayName": "Microsoft Exchange Security - On-Premises workbook template" + "description": "Microsoft Exchange Security - Exchange On-Premises Workbook with template", + "displayName": "Microsoft Exchange Security - Exchange On-Premises Workbook template" } }, { @@ -2455,7 +2455,7 @@ "[resourceId('Microsoft.Resources/templateSpecs', variables('workbookTemplateSpecName1'))]" ], "properties": { - "description": "Microsoft Exchange Least Privilege with RBAC Workbook with template version 2.0.0", + "description": "Microsoft Exchange Least Privilege with RBAC Workbook with template version 2.0.1", "mainTemplate": { "$schema": "https://schema.management.azure.com/schemas/2019-04-01/deploymentTemplate.json#", "contentVersion": "[variables('workbookVersion1')]", @@ -2536,8 +2536,8 @@ "hidden-sentinelContentType": "Workbook" }, "properties": { - "description": "Microsoft Exchange Security - On-Premises Workbook with template", - "displayName": "Microsoft Exchange Security - On-Premises workbook template" + "description": "Microsoft Exchange Security - Exchange On-Premises Workbook with template", + "displayName": "Microsoft Exchange Security - Exchange On-Premises Workbook template" } }, { @@ -2553,7 +2553,7 @@ "[resourceId('Microsoft.Resources/templateSpecs', variables('workbookTemplateSpecName2'))]" ], "properties": { - "description": "Microsoft Exchange Search AdminAuditLog Workbook with template version 2.0.0", + "description": "Microsoft Exchange Search AdminAuditLog Workbook with template version 2.0.1", "mainTemplate": { "$schema": "https://schema.management.azure.com/schemas/2019-04-01/deploymentTemplate.json#", "contentVersion": "[variables('workbookVersion2')]", @@ -2634,8 +2634,8 @@ "hidden-sentinelContentType": "Workbook" }, "properties": { - "description": "Microsoft Exchange Security - On-Premises Workbook with template", - "displayName": "Microsoft Exchange Security - On-Premises workbook template" + "description": "Microsoft Exchange Security - Exchange On-Premises Workbook with template", + "displayName": "Microsoft Exchange Security - Exchange On-Premises Workbook template" } }, { @@ -2651,7 +2651,7 @@ "[resourceId('Microsoft.Resources/templateSpecs', variables('workbookTemplateSpecName3'))]" ], "properties": { - "description": "Microsoft Exchange Admin Activity Workbook with template version 2.0.0", + "description": "Microsoft Exchange Admin Activity Workbook with template version 2.0.1", "mainTemplate": { "$schema": "https://schema.management.azure.com/schemas/2019-04-01/deploymentTemplate.json#", "contentVersion": "[variables('workbookVersion3')]", @@ -2732,8 +2732,8 @@ "hidden-sentinelContentType": "Workbook" }, "properties": { - "description": "Microsoft Exchange Security - On-Premises Workbook with template", - "displayName": "Microsoft Exchange Security - On-Premises workbook template" + "description": "Microsoft Exchange Security - Exchange On-Premises Workbook with template", + "displayName": "Microsoft Exchange Security - Exchange On-Premises Workbook template" } }, { @@ -2749,7 +2749,7 @@ "[resourceId('Microsoft.Resources/templateSpecs', variables('workbookTemplateSpecName4'))]" ], "properties": { - "description": "Microsoft Exchange Security Review Workbook with template version 2.0.0", + "description": "Microsoft Exchange Security Review Workbook with template version 2.0.1", "mainTemplate": { "$schema": "https://schema.management.azure.com/schemas/2019-04-01/deploymentTemplate.json#", "contentVersion": "[variables('workbookVersion4')]", @@ -2767,7 +2767,7 @@ }, "properties": { "displayName": "[parameters('workbook4-name')]", - "serializedData": "{\"version\":\"Notebook/1.0\",\"items\":[{\"type\":1,\"content\":{\"json\":\"# Microsoft Exchange Security Review\"},\"name\":\"text - 2\"},{\"type\":9,\"content\":{\"version\":\"KqlParameterItem/1.0\",\"parameters\":[{\"id\":\"743317e2-ebcf-4958-861d-4ff97fc7cce1\",\"version\":\"KqlParameterItem/1.0\",\"name\":\"EnvironmentList\",\"label\":\"Environment\",\"type\":2,\"isRequired\":true,\"multiSelect\":true,\"quote\":\"'\",\"delimiter\":\",\",\"query\":\"ExchangeEnvironmentList(Target=\\\"On-Premises\\\") | where ESIEnvironment != \\\"\\\"\",\"typeSettings\":{\"limitSelectTo\":1,\"showDefault\":false},\"queryType\":0,\"resourceType\":\"microsoft.operationalinsights/workspaces\"},{\"id\":\"a88b4e41-eb2f-41bf-92d8-27c83650a4b8\",\"version\":\"KqlParameterItem/1.0\",\"name\":\"DateOfConfiguration\",\"label\":\"Collection time\",\"type\":2,\"isRequired\":true,\"query\":\"let _configurationEnv = split(iff(isnull({EnvironmentList}) or isempty({EnvironmentList}) or tolower({EnvironmentList}) == \\\"all\\\",\\\"All\\\",tostring({EnvironmentList})),',');\\r\\nESIExchangeConfig_CL\\r\\n| extend ScopedEnvironment = iff(_configurationEnv contains \\\"All\\\", \\\"All\\\",ESIEnvironment_s) \\r\\n| where ScopedEnvironment in (_configurationEnv)\\r\\n| extend Collection = format_datetime(todatetime(EntryDate_s), 'yyyy-MM-dd')\\r\\n| summarize Collection = max(Collection)\\r\\n| project Collection = \\\"lastdate\\\", Selected = true\\r\\n| join kind= fullouter ( ESIExchangeConfig_CL | extend ScopedEnvironment = iff(_configurationEnv contains \\\"All\\\", \\\"All\\\",ESIEnvironment_s) \\r\\n | where ScopedEnvironment in (_configurationEnv)\\r\\n | where TimeGenerated > ago(90d)\\r\\n | extend Collection = format_datetime(todatetime(EntryDate_s), 'yyyy-MM-dd')\\r\\n | summarize by Collection \\r\\n | join kind= fullouter ( ESIExchangeConfig_CL | extend ScopedEnvironment = iff(_configurationEnv contains \\\"All\\\", \\\"All\\\",ESIEnvironment_s) \\r\\n | where ScopedEnvironment in (_configurationEnv)\\r\\n | where TimeGenerated > ago(90d)\\r\\n | extend Collection = format_datetime(todatetime(EntryDate_s), 'yyyy-MM-dd')\\r\\n | extend PreciseCollection = format_datetime(todatetime(EntryDate_s), 'yyyy-MM-dd HH:mm ')\\r\\n | summarize by PreciseCollection, Collection \\r\\n | join kind=leftouter (\\r\\n ESIExchangeConfig_CL | extend ScopedEnvironment = iff(_configurationEnv contains \\\"All\\\", \\\"All\\\",ESIEnvironment_s) \\r\\n | where ScopedEnvironment in (_configurationEnv)\\r\\n | where TimeGenerated > ago(90d)\\r\\n | extend Collection = format_datetime(todatetime(EntryDate_s), 'yyyy-MM-dd')\\r\\n | extend PreciseCollection = format_datetime(todatetime(EntryDate_s), 'yyyy-MM-dd HH:mm')\\r\\n | summarize by PreciseCollection, Collection \\r\\n | summarize count() by Collection\\r\\n ) on Collection\\r\\n ) on Collection\\r\\n) on Collection\\r\\n| project Value = iif(Selected,Collection,iif(count_ > 1,PreciseCollection,Collection1)), Label = iif(Selected,\\\"Last Known date\\\",iif(count_ > 1,PreciseCollection,Collection1)), Selected\\r\\n| sort by Selected, Value desc\",\"typeSettings\":{\"showDefault\":false},\"queryType\":0,\"resourceType\":\"microsoft.operationalinsights/workspaces\"},{\"id\":\"8ac96eb3-918b-4a36-bcc4-df50d8f46175\",\"version\":\"KqlParameterItem/1.0\",\"name\":\"Help\",\"label\":\"Show Help\",\"type\":10,\"isRequired\":true,\"query\":\"{\\\"version\\\":\\\"1.0.0\\\",\\\"content\\\":\\\"[\\\\r\\\\n { \\\\\\\"value\\\\\\\": \\\\\\\"Yes\\\\\\\", \\\\\\\"label\\\\\\\": \\\\\\\"Yes\\\\\\\"},\\\\r\\\\n {\\\\\\\"value\\\\\\\": \\\\\\\"No\\\\\\\", \\\\\\\"label\\\\\\\": \\\\\\\"No\\\\\\\", \\\\\\\"selected\\\\\\\":true }\\\\r\\\\n]\\\\r\\\\n\\\"}\",\"timeContext\":{\"durationMs\":2592000000},\"queryType\":8}],\"style\":\"above\",\"queryType\":0,\"resourceType\":\"microsoft.operationalinsights/workspaces\"},\"name\":\"TimeRange\"},{\"type\":1,\"content\":{\"json\":\"This workbook helps review your Exchange Security configuration.\\r\\nSelect your Exchange Organization and adjust the time range.\\r\\nBy default, the Help won't be displayed. To display the help, choose Yes on the toogle buttom \\\"Show Help\\\"\",\"style\":\"info\"},\"name\":\"text - 9\"},{\"type\":11,\"content\":{\"version\":\"LinkItem/1.0\",\"style\":\"tabs\",\"links\":[{\"id\":\"34188faf-7a02-4697-9b36-2afa986afc0f\",\"cellValue\":\"selected\",\"linkTarget\":\"parameter\",\"linkLabel\":\"Mailbox Access\",\"subTarget\":\"Delegation\",\"postText\":\"t\",\"style\":\"link\",\"icon\":\"3\",\"linkIsContextBlade\":true},{\"id\":\"be02c735-6150-4b6e-a386-b2b023e754e5\",\"cellValue\":\"selected\",\"linkTarget\":\"parameter\",\"linkLabel\":\"Exchange & AD Groups\",\"subTarget\":\"ExchAD\",\"style\":\"link\"},{\"id\":\"30dc6820-339d-4fa9-ad79-5d79816a5cab\",\"cellValue\":\"selected\",\"linkTarget\":\"parameter\",\"linkLabel\":\"Local Administrators\",\"subTarget\":\"Server\",\"style\":\"link\"},{\"id\":\"571fa2a4-1f1e-44a2-ada0-ccfb31b9abbb\",\"cellValue\":\"selected\",\"linkTarget\":\"parameter\",\"linkLabel\":\"Exchange Security Configuration\",\"subTarget\":\"SecConf\",\"style\":\"link\"},{\"id\":\"26c68d90-925b-4c3c-a837-e3cecd489b2d\",\"cellValue\":\"selected\",\"linkTarget\":\"parameter\",\"linkLabel\":\"Transport Configuration\",\"subTarget\":\"Transport\",\"style\":\"link\"},{\"id\":\"eb2888ca-7fa6-4e82-88db-1bb3663a801e\",\"cellValue\":\"selected\",\"linkTarget\":\"parameter\",\"linkLabel\":\"Workbook Summary\",\"subTarget\":\"Start\",\"style\":\"link\"}]},\"name\":\"TopMenuTabs\"},{\"type\":12,\"content\":{\"version\":\"NotebookGroup/1.0\",\"groupType\":\"editable\",\"items\":[{\"type\":1,\"content\":{\"json\":\"# Workbook goals\\r\\n\\r\\nThe goal of this workbook is to outline key security configurations of your Exchange on-premises environment.\\r\\n\\r\\nMost of Exchange organizations have were installed years ago (sometimes more than 10 years). Many configurations have been done and might not have been documented. For most environments, the core commitment was maintaining a high availability of the users’ mailboxes putting aside other consideration (even security considerations). Recommended security practices have also evolved since the first released and a regular review is necessary.\\r\\n\\r\\nThis workbook is designed to show your Exchange organization is configured with a security point of view. Indeed, some configurations easy to display as there are no UI available.\\r\\n\\r\\nFor each configuration, you will find explanations and recommendations when applicable.\\r\\n\\r\\n- This workbook does not pretend to show you every weak Security configurations, but the most common issues and known to be used by attackers. \\r\\n- It will not show you if you have been comprised, but will help you identify unexpected configuration.\\r\\n\\r\\n----\\r\\n\\r\\n## Quick reminder of how Exchange works\\r\\n\\r\\nDuring Exchange installation two very important groups are created :\\r\\n- Exchange Trusted Subsystem : Contain all the computer accounts for Exchange Server\\r\\n- Exchange Windows Permissions : Contain the group Exchange trusted Subsystem\\r\\n\\r\\nThese groups have :\\r\\n- Very high privileges in ALL AD domains including the root domain\\r\\n- Right on any Exchange including mailboxes\\r\\n\\r\\nAs each Exchange server computer account is member of Exchange Trusted Subsystem, it means by taking control of the computer account or being System on an Exchange server you will gain access to all the permissions granted to Exchange Trusted Subsystem and Exchange Windows Permissions.\\r\\n\\r\\nTo protect AD and Exchange, it is very important to ensure the following:\\r\\n- There is a very limited number of persons that are local Administrator on Exchange server\\r\\n- To protect user right like : Act part of the operating System, Debug\\r\\n\\r\\nEvery service account or application that have high privileges on Exchange need to be considered as sensitive\\r\\n\\r\\n** 💡 Exchange servers need to be considered as very sensitive servers**\\r\\n\\r\\n-----\\r\\n\\r\\n\\r\\n## Tabs\\r\\n\\r\\n### Mailbox Access\\r\\n\\r\\nThis tab will show you several top sensitive delegations that allow an account to access, modify, act as another user, search, export the content of a mailbox.\\r\\n\\r\\n### Exchange & AD Groups\\r\\n\\r\\nThis tab will show you the members of Exchange groups and Sensitive AD groups.\\r\\n\\r\\n### Local Administrators\\r\\n\\r\\nThis tab will show you the non standard content of the local Administrators group. Remember that a member of the local Administrators group can take control of the computer account of the server and then it will have all the permissions associated with Exchange Trusted Subsytem and Exchange Windows Permissions\\r\\n\\r\\nThe information is displayed with different views : \\r\\n- List of nonstandard users\\r\\n- Number of servers with a nonstandard a user\\r\\n- Nonstandard groups content\\r\\n- For each user important information are displayed like last logon, last password set, enabled\\r\\n\\r\\n### Exchange Security configuration\\r\\n\\r\\nThis tab will show you some important configuration for your Exchange Organization\\r\\n- Status of Admin Audit Log configuration\\r\\n- Status of POP and IMAP configuration : especially, is Plaintext Authentication configured ?\\r\\n- Nonstandard permissions on the Exchange container in the Configuration Partition\\r\\n\\r\\n### Transport Configuration\\r\\n\\r\\nThis tab will show you the configuration of the main Transport components\\r\\n- Receive Connectors configured with Anonymous and/or Open Relay\\r\\n- Remote Domain Autoforward configuration\\r\\n- Transport Rules configured with BlindCopyTo, SendTo, RedirectTo\\r\\n- Journal Rule and Journal Recipient configurations\\r\\n- Accepted Domains with *\\r\\n\\r\\n\"},\"name\":\"WorkbookInfo\"}]},\"conditionalVisibility\":{\"parameterName\":\"selected\",\"comparison\":\"isEqualTo\",\"value\":\"Start\"},\"name\":\"InformationTab\"},{\"type\":12,\"content\":{\"version\":\"NotebookGroup/1.0\",\"groupType\":\"editable\",\"title\":\"Security Configuration for the Exchange environment\",\"items\":[{\"type\":1,\"content\":{\"json\":\"This tab displays several security information regarding the organization or server's configuration.\"},\"name\":\"text - 12\"},{\"type\":1,\"content\":{\"json\":\"This section display the Exchange version and the CU installed.\\r\\n\\r\\nFor the latest build number, check this link : Exchange Build Numbers\\r\\n\\r\\nThis section is built from a file located in the public github repository.\\r\\nThe repository is manually updated by the team project when new CU/SU are released.\\r\\n\",\"style\":\"info\"},\"conditionalVisibility\":{\"parameterName\":\"Help\",\"comparison\":\"isEqualTo\",\"value\":\"Yes\"},\"name\":\"ServerVersionCheckHelp\"},{\"type\":3,\"content\":{\"version\":\"KqlItem/1.0\",\"query\":\"let ExchCUSU = externaldata (Productname:string, CU:string, SU:string, BuildNbAll:string, BuilCUNb:string, Major:string, CUBuildNb:string, SUBuildNb:string)[h\\\"https://raw.githubusercontent.com/nlepagnez/ESI-PublicContent/main/Operations/Watchlists/ExchBuildNumber.csv\\\"]with(format=\\\"csv\\\",ignoreFirstRecord=true)| project Productname,CU,SU,BuildNbAll,BuilCUNb,Major,CUBuildNb,SUBuildNb;\\r\\n//ExchangeConfiguration(SpecificSectionList=\\\"ExchangeServers\\\",SpecificConfigurationDate=\\\"{DateOfConfiguration:value}\\\",SpecificConfigurationEnv={EnvironmentList},Target = \\\"On-Premises\\\")\\r\\n//| extend VersionNumber = strcat(CmdletResultValue.AdminDisplayVersion.Major,\\\".\\\",CmdletResultValue.AdminDisplayVersion.Minor,\\\".\\\",CmdletResultValue.AdminDisplayVersion.Build)\\r\\nExchangeConfiguration(SpecificSectionList=\\\"ExchVersion\\\",SpecificConfigurationDate=\\\"{DateOfConfiguration:value}\\\",SpecificConfigurationEnv={EnvironmentList},Target = \\\"On-Premises\\\")\\r\\n| extend VersionNumber = tostring(CmdletResultValue.ProductVersion)\\r\\n| extend Server = tostring(ProcessedByServer_s)\\r\\n| extend CmdletResultType = tostring(CmdletResultType)\\r\\n| join kind= leftouter (ExchCUSU) on $left.VersionNumber == $right.BuildNbAll\\r\\n| distinct Server,VersionNumber,Productname,CU,SU,CmdletResultType\\r\\n| extend Server = strcat(\\\"💻 \\\",Server)\\r\\n| extend Productname = case ( VersionNumber startswith \\\"15.02\\\", \\\"Exchange 2019\\\", VersionNumber startswith \\\"15.01\\\", \\\"Exchange 2016\\\", VersionNumber startswith \\\"15.00\\\",\\\"Exchange 2013\\\", \\\"Exchange 2010\\\")\\r\\n| extend CU = iff(CmdletResultType <>\\\"Success\\\", \\\"Unable to retrieve information from server\\\", iff(CU <> \\\"\\\", CU, \\\"New CU or SU not yet in the List\\\"))\\r\\n| extend SU = iff(CmdletResultType <>\\\"Success\\\", \\\"Unable to retrieve information from server\\\", iff( SU <> \\\"\\\", SU, \\\"New CU or SU not yet in the List\\\"))\\r\\n|project-away CmdletResultType\\r\\n| sort by Server asc\\r\\n\",\"size\":1,\"showAnalytics\":true,\"title\":\"Exchange servers CU-SU level\",\"showExportToExcel\":true,\"queryType\":0,\"resourceType\":\"microsoft.operationalinsights/workspaces\",\"gridSettings\":{\"rowLimit\":10000,\"filter\":true}},\"customWidth\":\"50\",\"name\":\"ExchangeServersList\",\"styleSettings\":{\"showBorder\":true}},{\"type\":3,\"content\":{\"version\":\"KqlItem/1.0\",\"query\":\"let ExchCUSU = externaldata (Productname:string, CU:string, SU:string, BuildNbAll:string, BuilCUNb:string, Major:string, CUBuildNb:string, SUBuildNb:string)[h\\\"https://raw.githubusercontent.com/nlepagnez/ESI-PublicContent/main/Operations/Watchlists/ExchBuildNumber.csv\\\"]with(format=\\\"csv\\\",ignoreFirstRecord=true)| project Productname,CU,SU,BuildNbAll,BuilCUNb,Major,CUBuildNb,SUBuildNb;\\r\\nExchangeConfiguration(SpecificSectionList=\\\"ExchVersion\\\",SpecificConfigurationDate=\\\"{DateOfConfiguration:value}\\\",SpecificConfigurationEnv={EnvironmentList},Target = \\\"On-Premises\\\")\\r\\n//| extend VersionNumber = strcat(CmdletResultValue.AdminDisplayVersion.Major,\\\".\\\",CmdletResultValue.AdminDisplayVersion.Minor,\\\".\\\",CmdletResultValue.AdminDisplayVersion.Build)\\r\\n| extend VersionNumber = tostring(CmdletResultValue.ProductVersion)\\r\\n| extend Server = tostring(CmdletResultValue.Server)\\r\\n| join kind= leftouter (ExchCUSU) on $left.VersionNumber == $right.BuildNbAll\\r\\n| extend CU = iff( CU <> \\\"\\\", CU, \\\"New CU/SU not yet in the CU List\\\")\\r\\n| extend Version =strcat (VersionNumber,\\\"-\\\",CU,\\\"-\\\",SU)\\r\\n| summarize dcount(Server) by Version\",\"size\":0,\"showAnalytics\":true,\"title\":\"Version break down\",\"showExportToExcel\":true,\"queryType\":0,\"resourceType\":\"microsoft.operationalinsights/workspaces\",\"visualization\":\"piechart\"},\"customWidth\":\"50\",\"name\":\"ExchangeServerVersionPie\"},{\"type\":12,\"content\":{\"version\":\"NotebookGroup/1.0\",\"groupType\":\"editable\",\"title\":\"Admin Audit Log configuration\",\"items\":[{\"type\":1,\"content\":{\"json\":\"The Admin Audit log stores all the actions performed on Exchange Servers (except read actions such as Get/Test).\\r\\n\\r\\nAdmin Audit Log \\r\\n\\r\\nManage Admin Audit Log \\r\\n\\r\\n\\r\\nThis can be used to track \\r\\n- Unexpected behaviors\\r\\n- Who did a modification\\r\\n- Real actions performed by an account (the output could be used with to identify the necessary privileges)\\r\\n\\r\\nℹ️ Recommendations\\r\\n- Ensure that Admin Audit Log is not disabled\\r\\n- Ensure that critical Cmdlets have not been excluded\\r\\n- Ensure that AdminAuditLogCmdlets is set to * (list of audited Cmdlets)\\r\\n- Review the retention configuration for the Admin Audit Log content\",\"style\":\"info\"},\"conditionalVisibility\":{\"parameterName\":\"Help\",\"comparison\":\"isEqualTo\",\"value\":\"Yes\"},\"name\":\"AdminAuditHelp\"},{\"type\":1,\"content\":{\"json\":\"Here the main settings for the Admin Audit Log. Remember that AdminAudit log need to be enabled and no cmdlet should be excluded. Also check the retention limit.\"},\"name\":\"text - 0\"},{\"type\":3,\"content\":{\"version\":\"KqlItem/1.0\",\"query\":\"let SensitiveCMDLet = externaldata (Cmdlet:string, UserOriented:string, Parameters:string)[h\\\"https://raw.githubusercontent.com/nlepagnez/ESI-PublicContent/main/Operations/Watchlists/CmdletWatchlist.csv\\\"]with(format=\\\"csv\\\",ignoreFirstRecord=true)| project Cmdlet,UserOriented,Parameters;\\r\\nlet AAL = (ExchangeConfiguration(SpecificSectionList=\\\"AdminAuditLog\\\",SpecificConfigurationDate=\\\"{DateOfConfiguration:value}\\\",SpecificConfigurationEnv={EnvironmentList},Target = \\\"On-Premises\\\")\\r\\n| extend AdminAuditLogExcludedCmdlets = CmdletResultValue.AdminAuditLogExcludedCmdlets\\r\\n| project AdminAuditLogExcludedCmdlets);\\r\\nlet SentsitivecmdletTrack = toscalar(SensitiveCMDLet | where Cmdlet has_any ( AAL)| project Cmdlet);\\r\\nExchangeConfiguration(SpecificSectionList=\\\"AdminAuditLog\\\",SpecificConfigurationDate=\\\"{DateOfConfiguration:value}\\\",SpecificConfigurationEnv={EnvironmentList},Target = \\\"On-Premises\\\")\\r\\n| project CmdletResultValue\\r\\n| extend AdminAuditLogEnabled = iff(CmdletResultValue.AdminAuditLogEnabled == \\\"FALSE\\\", \\\" ❌ Disabled, High Risk\\\", \\\"✅ Enabled\\\")\\r\\n| extend AdminAuditLogAgeLimit = tostring(CmdletResultValue.AdminAuditLogAgeLimit)\\r\\n| extend AdminAuditLogAgeLimit = substring(AdminAuditLogAgeLimit,8)\\r\\n| extend AdminAuditLogAgeLimit =substring(AdminAuditLogAgeLimit,0,indexof(AdminAuditLogAgeLimit, ','))\\r\\n| extend AdminAuditLogAgeLimit = iff(toint(AdminAuditLogAgeLimit) == 0,strcat(\\\"❌ No AdminAuditlog recorded \\\",AdminAuditLogAgeLimit), iff(toint(AdminAuditLogAgeLimit) <=30,strcat(\\\"⚠️ Value to low except if exported \\\",AdminAuditLogAgeLimit), strcat(\\\"✅\\\",AdminAuditLogAgeLimit)))\\r\\n| extend AdminAuditLogCmdlets = tostring(CmdletResultValue.AdminAuditLogCmdlets)\\r\\n| extend AdminAuditLogCmdlets = substring(AdminAuditLogCmdlets,2)\\r\\n| extend AdminAuditLogCmdlets = substring(AdminAuditLogCmdlets,0,indexof(AdminAuditLogCmdlets, '\\\"]') )\\r\\n| extend AdminAuditLogCmdlets = replace_string(AdminAuditLogCmdlets,'\\\"',\\\"\\\")\\r\\n| extend Comment_AdminAuditLogCmdlets = iff( AdminAuditLogCmdlets == \\\"*\\\",\\\"✅ Default configuration\\\",\\\"❌ if AdminAuditLogCmdlets empty no logging else only AdminAuditLogCmdlets will be logged\\\")\\r\\n| extend AdminAuditLogExcludedCmdlets = tostring(CmdletResultValue.AdminAuditLogExcludedCmdlets)\\r\\n| extend AdminAuditLogExcludedCmdlets = substring(AdminAuditLogExcludedCmdlets,2)\\r\\n| extend AdminAuditLogExcludedCmdlets = substring(AdminAuditLogExcludedCmdlets,0,indexof(AdminAuditLogExcludedCmdlets, ']'))\\r\\n| extend AdminAuditLogExcludedCmdlets = replace_string(AdminAuditLogExcludedCmdlets,'\\\"',\\\"\\\")\\r\\n//| extend Cmdlet = replace_string(AdminAuditLogExcludedCmdlets,'\\\"',\\\"\\\")\\r\\n//| extend AALECSplit = tostring(split(AdminAuditLogExcludedCmdlets,\\\",\\\"))\\r\\n| project-away CmdletResultValue\\r\\n| extend Comment_AdminAuditLogExcludedCmdlet = case( isnotempty( SentsitivecmdletTrack ),\\\"❌ Some excluded CmdLets are part of Sensitive Cmdlets\\\",AdminAuditLogExcludedCmdlets <>\\\"\\\",\\\"⚠️ Some Cmdlets are excluded \\\",\\\"✅ No Excluded CmdLet\\\")\",\"size\":1,\"showAnalytics\":true,\"showExportToExcel\":true,\"queryType\":0,\"resourceType\":\"microsoft.operationalinsights/workspaces\",\"gridSettings\":{\"formatters\":[{\"columnMatch\":\"Comment_AdminAuditLogCmdlets\",\"formatter\":0,\"formatOptions\":{\"customColumnWidthSetting\":\"70ch\"}}],\"rowLimit\":10000,\"sortBy\":[{\"itemKey\":\"AdminAuditLogCmdlets\",\"sortOrder\":1}]},\"sortBy\":[{\"itemKey\":\"AdminAuditLogCmdlets\",\"sortOrder\":1}]},\"name\":\"query - 1\",\"styleSettings\":{\"showBorder\":true}}]},\"name\":\"group - 0Admin Audit Log configuration\"},{\"type\":12,\"content\":{\"version\":\"NotebookGroup/1.0\",\"groupType\":\"editable\"},\"name\":\"POP authentication configuration\"},{\"type\":1,\"content\":{\"json\":\"### POP authentication configuration\"},\"name\":\"text - 11\"},{\"type\":1,\"content\":{\"json\":\"If the POP Service is started, the LoginType should not set to Plaintext. This means that the password will be sent in clear on the network. As POP is enabled by default on all the mailboxes, this represents a high security risk.\\r\\n\\r\\nPOP Authentication\\r\\n- **PlainText** TLS encryption is not required on port 110. Usernames and passwords are sent unencrypted unless the underlying connection is encrypted by using TLS or SSL.\\r\\n- **PlainTextAuthentication** TLS encryption is not required on port 110. However, Basic authentication is permitted only on a port that uses TLS or SSL encryption.\\r\\n- **SecureLogin** Connection on port 110 must use TLS encryption before authenticating.\\r\\n\\r\\nℹ️ Recommendations\\r\\nDisable POP on all mailboxes except those who need to actually use this protocol.\\r\\nSet the authentication to SecureLogin or at least to PlainTextAuthentication and configure the application.\\r\\n\\r\\nIf the application is not able to perform this type of authentication:\\r\\n- Ensure that POP is disabled on all the mailboxes except those who really need it \\r\\n- Monitor the POP connections\\r\\n- Change the password of the application on a regular basis\\r\\n\\r\\nRecommended Reading : \\r\\n\\r\\nConfiguring Authentication for POP3 and IMAP4\\r\\n \\r\\n Set-PopSettings\\r\\n\\r\\n\\r\\nIn order to track mailboxes that are currently using POP\\r\\n- Enable POP logging\\r\\n- Set-PopSettings -Server SRV1 -ProtocolLogEnabled verbose\\r\\n- Several weeks later, analyze the log content\\r\\n- Default location : - Get-PopSettings -server SRV1 | fl server,*log*\\r\\n- Check for connection and authentication\\r\\n\",\"style\":\"info\"},\"conditionalVisibility\":{\"parameterName\":\"Help\",\"comparison\":\"isEqualTo\",\"value\":\"Yes\"},\"name\":\"PopServiceHelp\"},{\"type\":3,\"content\":{\"version\":\"KqlItem/1.0\",\"query\":\"ExchangeConfiguration(SpecificSectionList=\\\"PopSettings\\\",SpecificConfigurationDate=\\\"{DateOfConfiguration:value}\\\",SpecificConfigurationEnv={EnvironmentList},Target = \\\"On-Premises\\\")\\r\\n| extend ServerName = tostring(CmdletResultValue.Server.Name)\\r\\n| join kind = leftouter(ExchangeConfiguration(SpecificSectionList=\\\"POPIMAPServicesStatus\\\",SpecificConfigurationDate=\\\"{DateOfConfiguration:value}\\\",SpecificConfigurationEnv={EnvironmentList},Target = \\\"On-Premises\\\")\\r\\n| where CmdletResultValue.Name contains (\\\"MSExchangePop3\\\")\\r\\n| project ServerName= tostring(CmdletResultValue.Server), ServiceName=CmdletResultValue.Name, Status=CmdletResultValue.StatusString,StartupType=CmdletResultValue.StartTypeString\\r\\n| join (ExchangeConfiguration(SpecificSectionList=\\\"POPIMAPServicesStatus\\\",SpecificConfigurationDate=\\\"{DateOfConfiguration:value}\\\",SpecificConfigurationEnv={EnvironmentList},Target = \\\"On-Premises\\\")\\r\\n| where CmdletResultValue.Name contains (\\\"MSExchangePop3BE\\\" )\\r\\n| project ServerName= tostring(CmdletResultValue.Server), ServiceName=CmdletResultValue.Name, Status=CmdletResultValue.StatusString,StartupType=CmdletResultValue.StartTypeString) on ServerName) on ServerName\\r\\n| extend ServerName = tostring(CmdletResultValue.Server.Name)\\r\\n| extend LoginType = iff(CmdletResultValue.LoginType== 1 , \\\"⛔ PlainText, High Risk\\\", iff(CmdletResultValue.LoginType== 2, \\\"⚠️ PlainTextAuthentication\\\",\\\"✅ SecureLogin\\\"))\\r\\n| extend ProtocolLogEnabled = tostring(CmdletResultValue.ProtocolLogEnabled)\\r\\n| extend ServiceName = iff(tostring(ServiceName)==\\\"\\\", \\\"Service Status not retrieved\\\",tostring(ServiceName))\\r\\n| extend Status = tostring(Status)\\r\\n| extend BackendEndService= tostring(ServiceName1)\\r\\n| extend StartupType = tostring(StartupType)\\r\\n| extend BEStatus = tostring(Status1)\\r\\n| extend BEStartupType = tostring(StartupType1)\\r\\n| project ServerName,LoginType,ServiceName,Status,StartupType,BackendEndService,BEStatus,BEStartupType,ProtocolLogEnabled\\r\\n| sort by ServerName asc\",\"size\":1,\"showAnalytics\":true,\"title\":\"Pop Authentication : should not be set as Plaintext\",\"showExportToExcel\":true,\"queryType\":0,\"resourceType\":\"microsoft.operationalinsights/workspaces\",\"gridSettings\":{\"formatters\":[{\"columnMatch\":\"LoginType\",\"formatter\":5},{\"columnMatch\":\"Count\",\"formatter\":0,\"formatOptions\":{\"aggregation\":\"Sum\"}}],\"rowLimit\":10000,\"filter\":true,\"hierarchySettings\":{\"treeType\":1,\"groupBy\":[\"LoginType\"],\"finalBy\":\"LoginType\"}}},\"name\":\"PopSettingsQuery\",\"styleSettings\":{\"showBorder\":true}},{\"type\":1,\"content\":{\"json\":\"### IMAP authentication configuration\"},\"name\":\"IMAPTitle\"},{\"type\":1,\"content\":{\"json\":\"If the IMAP Service is started, the LoginType should not set to Plaintext. This means that the passwords will be sent in clear over the network. As IMAP is enabled by default on all the mailboxes, this is a high security risk.\\r\\n\\r\\nIMAP Authentication\\r\\n- **PlainText** TLS encryption is not required on port 110. User name and password are sent unencrypted unless the underlying connection is encrypted by using TLS or SSL.\\r\\n- **PlainTextAuthentication** TLS encryption is not required on port 143. However, Basic authentication is permitted only on a port that uses TLS or SSL encryption.\\r\\n- **SecureLogin** Connection on port 143 must use TLS encryption before authenticating.\\r\\n\\r\\nℹ️ Recommendations \\r\\nDisable IMAP on all mailboxes except those which needs to use this protocol. Set the authentication to SecureLogin or at least to PlainTextAuthentication and configure the application accordingly.\\r\\n\\r\\nIf the application is not able to perform this type of authentication:\\r\\n- Ensure that IMAP is disable on all the mailboxes except those who really need it \\r\\n- Monitor the connection\\r\\n- Regularly, change the password of the application\\r\\n\\r\\nRecommended Reading : \\r\\n\\r\\nConfiguring Authentication for POP3 and IMAP4\\r\\n\\r\\n Set-IMAPSettings\\r\\n\\r\\n\\r\\n\\r\\nIn order to track mailboxes that are currently using IMAP\\r\\n- Enable IMAP logging\\r\\n- Set-IMAPSettings -Server SRV1 -ProtocolLogEnabled verbose\\r\\n- Several weeks later, analyze the log content\\r\\n- Default location : Get-IMAPSettings -server SRV1 | fl server,*log*\\r\\n- Check for connection and authentication\\r\\n\",\"style\":\"info\"},\"conditionalVisibility\":{\"parameterName\":\"Help\",\"comparison\":\"isEqualTo\",\"value\":\"Yes\"},\"name\":\"IMAPHelp\"},{\"type\":3,\"content\":{\"version\":\"KqlItem/1.0\",\"query\":\"ExchangeConfiguration(SpecificSectionList=\\\"IMAPSettings\\\",SpecificConfigurationDate=\\\"{DateOfConfiguration:value}\\\",SpecificConfigurationEnv={EnvironmentList},Target = \\\"On-Premises\\\")\\r\\n| extend ServerName = tostring(CmdletResultValue.Server.Name)\\r\\n| join kind = leftouter(ExchangeConfiguration(SpecificSectionList=\\\"POPIMAPServicesStatus\\\",SpecificConfigurationDate=\\\"{DateOfConfiguration:value}\\\",SpecificConfigurationEnv={EnvironmentList},Target = \\\"On-Premises\\\")\\r\\n| where CmdletResultValue.Name contains (\\\"MSExchangeIMAP4\\\")\\r\\n| project ServerName= tostring(CmdletResultValue.Server), ServiceName=CmdletResultValue.Name, Status=CmdletResultValue.StatusString,StartupType=CmdletResultValue.StartTypeString\\r\\n| join (ExchangeConfiguration(SpecificSectionList=\\\"POPIMAPServicesStatus\\\",SpecificConfigurationDate=\\\"{DateOfConfiguration:value}\\\",SpecificConfigurationEnv={EnvironmentList},Target = \\\"On-Premises\\\")\\r\\n| where CmdletResultValue.Name contains (\\\"MSExchangeIMAP4BE\\\" )\\r\\n| project ServerName= tostring(CmdletResultValue.Server), ServiceName=CmdletResultValue.Name, Status=CmdletResultValue.StatusString,StartupType=CmdletResultValue.StartTypeString) on ServerName) on ServerName\\r\\n| extend ServerName = tostring(CmdletResultValue.Server.Name)\\r\\n| extend LoginType = iff(CmdletResultValue.LoginType== 1 , \\\"⛔ PlainText, High Risk\\\", iff(CmdletResultValue.LoginType== 2, \\\"⚠️ PlainTextAuthentication\\\",\\\"✅ SecureLogin\\\"))\\r\\n| extend ProtocolLogEnabled = tostring(CmdletResultValue.ProtocolLogEnabled)\\r\\n| extend ServiceName = iff(tostring(ServiceName)==\\\"\\\", \\\"Service Status not retrieved\\\",tostring(ServiceName))\\r\\n| extend Status = tostring(Status)\\r\\n| extend BackendEndService= tostring(ServiceName1)\\r\\n| extend StartupType = tostring(StartupType)\\r\\n| extend BEStatus = tostring(Status1)\\r\\n| extend BEStartupType = tostring(StartupType1)\\r\\n| project ServerName,LoginType,ServiceName,Status,StartupType,BackendEndService,BEStatus,BEStartupType,ProtocolLogEnabled\\r\\n| sort by ServerName asc\",\"size\":1,\"showAnalytics\":true,\"title\":\"IMAP Authentication : should not be set as Plaintext\",\"showExportToExcel\":true,\"queryType\":0,\"resourceType\":\"microsoft.operationalinsights/workspaces\",\"gridSettings\":{\"formatters\":[{\"columnMatch\":\"LoginType\",\"formatter\":5}],\"rowLimit\":10000,\"filter\":true,\"hierarchySettings\":{\"treeType\":1,\"groupBy\":[\"LoginType\"],\"finalBy\":\"LoginType\"}}},\"name\":\"IMAPSettingsQuery\",\"styleSettings\":{\"showBorder\":true}},{\"type\":12,\"content\":{\"version\":\"NotebookGroup/1.0\",\"groupType\":\"editable\",\"title\":\"Nonstandard permissions on Configuration Partitions\",\"items\":[{\"type\":1,\"content\":{\"json\":\"This section highlights nonstandard permissions on Configuration Partition for Exchange container. By selecting Yes for Generic All buttom only delegation set for Generic All will be display. Standard, Deny and inherited permissions have been removed\"},\"name\":\"text - 0\"},{\"type\":1,\"content\":{\"json\":\"During the lifetime of an Exchange Organization, many permissions may have been set on Exchange containers in the Configuration Partition.\\r\\nThis section displayed all the nonstandard permissions found on the most important Exchange containers :\\r\\n - Groups from legacy Exchange versions (Exchange Enterprise Servers, Exchange Domain Servers,...)\\r\\n - SID for deleted accounts\\r\\n - Old service accounts (that may not have been disabled or removed...)\\r\\n \\r\\nWhen an administrator run setup /prepareAD, his account will be granted Generic All at the top-level Exchange container\\r\\n\\r\\nBy default, this section only displayed the Generic All permissions.\\r\\n \\r\\nThis section is built by removing all the standard AD and Exchange groups.\\r\\n\\r\\n Exchange 2013 deployment permissions reference\\r\\n \\r\\n\",\"style\":\"info\"},\"conditionalVisibility\":{\"parameterName\":\"Help\",\"comparison\":\"isEqualTo\",\"value\":\"Yes\"},\"name\":\"text - 3\"},{\"type\":9,\"content\":{\"version\":\"KqlParameterItem/1.0\",\"parameters\":[{\"id\":\"80f9134a-420f-47c9-b171-1ca8e72efa3e\",\"version\":\"KqlParameterItem/1.0\",\"name\":\"GenericAll\",\"type\":10,\"isRequired\":true,\"jsonData\":\"[\\r\\n { \\\"value\\\": \\\"True\\\", \\\"label\\\": \\\"Yes\\\" },\\r\\n { \\\"value\\\": \\\"True,False\\\", \\\"label\\\": \\\"No\\\", \\\"selected\\\":true }\\r\\n]\"},{\"id\":\"29e2005c-3bd4-4bb8-be63-053d11abe1d4\",\"version\":\"KqlParameterItem/1.0\",\"name\":\"NonStandardPermissions\",\"type\":10,\"isRequired\":true,\"typeSettings\":{\"showDefault\":false},\"jsonData\":\"[\\r\\n { \\\"value\\\": \\\"True\\\", \\\"label\\\": \\\"Yes\\\", \\\"selected\\\":true },\\r\\n { \\\"value\\\": \\\"True,False\\\", \\\"label\\\": \\\"No\\\"}\\r\\n]\"}],\"style\":\"pills\",\"queryType\":0,\"resourceType\":\"microsoft.operationalinsights/workspaces\"},\"name\":\"parameters - 1\"},{\"type\":3,\"content\":{\"version\":\"KqlItem/1.0\",\"query\":\"let StandardGroup = dynamic([\\\"Authenticated Users\\\", \\\"Domain Admins\\\", \\\"Enterprise Admins\\\",\\\"Schema Admins\\\", \\\"Exchange Trusted Subsystem\\\", \\\"Exchange Servers\\\",\\\"Organization Management\\\", \\\"Public Folder Management\\\",\\\"Delegated Setup\\\", \\\"ANONYMOUS LOGON\\\", \\\"NETWORK SERVICE\\\", \\\"SYSTEM\\\", \\\"Everyone\\\",\\\"Managed Availability Servers\\\"]);\\r\\nlet Exchsrv =ExchangeConfiguration(SpecificSectionList=\\\"ExchangeServers\\\",SpecificConfigurationDate=\\\"{DateOfConfiguration:value}\\\",SpecificConfigurationEnv={EnvironmentList},Target = \\\"On-Premises\\\")| summarize make_list(CmdletResultValue.Name);\\r\\nExchangeConfiguration(SpecificSectionList=\\\"PartConfPerm\\\",SpecificConfigurationDate=\\\"{DateOfConfiguration:value}\\\",SpecificConfigurationEnv={EnvironmentList},Target = \\\"On-Premises\\\")\\r\\n| project CmdletResultValue\\r\\n| where CmdletResultValue.Deny !contains \\\"True\\\" and CmdletResultValue.IsInherited !contains \\\"True\\\"\\r\\n| where (CmdletResultValue.AccessRights == \\\"[983551]\\\") in ({GenericAll})\\r\\n| where not (CmdletResultValue.UserString has_any (StandardGroup)) in ({NonStandardPermissions})\\r\\n| where not (CmdletResultValue.UserString has_any (Exchsrv))in ({NonStandardPermissions})\\r\\n| extend Name = tostring(CmdletResultValue.Identity.Name)\\r\\n| extend Account = tostring(CmdletResultValue.UserString )\\r\\n| extend AccessRights = iff (tostring(CmdletResultValue.AccessRightsString) contains \\\"GenericAll\\\", strcat (\\\"❌ \\\",tostring(CmdletResultValue.AccessRightsString)), tostring(CmdletResultValue.AccessRightsString))\\r\\n| extend ExtendedRights = iff (tostring(CmdletResultValue.ExtendedRightsString) contains \\\"-As\\\", strcat (\\\"❌ \\\",tostring(CmdletResultValue.ExtendedRightsString)), tostring(CmdletResultValue.ExtendedRightsString))\\r\\n| extend InheritanceType = tostring(CmdletResultValue.InheritanceType)\\r\\n| extend DN = tostring(CmdletResultValue.Identity.DistinguishedName)\\r\\n| project-away CmdletResultValue\\r\\n| sort by DN desc\",\"size\":1,\"showAnalytics\":true,\"showExportToExcel\":true,\"queryType\":0,\"resourceType\":\"microsoft.operationalinsights/workspaces\",\"gridSettings\":{\"rowLimit\":10000,\"filter\":true,\"sortBy\":[{\"itemKey\":\"AccessRights\",\"sortOrder\":1}]},\"sortBy\":[{\"itemKey\":\"AccessRights\",\"sortOrder\":1}]},\"name\":\"query - 2\",\"styleSettings\":{\"showBorder\":true}}]},\"name\":\"Nonstandard permissions on Configuration Partitions\"}]},\"conditionalVisibility\":{\"parameterName\":\"selected\",\"comparison\":\"isEqualTo\",\"value\":\"SecConf\"},\"name\":\"Security Configuration for the Exchange environment\"},{\"type\":12,\"content\":{\"version\":\"NotebookGroup/1.0\",\"groupType\":\"editable\",\"items\":[{\"type\":1,\"content\":{\"json\":\"This tab displays important security configurations that allow access to all or partial mailboxes' content - Direct delegations are not listed - Example :
\\r\\n- Permissions Full Access \\r\\n- Permission on mailboxes folders\\r\\n\"},\"name\":\"text - 6\"},{\"type\":3,\"content\":{\"version\":\"KqlItem/1.0\",\"query\":\"ExchangeConfiguration(SpecificSectionList=\\\"MRA\\\",SpecificConfigurationDate=\\\"{DateOfConfiguration:value}\\\",SpecificConfigurationEnv={EnvironmentList})\\r\\n//| where CmdletResultValue.Name !contains \\\"Deleg\\\" and CmdletResultValue.RoleAssigneeName != \\\"Hygiene Management\\\" and CmdletResultValue.RoleAssigneeName != \\\"Exchange Online-ApplicationAccount\\\" and CmdletResultValue.RoleAssigneeName != \\\"Discovery Management\\\"\\r\\n| where CmdletResultValue.Name !contains \\\"Deleg\\\" \\r\\n| where CmdletResultValue.RoleAssigneeName !in (\\\"Hygiene Management\\\",\\\"Exchange Online-ApplicationAccount\\\",\\\"Discovery Management\\\")\\r\\n| where CmdletResultValue.Role.Name contains \\\"Export\\\" or CmdletResultValue.Role.Name contains \\\"Impersonation\\\" or (CmdletResultValue.Role.Name contains \\\"Search\\\" and CmdletResultValue.Role.Name !contains \\\"MailboxSearchApplication\\\")\\r\\n| summarize dcount(tostring(CmdletResultValue.RoleAssigneeName)) by role=tostring(CmdletResultValue.Role.Name)\",\"size\":1,\"showAnalytics\":true,\"title\":\"Number of delegations for sensitive RBAC roles\",\"showExportToExcel\":true,\"queryType\":0,\"resourceType\":\"microsoft.operationalinsights/workspaces\",\"visualization\":\"tiles\",\"tileSettings\":{\"titleContent\":{\"columnMatch\":\"role\",\"formatter\":1},\"leftContent\":{\"columnMatch\":\"dcount_CmdletResultValue_RoleAssigneeName\",\"formatter\":12,\"formatOptions\":{\"palette\":\"auto\"},\"numberFormat\":{\"unit\":17,\"options\":{\"style\":\"decimal\",\"maximumFractionDigits\":2,\"maximumSignificantDigits\":3}}},\"showBorder\":true,\"sortCriteriaField\":\"role\",\"sortOrderField\":1}},\"name\":\"MRAQuery\"},{\"type\":12,\"content\":{\"version\":\"NotebookGroup/1.0\",\"groupType\":\"editable\",\"title\":\"Application Impersonation Role\",\"items\":[{\"type\":1,\"content\":{\"json\":\"This delegation allows the delegated account to access and modify the content of every mailboxes using EWS.\"},\"name\":\"text - 0\"},{\"type\":1,\"content\":{\"json\":\"**ApplicationImpersonation** is a RBAC role that allows access (read and modify) to the content of all mailboxes using EWS. \\r\\n\\r\\n⚡ This role is very powerfull.\\r\\n\\r\\nIt should be carefully delegated. When a delegation is necessary, RBAC scopes should be configured to limit the list of impacted mailboxes.\\r\\n\\r\\nHelp for the role Application Impersonation\\r\\n\\r\\nIt is common (but not recommended) to see service accounts from backup solution, antivirus software, MDM... with this delegation.\\r\\n\\r\\nNote that the default configuration to the group Hygiene Management is excluded. This group is a sensitive group. Remember to monitor the content of this group.\",\"style\":\"info\"},\"conditionalVisibility\":{\"parameterName\":\"Help\",\"comparison\":\"isEqualTo\",\"value\":\"Yes\"},\"name\":\"text - 2\"},{\"type\":3,\"content\":{\"version\":\"KqlItem/1.0\",\"query\":\"ExchangeConfiguration(SpecificSectionList=\\\"MRA\\\",SpecificConfigurationDate=\\\"{DateOfConfiguration:value}\\\",SpecificConfigurationEnv={EnvironmentList})\\r\\n| where CmdletResultValue.Role.Name contains \\\"Impersonation\\\" and CmdletResultValue.RoleAssigneeName != \\\"Hygiene Management\\\" and CmdletResultValue.Name !contains \\\"Deleg\\\"\\r\\n//| extend RoleAssigneeName = tostring(CmdletResultValue.RoleAssigneeName)\\r\\n| extend RoleAssigneeType = case(CmdletResultValue.RoleAssigneeType== \\\"0\\\" or CmdletResultValue.RoleAssigneeType== \\\"2\\\" , \\\"User\\\", CmdletResultValue.RoleAssigneeType== \\\"10\\\",\\\"Group\\\",\\\"LinkedGroup\\\")\\r\\n| extend CustomRecipientWriteScope = tostring(CmdletResultValue.CustomRecipientWriteScope.Name)\\r\\n| extend CustomConfigWriteScope = tostring(CmdletResultValue.CustomConfigWriteScope.Name)\\r\\n| extend RecipientWriteScope = case(CmdletResultValue.RecipientWriteScope==\\\"0\\\",\\\"None\\\",CmdletResultValue.RecipientWriteScope==\\\"2\\\",\\\"Organization\\\",CmdletResultValue.RecipientWriteScope==\\\"3\\\",\\\"MyGAL\\\", CmdletResultValue.RecipientWriteScope==\\\"4\\\",\\\"Self\\\",CmdletResultValue.RecipientWriteScope==\\\"7\\\", \\\"CustomRecipientScope\\\",CmdletResultValue.RecipientWriteScope==\\\"8\\\",\\\"MyDistributionGroups\\\",\\\"NotApplicable\\\")\\r\\n| extend ConfigWriteScope = case(CmdletResultValue.ConfigWriteScope==\\\"0\\\",\\\"None\\\",CmdletResultValue.ConfigWriteScope==\\\"7\\\",\\\"CustomConfigScope\\\",CmdletResultValue.ConfigWriteScope==\\\"10\\\",\\\"OrganizationConfig\\\",\\\"NotApplicable\\\")\\r\\n| extend ConfigReadScope = iff(CmdletResultValue.ConfigReadScope == \\\"0\\\" , \\\"None\\\", \\\"OrganizationConfig\\\")\\r\\n| extend RecipientReadScope = case(CmdletResultValue.RecipientReadScope==\\\"2\\\",\\\"Organization\\\",CmdletResultValue.RecipientReadScope==\\\"3\\\",\\\"MyGAL\\\",CmdletResultValue.RecipientReadScope==\\\"4\\\",\\\"Self\\\",\\\"NotApplicable\\\")\\r\\n| extend ManagementRoleAssignement = tostring(CmdletResultValue.Name)\\r\\n| extend Status= tostring(CmdletResultValue.Enabled)\\r\\n| extend RoleAssignmentDelegationType = iff(CmdletResultValue.RoleAssignmentDelegationType ==\\\"6\\\" , \\\"Delegating\\\", \\\"Regular\\\") \\r\\n| extend RoleAssigneeName = iff( RoleAssigneeType == \\\"User\\\", strcat(\\\"🧑‍🦰 \\\",tostring(CmdletResultValue.RoleAssigneeName)), strcat(\\\"👪 \\\", tostring(CmdletResultValue.RoleAssigneeName)) )\\r\\n| project RoleAssigneeName, RoleAssigneeType, Status,CustomRecipientWriteScope, CustomConfigWriteScope, RecipientWriteScope, ConfigWriteScope, ConfigReadScope, RecipientReadScope, ManagementRoleAssignement, RoleAssignmentDelegationType, WhenCreated, WhenChanged\",\"size\":1,\"showAnalytics\":true,\"showExportToExcel\":true,\"queryType\":0,\"resourceType\":\"microsoft.operationalinsights/workspaces\",\"gridSettings\":{\"rowLimit\":10000,\"filter\":true}},\"name\":\"query - 1\",\"styleSettings\":{\"showBorder\":true}}]},\"name\":\"Application Impersonation Role\"},{\"type\":12,\"content\":{\"version\":\"NotebookGroup/1.0\",\"groupType\":\"editable\",\"title\":\"Mailbox Import Export Role\",\"items\":[{\"type\":1,\"content\":{\"json\":\"This delegation allows to export the content all mailboxes in a scope in PST file.\\r\\nExcluded from the result as default configuration :\\r\\nDelegating delegation to Organization Management\\r\\n\"},\"name\":\"text - 0\"},{\"type\":1,\"content\":{\"json\":\"**Mailbox Import Export** is a RBAC role that allows an account to export the content of any maibox in a PST. It also allows search in all mailboxes.\\r\\n\\r\\n⚡ This role is very powerfull.\\r\\n\\r\\nBy default, this role is not delegated to any user or group. The members of the group Organization Management by default do not have this role but are able to delegate it.\\r\\n\\r\\nHelp for the role Mailbox Import Export\\r\\n\\r\\nℹ️ Recommendations\\r\\n\\r\\nIf you temporarily need this delegation, consider the following:\\r\\n- create an empty group with this delegation\\r\\n- monitor the group content and alert when the group modified\\r\\n- add administrators in this group only for a short period of time.\\r\\n\",\"style\":\"info\"},\"conditionalVisibility\":{\"parameterName\":\"Help\",\"comparison\":\"isEqualTo\",\"value\":\"Yes\"},\"name\":\"ExportRoleHelp\"},{\"type\":3,\"content\":{\"version\":\"KqlItem/1.0\",\"query\":\"ExchangeConfiguration(SpecificSectionList=\\\"MRA\\\",SpecificConfigurationDate=\\\"{DateOfConfiguration:value}\\\",SpecificConfigurationEnv={EnvironmentList},Target = \\\"On-Premises\\\")\\r\\n| where CmdletResultValue.Role.Name contains \\\"export\\\" and CmdletResultValue.Name !contains \\\"Deleg\\\"\\r\\n| extend RoleAssigneeType = case(CmdletResultValue.RoleAssigneeType== \\\"0\\\" or CmdletResultValue.RoleAssigneeType== \\\"2\\\" , \\\"User\\\", CmdletResultValue.RoleAssigneeType== \\\"10\\\",\\\"Group\\\",\\\"LinkedGroup\\\")\\r\\n| extend CustomRecipientWriteScope = tostring(CmdletResultValue.CustomRecipientWriteScope.Name)\\r\\n| extend CustomConfigWriteScope = tostring(CmdletResultValue.CustomConfigWriteScope.Name)\\r\\n| extend RecipientWriteScope = case(CmdletResultValue.RecipientWriteScope==\\\"0\\\",\\\"None\\\",CmdletResultValue.RecipientWriteScope==\\\"2\\\",\\\"Organization\\\",CmdletResultValue.RecipientWriteScope==\\\"3\\\",\\\"MyGAL\\\", CmdletResultValue.RecipientWriteScope==\\\"4\\\",\\\"Self\\\",CmdletResultValue.RecipientWriteScope==\\\"7\\\", \\\"CustomRecipientScope\\\",CmdletResultValue.RecipientWriteScope==\\\"8\\\",\\\"MyDistributionGroups\\\",\\\"NotApplicable\\\")\\r\\n| extend ConfigWriteScope = case(CmdletResultValue.ConfigWriteScope==\\\"0\\\",\\\"None\\\",CmdletResultValue.ConfigWriteScope==\\\"7\\\",\\\"CustomConfigScope\\\",CmdletResultValue.ConfigWriteScope==\\\"10\\\",\\\"OrganizationConfig\\\",\\\"NotApplicable\\\")\\r\\n| extend ConfigReadScope = iff(CmdletResultValue.ConfigReadScope == \\\"0\\\" , \\\"None\\\", \\\"OrganizationConfig\\\")\\r\\n| extend RecipientReadScope = case(CmdletResultValue.RecipientReadScope==\\\"2\\\",\\\"Organization\\\",CmdletResultValue.RecipientReadScope==\\\"3\\\",\\\"MyGAL\\\",CmdletResultValue.RecipientReadScope==\\\"4\\\",\\\"Self\\\",\\\"NotApplicable\\\")\\r\\n| extend ManagementRoleAssignement = tostring(CmdletResultValue.Name)\\r\\n| extend Status= tostring(CmdletResultValue.Enabled)\\r\\n| extend RoleAssignmentDelegationType = iff(CmdletResultValue.RoleAssignmentDelegationType ==\\\"6\\\" , \\\"Delegating\\\", \\\"Regular\\\") \\r\\n| extend RoleAssigneeName = iff( RoleAssigneeType == \\\"User\\\", strcat(\\\"🧑‍🦰 \\\",tostring(CmdletResultValue.RoleAssigneeName)), strcat(\\\"👪 \\\", tostring(CmdletResultValue.RoleAssigneeName)) )\\r\\n| project RoleAssigneeName, RoleAssigneeType,Status, CustomRecipientWriteScope, CustomConfigWriteScope, RecipientWriteScope, ConfigWriteScope, ConfigReadScope, RecipientReadScope, ManagementRoleAssignement, RoleAssignmentDelegationType, WhenCreated, WhenChanged\",\"size\":1,\"showAnalytics\":true,\"showExportToExcel\":true,\"queryType\":0,\"resourceType\":\"microsoft.operationalinsights/workspaces\",\"gridSettings\":{\"rowLimit\":10000,\"filter\":true,\"sortBy\":[{\"itemKey\":\"ConfigWriteScope\",\"sortOrder\":1}]},\"sortBy\":[{\"itemKey\":\"ConfigWriteScope\",\"sortOrder\":1}]},\"name\":\"query - 1\",\"styleSettings\":{\"showBorder\":true}}]},\"name\":\"Mailbox Import Export Role\"},{\"type\":12,\"content\":{\"version\":\"NotebookGroup/1.0\",\"groupType\":\"editable\",\"title\":\"Mailbox Search Role\",\"items\":[{\"type\":1,\"content\":{\"json\":\"This delegation allows to search inside all or in a scope of mailboxes and export the result in PST.\\r\\nExcluded from the result as default configuration :\\r\\nDelegating delegation to Organization Management\\r\\nExchange Online-ApplicationAccount\\r\\nDiscovery Management has been excluded\\r\\n\"},\"name\":\"text - 0\"},{\"type\":1,\"content\":{\"json\":\"**Mailbox Search** is an RBAC role that allows an account to search in any mailbox and export the results to a PST.\\r\\n\\r\\n⚡ This role is very powerful.\\r\\n\\r\\nBy default, this role is only delegated to the group Discovery Management. The members of the group Organization Management do not have this role but are able to delegate it.\\r\\n\\r\\nHelp for the role Mailbox Search\\r\\n\\r\\nℹ️ Recommendations\\r\\n\\r\\nIf you temporarily need this delegation, consider the following:\\r\\n\\r\\n- add the administrators in the Discovery Management group\\r\\n- monitor the group content and alert when the group modified\\r\\n- add administrators in this group only for a short period of time\\r\\n\",\"style\":\"info\"},\"conditionalVisibility\":{\"parameterName\":\"Help\",\"comparison\":\"isEqualTo\",\"value\":\"Yes\"},\"name\":\"SearchRBACHelp\"},{\"type\":3,\"content\":{\"version\":\"KqlItem/1.0\",\"query\":\"ExchangeConfiguration(SpecificSectionList=\\\"MRA\\\",SpecificConfigurationDate=\\\"{DateOfConfiguration:value}\\\",SpecificConfigurationEnv={EnvironmentList},Target = \\\"On-Premises\\\")\\r\\n| where CmdletResultValue.Role.Name contains \\\"search\\\" and CmdletResultValue.Name !contains \\\"Deleg\\\"\\r\\n| where CmdletResultValue.RoleAssigneeName != \\\"Exchange Online-ApplicationAccount\\\" and CmdletResultValue.RoleAssigneeName != \\\"Discovery Management\\\"\\r\\n| extend RoleAssigneeType = case(CmdletResultValue.RoleAssigneeType== \\\"0\\\" or CmdletResultValue.RoleAssigneeType== \\\"2\\\" , \\\"User\\\", CmdletResultValue.RoleAssigneeType== \\\"10\\\",\\\"Group\\\",\\\"LinkedGroup\\\")\\r\\n| extend CustomRecipientWriteScope = tostring(CmdletResultValue.CustomRecipientWriteScope.Name)\\r\\n| extend CustomConfigWriteScope = tostring(CmdletResultValue.CustomConfigWriteScope.Name)\\r\\n| extend RecipientWriteScope = case(CmdletResultValue.RecipientWriteScope==\\\"0\\\",\\\"None\\\",CmdletResultValue.RecipientWriteScope==\\\"2\\\",\\\"Organization\\\",CmdletResultValue.RecipientWriteScope==\\\"3\\\",\\\"MyGAL\\\", CmdletResultValue.RecipientWriteScope==\\\"4\\\",\\\"Self\\\",CmdletResultValue.RecipientWriteScope==\\\"7\\\", \\\"CustomRecipientScope\\\",CmdletResultValue.RecipientWriteScope==\\\"8\\\",\\\"MyDistributionGroups\\\",\\\"NotApplicable\\\")\\r\\n| extend ConfigWriteScope = case(CmdletResultValue.ConfigWriteScope==\\\"0\\\",\\\"None\\\",CmdletResultValue.ConfigWriteScope==\\\"7\\\",\\\"CustomConfigScope\\\",CmdletResultValue.ConfigWriteScope==\\\"10\\\",\\\"OrganizationConfig\\\",\\\"NotApplicable\\\")\\r\\n| extend ConfigReadScope = iff(CmdletResultValue.ConfigReadScope == \\\"0\\\" , \\\"None\\\", \\\"OrganizationConfig\\\")\\r\\n| extend RecipientReadScope = case(CmdletResultValue.RecipientReadScope==\\\"2\\\",\\\"Organization\\\",CmdletResultValue.RecipientReadScope==\\\"3\\\",\\\"MyGAL\\\",CmdletResultValue.RecipientReadScope==\\\"4\\\",\\\"Self\\\",\\\"NotApplicable\\\")\\r\\n| extend ManagementRoleAssignement = tostring(CmdletResultValue.Name)\\r\\n| extend Status= tostring(CmdletResultValue.Enabled)\\r\\n| extend RoleAssignmentDelegationType = iff(CmdletResultValue.RoleAssignmentDelegationType ==\\\"6\\\" , \\\"Delegating\\\", \\\"Regular\\\") \\r\\n| extend RoleAssigneeName = iff( RoleAssigneeType == \\\"User\\\", strcat(\\\"🧑‍🦰 \\\",tostring(CmdletResultValue.RoleAssigneeName)), strcat(\\\"👪 \\\", tostring(CmdletResultValue.RoleAssigneeName)) )\\r\\n| project RoleAssigneeName, RoleAssigneeType, Status,CustomRecipientWriteScope, CustomConfigWriteScope, RecipientWriteScope, ConfigWriteScope, ConfigReadScope, RecipientReadScope, ManagementRoleAssignement, RoleAssignmentDelegationType, WhenCreated, WhenChanged\",\"size\":1,\"showAnalytics\":true,\"showExportToExcel\":true,\"queryType\":0,\"resourceType\":\"microsoft.operationalinsights/workspaces\",\"gridSettings\":{\"rowLimit\":10000,\"filter\":true,\"sortBy\":[{\"itemKey\":\"ConfigWriteScope\",\"sortOrder\":1}]},\"sortBy\":[{\"itemKey\":\"ConfigWriteScope\",\"sortOrder\":1}]},\"name\":\"query - 1\",\"styleSettings\":{\"showBorder\":true}}]},\"name\":\"Mailbox Search Role\"},{\"type\":12,\"content\":{\"version\":\"NotebookGroup/1.0\",\"groupType\":\"editable\",\"title\":\"ReceiveAs/SendAs Extended Right on databases\",\"items\":[{\"type\":1,\"content\":{\"json\":\"These are delegations at the database level.\\r\\n\\r\\n**Receive As Extended Right on database's objects in the Configuration**\\r\\n\\r\\nWhen an account has **ReceiveAs** permissions on a database's object, it can open and view the content of any mailboxes on that database.\\r\\n\\r\\nHelp for Receive As Permission\\r\\n\\r\\n\\r\\nℹ️ Recommendations\\r\\n\\r\\nDo not set this permission on databases. When an application requires this permission, ensure that the application account’s password is well protected and known by a very limited number of person.Change the password as often as possible.\\r\\n\\r\\n**Send As Extended Right on database objects in the Configuration**\\r\\n\\r\\n\\r\\nWhen an account has **SendAs** permissions on a database's object, it can send messages from all the mailboxes contained in this database. The messages that are sent from a mailbox will appear as if the mailbox owner sent them.\\r\\n\\r\\nHelp for Send As Permission\\r\\n\\r\\n\\r\\nℹ️ Recommendations\\r\\n\\r\\nDo not set this permission on databases. When an application requires this permission, ensure that the application account’s password is well protected and known by a very limited number of person.Change the password as often as possible.\\r\\n\",\"style\":\"info\"},\"conditionalVisibility\":{\"parameterName\":\"Help\",\"comparison\":\"isEqualTo\",\"value\":\"Yes\"},\"name\":\"SendAsHelp\"},{\"type\":3,\"content\":{\"version\":\"KqlItem/1.0\",\"query\":\"ExchangeConfiguration(SpecificSectionList=\\\"MailboxDatabaseReceiveAs\\\",SpecificConfigurationDate=\\\"{DateOfConfiguration:value}\\\",SpecificConfigurationEnv={EnvironmentList},Target = \\\"On-Premises\\\")\\r\\n| union ExchangeConfiguration(SpecificSectionList=\\\"MailboxDatabaseSendAs\\\",SpecificConfigurationDate=\\\"{DateOfConfiguration:value}\\\",SpecificConfigurationEnv={EnvironmentList},Target = \\\"On-Premises\\\")\\r\\n| where CmdletResultValue <> \\\"{'Error':'EmptyResult'}\\\"\\r\\n| summarize dcount(tostring(CmdletResultValue.UserString)) by iff( tostring(Section) contains \\\"MailboxDatabaseReceiveAs\\\",\\\"ReceiveAs Unique Acct\\\",\\\"SendAs Unique Acct\\\")\",\"size\":1,\"showAnalytics\":true,\"title\":\"Number of accounts with ReceiveAs/SendAs delegations\",\"showExportToExcel\":true,\"queryType\":0,\"resourceType\":\"microsoft.operationalinsights/workspaces\",\"visualization\":\"tiles\",\"tileSettings\":{\"titleContent\":{\"columnMatch\":\"Column1\",\"formatter\":1},\"leftContent\":{\"columnMatch\":\"dcount_CmdletResultValue_UserString\",\"formatter\":12,\"formatOptions\":{\"palette\":\"auto\"},\"numberFormat\":{\"unit\":17,\"options\":{\"style\":\"decimal\",\"maximumFractionDigits\":2,\"maximumSignificantDigits\":3}}},\"showBorder\":true,\"sortCriteriaField\":\"Column1\",\"sortOrderField\":1}},\"customWidth\":\"50\",\"name\":\"ReceiveAsUsersTiles\"},{\"type\":3,\"content\":{\"version\":\"KqlItem/1.0\",\"query\":\"ExchangeConfiguration(SpecificSectionList=\\\"MailboxDatabaseReceiveAs\\\",SpecificConfigurationDate=\\\"{DateOfConfiguration:value}\\\",SpecificConfigurationEnv={EnvironmentList},Target = \\\"On-Premises\\\")\\r\\n| union ExchangeConfiguration(SpecificSectionList=\\\"MailboxDatabaseSendAs\\\",SpecificConfigurationDate=\\\"{DateOfConfiguration:value}\\\",SpecificConfigurationEnv={EnvironmentList},Target = \\\"On-Premises\\\")\\r\\n| where CmdletResultValue <> \\\"{'Error':'EmptyResult'}\\\"\\r\\n| summarize dcount(tostring(CmdletResultValue.Identity.Name)) by iff( tostring(Section) contains \\\"MailboxDatabaseReceiveAs\\\",\\\"ReceiveAs Unique DB\\\",\\\"SendAs Unique DB\\\")\",\"size\":1,\"showAnalytics\":true,\"title\":\"ReceiveAs/SendAs database delegations\",\"color\":\"purple\",\"showExportToExcel\":true,\"queryType\":0,\"resourceType\":\"microsoft.operationalinsights/workspaces\",\"visualization\":\"tiles\",\"tileSettings\":{\"titleContent\":{\"columnMatch\":\"Column1\",\"formatter\":1},\"leftContent\":{\"columnMatch\":\"dcount_CmdletResultValue_Identity_Name\",\"formatter\":12,\"formatOptions\":{\"palette\":\"auto\"},\"numberFormat\":{\"unit\":17,\"options\":{\"style\":\"decimal\",\"maximumFractionDigits\":2,\"maximumSignificantDigits\":3}}},\"showBorder\":true,\"sortCriteriaField\":\"Column1\",\"sortOrderField\":1}},\"customWidth\":\"50\",\"name\":\"ReceiveAsTiles\",\"styleSettings\":{\"margin\":\"25\"}},{\"type\":3,\"content\":{\"version\":\"KqlItem/1.0\",\"query\":\"ExchangeConfiguration(SpecificSectionList=\\\"MailboxDatabaseReceiveAs\\\",SpecificConfigurationDate=\\\"{DateOfConfiguration:value}\\\",SpecificConfigurationEnv={EnvironmentList},Target = \\\"On-Premises\\\")\\r\\n| project CmdletResultValue\\r\\n| where CmdletResultValue <> \\\"{'Error':'EmptyResult'}\\\"\\r\\n| extend Account = tostring(CmdletResultValue.UserString)\\r\\n| extend DatabaseName = tostring(CmdletResultValue.Identity.Name)\\r\\n| summarize Count =count() by Account,DatabaseName\\r\\n| project Account,Count,DatabaseName\\r\\n\",\"size\":1,\"showAnalytics\":true,\"title\":\"ReceiveAs Extended Right on databases\",\"noDataMessage\":\"No Receive-As delegation\",\"noDataMessageStyle\":3,\"showExportToExcel\":true,\"queryType\":0,\"resourceType\":\"microsoft.operationalinsights/workspaces\",\"gridSettings\":{\"formatters\":[{\"columnMatch\":\"Account\",\"formatter\":5},{\"columnMatch\":\"Count\",\"formatter\":8,\"formatOptions\":{\"palette\":\"blue\",\"aggregation\":\"Sum\"}}],\"rowLimit\":10000,\"filter\":true,\"hierarchySettings\":{\"treeType\":1,\"groupBy\":[\"Account\"],\"finalBy\":\"Account\"},\"sortBy\":[{\"itemKey\":\"$gen_count_$gen_group_0\",\"sortOrder\":1}],\"labelSettings\":[{\"columnId\":\"Account\",\"comment\":\"Account and the number of databases on which it has delegation \"}]},\"sortBy\":[{\"itemKey\":\"$gen_count_$gen_group_0\",\"sortOrder\":1}]},\"customWidth\":\"50\",\"name\":\"MailboxDatabaseReceiveAsGrid\",\"styleSettings\":{\"showBorder\":true}},{\"type\":3,\"content\":{\"version\":\"KqlItem/1.0\",\"query\":\"ExchangeConfiguration(SpecificSectionList=\\\"MailboxDatabaseSendAs\\\",SpecificConfigurationDate=\\\"{DateOfConfiguration:value}\\\",SpecificConfigurationEnv={EnvironmentList},Target = \\\"On-Premises\\\")\\r\\n| project CmdletResultValue\\r\\n| where CmdletResultValue <> \\\"{'Error':'EmptyResult'}\\\"\\r\\n| extend Account = tostring(CmdletResultValue.UserString)\\r\\n| extend DatabaseName = tostring(CmdletResultValue.Identity.Name)\\r\\n| summarize Count =count() by Account, DatabaseName\\r\\n| project Account, Count, DatabaseName\",\"size\":1,\"showAnalytics\":true,\"title\":\"SendAs Extended Right on databases\",\"noDataMessage\":\"No Send-As delegation\",\"noDataMessageStyle\":3,\"showExportToExcel\":true,\"queryType\":0,\"resourceType\":\"microsoft.operationalinsights/workspaces\",\"gridSettings\":{\"formatters\":[{\"columnMatch\":\"Account\",\"formatter\":5},{\"columnMatch\":\"Count\",\"formatter\":8,\"formatOptions\":{\"palette\":\"blue\",\"aggregation\":\"Sum\",\"compositeBarSettings\":{\"labelText\":\"\"}}}],\"rowLimit\":10000,\"filter\":true,\"hierarchySettings\":{\"treeType\":1,\"groupBy\":[\"Account\"],\"finalBy\":\"Account\"},\"labelSettings\":[{\"columnId\":\"Account\",\"comment\":\"Account and the number of databases on which it has delegation \"}]}},\"customWidth\":\"50\",\"name\":\"MailboxDatabaseSendAsGrid\",\"styleSettings\":{\"showBorder\":true}}]},\"name\":\"ReceiveSendAs\"}]},\"conditionalVisibility\":{\"parameterName\":\"selected\",\"comparison\":\"isEqualTo\",\"value\":\"Delegation\"},\"name\":\"Importantsecurityconfiguration\"},{\"type\":12,\"content\":{\"version\":\"NotebookGroup/1.0\",\"groupType\":\"editable\",\"title\":\"Local Administrators\",\"items\":[{\"type\":1,\"content\":{\"json\":\"The following section will display the content of the local Administrators group for each server\\r\\n\\r\\n** When content refer to groups from other forests, none or partial information will be displayed and the number of Administrators may be inconsistent. **\\r\\n\\r\\nMost of the sections display the same information but with differents sorting, displays...\"},\"name\":\"text - 12\"},{\"type\":1,\"content\":{\"json\":\"Only Exchange administrators should be members of the local Administrators group of Exchange servers.\\r\\n\\r\\nYou need to review the content of the local Administrators group on a regular basis.\\r\\n\\r\\nIt is considered a high security risk to have a discrepancy of members between the servers. \\r\\n\\r\\nIt is not recommended to have more than one local administrator accounts. Furthermore, the password should be unique on each server and regularly changed. A solution like LAPS could be used to manage the local administrator password.\\r\\n\\r\\nOnly Exchange administrators should be able to logon on Exchange servers.\\r\\n\\r\\nHere the default content of the local Administrators group for an Exchange server \\r\\n:\\r\\n- Administrator (this account can be renamed)\\r\\n- Domain Admins\\r\\n- Exchange Trusted Subsystem\\r\\n- Organization Management\\r\\n\\r\\n**Service accounts should not be members of the local Administrators group**. If it is necessary, you need to ensure that the account is dedicated to Exchange. If the service account opens sessions on other servers, it can be used for lateral movements. \\r\\n\",\"style\":\"info\"},\"conditionalVisibility\":{\"parameterName\":\"Help\",\"comparison\":\"isEqualTo\",\"value\":\"Yes\"},\"name\":\"LocalAdminsHelp\"},{\"type\":9,\"content\":{\"version\":\"KqlParameterItem/1.0\",\"parameters\":[{\"id\":\"dfffbaa4-5888-41c2-b039-dafb6110260c\",\"version\":\"KqlParameterItem/1.0\",\"name\":\"Limited\",\"type\":10,\"isRequired\":true,\"typeSettings\":{\"showDefault\":false},\"jsonData\":\"[{ \\\"value\\\": \\\"True\\\", \\\"label\\\": \\\"Yes\\\" },\\r\\n { \\\"value\\\": \\\"True,False\\\", \\\"label\\\": \\\"No\\\", \\\"selected\\\":true }\\r\\n]\"}],\"style\":\"pills\",\"queryType\":0,\"resourceType\":\"microsoft.operationalinsights/workspaces\"},\"name\":\"parameters - 7\"},{\"type\":1,\"content\":{\"json\":\"**Top 10 servers with high number of unique local Administrators members**\"},\"name\":\"text - 13\"},{\"type\":3,\"content\":{\"version\":\"KqlItem/1.0\",\"query\":\"let StandardGroup = dynamic([\\\"Administrator\\\", \\\"Domain Admins\\\",\\\"Exchange Trusted Subsystem\\\",\\\"Organization Management\\\", \\\"Admins du domaine\\\"]);\\r\\nExchangeConfiguration(SpecificSectionList=\\\"LocalAminGroup\\\",SpecificConfigurationDate=\\\"{DateOfConfiguration:value}\\\",SpecificConfigurationEnv={EnvironmentList},Target = \\\"On-Premises\\\")\\r\\n| where CmdletResultValue.Level != 0\\r\\n| where not (CmdletResultValue.MemberPath has_any (StandardGroup)) in ({Limited})\\r\\n| project CmdletResultValue\\r\\n| extend Parentgroup = trim_end(@'\\\\\\\\Local Administrators',tostring(CmdletResultValue.Parentgroup))\\r\\n| extend MemberPath = tostring(CmdletResultValue.MemberPath)\\r\\n| extend ObjectClass = tostring(CmdletResultValue.ObjectClass)\\r\\n| where ObjectClass !contains \\\"group\\\"\\r\\n| summarize dcount(MemberPath) by Parentgroup\\r\\n| top 10 by dcount_MemberPath\\r\\n| sort by dcount_MemberPath\",\"size\":4,\"queryType\":0,\"resourceType\":\"microsoft.operationalinsights/workspaces\",\"visualization\":\"tiles\",\"tileSettings\":{\"titleContent\":{\"columnMatch\":\"Parentgroup\",\"formatter\":1},\"leftContent\":{\"columnMatch\":\"dcount_MemberPath\",\"formatter\":12,\"formatOptions\":{\"palette\":\"auto\"},\"numberFormat\":{\"unit\":17,\"options\":{\"style\":\"decimal\",\"maximumFractionDigits\":2,\"maximumSignificantDigits\":3}}},\"showBorder\":false}},\"name\":\"query - 9\"},{\"type\":12,\"content\":{\"version\":\"NotebookGroup/1.0\",\"groupType\":\"editable\",\"title\":\"Click to see number of unique members for all servers\",\"expandable\":true,\"items\":[{\"type\":1,\"content\":{\"json\":\"Number of unique members for all servers\"},\"name\":\"text - 0\"},{\"type\":3,\"content\":{\"version\":\"KqlItem/1.0\",\"query\":\"let StandardGroup = dynamic([\\\"Administrator\\\", \\\"Domain Admins\\\",\\\"Exchange Trusted Subsystem\\\",\\\"Organization Management\\\", \\\"Admins du domaine\\\"]);\\r\\nExchangeConfiguration(SpecificSectionList=\\\"LocalAminGroup\\\",SpecificConfigurationDate=\\\"{DateOfConfiguration:value}\\\",SpecificConfigurationEnv={EnvironmentList},Target = \\\"On-Premises\\\")\\r\\n| where CmdletResultValue.Level != 0\\r\\n| where not (CmdletResultValue.MemberPath has_any (StandardGroup)) in ({Limited})\\r\\n| project CmdletResultValue\\r\\n| extend Parentgroup = trim_end(@'\\\\\\\\Local Administrators',tostring(CmdletResultValue.Parentgroup))\\r\\n| extend MemberPath = tostring(CmdletResultValue.MemberPath)\\r\\n| extend ObjectClass = tostring(CmdletResultValue.ObjectClass)\\r\\n| where ObjectClass !contains \\\"group\\\"\\r\\n| summarize dcount(MemberPath) by Parentgroup\\r\\n| sort by dcount_MemberPath\",\"size\":4,\"queryType\":0,\"resourceType\":\"microsoft.operationalinsights/workspaces\",\"visualization\":\"tiles\",\"tileSettings\":{\"titleContent\":{\"columnMatch\":\"Parentgroup\",\"formatter\":1},\"leftContent\":{\"columnMatch\":\"dcount_MemberPath\",\"formatter\":12,\"formatOptions\":{\"palette\":\"auto\"},\"numberFormat\":{\"unit\":17,\"options\":{\"style\":\"decimal\",\"maximumFractionDigits\":2,\"maximumSignificantDigits\":3}}},\"showBorder\":false}},\"name\":\"query - 9 - Copy\"}]},\"name\":\"All servers number of members\"},{\"type\":3,\"content\":{\"version\":\"KqlItem/1.0\",\"query\":\"let allsrv = ExchangeConfiguration(SpecificSectionList=\\\"ExchangeServers\\\", SpecificConfigurationDate=\\\"{DateOfConfiguration:value}\\\",SpecificConfigurationEnv={EnvironmentList}, Target = \\\"On-Premises\\\") | where \\r\\nCmdletResultValue.IsMailboxServer== true | extend Name=tostring(CmdletResultValue.Name);\\r\\nExchangeConfiguration(SpecificSectionList=\\\"LocalAminGroup\\\", SpecificConfigurationDate=\\\"{DateOfConfiguration:value}\\\",SpecificConfigurationEnv={EnvironmentList}, Target = \\\"On-Premises\\\") \\r\\n| where CmdletResultValue.Level == 1\\r\\n| project CmdletResultValue\\r\\n| extend MemberPath = tostring(CmdletResultValue.MemberPath)\\r\\n| extend Name = tostring(trim_end(@'\\\\\\\\Local Administrators', tostring(CmdletResultValue.Parentgroup)))\\r\\n| distinct Name\\r\\n| project Name\\r\\n| join kind=rightanti (allsrv) on Name\\r\\n| project CmdletResultValue.Name\",\"size\":4,\"title\":\"Servers not reachable\",\"noDataMessage\":\"All server were successfully analyzed\",\"noDataMessageStyle\":3,\"queryType\":0,\"resourceType\":\"microsoft.operationalinsights/workspaces\",\"visualization\":\"tiles\",\"tileSettings\":{\"titleContent\":{\"columnMatch\":\"CmdletResultValue_Name\",\"formatter\":1,\"numberFormat\":{\"unit\":0,\"options\":{\"style\":\"decimal\"}}},\"showBorder\":true}},\"name\":\"query - 9 - Copy\"},{\"type\":3,\"content\":{\"version\":\"KqlItem/1.0\",\"query\":\"ExchangeConfiguration(SpecificSectionList=\\\"ExchangeServers\\\", SpecificConfigurationDate=\\\"{DateOfConfiguration:value}\\\",SpecificConfigurationEnv={EnvironmentList}, Target = \\\"On-Premises\\\")\\r\\n| where CmdletResultValue.ServerRole <> 64\\r\\n| count\\r\\n\",\"size\":4,\"title\":\"Number of servers\",\"queryType\":0,\"resourceType\":\"microsoft.operationalinsights/workspaces\",\"visualization\":\"tiles\",\"tileSettings\":{\"titleContent\":{\"columnMatch\":\"Count\",\"formatter\":1,\"numberFormat\":{\"unit\":0,\"options\":{\"style\":\"decimal\"}}},\"showBorder\":false}},\"customWidth\":\"50\",\"name\":\"query - 9 - Copy - Copy\"},{\"type\":3,\"content\":{\"version\":\"KqlItem/1.0\",\"query\":\"ExchangeConfiguration(SpecificSectionList=\\\"LocalAminGroup\\\", SpecificConfigurationDate=\\\"{DateOfConfiguration:value}\\\",SpecificConfigurationEnv={EnvironmentList}, Target = \\\"On-Premises\\\")\\r\\n| where CmdletResultValue.Level == 1\\r\\n| project CmdletResultValue\\r\\n| extend MemberPath = tostring(CmdletResultValue.MemberPath)\\r\\n| extend Parentgroup = trim_end(@'\\\\\\\\Local Administrators', tostring(CmdletResultValue.Parentgroup))\\r\\n| distinct Parentgroup = Parentgroup\\r\\n| count \",\"size\":4,\"title\":\"Number of Analyzed servers\",\"queryType\":0,\"resourceType\":\"microsoft.operationalinsights/workspaces\",\"visualization\":\"tiles\",\"tileSettings\":{\"titleContent\":{\"columnMatch\":\"Count\",\"formatter\":1,\"numberFormat\":{\"unit\":0,\"options\":{\"style\":\"decimal\"}}},\"showBorder\":false}},\"customWidth\":\"50\",\"name\":\"query - 9 - Copy - Copy - Copy\"},{\"type\":1,\"content\":{\"json\":\"This view shows each nonstandard user account that is member (directly or by a group) of the local Administrators group per server.\\r\\n\\r\\nConsider reviewing:\\r\\n- **nonstandard members** the Memberpath help to understand from which group the user comprised\\r\\n- **inconsistent memebrs** across servers\\r\\n\\r\\nNote that content from Trusted forests might not be displayed. \",\"style\":\"info\"},\"conditionalVisibility\":{\"parameterName\":\"Help\",\"comparison\":\"isEqualTo\",\"value\":\"Yes\"},\"name\":\"LocalAdminPerServersHelp\"},{\"type\":3,\"content\":{\"version\":\"KqlItem/1.0\",\"query\":\"let StandardGroup = dynamic([\\\"Administrator\\\", \\\"Domain Admins\\\",\\\"Exchange Trusted Subsystem\\\",\\\"Organization Management\\\", \\\"Admins du domaine\\\"]);\\r\\nExchangeConfiguration(SpecificSectionList=\\\"LocalAminGroup\\\",SpecificConfigurationDate=\\\"{DateOfConfiguration:value}\\\",SpecificConfigurationEnv={EnvironmentList},Target = \\\"On-Premises\\\")\\r\\n| where CmdletResultValue.Level != 0 \\r\\n| where not (CmdletResultValue.MemberPath has_any (StandardGroup))\\r\\n| project CmdletResultValue\\r\\n| extend Parentgroup = trim_end(@'\\\\\\\\Local Administrators',tostring(CmdletResultValue.Parentgroup))\\r\\n| extend MemberPath = tostring(CmdletResultValue.MemberPath)\\r\\n| extend Level = tostring(CmdletResultValue.Level)\\r\\n| extend ObjectClass = tostring(CmdletResultValue.ObjectClass)\\r\\n| extend LastLogon = tostring(CmdletResultValue.LastLogonString)\\r\\n| extend LastPwdSet = tostring(CmdletResultValue.LastPwdSetString)\\r\\n| extend Enabled = tostring(CmdletResultValue.Enabled)\\r\\n| extend DN = tostring(CmdletResultValue.DN)\\r\\n| summarize Count=count() by MemberPath,Parentgroup,Level,ObjectClass,LastLogon,LastPwdSet,Enabled,DN\\r\\n| project Parentgroup = strcat(\\\"💻 \\\",Parentgroup),Count,MemberPath,Level,ObjectClass,LastLogon,LastPwdSet,Enabled,DN\\r\\n| sort by Parentgroup asc \",\"size\":1,\"showAnalytics\":true,\"title\":\" Total Non standard Groups and accounts including nested groups\",\"showExportToExcel\":true,\"queryType\":0,\"resourceType\":\"microsoft.operationalinsights/workspaces\",\"gridSettings\":{\"formatters\":[{\"columnMatch\":\"Parentgroup\",\"formatter\":5,\"formatOptions\":{\"aggregation\":\"Count\"}},{\"columnMatch\":\"Count\",\"formatter\":4,\"formatOptions\":{\"palette\":\"blue\",\"aggregation\":\"Sum\"}}],\"rowLimit\":10000,\"filter\":true,\"hierarchySettings\":{\"treeType\":1,\"groupBy\":[\"Parentgroup\"],\"finalBy\":\"Parentgroup\"},\"sortBy\":[{\"itemKey\":\"MemberPath\",\"sortOrder\":1}],\"labelSettings\":[{\"columnId\":\"Parentgroup\",\"label\":\"Server\"}]},\"sortBy\":[{\"itemKey\":\"MemberPath\",\"sortOrder\":1}]},\"name\":\"LocalAdminPerServers\",\"styleSettings\":{\"showBorder\":true}},{\"type\":3,\"content\":{\"version\":\"KqlItem/1.0\",\"query\":\"let StandardGroup = dynamic([\\\"Administrator\\\", \\\"Domain Admins\\\",\\\"Exchange Trusted Subsystem\\\",\\\"Organization Management\\\", \\\"Admins du domaine\\\"]);\\r\\nExchangeConfiguration(SpecificSectionList=\\\"LocalAminGroup\\\",SpecificConfigurationDate=\\\"{DateOfConfiguration:value}\\\",SpecificConfigurationEnv={EnvironmentList},Target = \\\"On-Premises\\\")\\r\\n| where CmdletResultValue.Level == 1\\r\\n| where not (CmdletResultValue.MemberPath has_any (StandardGroup))\\r\\n| project CmdletResultValue\\r\\n| extend Parentgroup = trim_end(@'\\\\\\\\Local Administrators',tostring(CmdletResultValue.Parentgroup))\\r\\n| extend ObjectClass = tostring(CmdletResultValue.ObjectClass)\\r\\n| extend MemberPath = tostring(CmdletResultValue.MemberPath)\\r\\n| extend MemberPath = case( ObjectClass == \\\"group\\\", strcat( \\\"👪 \\\", MemberPath), ObjectClass == \\\"computer\\\", strcat( \\\"💻 \\\", MemberPath), strcat( \\\"🧑‍🦰 \\\", MemberPath) )\\r\\n| project-away CmdletResultValue\\r\\n//| summarize Count=count(), Servers=make_set(Parentgroup) by MemberPath\\r\\n| summarize Count=count() by MemberPath,Parentgroup \\r\\n| sort by Count desc\",\"size\":1,\"showAnalytics\":true,\"title\":\"Non Standard accounts summary\",\"showExportToExcel\":true,\"queryType\":0,\"resourceType\":\"microsoft.operationalinsights/workspaces\",\"gridSettings\":{\"formatters\":[{\"columnMatch\":\"Group\",\"formatter\":1},{\"columnMatch\":\"MemberPath\",\"formatter\":5},{\"columnMatch\":\"Count\",\"formatter\":4,\"formatOptions\":{\"palette\":\"blue\"}},{\"columnMatch\":\"Member\",\"formatter\":1}],\"rowLimit\":10000,\"filter\":true,\"hierarchySettings\":{\"treeType\":1,\"groupBy\":[\"MemberPath\"],\"expandTopLevel\":false},\"labelSettings\":[{\"columnId\":\"MemberPath\",\"label\":\"MemberPath\"},{\"columnId\":\"Parentgroup\",\"label\":\"Servers\"},{\"columnId\":\"Count\",\"label\":\"Nb Servers\"}]}},\"name\":\"LocalAdminCount\",\"styleSettings\":{\"showBorder\":true}},{\"type\":1,\"content\":{\"json\":\"##### Select a server to display its content\\r\\n\\r\\nBy default only the non-standard members are displayed. \\r\\n\\r\\n❌ : for last logon displayed when user logged or the last logon is greater than 180 days\\r\\n\\r\\n❌ : for password last set displayed when last password set greater than 365 days\"},\"name\":\"text - 0\"},{\"type\":9,\"content\":{\"version\":\"KqlParameterItem/1.0\",\"parameters\":[{\"id\":\"19e606d9-7f3e-4d2f-a314-892da571e50a\",\"version\":\"KqlParameterItem/1.0\",\"name\":\"Server\",\"type\":2,\"query\":\"ExchangeConfiguration(SpecificSectionList=\\\"LocalAminGroup\\\", SpecificConfigurationDate=\\\"{DateOfConfiguration:value}\\\",SpecificConfigurationEnv={EnvironmentList}, Target = \\\"On-Premises\\\")\\r\\n| where CmdletResultValue.Level == 1\\r\\n| project CmdletResultValue\\r\\n| extend MemberPath = tostring(CmdletResultValue.MemberPath)\\r\\n| extend Parentgroup = trim_end(@'\\\\\\\\Local Administrators', tostring(CmdletResultValue.Parentgroup))\\r\\n| distinct Parentgroup = Parentgroup\",\"typeSettings\":{\"showDefault\":false},\"queryType\":0,\"resourceType\":\"microsoft.operationalinsights/workspaces\"},{\"id\":\"05ef4f1c-4cf4-406f-9fb2-9ee30dc93abd\",\"version\":\"KqlParameterItem/1.0\",\"name\":\"Limited\",\"label\":\"Show only nonstandard members\",\"type\":10,\"description\":\"Show only non standard members\",\"isRequired\":true,\"typeSettings\":{\"showDefault\":false},\"jsonData\":\"[{ \\\"value\\\": \\\"True\\\", \\\"label\\\": \\\"Yes\\\" },\\r\\n { \\\"value\\\": \\\"True,False\\\", \\\"label\\\": \\\"No\\\", \\\"selected\\\":true }\\r\\n]\",\"value\":\"True\"},{\"id\":\"901bf975-426f-486b-82de-ff0d64f139bb\",\"version\":\"KqlParameterItem/1.0\",\"name\":\"LastLogon\",\"label\":\"Last Logon\",\"type\":10,\"isRequired\":true,\"typeSettings\":{\"showDefault\":false},\"jsonData\":\"[ {\\\"value\\\": \\\"0d\\\", \\\"label\\\": \\\"No filter\\\",\\\"selected\\\":true},\\r\\n{ \\\"value\\\": \\\"90d\\\", \\\"label\\\": \\\"90d\\\" },\\r\\n { \\\"value\\\": \\\"180d\\\", \\\"label\\\": \\\"6m\\\" },\\r\\n { \\\"value\\\": \\\"365d\\\", \\\"label\\\": \\\"1y\\\" },\\r\\n{ \\\"value\\\": \\\"730d\\\", \\\"label\\\": \\\"2y\\\" },\\r\\n{ \\\"value\\\": \\\"1085d\\\", \\\"label\\\": \\\"3y\\\" },\\r\\n{ \\\"value\\\": \\\"1097d\\\", \\\"label\\\": \\\"more than 3y\\\"},\\r\\n{ \\\"value\\\": \\\"3650d\\\", \\\"label\\\": \\\"more than 10y\\\"}\\r\\n]\"},{\"id\":\"2f7a613f-8749-44c9-b8be-844964badef8\",\"version\":\"KqlParameterItem/1.0\",\"name\":\"PasswordLast\",\"label\":\"Password Last Set\",\"type\":10,\"isRequired\":true,\"typeSettings\":{\"showDefault\":false},\"jsonData\":\"[{ \\\"value\\\": \\\"0d\\\", \\\"label\\\": \\\"No filter\\\",\\\"selected\\\":true },\\r\\n { \\\"value\\\": \\\"365d\\\", \\\"label\\\": \\\"1y\\\" },\\r\\n{ \\\"value\\\": \\\"730d\\\", \\\"label\\\": \\\"2y\\\" },\\r\\n{ \\\"value\\\": \\\"1095d\\\", \\\"label\\\": \\\"3y\\\" },\\r\\n{ \\\"value\\\": \\\"1097d\\\", \\\"label\\\": \\\"more than 3y\\\"},\\r\\n{ \\\"value\\\": \\\"3650d\\\", \\\"label\\\": \\\"more than 10y\\\"}\\r\\n]\"}],\"style\":\"pills\",\"queryType\":0,\"resourceType\":\"microsoft.operationalinsights/workspaces\"},\"name\":\"parameters - 1\"},{\"type\":3,\"content\":{\"version\":\"KqlItem/1.0\",\"query\":\"let StandardGroup = dynamic([\\\"Administrator\\\", \\\"Domain Admins\\\",\\\"Exchange Trusted Subsystem\\\",\\\"Organization Management\\\", \\\"Admins du domaine\\\"]);\\r\\nExchangeConfiguration(SpecificSectionList=\\\"LocalAminGroup\\\",SpecificConfigurationDate=\\\"{DateOfConfiguration:value}\\\",SpecificConfigurationEnv={EnvironmentList},Target = \\\"On-Premises\\\")\\r\\n| where CmdletResultValue.Level != 0 \\r\\n| where CmdletResultValue.Parentgroup contains \\\"{Server}\\\"\\r\\n| where not (CmdletResultValue.MemberPath has_any (StandardGroup)) in ({Limited})\\r\\n| where todatetime (CmdletResultValue.LastPwdSetString) < ago({PasswordLast}) or tostring (CmdletResultValue.LastPwdSetString) == \\\"\\\"\\r\\n| where todatetime (CmdletResultValue.LastLogonString) < ago({LastLogon}) or tostring (CmdletResultValue.LastLogonString) == \\\"\\\"\\r\\n| project CmdletResultValue\\r\\n| extend Parentgroup = trim_end(@'\\\\\\\\Local Administrators',tostring(CmdletResultValue.Parentgroup))\\r\\n| extend MemberPath = tostring(CmdletResultValue.MemberPath)\\r\\n| extend Level = tostring(CmdletResultValue.Level)\\r\\n| extend ObjectClass = tostring(CmdletResultValue.ObjectClass)\\r\\n| extend LastLogon = tostring(CmdletResultValue.LastLogonString)\\r\\n| extend LastLogon = iif(ObjectClass==\\\"group\\\" or ObjectClass==\\\"computer\\\" or ObjectClass==\\\"Local User\\\" or ObjectClass==\\\"computer\\\",\\\"N/A\\\",iif ( todatetime (CmdletResultValue.LastLogonString) > ago(180d), CmdletResultValue.LastLogonString,iff (LastLogon==\\\"\\\", \\\"❌ Never logged\\\",strcat(\\\"❌\\\",LastLogon))))\\r\\n| extend LastPwdSet = CmdletResultValue.LastPwdSetString\\r\\n| extend LastPwdSet = iif(ObjectClass==\\\"group\\\" or ObjectClass==\\\"computer\\\" or ObjectClass==\\\"Local User\\\" or ObjectClass==\\\"computer\\\",\\\"N/A\\\",iif ( todatetime (CmdletResultValue.LastPwdSetString) > ago(365d), CmdletResultValue.LastPwdSetString,iff (LastPwdSet==\\\"\\\", \\\"❌ Password never set\\\",strcat(\\\"❌\\\",LastPwdSet))))\\r\\n | extend Enabled = tostring(CmdletResultValue.Enabled)\\r\\n| extend DN = tostring(CmdletResultValue.DN)\\r\\n| project-away CmdletResultValue\\r\\n| sort by MemberPath asc\\r\\n| project-away Parentgroup\",\"size\":1,\"showAnalytics\":true,\"title\":\"Local Administrators group content\",\"showExportToExcel\":true,\"queryType\":0,\"resourceType\":\"microsoft.operationalinsights/workspaces\",\"gridSettings\":{\"rowLimit\":10000,\"filter\":true,\"sortBy\":[{\"itemKey\":\"MemberPath\",\"sortOrder\":1}]},\"sortBy\":[{\"itemKey\":\"MemberPath\",\"sortOrder\":1}]},\"conditionalVisibility\":{\"parameterName\":\"Server\",\"comparison\":\"isNotEqualTo\",\"value\":\"\"},\"name\":\"AdGroups\",\"styleSettings\":{\"showBorder\":true}}]},\"conditionalVisibility\":{\"parameterName\":\"selected\",\"comparison\":\"isEqualTo\",\"value\":\"Server\"},\"name\":\"Local Administrators\"},{\"type\":12,\"content\":{\"version\":\"NotebookGroup/1.0\",\"groupType\":\"editable\",\"title\":\"Exchange and AD GRoup\",\"items\":[{\"type\":1,\"content\":{\"json\":\"This tab displays the content of high privilege groups in Exchange and AD.\"},\"name\":\"text - 7\"},{\"type\":1,\"content\":{\"json\":\"The **Exchange Trusted Subsystem** group is one the two most sensistive groups in Exchange. This group has all privileges in Exchange and very high privileges in AD.\\r\\n\\r\\nExchange 2013 deployment permissions reference\\r\\n\\r\\nThis group should only contains computer accounts for each Exchange servers. When the DAG has an IP and a CNO, it is acceptable to have the DAG's computer account.\\r\\n\\r\\nThis section only shows direct nonstandard members.\",\"style\":\"info\"},\"customWidth\":\"50\",\"conditionalVisibility\":{\"parameterName\":\"Help\",\"comparison\":\"isEqualTo\",\"value\":\"Yes\"},\"name\":\"ExchangeTrustedSubsystemHelp\"},{\"type\":1,\"content\":{\"json\":\"The **Exchange Windows Permissions** group is one the two most sensistive groups in Exchange. This group has very high privileges in AD.\\r\\n\\r\\nExchange 2013 deployment permissions reference\\r\\n\\r\\nThis group should only contains the group Exchange Trusted SubSystem. This section only shows direct nonstandard members. \",\"style\":\"info\"},\"customWidth\":\"50\",\"conditionalVisibility\":{\"parameterName\":\"Help\",\"comparison\":\"isEqualTo\",\"value\":\"Yes\"},\"name\":\"WindowsPermissionGroupTileHelp\"},{\"type\":3,\"content\":{\"version\":\"KqlItem/1.0\",\"query\":\"let ETSValidcontent = union kind=outer (ExchangeConfiguration(SpecificSectionList=\\\"ExchangeServers\\\",SpecificConfigurationDate=\\\"{DateOfConfiguration:value}\\\",SpecificConfigurationEnv={EnvironmentList},Target = \\\"On-Premises\\\")| project Name = tostring(CmdletResultValue.Name)), (ExchangeConfiguration(SpecificSectionList=\\\"DAG\\\",SpecificConfigurationDate=\\\"{DateOfConfiguration:value}\\\",SpecificConfigurationEnv={EnvironmentList},Target = \\\"On-Premises\\\")| project Name = tostring(Identity));\\r\\nExchangeConfiguration(SpecificSectionList=\\\"ETS\\\",SpecificConfigurationDate=\\\"{DateOfConfiguration:value}\\\",SpecificConfigurationEnv={EnvironmentList},Target = \\\"On-Premises\\\")\\r\\n| where CmdletResultValue.Name !in (ETSValidcontent)\\r\\n| summarize MyCount=countif( CmdletResultType == \\\"Success\\\") by CmdletResultType\\r\\n| project Result = iff ( CmdletResultType == \\\"Success\\\", tostring(MyCount), \\\"\\\")\",\"size\":1,\"showAnalytics\":true,\"title\":\"Exchange Trusted SubSystem group nonstandard member count\",\"noDataMessage\":\"Content of group as Expected\",\"noDataMessageStyle\":3,\"showExportToExcel\":true,\"queryType\":0,\"resourceType\":\"microsoft.operationalinsights/workspaces\",\"visualization\":\"tiles\",\"tileSettings\":{\"titleContent\":{\"columnMatch\":\"CmdletResultValue_Name\",\"formatter\":1},\"leftContent\":{\"columnMatch\":\"Result\",\"formatter\":12,\"formatOptions\":{\"palette\":\"hotCold\"},\"numberFormat\":{\"unit\":17,\"options\":{\"style\":\"decimal\",\"maximumFractionDigits\":2,\"maximumSignificantDigits\":3},\"emptyValCustomText\":\"ScriptError\"}},\"showBorder\":true}},\"customWidth\":\"50\",\"name\":\"ExchangeServersTileGroup1Query\"},{\"type\":3,\"content\":{\"version\":\"KqlItem/1.0\",\"query\":\"let ETScontent = ExchangeConfiguration(SpecificSectionList=\\\"ETS\\\", SpecificConfigurationDate=\\\"{DateOfConfiguration:value}\\\",SpecificConfigurationEnv={EnvironmentList}, Target = \\\"On-Premises\\\") | project Name = tostring(CmdletResultValue.Name);\\r\\nExchangeConfiguration(SpecificSectionList=\\\"EWP\\\",SpecificConfigurationDate=\\\"{DateOfConfiguration:value}\\\",SpecificConfigurationEnv={EnvironmentList},Target = \\\"On-Premises\\\")\\r\\n| where CmdletResultValue.Name !in (ETScontent) and CmdletResultValue.Name != \\\"Exchange Trusted Subsystem\\\"\\r\\n| extend Result = iff ( CmdletResultType == \\\"Success\\\", \\\"\\\", \\\"Error in the script unable to retrieve value\\\")\\r\\n| summarize MyCount=countif( CmdletResultType == \\\"Success\\\") by CmdletResultType\\r\\n| project Result = iff ( CmdletResultType == \\\"Success\\\", tostring(MyCount), \\\"\\\")\\r\\n\",\"size\":1,\"showAnalytics\":true,\"title\":\"Exchange Windows Permissions group direct nonstandard members (Exchange Trusted subsystem non standard content not included)\",\"noDataMessage\":\"Content of group as expected\",\"noDataMessageStyle\":3,\"showExportToExcel\":true,\"queryType\":0,\"resourceType\":\"microsoft.operationalinsights/workspaces\",\"visualization\":\"tiles\",\"tileSettings\":{\"titleContent\":{\"columnMatch\":\"CmdletResultValue_Name\",\"formatter\":1},\"leftContent\":{\"columnMatch\":\"Result\",\"formatter\":12,\"formatOptions\":{\"palette\":\"hotCold\"},\"numberFormat\":{\"unit\":17,\"options\":{\"style\":\"decimal\",\"maximumFractionDigits\":2,\"maximumSignificantDigits\":3},\"emptyValCustomText\":\"ScriptError\"}},\"showBorder\":true}},\"customWidth\":\"50\",\"name\":\"ExchangeServersTileGroup2Query\"},{\"type\":12,\"content\":{\"version\":\"NotebookGroup/1.0\",\"groupType\":\"editable\",\"title\":\"Exchange Windows Permissions direct nonstandard content (Exchange Trusted subsystem non standard content not included)\",\"items\":[{\"type\":3,\"content\":{\"version\":\"KqlItem/1.0\",\"query\":\"let ETSValidcontnet = union kind=outer (ExchangeConfiguration(SpecificSectionList=\\\"ExchangeServers\\\",SpecificConfigurationDate=\\\"{DateOfConfiguration:value}\\\",SpecificConfigurationEnv={EnvironmentList},Target = \\\"On-Premises\\\")| project Name = tostring(CmdletResultValue.Name)), (ExchangeConfiguration(SpecificSectionList=\\\"DAG\\\",SpecificConfigurationDate=\\\"{DateOfConfiguration:value}\\\",SpecificConfigurationEnv={EnvironmentList},Target = \\\"On-Premises\\\")| project Name = tostring(Identity));\\r\\nExchangeConfiguration(SpecificSectionList=\\\"ETS\\\",SpecificConfigurationDate=\\\"{DateOfConfiguration:value}\\\",SpecificConfigurationEnv={EnvironmentList},Target = \\\"On-Premises\\\")\\r\\n| where CmdletResultValue.Name !in (ETSValidcontnet)\\r\\n//| extend Name = strcat (\\\"⛔\\\",tostring(CmdletResultValue.Name))\\r\\n| extend Name = iff(CmdletResultType == \\\"Success\\\", strcat (\\\"⛔\\\",tostring(CmdletResultValue.Name)),\\\"Script was unable to retrieve data\\\")\\r\\n| project Name \",\"size\":1,\"showAnalytics\":true,\"title\":\"Exchange Trusted SubSystem nonstandard content\",\"noDataMessage\":\"Content of Exchange Trusted SubSystem as Expected\",\"noDataMessageStyle\":3,\"showExportToExcel\":true,\"queryType\":0,\"resourceType\":\"microsoft.operationalinsights/workspaces\",\"gridSettings\":{\"rowLimit\":10000}},\"customWidth\":\"50\",\"name\":\"ETSDetails\",\"styleSettings\":{\"showBorder\":true}},{\"type\":3,\"content\":{\"version\":\"KqlItem/1.0\",\"query\":\"let ETScontent = ExchangeConfiguration(SpecificSectionList=\\\"ETS\\\", SpecificConfigurationDate=\\\"{DateOfConfiguration:value}\\\",SpecificConfigurationEnv={EnvironmentList}, Target = \\\"On-Premises\\\") | project Name = tostring(CmdletResultValue.Name);\\r\\nExchangeConfiguration(SpecificSectionList=\\\"EWP\\\",SpecificConfigurationDate=\\\"{DateOfConfiguration:value}\\\",SpecificConfigurationEnv={EnvironmentList},Target = \\\"On-Premises\\\")\\r\\n| where CmdletResultValue.Name !in (ETScontent) and CmdletResultValue.Name != \\\"Exchange Trusted Subsystem\\\"\\r\\n//| extend Name = strcat (\\\"⛔\\\",tostring(CmdletResultValue.Name))\\r\\n| extend Name = iff(CmdletResultType == \\\"Success\\\", strcat (\\\"⛔\\\",tostring(CmdletResultValue.Name)),\\\"Script was unable to retrieve data\\\")\\r\\n| project Name \",\"size\":1,\"showAnalytics\":true,\"title\":\"Exchange Windows Permissions direct nonstandard content (Exchange Trusted subsystem non standard content not included)\",\"noDataMessage\":\"Content of Exchange Windows Permissions as Expected\",\"noDataMessageStyle\":3,\"showExportToExcel\":true,\"queryType\":0,\"resourceType\":\"microsoft.operationalinsights/workspaces\"},\"customWidth\":\"50\",\"name\":\"WindowsPermissionsQuery\",\"styleSettings\":{\"showBorder\":true}}]},\"name\":\"ETS and WP Grids\"},{\"type\":12,\"content\":{\"version\":\"NotebookGroup/1.0\",\"groupType\":\"editable\",\"title\":\"Exchange groups from old Exchange version\",\"items\":[{\"type\":1,\"content\":{\"json\":\"ℹ️ Recommendations\\r\\n\\r\\n- Groups from old Exchange version should have been removed\\r\\n- List of old groups \\r\\n\\t- Exchange Organization Administrators\\r\\n\\t- Exchange Recipient Administrators\\r\\n\\t- Exchange Public Folder Administrators\\r\\n\\t- Exchange Server Administrator\\r\\n\\t- Exchange View-Only Administrator\\r\\n\\t- Exchange Enterprise Servers (located in the root domain)\\r\\n\\t- Exchange Domain Servers : one group per domain\\r\\n\\r\\n\\r\\nHelp for Built-in role groups\",\"style\":\"info\"},\"conditionalVisibility\":{\"parameterName\":\"Help\",\"comparison\":\"isEqualTo\",\"value\":\"Yes\"},\"name\":\"text - 0\"},{\"type\":12,\"content\":{\"version\":\"NotebookGroup/1.0\",\"groupType\":\"editable\",\"items\":[{\"type\":3,\"content\":{\"version\":\"KqlItem/1.0\",\"query\":\"\\r\\nlet OldVGroup = (ExchangeConfiguration(SpecificSectionList=\\\"ADGroup\\\", SpecificConfigurationDate=\\\"{DateOfConfiguration:value}\\\", SpecificConfigurationEnv={EnvironmentList}, Target = \\\"On-Premises\\\")| where CmdletResultValue.Parentgroup == \\\"Exchange Enterprise Servers\\\" or CmdletResultValue.Parentgroup == \\\"Exchange Services\\\"| extend Parentgroup = tostring(CmdletResultValue.Parentgroup));\\r\\nExchangeConfiguration(SpecificSectionList=\\\"ExGroup\\\", SpecificConfigurationDate=\\\"{DateOfConfiguration:value}\\\", SpecificConfigurationEnv={EnvironmentList}, Target = \\\"On-Premises\\\") \\r\\n| extend Parentgroup = tostring(CmdletResultValue.Parentgroup)\\r\\n| where CmdletResultValue.Parentgroup in (\\\"Exchange Organization Administrators\\\", \\\"Exchange Recipient Administrators\\\", \\\"Exchange Public Folder Administrators\\\", \\\"Exchange Server Administrator\\\", \\\"Exchange View-Only Administrator\\\") |union OldVGroup\\r\\n| where CmdletResultValue.Level != 0 and CmdletResultValue.ObjectClass !contains \\\"group\\\"\\r\\n| extend MemberPath= tostring(split(tostring(CmdletResultValue.MemberPath), \\\"\\\\\\\\\\\")[countof(tostring(CmdletResultValue.MemberPath), \\\"\\\\\\\\\\\")])\\r\\n| summarize dcount(tostring(MemberPath)) by Parentgroup = tostring(CmdletResultValue.Parentgroup)\\r\\n| sort by dcount_MemberPath\\r\\n\\r\\n\\r\\n\",\"size\":4,\"showAnalytics\":true,\"noDataMessage\":\"No groups from old versions found\",\"noDataMessageStyle\":3,\"showExportToExcel\":true,\"queryType\":0,\"resourceType\":\"microsoft.operationalinsights/workspaces\",\"visualization\":\"tiles\",\"tileSettings\":{\"titleContent\":{\"columnMatch\":\"Parentgroup\",\"formatter\":1},\"leftContent\":{\"columnMatch\":\"dcount_MemberPath\",\"formatter\":12,\"formatOptions\":{\"palette\":\"auto\"}},\"showBorder\":true}},\"name\":\"query - 0\"}]},\"name\":\"ExchangeGroupsList\"},{\"type\":12,\"content\":{\"version\":\"NotebookGroup/1.0\",\"groupType\":\"editable\",\"title\":\"Expand details on the content of old groups\",\"expandable\":true,\"expanded\":false,\"items\":[{\"type\":9,\"content\":{\"version\":\"KqlParameterItem/1.0\",\"parameters\":[{\"id\":\"b4b7a6ad-381a-48d6-9938-bf7cb812b474\",\"version\":\"KqlParameterItem/1.0\",\"name\":\"Group\",\"type\":2,\"query\":\"let OldVGroup = (ExchangeConfiguration(SpecificSectionList=\\\"ADGroup\\\", SpecificConfigurationDate=\\\"{DateOfConfiguration:value}\\\", SpecificConfigurationEnv={EnvironmentList}, Target = \\\"On-Premises\\\")| where CmdletResultValue.Parentgroup == \\\"Exchange Enterprise Servers\\\" or CmdletResultValue.Parentgroup == \\\"Exchange Services\\\"| extend Parentgroup = tostring(CmdletResultValue.Parentgroup));\\r\\nExchangeConfiguration(SpecificSectionList=\\\"ExGroup\\\", SpecificConfigurationDate=\\\"{DateOfConfiguration:value}\\\", SpecificConfigurationEnv={EnvironmentList}, Target = \\\"On-Premises\\\") \\r\\n| extend Parentgroup = tostring(CmdletResultValue.Parentgroup)\\r\\n| where CmdletResultValue.Parentgroup in (\\\"Exchange Organization Administrators\\\", \\\"Exchange Recipient Administrators\\\", \\\"Exchange Public Folder Administrators\\\", \\\"Exchange Server Administrator\\\", \\\"Exchange View-Only Administrator\\\") |union OldVGroup\\r\\n| project CmdletResultValue\\r\\n| extend GroupName = tostring(CmdletResultValue.Parentgroup)\\r\\n| distinct GroupName\\r\\n| sort by GroupName asc\\r\\n\",\"typeSettings\":{\"showDefault\":false},\"queryType\":0,\"resourceType\":\"microsoft.operationalinsights/workspaces\"},{\"id\":\"a695df39-1965-479a-ad0f-b4d3d168aaed\",\"version\":\"KqlParameterItem/1.0\",\"name\":\"LastLogon\",\"label\":\"Last Logon\",\"type\":10,\"isRequired\":true,\"jsonData\":\"[ {\\\"value\\\": \\\"0d\\\", \\\"label\\\": \\\"No filter\\\",\\\"selected\\\":true},\\r\\n{ \\\"value\\\": \\\"90d\\\", \\\"label\\\": \\\"90d\\\" },\\r\\n { \\\"value\\\": \\\"180d\\\", \\\"label\\\": \\\"6m\\\" },\\r\\n { \\\"value\\\": \\\"365d\\\", \\\"label\\\": \\\"1y\\\" },\\r\\n{ \\\"value\\\": \\\"730d\\\", \\\"label\\\": \\\"2y\\\" },\\r\\n{ \\\"value\\\": \\\"1085d\\\", \\\"label\\\": \\\"3y\\\" },\\r\\n{ \\\"value\\\": \\\"1097d\\\", \\\"label\\\": \\\"more than 3y\\\"},\\r\\n{ \\\"value\\\": \\\"3650d\\\", \\\"label\\\": \\\"more than 10y\\\"}\\r\\n]\\r\\n\"},{\"id\":\"2d69bad8-0904-467a-86e6-cb0923520c18\",\"version\":\"KqlParameterItem/1.0\",\"name\":\"PasswordLast\",\"label\":\"Password Last Set\",\"type\":10,\"isRequired\":true,\"jsonData\":\"[{ \\\"value\\\": \\\"0d\\\", \\\"label\\\": \\\"No filter\\\",\\\"selected\\\":true },\\r\\n { \\\"value\\\": \\\"365d\\\", \\\"label\\\": \\\"1y\\\" },\\r\\n{ \\\"value\\\": \\\"730d\\\", \\\"label\\\": \\\"2y\\\" },\\r\\n{ \\\"value\\\": \\\"1095d\\\", \\\"label\\\": \\\"3y\\\" },\\r\\n{ \\\"value\\\": \\\"1097d\\\", \\\"label\\\": \\\"more than 3y\\\"},\\r\\n{ \\\"value\\\": \\\"3650d\\\", \\\"label\\\": \\\"more than 10y\\\"}\\r\\n]\"}],\"style\":\"pills\",\"queryType\":0,\"resourceType\":\"microsoft.operationalinsights/workspaces\"},\"name\":\"parameters - 3\"},{\"type\":1,\"content\":{\"json\":\"Old Exchange groups content groups (Extract for the OU \\\"Microsoft Exchange Security Groups\\\").\\r\\nSelect a group to display detailed information of its contents.\\r\\nLevel attribute helps you understand the level of nested groups.\\r\\n\\r\\n❌ : for last logon displayed when user logged or the last logon is greater than 180 days\\r\\n\\r\\n❌ : for password last set displayed when last password set greater than 365 days\"},\"name\":\"text - 2\"},{\"type\":3,\"content\":{\"version\":\"KqlItem/1.0\",\"query\":\"let OldVGroupEES = (ExchangeConfiguration(SpecificSectionList=\\\"ADGroup\\\", SpecificConfigurationDate=\\\"{DateOfConfiguration:value}\\\", SpecificConfigurationEnv={EnvironmentList}, Target = \\\"On-Premises\\\")\\r\\n | where (CmdletResultValue.Parentgroup == \\\"Exchange Enterprise Servers\\\" and CmdletResultValue.MemberPath != @\\\"Exchange Enterprise Servers\\\\Exchange Domain Servers\\\") or CmdletResultValue.Parentgroup == \\\"Exchange Services\\\"\\r\\n | extend Parentgroup = tostring(CmdletResultValue.Parentgroup)\\r\\n | extend MemberPath = tostring(CmdletResultValue.MemberPath)\\r\\n | extend DN = tostring(CmdletResultValue.DN)\\r\\n | extend Level = tostring(CmdletResultValue.Level)\\r\\n | extend ObjectClass = tostring(CmdletResultValue.ObjectClass)\\r\\n | extend Enabled = tostring(CmdletResultValue.Enabled) );\\r\\nlet OldVGroupEDS = (ExchangeConfiguration(SpecificSectionList=\\\"ADGroup\\\", SpecificConfigurationDate=\\\"lastdate\\\", SpecificConfigurationEnv='B13', Target = \\\"On-Premises\\\")\\r\\n | where CmdletResultValue.Parentgroup == \\\"Exchange Enterprise Servers\\\" and CmdletResultValue.Level ==0\\r\\n | extend Parentgroup = tostring(CmdletResultValue.Parentgroup)\\r\\n| mv-expand CmdletResultValue.Members\\r\\n| where CmdletResultValue_Members.objectClass == \\\"group\\\"\\r\\n| project Parentgroup, MemberPath= strcat(Parentgroup,\\\"\\\\\\\\\\\", CmdletResultValue_Members.name), Level = tostring(1), ObjectClass = tostring(CmdletResultValue_Members.objectClass), DN = tostring(CmdletResultValue_Members.DistinguishedName), ObjectGuid = tostring(CmdletResultValue_Members.ObjectGuid)| join kind=inner ( ExchangeConfiguration(SpecificSectionList=\\\"ADGroup\\\", SpecificConfigurationDate=\\\"lastdate\\\", SpecificConfigurationEnv='B13', Target = \\\"On-Premises\\\")\\r\\n | where CmdletResultValue.Parentgroup == \\\"Exchange Enterprise Servers\\\"\\r\\n | extend Parentgroup = tostring(CmdletResultValue.Parentgroup)\\r\\n | extend ObjectGuid = tostring(CmdletResultValue.ObjectGuid)) on ObjectGuid) ;\\r\\nExchangeConfiguration(SpecificSectionList=\\\"ExGroup\\\", SpecificConfigurationDate=\\\"lastdate\\\", SpecificConfigurationEnv='B13', Target = \\\"On-Premises\\\") \\r\\n| extend Parentgroup = tostring(CmdletResultValue.Parentgroup)\\r\\n| where CmdletResultValue.Parentgroup in (\\\"Exchange Organization Administrators\\\", \\\"Exchange Recipient Administrators\\\", \\\"Exchange Public Folder Administrators\\\", \\\"Exchange Server Administrator\\\", \\\"Exchange View-Only Administrator\\\")\\r\\n| extend MemberPath = tostring(CmdletResultValue.MemberPath)\\r\\n| extend Level = tostring(CmdletResultValue.Level)\\r\\n| extend ObjectClass = tostring(CmdletResultValue.ObjectClass)\\r\\n| extend Enabled = tostring(CmdletResultValue.Enabled)\\r\\n| extend DN = tostring(CmdletResultValue.DN)\\r\\n| union OldVGroupEES,OldVGroupEDS\\r\\n| search CmdletResultValue.Parentgroup == \\\"{Group}\\\"\\r\\n| where todatetime (CmdletResultValue.LastPwdSetString) < ago(0d) or tostring (CmdletResultValue.LastPwdSetString) == \\\"\\\"\\r\\n| where todatetime (CmdletResultValue.LastLogonString) < ago(0d) or tostring (CmdletResultValue.LastLogonString) == \\\"\\\"\\r\\n| sort by tostring(CmdletResultValue.MemberPath) asc \\r\\n| where CmdletResultValue.Level != 0\\r\\n//| extend DN = tostring(CmdletResultValue.DN)\\r\\n| extend LastLogon = tostring(CmdletResultValue.LastLogonString)\\r\\n| extend LastLogon = iif(ObjectClass == \\\"group\\\" or ObjectClass == \\\"computer\\\" or ObjectClass == \\\"Local User\\\" or ObjectClass == \\\"computer\\\", \\\"N/A\\\", iif (todatetime (CmdletResultValue.LastLogonString) > ago(180d), CmdletResultValue.LastLogonString, iff (LastLogon == \\\"\\\", \\\"❌ Never logged\\\", strcat(\\\"❌\\\", LastLogon))))\\r\\n| extend LastPwdSet = CmdletResultValue.LastPwdSetString\\r\\n| extend LastPwdSet = iif(ObjectClass == \\\"group\\\" or ObjectClass == \\\"computer\\\" or ObjectClass == \\\"Local User\\\" or ObjectClass == \\\"computer\\\", \\\"N/A\\\", iif (todatetime (CmdletResultValue.LastPwdSetString) > ago(366d), CmdletResultValue.LastPwdSetString, iff (LastPwdSet == \\\"\\\", \\\"❌ Password never set\\\", strcat(\\\"❌\\\", LastPwdSet))))\\r\\n| extend MemberPath = case(ObjectClass == \\\"group\\\", strcat(\\\"👪 \\\", MemberPath), ObjectClass == \\\"computer\\\", strcat(\\\"💻 \\\", MemberPath), strcat(\\\"🧑‍🦰 \\\", MemberPath))\\r\\n| project Parentgroup, MemberPath, Level, ObjectClass,LastLogon, LastPwdSet ,Enabled,DN\\r\\n\",\"size\":1,\"showAnalytics\":true,\"noDataMessage\":\"The query returned no results.\",\"showExportToExcel\":true,\"queryType\":0,\"resourceType\":\"microsoft.operationalinsights/workspaces\",\"gridSettings\":{\"formatters\":[{\"columnMatch\":\"CmdletResultValue\",\"formatter\":5},{\"columnMatch\":\"Parentgroup\",\"formatter\":5},{\"columnMatch\":\"LastPwdSet\",\"formatter\":0,\"numberFormat\":{\"unit\":0,\"options\":{\"style\":\"decimal\"}}},{\"columnMatch\":\"ParentId\",\"formatter\":5},{\"columnMatch\":\"Id\",\"formatter\":5}],\"rowLimit\":10000,\"filter\":true}},\"showPin\":true,\"name\":\"ExchangeServersGroupsGrid\",\"styleSettings\":{\"showBorder\":true}}]},\"name\":\"group - 5\"}]},\"name\":\"Exchange group from old Exchange versions\"},{\"type\":12,\"content\":{\"version\":\"NotebookGroup/1.0\",\"groupType\":\"editable\",\"title\":\"Exchange group\",\"items\":[{\"type\":1,\"content\":{\"json\":\"ℹ️ Recommendations\\r\\n\\r\\n- Ensure that no service account are a member of the high privilege groups. Use RBAC to delegate the exact required permissions.\\r\\n- Limit the usage of nested group for administration.\\r\\n- Ensure that accounts are given only the required pernissions to execute their tasks.\\r\\n- Use just in time administration principle by adding users in a group only when they need the permissions, then remove them when their operation is over.\\r\\n- Limit the number of Organization management members. When you review the Admin Audit logs you might see that the administrators rarely needed Organization Management privileges.\\r\\n- Monitor the content of the following groups:\\r\\n - Organization Management\\r\\n - Recipient Management (Member of this group have at least the following rights : set-mailbox, Add-MailboxPermission)\\r\\n - Discovery Management\\r\\n - Server Management\\r\\n - Hygiene Management\\r\\n - Exchange Servers\\r\\n - Exchange Trusted Subsystem \\r\\n - Exchange Windows Permissions\\r\\n - xxx High privilege group (not an exhaustive list)\\r\\n - All RBAC groups that have high roles delegation\\r\\n - All nested groups in high privileges groups\\r\\n - Note that this is not a complete list. The content of all the groups that have high privileges should be monitored.\\r\\n- Each time a new RBAC group is created, decide if the content of this groups should be monitored\\r\\n- Periodically review the members of the groups\\r\\n\\r\\nHelp for Built-in role groups\",\"style\":\"info\"},\"conditionalVisibility\":{\"parameterName\":\"Help\",\"comparison\":\"isEqualTo\",\"value\":\"Yes\"},\"name\":\"text - 0\"},{\"type\":12,\"content\":{\"version\":\"NotebookGroup/1.0\",\"groupType\":\"editable\",\"title\":\"Summary content of most important groups\",\"items\":[{\"type\":3,\"content\":{\"version\":\"KqlItem/1.0\",\"query\":\"ExchangeConfiguration(SpecificSectionList=\\\"ExGroup\\\",SpecificConfigurationDate=\\\"{DateOfConfiguration:value}\\\",SpecificConfigurationEnv={EnvironmentList},Target = \\\"On-Premises\\\")\\r\\n| project CmdletResultValue\\r\\n| where CmdletResultValue.Level != 0 and CmdletResultValue.ObjectClass !contains \\\"group\\\"\\r\\n| extend MemberPath= tostring(split(tostring(CmdletResultValue.MemberPath),\\\"\\\\\\\\\\\")[countof(tostring(CmdletResultValue.MemberPath),\\\"\\\\\\\\\\\")])\\r\\n| summarize dcount(tostring(MemberPath)) by Parentgroup = tostring(CmdletResultValue.Parentgroup)\\r\\n| where Parentgroup in (\\\"Organization Management\\\", \\\"Compliance Management\\\", \\\"Discovery Management\\\", \\\"Server Management\\\", \\\"Recipient Manangement\\\",\\\"Security Administrator\\\", \\\"Hygiene Management\\\", \\\"Public Folder Manangement\\\", \\\"Records Manangement\\\") or Parentgroup contains \\\"Impersonation\\\" or Parentgroup contains \\\"Export\\\"\\r\\n| sort by dcount_MemberPath\\r\\n\\r\\n\",\"size\":4,\"showAnalytics\":true,\"showExportToExcel\":true,\"queryType\":0,\"resourceType\":\"microsoft.operationalinsights/workspaces\",\"visualization\":\"tiles\",\"tileSettings\":{\"titleContent\":{\"columnMatch\":\"Parentgroup\",\"formatter\":1},\"leftContent\":{\"columnMatch\":\"dcount_MemberPath\",\"formatter\":12,\"formatOptions\":{\"palette\":\"auto\"}},\"showBorder\":true}},\"name\":\"query - 0\"},{\"type\":12,\"content\":{\"version\":\"NotebookGroup/1.0\",\"groupType\":\"editable\",\"title\":\"Expand for summary content for all groups located in the OU Exchange Security Groups\",\"expandable\":true,\"items\":[{\"type\":3,\"content\":{\"version\":\"KqlItem/1.0\",\"query\":\"ExchangeConfiguration(SpecificSectionList=\\\"ExGroup\\\",SpecificConfigurationDate=\\\"{DateOfConfiguration:value}\\\",SpecificConfigurationEnv={EnvironmentList},Target = \\\"On-Premises\\\")\\r\\n| project CmdletResultValue\\r\\n| where CmdletResultValue.Level != 0 and CmdletResultValue.ObjectClass !contains \\\"group\\\"\\r\\n| extend MemberPath= tostring(split(tostring(CmdletResultValue.MemberPath),\\\"\\\\\\\\\\\")[countof(tostring(CmdletResultValue.MemberPath),\\\"\\\\\\\\\\\")])\\r\\n| summarize dcount(tostring(MemberPath)) by Parentgroup = tostring(CmdletResultValue.Parentgroup)\\r\\n| sort by dcount_MemberPath desc\\r\\n\\r\\n\",\"size\":1,\"showAnalytics\":true,\"title\":\"OU Exchange Security Groups\",\"showExportToExcel\":true,\"queryType\":0,\"resourceType\":\"microsoft.operationalinsights/workspaces\",\"visualization\":\"tiles\",\"tileSettings\":{\"titleContent\":{\"columnMatch\":\"Parentgroup\",\"formatter\":1},\"leftContent\":{\"columnMatch\":\"dcount_MemberPath\",\"formatter\":12,\"formatOptions\":{\"palette\":\"auto\"}},\"showBorder\":true}},\"showPin\":false,\"name\":\"query - 0 - Copy\"}]},\"name\":\"All groups\"}]},\"name\":\"ExchangeGroupsList\"},{\"type\":9,\"content\":{\"version\":\"KqlParameterItem/1.0\",\"parameters\":[{\"id\":\"b4b7a6ad-381a-48d6-9938-bf7cb812b474\",\"version\":\"KqlParameterItem/1.0\",\"name\":\"Group\",\"type\":2,\"query\":\"ExchangeConfiguration(SpecificSectionList=\\\"ExGroup\\\",SpecificConfigurationDate=\\\"{DateOfConfiguration:value}\\\",SpecificConfigurationEnv={EnvironmentList},Target = \\\"On-Premises\\\")\\r\\n//| where CmdletResultValue.Parentgroup != \\\"Exchange Trusted Subsystem\\\"\\r\\n//| where CmdletResultValue.Parentgroup != \\\"Exchange Windows Permissions\\\"\\r\\n| project CmdletResultValue\\r\\n| extend GroupName = tostring(CmdletResultValue.Parentgroup)\\r\\n| distinct GroupName\\r\\n| sort by GroupName asc\\r\\n\",\"typeSettings\":{\"showDefault\":false},\"showExportToExcel\":true,\"showAnalytics\":true,\"queryType\":0,\"resourceType\":\"microsoft.operationalinsights/workspaces\"},{\"id\":\"f3b935d7-b78f-41d2-94bc-f8c878a13260\",\"version\":\"KqlParameterItem/1.0\",\"name\":\"LastLogon\",\"label\":\"Last Logon >\",\"type\":10,\"isRequired\":true,\"multiSelect\":true,\"quote\":\"'\",\"delimiter\":\",\",\"typeSettings\":{\"showDefault\":false},\"jsonData\":\"[ {\\\"value\\\": \\\"0d\\\", \\\"label\\\": \\\"No filter\\\",\\\"selected\\\":true},\\r\\n{ \\\"value\\\": \\\"90d\\\", \\\"label\\\": \\\"90d\\\" },\\r\\n { \\\"value\\\": \\\"180d\\\", \\\"label\\\": \\\"6m\\\" },\\r\\n { \\\"value\\\": \\\"365d\\\", \\\"label\\\": \\\"1y\\\" },\\r\\n{ \\\"value\\\": \\\"730d\\\", \\\"label\\\": \\\"2y\\\" },\\r\\n{ \\\"value\\\": \\\"1085d\\\", \\\"label\\\": \\\"3y\\\" },\\r\\n{ \\\"value\\\": \\\"1097d\\\", \\\"label\\\": \\\"more than 3y\\\"},\\r\\n{ \\\"value\\\": \\\"3650d\\\", \\\"label\\\": \\\"more than 10y\\\"}\\r\\n]\"},{\"id\":\"3343688f-e609-4822-b4ed-cdd50b77d948\",\"version\":\"KqlParameterItem/1.0\",\"name\":\"PasswordLast\",\"label\":\"Password Last Set >\",\"type\":10,\"isRequired\":true,\"typeSettings\":{\"showDefault\":false},\"jsonData\":\"[{ \\\"value\\\": \\\"0d\\\", \\\"label\\\": \\\"No filter\\\",\\\"selected\\\":true },\\r\\n { \\\"value\\\": \\\"365d\\\", \\\"label\\\": \\\"1y\\\" },\\r\\n{ \\\"value\\\": \\\"730d\\\", \\\"label\\\": \\\"2y\\\" },\\r\\n{ \\\"value\\\": \\\"1095d\\\", \\\"label\\\": \\\"3y\\\" },\\r\\n{ \\\"value\\\": \\\"1097d\\\", \\\"label\\\": \\\"more than 3y\\\"},\\r\\n{ \\\"value\\\": \\\"3650d\\\", \\\"label\\\": \\\"more than 10y\\\"}\\r\\n]\"}],\"style\":\"pills\",\"queryType\":0,\"resourceType\":\"microsoft.operationalinsights/workspaces\"},\"name\":\"parameters - 3\"},{\"type\":1,\"content\":{\"json\":\"Exchange groups content (Extract for the OU \\\"Microsoft Exchange Security Groups\\\").\\r\\nSelect a group to display detailed information of its contents.\\r\\nLevel attribute helps you understand the level of nested groups.\\r\\n\\r\\n❌ : for last logon displayed when user logged or the last logon is greater than 180 days\\r\\n\\r\\n❌ : for password last set displayed when last password set greater than 365 days\"},\"name\":\"text - 2\"},{\"type\":3,\"content\":{\"version\":\"KqlItem/1.0\",\"query\":\"ExchangeConfiguration(SpecificSectionList=\\\"ExGroup\\\",SpecificConfigurationDate=\\\"{DateOfConfiguration:value}\\\",SpecificConfigurationEnv={EnvironmentList},Target = \\\"On-Premises\\\")\\r\\n| search CmdletResultValue.Parentgroup == \\\"{Group}\\\"\\r\\n| where todatetime (CmdletResultValue.LastPwdSetString) < ago({PasswordLast}) or tostring (CmdletResultValue.LastPwdSetString) == \\\"\\\"\\r\\n| where todatetime (CmdletResultValue.LastLogonString) < ago({LastLogon}) or tostring (CmdletResultValue.LastLogonString) == \\\"\\\"\\r\\n| where CmdletResultValue.Level != 0\\r\\n| sort by tostring(CmdletResultValue.MemberPath) asc \\r\\n| project CmdletResultValue\\r\\n| extend Parentgroup = tostring(CmdletResultValue.Parentgroup)\\r\\n| extend MemberPath = tostring(CmdletResultValue.MemberPath)\\r\\n| extend Level = tostring(CmdletResultValue.Level)\\r\\n| extend ObjectClass = tostring(CmdletResultValue.ObjectClass)\\r\\n| extend LastLogon = tostring(CmdletResultValue.LastLogonString)\\r\\n| extend LastLogon = iif(ObjectClass==\\\"group\\\" or ObjectClass==\\\"computer\\\" or ObjectClass==\\\"Local User\\\" or ObjectClass==\\\"computer\\\",\\\"N/A\\\",iif ( todatetime (CmdletResultValue.LastLogonString) > ago(180d), CmdletResultValue.LastLogonString,iff (LastLogon==\\\"\\\", \\\"❌ No logon\\\",strcat(\\\"❌\\\",LastLogon))))\\r\\n| extend LastPwdSet = CmdletResultValue.LastPwdSetString\\r\\n| extend LastPwdSet = iif(ObjectClass==\\\"group\\\" or ObjectClass==\\\"computer\\\" or ObjectClass==\\\"Local User\\\" or ObjectClass==\\\"computer\\\",\\\"N/A\\\",iif ( todatetime (CmdletResultValue.LastPwdSetString) > ago(366d), CmdletResultValue.LastPwdSetString,iff (LastPwdSet==\\\"\\\", \\\"❌ No logon\\\",strcat(\\\"❌\\\",LastPwdSet))))\\r\\n| extend Enabled = tostring(CmdletResultValue.Enabled)\\r\\n| extend DN = tostring(CmdletResultValue.DN)\\r\\n| sort by MemberPath asc\\r\\n//| extend MemberPath = case( ObjectClass == \\\"group\\\", strcat( \\\"👪 \\\", MemberPath), ObjectClass == \\\"computer\\\", strcat( \\\"💻 \\\", MemberPath), strcat( \\\"🧑‍🦰 \\\", MemberPath) )\\r\\n| project-away CmdletResultValue,Parentgroup\",\"size\":3,\"showAnalytics\":true,\"showExportToExcel\":true,\"queryType\":0,\"resourceType\":\"microsoft.operationalinsights/workspaces\",\"gridSettings\":{\"rowLimit\":10000,\"filter\":true,\"sortBy\":[{\"itemKey\":\"MemberPath\",\"sortOrder\":1}]},\"sortBy\":[{\"itemKey\":\"MemberPath\",\"sortOrder\":1}]},\"name\":\"ExchangeServersGroupsGrid\",\"styleSettings\":{\"showBorder\":true}}]},\"name\":\"Exchange group\"},{\"type\":12,\"content\":{\"version\":\"NotebookGroup/1.0\",\"groupType\":\"editable\",\"title\":\"AD Group\",\"items\":[{\"type\":1,\"content\":{\"json\":\"High privileges AD groups can take control of Exchange by adding any accounts in the Exchange groups.\\r\\n\\r\\nNote that the members of the Account Operators are able to manage every AD group (except those protected by AdminSDHolder). This means they can manage the content of every high privilege Exchange groups.\\r\\n\\r\\nℹ️ It is recommended to not use this group and to monitor its changes.\\r\\n\",\"style\":\"info\"},\"conditionalVisibility\":{\"parameterName\":\"Help\",\"comparison\":\"isEqualTo\",\"value\":\"Yes\"},\"name\":\"ADGroupHelp\"},{\"type\":9,\"content\":{\"version\":\"KqlParameterItem/1.0\",\"parameters\":[{\"id\":\"268bd356-7d05-41c3-9867-00c6ab198c5a\",\"version\":\"KqlParameterItem/1.0\",\"name\":\"Group\",\"type\":2,\"query\":\"ExchangeConfiguration(SpecificSectionList=\\\"ADGroup\\\",SpecificConfigurationDate=\\\"{DateOfConfiguration:value}\\\",SpecificConfigurationEnv={EnvironmentList},Target = \\\"On-Premises\\\")\\r\\n| project CmdletResultValue\\r\\n| extend GroupName = tostring(CmdletResultValue.Parentgroup)\\r\\n| distinct GroupName\\r\\n| sort by GroupName asc\\r\\n\",\"typeSettings\":{\"showDefault\":false},\"showExportToExcel\":true,\"showAnalytics\":true,\"queryType\":0,\"resourceType\":\"microsoft.operationalinsights/workspaces\",\"gridSettings\":{\"rowLimit\":10000}},{\"id\":\"9d02cad2-f4c5-418d-976f-b88b56f80cb5\",\"version\":\"KqlParameterItem/1.0\",\"name\":\"LastLogon\",\"label\":\"Last Logon\",\"type\":10,\"isRequired\":true,\"typeSettings\":{\"showDefault\":false},\"jsonData\":\"[ {\\\"value\\\": \\\"0d\\\", \\\"label\\\": \\\"No filter\\\",\\\"selected\\\":true},\\r\\n{ \\\"value\\\": \\\"90d\\\", \\\"label\\\": \\\"90d\\\" },\\r\\n { \\\"value\\\": \\\"180d\\\", \\\"label\\\": \\\"6m\\\" },\\r\\n { \\\"value\\\": \\\"365d\\\", \\\"label\\\": \\\"1y\\\" },\\r\\n{ \\\"value\\\": \\\"730d\\\", \\\"label\\\": \\\"2y\\\" },\\r\\n{ \\\"value\\\": \\\"1085d\\\", \\\"label\\\": \\\"3y\\\" },\\r\\n{ \\\"value\\\": \\\"1097d\\\", \\\"label\\\": \\\"more than 3y\\\"},\\r\\n{ \\\"value\\\": \\\"3650d\\\", \\\"label\\\": \\\"more than 10y\\\"}\\r\\n]\"},{\"id\":\"9e591429-d8ea-40c2-80c1-2426c72c92d5\",\"version\":\"KqlParameterItem/1.0\",\"name\":\"PasswordLast\",\"label\":\"Password Last Set\",\"type\":10,\"isRequired\":true,\"typeSettings\":{\"showDefault\":false},\"jsonData\":\"[{ \\\"value\\\": \\\"0d\\\", \\\"label\\\": \\\"No filter\\\",\\\"selected\\\":true },\\r\\n { \\\"value\\\": \\\"365d\\\", \\\"label\\\": \\\"1y\\\" },\\r\\n{ \\\"value\\\": \\\"730d\\\", \\\"label\\\": \\\"2y\\\" },\\r\\n{ \\\"value\\\": \\\"1095d\\\", \\\"label\\\": \\\"3y\\\" },\\r\\n{ \\\"value\\\": \\\"1097d\\\", \\\"label\\\": \\\"more than 3y\\\"},\\r\\n{ \\\"value\\\": \\\"3650d\\\", \\\"label\\\": \\\"more than 10y\\\"}\\r\\n]\"}],\"style\":\"pills\",\"queryType\":0,\"resourceType\":\"microsoft.operationalinsights/workspaces\"},\"name\":\"parameters - 1\"},{\"type\":1,\"content\":{\"json\":\"Overview of high privileges AD Groups' content.\\r\\nSelect a group to display detailed information of its contents.\\r\\nLevel attribute helps you understand the level of nested groups.\\r\\n\\r\\n❌ : for last logon displayed when user logged or the last logon is greater than 180 days\\r\\n\\r\\n❌ : for password last set displayed when last password set greater than 365 days\"},\"name\":\"text - 0\"},{\"type\":3,\"content\":{\"version\":\"KqlItem/1.0\",\"query\":\"ExchangeConfiguration(SpecificSectionList=\\\"ADGroup\\\",SpecificConfigurationDate=\\\"{DateOfConfiguration:value}\\\",SpecificConfigurationEnv={EnvironmentList},Target = \\\"On-Premises\\\")\\r\\n| search CmdletResultValue.Parentgroup == \\\"{Group}\\\"\\r\\n| where todatetime (CmdletResultValue.LastPwdSetString) < ago({PasswordLast}) or tostring (CmdletResultValue.LastPwdSetString) == \\\"\\\"\\r\\n| where todatetime (CmdletResultValue.LastLogonString) < ago({LastLogon}) or tostring (CmdletResultValue.LastLogonString) == \\\"\\\"\\r\\n| where CmdletResultValue.Level != 0\\r\\n| sort by tostring(CmdletResultValue.MemberPath) asc \\r\\n| project CmdletResultValue\\r\\n| extend Parentgroup = tostring(CmdletResultValue.Parentgroup)\\r\\n| extend MemberPath = tostring(CmdletResultValue.MemberPath)\\r\\n| extend Level = tostring(CmdletResultValue.Level)\\r\\n| extend ObjectClass = tostring(CmdletResultValue.ObjectClass)\\r\\n| extend LastLogon = tostring(CmdletResultValue.LastLogonString)\\r\\n| extend LastLogon = iif(ObjectClass==\\\"group\\\" or ObjectClass==\\\"computer\\\" or ObjectClass==\\\"Local User\\\" or ObjectClass==\\\"computer\\\",\\\"N/A\\\",iif ( todatetime (CmdletResultValue.LastLogonString) > ago(180d), CmdletResultValue.LastLogonString,iff (LastLogon==\\\"\\\", \\\"❌ No logon\\\",strcat(\\\"❌\\\",LastLogon))))\\r\\n| extend LastPwdSet = CmdletResultValue.LastPwdSetString\\r\\n| extend LastPwdSet = iif(ObjectClass==\\\"group\\\" or ObjectClass==\\\"computer\\\" or ObjectClass==\\\"Local User\\\" or ObjectClass==\\\"computer\\\",\\\"N/A\\\",iif ( todatetime (CmdletResultValue.LastPwdSetString) > ago(366d), CmdletResultValue.LastPwdSetString,iff (LastPwdSet==\\\"\\\", \\\"❌ No logon\\\",strcat(\\\"❌\\\",LastPwdSet))))\\r\\n| extend Enabled = tostring(CmdletResultValue.Enabled)\\r\\n| extend DN = tostring(CmdletResultValue.DN)\\r\\n| sort by MemberPath asc\\r\\n//| extend MemberPath = case( ObjectClass == \\\"group\\\", strcat( \\\"👪 \\\", MemberPath), ObjectClass == \\\"computer\\\", strcat( \\\"💻 \\\", MemberPath), strcat( \\\"🧑‍🦰 \\\", MemberPath) )\\r\\n| project-away CmdletResultValue,Parentgroup\",\"size\":3,\"showAnalytics\":true,\"showExportToExcel\":true,\"queryType\":0,\"resourceType\":\"microsoft.operationalinsights/workspaces\",\"gridSettings\":{\"formatters\":[{\"columnMatch\":\"CmdletResultValue\",\"formatter\":5},{\"columnMatch\":\"Parentgroup\",\"formatter\":5}],\"rowLimit\":10000,\"filter\":true}},\"name\":\"query - 2\",\"styleSettings\":{\"showBorder\":true}}]},\"name\":\"AD Group\"}]},\"conditionalVisibility\":{\"parameterName\":\"selected\",\"comparison\":\"isEqualTo\",\"value\":\"ExchAD\"},\"name\":\"Exchange and AD GRoup\"},{\"type\":12,\"content\":{\"version\":\"NotebookGroup/1.0\",\"groupType\":\"editable\",\"title\":\"Transport Security configuration\",\"items\":[{\"type\":1,\"content\":{\"json\":\"This tab displays differents security configuration for transport components.\"},\"name\":\"text - 10\"},{\"type\":12,\"content\":{\"version\":\"NotebookGroup/1.0\",\"groupType\":\"editable\",\"title\":\"Receive Connectors\",\"items\":[{\"type\":3,\"content\":{\"version\":\"KqlItem/1.0\",\"query\":\"ExchangeConfiguration(SpecificSectionList=\\\"ReceiveConnector\\\",SpecificConfigurationDate=\\\"{DateOfConfiguration:value}\\\",SpecificConfigurationEnv={EnvironmentList},Target = \\\"On-Premises\\\")\\r\\n| where CmdletResultValue.PermissionGroupsString contains \\\"Anonymous\\\"\\r\\n| summarize Count = countif (CmdletResultValue.PermissionGroupsString contains \\\"Anonymous\\\") by Name,tostring(CmdletResultValue.Server.Name)\\r\\n\",\"size\":0,\"title\":\"Anonymous Configuration\",\"queryType\":0,\"resourceType\":\"microsoft.operationalinsights/workspaces\",\"visualization\":\"piechart\",\"chartSettings\":{\"yAxis\":[\"Count\"],\"group\":\"CmdletResultValue_Server_Name\",\"ySettings\":{\"numberFormatSettings\":{\"unit\":0,\"options\":{\"style\":\"decimal\",\"useGrouping\":true}}}}},\"customWidth\":\"33\",\"name\":\"query - 0\"},{\"type\":3,\"content\":{\"version\":\"KqlItem/1.0\",\"query\":\"ExchangeConfiguration(SpecificSectionList=\\\"RCAnonymous\\\",SpecificConfigurationDate=\\\"{DateOfConfiguration:value}\\\",SpecificConfigurationEnv={EnvironmentList},Target = \\\"On-Premises\\\")\\r\\n| extend Identity = tostring(Identity)\\r\\n|summarize count() by Identity\",\"size\":0,\"title\":\"OpenRelay with \\\"ms-Exch-SMTP-Accept-Any-Recipient\\\" for Anonymous\",\"queryType\":0,\"resourceType\":\"microsoft.operationalinsights/workspaces\",\"visualization\":\"piechart\"},\"customWidth\":\"33\",\"name\":\"query - 1\"},{\"type\":3,\"content\":{\"version\":\"KqlItem/1.0\",\"query\":\"ExchangeConfiguration(SpecificSectionList=\\\"ReceiveConnector\\\",SpecificConfigurationDate=\\\"{DateOfConfiguration:value}\\\",SpecificConfigurationEnv={EnvironmentList},Target = \\\"On-Premises\\\")\\r\\n| where CmdletResultValue.AuthMechanismString contains (\\\"ExternalAuthoritative\\\")\\r\\n| extend Server = tostring(CmdletResultValue.Server.Name)\\r\\n| summarize count() by Name,Server\\r\\n\",\"size\":0,\"title\":\"Open Relay using with Externally Secure\",\"queryType\":0,\"resourceType\":\"microsoft.operationalinsights/workspaces\",\"visualization\":\"piechart\"},\"customWidth\":\"33\",\"name\":\"query - 2\"}]},\"name\":\"group - 8\"},{\"type\":12,\"content\":{\"version\":\"NotebookGroup/1.0\",\"groupType\":\"editable\",\"title\":\"Receive Connectors OpenRelay using Extended Right \\\"ms-Exch-SMTP-Accept-Any-Recipient\\\" for Anonymous\",\"items\":[{\"type\":1,\"content\":{\"json\":\"This view shows all **Receive Connectors** configured configured as Open Relay with the Extended Rights \\\"ms-Exch-SMTP-Accept-Any-Recipient\\\" set on the Receive Connector object in the Configuration partition.\\r\\n\\r\\n\\r\\nRemember that with this configuration, the Exchange servers can be used to send emails outside the organization. Depending on the configuration, the connectors may be protected by IPs. However, IP protection is not safe configuration.\\r\\n\\r\\nYou can check if the \\\"ms-Exch-SMTP-Accept-Any-Recipient\\\" ExtendedRights has been added on the Receive connector for Anonymous with PowerShell: `Get-ReceiveConnector | Get-ADPermission | ? {$_.ExtendedRights -like \\\"ms-Exch-SMTP-Accept-Any-Recipient\\\"}`\\r\\n\\r\\nAllow anonymous relay on Exchange server\\r\\n\\r\\nSee the section \\\"Receive Connectors with Anonymous Permission\\\" for additional information regarding Anonymous authentication and IP protection.\",\"style\":\"info\"},\"conditionalVisibility\":{\"parameterName\":\"Help\",\"comparison\":\"isEqualTo\",\"value\":\"Yes\"},\"name\":\"ReceiveConnectorsHelp\"},{\"type\":9,\"content\":{\"version\":\"KqlParameterItem/1.0\",\"parameters\":[{\"id\":\"fa5f9749-d6f8-436f-ae00-cba306713bac\",\"version\":\"KqlParameterItem/1.0\",\"name\":\"Server\",\"type\":2,\"query\":\"ExchangeConfiguration(SpecificSectionList=\\\"ExchangeServers\\\",SpecificConfigurationDate=\\\"{DateOfConfiguration:value}\\\",SpecificConfigurationEnv={EnvironmentList},Target = \\\"On-Premises\\\")\\r\\n| project CmdletResultValue\\r\\n| where CmdletResultValue.ServerRole <> \\\"64\\\"\\r\\n| extend SRVName = tostring(CmdletResultValue.Name)\\r\\n| distinct SRVName\\r\\n| sort by SRVName asc\",\"typeSettings\":{\"showDefault\":false},\"timeContext\":{\"durationMs\":86400000},\"queryType\":0,\"resourceType\":\"microsoft.operationalinsights/workspaces\"},{\"id\":\"14912e83-60a1-4a21-a34b-500d4662a666\",\"version\":\"KqlParameterItem/1.0\",\"name\":\"NoIPRestriction\",\"type\":10,\"isRequired\":true,\"typeSettings\":{\"showDefault\":false},\"jsonData\":\"[\\r\\n { \\\"value\\\": \\\"True\\\", \\\"label\\\": \\\"Yes\\\" },\\r\\n { \\\"value\\\": \\\"True,False\\\", \\\"label\\\": \\\"No\\\", \\\"selected\\\":\\\"False\\\" }\\r\\n]\",\"timeContext\":{\"durationMs\":86400000}}],\"style\":\"pills\",\"queryType\":0,\"resourceType\":\"microsoft.operationalinsights/workspaces\"},\"name\":\"parameters - 2\"},{\"type\":1,\"content\":{\"json\":\"The toogle buttom help you to sort by:\\r\\n\\r\\n- Server\\r\\n- Receive connectors with no IP restrictions\"},\"name\":\"text - 3\"},{\"type\":3,\"content\":{\"version\":\"KqlItem/1.0\",\"query\":\"ExchangeConfiguration(SpecificSectionList=\\\"RCAnonymous\\\",SpecificConfigurationDate=\\\"{DateOfConfiguration:value}\\\",SpecificConfigurationEnv={EnvironmentList},Target = \\\"On-Premises\\\")\\r\\n| project Identity,CmdletResultValue\\r\\n| extend Identity = tostring(Identity)\\r\\n| extend Server = replace_string(replace_string(tostring(split(CmdletResultValue.DistinguishedName,\\\",\\\",3)),\\\"[\\\\\\\"CN=\\\",\\\"\\\"),\\\"\\\\\\\"]\\\",\\\"\\\")\\r\\n|join kind=leftouter ( ExchangeConfiguration(SpecificSectionList=\\\"ReceiveConnector\\\",SpecificConfigurationDate=\\\"{DateOfConfiguration:value}\\\",SpecificConfigurationEnv={EnvironmentList},Target = \\\"On-Premises\\\") ) on $left.Identity == $right.Name\\r\\n| where CmdletResultValue1.Server.Name contains \\\"{Server}\\\"\\r\\n| where (CmdletResultValue1.RemoteIPRanges contains \\\"0.0.0.0\\\" or CmdletResultValue1.RemoteIPRanges contains \\\"ffff:ffff:ffff:ffff:ffff:ffff:ffff:ffff\\\") in ({NoIPRestriction})\\r\\n| where CmdletResultValue1.PermissionGroupsString contains \\\"Anonymous\\\" //> 12 and CmdletResultValue.PermissionGroups != 14 and CmdletResultValue.PermissionGroups != 16\\r\\n| extend Server = tostring(CmdletResultValue1.Server.Name)\\r\\n| extend Name = tostring(CmdletResultValue1.Name)\\r\\n| extend TransportRole = iff(CmdletResultValue1.TransportRole== \\\"32\\\" , \\\"HubTransport\\\", \\\"FrontendTransport\\\")\\r\\n| extend Enabled = tostring(CmdletResultValue1.Enabled)\\r\\n| extend PermissionGroups = tostring(CmdletResultValue1.PermissionGroupsString) \\r\\n| extend AuthMechanism = tostring(CmdletResultValue1.AuthMechanismString)\\r\\n| mv-expand RemoteIPall=CmdletResultValue1.RemoteIPRanges\\r\\n| mv-expand BindingAllall=CmdletResultValue1.Bindings\\r\\n| extend RemoteIP= RemoteIPall.Expression\\r\\n| extend IP= strcat (BindingAllall.Address,\\\"-\\\",BindingAllall.Port)\\r\\n| summarize Bindings = make_set(tostring(IP)),RemoteIPRange = make_set(tostring(RemoteIP)) by Server,Name,TransportRole,Enabled,PermissionGroups,AuthMechanism\\r\\n| sort by Server asc\",\"size\":1,\"showAnalytics\":true,\"showExportToExcel\":true,\"queryType\":0,\"resourceType\":\"microsoft.operationalinsights/workspaces\",\"gridSettings\":{\"rowLimit\":10000,\"filter\":true,\"sortBy\":[{\"itemKey\":\"Server\",\"sortOrder\":1}]},\"sortBy\":[{\"itemKey\":\"Server\",\"sortOrder\":1}]},\"name\":\"RCAnonymousQuery\",\"styleSettings\":{\"showBorder\":true}}]},\"name\":\"Receive Connectors OpenRelay using Extended Right \\\"ms-Exch-SMTP-Accept-Any-Recipient\\\" for Anonymous\"},{\"type\":12,\"content\":{\"version\":\"NotebookGroup/1.0\",\"groupType\":\"editable\",\"title\":\"Receive Connectors OpenRelay using Authentication ExternalAuthoritative\",\"items\":[{\"type\":1,\"content\":{\"json\":\"This view shows all Receive Connectors configured with authentication set to Externally Secure. With this configuration the Receive connector will be allow as Open Relay.\\r\\n\\r\\nRemember that with this configuration, the Exchange servers can be used to send emails outside the organization. Depending on the configuration, the connectors may be protected by IP. However, IP protection is not safe configuration.\\r\\n\\r\\n\\r\\nAllow anonymous relay on Exchange server\\r\\n\\r\\nSee the section \\\"Receive Connectors with Anonymous Permission\\\" for additional information regarding Anonymous authentication and IP protection.\\r\\n\",\"style\":\"info\"},\"conditionalVisibility\":{\"parameterName\":\"Help\",\"comparison\":\"isEqualTo\",\"value\":\"Yes\"},\"name\":\"ReceiveConnectorsHelp\"},{\"type\":9,\"content\":{\"version\":\"KqlParameterItem/1.0\",\"parameters\":[{\"id\":\"195a66a1-7aa2-4564-bd3b-233049d6f101\",\"version\":\"KqlParameterItem/1.0\",\"name\":\"Server\",\"type\":2,\"query\":\"ExchangeConfiguration(SpecificSectionList=\\\"ExchangeServers\\\",SpecificConfigurationDate=\\\"{DateOfConfiguration:value}\\\",SpecificConfigurationEnv={EnvironmentList},Target = \\\"On-Premises\\\")\\r\\n| project CmdletResultValue\\r\\n| where CmdletResultValue.ServerRole <> \\\"64\\\"\\r\\n| extend SRVName = tostring(CmdletResultValue.Name)\\r\\n| distinct SRVName\\r\\n| sort by SRVName asc\",\"typeSettings\":{\"showDefault\":false},\"queryType\":0,\"resourceType\":\"microsoft.operationalinsights/workspaces\"},{\"id\":\"4ef1d2a2-a13f-4bd4-9e66-2d9a15ad8a7a\",\"version\":\"KqlParameterItem/1.0\",\"name\":\"NoIPRestriction\",\"type\":10,\"description\":\"See Receive Connectors with no IP restriction\",\"isRequired\":true,\"jsonData\":\"[\\r\\n { \\\"value\\\": \\\"True\\\", \\\"label\\\": \\\"Yes\\\" },\\r\\n { \\\"value\\\": \\\"True,False\\\", \\\"label\\\": \\\"No\\\", \\\"selected\\\":\\\"False\\\" }\\r\\n]\"}],\"style\":\"pills\",\"queryType\":0,\"resourceType\":\"microsoft.operationalinsights/workspaces\"},\"name\":\"parameters - 3\"},{\"type\":1,\"content\":{\"json\":\"The toogle buttom help you to sort by:\\r\\n\\r\\n- Server\\r\\n- Receive connectors with no IP restrictions\"},\"name\":\"text - 3\"},{\"type\":3,\"content\":{\"version\":\"KqlItem/1.0\",\"query\":\"ExchangeConfiguration(SpecificSectionList=\\\"ReceiveConnector\\\",SpecificConfigurationDate=\\\"{DateOfConfiguration:value}\\\",SpecificConfigurationEnv={EnvironmentList},Target = \\\"On-Premises\\\")\\r\\n| where CmdletResultValue.Server.Name contains \\\"{Server}\\\"\\r\\n| where (CmdletResultValue.RemoteIPRanges contains \\\"0.0.0.0\\\" or CmdletResultValue.RemoteIPRanges contains \\\"ffff:ffff:ffff:ffff:ffff:ffff:ffff:ffff\\\") in ({NoIPRestriction})\\r\\n| where CmdletResultValue.AuthMechanismString contains \\\"ExternalAuthoritative\\\" //> 12 and CmdletResultValue.PermissionGroups != 14 and CmdletResultValue.PermissionGroups != 16\\r\\n| project CmdletResultValue\\r\\n| extend Server = tostring(CmdletResultValue.Server.Name)\\r\\n| extend Name = tostring(CmdletResultValue.Name)\\r\\n| extend TransportRole = iff(CmdletResultValue.TransportRole== \\\"32\\\" , \\\"HubTransport\\\", \\\"FrontendTransport\\\")\\r\\n| extend Enabled = tostring(CmdletResultValue.Enabled)\\r\\n| extend PermissionGroups = tostring(CmdletResultValue.PermissionGroupsString)\\r\\n//| extend Bindings = iif(tostring(parse_json(tostring(CmdletResultValue.Bindings))[1].Port )!=\\\"\\\",tostring(strcat(tostring(parse_json(tostring(CmdletResultValue.Bindings))[0].Address),\\\"-\\\",tostring(parse_json(tostring(CmdletResultValue.Bindings))[0].Port),\\\",\\\",tostring(parse_json(tostring(CmdletResultValue.Bindings))[1].Address),\\\"-\\\",tostring(parse_json(tostring(CmdletResultValue.Bindings))[1].Port))),tostring(strcat(tostring(parse_json(tostring(CmdletResultValue.Bindings))[0].Address),\\\"-\\\",tostring(parse_json(tostring(CmdletResultValue.Bindings))[0].Port))))\\r\\n//| extend RemoteIPRanges = tostring(CmdletResultValue.RemoteIPRanges)\\r\\n| extend AuthMechanism = tostring(CmdletResultValue.AuthMechanismString)\\r\\n| mv-expand RemoteIPall=CmdletResultValue.RemoteIPRanges\\r\\n| mv-expand BindingAllall=CmdletResultValue.Bindings\\r\\n| extend RemoteIP= RemoteIPall.Expression\\r\\n| extend IP= strcat (BindingAllall.Address,\\\"-\\\",BindingAllall.Port)\\r\\n| summarize Bindings = make_set(tostring(IP)),RemoteIPRange = make_set(tostring(RemoteIP)) by Server,Name,TransportRole,Enabled,PermissionGroups,AuthMechanism\\r\\n| sort by Server asc\\r\\n\",\"size\":1,\"showAnalytics\":true,\"title\":\"Receive Connectors configure with Externally Secured Authentication\",\"showExportToExcel\":true,\"queryType\":0,\"resourceType\":\"microsoft.operationalinsights/workspaces\",\"gridSettings\":{\"rowLimit\":10000,\"filter\":true,\"sortBy\":[{\"itemKey\":\"Server\",\"sortOrder\":1}]},\"sortBy\":[{\"itemKey\":\"Server\",\"sortOrder\":1}]},\"name\":\"query - 2\",\"styleSettings\":{\"showBorder\":true}}]},\"name\":\"Security Transport Configuration\"},{\"type\":12,\"content\":{\"version\":\"NotebookGroup/1.0\",\"groupType\":\"editable\",\"title\":\"Receive Connectors with Anonymous Permission\",\"items\":[{\"type\":1,\"content\":{\"json\":\"This view shows all Receive Connectors configured with Anonymous authentication. It is not recommended to configure connectors with Anonymous authentication.\\r\\n\\r\\nWhen configured with Anonymous and No Ip Restriction, any machine can initiate an SMTP session with the Receive Connectors. This can then be used send emails (SPAM/Virus/Phishing....) to all the mailboxes in the organization. The mail will be seen as an internal mail and might bypass some protections.\\r\\n\\r\\nIf you absolute need this configuration because some of your application does not support Authentication, it is strongly recommended to limit the IP addresses that can establish SMTP sessions with Exchange. Do not use range of subnet.\\r\\n\\r\\nThis section has an option button to display \\r\\n All Receive Connectors with Anonymous (No)\\r\\n All Receive Connectors with Anonymous and with no IP Restriction (Yes)\",\"style\":\"info\"},\"conditionalVisibility\":{\"parameterName\":\"Help\",\"comparison\":\"isEqualTo\",\"value\":\"Yes\"},\"name\":\"ReceiveConnectorsHelp\"},{\"type\":9,\"content\":{\"version\":\"KqlParameterItem/1.0\",\"parameters\":[{\"id\":\"195a66a1-7aa2-4564-bd3b-233049d6f101\",\"version\":\"KqlParameterItem/1.0\",\"name\":\"Server\",\"type\":2,\"query\":\"ExchangeConfiguration(SpecificSectionList=\\\"ExchangeServers\\\",SpecificConfigurationDate=\\\"{DateOfConfiguration:value}\\\",SpecificConfigurationEnv={EnvironmentList},Target = \\\"On-Premises\\\")\\r\\n| project CmdletResultValue\\r\\n| where CmdletResultValue.ServerRole <> \\\"64\\\"\\r\\n| extend SRVName = tostring(CmdletResultValue.Name)\\r\\n| distinct SRVName\\r\\n| sort by SRVName asc\",\"typeSettings\":{\"showDefault\":false},\"queryType\":0,\"resourceType\":\"microsoft.operationalinsights/workspaces\"},{\"id\":\"bcb24a01-9242-4fec-b30a-02b0583cbc87\",\"version\":\"KqlParameterItem/1.0\",\"name\":\"NoIPRestriction\",\"type\":10,\"isRequired\":true,\"typeSettings\":{\"showDefault\":false},\"jsonData\":\"[\\r\\n { \\\"value\\\": \\\"True\\\", \\\"label\\\": \\\"Yes\\\" },\\r\\n { \\\"value\\\": \\\"True,False\\\", \\\"label\\\": \\\"No\\\", \\\"selected\\\":\\\"False\\\" }\\r\\n]\"}],\"style\":\"pills\",\"queryType\":0,\"resourceType\":\"microsoft.operationalinsights/workspaces\"},\"name\":\"parameters - 3\"},{\"type\":1,\"content\":{\"json\":\"The toogle buttom help you to sort by:\\r\\n\\r\\n- Server\\r\\n- Receive connectors with no IP restrictions\"},\"name\":\"text - 3 - Copy\"},{\"type\":3,\"content\":{\"version\":\"KqlItem/1.0\",\"query\":\"ExchangeConfiguration(SpecificSectionList=\\\"ReceiveConnector\\\",SpecificConfigurationDate=\\\"{DateOfConfiguration:value}\\\",SpecificConfigurationEnv={EnvironmentList},Target = \\\"On-Premises\\\")\\r\\n| where CmdletResultValue.Server.Name contains \\\"{Server}\\\"\\r\\n| where (CmdletResultValue.RemoteIPRanges contains \\\"0.0.0.0\\\" or CmdletResultValue.RemoteIPRanges contains \\\"ffff:ffff:ffff:ffff:ffff:ffff:ffff:ffff\\\") in ({NoIPRestriction})\\r\\n| where CmdletResultValue.PermissionGroupsString contains \\\"Anonymous\\\" //> 12 and CmdletResultValue.PermissionGroups != 14 and CmdletResultValue.PermissionGroups != 16\\r\\n| project CmdletResultValue\\r\\n| extend Server = tostring(CmdletResultValue.Server.Name)\\r\\n| extend Name = tostring(CmdletResultValue.Name)\\r\\n| extend TransportRole = iff(CmdletResultValue.TransportRole== \\\"32\\\" , \\\"HubTransport\\\", \\\"FrontendTransport\\\")\\r\\n| extend Enabled = tostring(CmdletResultValue.Enabled)\\r\\n| extend PermissionGroups = tostring(CmdletResultValue.PermissionGroupsString) \\r\\n| extend AuthMechanism = tostring(CmdletResultValue.AuthMechanismString)\\r\\n| mv-expand RemoteIPall=CmdletResultValue.RemoteIPRanges\\r\\n| mv-expand BindingAllall=CmdletResultValue.Bindings\\r\\n| extend RemoteIP= RemoteIPall.Expression\\r\\n| extend IP= strcat (BindingAllall.Address,\\\"-\\\",BindingAllall.Port)\\r\\n| summarize Bindings = make_set(tostring(IP)),RemoteIPRange = make_set(tostring(RemoteIP)) by Server,Name,TransportRole,Enabled,PermissionGroups,AuthMechanism\\r\\n| sort by Server asc\\r\\n\",\"size\":1,\"showAnalytics\":true,\"title\":\"Receive Connectors configure with Anonymous Permission\",\"showExportToExcel\":true,\"queryType\":0,\"resourceType\":\"microsoft.operationalinsights/workspaces\",\"gridSettings\":{\"rowLimit\":10000,\"filter\":true,\"sortBy\":[{\"itemKey\":\"Server\",\"sortOrder\":1}]},\"sortBy\":[{\"itemKey\":\"Server\",\"sortOrder\":1}]},\"name\":\"query - 2\",\"styleSettings\":{\"showBorder\":true}}]},\"name\":\"Receive Connectors configure with Anonymous Permission\"},{\"type\":12,\"content\":{\"version\":\"NotebookGroup/1.0\",\"groupType\":\"editable\",\"title\":\"Transport Rules with specific actions to monitor\",\"items\":[{\"type\":1,\"content\":{\"json\":\"A common way used by attackers to exfiltrate data is to set Transport Rules that send all or sensitive messages outside the organization or to a mailbox where they already have full control.\\r\\n\\r\\nThis section shows your Transport rules with sentitive actions that can lead to data leaks:\\r\\n- BlindCopyTo\\r\\n- RedirectMessageTo\\r\\n- CopyTo\\r\\n\\r\\n\\r\\nFor more information :\\r\\nMail flow rules in Exchange Serve\\r\\n\",\"style\":\"info\"},\"conditionalVisibility\":{\"parameterName\":\"Help\",\"comparison\":\"isEqualTo\",\"value\":\"Yes\"},\"name\":\"TransportRulesHelp\"},{\"type\":3,\"content\":{\"version\":\"KqlItem/1.0\",\"query\":\"ExchangeConfiguration(SpecificSectionList=\\\"TransportRule\\\",SpecificConfigurationDate=\\\"{DateOfConfiguration:value}\\\",SpecificConfigurationEnv={EnvironmentList},Target = \\\"On-Premises\\\")\\r\\n| project CmdletResultValue\\r\\n| extend Identity = iif( CmdletResultValue.Identity contains \\\"OrgHierarchyToIgnore\\\",tostring(CmdletResultValue.Identity.Name),tostring(CmdletResultValue.Identity))\\r\\n//| extend State = tostring(CmdletResultValue.State)\\r\\n| extend Status= iff ( tostring(CmdletResultValue.State)== \\\"Enabled\\\" or tostring(CmdletResultValue.State)== \\\"1\\\" , \\\"Enabled\\\",iff(tostring(CmdletResultValue.State)==\\\"\\\",\\\"\\\", \\\"Disabled\\\"))\\r\\n| extend SentTo = tostring(CmdletResultValue.SentToString)\\r\\n| extend BlindCopyTo = tostring(CmdletResultValue.BlindCopyToString)\\r\\n| extend CopyTo = tostring(CmdletResultValue.CopyToString)\\r\\n| extend RedirectMessageTo = tostring(CmdletResultValue.RedirectMessageToString)\\r\\n| extend Mode = tostring(CmdletResultValue.Identity.Mode)\\r\\n| project-away CmdletResultValue\\r\\n| sort by Identity asc\\r\\n| sort by Status desc\",\"size\":1,\"showAnalytics\":true,\"showExportToExcel\":true,\"queryType\":0,\"resourceType\":\"microsoft.operationalinsights/workspaces\",\"gridSettings\":{\"rowLimit\":10000,\"filter\":true}},\"name\":\"query - 1\",\"styleSettings\":{\"showBorder\":true}}]},\"name\":\"Transport Rules actions to monitor\"},{\"type\":1,\"content\":{\"json\":\"### Journal Mailboxes\"},\"name\":\"JournalMailboxHelp\"},{\"type\":1,\"content\":{\"json\":\"The **Journal Mailboxes** contain emails sent and received by specific or all users. The content of these mailboxes is very sensitives.\\r\\n\\r\\nJournal Rules should be reviewed to check if they are still needed. Mailbox audit should be set on these mailboxes. Also by default, no one should access to these mailboxes.\\r\\n\\r\\nThen, it is recommended to regularly check who have Full Access mailbox or Receive As on these mailboxes.\\r\\nAdditional information :\\r\\n\\r\\nJournaling in Exchange Server\\r\\n\\r\\nJournaling procedures\\r\\n\\r\\n\\r\\nMailbox audit logging in Exchange Server\\r\\n\\r\\n\\r\\n\",\"style\":\"info\"},\"conditionalVisibility\":{\"parameterName\":\"Help\",\"comparison\":\"isEqualTo\",\"value\":\"Yes\"},\"name\":\"JournalHelp\"},{\"type\":3,\"content\":{\"version\":\"KqlItem/1.0\",\"query\":\"ExchangeConfiguration(SpecificSectionList=\\\"JournalRule\\\",SpecificConfigurationDate=\\\"{DateOfConfiguration:value}\\\",SpecificConfigurationEnv={EnvironmentList},Target = \\\"On-Premises\\\")\\r\\n| project CmdletResultValue\\r\\n| extend Identity = tostring(CmdletResultValue.Identity)\\r\\n| extend Status= iff ( tostring(CmdletResultValue.Enabled)== \\\"Enabled\\\" or tostring(CmdletResultValue.Enabled)== \\\"1\\\" , \\\"Enabled\\\", iff(tostring(CmdletResultValue.Enabled)==\\\"\\\",\\\"\\\", \\\"Disabled\\\"))\\r\\n//| extend Enabled = tostring(CmdletResultValue.Enabled)\\r\\n| extend JournalEmailAddress = tostring(CmdletResultValue.JournalEmailAddress)\\r\\n| extend Recipient = tostring(CmdletResultValue.Recipient)\\r\\n| sort by Identity asc\\r\\n| sort by Status desc\\r\\n| project-away CmdletResultValue\\r\\n\",\"size\":1,\"showAnalytics\":true,\"title\":\"Journal Rules configured in your environment\",\"showExportToExcel\":true,\"queryType\":0,\"resourceType\":\"microsoft.operationalinsights/workspaces\",\"gridSettings\":{\"rowLimit\":10000,\"filter\":true}},\"name\":\"JournalQuery\",\"styleSettings\":{\"showBorder\":true}},{\"type\":12,\"content\":{\"version\":\"NotebookGroup/1.0\",\"groupType\":\"editable\",\"title\":\"Journal Recipients on mailbox databases configured in your environment\",\"items\":[{\"type\":1,\"content\":{\"json\":\"As Journal Recipient on databases send all the mail send to users in this database to a specific mailbox. The content of these mailboxes is very sensitive.\\r\\n\\r\\nJournal Recipients configuration should be reviewed to check if they are still needed. Mailbox audit should be set on these mailboxes. No one should have access to these mailboxes by default.\\r\\n\\r\\nIt is recommended to regularly check who have Full Access or Receive As on these mailboxes.\\r\\n\\r\\nAdditional information :\\r\\n\\r\\nJournaling in Exchange Server\\r\\n\\r\\nJournaling procedures\\r\\n\\r\\n\\r\\nMailbox audit logging in Exchange Server\\r\\n\",\"style\":\"info\"},\"conditionalVisibility\":{\"parameterName\":\"Help\",\"comparison\":\"isEqualTo\",\"value\":\"Yes\"},\"name\":\"JournalRecipientsHelp\"},{\"type\":3,\"content\":{\"version\":\"KqlItem/1.0\",\"query\":\"ExchangeConfiguration(SpecificSectionList=\\\"MbxDBJournaling\\\",SpecificConfigurationDate=\\\"{DateOfConfiguration:value}\\\",SpecificConfigurationEnv={EnvironmentList},Target = \\\"On-Premises\\\")\\r\\n| where CmdletResultValue.JournalRecipient !=\\\"\\\"\\r\\n| project CmdletResultValue\\r\\n| extend Identity = tostring(CmdletResultValue.Identity.Name)\\r\\n| extend Enabled = tostring(CmdletResultValue.Enabled)\\r\\n| extend JournalRecipient = tostring(CmdletResultValue.JournalRecipient)\\r\\n| project-away CmdletResultValue\\r\\n| sort by Identity asc\\r\\n\",\"size\":1,\"showAnalytics\":true,\"showExportToExcel\":true,\"queryType\":0,\"resourceType\":\"microsoft.operationalinsights/workspaces\"},\"name\":\"query - 1\",\"styleSettings\":{\"showBorder\":true}}]},\"name\":\"JournalRecipientsGroup\"},{\"type\":12,\"content\":{\"version\":\"NotebookGroup/1.0\",\"groupType\":\"editable\",\"title\":\"Remote Domain Autofoward Configuration - * should not allow AutoForwardEnabled\",\"items\":[{\"type\":1,\"content\":{\"json\":\"If **AutoForwardEnabled** is set to True for an SMTP domain, then users in Outlook are allowed to set automatic transfer of all their emails to addresses in this domain.\\r\\n\\r\\nWhen the Default Remote domain is set to * and has the AutoForwardEnabled set True, any user can configure an Outlook rule to automatically forward all emails to any SMTP domain domains outside the organization. This is a high risk configuration as it might allow accounts to leak information. \\r\\n\\r\\nAlso, when setting AutoForwardEnabled to a specific domain, it is strongly recommended enable TLS encryption.\\r\\n\\r\\nAdditional information:\\r\\n\\r\\nRemote Domains\\r\\n\",\"style\":\"info\"},\"conditionalVisibility\":{\"parameterName\":\"Help\",\"comparison\":\"isEqualTo\",\"value\":\"Yes\"},\"name\":\"AutoForwardHelp\"},{\"type\":3,\"content\":{\"version\":\"KqlItem/1.0\",\"query\":\"ExchangeConfiguration(SpecificSectionList=\\\"RemoteDomain\\\",SpecificConfigurationDate=\\\"{DateOfConfiguration:value}\\\",SpecificConfigurationEnv={EnvironmentList},Target = \\\"On-Premises\\\")\\r\\n| project CmdletResultValue\\r\\n| extend Name = tostring(CmdletResultValue.Name)\\r\\n| extend Address = tostring(CmdletResultValue.DomainName.Address)\\r\\n| extend AutoForwardEnabled = iff (CmdletResultValue.AutoForwardEnabled== \\\"true\\\" and CmdletResultValue.Address == \\\"*\\\", strcat (\\\"❌\\\",tostring(CmdletResultValue.AutoForwardEnabled)),iff(CmdletResultValue.AutoForwardEnabled== \\\"true\\\" and CmdletResultValue.Address != \\\"*\\\", strcat (\\\"⚠️\\\",tostring(CmdletResultValue.AutoForwardEnabled)),strcat (\\\"✅\\\",tostring(CmdletResultValue.AutoForwardEnabled))))\\r\\n| project-away CmdletResultValue\\r\\n| sort by Address asc \",\"size\":1,\"showAnalytics\":true,\"showExportToExcel\":true,\"queryType\":0,\"resourceType\":\"microsoft.operationalinsights/workspaces\",\"gridSettings\":{\"rowLimit\":10000,\"filter\":true}},\"name\":\"query - 1\",\"styleSettings\":{\"showBorder\":true}},{\"type\":1,\"content\":{\"json\":\"Accepted domains set to * authorize Open Relay.\\r\\n\\r\\nMore information:\\r\\n\\r\\nAccepted domains\\r\\n\",\"style\":\"info\"},\"conditionalVisibility\":{\"parameterName\":\"Help\",\"comparison\":\"isEqualTo\",\"value\":\"Yes\"},\"name\":\"text - 3\"},{\"type\":3,\"content\":{\"version\":\"KqlItem/1.0\",\"query\":\"ExchangeConfiguration(SpecificSectionList=\\\"AcceptedDomain\\\",SpecificConfigurationDate=\\\"{DateOfConfiguration:value}\\\",SpecificConfigurationEnv={EnvironmentList},Target = \\\"On-Premises\\\")\\r\\n| project CmdletResultValue\\r\\n| where CmdletResultValue.DomainName.Address == \\\"*\\\"\\r\\n| extend Name = tostring(CmdletResultValue.Name)\\r\\n| extend Address = tostring(CmdletResultValue.DomainName.Address)\\r\\n| extend Address = \\\"* : ❌ OpenRelay configuration\\\"\\r\\n| extend DomainType = case(CmdletResultValue.DomainType==\\\"0\\\",\\\"Authoritative Domain\\\",CmdletResultValue.DomainType==\\\"1\\\",\\\"ExternalRelay\\\",CmdletResultValue.DomainType==\\\"2\\\",\\\"InternalRelay\\\",\\\"NotApplicable\\\")\\r\\n| project-away CmdletResultValue\",\"size\":1,\"showAnalytics\":true,\"title\":\"Accepted domain with *\",\"noDataMessage\":\"Accepted Domain * not confirgured (no Open Relay)\",\"noDataMessageStyle\":3,\"showExportToExcel\":true,\"queryType\":0,\"resourceType\":\"microsoft.operationalinsights/workspaces\",\"gridSettings\":{\"rowLimit\":10000,\"filter\":true}},\"name\":\"query - 4\",\"styleSettings\":{\"showBorder\":true}}]},\"name\":\"ForwardGroup\"}]},\"conditionalVisibility\":{\"parameterName\":\"selected\",\"comparison\":\"isEqualTo\",\"value\":\"Transport\"},\"name\":\"Transport Security configuration\"}],\"fromTemplateId\":\"sentinel-MicrosoftExchangeSecurityReview\",\"$schema\":\"https://github.com/Microsoft/Application-Insights-Workbooks/blob/master/schema/workbook.json\"}\r\n", + "serializedData": "{\"version\":\"Notebook/1.0\",\"items\":[{\"type\":1,\"content\":{\"json\":\"# Microsoft Exchange Security Review\"},\"name\":\"text - 2\"},{\"type\":9,\"content\":{\"version\":\"KqlParameterItem/1.0\",\"parameters\":[{\"id\":\"743317e2-ebcf-4958-861d-4ff97fc7cce1\",\"version\":\"KqlParameterItem/1.0\",\"name\":\"EnvironmentList\",\"label\":\"Environment\",\"type\":2,\"isRequired\":true,\"multiSelect\":true,\"quote\":\"'\",\"delimiter\":\",\",\"query\":\"ExchangeEnvironmentList(Target=\\\"On-Premises\\\") | where ESIEnvironment != \\\"\\\"\",\"typeSettings\":{\"limitSelectTo\":1,\"showDefault\":false},\"queryType\":0,\"resourceType\":\"microsoft.operationalinsights/workspaces\"},{\"id\":\"a88b4e41-eb2f-41bf-92d8-27c83650a4b8\",\"version\":\"KqlParameterItem/1.0\",\"name\":\"DateOfConfiguration\",\"label\":\"Collection time\",\"type\":2,\"isRequired\":true,\"query\":\"let _configurationEnv = split(iff(isnull({EnvironmentList}) or isempty({EnvironmentList}) or tolower({EnvironmentList}) == \\\"all\\\",\\\"All\\\",tostring({EnvironmentList})),',');\\r\\nESIExchangeConfig_CL\\r\\n| extend ScopedEnvironment = iff(_configurationEnv contains \\\"All\\\", \\\"All\\\",ESIEnvironment_s) \\r\\n| where ScopedEnvironment in (_configurationEnv)\\r\\n| extend Collection = format_datetime(todatetime(EntryDate_s), 'yyyy-MM-dd')\\r\\n| summarize Collection = max(Collection)\\r\\n| project Collection = \\\"lastdate\\\", Selected = true\\r\\n| join kind= fullouter ( ESIExchangeConfig_CL | extend ScopedEnvironment = iff(_configurationEnv contains \\\"All\\\", \\\"All\\\",ESIEnvironment_s) \\r\\n | where ScopedEnvironment in (_configurationEnv)\\r\\n | where TimeGenerated > ago(90d)\\r\\n | extend Collection = format_datetime(todatetime(EntryDate_s), 'yyyy-MM-dd')\\r\\n | summarize by Collection \\r\\n | join kind= fullouter ( ESIExchangeConfig_CL | extend ScopedEnvironment = iff(_configurationEnv contains \\\"All\\\", \\\"All\\\",ESIEnvironment_s) \\r\\n | where ScopedEnvironment in (_configurationEnv)\\r\\n | where TimeGenerated > ago(90d)\\r\\n | extend Collection = format_datetime(todatetime(EntryDate_s), 'yyyy-MM-dd')\\r\\n | extend PreciseCollection = format_datetime(todatetime(EntryDate_s), 'yyyy-MM-dd HH:mm ')\\r\\n | summarize by PreciseCollection, Collection \\r\\n | join kind=leftouter (\\r\\n ESIExchangeConfig_CL | extend ScopedEnvironment = iff(_configurationEnv contains \\\"All\\\", \\\"All\\\",ESIEnvironment_s) \\r\\n | where ScopedEnvironment in (_configurationEnv)\\r\\n | where TimeGenerated > ago(90d)\\r\\n | extend Collection = format_datetime(todatetime(EntryDate_s), 'yyyy-MM-dd')\\r\\n | extend PreciseCollection = format_datetime(todatetime(EntryDate_s), 'yyyy-MM-dd HH:mm')\\r\\n | summarize by PreciseCollection, Collection \\r\\n | summarize count() by Collection\\r\\n ) on Collection\\r\\n ) on Collection\\r\\n) on Collection\\r\\n| project Value = iif(Selected,Collection,iif(count_ > 1,PreciseCollection,Collection1)), Label = iif(Selected,\\\"Last Known date\\\",iif(count_ > 1,PreciseCollection,Collection1)), Selected\\r\\n| sort by Selected, Value desc\",\"typeSettings\":{\"showDefault\":false},\"queryType\":0,\"resourceType\":\"microsoft.operationalinsights/workspaces\"},{\"id\":\"8ac96eb3-918b-4a36-bcc4-df50d8f46175\",\"version\":\"KqlParameterItem/1.0\",\"name\":\"Help\",\"label\":\"Show Help\",\"type\":10,\"isRequired\":true,\"query\":\"{\\\"version\\\":\\\"1.0.0\\\",\\\"content\\\":\\\"[\\\\r\\\\n { \\\\\\\"value\\\\\\\": \\\\\\\"Yes\\\\\\\", \\\\\\\"label\\\\\\\": \\\\\\\"Yes\\\\\\\"},\\\\r\\\\n {\\\\\\\"value\\\\\\\": \\\\\\\"No\\\\\\\", \\\\\\\"label\\\\\\\": \\\\\\\"No\\\\\\\", \\\\\\\"selected\\\\\\\":true }\\\\r\\\\n]\\\\r\\\\n\\\"}\",\"timeContext\":{\"durationMs\":2592000000},\"queryType\":8}],\"style\":\"above\",\"queryType\":0,\"resourceType\":\"microsoft.operationalinsights/workspaces\"},\"name\":\"TimeRange\"},{\"type\":1,\"content\":{\"json\":\"This workbook helps review your Exchange Security configuration.\\r\\nSelect your Exchange Organization and adjust the time range.\\r\\nBy default, the Help won't be displayed. To display the help, choose Yes on the toogle buttom \\\"Show Help\\\"\",\"style\":\"info\"},\"name\":\"text - 9\"},{\"type\":11,\"content\":{\"version\":\"LinkItem/1.0\",\"style\":\"tabs\",\"links\":[{\"id\":\"34188faf-7a02-4697-9b36-2afa986afc0f\",\"cellValue\":\"selected\",\"linkTarget\":\"parameter\",\"linkLabel\":\"Mailbox Access\",\"subTarget\":\"Delegation\",\"postText\":\"t\",\"style\":\"link\",\"icon\":\"3\",\"linkIsContextBlade\":true},{\"id\":\"be02c735-6150-4b6e-a386-b2b023e754e5\",\"cellValue\":\"selected\",\"linkTarget\":\"parameter\",\"linkLabel\":\"Exchange & AD Groups\",\"subTarget\":\"ExchAD\",\"style\":\"link\"},{\"id\":\"30dc6820-339d-4fa9-ad79-5d79816a5cab\",\"cellValue\":\"selected\",\"linkTarget\":\"parameter\",\"linkLabel\":\"Local Administrators\",\"subTarget\":\"Server\",\"style\":\"link\"},{\"id\":\"571fa2a4-1f1e-44a2-ada0-ccfb31b9abbb\",\"cellValue\":\"selected\",\"linkTarget\":\"parameter\",\"linkLabel\":\"Exchange Security Configuration\",\"subTarget\":\"SecConf\",\"style\":\"link\"},{\"id\":\"26c68d90-925b-4c3c-a837-e3cecd489b2d\",\"cellValue\":\"selected\",\"linkTarget\":\"parameter\",\"linkLabel\":\"Transport Configuration\",\"subTarget\":\"Transport\",\"style\":\"link\"},{\"id\":\"eb2888ca-7fa6-4e82-88db-1bb3663a801e\",\"cellValue\":\"selected\",\"linkTarget\":\"parameter\",\"linkLabel\":\"Workbook Summary\",\"subTarget\":\"Start\",\"style\":\"link\"}]},\"name\":\"TopMenuTabs\"},{\"type\":12,\"content\":{\"version\":\"NotebookGroup/1.0\",\"groupType\":\"editable\",\"items\":[{\"type\":1,\"content\":{\"json\":\"# Workbook goals\\r\\n\\r\\nThe goal of this workbook is to outline key security configurations of your Exchange On-Premises environment.\\r\\n\\r\\nMost of Exchange organizations have were installed years ago (sometimes more than 10 years). Many configurations have been done and might not have been documented. For most environments, the core commitment was maintaining a high availability of the users’ mailboxes putting aside other consideration (even security considerations). Recommended security practices have also evolved since the first released and a regular review is necessary.\\r\\n\\r\\nThis workbook is designed to show your Exchange organization is configured with a security point of view. Indeed, some configurations easy to display as there are no UI available.\\r\\n\\r\\nFor each configuration, you will find explanations and recommendations when applicable.\\r\\n\\r\\n- This workbook does not pretend to show you every weak Security configurations, but the most common issues and known to be used by attackers. \\r\\n- It will not show you if you have been comprised, but will help you identify unexpected configuration.\\r\\n\\r\\n----\\r\\n\\r\\n## Quick reminder of how Exchange works\\r\\n\\r\\nDuring Exchange installation two very important groups are created :\\r\\n- Exchange Trusted Subsystem : Contain all the computer accounts for Exchange Server\\r\\n- Exchange Windows Permissions : Contain the group Exchange trusted Subsystem\\r\\n\\r\\nThese groups have :\\r\\n- Very high privileges in ALL AD domains including the root domain\\r\\n- Right on any Exchange including mailboxes\\r\\n\\r\\nAs each Exchange server computer account is member of Exchange Trusted Subsystem, it means by taking control of the computer account or being System on an Exchange server you will gain access to all the permissions granted to Exchange Trusted Subsystem and Exchange Windows Permissions.\\r\\n\\r\\nTo protect AD and Exchange, it is very important to ensure the following:\\r\\n- There is a very limited number of persons that are local Administrator on Exchange server\\r\\n- To protect user right like : Act part of the operating System, Debug\\r\\n\\r\\nEvery service account or application that have high privileges on Exchange need to be considered as sensitive\\r\\n\\r\\n** 💡 Exchange servers need to be considered as very sensitive servers**\\r\\n\\r\\n-----\\r\\n\\r\\n\\r\\n## Tabs\\r\\n\\r\\n### Mailbox Access\\r\\n\\r\\nThis tab will show you several top sensitive delegations that allow an account to access, modify, act as another user, search, export the content of a mailbox.\\r\\n\\r\\n### Exchange & AD Groups\\r\\n\\r\\nThis tab will show you the members of Exchange groups and Sensitive AD groups.\\r\\n\\r\\n### Local Administrators\\r\\n\\r\\nThis tab will show you the non standard content of the local Administrators group. Remember that a member of the local Administrators group can take control of the computer account of the server and then it will have all the permissions associated with Exchange Trusted Subsytem and Exchange Windows Permissions\\r\\n\\r\\nThe information is displayed with different views : \\r\\n- List of nonstandard users\\r\\n- Number of servers with a nonstandard a user\\r\\n- Nonstandard groups content\\r\\n- For each user important information are displayed like last logon, last password set, enabled\\r\\n\\r\\n### Exchange Security configuration\\r\\n\\r\\nThis tab will show you some important configuration for your Exchange Organization\\r\\n- Status of Admin Audit Log configuration\\r\\n- Status of POP and IMAP configuration : especially, is Plaintext Authentication configured ?\\r\\n- Nonstandard permissions on the Exchange container in the Configuration Partition\\r\\n\\r\\n### Transport Configuration\\r\\n\\r\\nThis tab will show you the configuration of the main Transport components\\r\\n- Receive Connectors configured with Anonymous and/or Open Relay\\r\\n- Remote Domain Autoforward configuration\\r\\n- Transport Rules configured with BlindCopyTo, SendTo, RedirectTo\\r\\n- Journal Rule and Journal Recipient configurations\\r\\n- Accepted Domains with *\\r\\n\\r\\n\"},\"name\":\"WorkbookInfo\"}]},\"conditionalVisibility\":{\"parameterName\":\"selected\",\"comparison\":\"isEqualTo\",\"value\":\"Start\"},\"name\":\"InformationTab\"},{\"type\":12,\"content\":{\"version\":\"NotebookGroup/1.0\",\"groupType\":\"editable\",\"title\":\"Security Configuration for the Exchange environment\",\"items\":[{\"type\":1,\"content\":{\"json\":\"This tab displays several security information regarding the organization or server's configuration.\"},\"name\":\"text - 12\"},{\"type\":1,\"content\":{\"json\":\"This section display the Exchange version and the CU installed.\\r\\n\\r\\nFor the latest build number, check this link : Exchange Build Numbers\\r\\n\\r\\nThis section is built from a file located in the public github repository.\\r\\nThe repository is manually updated by the team project when new CU/SU are released.\\r\\n\",\"style\":\"info\"},\"conditionalVisibility\":{\"parameterName\":\"Help\",\"comparison\":\"isEqualTo\",\"value\":\"Yes\"},\"name\":\"ServerVersionCheckHelp\"},{\"type\":3,\"content\":{\"version\":\"KqlItem/1.0\",\"query\":\"let ExchCUSU = externaldata (Productname:string, CU:string, SU:string, BuildNbAll:string, BuilCUNb:string, Major:string, CUBuildNb:string, SUBuildNb:string)[h\\\"https://raw.githubusercontent.com/nlepagnez/ESI-PublicContent/main/Operations/Watchlists/ExchBuildNumber.csv\\\"]with(format=\\\"csv\\\",ignoreFirstRecord=true)| project Productname,CU,SU,BuildNbAll,BuilCUNb,Major,CUBuildNb,SUBuildNb;\\r\\n//ExchangeConfiguration(SpecificSectionList=\\\"ExchangeServers\\\",SpecificConfigurationDate=\\\"{DateOfConfiguration:value}\\\",SpecificConfigurationEnv={EnvironmentList},Target = \\\"On-Premises\\\")\\r\\n//| extend VersionNumber = strcat(CmdletResultValue.AdminDisplayVersion.Major,\\\".\\\",CmdletResultValue.AdminDisplayVersion.Minor,\\\".\\\",CmdletResultValue.AdminDisplayVersion.Build)\\r\\nExchangeConfiguration(SpecificSectionList=\\\"ExchVersion\\\",SpecificConfigurationDate=\\\"{DateOfConfiguration:value}\\\",SpecificConfigurationEnv={EnvironmentList},Target = \\\"On-Premises\\\")\\r\\n| extend VersionNumber = tostring(CmdletResultValue.ProductVersion)\\r\\n| extend Server = tostring(ProcessedByServer_s)\\r\\n| extend CmdletResultType = tostring(CmdletResultType)\\r\\n| join kind= leftouter (ExchCUSU) on $left.VersionNumber == $right.BuildNbAll\\r\\n| distinct Server,VersionNumber,Productname,CU,SU,CmdletResultType\\r\\n| extend Server = strcat(\\\"💻 \\\",Server)\\r\\n| extend Productname = case ( VersionNumber startswith \\\"15.02\\\", \\\"Exchange 2019\\\", VersionNumber startswith \\\"15.01\\\", \\\"Exchange 2016\\\", VersionNumber startswith \\\"15.00\\\",\\\"Exchange 2013\\\", \\\"Exchange 2010\\\")\\r\\n| extend CU = iff(CmdletResultType <>\\\"Success\\\", \\\"Unable to retrieve information from server\\\", iff(CU <> \\\"\\\", CU, \\\"New CU or SU not yet in the List\\\"))\\r\\n| extend SU = iff(CmdletResultType <>\\\"Success\\\", \\\"Unable to retrieve information from server\\\", iff( SU <> \\\"\\\", SU, \\\"New CU or SU not yet in the List\\\"))\\r\\n|project-away CmdletResultType\\r\\n| sort by Server asc\\r\\n\",\"size\":1,\"showAnalytics\":true,\"title\":\"Exchange servers CU-SU level\",\"showExportToExcel\":true,\"queryType\":0,\"resourceType\":\"microsoft.operationalinsights/workspaces\",\"gridSettings\":{\"rowLimit\":10000,\"filter\":true}},\"customWidth\":\"50\",\"name\":\"ExchangeServersList\",\"styleSettings\":{\"showBorder\":true}},{\"type\":3,\"content\":{\"version\":\"KqlItem/1.0\",\"query\":\"let ExchCUSU = externaldata (Productname:string, CU:string, SU:string, BuildNbAll:string, BuilCUNb:string, Major:string, CUBuildNb:string, SUBuildNb:string)[h\\\"https://raw.githubusercontent.com/nlepagnez/ESI-PublicContent/main/Operations/Watchlists/ExchBuildNumber.csv\\\"]with(format=\\\"csv\\\",ignoreFirstRecord=true)| project Productname,CU,SU,BuildNbAll,BuilCUNb,Major,CUBuildNb,SUBuildNb;\\r\\nExchangeConfiguration(SpecificSectionList=\\\"ExchVersion\\\",SpecificConfigurationDate=\\\"{DateOfConfiguration:value}\\\",SpecificConfigurationEnv={EnvironmentList},Target = \\\"On-Premises\\\")\\r\\n//| extend VersionNumber = strcat(CmdletResultValue.AdminDisplayVersion.Major,\\\".\\\",CmdletResultValue.AdminDisplayVersion.Minor,\\\".\\\",CmdletResultValue.AdminDisplayVersion.Build)\\r\\n| extend VersionNumber = tostring(CmdletResultValue.ProductVersion)\\r\\n| extend Server = tostring(CmdletResultValue.Server)\\r\\n| join kind= leftouter (ExchCUSU) on $left.VersionNumber == $right.BuildNbAll\\r\\n| extend CU = iff( CU <> \\\"\\\", CU, \\\"New CU/SU not yet in the CU List\\\")\\r\\n| extend Version =strcat (VersionNumber,\\\"-\\\",CU,\\\"-\\\",SU)\\r\\n| summarize dcount(Server) by Version\",\"size\":0,\"showAnalytics\":true,\"title\":\"Version break down\",\"showExportToExcel\":true,\"queryType\":0,\"resourceType\":\"microsoft.operationalinsights/workspaces\",\"visualization\":\"piechart\"},\"customWidth\":\"50\",\"name\":\"ExchangeServerVersionPie\"},{\"type\":12,\"content\":{\"version\":\"NotebookGroup/1.0\",\"groupType\":\"editable\",\"title\":\"Admin Audit Log configuration\",\"items\":[{\"type\":1,\"content\":{\"json\":\"The Admin Audit log stores all the actions performed on Exchange Servers (except read actions such as Get/Test).\\r\\n\\r\\nAdmin Audit Log \\r\\n\\r\\nManage Admin Audit Log \\r\\n\\r\\n\\r\\nThis can be used to track \\r\\n- Unexpected behaviors\\r\\n- Who did a modification\\r\\n- Real actions performed by an account (the output could be used with to identify the necessary privileges)\\r\\n\\r\\nℹ️ Recommendations\\r\\n- Ensure that Admin Audit Log is not disabled\\r\\n- Ensure that critical Cmdlets have not been excluded\\r\\n- Ensure that AdminAuditLogCmdlets is set to * (list of audited Cmdlets)\\r\\n- Review the retention configuration for the Admin Audit Log content\",\"style\":\"info\"},\"conditionalVisibility\":{\"parameterName\":\"Help\",\"comparison\":\"isEqualTo\",\"value\":\"Yes\"},\"name\":\"AdminAuditHelp\"},{\"type\":1,\"content\":{\"json\":\"Here the main settings for the Admin Audit Log. Remember that AdminAudit log need to be enabled and no cmdlet should be excluded. Also check the retention limit.\"},\"name\":\"text - 0\"},{\"type\":3,\"content\":{\"version\":\"KqlItem/1.0\",\"query\":\"let SensitiveCMDLet = externaldata (Cmdlet:string, UserOriented:string, Parameters:string)[h\\\"https://raw.githubusercontent.com/nlepagnez/ESI-PublicContent/main/Operations/Watchlists/CmdletWatchlist.csv\\\"]with(format=\\\"csv\\\",ignoreFirstRecord=true)| project Cmdlet,UserOriented,Parameters;\\r\\nlet AAL = (ExchangeConfiguration(SpecificSectionList=\\\"AdminAuditLog\\\",SpecificConfigurationDate=\\\"{DateOfConfiguration:value}\\\",SpecificConfigurationEnv={EnvironmentList},Target = \\\"On-Premises\\\")\\r\\n| extend AdminAuditLogExcludedCmdlets = CmdletResultValue.AdminAuditLogExcludedCmdlets\\r\\n| project AdminAuditLogExcludedCmdlets);\\r\\nlet SentsitivecmdletTrack = toscalar(SensitiveCMDLet | where Cmdlet has_any ( AAL)| project Cmdlet);\\r\\nExchangeConfiguration(SpecificSectionList=\\\"AdminAuditLog\\\",SpecificConfigurationDate=\\\"{DateOfConfiguration:value}\\\",SpecificConfigurationEnv={EnvironmentList},Target = \\\"On-Premises\\\")\\r\\n| project CmdletResultValue\\r\\n| extend AdminAuditLogEnabled = iff(CmdletResultValue.AdminAuditLogEnabled == \\\"FALSE\\\", \\\" ❌ Disabled, High Risk\\\", \\\"✅ Enabled\\\")\\r\\n| extend AdminAuditLogAgeLimit = tostring(CmdletResultValue.AdminAuditLogAgeLimit)\\r\\n| extend AdminAuditLogAgeLimit = substring(AdminAuditLogAgeLimit,8)\\r\\n| extend AdminAuditLogAgeLimit =substring(AdminAuditLogAgeLimit,0,indexof(AdminAuditLogAgeLimit, ','))\\r\\n| extend AdminAuditLogAgeLimit = iff(toint(AdminAuditLogAgeLimit) == 0,strcat(\\\"❌ No AdminAuditlog recorded \\\",AdminAuditLogAgeLimit), iff(toint(AdminAuditLogAgeLimit) <=30,strcat(\\\"⚠️ Value to low except if exported \\\",AdminAuditLogAgeLimit), strcat(\\\"✅\\\",AdminAuditLogAgeLimit)))\\r\\n| extend AdminAuditLogCmdlets = tostring(CmdletResultValue.AdminAuditLogCmdlets)\\r\\n| extend AdminAuditLogCmdlets = substring(AdminAuditLogCmdlets,2)\\r\\n| extend AdminAuditLogCmdlets = substring(AdminAuditLogCmdlets,0,indexof(AdminAuditLogCmdlets, '\\\"]') )\\r\\n| extend AdminAuditLogCmdlets = replace_string(AdminAuditLogCmdlets,'\\\"',\\\"\\\")\\r\\n| extend Comment_AdminAuditLogCmdlets = iff( AdminAuditLogCmdlets == \\\"*\\\",\\\"✅ Default configuration\\\",\\\"❌ if AdminAuditLogCmdlets empty no logging else only AdminAuditLogCmdlets will be logged\\\")\\r\\n| extend AdminAuditLogExcludedCmdlets = tostring(CmdletResultValue.AdminAuditLogExcludedCmdlets)\\r\\n| extend AdminAuditLogExcludedCmdlets = substring(AdminAuditLogExcludedCmdlets,2)\\r\\n| extend AdminAuditLogExcludedCmdlets = substring(AdminAuditLogExcludedCmdlets,0,indexof(AdminAuditLogExcludedCmdlets, ']'))\\r\\n| extend AdminAuditLogExcludedCmdlets = replace_string(AdminAuditLogExcludedCmdlets,'\\\"',\\\"\\\")\\r\\n//| extend Cmdlet = replace_string(AdminAuditLogExcludedCmdlets,'\\\"',\\\"\\\")\\r\\n//| extend AALECSplit = tostring(split(AdminAuditLogExcludedCmdlets,\\\",\\\"))\\r\\n| project-away CmdletResultValue\\r\\n| extend Comment_AdminAuditLogExcludedCmdlet = case( isnotempty( SentsitivecmdletTrack ),\\\"❌ Some excluded CmdLets are part of Sensitive Cmdlets\\\",AdminAuditLogExcludedCmdlets <>\\\"\\\",\\\"⚠️ Some Cmdlets are excluded \\\",\\\"✅ No Excluded CmdLet\\\")\",\"size\":1,\"showAnalytics\":true,\"showExportToExcel\":true,\"queryType\":0,\"resourceType\":\"microsoft.operationalinsights/workspaces\",\"gridSettings\":{\"formatters\":[{\"columnMatch\":\"Comment_AdminAuditLogCmdlets\",\"formatter\":0,\"formatOptions\":{\"customColumnWidthSetting\":\"70ch\"}}],\"rowLimit\":10000,\"sortBy\":[{\"itemKey\":\"AdminAuditLogCmdlets\",\"sortOrder\":1}]},\"sortBy\":[{\"itemKey\":\"AdminAuditLogCmdlets\",\"sortOrder\":1}]},\"name\":\"query - 1\",\"styleSettings\":{\"showBorder\":true}}]},\"name\":\"group - 0Admin Audit Log configuration\"},{\"type\":12,\"content\":{\"version\":\"NotebookGroup/1.0\",\"groupType\":\"editable\"},\"name\":\"POP authentication configuration\"},{\"type\":1,\"content\":{\"json\":\"### POP authentication configuration\"},\"name\":\"text - 11\"},{\"type\":1,\"content\":{\"json\":\"If the POP Service is started, the LoginType should not set to Plaintext. This means that the password will be sent in clear on the network. As POP is enabled by default on all the mailboxes, this represents a high security risk.\\r\\n\\r\\nPOP Authentication\\r\\n- **PlainText** TLS encryption is not required on port 110. Usernames and passwords are sent unencrypted unless the underlying connection is encrypted by using TLS or SSL.\\r\\n- **PlainTextAuthentication** TLS encryption is not required on port 110. However, Basic authentication is permitted only on a port that uses TLS or SSL encryption.\\r\\n- **SecureLogin** Connection on port 110 must use TLS encryption before authenticating.\\r\\n\\r\\nℹ️ Recommendations\\r\\nDisable POP on all mailboxes except those who need to actually use this protocol.\\r\\nSet the authentication to SecureLogin or at least to PlainTextAuthentication and configure the application.\\r\\n\\r\\nIf the application is not able to perform this type of authentication:\\r\\n- Ensure that POP is disabled on all the mailboxes except those who really need it \\r\\n- Monitor the POP connections\\r\\n- Change the password of the application on a regular basis\\r\\n\\r\\nRecommended Reading : \\r\\n\\r\\nConfiguring Authentication for POP3 and IMAP4\\r\\n \\r\\n Set-PopSettings\\r\\n\\r\\n\\r\\nIn order to track mailboxes that are currently using POP\\r\\n- Enable POP logging\\r\\n- Set-PopSettings -Server SRV1 -ProtocolLogEnabled verbose\\r\\n- Several weeks later, analyze the log content\\r\\n- Default location : - Get-PopSettings -server SRV1 | fl server,*log*\\r\\n- Check for connection and authentication\\r\\n\",\"style\":\"info\"},\"conditionalVisibility\":{\"parameterName\":\"Help\",\"comparison\":\"isEqualTo\",\"value\":\"Yes\"},\"name\":\"PopServiceHelp\"},{\"type\":3,\"content\":{\"version\":\"KqlItem/1.0\",\"query\":\"ExchangeConfiguration(SpecificSectionList=\\\"PopSettings\\\",SpecificConfigurationDate=\\\"{DateOfConfiguration:value}\\\",SpecificConfigurationEnv={EnvironmentList},Target = \\\"On-Premises\\\")\\r\\n| extend ServerName = tostring(CmdletResultValue.Server.Name)\\r\\n| join kind = leftouter(ExchangeConfiguration(SpecificSectionList=\\\"POPIMAPServicesStatus\\\",SpecificConfigurationDate=\\\"{DateOfConfiguration:value}\\\",SpecificConfigurationEnv={EnvironmentList},Target = \\\"On-Premises\\\")\\r\\n| where CmdletResultValue.Name contains (\\\"MSExchangePop3\\\")\\r\\n| project ServerName= tostring(CmdletResultValue.Server), ServiceName=CmdletResultValue.Name, Status=CmdletResultValue.StatusString,StartupType=CmdletResultValue.StartTypeString\\r\\n| join (ExchangeConfiguration(SpecificSectionList=\\\"POPIMAPServicesStatus\\\",SpecificConfigurationDate=\\\"{DateOfConfiguration:value}\\\",SpecificConfigurationEnv={EnvironmentList},Target = \\\"On-Premises\\\")\\r\\n| where CmdletResultValue.Name contains (\\\"MSExchangePop3BE\\\" )\\r\\n| project ServerName= tostring(CmdletResultValue.Server), ServiceName=CmdletResultValue.Name, Status=CmdletResultValue.StatusString,StartupType=CmdletResultValue.StartTypeString) on ServerName) on ServerName\\r\\n| extend ServerName = tostring(CmdletResultValue.Server.Name)\\r\\n| extend LoginType = iff(CmdletResultValue.LoginType== 1 , \\\"⛔ PlainText, High Risk\\\", iff(CmdletResultValue.LoginType== 2, \\\"⚠️ PlainTextAuthentication\\\",\\\"✅ SecureLogin\\\"))\\r\\n| extend ProtocolLogEnabled = tostring(CmdletResultValue.ProtocolLogEnabled)\\r\\n| extend ServiceName = iff(tostring(ServiceName)==\\\"\\\", \\\"Service Status not retrieved\\\",tostring(ServiceName))\\r\\n| extend Status = tostring(Status)\\r\\n| extend BackendEndService= tostring(ServiceName1)\\r\\n| extend StartupType = tostring(StartupType)\\r\\n| extend BEStatus = tostring(Status1)\\r\\n| extend BEStartupType = tostring(StartupType1)\\r\\n| project ServerName,LoginType,ServiceName,Status,StartupType,BackendEndService,BEStatus,BEStartupType,ProtocolLogEnabled\\r\\n| sort by ServerName asc\",\"size\":1,\"showAnalytics\":true,\"title\":\"Pop Authentication : should not be set as Plaintext\",\"showExportToExcel\":true,\"queryType\":0,\"resourceType\":\"microsoft.operationalinsights/workspaces\",\"gridSettings\":{\"formatters\":[{\"columnMatch\":\"LoginType\",\"formatter\":5},{\"columnMatch\":\"Count\",\"formatter\":0,\"formatOptions\":{\"aggregation\":\"Sum\"}}],\"rowLimit\":10000,\"filter\":true,\"hierarchySettings\":{\"treeType\":1,\"groupBy\":[\"LoginType\"],\"finalBy\":\"LoginType\"}}},\"name\":\"PopSettingsQuery\",\"styleSettings\":{\"showBorder\":true}},{\"type\":1,\"content\":{\"json\":\"### IMAP authentication configuration\"},\"name\":\"IMAPTitle\"},{\"type\":1,\"content\":{\"json\":\"If the IMAP Service is started, the LoginType should not set to Plaintext. This means that the passwords will be sent in clear over the network. As IMAP is enabled by default on all the mailboxes, this is a high security risk.\\r\\n\\r\\nIMAP Authentication\\r\\n- **PlainText** TLS encryption is not required on port 110. User name and password are sent unencrypted unless the underlying connection is encrypted by using TLS or SSL.\\r\\n- **PlainTextAuthentication** TLS encryption is not required on port 143. However, Basic authentication is permitted only on a port that uses TLS or SSL encryption.\\r\\n- **SecureLogin** Connection on port 143 must use TLS encryption before authenticating.\\r\\n\\r\\nℹ️ Recommendations \\r\\nDisable IMAP on all mailboxes except those which needs to use this protocol. Set the authentication to SecureLogin or at least to PlainTextAuthentication and configure the application accordingly.\\r\\n\\r\\nIf the application is not able to perform this type of authentication:\\r\\n- Ensure that IMAP is disable on all the mailboxes except those who really need it \\r\\n- Monitor the connection\\r\\n- Regularly, change the password of the application\\r\\n\\r\\nRecommended Reading : \\r\\n\\r\\nConfiguring Authentication for POP3 and IMAP4\\r\\n\\r\\n Set-IMAPSettings\\r\\n\\r\\n\\r\\n\\r\\nIn order to track mailboxes that are currently using IMAP\\r\\n- Enable IMAP logging\\r\\n- Set-IMAPSettings -Server SRV1 -ProtocolLogEnabled verbose\\r\\n- Several weeks later, analyze the log content\\r\\n- Default location : Get-IMAPSettings -server SRV1 | fl server,*log*\\r\\n- Check for connection and authentication\\r\\n\",\"style\":\"info\"},\"conditionalVisibility\":{\"parameterName\":\"Help\",\"comparison\":\"isEqualTo\",\"value\":\"Yes\"},\"name\":\"IMAPHelp\"},{\"type\":3,\"content\":{\"version\":\"KqlItem/1.0\",\"query\":\"ExchangeConfiguration(SpecificSectionList=\\\"IMAPSettings\\\",SpecificConfigurationDate=\\\"{DateOfConfiguration:value}\\\",SpecificConfigurationEnv={EnvironmentList},Target = \\\"On-Premises\\\")\\r\\n| extend ServerName = tostring(CmdletResultValue.Server.Name)\\r\\n| join kind = leftouter(ExchangeConfiguration(SpecificSectionList=\\\"POPIMAPServicesStatus\\\",SpecificConfigurationDate=\\\"{DateOfConfiguration:value}\\\",SpecificConfigurationEnv={EnvironmentList},Target = \\\"On-Premises\\\")\\r\\n| where CmdletResultValue.Name contains (\\\"MSExchangeIMAP4\\\")\\r\\n| project ServerName= tostring(CmdletResultValue.Server), ServiceName=CmdletResultValue.Name, Status=CmdletResultValue.StatusString,StartupType=CmdletResultValue.StartTypeString\\r\\n| join (ExchangeConfiguration(SpecificSectionList=\\\"POPIMAPServicesStatus\\\",SpecificConfigurationDate=\\\"{DateOfConfiguration:value}\\\",SpecificConfigurationEnv={EnvironmentList},Target = \\\"On-Premises\\\")\\r\\n| where CmdletResultValue.Name contains (\\\"MSExchangeIMAP4BE\\\" )\\r\\n| project ServerName= tostring(CmdletResultValue.Server), ServiceName=CmdletResultValue.Name, Status=CmdletResultValue.StatusString,StartupType=CmdletResultValue.StartTypeString) on ServerName) on ServerName\\r\\n| extend ServerName = tostring(CmdletResultValue.Server.Name)\\r\\n| extend LoginType = iff(CmdletResultValue.LoginType== 1 , \\\"⛔ PlainText, High Risk\\\", iff(CmdletResultValue.LoginType== 2, \\\"⚠️ PlainTextAuthentication\\\",\\\"✅ SecureLogin\\\"))\\r\\n| extend ProtocolLogEnabled = tostring(CmdletResultValue.ProtocolLogEnabled)\\r\\n| extend ServiceName = iff(tostring(ServiceName)==\\\"\\\", \\\"Service Status not retrieved\\\",tostring(ServiceName))\\r\\n| extend Status = tostring(Status)\\r\\n| extend BackendEndService= tostring(ServiceName1)\\r\\n| extend StartupType = tostring(StartupType)\\r\\n| extend BEStatus = tostring(Status1)\\r\\n| extend BEStartupType = tostring(StartupType1)\\r\\n| project ServerName,LoginType,ServiceName,Status,StartupType,BackendEndService,BEStatus,BEStartupType,ProtocolLogEnabled\\r\\n| sort by ServerName asc\",\"size\":1,\"showAnalytics\":true,\"title\":\"IMAP Authentication : should not be set as Plaintext\",\"showExportToExcel\":true,\"queryType\":0,\"resourceType\":\"microsoft.operationalinsights/workspaces\",\"gridSettings\":{\"formatters\":[{\"columnMatch\":\"LoginType\",\"formatter\":5}],\"rowLimit\":10000,\"filter\":true,\"hierarchySettings\":{\"treeType\":1,\"groupBy\":[\"LoginType\"],\"finalBy\":\"LoginType\"}}},\"name\":\"IMAPSettingsQuery\",\"styleSettings\":{\"showBorder\":true}},{\"type\":12,\"content\":{\"version\":\"NotebookGroup/1.0\",\"groupType\":\"editable\",\"title\":\"Nonstandard permissions on Configuration Partitions\",\"items\":[{\"type\":1,\"content\":{\"json\":\"This section highlights nonstandard permissions on Configuration Partition for Exchange container. By selecting Yes for Generic All buttom only delegation set for Generic All will be display. Standard, Deny and inherited permissions have been removed\"},\"name\":\"text - 0\"},{\"type\":1,\"content\":{\"json\":\"During the lifetime of an Exchange Organization, many permissions may have been set on Exchange containers in the Configuration Partition.\\r\\nThis section displayed all the nonstandard permissions found on the most important Exchange containers :\\r\\n - Groups from legacy Exchange versions (Exchange Enterprise Servers, Exchange Domain Servers,...)\\r\\n - SID for deleted accounts\\r\\n - Old service accounts (that may not have been disabled or removed...)\\r\\n \\r\\nWhen an administrator run setup /prepareAD, his account will be granted Generic All at the top-level Exchange container\\r\\n\\r\\nBy default, this section only displayed the Generic All permissions.\\r\\n \\r\\nThis section is built by removing all the standard AD and Exchange groups.\\r\\n\\r\\n Exchange 2013 deployment permissions reference\\r\\n \\r\\n\",\"style\":\"info\"},\"conditionalVisibility\":{\"parameterName\":\"Help\",\"comparison\":\"isEqualTo\",\"value\":\"Yes\"},\"name\":\"text - 3\"},{\"type\":9,\"content\":{\"version\":\"KqlParameterItem/1.0\",\"parameters\":[{\"id\":\"80f9134a-420f-47c9-b171-1ca8e72efa3e\",\"version\":\"KqlParameterItem/1.0\",\"name\":\"GenericAll\",\"type\":10,\"isRequired\":true,\"jsonData\":\"[\\r\\n { \\\"value\\\": \\\"True\\\", \\\"label\\\": \\\"Yes\\\" },\\r\\n { \\\"value\\\": \\\"True,False\\\", \\\"label\\\": \\\"No\\\", \\\"selected\\\":true }\\r\\n]\"},{\"id\":\"29e2005c-3bd4-4bb8-be63-053d11abe1d4\",\"version\":\"KqlParameterItem/1.0\",\"name\":\"NonStandardPermissions\",\"type\":10,\"isRequired\":true,\"typeSettings\":{\"showDefault\":false},\"jsonData\":\"[\\r\\n { \\\"value\\\": \\\"True\\\", \\\"label\\\": \\\"Yes\\\", \\\"selected\\\":true },\\r\\n { \\\"value\\\": \\\"True,False\\\", \\\"label\\\": \\\"No\\\"}\\r\\n]\"}],\"style\":\"pills\",\"queryType\":0,\"resourceType\":\"microsoft.operationalinsights/workspaces\"},\"name\":\"parameters - 1\"},{\"type\":3,\"content\":{\"version\":\"KqlItem/1.0\",\"query\":\"let StandardGroup = dynamic([\\\"Authenticated Users\\\", \\\"Domain Admins\\\", \\\"Enterprise Admins\\\",\\\"Schema Admins\\\", \\\"Exchange Trusted Subsystem\\\", \\\"Exchange Servers\\\",\\\"Organization Management\\\", \\\"Public Folder Management\\\",\\\"Delegated Setup\\\", \\\"ANONYMOUS LOGON\\\", \\\"NETWORK SERVICE\\\", \\\"SYSTEM\\\", \\\"Everyone\\\",\\\"Managed Availability Servers\\\"]);\\r\\nlet Exchsrv =ExchangeConfiguration(SpecificSectionList=\\\"ExchangeServers\\\",SpecificConfigurationDate=\\\"{DateOfConfiguration:value}\\\",SpecificConfigurationEnv={EnvironmentList},Target = \\\"On-Premises\\\")| summarize make_list(CmdletResultValue.Name);\\r\\nExchangeConfiguration(SpecificSectionList=\\\"PartConfPerm\\\",SpecificConfigurationDate=\\\"{DateOfConfiguration:value}\\\",SpecificConfigurationEnv={EnvironmentList},Target = \\\"On-Premises\\\")\\r\\n| project CmdletResultValue\\r\\n| where CmdletResultValue.Deny !contains \\\"True\\\" and CmdletResultValue.IsInherited !contains \\\"True\\\"\\r\\n| where (CmdletResultValue.AccessRights == \\\"[983551]\\\") in ({GenericAll})\\r\\n| where not (CmdletResultValue.UserString has_any (StandardGroup)) in ({NonStandardPermissions})\\r\\n| where not (CmdletResultValue.UserString has_any (Exchsrv))in ({NonStandardPermissions})\\r\\n| extend Name = tostring(CmdletResultValue.Identity.Name)\\r\\n| extend Account = tostring(CmdletResultValue.UserString )\\r\\n| extend AccessRights = iff (tostring(CmdletResultValue.AccessRightsString) contains \\\"GenericAll\\\", strcat (\\\"❌ \\\",tostring(CmdletResultValue.AccessRightsString)), tostring(CmdletResultValue.AccessRightsString))\\r\\n| extend ExtendedRights = iff (tostring(CmdletResultValue.ExtendedRightsString) contains \\\"-As\\\", strcat (\\\"❌ \\\",tostring(CmdletResultValue.ExtendedRightsString)), tostring(CmdletResultValue.ExtendedRightsString))\\r\\n| extend InheritanceType = tostring(CmdletResultValue.InheritanceType)\\r\\n| extend DN = tostring(CmdletResultValue.Identity.DistinguishedName)\\r\\n| project-away CmdletResultValue\\r\\n| sort by DN desc\",\"size\":1,\"showAnalytics\":true,\"showExportToExcel\":true,\"queryType\":0,\"resourceType\":\"microsoft.operationalinsights/workspaces\",\"gridSettings\":{\"rowLimit\":10000,\"filter\":true,\"sortBy\":[{\"itemKey\":\"AccessRights\",\"sortOrder\":1}]},\"sortBy\":[{\"itemKey\":\"AccessRights\",\"sortOrder\":1}]},\"name\":\"query - 2\",\"styleSettings\":{\"showBorder\":true}}]},\"name\":\"Nonstandard permissions on Configuration Partitions\"}]},\"conditionalVisibility\":{\"parameterName\":\"selected\",\"comparison\":\"isEqualTo\",\"value\":\"SecConf\"},\"name\":\"Security Configuration for the Exchange environment\"},{\"type\":12,\"content\":{\"version\":\"NotebookGroup/1.0\",\"groupType\":\"editable\",\"items\":[{\"type\":1,\"content\":{\"json\":\"This tab displays important security configurations that allow access to all or partial mailboxes' content - Direct delegations are not listed - Example :
\\r\\n- Permissions Full Access \\r\\n- Permission on mailboxes folders\\r\\n\"},\"name\":\"text - 6\"},{\"type\":3,\"content\":{\"version\":\"KqlItem/1.0\",\"query\":\"ExchangeConfiguration(SpecificSectionList=\\\"MRA\\\",SpecificConfigurationDate=\\\"{DateOfConfiguration:value}\\\",SpecificConfigurationEnv={EnvironmentList})\\r\\n//| where CmdletResultValue.Name !contains \\\"Deleg\\\" and CmdletResultValue.RoleAssigneeName != \\\"Hygiene Management\\\" and CmdletResultValue.RoleAssigneeName != \\\"Exchange Online-ApplicationAccount\\\" and CmdletResultValue.RoleAssigneeName != \\\"Discovery Management\\\"\\r\\n| where CmdletResultValue.Name !contains \\\"Deleg\\\" \\r\\n| where CmdletResultValue.RoleAssigneeName !in (\\\"Hygiene Management\\\",\\\"Exchange Online-ApplicationAccount\\\",\\\"Discovery Management\\\")\\r\\n| where CmdletResultValue.Role.Name contains \\\"Export\\\" or CmdletResultValue.Role.Name contains \\\"Impersonation\\\" or (CmdletResultValue.Role.Name contains \\\"Search\\\" and CmdletResultValue.Role.Name !contains \\\"MailboxSearchApplication\\\")\\r\\n| summarize dcount(tostring(CmdletResultValue.RoleAssigneeName)) by role=tostring(CmdletResultValue.Role.Name)\",\"size\":1,\"showAnalytics\":true,\"title\":\"Number of delegations for sensitive RBAC roles\",\"showExportToExcel\":true,\"queryType\":0,\"resourceType\":\"microsoft.operationalinsights/workspaces\",\"visualization\":\"tiles\",\"tileSettings\":{\"titleContent\":{\"columnMatch\":\"role\",\"formatter\":1},\"leftContent\":{\"columnMatch\":\"dcount_CmdletResultValue_RoleAssigneeName\",\"formatter\":12,\"formatOptions\":{\"palette\":\"auto\"},\"numberFormat\":{\"unit\":17,\"options\":{\"style\":\"decimal\",\"maximumFractionDigits\":2,\"maximumSignificantDigits\":3}}},\"showBorder\":true,\"sortCriteriaField\":\"role\",\"sortOrderField\":1}},\"name\":\"MRAQuery\"},{\"type\":12,\"content\":{\"version\":\"NotebookGroup/1.0\",\"groupType\":\"editable\",\"title\":\"Application Impersonation Role\",\"items\":[{\"type\":1,\"content\":{\"json\":\"This delegation allows the delegated account to access and modify the content of every mailboxes using EWS.\"},\"name\":\"text - 0\"},{\"type\":1,\"content\":{\"json\":\"**ApplicationImpersonation** is a RBAC role that allows access (read and modify) to the content of all mailboxes using EWS. \\r\\n\\r\\n⚡ This role is very powerfull.\\r\\n\\r\\nIt should be carefully delegated. When a delegation is necessary, RBAC scopes should be configured to limit the list of impacted mailboxes.\\r\\n\\r\\nHelp for the role Application Impersonation\\r\\n\\r\\nIt is common (but not recommended) to see service accounts from backup solution, antivirus software, MDM... with this delegation.\\r\\n\\r\\nNote that the default configuration to the group Hygiene Management is excluded. This group is a sensitive group. Remember to monitor the content of this group.\",\"style\":\"info\"},\"conditionalVisibility\":{\"parameterName\":\"Help\",\"comparison\":\"isEqualTo\",\"value\":\"Yes\"},\"name\":\"text - 2\"},{\"type\":3,\"content\":{\"version\":\"KqlItem/1.0\",\"query\":\"ExchangeConfiguration(SpecificSectionList=\\\"MRA\\\",SpecificConfigurationDate=\\\"{DateOfConfiguration:value}\\\",SpecificConfigurationEnv={EnvironmentList})\\r\\n| where CmdletResultValue.Role.Name contains \\\"Impersonation\\\" and CmdletResultValue.RoleAssigneeName != \\\"Hygiene Management\\\" and CmdletResultValue.Name !contains \\\"Deleg\\\"\\r\\n//| extend RoleAssigneeName = tostring(CmdletResultValue.RoleAssigneeName)\\r\\n| extend RoleAssigneeType = case(CmdletResultValue.RoleAssigneeType== \\\"0\\\" or CmdletResultValue.RoleAssigneeType== \\\"2\\\" , \\\"User\\\", CmdletResultValue.RoleAssigneeType== \\\"10\\\",\\\"Group\\\",\\\"LinkedGroup\\\")\\r\\n| extend CustomRecipientWriteScope = tostring(CmdletResultValue.CustomRecipientWriteScope.Name)\\r\\n| extend CustomConfigWriteScope = tostring(CmdletResultValue.CustomConfigWriteScope.Name)\\r\\n| extend RecipientWriteScope = case(CmdletResultValue.RecipientWriteScope==\\\"0\\\",\\\"None\\\",CmdletResultValue.RecipientWriteScope==\\\"2\\\",\\\"Organization\\\",CmdletResultValue.RecipientWriteScope==\\\"3\\\",\\\"MyGAL\\\", CmdletResultValue.RecipientWriteScope==\\\"4\\\",\\\"Self\\\",CmdletResultValue.RecipientWriteScope==\\\"7\\\", \\\"CustomRecipientScope\\\",CmdletResultValue.RecipientWriteScope==\\\"8\\\",\\\"MyDistributionGroups\\\",\\\"NotApplicable\\\")\\r\\n| extend ConfigWriteScope = case(CmdletResultValue.ConfigWriteScope==\\\"0\\\",\\\"None\\\",CmdletResultValue.ConfigWriteScope==\\\"7\\\",\\\"CustomConfigScope\\\",CmdletResultValue.ConfigWriteScope==\\\"10\\\",\\\"OrganizationConfig\\\",\\\"NotApplicable\\\")\\r\\n| extend ConfigReadScope = iff(CmdletResultValue.ConfigReadScope == \\\"0\\\" , \\\"None\\\", \\\"OrganizationConfig\\\")\\r\\n| extend RecipientReadScope = case(CmdletResultValue.RecipientReadScope==\\\"2\\\",\\\"Organization\\\",CmdletResultValue.RecipientReadScope==\\\"3\\\",\\\"MyGAL\\\",CmdletResultValue.RecipientReadScope==\\\"4\\\",\\\"Self\\\",\\\"NotApplicable\\\")\\r\\n| extend ManagementRoleAssignement = tostring(CmdletResultValue.Name)\\r\\n| extend Status= tostring(CmdletResultValue.Enabled)\\r\\n| extend RoleAssignmentDelegationType = iff(CmdletResultValue.RoleAssignmentDelegationType ==\\\"6\\\" , \\\"Delegating\\\", \\\"Regular\\\") \\r\\n| extend RoleAssigneeName = iff( RoleAssigneeType == \\\"User\\\", strcat(\\\"🧑‍🦰 \\\",tostring(CmdletResultValue.RoleAssigneeName)), strcat(\\\"👪 \\\", tostring(CmdletResultValue.RoleAssigneeName)) )\\r\\n| project RoleAssigneeName, RoleAssigneeType, Status,CustomRecipientWriteScope, CustomConfigWriteScope, RecipientWriteScope, ConfigWriteScope, ConfigReadScope, RecipientReadScope, ManagementRoleAssignement, RoleAssignmentDelegationType, WhenCreated, WhenChanged\",\"size\":1,\"showAnalytics\":true,\"showExportToExcel\":true,\"queryType\":0,\"resourceType\":\"microsoft.operationalinsights/workspaces\",\"gridSettings\":{\"rowLimit\":10000,\"filter\":true}},\"name\":\"query - 1\",\"styleSettings\":{\"showBorder\":true}}]},\"name\":\"Application Impersonation Role\"},{\"type\":12,\"content\":{\"version\":\"NotebookGroup/1.0\",\"groupType\":\"editable\",\"title\":\"Mailbox Import Export Role\",\"items\":[{\"type\":1,\"content\":{\"json\":\"This delegation allows to export the content all mailboxes in a scope in PST file.\\r\\nExcluded from the result as default configuration :\\r\\nDelegating delegation to Organization Management\\r\\n\"},\"name\":\"text - 0\"},{\"type\":1,\"content\":{\"json\":\"**Mailbox Import Export** is a RBAC role that allows an account to export the content of any maibox in a PST. It also allows search in all mailboxes.\\r\\n\\r\\n⚡ This role is very powerfull.\\r\\n\\r\\nBy default, this role is not delegated to any user or group. The members of the group Organization Management by default do not have this role but are able to delegate it.\\r\\n\\r\\nHelp for the role Mailbox Import Export\\r\\n\\r\\nℹ️ Recommendations\\r\\n\\r\\nIf you temporarily need this delegation, consider the following:\\r\\n- create an empty group with this delegation\\r\\n- monitor the group content and alert when the group modified\\r\\n- add administrators in this group only for a short period of time.\\r\\n\",\"style\":\"info\"},\"conditionalVisibility\":{\"parameterName\":\"Help\",\"comparison\":\"isEqualTo\",\"value\":\"Yes\"},\"name\":\"ExportRoleHelp\"},{\"type\":3,\"content\":{\"version\":\"KqlItem/1.0\",\"query\":\"ExchangeConfiguration(SpecificSectionList=\\\"MRA\\\",SpecificConfigurationDate=\\\"{DateOfConfiguration:value}\\\",SpecificConfigurationEnv={EnvironmentList},Target = \\\"On-Premises\\\")\\r\\n| where CmdletResultValue.Role.Name contains \\\"export\\\" and CmdletResultValue.Name !contains \\\"Deleg\\\"\\r\\n| extend RoleAssigneeType = case(CmdletResultValue.RoleAssigneeType== \\\"0\\\" or CmdletResultValue.RoleAssigneeType== \\\"2\\\" , \\\"User\\\", CmdletResultValue.RoleAssigneeType== \\\"10\\\",\\\"Group\\\",\\\"LinkedGroup\\\")\\r\\n| extend CustomRecipientWriteScope = tostring(CmdletResultValue.CustomRecipientWriteScope.Name)\\r\\n| extend CustomConfigWriteScope = tostring(CmdletResultValue.CustomConfigWriteScope.Name)\\r\\n| extend RecipientWriteScope = case(CmdletResultValue.RecipientWriteScope==\\\"0\\\",\\\"None\\\",CmdletResultValue.RecipientWriteScope==\\\"2\\\",\\\"Organization\\\",CmdletResultValue.RecipientWriteScope==\\\"3\\\",\\\"MyGAL\\\", CmdletResultValue.RecipientWriteScope==\\\"4\\\",\\\"Self\\\",CmdletResultValue.RecipientWriteScope==\\\"7\\\", \\\"CustomRecipientScope\\\",CmdletResultValue.RecipientWriteScope==\\\"8\\\",\\\"MyDistributionGroups\\\",\\\"NotApplicable\\\")\\r\\n| extend ConfigWriteScope = case(CmdletResultValue.ConfigWriteScope==\\\"0\\\",\\\"None\\\",CmdletResultValue.ConfigWriteScope==\\\"7\\\",\\\"CustomConfigScope\\\",CmdletResultValue.ConfigWriteScope==\\\"10\\\",\\\"OrganizationConfig\\\",\\\"NotApplicable\\\")\\r\\n| extend ConfigReadScope = iff(CmdletResultValue.ConfigReadScope == \\\"0\\\" , \\\"None\\\", \\\"OrganizationConfig\\\")\\r\\n| extend RecipientReadScope = case(CmdletResultValue.RecipientReadScope==\\\"2\\\",\\\"Organization\\\",CmdletResultValue.RecipientReadScope==\\\"3\\\",\\\"MyGAL\\\",CmdletResultValue.RecipientReadScope==\\\"4\\\",\\\"Self\\\",\\\"NotApplicable\\\")\\r\\n| extend ManagementRoleAssignement = tostring(CmdletResultValue.Name)\\r\\n| extend Status= tostring(CmdletResultValue.Enabled)\\r\\n| extend RoleAssignmentDelegationType = iff(CmdletResultValue.RoleAssignmentDelegationType ==\\\"6\\\" , \\\"Delegating\\\", \\\"Regular\\\") \\r\\n| extend RoleAssigneeName = iff( RoleAssigneeType == \\\"User\\\", strcat(\\\"🧑‍🦰 \\\",tostring(CmdletResultValue.RoleAssigneeName)), strcat(\\\"👪 \\\", tostring(CmdletResultValue.RoleAssigneeName)) )\\r\\n| project RoleAssigneeName, RoleAssigneeType,Status, CustomRecipientWriteScope, CustomConfigWriteScope, RecipientWriteScope, ConfigWriteScope, ConfigReadScope, RecipientReadScope, ManagementRoleAssignement, RoleAssignmentDelegationType, WhenCreated, WhenChanged\",\"size\":1,\"showAnalytics\":true,\"showExportToExcel\":true,\"queryType\":0,\"resourceType\":\"microsoft.operationalinsights/workspaces\",\"gridSettings\":{\"rowLimit\":10000,\"filter\":true,\"sortBy\":[{\"itemKey\":\"ConfigWriteScope\",\"sortOrder\":1}]},\"sortBy\":[{\"itemKey\":\"ConfigWriteScope\",\"sortOrder\":1}]},\"name\":\"query - 1\",\"styleSettings\":{\"showBorder\":true}}]},\"name\":\"Mailbox Import Export Role\"},{\"type\":12,\"content\":{\"version\":\"NotebookGroup/1.0\",\"groupType\":\"editable\",\"title\":\"Mailbox Search Role\",\"items\":[{\"type\":1,\"content\":{\"json\":\"This delegation allows to search inside all or in a scope of mailboxes and export the result in PST.\\r\\nExcluded from the result as default configuration :\\r\\nDelegating delegation to Organization Management\\r\\nExchange Online-ApplicationAccount\\r\\nDiscovery Management has been excluded\\r\\n\"},\"name\":\"text - 0\"},{\"type\":1,\"content\":{\"json\":\"**Mailbox Search** is an RBAC role that allows an account to search in any mailbox and export the results to a PST.\\r\\n\\r\\n⚡ This role is very powerful.\\r\\n\\r\\nBy default, this role is only delegated to the group Discovery Management. The members of the group Organization Management do not have this role but are able to delegate it.\\r\\n\\r\\nHelp for the role Mailbox Search\\r\\n\\r\\nℹ️ Recommendations\\r\\n\\r\\nIf you temporarily need this delegation, consider the following:\\r\\n\\r\\n- add the administrators in the Discovery Management group\\r\\n- monitor the group content and alert when the group modified\\r\\n- add administrators in this group only for a short period of time\\r\\n\",\"style\":\"info\"},\"conditionalVisibility\":{\"parameterName\":\"Help\",\"comparison\":\"isEqualTo\",\"value\":\"Yes\"},\"name\":\"SearchRBACHelp\"},{\"type\":3,\"content\":{\"version\":\"KqlItem/1.0\",\"query\":\"ExchangeConfiguration(SpecificSectionList=\\\"MRA\\\",SpecificConfigurationDate=\\\"{DateOfConfiguration:value}\\\",SpecificConfigurationEnv={EnvironmentList},Target = \\\"On-Premises\\\")\\r\\n| where CmdletResultValue.Role.Name contains \\\"search\\\" and CmdletResultValue.Name !contains \\\"Deleg\\\"\\r\\n| where CmdletResultValue.RoleAssigneeName != \\\"Exchange Online-ApplicationAccount\\\" and CmdletResultValue.RoleAssigneeName != \\\"Discovery Management\\\"\\r\\n| extend RoleAssigneeType = case(CmdletResultValue.RoleAssigneeType== \\\"0\\\" or CmdletResultValue.RoleAssigneeType== \\\"2\\\" , \\\"User\\\", CmdletResultValue.RoleAssigneeType== \\\"10\\\",\\\"Group\\\",\\\"LinkedGroup\\\")\\r\\n| extend CustomRecipientWriteScope = tostring(CmdletResultValue.CustomRecipientWriteScope.Name)\\r\\n| extend CustomConfigWriteScope = tostring(CmdletResultValue.CustomConfigWriteScope.Name)\\r\\n| extend RecipientWriteScope = case(CmdletResultValue.RecipientWriteScope==\\\"0\\\",\\\"None\\\",CmdletResultValue.RecipientWriteScope==\\\"2\\\",\\\"Organization\\\",CmdletResultValue.RecipientWriteScope==\\\"3\\\",\\\"MyGAL\\\", CmdletResultValue.RecipientWriteScope==\\\"4\\\",\\\"Self\\\",CmdletResultValue.RecipientWriteScope==\\\"7\\\", \\\"CustomRecipientScope\\\",CmdletResultValue.RecipientWriteScope==\\\"8\\\",\\\"MyDistributionGroups\\\",\\\"NotApplicable\\\")\\r\\n| extend ConfigWriteScope = case(CmdletResultValue.ConfigWriteScope==\\\"0\\\",\\\"None\\\",CmdletResultValue.ConfigWriteScope==\\\"7\\\",\\\"CustomConfigScope\\\",CmdletResultValue.ConfigWriteScope==\\\"10\\\",\\\"OrganizationConfig\\\",\\\"NotApplicable\\\")\\r\\n| extend ConfigReadScope = iff(CmdletResultValue.ConfigReadScope == \\\"0\\\" , \\\"None\\\", \\\"OrganizationConfig\\\")\\r\\n| extend RecipientReadScope = case(CmdletResultValue.RecipientReadScope==\\\"2\\\",\\\"Organization\\\",CmdletResultValue.RecipientReadScope==\\\"3\\\",\\\"MyGAL\\\",CmdletResultValue.RecipientReadScope==\\\"4\\\",\\\"Self\\\",\\\"NotApplicable\\\")\\r\\n| extend ManagementRoleAssignement = tostring(CmdletResultValue.Name)\\r\\n| extend Status= tostring(CmdletResultValue.Enabled)\\r\\n| extend RoleAssignmentDelegationType = iff(CmdletResultValue.RoleAssignmentDelegationType ==\\\"6\\\" , \\\"Delegating\\\", \\\"Regular\\\") \\r\\n| extend RoleAssigneeName = iff( RoleAssigneeType == \\\"User\\\", strcat(\\\"🧑‍🦰 \\\",tostring(CmdletResultValue.RoleAssigneeName)), strcat(\\\"👪 \\\", tostring(CmdletResultValue.RoleAssigneeName)) )\\r\\n| project RoleAssigneeName, RoleAssigneeType, Status,CustomRecipientWriteScope, CustomConfigWriteScope, RecipientWriteScope, ConfigWriteScope, ConfigReadScope, RecipientReadScope, ManagementRoleAssignement, RoleAssignmentDelegationType, WhenCreated, WhenChanged\",\"size\":1,\"showAnalytics\":true,\"showExportToExcel\":true,\"queryType\":0,\"resourceType\":\"microsoft.operationalinsights/workspaces\",\"gridSettings\":{\"rowLimit\":10000,\"filter\":true,\"sortBy\":[{\"itemKey\":\"ConfigWriteScope\",\"sortOrder\":1}]},\"sortBy\":[{\"itemKey\":\"ConfigWriteScope\",\"sortOrder\":1}]},\"name\":\"query - 1\",\"styleSettings\":{\"showBorder\":true}}]},\"name\":\"Mailbox Search Role\"},{\"type\":12,\"content\":{\"version\":\"NotebookGroup/1.0\",\"groupType\":\"editable\",\"title\":\"ReceiveAs/SendAs Extended Right on databases\",\"items\":[{\"type\":1,\"content\":{\"json\":\"These are delegations at the database level.\\r\\n\\r\\n**Receive As Extended Right on database's objects in the Configuration**\\r\\n\\r\\nWhen an account has **ReceiveAs** permissions on a database's object, it can open and view the content of any mailboxes on that database.\\r\\n\\r\\nHelp for Receive As Permission\\r\\n\\r\\n\\r\\nℹ️ Recommendations\\r\\n\\r\\nDo not set this permission on databases. When an application requires this permission, ensure that the application account’s password is well protected and known by a very limited number of person.Change the password as often as possible.\\r\\n\\r\\n**Send As Extended Right on database objects in the Configuration**\\r\\n\\r\\n\\r\\nWhen an account has **SendAs** permissions on a database's object, it can send messages from all the mailboxes contained in this database. The messages that are sent from a mailbox will appear as if the mailbox owner sent them.\\r\\n\\r\\nHelp for Send As Permission\\r\\n\\r\\n\\r\\nℹ️ Recommendations\\r\\n\\r\\nDo not set this permission on databases. When an application requires this permission, ensure that the application account’s password is well protected and known by a very limited number of person.Change the password as often as possible.\\r\\n\",\"style\":\"info\"},\"conditionalVisibility\":{\"parameterName\":\"Help\",\"comparison\":\"isEqualTo\",\"value\":\"Yes\"},\"name\":\"SendAsHelp\"},{\"type\":3,\"content\":{\"version\":\"KqlItem/1.0\",\"query\":\"ExchangeConfiguration(SpecificSectionList=\\\"MailboxDatabaseReceiveAs\\\",SpecificConfigurationDate=\\\"{DateOfConfiguration:value}\\\",SpecificConfigurationEnv={EnvironmentList},Target = \\\"On-Premises\\\")\\r\\n| union ExchangeConfiguration(SpecificSectionList=\\\"MailboxDatabaseSendAs\\\",SpecificConfigurationDate=\\\"{DateOfConfiguration:value}\\\",SpecificConfigurationEnv={EnvironmentList},Target = \\\"On-Premises\\\")\\r\\n| where CmdletResultValue <> \\\"{'Error':'EmptyResult'}\\\"\\r\\n| summarize dcount(tostring(CmdletResultValue.UserString)) by iff( tostring(Section) contains \\\"MailboxDatabaseReceiveAs\\\",\\\"ReceiveAs Unique Acct\\\",\\\"SendAs Unique Acct\\\")\",\"size\":1,\"showAnalytics\":true,\"title\":\"Number of accounts with ReceiveAs/SendAs delegations\",\"showExportToExcel\":true,\"queryType\":0,\"resourceType\":\"microsoft.operationalinsights/workspaces\",\"visualization\":\"tiles\",\"tileSettings\":{\"titleContent\":{\"columnMatch\":\"Column1\",\"formatter\":1},\"leftContent\":{\"columnMatch\":\"dcount_CmdletResultValue_UserString\",\"formatter\":12,\"formatOptions\":{\"palette\":\"auto\"},\"numberFormat\":{\"unit\":17,\"options\":{\"style\":\"decimal\",\"maximumFractionDigits\":2,\"maximumSignificantDigits\":3}}},\"showBorder\":true,\"sortCriteriaField\":\"Column1\",\"sortOrderField\":1}},\"customWidth\":\"50\",\"name\":\"ReceiveAsUsersTiles\"},{\"type\":3,\"content\":{\"version\":\"KqlItem/1.0\",\"query\":\"ExchangeConfiguration(SpecificSectionList=\\\"MailboxDatabaseReceiveAs\\\",SpecificConfigurationDate=\\\"{DateOfConfiguration:value}\\\",SpecificConfigurationEnv={EnvironmentList},Target = \\\"On-Premises\\\")\\r\\n| union ExchangeConfiguration(SpecificSectionList=\\\"MailboxDatabaseSendAs\\\",SpecificConfigurationDate=\\\"{DateOfConfiguration:value}\\\",SpecificConfigurationEnv={EnvironmentList},Target = \\\"On-Premises\\\")\\r\\n| where CmdletResultValue <> \\\"{'Error':'EmptyResult'}\\\"\\r\\n| summarize dcount(tostring(CmdletResultValue.Identity.Name)) by iff( tostring(Section) contains \\\"MailboxDatabaseReceiveAs\\\",\\\"ReceiveAs Unique DB\\\",\\\"SendAs Unique DB\\\")\",\"size\":1,\"showAnalytics\":true,\"title\":\"ReceiveAs/SendAs database delegations\",\"color\":\"purple\",\"showExportToExcel\":true,\"queryType\":0,\"resourceType\":\"microsoft.operationalinsights/workspaces\",\"visualization\":\"tiles\",\"tileSettings\":{\"titleContent\":{\"columnMatch\":\"Column1\",\"formatter\":1},\"leftContent\":{\"columnMatch\":\"dcount_CmdletResultValue_Identity_Name\",\"formatter\":12,\"formatOptions\":{\"palette\":\"auto\"},\"numberFormat\":{\"unit\":17,\"options\":{\"style\":\"decimal\",\"maximumFractionDigits\":2,\"maximumSignificantDigits\":3}}},\"showBorder\":true,\"sortCriteriaField\":\"Column1\",\"sortOrderField\":1}},\"customWidth\":\"50\",\"name\":\"ReceiveAsTiles\",\"styleSettings\":{\"margin\":\"25\"}},{\"type\":3,\"content\":{\"version\":\"KqlItem/1.0\",\"query\":\"ExchangeConfiguration(SpecificSectionList=\\\"MailboxDatabaseReceiveAs\\\",SpecificConfigurationDate=\\\"{DateOfConfiguration:value}\\\",SpecificConfigurationEnv={EnvironmentList},Target = \\\"On-Premises\\\")\\r\\n| project CmdletResultValue\\r\\n| where CmdletResultValue <> \\\"{'Error':'EmptyResult'}\\\"\\r\\n| extend Account = tostring(CmdletResultValue.UserString)\\r\\n| extend DatabaseName = tostring(CmdletResultValue.Identity.Name)\\r\\n| summarize Count =count() by Account,DatabaseName\\r\\n| project Account,Count,DatabaseName\\r\\n\",\"size\":1,\"showAnalytics\":true,\"title\":\"ReceiveAs Extended Right on databases\",\"noDataMessage\":\"No Receive-As delegation\",\"noDataMessageStyle\":3,\"showExportToExcel\":true,\"queryType\":0,\"resourceType\":\"microsoft.operationalinsights/workspaces\",\"gridSettings\":{\"formatters\":[{\"columnMatch\":\"Account\",\"formatter\":5},{\"columnMatch\":\"Count\",\"formatter\":8,\"formatOptions\":{\"palette\":\"blue\",\"aggregation\":\"Sum\"}}],\"rowLimit\":10000,\"filter\":true,\"hierarchySettings\":{\"treeType\":1,\"groupBy\":[\"Account\"],\"finalBy\":\"Account\"},\"sortBy\":[{\"itemKey\":\"$gen_count_$gen_group_0\",\"sortOrder\":1}],\"labelSettings\":[{\"columnId\":\"Account\",\"comment\":\"Account and the number of databases on which it has delegation \"}]},\"sortBy\":[{\"itemKey\":\"$gen_count_$gen_group_0\",\"sortOrder\":1}]},\"customWidth\":\"50\",\"name\":\"MailboxDatabaseReceiveAsGrid\",\"styleSettings\":{\"showBorder\":true}},{\"type\":3,\"content\":{\"version\":\"KqlItem/1.0\",\"query\":\"ExchangeConfiguration(SpecificSectionList=\\\"MailboxDatabaseSendAs\\\",SpecificConfigurationDate=\\\"{DateOfConfiguration:value}\\\",SpecificConfigurationEnv={EnvironmentList},Target = \\\"On-Premises\\\")\\r\\n| project CmdletResultValue\\r\\n| where CmdletResultValue <> \\\"{'Error':'EmptyResult'}\\\"\\r\\n| extend Account = tostring(CmdletResultValue.UserString)\\r\\n| extend DatabaseName = tostring(CmdletResultValue.Identity.Name)\\r\\n| summarize Count =count() by Account, DatabaseName\\r\\n| project Account, Count, DatabaseName\",\"size\":1,\"showAnalytics\":true,\"title\":\"SendAs Extended Right on databases\",\"noDataMessage\":\"No Send-As delegation\",\"noDataMessageStyle\":3,\"showExportToExcel\":true,\"queryType\":0,\"resourceType\":\"microsoft.operationalinsights/workspaces\",\"gridSettings\":{\"formatters\":[{\"columnMatch\":\"Account\",\"formatter\":5},{\"columnMatch\":\"Count\",\"formatter\":8,\"formatOptions\":{\"palette\":\"blue\",\"aggregation\":\"Sum\",\"compositeBarSettings\":{\"labelText\":\"\"}}}],\"rowLimit\":10000,\"filter\":true,\"hierarchySettings\":{\"treeType\":1,\"groupBy\":[\"Account\"],\"finalBy\":\"Account\"},\"labelSettings\":[{\"columnId\":\"Account\",\"comment\":\"Account and the number of databases on which it has delegation \"}]}},\"customWidth\":\"50\",\"name\":\"MailboxDatabaseSendAsGrid\",\"styleSettings\":{\"showBorder\":true}}]},\"name\":\"ReceiveSendAs\"}]},\"conditionalVisibility\":{\"parameterName\":\"selected\",\"comparison\":\"isEqualTo\",\"value\":\"Delegation\"},\"name\":\"Importantsecurityconfiguration\"},{\"type\":12,\"content\":{\"version\":\"NotebookGroup/1.0\",\"groupType\":\"editable\",\"title\":\"Local Administrators\",\"items\":[{\"type\":1,\"content\":{\"json\":\"The following section will display the content of the local Administrators group for each server\\r\\n\\r\\n** When content refer to groups from other forests, none or partial information will be displayed and the number of Administrators may be inconsistent. **\\r\\n\\r\\nMost of the sections display the same information but with differents sorting, displays...\"},\"name\":\"text - 12\"},{\"type\":1,\"content\":{\"json\":\"Only Exchange administrators should be members of the local Administrators group of Exchange servers.\\r\\n\\r\\nYou need to review the content of the local Administrators group on a regular basis.\\r\\n\\r\\nIt is considered a high security risk to have a discrepancy of members between the servers. \\r\\n\\r\\nIt is not recommended to have more than one local administrator accounts. Furthermore, the password should be unique on each server and regularly changed. A solution like LAPS could be used to manage the local administrator password.\\r\\n\\r\\nOnly Exchange administrators should be able to logon on Exchange servers.\\r\\n\\r\\nHere the default content of the local Administrators group for an Exchange server \\r\\n:\\r\\n- Administrator (this account can be renamed)\\r\\n- Domain Admins\\r\\n- Exchange Trusted Subsystem\\r\\n- Organization Management\\r\\n\\r\\n**Service accounts should not be members of the local Administrators group**. If it is necessary, you need to ensure that the account is dedicated to Exchange. If the service account opens sessions on other servers, it can be used for lateral movements. \\r\\n\",\"style\":\"info\"},\"conditionalVisibility\":{\"parameterName\":\"Help\",\"comparison\":\"isEqualTo\",\"value\":\"Yes\"},\"name\":\"LocalAdminsHelp\"},{\"type\":9,\"content\":{\"version\":\"KqlParameterItem/1.0\",\"parameters\":[{\"id\":\"dfffbaa4-5888-41c2-b039-dafb6110260c\",\"version\":\"KqlParameterItem/1.0\",\"name\":\"Limited\",\"type\":10,\"isRequired\":true,\"typeSettings\":{\"showDefault\":false},\"jsonData\":\"[{ \\\"value\\\": \\\"True\\\", \\\"label\\\": \\\"Yes\\\" },\\r\\n { \\\"value\\\": \\\"True,False\\\", \\\"label\\\": \\\"No\\\", \\\"selected\\\":true }\\r\\n]\"}],\"style\":\"pills\",\"queryType\":0,\"resourceType\":\"microsoft.operationalinsights/workspaces\"},\"name\":\"parameters - 7\"},{\"type\":1,\"content\":{\"json\":\"**Top 10 servers with high number of unique local Administrators members**\"},\"name\":\"text - 13\"},{\"type\":3,\"content\":{\"version\":\"KqlItem/1.0\",\"query\":\"let StandardGroup = dynamic([\\\"Administrator\\\", \\\"Domain Admins\\\",\\\"Exchange Trusted Subsystem\\\",\\\"Organization Management\\\", \\\"Admins du domaine\\\"]);\\r\\nExchangeConfiguration(SpecificSectionList=\\\"LocalAminGroup\\\",SpecificConfigurationDate=\\\"{DateOfConfiguration:value}\\\",SpecificConfigurationEnv={EnvironmentList},Target = \\\"On-Premises\\\")\\r\\n| where CmdletResultValue.Level != 0\\r\\n| where not (CmdletResultValue.MemberPath has_any (StandardGroup)) in ({Limited})\\r\\n| project CmdletResultValue\\r\\n| extend Parentgroup = trim_end(@'\\\\\\\\Local Administrators',tostring(CmdletResultValue.Parentgroup))\\r\\n| extend MemberPath = tostring(CmdletResultValue.MemberPath)\\r\\n| extend ObjectClass = tostring(CmdletResultValue.ObjectClass)\\r\\n| where ObjectClass !contains \\\"group\\\"\\r\\n| summarize dcount(MemberPath) by Parentgroup\\r\\n| top 10 by dcount_MemberPath\\r\\n| sort by dcount_MemberPath\",\"size\":4,\"queryType\":0,\"resourceType\":\"microsoft.operationalinsights/workspaces\",\"visualization\":\"tiles\",\"tileSettings\":{\"titleContent\":{\"columnMatch\":\"Parentgroup\",\"formatter\":1},\"leftContent\":{\"columnMatch\":\"dcount_MemberPath\",\"formatter\":12,\"formatOptions\":{\"palette\":\"auto\"},\"numberFormat\":{\"unit\":17,\"options\":{\"style\":\"decimal\",\"maximumFractionDigits\":2,\"maximumSignificantDigits\":3}}},\"showBorder\":false}},\"name\":\"query - 9\"},{\"type\":12,\"content\":{\"version\":\"NotebookGroup/1.0\",\"groupType\":\"editable\",\"title\":\"Click to see number of unique members for all servers\",\"expandable\":true,\"items\":[{\"type\":1,\"content\":{\"json\":\"Number of unique members for all servers\"},\"name\":\"text - 0\"},{\"type\":3,\"content\":{\"version\":\"KqlItem/1.0\",\"query\":\"let StandardGroup = dynamic([\\\"Administrator\\\", \\\"Domain Admins\\\",\\\"Exchange Trusted Subsystem\\\",\\\"Organization Management\\\", \\\"Admins du domaine\\\"]);\\r\\nExchangeConfiguration(SpecificSectionList=\\\"LocalAminGroup\\\",SpecificConfigurationDate=\\\"{DateOfConfiguration:value}\\\",SpecificConfigurationEnv={EnvironmentList},Target = \\\"On-Premises\\\")\\r\\n| where CmdletResultValue.Level != 0\\r\\n| where not (CmdletResultValue.MemberPath has_any (StandardGroup)) in ({Limited})\\r\\n| project CmdletResultValue\\r\\n| extend Parentgroup = trim_end(@'\\\\\\\\Local Administrators',tostring(CmdletResultValue.Parentgroup))\\r\\n| extend MemberPath = tostring(CmdletResultValue.MemberPath)\\r\\n| extend ObjectClass = tostring(CmdletResultValue.ObjectClass)\\r\\n| where ObjectClass !contains \\\"group\\\"\\r\\n| summarize dcount(MemberPath) by Parentgroup\\r\\n| sort by dcount_MemberPath\",\"size\":4,\"queryType\":0,\"resourceType\":\"microsoft.operationalinsights/workspaces\",\"visualization\":\"tiles\",\"tileSettings\":{\"titleContent\":{\"columnMatch\":\"Parentgroup\",\"formatter\":1},\"leftContent\":{\"columnMatch\":\"dcount_MemberPath\",\"formatter\":12,\"formatOptions\":{\"palette\":\"auto\"},\"numberFormat\":{\"unit\":17,\"options\":{\"style\":\"decimal\",\"maximumFractionDigits\":2,\"maximumSignificantDigits\":3}}},\"showBorder\":false}},\"name\":\"query - 9 - Copy\"}]},\"name\":\"All servers number of members\"},{\"type\":3,\"content\":{\"version\":\"KqlItem/1.0\",\"query\":\"let allsrv = ExchangeConfiguration(SpecificSectionList=\\\"ExchangeServers\\\", SpecificConfigurationDate=\\\"{DateOfConfiguration:value}\\\",SpecificConfigurationEnv={EnvironmentList}, Target = \\\"On-Premises\\\") | where \\r\\nCmdletResultValue.IsMailboxServer== true | extend Name=tostring(CmdletResultValue.Name);\\r\\nExchangeConfiguration(SpecificSectionList=\\\"LocalAminGroup\\\", SpecificConfigurationDate=\\\"{DateOfConfiguration:value}\\\",SpecificConfigurationEnv={EnvironmentList}, Target = \\\"On-Premises\\\") \\r\\n| where CmdletResultValue.Level == 1\\r\\n| project CmdletResultValue\\r\\n| extend MemberPath = tostring(CmdletResultValue.MemberPath)\\r\\n| extend Name = tostring(trim_end(@'\\\\\\\\Local Administrators', tostring(CmdletResultValue.Parentgroup)))\\r\\n| distinct Name\\r\\n| project Name\\r\\n| join kind=rightanti (allsrv) on Name\\r\\n| project CmdletResultValue.Name\",\"size\":4,\"title\":\"Servers not reachable\",\"noDataMessage\":\"All server were successfully analyzed\",\"noDataMessageStyle\":3,\"queryType\":0,\"resourceType\":\"microsoft.operationalinsights/workspaces\",\"visualization\":\"tiles\",\"tileSettings\":{\"titleContent\":{\"columnMatch\":\"CmdletResultValue_Name\",\"formatter\":1,\"numberFormat\":{\"unit\":0,\"options\":{\"style\":\"decimal\"}}},\"showBorder\":true}},\"name\":\"query - 9 - Copy\"},{\"type\":3,\"content\":{\"version\":\"KqlItem/1.0\",\"query\":\"ExchangeConfiguration(SpecificSectionList=\\\"ExchangeServers\\\", SpecificConfigurationDate=\\\"{DateOfConfiguration:value}\\\",SpecificConfigurationEnv={EnvironmentList}, Target = \\\"On-Premises\\\")\\r\\n| where CmdletResultValue.ServerRole <> 64\\r\\n| count\\r\\n\",\"size\":4,\"title\":\"Number of servers\",\"queryType\":0,\"resourceType\":\"microsoft.operationalinsights/workspaces\",\"visualization\":\"tiles\",\"tileSettings\":{\"titleContent\":{\"columnMatch\":\"Count\",\"formatter\":1,\"numberFormat\":{\"unit\":0,\"options\":{\"style\":\"decimal\"}}},\"showBorder\":false}},\"customWidth\":\"50\",\"name\":\"query - 9 - Copy - Copy\"},{\"type\":3,\"content\":{\"version\":\"KqlItem/1.0\",\"query\":\"ExchangeConfiguration(SpecificSectionList=\\\"LocalAminGroup\\\", SpecificConfigurationDate=\\\"{DateOfConfiguration:value}\\\",SpecificConfigurationEnv={EnvironmentList}, Target = \\\"On-Premises\\\")\\r\\n| where CmdletResultValue.Level == 1\\r\\n| project CmdletResultValue\\r\\n| extend MemberPath = tostring(CmdletResultValue.MemberPath)\\r\\n| extend Parentgroup = trim_end(@'\\\\\\\\Local Administrators', tostring(CmdletResultValue.Parentgroup))\\r\\n| distinct Parentgroup = Parentgroup\\r\\n| count \",\"size\":4,\"title\":\"Number of Analyzed servers\",\"queryType\":0,\"resourceType\":\"microsoft.operationalinsights/workspaces\",\"visualization\":\"tiles\",\"tileSettings\":{\"titleContent\":{\"columnMatch\":\"Count\",\"formatter\":1,\"numberFormat\":{\"unit\":0,\"options\":{\"style\":\"decimal\"}}},\"showBorder\":false}},\"customWidth\":\"50\",\"name\":\"query - 9 - Copy - Copy - Copy\"},{\"type\":1,\"content\":{\"json\":\"This view shows each nonstandard user account that is member (directly or by a group) of the local Administrators group per server.\\r\\n\\r\\nConsider reviewing:\\r\\n- **nonstandard members** the Memberpath help to understand from which group the user comprised\\r\\n- **inconsistent memebrs** across servers\\r\\n\\r\\nNote that content from Trusted forests might not be displayed. \",\"style\":\"info\"},\"conditionalVisibility\":{\"parameterName\":\"Help\",\"comparison\":\"isEqualTo\",\"value\":\"Yes\"},\"name\":\"LocalAdminPerServersHelp\"},{\"type\":3,\"content\":{\"version\":\"KqlItem/1.0\",\"query\":\"let StandardGroup = dynamic([\\\"Administrator\\\", \\\"Domain Admins\\\",\\\"Exchange Trusted Subsystem\\\",\\\"Organization Management\\\", \\\"Admins du domaine\\\"]);\\r\\nExchangeConfiguration(SpecificSectionList=\\\"LocalAminGroup\\\",SpecificConfigurationDate=\\\"{DateOfConfiguration:value}\\\",SpecificConfigurationEnv={EnvironmentList},Target = \\\"On-Premises\\\")\\r\\n| where CmdletResultValue.Level != 0 \\r\\n| where not (CmdletResultValue.MemberPath has_any (StandardGroup))\\r\\n| project CmdletResultValue\\r\\n| extend Parentgroup = trim_end(@'\\\\\\\\Local Administrators',tostring(CmdletResultValue.Parentgroup))\\r\\n| extend MemberPath = tostring(CmdletResultValue.MemberPath)\\r\\n| extend Level = tostring(CmdletResultValue.Level)\\r\\n| extend ObjectClass = tostring(CmdletResultValue.ObjectClass)\\r\\n| extend LastLogon = tostring(CmdletResultValue.LastLogonString)\\r\\n| extend LastPwdSet = tostring(CmdletResultValue.LastPwdSetString)\\r\\n| extend Enabled = tostring(CmdletResultValue.Enabled)\\r\\n| extend DN = tostring(CmdletResultValue.DN)\\r\\n| summarize Count=count() by MemberPath,Parentgroup,Level,ObjectClass,LastLogon,LastPwdSet,Enabled,DN\\r\\n| project Parentgroup = strcat(\\\"💻 \\\",Parentgroup),Count,MemberPath,Level,ObjectClass,LastLogon,LastPwdSet,Enabled,DN\\r\\n| sort by Parentgroup asc \",\"size\":1,\"showAnalytics\":true,\"title\":\" Total Non standard Groups and accounts including nested groups\",\"showExportToExcel\":true,\"queryType\":0,\"resourceType\":\"microsoft.operationalinsights/workspaces\",\"gridSettings\":{\"formatters\":[{\"columnMatch\":\"Parentgroup\",\"formatter\":5,\"formatOptions\":{\"aggregation\":\"Count\"}},{\"columnMatch\":\"Count\",\"formatter\":4,\"formatOptions\":{\"palette\":\"blue\",\"aggregation\":\"Sum\"}}],\"rowLimit\":10000,\"filter\":true,\"hierarchySettings\":{\"treeType\":1,\"groupBy\":[\"Parentgroup\"],\"finalBy\":\"Parentgroup\"},\"sortBy\":[{\"itemKey\":\"MemberPath\",\"sortOrder\":1}],\"labelSettings\":[{\"columnId\":\"Parentgroup\",\"label\":\"Server\"}]},\"sortBy\":[{\"itemKey\":\"MemberPath\",\"sortOrder\":1}]},\"name\":\"LocalAdminPerServers\",\"styleSettings\":{\"showBorder\":true}},{\"type\":3,\"content\":{\"version\":\"KqlItem/1.0\",\"query\":\"let StandardGroup = dynamic([\\\"Administrator\\\", \\\"Domain Admins\\\",\\\"Exchange Trusted Subsystem\\\",\\\"Organization Management\\\", \\\"Admins du domaine\\\"]);\\r\\nExchangeConfiguration(SpecificSectionList=\\\"LocalAminGroup\\\",SpecificConfigurationDate=\\\"{DateOfConfiguration:value}\\\",SpecificConfigurationEnv={EnvironmentList},Target = \\\"On-Premises\\\")\\r\\n| where CmdletResultValue.Level == 1\\r\\n| where not (CmdletResultValue.MemberPath has_any (StandardGroup))\\r\\n| project CmdletResultValue\\r\\n| extend Parentgroup = trim_end(@'\\\\\\\\Local Administrators',tostring(CmdletResultValue.Parentgroup))\\r\\n| extend ObjectClass = tostring(CmdletResultValue.ObjectClass)\\r\\n| extend MemberPath = tostring(CmdletResultValue.MemberPath)\\r\\n| extend MemberPath = case( ObjectClass == \\\"group\\\", strcat( \\\"👪 \\\", MemberPath), ObjectClass == \\\"computer\\\", strcat( \\\"💻 \\\", MemberPath), strcat( \\\"🧑‍🦰 \\\", MemberPath) )\\r\\n| project-away CmdletResultValue\\r\\n//| summarize Count=count(), Servers=make_set(Parentgroup) by MemberPath\\r\\n| summarize Count=count() by MemberPath,Parentgroup \\r\\n| sort by Count desc\",\"size\":1,\"showAnalytics\":true,\"title\":\"Non Standard accounts summary\",\"showExportToExcel\":true,\"queryType\":0,\"resourceType\":\"microsoft.operationalinsights/workspaces\",\"gridSettings\":{\"formatters\":[{\"columnMatch\":\"Group\",\"formatter\":1},{\"columnMatch\":\"MemberPath\",\"formatter\":5},{\"columnMatch\":\"Count\",\"formatter\":4,\"formatOptions\":{\"palette\":\"blue\"}},{\"columnMatch\":\"Member\",\"formatter\":1}],\"rowLimit\":10000,\"filter\":true,\"hierarchySettings\":{\"treeType\":1,\"groupBy\":[\"MemberPath\"],\"expandTopLevel\":false},\"labelSettings\":[{\"columnId\":\"MemberPath\",\"label\":\"MemberPath\"},{\"columnId\":\"Parentgroup\",\"label\":\"Servers\"},{\"columnId\":\"Count\",\"label\":\"Nb Servers\"}]}},\"name\":\"LocalAdminCount\",\"styleSettings\":{\"showBorder\":true}},{\"type\":1,\"content\":{\"json\":\"##### Select a server to display its content\\r\\n\\r\\nBy default only the non-standard members are displayed. \\r\\n\\r\\n❌ : for last logon displayed when user logged or the last logon is greater than 180 days\\r\\n\\r\\n❌ : for password last set displayed when last password set greater than 365 days\"},\"name\":\"text - 0\"},{\"type\":9,\"content\":{\"version\":\"KqlParameterItem/1.0\",\"parameters\":[{\"id\":\"19e606d9-7f3e-4d2f-a314-892da571e50a\",\"version\":\"KqlParameterItem/1.0\",\"name\":\"Server\",\"type\":2,\"query\":\"ExchangeConfiguration(SpecificSectionList=\\\"LocalAminGroup\\\", SpecificConfigurationDate=\\\"{DateOfConfiguration:value}\\\",SpecificConfigurationEnv={EnvironmentList}, Target = \\\"On-Premises\\\")\\r\\n| where CmdletResultValue.Level == 1\\r\\n| project CmdletResultValue\\r\\n| extend MemberPath = tostring(CmdletResultValue.MemberPath)\\r\\n| extend Parentgroup = trim_end(@'\\\\\\\\Local Administrators', tostring(CmdletResultValue.Parentgroup))\\r\\n| distinct Parentgroup = Parentgroup\",\"typeSettings\":{\"showDefault\":false},\"queryType\":0,\"resourceType\":\"microsoft.operationalinsights/workspaces\"},{\"id\":\"05ef4f1c-4cf4-406f-9fb2-9ee30dc93abd\",\"version\":\"KqlParameterItem/1.0\",\"name\":\"Limited\",\"label\":\"Show only nonstandard members\",\"type\":10,\"description\":\"Show only non standard members\",\"isRequired\":true,\"typeSettings\":{\"showDefault\":false},\"jsonData\":\"[{ \\\"value\\\": \\\"True\\\", \\\"label\\\": \\\"Yes\\\" },\\r\\n { \\\"value\\\": \\\"True,False\\\", \\\"label\\\": \\\"No\\\", \\\"selected\\\":true }\\r\\n]\",\"value\":\"True\"},{\"id\":\"901bf975-426f-486b-82de-ff0d64f139bb\",\"version\":\"KqlParameterItem/1.0\",\"name\":\"LastLogon\",\"label\":\"Last Logon\",\"type\":10,\"isRequired\":true,\"typeSettings\":{\"showDefault\":false},\"jsonData\":\"[ {\\\"value\\\": \\\"0d\\\", \\\"label\\\": \\\"No filter\\\",\\\"selected\\\":true},\\r\\n{ \\\"value\\\": \\\"90d\\\", \\\"label\\\": \\\"90d\\\" },\\r\\n { \\\"value\\\": \\\"180d\\\", \\\"label\\\": \\\"6m\\\" },\\r\\n { \\\"value\\\": \\\"365d\\\", \\\"label\\\": \\\"1y\\\" },\\r\\n{ \\\"value\\\": \\\"730d\\\", \\\"label\\\": \\\"2y\\\" },\\r\\n{ \\\"value\\\": \\\"1085d\\\", \\\"label\\\": \\\"3y\\\" },\\r\\n{ \\\"value\\\": \\\"1097d\\\", \\\"label\\\": \\\"more than 3y\\\"},\\r\\n{ \\\"value\\\": \\\"3650d\\\", \\\"label\\\": \\\"more than 10y\\\"}\\r\\n]\"},{\"id\":\"2f7a613f-8749-44c9-b8be-844964badef8\",\"version\":\"KqlParameterItem/1.0\",\"name\":\"PasswordLast\",\"label\":\"Password Last Set\",\"type\":10,\"isRequired\":true,\"typeSettings\":{\"showDefault\":false},\"jsonData\":\"[{ \\\"value\\\": \\\"0d\\\", \\\"label\\\": \\\"No filter\\\",\\\"selected\\\":true },\\r\\n { \\\"value\\\": \\\"365d\\\", \\\"label\\\": \\\"1y\\\" },\\r\\n{ \\\"value\\\": \\\"730d\\\", \\\"label\\\": \\\"2y\\\" },\\r\\n{ \\\"value\\\": \\\"1095d\\\", \\\"label\\\": \\\"3y\\\" },\\r\\n{ \\\"value\\\": \\\"1097d\\\", \\\"label\\\": \\\"more than 3y\\\"},\\r\\n{ \\\"value\\\": \\\"3650d\\\", \\\"label\\\": \\\"more than 10y\\\"}\\r\\n]\"}],\"style\":\"pills\",\"queryType\":0,\"resourceType\":\"microsoft.operationalinsights/workspaces\"},\"name\":\"parameters - 1\"},{\"type\":3,\"content\":{\"version\":\"KqlItem/1.0\",\"query\":\"let StandardGroup = dynamic([\\\"Administrator\\\", \\\"Domain Admins\\\",\\\"Exchange Trusted Subsystem\\\",\\\"Organization Management\\\", \\\"Admins du domaine\\\"]);\\r\\nExchangeConfiguration(SpecificSectionList=\\\"LocalAminGroup\\\",SpecificConfigurationDate=\\\"{DateOfConfiguration:value}\\\",SpecificConfigurationEnv={EnvironmentList},Target = \\\"On-Premises\\\")\\r\\n| where CmdletResultValue.Level != 0 \\r\\n| where CmdletResultValue.Parentgroup contains \\\"{Server}\\\"\\r\\n| where not (CmdletResultValue.MemberPath has_any (StandardGroup)) in ({Limited})\\r\\n| where todatetime (CmdletResultValue.LastPwdSetString) < ago({PasswordLast}) or tostring (CmdletResultValue.LastPwdSetString) == \\\"\\\"\\r\\n| where todatetime (CmdletResultValue.LastLogonString) < ago({LastLogon}) or tostring (CmdletResultValue.LastLogonString) == \\\"\\\"\\r\\n| project CmdletResultValue\\r\\n| extend Parentgroup = trim_end(@'\\\\\\\\Local Administrators',tostring(CmdletResultValue.Parentgroup))\\r\\n| extend MemberPath = tostring(CmdletResultValue.MemberPath)\\r\\n| extend Level = tostring(CmdletResultValue.Level)\\r\\n| extend ObjectClass = tostring(CmdletResultValue.ObjectClass)\\r\\n| extend LastLogon = tostring(CmdletResultValue.LastLogonString)\\r\\n| extend LastLogon = iif(ObjectClass==\\\"group\\\" or ObjectClass==\\\"computer\\\" or ObjectClass==\\\"Local User\\\" or ObjectClass==\\\"computer\\\",\\\"N/A\\\",iif ( todatetime (CmdletResultValue.LastLogonString) > ago(180d), CmdletResultValue.LastLogonString,iff (LastLogon==\\\"\\\", \\\"❌ Never logged\\\",strcat(\\\"❌\\\",LastLogon))))\\r\\n| extend LastPwdSet = CmdletResultValue.LastPwdSetString\\r\\n| extend LastPwdSet = iif(ObjectClass==\\\"group\\\" or ObjectClass==\\\"computer\\\" or ObjectClass==\\\"Local User\\\" or ObjectClass==\\\"computer\\\",\\\"N/A\\\",iif ( todatetime (CmdletResultValue.LastPwdSetString) > ago(365d), CmdletResultValue.LastPwdSetString,iff (LastPwdSet==\\\"\\\", \\\"❌ Password never set\\\",strcat(\\\"❌\\\",LastPwdSet))))\\r\\n | extend Enabled = tostring(CmdletResultValue.Enabled)\\r\\n| extend DN = tostring(CmdletResultValue.DN)\\r\\n| project-away CmdletResultValue\\r\\n| sort by MemberPath asc\\r\\n| project-away Parentgroup\",\"size\":1,\"showAnalytics\":true,\"title\":\"Local Administrators group content\",\"showExportToExcel\":true,\"queryType\":0,\"resourceType\":\"microsoft.operationalinsights/workspaces\",\"gridSettings\":{\"rowLimit\":10000,\"filter\":true,\"sortBy\":[{\"itemKey\":\"MemberPath\",\"sortOrder\":1}]},\"sortBy\":[{\"itemKey\":\"MemberPath\",\"sortOrder\":1}]},\"conditionalVisibility\":{\"parameterName\":\"Server\",\"comparison\":\"isNotEqualTo\",\"value\":\"\"},\"name\":\"AdGroups\",\"styleSettings\":{\"showBorder\":true}}]},\"conditionalVisibility\":{\"parameterName\":\"selected\",\"comparison\":\"isEqualTo\",\"value\":\"Server\"},\"name\":\"Local Administrators\"},{\"type\":12,\"content\":{\"version\":\"NotebookGroup/1.0\",\"groupType\":\"editable\",\"title\":\"Exchange and AD GRoup\",\"items\":[{\"type\":1,\"content\":{\"json\":\"This tab displays the content of high privilege groups in Exchange and AD.\"},\"name\":\"text - 7\"},{\"type\":1,\"content\":{\"json\":\"The **Exchange Trusted Subsystem** group is one the two most sensistive groups in Exchange. This group has all privileges in Exchange and very high privileges in AD.\\r\\n\\r\\nExchange 2013 deployment permissions reference\\r\\n\\r\\nThis group should only contains computer accounts for each Exchange servers. When the DAG has an IP and a CNO, it is acceptable to have the DAG's computer account.\\r\\n\\r\\nThis section only shows direct nonstandard members.\",\"style\":\"info\"},\"customWidth\":\"50\",\"conditionalVisibility\":{\"parameterName\":\"Help\",\"comparison\":\"isEqualTo\",\"value\":\"Yes\"},\"name\":\"ExchangeTrustedSubsystemHelp\"},{\"type\":1,\"content\":{\"json\":\"The **Exchange Windows Permissions** group is one the two most sensistive groups in Exchange. This group has very high privileges in AD.\\r\\n\\r\\nExchange 2013 deployment permissions reference\\r\\n\\r\\nThis group should only contains the group Exchange Trusted SubSystem. This section only shows direct nonstandard members. \",\"style\":\"info\"},\"customWidth\":\"50\",\"conditionalVisibility\":{\"parameterName\":\"Help\",\"comparison\":\"isEqualTo\",\"value\":\"Yes\"},\"name\":\"WindowsPermissionGroupTileHelp\"},{\"type\":3,\"content\":{\"version\":\"KqlItem/1.0\",\"query\":\"let ETSValidcontent = union kind=outer (ExchangeConfiguration(SpecificSectionList=\\\"ExchangeServers\\\",SpecificConfigurationDate=\\\"{DateOfConfiguration:value}\\\",SpecificConfigurationEnv={EnvironmentList},Target = \\\"On-Premises\\\")| project Name = tostring(CmdletResultValue.Name)), (ExchangeConfiguration(SpecificSectionList=\\\"DAG\\\",SpecificConfigurationDate=\\\"{DateOfConfiguration:value}\\\",SpecificConfigurationEnv={EnvironmentList},Target = \\\"On-Premises\\\")| project Name = tostring(Identity));\\r\\nExchangeConfiguration(SpecificSectionList=\\\"ETS\\\",SpecificConfigurationDate=\\\"{DateOfConfiguration:value}\\\",SpecificConfigurationEnv={EnvironmentList},Target = \\\"On-Premises\\\")\\r\\n| where CmdletResultValue.Name !in (ETSValidcontent)\\r\\n| summarize MyCount=countif( CmdletResultType == \\\"Success\\\") by CmdletResultType\\r\\n| project Result = iff ( CmdletResultType == \\\"Success\\\", tostring(MyCount), \\\"\\\")\",\"size\":1,\"showAnalytics\":true,\"title\":\"Exchange Trusted SubSystem group nonstandard member count\",\"noDataMessage\":\"Content of group as Expected\",\"noDataMessageStyle\":3,\"showExportToExcel\":true,\"queryType\":0,\"resourceType\":\"microsoft.operationalinsights/workspaces\",\"visualization\":\"tiles\",\"tileSettings\":{\"titleContent\":{\"columnMatch\":\"CmdletResultValue_Name\",\"formatter\":1},\"leftContent\":{\"columnMatch\":\"Result\",\"formatter\":12,\"formatOptions\":{\"palette\":\"hotCold\"},\"numberFormat\":{\"unit\":17,\"options\":{\"style\":\"decimal\",\"maximumFractionDigits\":2,\"maximumSignificantDigits\":3},\"emptyValCustomText\":\"ScriptError\"}},\"showBorder\":true}},\"customWidth\":\"50\",\"name\":\"ExchangeServersTileGroup1Query\"},{\"type\":3,\"content\":{\"version\":\"KqlItem/1.0\",\"query\":\"let ETScontent = ExchangeConfiguration(SpecificSectionList=\\\"ETS\\\", SpecificConfigurationDate=\\\"{DateOfConfiguration:value}\\\",SpecificConfigurationEnv={EnvironmentList}, Target = \\\"On-Premises\\\") | project Name = tostring(CmdletResultValue.Name);\\r\\nExchangeConfiguration(SpecificSectionList=\\\"EWP\\\",SpecificConfigurationDate=\\\"{DateOfConfiguration:value}\\\",SpecificConfigurationEnv={EnvironmentList},Target = \\\"On-Premises\\\")\\r\\n| where CmdletResultValue.Name !in (ETScontent) and CmdletResultValue.Name != \\\"Exchange Trusted Subsystem\\\"\\r\\n| extend Result = iff ( CmdletResultType == \\\"Success\\\", \\\"\\\", \\\"Error in the script unable to retrieve value\\\")\\r\\n| summarize MyCount=countif( CmdletResultType == \\\"Success\\\") by CmdletResultType\\r\\n| project Result = iff ( CmdletResultType == \\\"Success\\\", tostring(MyCount), \\\"\\\")\\r\\n\",\"size\":1,\"showAnalytics\":true,\"title\":\"Exchange Windows Permissions group direct nonstandard members (Exchange Trusted subsystem non standard content not included)\",\"noDataMessage\":\"Content of group as expected\",\"noDataMessageStyle\":3,\"showExportToExcel\":true,\"queryType\":0,\"resourceType\":\"microsoft.operationalinsights/workspaces\",\"visualization\":\"tiles\",\"tileSettings\":{\"titleContent\":{\"columnMatch\":\"CmdletResultValue_Name\",\"formatter\":1},\"leftContent\":{\"columnMatch\":\"Result\",\"formatter\":12,\"formatOptions\":{\"palette\":\"hotCold\"},\"numberFormat\":{\"unit\":17,\"options\":{\"style\":\"decimal\",\"maximumFractionDigits\":2,\"maximumSignificantDigits\":3},\"emptyValCustomText\":\"ScriptError\"}},\"showBorder\":true}},\"customWidth\":\"50\",\"name\":\"ExchangeServersTileGroup2Query\"},{\"type\":12,\"content\":{\"version\":\"NotebookGroup/1.0\",\"groupType\":\"editable\",\"title\":\"Exchange Windows Permissions direct nonstandard content (Exchange Trusted subsystem non standard content not included)\",\"items\":[{\"type\":3,\"content\":{\"version\":\"KqlItem/1.0\",\"query\":\"let ETSValidcontnet = union kind=outer (ExchangeConfiguration(SpecificSectionList=\\\"ExchangeServers\\\",SpecificConfigurationDate=\\\"{DateOfConfiguration:value}\\\",SpecificConfigurationEnv={EnvironmentList},Target = \\\"On-Premises\\\")| project Name = tostring(CmdletResultValue.Name)), (ExchangeConfiguration(SpecificSectionList=\\\"DAG\\\",SpecificConfigurationDate=\\\"{DateOfConfiguration:value}\\\",SpecificConfigurationEnv={EnvironmentList},Target = \\\"On-Premises\\\")| project Name = tostring(Identity));\\r\\nExchangeConfiguration(SpecificSectionList=\\\"ETS\\\",SpecificConfigurationDate=\\\"{DateOfConfiguration:value}\\\",SpecificConfigurationEnv={EnvironmentList},Target = \\\"On-Premises\\\")\\r\\n| where CmdletResultValue.Name !in (ETSValidcontnet)\\r\\n//| extend Name = strcat (\\\"⛔\\\",tostring(CmdletResultValue.Name))\\r\\n| extend Name = iff(CmdletResultType == \\\"Success\\\", strcat (\\\"⛔\\\",tostring(CmdletResultValue.Name)),\\\"Script was unable to retrieve data\\\")\\r\\n| project Name \",\"size\":1,\"showAnalytics\":true,\"title\":\"Exchange Trusted SubSystem nonstandard content\",\"noDataMessage\":\"Content of Exchange Trusted SubSystem as Expected\",\"noDataMessageStyle\":3,\"showExportToExcel\":true,\"queryType\":0,\"resourceType\":\"microsoft.operationalinsights/workspaces\",\"gridSettings\":{\"rowLimit\":10000}},\"customWidth\":\"50\",\"name\":\"ETSDetails\",\"styleSettings\":{\"showBorder\":true}},{\"type\":3,\"content\":{\"version\":\"KqlItem/1.0\",\"query\":\"let ETScontent = ExchangeConfiguration(SpecificSectionList=\\\"ETS\\\", SpecificConfigurationDate=\\\"{DateOfConfiguration:value}\\\",SpecificConfigurationEnv={EnvironmentList}, Target = \\\"On-Premises\\\") | project Name = tostring(CmdletResultValue.Name);\\r\\nExchangeConfiguration(SpecificSectionList=\\\"EWP\\\",SpecificConfigurationDate=\\\"{DateOfConfiguration:value}\\\",SpecificConfigurationEnv={EnvironmentList},Target = \\\"On-Premises\\\")\\r\\n| where CmdletResultValue.Name !in (ETScontent) and CmdletResultValue.Name != \\\"Exchange Trusted Subsystem\\\"\\r\\n//| extend Name = strcat (\\\"⛔\\\",tostring(CmdletResultValue.Name))\\r\\n| extend Name = iff(CmdletResultType == \\\"Success\\\", strcat (\\\"⛔\\\",tostring(CmdletResultValue.Name)),\\\"Script was unable to retrieve data\\\")\\r\\n| project Name \",\"size\":1,\"showAnalytics\":true,\"title\":\"Exchange Windows Permissions direct nonstandard content (Exchange Trusted subsystem non standard content not included)\",\"noDataMessage\":\"Content of Exchange Windows Permissions as Expected\",\"noDataMessageStyle\":3,\"showExportToExcel\":true,\"queryType\":0,\"resourceType\":\"microsoft.operationalinsights/workspaces\"},\"customWidth\":\"50\",\"name\":\"WindowsPermissionsQuery\",\"styleSettings\":{\"showBorder\":true}}]},\"name\":\"ETS and WP Grids\"},{\"type\":12,\"content\":{\"version\":\"NotebookGroup/1.0\",\"groupType\":\"editable\",\"title\":\"Exchange groups from old Exchange version\",\"items\":[{\"type\":1,\"content\":{\"json\":\"ℹ️ Recommendations\\r\\n\\r\\n- Groups from old Exchange version should have been removed\\r\\n- List of old groups \\r\\n\\t- Exchange Organization Administrators\\r\\n\\t- Exchange Recipient Administrators\\r\\n\\t- Exchange Public Folder Administrators\\r\\n\\t- Exchange Server Administrator\\r\\n\\t- Exchange View-Only Administrator\\r\\n\\t- Exchange Enterprise Servers (located in the root domain)\\r\\n\\t- Exchange Domain Servers : one group per domain\\r\\n\\r\\n\\r\\nHelp for Built-in role groups\",\"style\":\"info\"},\"conditionalVisibility\":{\"parameterName\":\"Help\",\"comparison\":\"isEqualTo\",\"value\":\"Yes\"},\"name\":\"text - 0\"},{\"type\":12,\"content\":{\"version\":\"NotebookGroup/1.0\",\"groupType\":\"editable\",\"items\":[{\"type\":3,\"content\":{\"version\":\"KqlItem/1.0\",\"query\":\"\\r\\nlet OldVGroup = (ExchangeConfiguration(SpecificSectionList=\\\"ADGroup\\\", SpecificConfigurationDate=\\\"{DateOfConfiguration:value}\\\", SpecificConfigurationEnv={EnvironmentList}, Target = \\\"On-Premises\\\")| where CmdletResultValue.Parentgroup == \\\"Exchange Enterprise Servers\\\" or CmdletResultValue.Parentgroup == \\\"Exchange Services\\\"| extend Parentgroup = tostring(CmdletResultValue.Parentgroup));\\r\\nExchangeConfiguration(SpecificSectionList=\\\"ExGroup\\\", SpecificConfigurationDate=\\\"{DateOfConfiguration:value}\\\", SpecificConfigurationEnv={EnvironmentList}, Target = \\\"On-Premises\\\") \\r\\n| extend Parentgroup = tostring(CmdletResultValue.Parentgroup)\\r\\n| where CmdletResultValue.Parentgroup in (\\\"Exchange Organization Administrators\\\", \\\"Exchange Recipient Administrators\\\", \\\"Exchange Public Folder Administrators\\\", \\\"Exchange Server Administrator\\\", \\\"Exchange View-Only Administrator\\\") |union OldVGroup\\r\\n| where CmdletResultValue.Level != 0 and CmdletResultValue.ObjectClass !contains \\\"group\\\"\\r\\n| extend MemberPath= tostring(split(tostring(CmdletResultValue.MemberPath), \\\"\\\\\\\\\\\")[countof(tostring(CmdletResultValue.MemberPath), \\\"\\\\\\\\\\\")])\\r\\n| summarize dcount(tostring(MemberPath)) by Parentgroup = tostring(CmdletResultValue.Parentgroup)\\r\\n| sort by dcount_MemberPath\\r\\n\\r\\n\\r\\n\",\"size\":4,\"showAnalytics\":true,\"noDataMessage\":\"No groups from old versions found\",\"noDataMessageStyle\":3,\"showExportToExcel\":true,\"queryType\":0,\"resourceType\":\"microsoft.operationalinsights/workspaces\",\"visualization\":\"tiles\",\"tileSettings\":{\"titleContent\":{\"columnMatch\":\"Parentgroup\",\"formatter\":1},\"leftContent\":{\"columnMatch\":\"dcount_MemberPath\",\"formatter\":12,\"formatOptions\":{\"palette\":\"auto\"}},\"showBorder\":true}},\"name\":\"query - 0\"}]},\"name\":\"ExchangeGroupsList\"},{\"type\":12,\"content\":{\"version\":\"NotebookGroup/1.0\",\"groupType\":\"editable\",\"title\":\"Expand details on the content of old groups\",\"expandable\":true,\"expanded\":false,\"items\":[{\"type\":9,\"content\":{\"version\":\"KqlParameterItem/1.0\",\"parameters\":[{\"id\":\"b4b7a6ad-381a-48d6-9938-bf7cb812b474\",\"version\":\"KqlParameterItem/1.0\",\"name\":\"Group\",\"type\":2,\"query\":\"let OldVGroup = (ExchangeConfiguration(SpecificSectionList=\\\"ADGroup\\\", SpecificConfigurationDate=\\\"{DateOfConfiguration:value}\\\", SpecificConfigurationEnv={EnvironmentList}, Target = \\\"On-Premises\\\")| where CmdletResultValue.Parentgroup == \\\"Exchange Enterprise Servers\\\" or CmdletResultValue.Parentgroup == \\\"Exchange Services\\\"| extend Parentgroup = tostring(CmdletResultValue.Parentgroup));\\r\\nExchangeConfiguration(SpecificSectionList=\\\"ExGroup\\\", SpecificConfigurationDate=\\\"{DateOfConfiguration:value}\\\", SpecificConfigurationEnv={EnvironmentList}, Target = \\\"On-Premises\\\") \\r\\n| extend Parentgroup = tostring(CmdletResultValue.Parentgroup)\\r\\n| where CmdletResultValue.Parentgroup in (\\\"Exchange Organization Administrators\\\", \\\"Exchange Recipient Administrators\\\", \\\"Exchange Public Folder Administrators\\\", \\\"Exchange Server Administrator\\\", \\\"Exchange View-Only Administrator\\\") |union OldVGroup\\r\\n| project CmdletResultValue\\r\\n| extend GroupName = tostring(CmdletResultValue.Parentgroup)\\r\\n| distinct GroupName\\r\\n| sort by GroupName asc\\r\\n\",\"typeSettings\":{\"showDefault\":false},\"queryType\":0,\"resourceType\":\"microsoft.operationalinsights/workspaces\"},{\"id\":\"a695df39-1965-479a-ad0f-b4d3d168aaed\",\"version\":\"KqlParameterItem/1.0\",\"name\":\"LastLogon\",\"label\":\"Last Logon\",\"type\":10,\"isRequired\":true,\"jsonData\":\"[ {\\\"value\\\": \\\"0d\\\", \\\"label\\\": \\\"No filter\\\",\\\"selected\\\":true},\\r\\n{ \\\"value\\\": \\\"90d\\\", \\\"label\\\": \\\"90d\\\" },\\r\\n { \\\"value\\\": \\\"180d\\\", \\\"label\\\": \\\"6m\\\" },\\r\\n { \\\"value\\\": \\\"365d\\\", \\\"label\\\": \\\"1y\\\" },\\r\\n{ \\\"value\\\": \\\"730d\\\", \\\"label\\\": \\\"2y\\\" },\\r\\n{ \\\"value\\\": \\\"1085d\\\", \\\"label\\\": \\\"3y\\\" },\\r\\n{ \\\"value\\\": \\\"1097d\\\", \\\"label\\\": \\\"more than 3y\\\"},\\r\\n{ \\\"value\\\": \\\"3650d\\\", \\\"label\\\": \\\"more than 10y\\\"}\\r\\n]\\r\\n\"},{\"id\":\"2d69bad8-0904-467a-86e6-cb0923520c18\",\"version\":\"KqlParameterItem/1.0\",\"name\":\"PasswordLast\",\"label\":\"Password Last Set\",\"type\":10,\"isRequired\":true,\"jsonData\":\"[{ \\\"value\\\": \\\"0d\\\", \\\"label\\\": \\\"No filter\\\",\\\"selected\\\":true },\\r\\n { \\\"value\\\": \\\"365d\\\", \\\"label\\\": \\\"1y\\\" },\\r\\n{ \\\"value\\\": \\\"730d\\\", \\\"label\\\": \\\"2y\\\" },\\r\\n{ \\\"value\\\": \\\"1095d\\\", \\\"label\\\": \\\"3y\\\" },\\r\\n{ \\\"value\\\": \\\"1097d\\\", \\\"label\\\": \\\"more than 3y\\\"},\\r\\n{ \\\"value\\\": \\\"3650d\\\", \\\"label\\\": \\\"more than 10y\\\"}\\r\\n]\"}],\"style\":\"pills\",\"queryType\":0,\"resourceType\":\"microsoft.operationalinsights/workspaces\"},\"name\":\"parameters - 3\"},{\"type\":1,\"content\":{\"json\":\"Old Exchange groups content groups (Extract for the OU \\\"Microsoft Exchange Security Groups\\\").\\r\\nSelect a group to display detailed information of its contents.\\r\\nLevel attribute helps you understand the level of nested groups.\\r\\n\\r\\n❌ : for last logon displayed when user logged or the last logon is greater than 180 days\\r\\n\\r\\n❌ : for password last set displayed when last password set greater than 365 days\"},\"name\":\"text - 2\"},{\"type\":3,\"content\":{\"version\":\"KqlItem/1.0\",\"query\":\"let OldVGroupEES = (ExchangeConfiguration(SpecificSectionList=\\\"ADGroup\\\", SpecificConfigurationDate=\\\"{DateOfConfiguration:value}\\\", SpecificConfigurationEnv={EnvironmentList}, Target = \\\"On-Premises\\\")\\r\\n | where (CmdletResultValue.Parentgroup == \\\"Exchange Enterprise Servers\\\" and CmdletResultValue.MemberPath != @\\\"Exchange Enterprise Servers\\\\Exchange Domain Servers\\\") or CmdletResultValue.Parentgroup == \\\"Exchange Services\\\"\\r\\n | extend Parentgroup = tostring(CmdletResultValue.Parentgroup)\\r\\n | extend MemberPath = tostring(CmdletResultValue.MemberPath)\\r\\n | extend DN = tostring(CmdletResultValue.DN)\\r\\n | extend Level = tostring(CmdletResultValue.Level)\\r\\n | extend ObjectClass = tostring(CmdletResultValue.ObjectClass)\\r\\n | extend Enabled = tostring(CmdletResultValue.Enabled) );\\r\\nlet OldVGroupEDS = (ExchangeConfiguration(SpecificSectionList=\\\"ADGroup\\\", SpecificConfigurationDate=\\\"lastdate\\\", SpecificConfigurationEnv='B13', Target = \\\"On-Premises\\\")\\r\\n | where CmdletResultValue.Parentgroup == \\\"Exchange Enterprise Servers\\\" and CmdletResultValue.Level ==0\\r\\n | extend Parentgroup = tostring(CmdletResultValue.Parentgroup)\\r\\n| mv-expand CmdletResultValue.Members\\r\\n| where CmdletResultValue_Members.objectClass == \\\"group\\\"\\r\\n| project Parentgroup, MemberPath= strcat(Parentgroup,\\\"\\\\\\\\\\\", CmdletResultValue_Members.name), Level = tostring(1), ObjectClass = tostring(CmdletResultValue_Members.objectClass), DN = tostring(CmdletResultValue_Members.DistinguishedName), ObjectGuid = tostring(CmdletResultValue_Members.ObjectGuid)| join kind=inner ( ExchangeConfiguration(SpecificSectionList=\\\"ADGroup\\\", SpecificConfigurationDate=\\\"lastdate\\\", SpecificConfigurationEnv='B13', Target = \\\"On-Premises\\\")\\r\\n | where CmdletResultValue.Parentgroup == \\\"Exchange Enterprise Servers\\\"\\r\\n | extend Parentgroup = tostring(CmdletResultValue.Parentgroup)\\r\\n | extend ObjectGuid = tostring(CmdletResultValue.ObjectGuid)) on ObjectGuid) ;\\r\\nExchangeConfiguration(SpecificSectionList=\\\"ExGroup\\\", SpecificConfigurationDate=\\\"lastdate\\\", SpecificConfigurationEnv='B13', Target = \\\"On-Premises\\\") \\r\\n| extend Parentgroup = tostring(CmdletResultValue.Parentgroup)\\r\\n| where CmdletResultValue.Parentgroup in (\\\"Exchange Organization Administrators\\\", \\\"Exchange Recipient Administrators\\\", \\\"Exchange Public Folder Administrators\\\", \\\"Exchange Server Administrator\\\", \\\"Exchange View-Only Administrator\\\")\\r\\n| extend MemberPath = tostring(CmdletResultValue.MemberPath)\\r\\n| extend Level = tostring(CmdletResultValue.Level)\\r\\n| extend ObjectClass = tostring(CmdletResultValue.ObjectClass)\\r\\n| extend Enabled = tostring(CmdletResultValue.Enabled)\\r\\n| extend DN = tostring(CmdletResultValue.DN)\\r\\n| union OldVGroupEES,OldVGroupEDS\\r\\n| search CmdletResultValue.Parentgroup == \\\"{Group}\\\"\\r\\n| where todatetime (CmdletResultValue.LastPwdSetString) < ago(0d) or tostring (CmdletResultValue.LastPwdSetString) == \\\"\\\"\\r\\n| where todatetime (CmdletResultValue.LastLogonString) < ago(0d) or tostring (CmdletResultValue.LastLogonString) == \\\"\\\"\\r\\n| sort by tostring(CmdletResultValue.MemberPath) asc \\r\\n| where CmdletResultValue.Level != 0\\r\\n//| extend DN = tostring(CmdletResultValue.DN)\\r\\n| extend LastLogon = tostring(CmdletResultValue.LastLogonString)\\r\\n| extend LastLogon = iif(ObjectClass == \\\"group\\\" or ObjectClass == \\\"computer\\\" or ObjectClass == \\\"Local User\\\" or ObjectClass == \\\"computer\\\", \\\"N/A\\\", iif (todatetime (CmdletResultValue.LastLogonString) > ago(180d), CmdletResultValue.LastLogonString, iff (LastLogon == \\\"\\\", \\\"❌ Never logged\\\", strcat(\\\"❌\\\", LastLogon))))\\r\\n| extend LastPwdSet = CmdletResultValue.LastPwdSetString\\r\\n| extend LastPwdSet = iif(ObjectClass == \\\"group\\\" or ObjectClass == \\\"computer\\\" or ObjectClass == \\\"Local User\\\" or ObjectClass == \\\"computer\\\", \\\"N/A\\\", iif (todatetime (CmdletResultValue.LastPwdSetString) > ago(366d), CmdletResultValue.LastPwdSetString, iff (LastPwdSet == \\\"\\\", \\\"❌ Password never set\\\", strcat(\\\"❌\\\", LastPwdSet))))\\r\\n| extend MemberPath = case(ObjectClass == \\\"group\\\", strcat(\\\"👪 \\\", MemberPath), ObjectClass == \\\"computer\\\", strcat(\\\"💻 \\\", MemberPath), strcat(\\\"🧑‍🦰 \\\", MemberPath))\\r\\n| project Parentgroup, MemberPath, Level, ObjectClass,LastLogon, LastPwdSet ,Enabled,DN\\r\\n\",\"size\":1,\"showAnalytics\":true,\"noDataMessage\":\"The query returned no results.\",\"showExportToExcel\":true,\"queryType\":0,\"resourceType\":\"microsoft.operationalinsights/workspaces\",\"gridSettings\":{\"formatters\":[{\"columnMatch\":\"CmdletResultValue\",\"formatter\":5},{\"columnMatch\":\"Parentgroup\",\"formatter\":5},{\"columnMatch\":\"LastPwdSet\",\"formatter\":0,\"numberFormat\":{\"unit\":0,\"options\":{\"style\":\"decimal\"}}},{\"columnMatch\":\"ParentId\",\"formatter\":5},{\"columnMatch\":\"Id\",\"formatter\":5}],\"rowLimit\":10000,\"filter\":true}},\"showPin\":true,\"name\":\"ExchangeServersGroupsGrid\",\"styleSettings\":{\"showBorder\":true}}]},\"name\":\"group - 5\"}]},\"name\":\"Exchange group from old Exchange versions\"},{\"type\":12,\"content\":{\"version\":\"NotebookGroup/1.0\",\"groupType\":\"editable\",\"title\":\"Exchange group\",\"items\":[{\"type\":1,\"content\":{\"json\":\"ℹ️ Recommendations\\r\\n\\r\\n- Ensure that no service account are a member of the high privilege groups. Use RBAC to delegate the exact required permissions.\\r\\n- Limit the usage of nested group for administration.\\r\\n- Ensure that accounts are given only the required pernissions to execute their tasks.\\r\\n- Use just in time administration principle by adding users in a group only when they need the permissions, then remove them when their operation is over.\\r\\n- Limit the number of Organization management members. When you review the Admin Audit logs you might see that the administrators rarely needed Organization Management privileges.\\r\\n- Monitor the content of the following groups:\\r\\n - Organization Management\\r\\n - Recipient Management (Member of this group have at least the following rights : set-mailbox, Add-MailboxPermission)\\r\\n - Discovery Management\\r\\n - Server Management\\r\\n - Hygiene Management\\r\\n - Exchange Servers\\r\\n - Exchange Trusted Subsystem \\r\\n - Exchange Windows Permissions\\r\\n - xxx High privilege group (not an exhaustive list)\\r\\n - All RBAC groups that have high roles delegation\\r\\n - All nested groups in high privileges groups\\r\\n - Note that this is not a complete list. The content of all the groups that have high privileges should be monitored.\\r\\n- Each time a new RBAC group is created, decide if the content of this groups should be monitored\\r\\n- Periodically review the members of the groups\\r\\n\\r\\nHelp for Built-in role groups\",\"style\":\"info\"},\"conditionalVisibility\":{\"parameterName\":\"Help\",\"comparison\":\"isEqualTo\",\"value\":\"Yes\"},\"name\":\"text - 0\"},{\"type\":12,\"content\":{\"version\":\"NotebookGroup/1.0\",\"groupType\":\"editable\",\"title\":\"Summary content of most important groups\",\"items\":[{\"type\":3,\"content\":{\"version\":\"KqlItem/1.0\",\"query\":\"ExchangeConfiguration(SpecificSectionList=\\\"ExGroup\\\",SpecificConfigurationDate=\\\"{DateOfConfiguration:value}\\\",SpecificConfigurationEnv={EnvironmentList},Target = \\\"On-Premises\\\")\\r\\n| project CmdletResultValue\\r\\n| where CmdletResultValue.Level != 0 and CmdletResultValue.ObjectClass !contains \\\"group\\\"\\r\\n| extend MemberPath= tostring(split(tostring(CmdletResultValue.MemberPath),\\\"\\\\\\\\\\\")[countof(tostring(CmdletResultValue.MemberPath),\\\"\\\\\\\\\\\")])\\r\\n| summarize dcount(tostring(MemberPath)) by Parentgroup = tostring(CmdletResultValue.Parentgroup)\\r\\n| where Parentgroup in (\\\"Organization Management\\\", \\\"Compliance Management\\\", \\\"Discovery Management\\\", \\\"Server Management\\\", \\\"Recipient Manangement\\\",\\\"Security Administrator\\\", \\\"Hygiene Management\\\", \\\"Public Folder Manangement\\\", \\\"Records Manangement\\\") or Parentgroup contains \\\"Impersonation\\\" or Parentgroup contains \\\"Export\\\"\\r\\n| sort by dcount_MemberPath\\r\\n\\r\\n\",\"size\":4,\"showAnalytics\":true,\"showExportToExcel\":true,\"queryType\":0,\"resourceType\":\"microsoft.operationalinsights/workspaces\",\"visualization\":\"tiles\",\"tileSettings\":{\"titleContent\":{\"columnMatch\":\"Parentgroup\",\"formatter\":1},\"leftContent\":{\"columnMatch\":\"dcount_MemberPath\",\"formatter\":12,\"formatOptions\":{\"palette\":\"auto\"}},\"showBorder\":true}},\"name\":\"query - 0\"},{\"type\":12,\"content\":{\"version\":\"NotebookGroup/1.0\",\"groupType\":\"editable\",\"title\":\"Expand for summary content for all groups located in the OU Exchange Security Groups\",\"expandable\":true,\"items\":[{\"type\":3,\"content\":{\"version\":\"KqlItem/1.0\",\"query\":\"ExchangeConfiguration(SpecificSectionList=\\\"ExGroup\\\",SpecificConfigurationDate=\\\"{DateOfConfiguration:value}\\\",SpecificConfigurationEnv={EnvironmentList},Target = \\\"On-Premises\\\")\\r\\n| project CmdletResultValue\\r\\n| where CmdletResultValue.Level != 0 and CmdletResultValue.ObjectClass !contains \\\"group\\\"\\r\\n| extend MemberPath= tostring(split(tostring(CmdletResultValue.MemberPath),\\\"\\\\\\\\\\\")[countof(tostring(CmdletResultValue.MemberPath),\\\"\\\\\\\\\\\")])\\r\\n| summarize dcount(tostring(MemberPath)) by Parentgroup = tostring(CmdletResultValue.Parentgroup)\\r\\n| sort by dcount_MemberPath desc\\r\\n\\r\\n\",\"size\":1,\"showAnalytics\":true,\"title\":\"OU Exchange Security Groups\",\"showExportToExcel\":true,\"queryType\":0,\"resourceType\":\"microsoft.operationalinsights/workspaces\",\"visualization\":\"tiles\",\"tileSettings\":{\"titleContent\":{\"columnMatch\":\"Parentgroup\",\"formatter\":1},\"leftContent\":{\"columnMatch\":\"dcount_MemberPath\",\"formatter\":12,\"formatOptions\":{\"palette\":\"auto\"}},\"showBorder\":true}},\"showPin\":false,\"name\":\"query - 0 - Copy\"}]},\"name\":\"All groups\"}]},\"name\":\"ExchangeGroupsList\"},{\"type\":9,\"content\":{\"version\":\"KqlParameterItem/1.0\",\"parameters\":[{\"id\":\"b4b7a6ad-381a-48d6-9938-bf7cb812b474\",\"version\":\"KqlParameterItem/1.0\",\"name\":\"Group\",\"type\":2,\"query\":\"ExchangeConfiguration(SpecificSectionList=\\\"ExGroup\\\",SpecificConfigurationDate=\\\"{DateOfConfiguration:value}\\\",SpecificConfigurationEnv={EnvironmentList},Target = \\\"On-Premises\\\")\\r\\n//| where CmdletResultValue.Parentgroup != \\\"Exchange Trusted Subsystem\\\"\\r\\n//| where CmdletResultValue.Parentgroup != \\\"Exchange Windows Permissions\\\"\\r\\n| project CmdletResultValue\\r\\n| extend GroupName = tostring(CmdletResultValue.Parentgroup)\\r\\n| distinct GroupName\\r\\n| sort by GroupName asc\\r\\n\",\"typeSettings\":{\"showDefault\":false},\"showExportToExcel\":true,\"showAnalytics\":true,\"queryType\":0,\"resourceType\":\"microsoft.operationalinsights/workspaces\"},{\"id\":\"f3b935d7-b78f-41d2-94bc-f8c878a13260\",\"version\":\"KqlParameterItem/1.0\",\"name\":\"LastLogon\",\"label\":\"Last Logon >\",\"type\":10,\"isRequired\":true,\"multiSelect\":true,\"quote\":\"'\",\"delimiter\":\",\",\"typeSettings\":{\"showDefault\":false},\"jsonData\":\"[ {\\\"value\\\": \\\"0d\\\", \\\"label\\\": \\\"No filter\\\",\\\"selected\\\":true},\\r\\n{ \\\"value\\\": \\\"90d\\\", \\\"label\\\": \\\"90d\\\" },\\r\\n { \\\"value\\\": \\\"180d\\\", \\\"label\\\": \\\"6m\\\" },\\r\\n { \\\"value\\\": \\\"365d\\\", \\\"label\\\": \\\"1y\\\" },\\r\\n{ \\\"value\\\": \\\"730d\\\", \\\"label\\\": \\\"2y\\\" },\\r\\n{ \\\"value\\\": \\\"1085d\\\", \\\"label\\\": \\\"3y\\\" },\\r\\n{ \\\"value\\\": \\\"1097d\\\", \\\"label\\\": \\\"more than 3y\\\"},\\r\\n{ \\\"value\\\": \\\"3650d\\\", \\\"label\\\": \\\"more than 10y\\\"}\\r\\n]\"},{\"id\":\"3343688f-e609-4822-b4ed-cdd50b77d948\",\"version\":\"KqlParameterItem/1.0\",\"name\":\"PasswordLast\",\"label\":\"Password Last Set >\",\"type\":10,\"isRequired\":true,\"typeSettings\":{\"showDefault\":false},\"jsonData\":\"[{ \\\"value\\\": \\\"0d\\\", \\\"label\\\": \\\"No filter\\\",\\\"selected\\\":true },\\r\\n { \\\"value\\\": \\\"365d\\\", \\\"label\\\": \\\"1y\\\" },\\r\\n{ \\\"value\\\": \\\"730d\\\", \\\"label\\\": \\\"2y\\\" },\\r\\n{ \\\"value\\\": \\\"1095d\\\", \\\"label\\\": \\\"3y\\\" },\\r\\n{ \\\"value\\\": \\\"1097d\\\", \\\"label\\\": \\\"more than 3y\\\"},\\r\\n{ \\\"value\\\": \\\"3650d\\\", \\\"label\\\": \\\"more than 10y\\\"}\\r\\n]\"}],\"style\":\"pills\",\"queryType\":0,\"resourceType\":\"microsoft.operationalinsights/workspaces\"},\"name\":\"parameters - 3\"},{\"type\":1,\"content\":{\"json\":\"Exchange groups content (Extract for the OU \\\"Microsoft Exchange Security Groups\\\").\\r\\nSelect a group to display detailed information of its contents.\\r\\nLevel attribute helps you understand the level of nested groups.\\r\\n\\r\\n❌ : for last logon displayed when user logged or the last logon is greater than 180 days\\r\\n\\r\\n❌ : for password last set displayed when last password set greater than 365 days\"},\"name\":\"text - 2\"},{\"type\":3,\"content\":{\"version\":\"KqlItem/1.0\",\"query\":\"ExchangeConfiguration(SpecificSectionList=\\\"ExGroup\\\",SpecificConfigurationDate=\\\"{DateOfConfiguration:value}\\\",SpecificConfigurationEnv={EnvironmentList},Target = \\\"On-Premises\\\")\\r\\n| search CmdletResultValue.Parentgroup == \\\"{Group}\\\"\\r\\n| where todatetime (CmdletResultValue.LastPwdSetString) < ago({PasswordLast}) or tostring (CmdletResultValue.LastPwdSetString) == \\\"\\\"\\r\\n| where todatetime (CmdletResultValue.LastLogonString) < ago({LastLogon}) or tostring (CmdletResultValue.LastLogonString) == \\\"\\\"\\r\\n| where CmdletResultValue.Level != 0\\r\\n| sort by tostring(CmdletResultValue.MemberPath) asc \\r\\n| project CmdletResultValue\\r\\n| extend Parentgroup = tostring(CmdletResultValue.Parentgroup)\\r\\n| extend MemberPath = tostring(CmdletResultValue.MemberPath)\\r\\n| extend Level = tostring(CmdletResultValue.Level)\\r\\n| extend ObjectClass = tostring(CmdletResultValue.ObjectClass)\\r\\n| extend LastLogon = tostring(CmdletResultValue.LastLogonString)\\r\\n| extend LastLogon = iif(ObjectClass==\\\"group\\\" or ObjectClass==\\\"computer\\\" or ObjectClass==\\\"Local User\\\" or ObjectClass==\\\"computer\\\",\\\"N/A\\\",iif ( todatetime (CmdletResultValue.LastLogonString) > ago(180d), CmdletResultValue.LastLogonString,iff (LastLogon==\\\"\\\", \\\"❌ No logon\\\",strcat(\\\"❌\\\",LastLogon))))\\r\\n| extend LastPwdSet = CmdletResultValue.LastPwdSetString\\r\\n| extend LastPwdSet = iif(ObjectClass==\\\"group\\\" or ObjectClass==\\\"computer\\\" or ObjectClass==\\\"Local User\\\" or ObjectClass==\\\"computer\\\",\\\"N/A\\\",iif ( todatetime (CmdletResultValue.LastPwdSetString) > ago(366d), CmdletResultValue.LastPwdSetString,iff (LastPwdSet==\\\"\\\", \\\"❌ No logon\\\",strcat(\\\"❌\\\",LastPwdSet))))\\r\\n| extend Enabled = tostring(CmdletResultValue.Enabled)\\r\\n| extend DN = tostring(CmdletResultValue.DN)\\r\\n| sort by MemberPath asc\\r\\n//| extend MemberPath = case( ObjectClass == \\\"group\\\", strcat( \\\"👪 \\\", MemberPath), ObjectClass == \\\"computer\\\", strcat( \\\"💻 \\\", MemberPath), strcat( \\\"🧑‍🦰 \\\", MemberPath) )\\r\\n| project-away CmdletResultValue,Parentgroup\",\"size\":3,\"showAnalytics\":true,\"showExportToExcel\":true,\"queryType\":0,\"resourceType\":\"microsoft.operationalinsights/workspaces\",\"gridSettings\":{\"rowLimit\":10000,\"filter\":true,\"sortBy\":[{\"itemKey\":\"MemberPath\",\"sortOrder\":1}]},\"sortBy\":[{\"itemKey\":\"MemberPath\",\"sortOrder\":1}]},\"name\":\"ExchangeServersGroupsGrid\",\"styleSettings\":{\"showBorder\":true}}]},\"name\":\"Exchange group\"},{\"type\":12,\"content\":{\"version\":\"NotebookGroup/1.0\",\"groupType\":\"editable\",\"title\":\"AD Group\",\"items\":[{\"type\":1,\"content\":{\"json\":\"High privileges AD groups can take control of Exchange by adding any accounts in the Exchange groups.\\r\\n\\r\\nNote that the members of the Account Operators are able to manage every AD group (except those protected by AdminSDHolder). This means they can manage the content of every high privilege Exchange groups.\\r\\n\\r\\nℹ️ It is recommended to not use this group and to monitor its changes.\\r\\n\",\"style\":\"info\"},\"conditionalVisibility\":{\"parameterName\":\"Help\",\"comparison\":\"isEqualTo\",\"value\":\"Yes\"},\"name\":\"ADGroupHelp\"},{\"type\":9,\"content\":{\"version\":\"KqlParameterItem/1.0\",\"parameters\":[{\"id\":\"268bd356-7d05-41c3-9867-00c6ab198c5a\",\"version\":\"KqlParameterItem/1.0\",\"name\":\"Group\",\"type\":2,\"query\":\"ExchangeConfiguration(SpecificSectionList=\\\"ADGroup\\\",SpecificConfigurationDate=\\\"{DateOfConfiguration:value}\\\",SpecificConfigurationEnv={EnvironmentList},Target = \\\"On-Premises\\\")\\r\\n| project CmdletResultValue\\r\\n| extend GroupName = tostring(CmdletResultValue.Parentgroup)\\r\\n| distinct GroupName\\r\\n| sort by GroupName asc\\r\\n\",\"typeSettings\":{\"showDefault\":false},\"showExportToExcel\":true,\"showAnalytics\":true,\"queryType\":0,\"resourceType\":\"microsoft.operationalinsights/workspaces\",\"gridSettings\":{\"rowLimit\":10000}},{\"id\":\"9d02cad2-f4c5-418d-976f-b88b56f80cb5\",\"version\":\"KqlParameterItem/1.0\",\"name\":\"LastLogon\",\"label\":\"Last Logon\",\"type\":10,\"isRequired\":true,\"typeSettings\":{\"showDefault\":false},\"jsonData\":\"[ {\\\"value\\\": \\\"0d\\\", \\\"label\\\": \\\"No filter\\\",\\\"selected\\\":true},\\r\\n{ \\\"value\\\": \\\"90d\\\", \\\"label\\\": \\\"90d\\\" },\\r\\n { \\\"value\\\": \\\"180d\\\", \\\"label\\\": \\\"6m\\\" },\\r\\n { \\\"value\\\": \\\"365d\\\", \\\"label\\\": \\\"1y\\\" },\\r\\n{ \\\"value\\\": \\\"730d\\\", \\\"label\\\": \\\"2y\\\" },\\r\\n{ \\\"value\\\": \\\"1085d\\\", \\\"label\\\": \\\"3y\\\" },\\r\\n{ \\\"value\\\": \\\"1097d\\\", \\\"label\\\": \\\"more than 3y\\\"},\\r\\n{ \\\"value\\\": \\\"3650d\\\", \\\"label\\\": \\\"more than 10y\\\"}\\r\\n]\"},{\"id\":\"9e591429-d8ea-40c2-80c1-2426c72c92d5\",\"version\":\"KqlParameterItem/1.0\",\"name\":\"PasswordLast\",\"label\":\"Password Last Set\",\"type\":10,\"isRequired\":true,\"typeSettings\":{\"showDefault\":false},\"jsonData\":\"[{ \\\"value\\\": \\\"0d\\\", \\\"label\\\": \\\"No filter\\\",\\\"selected\\\":true },\\r\\n { \\\"value\\\": \\\"365d\\\", \\\"label\\\": \\\"1y\\\" },\\r\\n{ \\\"value\\\": \\\"730d\\\", \\\"label\\\": \\\"2y\\\" },\\r\\n{ \\\"value\\\": \\\"1095d\\\", \\\"label\\\": \\\"3y\\\" },\\r\\n{ \\\"value\\\": \\\"1097d\\\", \\\"label\\\": \\\"more than 3y\\\"},\\r\\n{ \\\"value\\\": \\\"3650d\\\", \\\"label\\\": \\\"more than 10y\\\"}\\r\\n]\"}],\"style\":\"pills\",\"queryType\":0,\"resourceType\":\"microsoft.operationalinsights/workspaces\"},\"name\":\"parameters - 1\"},{\"type\":1,\"content\":{\"json\":\"Overview of high privileges AD Groups' content.\\r\\nSelect a group to display detailed information of its contents.\\r\\nLevel attribute helps you understand the level of nested groups.\\r\\n\\r\\n❌ : for last logon displayed when user logged or the last logon is greater than 180 days\\r\\n\\r\\n❌ : for password last set displayed when last password set greater than 365 days\"},\"name\":\"text - 0\"},{\"type\":3,\"content\":{\"version\":\"KqlItem/1.0\",\"query\":\"ExchangeConfiguration(SpecificSectionList=\\\"ADGroup\\\",SpecificConfigurationDate=\\\"{DateOfConfiguration:value}\\\",SpecificConfigurationEnv={EnvironmentList},Target = \\\"On-Premises\\\")\\r\\n| search CmdletResultValue.Parentgroup == \\\"{Group}\\\"\\r\\n| where todatetime (CmdletResultValue.LastPwdSetString) < ago({PasswordLast}) or tostring (CmdletResultValue.LastPwdSetString) == \\\"\\\"\\r\\n| where todatetime (CmdletResultValue.LastLogonString) < ago({LastLogon}) or tostring (CmdletResultValue.LastLogonString) == \\\"\\\"\\r\\n| where CmdletResultValue.Level != 0\\r\\n| sort by tostring(CmdletResultValue.MemberPath) asc \\r\\n| project CmdletResultValue\\r\\n| extend Parentgroup = tostring(CmdletResultValue.Parentgroup)\\r\\n| extend MemberPath = tostring(CmdletResultValue.MemberPath)\\r\\n| extend Level = tostring(CmdletResultValue.Level)\\r\\n| extend ObjectClass = tostring(CmdletResultValue.ObjectClass)\\r\\n| extend LastLogon = tostring(CmdletResultValue.LastLogonString)\\r\\n| extend LastLogon = iif(ObjectClass==\\\"group\\\" or ObjectClass==\\\"computer\\\" or ObjectClass==\\\"Local User\\\" or ObjectClass==\\\"computer\\\",\\\"N/A\\\",iif ( todatetime (CmdletResultValue.LastLogonString) > ago(180d), CmdletResultValue.LastLogonString,iff (LastLogon==\\\"\\\", \\\"❌ No logon\\\",strcat(\\\"❌\\\",LastLogon))))\\r\\n| extend LastPwdSet = CmdletResultValue.LastPwdSetString\\r\\n| extend LastPwdSet = iif(ObjectClass==\\\"group\\\" or ObjectClass==\\\"computer\\\" or ObjectClass==\\\"Local User\\\" or ObjectClass==\\\"computer\\\",\\\"N/A\\\",iif ( todatetime (CmdletResultValue.LastPwdSetString) > ago(366d), CmdletResultValue.LastPwdSetString,iff (LastPwdSet==\\\"\\\", \\\"❌ No logon\\\",strcat(\\\"❌\\\",LastPwdSet))))\\r\\n| extend Enabled = tostring(CmdletResultValue.Enabled)\\r\\n| extend DN = tostring(CmdletResultValue.DN)\\r\\n| sort by MemberPath asc\\r\\n//| extend MemberPath = case( ObjectClass == \\\"group\\\", strcat( \\\"👪 \\\", MemberPath), ObjectClass == \\\"computer\\\", strcat( \\\"💻 \\\", MemberPath), strcat( \\\"🧑‍🦰 \\\", MemberPath) )\\r\\n| project-away CmdletResultValue,Parentgroup\",\"size\":3,\"showAnalytics\":true,\"showExportToExcel\":true,\"queryType\":0,\"resourceType\":\"microsoft.operationalinsights/workspaces\",\"gridSettings\":{\"formatters\":[{\"columnMatch\":\"CmdletResultValue\",\"formatter\":5},{\"columnMatch\":\"Parentgroup\",\"formatter\":5}],\"rowLimit\":10000,\"filter\":true}},\"name\":\"query - 2\",\"styleSettings\":{\"showBorder\":true}}]},\"name\":\"AD Group\"}]},\"conditionalVisibility\":{\"parameterName\":\"selected\",\"comparison\":\"isEqualTo\",\"value\":\"ExchAD\"},\"name\":\"Exchange and AD GRoup\"},{\"type\":12,\"content\":{\"version\":\"NotebookGroup/1.0\",\"groupType\":\"editable\",\"title\":\"Transport Security configuration\",\"items\":[{\"type\":1,\"content\":{\"json\":\"This tab displays differents security configuration for transport components.\"},\"name\":\"text - 10\"},{\"type\":12,\"content\":{\"version\":\"NotebookGroup/1.0\",\"groupType\":\"editable\",\"title\":\"Receive Connectors\",\"items\":[{\"type\":3,\"content\":{\"version\":\"KqlItem/1.0\",\"query\":\"ExchangeConfiguration(SpecificSectionList=\\\"ReceiveConnector\\\",SpecificConfigurationDate=\\\"{DateOfConfiguration:value}\\\",SpecificConfigurationEnv={EnvironmentList},Target = \\\"On-Premises\\\")\\r\\n| where CmdletResultValue.PermissionGroupsString contains \\\"Anonymous\\\"\\r\\n| summarize Count = countif (CmdletResultValue.PermissionGroupsString contains \\\"Anonymous\\\") by Name,tostring(CmdletResultValue.Server.Name)\\r\\n\",\"size\":0,\"title\":\"Anonymous Configuration\",\"queryType\":0,\"resourceType\":\"microsoft.operationalinsights/workspaces\",\"visualization\":\"piechart\",\"chartSettings\":{\"yAxis\":[\"Count\"],\"group\":\"CmdletResultValue_Server_Name\",\"ySettings\":{\"numberFormatSettings\":{\"unit\":0,\"options\":{\"style\":\"decimal\",\"useGrouping\":true}}}}},\"customWidth\":\"33\",\"name\":\"query - 0\"},{\"type\":3,\"content\":{\"version\":\"KqlItem/1.0\",\"query\":\"ExchangeConfiguration(SpecificSectionList=\\\"RCAnonymous\\\",SpecificConfigurationDate=\\\"{DateOfConfiguration:value}\\\",SpecificConfigurationEnv={EnvironmentList},Target = \\\"On-Premises\\\")\\r\\n| extend Identity = tostring(Identity)\\r\\n|summarize count() by Identity\",\"size\":0,\"title\":\"OpenRelay with \\\"ms-Exch-SMTP-Accept-Any-Recipient\\\" for Anonymous\",\"queryType\":0,\"resourceType\":\"microsoft.operationalinsights/workspaces\",\"visualization\":\"piechart\"},\"customWidth\":\"33\",\"name\":\"query - 1\"},{\"type\":3,\"content\":{\"version\":\"KqlItem/1.0\",\"query\":\"ExchangeConfiguration(SpecificSectionList=\\\"ReceiveConnector\\\",SpecificConfigurationDate=\\\"{DateOfConfiguration:value}\\\",SpecificConfigurationEnv={EnvironmentList},Target = \\\"On-Premises\\\")\\r\\n| where CmdletResultValue.AuthMechanismString contains (\\\"ExternalAuthoritative\\\")\\r\\n| extend Server = tostring(CmdletResultValue.Server.Name)\\r\\n| summarize count() by Name,Server\\r\\n\",\"size\":0,\"title\":\"Open Relay using with Externally Secure\",\"queryType\":0,\"resourceType\":\"microsoft.operationalinsights/workspaces\",\"visualization\":\"piechart\"},\"customWidth\":\"33\",\"name\":\"query - 2\"}]},\"name\":\"group - 8\"},{\"type\":12,\"content\":{\"version\":\"NotebookGroup/1.0\",\"groupType\":\"editable\",\"title\":\"Receive Connectors OpenRelay using Extended Right \\\"ms-Exch-SMTP-Accept-Any-Recipient\\\" for Anonymous\",\"items\":[{\"type\":1,\"content\":{\"json\":\"This view shows all **Receive Connectors** configured configured as Open Relay with the Extended Rights \\\"ms-Exch-SMTP-Accept-Any-Recipient\\\" set on the Receive Connector object in the Configuration partition.\\r\\n\\r\\n\\r\\nRemember that with this configuration, the Exchange servers can be used to send emails outside the organization. Depending on the configuration, the connectors may be protected by IPs. However, IP protection is not safe configuration.\\r\\n\\r\\nYou can check if the \\\"ms-Exch-SMTP-Accept-Any-Recipient\\\" ExtendedRights has been added on the Receive connector for Anonymous with PowerShell: `Get-ReceiveConnector | Get-ADPermission | ? {$_.ExtendedRights -like \\\"ms-Exch-SMTP-Accept-Any-Recipient\\\"}`\\r\\n\\r\\nAllow anonymous relay on Exchange server\\r\\n\\r\\nSee the section \\\"Receive Connectors with Anonymous Permission\\\" for additional information regarding Anonymous authentication and IP protection.\",\"style\":\"info\"},\"conditionalVisibility\":{\"parameterName\":\"Help\",\"comparison\":\"isEqualTo\",\"value\":\"Yes\"},\"name\":\"ReceiveConnectorsHelp\"},{\"type\":9,\"content\":{\"version\":\"KqlParameterItem/1.0\",\"parameters\":[{\"id\":\"fa5f9749-d6f8-436f-ae00-cba306713bac\",\"version\":\"KqlParameterItem/1.0\",\"name\":\"Server\",\"type\":2,\"query\":\"ExchangeConfiguration(SpecificSectionList=\\\"ExchangeServers\\\",SpecificConfigurationDate=\\\"{DateOfConfiguration:value}\\\",SpecificConfigurationEnv={EnvironmentList},Target = \\\"On-Premises\\\")\\r\\n| project CmdletResultValue\\r\\n| where CmdletResultValue.ServerRole <> \\\"64\\\"\\r\\n| extend SRVName = tostring(CmdletResultValue.Name)\\r\\n| distinct SRVName\\r\\n| sort by SRVName asc\",\"typeSettings\":{\"showDefault\":false},\"timeContext\":{\"durationMs\":86400000},\"queryType\":0,\"resourceType\":\"microsoft.operationalinsights/workspaces\"},{\"id\":\"14912e83-60a1-4a21-a34b-500d4662a666\",\"version\":\"KqlParameterItem/1.0\",\"name\":\"NoIPRestriction\",\"type\":10,\"isRequired\":true,\"typeSettings\":{\"showDefault\":false},\"jsonData\":\"[\\r\\n { \\\"value\\\": \\\"True\\\", \\\"label\\\": \\\"Yes\\\" },\\r\\n { \\\"value\\\": \\\"True,False\\\", \\\"label\\\": \\\"No\\\", \\\"selected\\\":\\\"False\\\" }\\r\\n]\",\"timeContext\":{\"durationMs\":86400000}}],\"style\":\"pills\",\"queryType\":0,\"resourceType\":\"microsoft.operationalinsights/workspaces\"},\"name\":\"parameters - 2\"},{\"type\":1,\"content\":{\"json\":\"The toogle buttom help you to sort by:\\r\\n\\r\\n- Server\\r\\n- Receive connectors with no IP restrictions\"},\"name\":\"text - 3\"},{\"type\":3,\"content\":{\"version\":\"KqlItem/1.0\",\"query\":\"ExchangeConfiguration(SpecificSectionList=\\\"RCAnonymous\\\",SpecificConfigurationDate=\\\"{DateOfConfiguration:value}\\\",SpecificConfigurationEnv={EnvironmentList},Target = \\\"On-Premises\\\")\\r\\n| project Identity,CmdletResultValue\\r\\n| extend Identity = tostring(Identity)\\r\\n| extend Server = replace_string(replace_string(tostring(split(CmdletResultValue.DistinguishedName,\\\",\\\",3)),\\\"[\\\\\\\"CN=\\\",\\\"\\\"),\\\"\\\\\\\"]\\\",\\\"\\\")\\r\\n|join kind=leftouter ( ExchangeConfiguration(SpecificSectionList=\\\"ReceiveConnector\\\",SpecificConfigurationDate=\\\"{DateOfConfiguration:value}\\\",SpecificConfigurationEnv={EnvironmentList},Target = \\\"On-Premises\\\") ) on $left.Identity == $right.Name\\r\\n| where CmdletResultValue1.Server.Name contains \\\"{Server}\\\"\\r\\n| where (CmdletResultValue1.RemoteIPRanges contains \\\"0.0.0.0\\\" or CmdletResultValue1.RemoteIPRanges contains \\\"ffff:ffff:ffff:ffff:ffff:ffff:ffff:ffff\\\") in ({NoIPRestriction})\\r\\n| where CmdletResultValue1.PermissionGroupsString contains \\\"Anonymous\\\" //> 12 and CmdletResultValue.PermissionGroups != 14 and CmdletResultValue.PermissionGroups != 16\\r\\n| extend Server = tostring(CmdletResultValue1.Server.Name)\\r\\n| extend Name = tostring(CmdletResultValue1.Name)\\r\\n| extend TransportRole = iff(CmdletResultValue1.TransportRole== \\\"32\\\" , \\\"HubTransport\\\", \\\"FrontendTransport\\\")\\r\\n| extend Enabled = tostring(CmdletResultValue1.Enabled)\\r\\n| extend PermissionGroups = tostring(CmdletResultValue1.PermissionGroupsString) \\r\\n| extend AuthMechanism = tostring(CmdletResultValue1.AuthMechanismString)\\r\\n| mv-expand RemoteIPall=CmdletResultValue1.RemoteIPRanges\\r\\n| mv-expand BindingAllall=CmdletResultValue1.Bindings\\r\\n| extend RemoteIP= RemoteIPall.Expression\\r\\n| extend IP= strcat (BindingAllall.Address,\\\"-\\\",BindingAllall.Port)\\r\\n| summarize Bindings = make_set(tostring(IP)),RemoteIPRange = make_set(tostring(RemoteIP)) by Server,Name,TransportRole,Enabled,PermissionGroups,AuthMechanism\\r\\n| sort by Server asc\",\"size\":1,\"showAnalytics\":true,\"showExportToExcel\":true,\"queryType\":0,\"resourceType\":\"microsoft.operationalinsights/workspaces\",\"gridSettings\":{\"rowLimit\":10000,\"filter\":true,\"sortBy\":[{\"itemKey\":\"Server\",\"sortOrder\":1}]},\"sortBy\":[{\"itemKey\":\"Server\",\"sortOrder\":1}]},\"name\":\"RCAnonymousQuery\",\"styleSettings\":{\"showBorder\":true}}]},\"name\":\"Receive Connectors OpenRelay using Extended Right \\\"ms-Exch-SMTP-Accept-Any-Recipient\\\" for Anonymous\"},{\"type\":12,\"content\":{\"version\":\"NotebookGroup/1.0\",\"groupType\":\"editable\",\"title\":\"Receive Connectors OpenRelay using Authentication ExternalAuthoritative\",\"items\":[{\"type\":1,\"content\":{\"json\":\"This view shows all Receive Connectors configured with authentication set to Externally Secure. With this configuration the Receive connector will be allow as Open Relay.\\r\\n\\r\\nRemember that with this configuration, the Exchange servers can be used to send emails outside the organization. Depending on the configuration, the connectors may be protected by IP. However, IP protection is not safe configuration.\\r\\n\\r\\n\\r\\nAllow anonymous relay on Exchange server\\r\\n\\r\\nSee the section \\\"Receive Connectors with Anonymous Permission\\\" for additional information regarding Anonymous authentication and IP protection.\\r\\n\",\"style\":\"info\"},\"conditionalVisibility\":{\"parameterName\":\"Help\",\"comparison\":\"isEqualTo\",\"value\":\"Yes\"},\"name\":\"ReceiveConnectorsHelp\"},{\"type\":9,\"content\":{\"version\":\"KqlParameterItem/1.0\",\"parameters\":[{\"id\":\"195a66a1-7aa2-4564-bd3b-233049d6f101\",\"version\":\"KqlParameterItem/1.0\",\"name\":\"Server\",\"type\":2,\"query\":\"ExchangeConfiguration(SpecificSectionList=\\\"ExchangeServers\\\",SpecificConfigurationDate=\\\"{DateOfConfiguration:value}\\\",SpecificConfigurationEnv={EnvironmentList},Target = \\\"On-Premises\\\")\\r\\n| project CmdletResultValue\\r\\n| where CmdletResultValue.ServerRole <> \\\"64\\\"\\r\\n| extend SRVName = tostring(CmdletResultValue.Name)\\r\\n| distinct SRVName\\r\\n| sort by SRVName asc\",\"typeSettings\":{\"showDefault\":false},\"queryType\":0,\"resourceType\":\"microsoft.operationalinsights/workspaces\"},{\"id\":\"4ef1d2a2-a13f-4bd4-9e66-2d9a15ad8a7a\",\"version\":\"KqlParameterItem/1.0\",\"name\":\"NoIPRestriction\",\"type\":10,\"description\":\"See Receive Connectors with no IP restriction\",\"isRequired\":true,\"jsonData\":\"[\\r\\n { \\\"value\\\": \\\"True\\\", \\\"label\\\": \\\"Yes\\\" },\\r\\n { \\\"value\\\": \\\"True,False\\\", \\\"label\\\": \\\"No\\\", \\\"selected\\\":\\\"False\\\" }\\r\\n]\"}],\"style\":\"pills\",\"queryType\":0,\"resourceType\":\"microsoft.operationalinsights/workspaces\"},\"name\":\"parameters - 3\"},{\"type\":1,\"content\":{\"json\":\"The toogle buttom help you to sort by:\\r\\n\\r\\n- Server\\r\\n- Receive connectors with no IP restrictions\"},\"name\":\"text - 3\"},{\"type\":3,\"content\":{\"version\":\"KqlItem/1.0\",\"query\":\"ExchangeConfiguration(SpecificSectionList=\\\"ReceiveConnector\\\",SpecificConfigurationDate=\\\"{DateOfConfiguration:value}\\\",SpecificConfigurationEnv={EnvironmentList},Target = \\\"On-Premises\\\")\\r\\n| where CmdletResultValue.Server.Name contains \\\"{Server}\\\"\\r\\n| where (CmdletResultValue.RemoteIPRanges contains \\\"0.0.0.0\\\" or CmdletResultValue.RemoteIPRanges contains \\\"ffff:ffff:ffff:ffff:ffff:ffff:ffff:ffff\\\") in ({NoIPRestriction})\\r\\n| where CmdletResultValue.AuthMechanismString contains \\\"ExternalAuthoritative\\\" //> 12 and CmdletResultValue.PermissionGroups != 14 and CmdletResultValue.PermissionGroups != 16\\r\\n| project CmdletResultValue\\r\\n| extend Server = tostring(CmdletResultValue.Server.Name)\\r\\n| extend Name = tostring(CmdletResultValue.Name)\\r\\n| extend TransportRole = iff(CmdletResultValue.TransportRole== \\\"32\\\" , \\\"HubTransport\\\", \\\"FrontendTransport\\\")\\r\\n| extend Enabled = tostring(CmdletResultValue.Enabled)\\r\\n| extend PermissionGroups = tostring(CmdletResultValue.PermissionGroupsString)\\r\\n//| extend Bindings = iif(tostring(parse_json(tostring(CmdletResultValue.Bindings))[1].Port )!=\\\"\\\",tostring(strcat(tostring(parse_json(tostring(CmdletResultValue.Bindings))[0].Address),\\\"-\\\",tostring(parse_json(tostring(CmdletResultValue.Bindings))[0].Port),\\\",\\\",tostring(parse_json(tostring(CmdletResultValue.Bindings))[1].Address),\\\"-\\\",tostring(parse_json(tostring(CmdletResultValue.Bindings))[1].Port))),tostring(strcat(tostring(parse_json(tostring(CmdletResultValue.Bindings))[0].Address),\\\"-\\\",tostring(parse_json(tostring(CmdletResultValue.Bindings))[0].Port))))\\r\\n//| extend RemoteIPRanges = tostring(CmdletResultValue.RemoteIPRanges)\\r\\n| extend AuthMechanism = tostring(CmdletResultValue.AuthMechanismString)\\r\\n| mv-expand RemoteIPall=CmdletResultValue.RemoteIPRanges\\r\\n| mv-expand BindingAllall=CmdletResultValue.Bindings\\r\\n| extend RemoteIP= RemoteIPall.Expression\\r\\n| extend IP= strcat (BindingAllall.Address,\\\"-\\\",BindingAllall.Port)\\r\\n| summarize Bindings = make_set(tostring(IP)),RemoteIPRange = make_set(tostring(RemoteIP)) by Server,Name,TransportRole,Enabled,PermissionGroups,AuthMechanism\\r\\n| sort by Server asc\\r\\n\",\"size\":1,\"showAnalytics\":true,\"title\":\"Receive Connectors configure with Externally Secured Authentication\",\"showExportToExcel\":true,\"queryType\":0,\"resourceType\":\"microsoft.operationalinsights/workspaces\",\"gridSettings\":{\"rowLimit\":10000,\"filter\":true,\"sortBy\":[{\"itemKey\":\"Server\",\"sortOrder\":1}]},\"sortBy\":[{\"itemKey\":\"Server\",\"sortOrder\":1}]},\"name\":\"query - 2\",\"styleSettings\":{\"showBorder\":true}}]},\"name\":\"Security Transport Configuration\"},{\"type\":12,\"content\":{\"version\":\"NotebookGroup/1.0\",\"groupType\":\"editable\",\"title\":\"Receive Connectors with Anonymous Permission\",\"items\":[{\"type\":1,\"content\":{\"json\":\"This view shows all Receive Connectors configured with Anonymous authentication. It is not recommended to configure connectors with Anonymous authentication.\\r\\n\\r\\nWhen configured with Anonymous and No Ip Restriction, any machine can initiate an SMTP session with the Receive Connectors. This can then be used send emails (SPAM/Virus/Phishing....) to all the mailboxes in the organization. The mail will be seen as an internal mail and might bypass some protections.\\r\\n\\r\\nIf you absolute need this configuration because some of your application does not support Authentication, it is strongly recommended to limit the IP addresses that can establish SMTP sessions with Exchange. Do not use range of subnet.\\r\\n\\r\\nThis section has an option button to display \\r\\n All Receive Connectors with Anonymous (No)\\r\\n All Receive Connectors with Anonymous and with no IP Restriction (Yes)\",\"style\":\"info\"},\"conditionalVisibility\":{\"parameterName\":\"Help\",\"comparison\":\"isEqualTo\",\"value\":\"Yes\"},\"name\":\"ReceiveConnectorsHelp\"},{\"type\":9,\"content\":{\"version\":\"KqlParameterItem/1.0\",\"parameters\":[{\"id\":\"195a66a1-7aa2-4564-bd3b-233049d6f101\",\"version\":\"KqlParameterItem/1.0\",\"name\":\"Server\",\"type\":2,\"query\":\"ExchangeConfiguration(SpecificSectionList=\\\"ExchangeServers\\\",SpecificConfigurationDate=\\\"{DateOfConfiguration:value}\\\",SpecificConfigurationEnv={EnvironmentList},Target = \\\"On-Premises\\\")\\r\\n| project CmdletResultValue\\r\\n| where CmdletResultValue.ServerRole <> \\\"64\\\"\\r\\n| extend SRVName = tostring(CmdletResultValue.Name)\\r\\n| distinct SRVName\\r\\n| sort by SRVName asc\",\"typeSettings\":{\"showDefault\":false},\"queryType\":0,\"resourceType\":\"microsoft.operationalinsights/workspaces\"},{\"id\":\"bcb24a01-9242-4fec-b30a-02b0583cbc87\",\"version\":\"KqlParameterItem/1.0\",\"name\":\"NoIPRestriction\",\"type\":10,\"isRequired\":true,\"typeSettings\":{\"showDefault\":false},\"jsonData\":\"[\\r\\n { \\\"value\\\": \\\"True\\\", \\\"label\\\": \\\"Yes\\\" },\\r\\n { \\\"value\\\": \\\"True,False\\\", \\\"label\\\": \\\"No\\\", \\\"selected\\\":\\\"False\\\" }\\r\\n]\"}],\"style\":\"pills\",\"queryType\":0,\"resourceType\":\"microsoft.operationalinsights/workspaces\"},\"name\":\"parameters - 3\"},{\"type\":1,\"content\":{\"json\":\"The toogle buttom help you to sort by:\\r\\n\\r\\n- Server\\r\\n- Receive connectors with no IP restrictions\"},\"name\":\"text - 3 - Copy\"},{\"type\":3,\"content\":{\"version\":\"KqlItem/1.0\",\"query\":\"ExchangeConfiguration(SpecificSectionList=\\\"ReceiveConnector\\\",SpecificConfigurationDate=\\\"{DateOfConfiguration:value}\\\",SpecificConfigurationEnv={EnvironmentList},Target = \\\"On-Premises\\\")\\r\\n| where CmdletResultValue.Server.Name contains \\\"{Server}\\\"\\r\\n| where (CmdletResultValue.RemoteIPRanges contains \\\"0.0.0.0\\\" or CmdletResultValue.RemoteIPRanges contains \\\"ffff:ffff:ffff:ffff:ffff:ffff:ffff:ffff\\\") in ({NoIPRestriction})\\r\\n| where CmdletResultValue.PermissionGroupsString contains \\\"Anonymous\\\" //> 12 and CmdletResultValue.PermissionGroups != 14 and CmdletResultValue.PermissionGroups != 16\\r\\n| project CmdletResultValue\\r\\n| extend Server = tostring(CmdletResultValue.Server.Name)\\r\\n| extend Name = tostring(CmdletResultValue.Name)\\r\\n| extend TransportRole = iff(CmdletResultValue.TransportRole== \\\"32\\\" , \\\"HubTransport\\\", \\\"FrontendTransport\\\")\\r\\n| extend Enabled = tostring(CmdletResultValue.Enabled)\\r\\n| extend PermissionGroups = tostring(CmdletResultValue.PermissionGroupsString) \\r\\n| extend AuthMechanism = tostring(CmdletResultValue.AuthMechanismString)\\r\\n| mv-expand RemoteIPall=CmdletResultValue.RemoteIPRanges\\r\\n| mv-expand BindingAllall=CmdletResultValue.Bindings\\r\\n| extend RemoteIP= RemoteIPall.Expression\\r\\n| extend IP= strcat (BindingAllall.Address,\\\"-\\\",BindingAllall.Port)\\r\\n| summarize Bindings = make_set(tostring(IP)),RemoteIPRange = make_set(tostring(RemoteIP)) by Server,Name,TransportRole,Enabled,PermissionGroups,AuthMechanism\\r\\n| sort by Server asc\\r\\n\",\"size\":1,\"showAnalytics\":true,\"title\":\"Receive Connectors configure with Anonymous Permission\",\"showExportToExcel\":true,\"queryType\":0,\"resourceType\":\"microsoft.operationalinsights/workspaces\",\"gridSettings\":{\"rowLimit\":10000,\"filter\":true,\"sortBy\":[{\"itemKey\":\"Server\",\"sortOrder\":1}]},\"sortBy\":[{\"itemKey\":\"Server\",\"sortOrder\":1}]},\"name\":\"query - 2\",\"styleSettings\":{\"showBorder\":true}}]},\"name\":\"Receive Connectors configure with Anonymous Permission\"},{\"type\":12,\"content\":{\"version\":\"NotebookGroup/1.0\",\"groupType\":\"editable\",\"title\":\"Transport Rules with specific actions to monitor\",\"items\":[{\"type\":1,\"content\":{\"json\":\"A common way used by attackers to exfiltrate data is to set Transport Rules that send all or sensitive messages outside the organization or to a mailbox where they already have full control.\\r\\n\\r\\nThis section shows your Transport rules with sentitive actions that can lead to data leaks:\\r\\n- BlindCopyTo\\r\\n- RedirectMessageTo\\r\\n- CopyTo\\r\\n\\r\\n\\r\\nFor more information :\\r\\nMail flow rules in Exchange Serve\\r\\n\",\"style\":\"info\"},\"conditionalVisibility\":{\"parameterName\":\"Help\",\"comparison\":\"isEqualTo\",\"value\":\"Yes\"},\"name\":\"TransportRulesHelp\"},{\"type\":3,\"content\":{\"version\":\"KqlItem/1.0\",\"query\":\"ExchangeConfiguration(SpecificSectionList=\\\"TransportRule\\\",SpecificConfigurationDate=\\\"{DateOfConfiguration:value}\\\",SpecificConfigurationEnv={EnvironmentList},Target = \\\"On-Premises\\\")\\r\\n| project CmdletResultValue\\r\\n| extend Identity = iif( CmdletResultValue.Identity contains \\\"OrgHierarchyToIgnore\\\",tostring(CmdletResultValue.Identity.Name),tostring(CmdletResultValue.Identity))\\r\\n//| extend State = tostring(CmdletResultValue.State)\\r\\n| extend Status= iff ( tostring(CmdletResultValue.State)== \\\"Enabled\\\" or tostring(CmdletResultValue.State)== \\\"1\\\" , \\\"Enabled\\\",iff(tostring(CmdletResultValue.State)==\\\"\\\",\\\"\\\", \\\"Disabled\\\"))\\r\\n| extend SentTo = tostring(CmdletResultValue.SentToString)\\r\\n| extend BlindCopyTo = tostring(CmdletResultValue.BlindCopyToString)\\r\\n| extend CopyTo = tostring(CmdletResultValue.CopyToString)\\r\\n| extend RedirectMessageTo = tostring(CmdletResultValue.RedirectMessageToString)\\r\\n| extend Mode = tostring(CmdletResultValue.Identity.Mode)\\r\\n| project-away CmdletResultValue\\r\\n| sort by Identity asc\\r\\n| sort by Status desc\",\"size\":1,\"showAnalytics\":true,\"showExportToExcel\":true,\"queryType\":0,\"resourceType\":\"microsoft.operationalinsights/workspaces\",\"gridSettings\":{\"rowLimit\":10000,\"filter\":true}},\"name\":\"query - 1\",\"styleSettings\":{\"showBorder\":true}}]},\"name\":\"Transport Rules actions to monitor\"},{\"type\":1,\"content\":{\"json\":\"### Journal Mailboxes\"},\"name\":\"JournalMailboxHelp\"},{\"type\":1,\"content\":{\"json\":\"The **Journal Mailboxes** contain emails sent and received by specific or all users. The content of these mailboxes is very sensitives.\\r\\n\\r\\nJournal Rules should be reviewed to check if they are still needed. Mailbox audit should be set on these mailboxes. Also by default, no one should access to these mailboxes.\\r\\n\\r\\nThen, it is recommended to regularly check who have Full Access mailbox or Receive As on these mailboxes.\\r\\nAdditional information :\\r\\n\\r\\nJournaling in Exchange Server\\r\\n\\r\\nJournaling procedures\\r\\n\\r\\n\\r\\nMailbox audit logging in Exchange Server\\r\\n\\r\\n\\r\\n\",\"style\":\"info\"},\"conditionalVisibility\":{\"parameterName\":\"Help\",\"comparison\":\"isEqualTo\",\"value\":\"Yes\"},\"name\":\"JournalHelp\"},{\"type\":3,\"content\":{\"version\":\"KqlItem/1.0\",\"query\":\"ExchangeConfiguration(SpecificSectionList=\\\"JournalRule\\\",SpecificConfigurationDate=\\\"{DateOfConfiguration:value}\\\",SpecificConfigurationEnv={EnvironmentList},Target = \\\"On-Premises\\\")\\r\\n| project CmdletResultValue\\r\\n| extend Identity = tostring(CmdletResultValue.Identity)\\r\\n| extend Status= iff ( tostring(CmdletResultValue.Enabled)== \\\"Enabled\\\" or tostring(CmdletResultValue.Enabled)== \\\"1\\\" , \\\"Enabled\\\", iff(tostring(CmdletResultValue.Enabled)==\\\"\\\",\\\"\\\", \\\"Disabled\\\"))\\r\\n//| extend Enabled = tostring(CmdletResultValue.Enabled)\\r\\n| extend JournalEmailAddress = tostring(CmdletResultValue.JournalEmailAddress)\\r\\n| extend Recipient = tostring(CmdletResultValue.Recipient)\\r\\n| sort by Identity asc\\r\\n| sort by Status desc\\r\\n| project-away CmdletResultValue\\r\\n\",\"size\":1,\"showAnalytics\":true,\"title\":\"Journal Rules configured in your environment\",\"showExportToExcel\":true,\"queryType\":0,\"resourceType\":\"microsoft.operationalinsights/workspaces\",\"gridSettings\":{\"rowLimit\":10000,\"filter\":true}},\"name\":\"JournalQuery\",\"styleSettings\":{\"showBorder\":true}},{\"type\":12,\"content\":{\"version\":\"NotebookGroup/1.0\",\"groupType\":\"editable\",\"title\":\"Journal Recipients on mailbox databases configured in your environment\",\"items\":[{\"type\":1,\"content\":{\"json\":\"As Journal Recipient on databases send all the mail send to users in this database to a specific mailbox. The content of these mailboxes is very sensitive.\\r\\n\\r\\nJournal Recipients configuration should be reviewed to check if they are still needed. Mailbox audit should be set on these mailboxes. No one should have access to these mailboxes by default.\\r\\n\\r\\nIt is recommended to regularly check who have Full Access or Receive As on these mailboxes.\\r\\n\\r\\nAdditional information :\\r\\n\\r\\nJournaling in Exchange Server\\r\\n\\r\\nJournaling procedures\\r\\n\\r\\n\\r\\nMailbox audit logging in Exchange Server\\r\\n\",\"style\":\"info\"},\"conditionalVisibility\":{\"parameterName\":\"Help\",\"comparison\":\"isEqualTo\",\"value\":\"Yes\"},\"name\":\"JournalRecipientsHelp\"},{\"type\":3,\"content\":{\"version\":\"KqlItem/1.0\",\"query\":\"ExchangeConfiguration(SpecificSectionList=\\\"MbxDBJournaling\\\",SpecificConfigurationDate=\\\"{DateOfConfiguration:value}\\\",SpecificConfigurationEnv={EnvironmentList},Target = \\\"On-Premises\\\")\\r\\n| where CmdletResultValue.JournalRecipient !=\\\"\\\"\\r\\n| project CmdletResultValue\\r\\n| extend Identity = tostring(CmdletResultValue.Identity.Name)\\r\\n| extend Enabled = tostring(CmdletResultValue.Enabled)\\r\\n| extend JournalRecipient = tostring(CmdletResultValue.JournalRecipient)\\r\\n| project-away CmdletResultValue\\r\\n| sort by Identity asc\\r\\n\",\"size\":1,\"showAnalytics\":true,\"showExportToExcel\":true,\"queryType\":0,\"resourceType\":\"microsoft.operationalinsights/workspaces\"},\"name\":\"query - 1\",\"styleSettings\":{\"showBorder\":true}}]},\"name\":\"JournalRecipientsGroup\"},{\"type\":12,\"content\":{\"version\":\"NotebookGroup/1.0\",\"groupType\":\"editable\",\"title\":\"Remote Domain Autofoward Configuration - * should not allow AutoForwardEnabled\",\"items\":[{\"type\":1,\"content\":{\"json\":\"If **AutoForwardEnabled** is set to True for an SMTP domain, then users in Outlook are allowed to set automatic transfer of all their emails to addresses in this domain.\\r\\n\\r\\nWhen the Default Remote domain is set to * and has the AutoForwardEnabled set True, any user can configure an Outlook rule to automatically forward all emails to any SMTP domain domains outside the organization. This is a high risk configuration as it might allow accounts to leak information. \\r\\n\\r\\nAlso, when setting AutoForwardEnabled to a specific domain, it is strongly recommended enable TLS encryption.\\r\\n\\r\\nAdditional information:\\r\\n\\r\\nRemote Domains\\r\\n\",\"style\":\"info\"},\"conditionalVisibility\":{\"parameterName\":\"Help\",\"comparison\":\"isEqualTo\",\"value\":\"Yes\"},\"name\":\"AutoForwardHelp\"},{\"type\":3,\"content\":{\"version\":\"KqlItem/1.0\",\"query\":\"ExchangeConfiguration(SpecificSectionList=\\\"RemoteDomain\\\",SpecificConfigurationDate=\\\"{DateOfConfiguration:value}\\\",SpecificConfigurationEnv={EnvironmentList},Target = \\\"On-Premises\\\")\\r\\n| project CmdletResultValue\\r\\n| extend Name = tostring(CmdletResultValue.Name)\\r\\n| extend Address = tostring(CmdletResultValue.DomainName.Address)\\r\\n| extend AutoForwardEnabled = iff (CmdletResultValue.AutoForwardEnabled== \\\"true\\\" and CmdletResultValue.Address == \\\"*\\\", strcat (\\\"❌\\\",tostring(CmdletResultValue.AutoForwardEnabled)),iff(CmdletResultValue.AutoForwardEnabled== \\\"true\\\" and CmdletResultValue.Address != \\\"*\\\", strcat (\\\"⚠️\\\",tostring(CmdletResultValue.AutoForwardEnabled)),strcat (\\\"✅\\\",tostring(CmdletResultValue.AutoForwardEnabled))))\\r\\n| project-away CmdletResultValue\\r\\n| sort by Address asc \",\"size\":1,\"showAnalytics\":true,\"showExportToExcel\":true,\"queryType\":0,\"resourceType\":\"microsoft.operationalinsights/workspaces\",\"gridSettings\":{\"rowLimit\":10000,\"filter\":true}},\"name\":\"query - 1\",\"styleSettings\":{\"showBorder\":true}},{\"type\":1,\"content\":{\"json\":\"Accepted domains set to * authorize Open Relay.\\r\\n\\r\\nMore information:\\r\\n\\r\\nAccepted domains\\r\\n\",\"style\":\"info\"},\"conditionalVisibility\":{\"parameterName\":\"Help\",\"comparison\":\"isEqualTo\",\"value\":\"Yes\"},\"name\":\"text - 3\"},{\"type\":3,\"content\":{\"version\":\"KqlItem/1.0\",\"query\":\"ExchangeConfiguration(SpecificSectionList=\\\"AcceptedDomain\\\",SpecificConfigurationDate=\\\"{DateOfConfiguration:value}\\\",SpecificConfigurationEnv={EnvironmentList},Target = \\\"On-Premises\\\")\\r\\n| project CmdletResultValue\\r\\n| where CmdletResultValue.DomainName.Address == \\\"*\\\"\\r\\n| extend Name = tostring(CmdletResultValue.Name)\\r\\n| extend Address = tostring(CmdletResultValue.DomainName.Address)\\r\\n| extend Address = \\\"* : ❌ OpenRelay configuration\\\"\\r\\n| extend DomainType = case(CmdletResultValue.DomainType==\\\"0\\\",\\\"Authoritative Domain\\\",CmdletResultValue.DomainType==\\\"1\\\",\\\"ExternalRelay\\\",CmdletResultValue.DomainType==\\\"2\\\",\\\"InternalRelay\\\",\\\"NotApplicable\\\")\\r\\n| project-away CmdletResultValue\",\"size\":1,\"showAnalytics\":true,\"title\":\"Accepted domain with *\",\"noDataMessage\":\"Accepted Domain * not confirgured (no Open Relay)\",\"noDataMessageStyle\":3,\"showExportToExcel\":true,\"queryType\":0,\"resourceType\":\"microsoft.operationalinsights/workspaces\",\"gridSettings\":{\"rowLimit\":10000,\"filter\":true}},\"name\":\"query - 4\",\"styleSettings\":{\"showBorder\":true}}]},\"name\":\"ForwardGroup\"}]},\"conditionalVisibility\":{\"parameterName\":\"selected\",\"comparison\":\"isEqualTo\",\"value\":\"Transport\"},\"name\":\"Transport Security configuration\"}],\"fromTemplateId\":\"sentinel-MicrosoftExchangeSecurityReview\",\"$schema\":\"https://github.com/Microsoft/Application-Insights-Workbooks/blob/master/schema/workbook.json\"}\r\n", "version": "1.0", "sourceId": "[variables('workspaceResourceId')]", "category": "sentinel" @@ -2847,7 +2847,7 @@ "[resourceId('Microsoft.Resources/templateSpecs', variables('analyticRuleTemplateSpecName1'))]" ], "properties": { - "description": "CriticalCmdletsUsageDetection_AnalyticalRules Analytics Rule with template version 2.0.0", + "description": "CriticalCmdletsUsageDetection_AnalyticalRules Analytics Rule with template version 2.0.1", "mainTemplate": { "$schema": "https://schema.management.azure.com/schemas/2019-04-01/deploymentTemplate.json#", "contentVersion": "[variables('analyticRuleVersion1')]", @@ -2996,7 +2996,7 @@ "[resourceId('Microsoft.Resources/templateSpecs', variables('analyticRuleTemplateSpecName2'))]" ], "properties": { - "description": "ServerOrientedWithUserOrientedAdministration_AnalyticalRules Analytics Rule with template version 2.0.0", + "description": "ServerOrientedWithUserOrientedAdministration_AnalyticalRules Analytics Rule with template version 2.0.1", "mainTemplate": { "$schema": "https://schema.management.azure.com/schemas/2019-04-01/deploymentTemplate.json#", "contentVersion": "[variables('analyticRuleVersion2')]", @@ -3123,7 +3123,7 @@ "apiVersion": "2022-01-01-preview", "location": "[parameters('workspace-location')]", "properties": { - "version": "2.0.0", + "version": "2.0.1", "kind": "Solution", "contentSchemaVersion": "2.0.0", "contentId": "[variables('_solutionId')]", diff --git a/Solutions/Microsoft Exchange Security - Exchange Online/Data/Solution_MicrosoftExchangeSecurityExchangeOnline.json b/Solutions/Microsoft Exchange Security - Exchange Online/Data/Solution_MicrosoftExchangeSecurityExchangeOnline.json index 82a299b1fbd..f635e6b49c9 100644 --- a/Solutions/Microsoft Exchange Security - Exchange Online/Data/Solution_MicrosoftExchangeSecurityExchangeOnline.json +++ b/Solutions/Microsoft Exchange Security - Exchange Online/Data/Solution_MicrosoftExchangeSecurityExchangeOnline.json @@ -16,7 +16,7 @@ ], "Analytic Rules": [], "BasePath": "C:\\Git Repositories\\Azure-Sentinel\\Solutions\\Microsoft Exchange Security - Exchange Online", - "Version": "2.0.0", + "Version": "2.0.1", "Metadata": "SolutionMetadata.json", "TemplateSpec": true, "Is1Pconnector": false diff --git a/Solutions/Microsoft Exchange Security - Exchange Online/Package/2.0.0.zip b/Solutions/Microsoft Exchange Security - Exchange Online/Package/2.0.0.zip deleted file mode 100644 index 878c6bfa76f417292b03b5c64fcc974213eb01fa..0000000000000000000000000000000000000000 GIT binary patch literal 0 HcmV?d00001 literal 24394 zcmV)3K+C^SO9KQH0000808?|wR?-=qTG$8x01h4i02crN0Aq4xVRU6xX+&jaX>MtB zX>V>WYIARH%~@@48@UnwUZDSh*cPy4NGr!c(ZXo%;B(xoQKx6vzRL&O2&mnW#F|U) zkz6TCn*ZJza=9;(9NW2bP{T01+~Le{W}bQBe){7d7)$A+Dt%i?Cw?i?|5&a5 zl#INr1y{KQL$cnA%xJ4;EB<9#>E_LW<=>~$$uBcoLQ5-zHO{y_$r+Xx2UF-1%nbD zS%_@oPZIu)uW(T)kP|c(DmgjVb8W-B_wik7m-E|XC33ew{(t>T`2nSXm@i!O_}#6# zRr~w@)((#L_u2dF1sGrjU$ZH&n|q~KiV15guy=!~Aiqc7*@>;CSS>3$j`h@mc*sgH zj-#*CoH@h(W?;f=C{W-`qimt9<5J?r^gStu8nMQi?DRv1PM!n1 zf~+#at=Vyv3&+s$?8G~#GMt34GiB+dmPP%LhRgLwuq_j%(Rqxkjdr1;tD4~^WmkPyhE<&7l9O@BL zG>GvytjbawH<2*sa#BNMOsmpEmdi1Q9frY>p}!nTM;T-e^r}T@k|dtz9;;m9(;Tcn zAkt|J4qm^=v~~7~?7&lYb5dD{M)&4#w=4x`Z@A;=VJRVV$l~(!>Y5#2oVAC*kTPoH z5TM4D4aWYoqk`JFcRQ?2jA3hli)C$(5XkbhUEp z68g2e3G4LO6vw4N%sHcFf0x$sTF@yHpE_qkQk7=Yb!#!q(+lnx(3vO`k#R3;8!&GK zOzQ-D$a}o85`>gR+;8T-XD|ay{ByS$^o%$drgXyL=wNu4^iBOM7C^TvNEVv9gyhH5 z>waWnui+M6BFe|`7<9pjf!9JO0Qw#i+PLm=ULPJD9*htEHa>W@hYIiVZllsJ zFRq^Gz!P0yicQ}bUB1C?phqqF6eN-Fj)qd=%0kOLG;mkmKUfJL5WNuvIZDi_TUiMy znIyksb?<~kCnD@KL&7?Pt&FoF9#tY2LT>~y*>c;hUt>XN35nB zve(~H2SVMF9XNeX#ixFUo*#}_T-zCcLnIgo2ZiTTQb8KjQMC8zHrV_&Il4{uMvTb( zt`Xb2O-8qg*JStG&wI%FZX-@9wuOOwJ4bXa)~2K`Q5|S^F?(RwT0WXQD63{o-Q68c z8^yUtG?hGuYvH^$U!;W4)@)U}&4j*NvsYWC=0Rv+V2gYTn3ag5wBu52iW<)!Vw=atC0%6vZ^nx6KA z)F`J(-yEMet+TOk*M00)_@}va?2&Jt?$bxZu-3fg+T7ZA!Wp)c?tEPm~ln370bht08JYwv)tKlJxl%=yDQvyP<<69QF{s|@>NCW zX~1s{@8S5uhJPO9e;-i03R9ZkGTsD@sfF+me;%}-WzOHTJ=}2@iZ;S==fa4kkbuuC z;TG)jhvO4AW9GGmRL)Hv?3V-Ge|p83FWg%q9JY+gQDe|i zi}}IOX9*NG*T@G-mWw6zvayeCdHaUIXbJHu*=klmF{O3{)dHR^I@CC+sZ3URObaUX zClZ#}_|kq_ocn=R6jLL@eG>`x-Ezk!n+bz{UZ9(ZG4qTT;%iXQd=a?xchxT!`-lG@ zu}=a0#pn;AX;XIQF!pRI`8ovH0!x+*WeZJa&=#%n`rksRvT!4G)%j?GNwvg&fFNZ{ z$iz%!B)t~e#%2dQqfi;CZ>En5J3hGh+fOV9c#`IOixKv|{=Px~uIa;z(^yrvT44Hl zUf{M5ZD$t#X)Y+Rzbvc%rB8beHtt*oCpR-;tQ&mg-4C8`@Eh)bM(}He86)oS7dTP; zs+GKPQRFXs;u(4uJxT9m@nO&-X|LpnW{0$R!{}{_fAIHzP)h>@6aWAK2msb*L?yZE$R1bY(7Tb8l|#z1wo+$dVZNK4$X|ao9)VWfRHF zJ)!kIrZHnyfIaVy=Ac05{r;v#}0J2!@o-)&e^d^~1defL>BR%Y{**@*# z?(du**!hHY_qZSc1TL9OvRKv3(}$G_M0j|3czC#bczFE!*MG&>%I_2Jl8@b$$86;? zO{dA@%}w#7J9a1T1t0TC+I4@K#k}i9WBD%G9Q6A8PH)@k^*4P!4Wnx;cgn}p&`o*w zPf0ZSYNbOBc+n(^g&h{3P;03Nxs^fHRE=<~pfqa+%o z%wfrFI*sD=Z^!BxA|!xNGh;*{!CEI#I7^{1mP&-!D2iDI>*)vY(w$szcEY_`9HiF( zT|av{34;k=L9ibMhEq3o0ZZtBfnykXZYnw?AHl=)ddd-jB#nc~g~AOx8BCt>$whhz zZ~NI}pO4&GnEvF3GphF{=1DY*J^o!B&8BPXUDe846IO{}5?12H!Bpb3@*+yvEa85K z4QDBvaPD)Tr4gIDNy6NC?4;>Cpih#re|RPvaZWCyS?D`Z)%k`y-@CEzMNsV@x{UqI zSujab?)nIorI(!j!&MZ&OQx>J9fjsUu&c|!yJSJad>#kyp~+Dkjj8yvL#8XND7-(4 zFCWz?mO-|oZ;_C5lj{wzDKxmY`kG%5=R{2KHA@sTsj*3z1I);gE0D9We+pT69C8o8 zt#&f5SzA@_SJ&6yHupW(<(i&Vb6cw}|E$_$6F`)v$g}8z9ZuZvIt{!8#*)X}m^LRc zzhG*FIJ^l@XVcoQ45R2>-$Bre4WVVaKI1O%>nmWaAms4-Do8Kc>u(N^VE)Q!+c@Rg z(dLDs2y(9KO=EWl%k8d~POtg3R5C zPI!q%tbeYpW(~ZY@|fnf8y-)R;Nmh(HucO(Ry)j;0~$050@dIwIEp5t;NsZtV?$3* zjvd7VV!)505XA~CiMlI=I%bEAS7x`6AK=A=03C@%d7c()>YJ@s6syEUf#4sYB(g$A z^)-{?&ub}u)rR67WZ;+-a#wZURb?a8~j+9}~dwR21$o-4!`Vc^Zg1-l zg=Snm5_L0X?vWU@8i|&SJ?BUannt2D7i}Qknr;nk&qB>N0&dxE$;hSjvSc$gdYmYf zppH8Y3@^{1HyAiQ_^)pik@iuwT2$g|gMC=e>$393N?a$iwatpDdtq2D^yo71eLm3^ z$!phK_#u3QxG~h)f3ntrKJ}icmWu9tRn9FML za@hMp0uQfW$kCav6%A4MOMFq?TY#xH-wQrkl)L2Yn}f-UOR-fEHs}8r%#1#t@`<0k zoMeK5o>$1xiZRR!(_z2;2JkMJkU02`Pk0=7KOS4kR81LOKr{Z2(obYB2PK1& z>^ZmlmJ0RKAPtF#<;kchsHUR!GqJT<0!k1{nQolVG#o~&0iF`W&=Ai3oEO`?jz zhOl_<#_#;-iiSXs744JI-pDMuEJ+KEyJz|l3Oh>LHBR31B(MxWp>h$s)62h`!RXnh zkos7M13&24g@IS=^l6m3p%7;=_c-pi*xRMLXuAmhd3thOboXJ`&X1neR3EwtN6fDq zAlLzXv^{=nCsN{q{Np#EQek!Y37zMc(G>$xe9ew>!wBPstuX!p?0AM7KbN48qv%p&xE27~!5 zx=>?z^P%|1)P2WUA6xuK25Z)zpnJ^dD728qGhQ(qK>M4Ill$HcLU$O1Fiur#AWEau zO=mcM{R*wHYE=hdK+TkauffGeMtL1$`cJ4YRtWmGkLECHQ4?%4Tv2BkBLZuW!UO zCaZu_CV;Yc05!K+ZDAeu=7fvb6hHE2C~L$b4^Tqx#uGM&v#=v5kJjjH(A!ynRI=Zo8 z-TdF!$Og=P=XS@iWJ$x_F=JqImE`7+=vaF9G_!(QT9;ilA*aXoV0DOxPe`0 z@N9Ahn4g?JeZ~6Bk(5YS<}cjXsIdqPKB$$bwbPy1gJ3HQYY&hdwhULc_VXp5FyZW} zbK9yI-j41tF7;{}d2Se9OR(Ip@DdpawVw^yr=gSh$vWEavM15iB#b~_A#2KxkAkpX zgVvA=bL|vhpbt1nwMRM{5#)gYTFKwolECwrk=qorJ(v$uTbhU*H8_* z>`2HEIY^b#f~f^`kr6zeuvIXblU0;&A*>=Xj^H)eaTdSfYQn5ouhf4>Bu3!**3cP(bVNdvob{&BhnM}fE z#7*9bwFX~Zg5n@3E(@yJ2p|Mx0_$FYx?a5wtIv|@x7}s0IVk-8%o80+pc}@Dm(jJ& zBC`l_3(Z5zAXjk0Z^`YjJmam_2!T~1YcmP!3sm@X#HXJ8nV+m6 zQz*(@-w#M*mm3POKEvXJSa?yACLl8}Im{Ylj5j4jr*Yunf<6Un*jN&1yECs7%aWTu z2SYhbOucxWcwfG#nv*vk1F1<3K$AMUjG_dn`QmAIN@YYEDE1}2icGyFnhG5=I~XG8 zh#WzjJov;-lE@2ObYT|Bw6TGz95BK0^H(olpB}zAMNasJkI=*rK&fGXvI;Z5dM7F; zW>+&LI_wgK8UoPX0CxO@aLXRNii5EmU$Y!%DbcSRNWd;m(7es_P>;MH_I|1lyt`cH3?vPKTw1OB5e-7vPwfPS&E3K`KOtJ*Qxln5`YYe!k9BpotJnKhn8ATpDV2Z-g4P;ao zn*wV|C}9X^W8;YwsM4bYLQ$xDAelf4b;$xgOW*wNjVyR73zn=8fn*xd$|GQ`w=+?6 zAc8}61)%k_2^b3}bf!<}kue|f7~RpZjLe3b>>C>$c%rFHiU;%p? z#OmIyc(?8qIn<^$61B=*yNCe;5`=xLv=ssPRTQUg*a1!CeQ-f-Miy1IL;o8)^nH{P zLbjyQv`gaQcp_!PH*OMm2~IJ0*g-2Rq!)z=PxJO7Kx0-YVRBNJxDRIVwgLUne~&x# zzLrxjc#0lbm?rwsse6I#pSr`OgZ}XMTsMjiNIJpF0`h7wAEtshXijzu?creP0JJvl zlJHo4j(h$QNi88sas4dBRf#Ew(W3xY99!=o40t2yCO8U2QnSt3$XIi6^EX`_v65JL zt^+*TbFisH-Z8AM?=avCmfIP20sWTP$qq^;VKUHCu`Vkvdc_X)~YDYd+<27Lj0A+r*jN7Z~E+fDyP% zW7EwK&1$Dy0tYKuB@{~UX#BuBhWV7Dw}eI)r-PaZS1ynu7c6LPmlh)+zW6Z|HsLgm zJf4uNe8NAZsuvp@cg^`n1@E@nNjnlQq6OJD2eRz!#wA#*W$3ji6_Up52w2@`6wdXS z6_h=@j(0+s&>Z-2@=Guk+#)@zqd=PS|MukN3-MGL_peU+;sFjQ4GHoaaNu1J$P>M= z%Ar_r2wF-GApvAliPq0cQshW&y2hfYlq0k(!88bicS5yt^iZs-%~@H4p?QT0W^~2l zlS>|ksPQV9P!t!LR9F>FuL_i;fFSKR?>?uH+^QjD~KQQ$g8JGDQ0>xInd4!v?rYx*Dkh6YvkN7lIPKYUzmP2FV2{bTUpY zSAga!<;z$Vi$e7#NpY0*Oja6J68PM#i2f-sg{427q9_vtW|(7WpGmbyKO+lGE@-Oz ziW3!a?wV7+)tn;CMzk6~PX@{Gui=X=8()ZM5k$xIPO9y^)f3RW;r#Pm|cX+_-cJE z4WdFf(b7!}Ya*YU!@p&%DST9-R`$$f25l9fkIb9JV!(x%)$2d^;0*_h6z3@p_BHD> z-@WdXSNJ>&$OR<79Xz2PW16ZI8bhzxGcsR6#by-lUo=l%{-6mUzP8*Mt}pPL*w&O= zYFp@T25aSFQnG)uXj39_(SkN!^$;B=pZC4F6Sm$d*fM{ z2Gh_CQ@nRBzsxl!M#_i-#uFUEFlrKAcj7qI)}g^2?a(7o#r%E-lpm))ifr+|v^`+A z7!5kzdBD;)7%n0iHnn*6$}{G>ALXtu3>1&a8zb!-Us4rHCkqo3mZ|R|oJX|6l$WZG zYHedfp#+ongcHMb*&m}BneN)q{%#idS#VULGh)ShZK&teJ80qe&yUaH+W|XU`TOj1 zwvvUgP{~TbcRh|run4)ciS(!mimK&rV?&rj&LN5$5ItZJMKP{Ji~Gn8pA@5wJ=vsm zASdkki4f1yEl38aT{j2rMVtf&yWjTBG= z63790jJ1Kc><-q$1ViXEFjyG|Ha(lX8Dw zN3ezn`8;0SyLOluY{d#})nOMjfk7dQawD&bXdkiG+$5ma6j+DaVjM}&n9!myLWz_> zjd-$J&>2@>L~?PJYAp9xO-HkJn(8%{4A~*S2qqIWhG4bY*g!VQ*>>f%88Ef^ohm)m ztKxZ1&&16U40olHptc6S+SAHY!l)OV8kv(?p;?}|ZSp-;z)}oQ zqGLYCv}Ly2`d2S?EE30#lr=;3xlU2t5}8I(-(JkO7xBvz?~UTr{Ap+;`nmj~Xrqa+ zTroR`c)izRwL0HhJt%9&wncMXRi}FU@?`mqWq7mfzKP7Pkkt(`dKt2Lewl2FzX}=L zBzxP-++1UoGPYT^Hp|qT%hG09xFnI(ihFZ2y?s``o5<_@L^WV8ETL+$?^R1LuPNK! zEoRGWl_l>UWXEgBidVLl7RZ9PvRL-J1+(7eHIxFqt245ddun(H+T;91WL~Qyq1P_M zTD6(ooKdYVliEUbyf+!t-nOT6Ln6j9eQzo8;-^ZuSVx=s>~Ymu~O8J z!dbl|3*`2)8ufRS{cWMFZ!HsJ&65zTIlEh9R=1{XZe`QA1ZG(y+K{cSX>fm2S=#2! z&UPEj*N}y+$!SvDjj7ABW@E9E71chg+9FB4KDTUY?dGW>V%CU}{~-I?Hf!1}- z{HYGjXf+f|&Qf+CvyAvVzrR1)H1J581!&Z}zX-RodEQpK6iS%O2Fo=E>sKAcvarO4+L4HeDLC zaW#{rDf`wPBvTk>USh_WR^Xyj-S+5?lUbW78bwhLU z(`L6?{3QHCR;w>QtJMuT`v%#oexq5dZbW1TU!|YM_W|Zzl)~Fkf#iH4vZaN4LS)o2vR;Vvw zJL(~u(>&RnZr3GsqijvL;?P*#&kpJ{mHT}{noNA-Ef?4E348&Hl^FlrgXzW zzggC#hiploU$&(Cs9Kpn3&(?k@)_otJONrbJa536BX5D)lu0&Ix&3@H<(_%Y)s~$A z6BHOl^bueKO%beiY5+w}%AXNm{0wdCUKCHrUIsq!uA}yo%@B+NY8rTU_`i5`y#P#l zcuytyM8un>e8wi#=XVQ|!Wv@8@UW!{rxUB8Bwr3UKYwyJpR~}PUuA$#S>@6 z+wco!n&^}YW;qAGY=)}LsbSAnQ88Tk{1TOV492lSZ>3<> zto$B*2V+e8rn4G|C*85$bu;#(#k*v4(ChCzy=~yf%`A9EHPZc45>39!FZC+BhQZTi z`Bs^(s9=}nSCSPC$MQ}MY^$>+HpzP~P%DdDU8^)xdrogJH&b=dxicqVK(c>AnuTqr zcHtSS0W>D<;-@ZVM_93j8n=?3){1}=zlg-~;S)O0Y(Gn-qQnnFahQCLCREi|Chx4^ z1Pw-kCoM6IXnvfK+mei^vy~20MRHA`+tVzF$N5o%!V0Hue8F>IUQV1>F$XQ4CzTMN zPTreUKwUpuv35kCvp$=IJZ0yWE&v3PXUOudv)Wl*|N1PJwY_4mpl&c4tp&+s7KUq; zonL2B%%DS*8=$&WCr6qz5J)iKJ}<&E2Fx~+Mb30DqP0iuwy7Vr1= zdQc;c5C-m~TI#JEqlU-nUW2vGi3>5H5@ctH(Kc(d39d*%GMfGJ%k=@CkflXSNaTZ4 zl(1wFfmH)mshZgv9V4H>2E%r68mJ5vn3h7O5daJ84<=!kl0nTmEQ(yI8~7>)HJ5_)tGz+eo+RUA>(*nxUmMhDLy`^I?+>qsKw8wd*i(_f0o z5!OotDz_3$Shal{5*yVFuhqJm_Y6-HE*XojW0E~`Cv(!ASV^p;D)WQL8o=(~3MxYMM z=n2o8W?6=48cm%EP>z$A5Xl97J-(PkG4CB<(vm*Ra#b8ZMuk3B(OuN_`Z!;M$(nkz z&fLUfD5w%jT~`SYpxLRM!5$D!1Cu*dHWYhR%{HXn=2v;Z6R7xWPSgqbS9UUUS$G6=Iq+!s0AEWA3Q9w4O666TEZCi!k^xl$emyga9G4m`X z*CkBJetDU8!19c$i)nY#f&MCXT+fqy!K1McqWhG+*CYLFg#j;i@u>|UWEq2^LH znPX0lsNC9?Q38Op%Y=hHD9qZ9A_~0IpYb&hnFvNW_B%onom>Ogk2{D;UW9xkrnNAv zRgKG%{}r>(&}(TkTla#hcA}KQV%m-t*i=@fPO8wLZM7`ky^?3IP^Nifb8Z{xGfAo} ztn!+)pTdxAOru=kqtNf`jMHNA@&TY`gKuhP_FN>3XWnS7&gp6KqGX;EtIb%Mpi|U7 zYMotKdWh<0={yb!Svj%h=+v(j$JON^XqzaxWo~9Qd?k`SwVDuUh`%}rORw#cU865)ass^+bz}Pj#|JC_1U|h9^6h3Zl?#g z(}UaT!R_?mc6x9-J-D47+)kgB+sSk{E#G2T)(tER8wB^uc~c!&QUPPW(2#rQl3Cmp zQ{#eJ$o2AYElP#!B-hwye=SPuP`U;&v~Z~9U`dXQ`x+THZ&;eK%911C$xVVS>wta6 z;g*AjaLd6%xaG3KEeFdAw`|SVUsAy3pfKRREnLe}G@Hw|d84Im9mD$;@=)YpTfK*% zhug552e%URF!)k}9tJlLday5+Y-vFcmGB>e9v*@onk;D!l?z7OjfgU2COFD1$@`=MM9^k6GzO{`#Vf<;Goic;oGG z7KD_qjjq&kSrVYh%22t-;J`@)(?4}5z8m|3|M6b$3nGKK0(MeyQ&yMd(8A24(G{iE zhsG}ORuw*FKHh5qP{ef-25gbRROcXb!$hSBqrA~{S8P@q69anT%n#(XVlucfiEXUp19L)3czRR};d;YGozYnau?QL&6dp_{<_P}$2 zrT6!H`+EeSRVy0zf;Uf)Nt4KUOK)V)1~`wC*YW}&cz{kbct#m|MgGC;;h$$wD%x5l z7$6RVaX>@zm>y6W9$$+Vo3B2V&c1`QGwnBnZ|mAaR&ZMV?ttNY`oHSKiOe@G#)a?^ zXrD*puy8C^XQHw(d&5eRnvQ6YLNsL+GoN?VYR&WwxXqs%`Nl>H-l&Ug3rhTD9* z@9^OOrfeVP?f$^ua|VyRy{+Ayp1VCGPiQ&5yEF_3@e)LSd zztI621E1Uv%Rw61*qp~`@+cZ(c)&!e?Q?y`qvBLehpk@2$9ewT@xh!@5Ht614k#Y1 z$R6m@>Uc%2EcR3%S|JjgNcoIse1L^i?d%){8v&C!q>-0WD>U5$$U%ov_? z+wb{zGIqmj1Fm>YM^cIpvk_D$Ht@`z8m>-O-1v%TerO3TmPT6Q9TDt@Npv+~die8I zRdJ0pU9fenpLZlGXgO3!>${cAd#<++`qGxO-`^WL+wRt`GxWS|#~YqT)VIbaY(=#Os7li&-bef{5O|w?#rGct ziD6=qwf#ZrXTF@x&ymvxJNttkeTv+*_wjAV)CuV-(M*k577rTSg2LoA3dFpE*~cZi zQo~f17bR2H97xus#s@6$6xAz9k5u+Zs`Ldb#Adk_5kOatKp8Jpk~WcPF2}e9I>zlK zGW)?S=O5@2E<7(NZ*nxtD+LhcSHXbq3Lzr?p2`c?t}X*Gxxt{HCEV9H^ob_j0I*}z zkh_Vxv`-|CM+II&L%bzM_#zSxib&-1pW?M%9{Vmxzn=}WOQuMM=CJYPCF~M5d(8gE zWtTA@k#9*N^-{;)_MB|@9HQpAI=XjZU&!<_mKE>kBGXzbbe-JZGc)kjn~pg)9c$b?EHOy zoA=y-Gkmn;JKKAM9cO>E&7DWPz1^KYDE~d)Utonni(4dd=Owj1ufoG(`uz1Ftmmkc z#2}E+qsP|JDgx0U9sZ^lPs2$Ab;;9CoInzw)Nu zG)^{uR-Bt`D$gCDA*Z&NyvG*bqSJa!=tVRiRYElQPA)_ zcrbzXiY25(yAPV6H`>|X*&n%%ySKIFY!8P6XTLY}9e>*c#olvwc6z%D&eQ7o`I)n; z!6gTZFIWX**qNbdDA1)M?x!>k^2*;7*4X4$mA`D=fW>GhzY=YA>Q|y1%RNZ_&vhCJ zsox;ZN&MnwHf{70s9(+ZgcWNAGVe7ZC?Cz$;kH+yifRIU4mZ;17FoEO7pvR?WeBq7 zCC*lB35%q18Ho)QV6JHZ9P~5Zt4Thpda#w%?C=HG&Ii0$rwVf+7h8kPRVdNcN(T#7 z%jJsLm3wT#s8FZ?<0N&{SyJ1lrxP@KGDo0dSRCpOu}Y`JFdYH6Q#pnm`v7z-1ngL= zS9Hr~$A*?3XY2e|SY`UwKvp9CpkPQ6%x-S+B!?^OIa5kPi z$JK`5i-91O5+UgF5+CvVC50+Tke(zd!udJy(@WVRf!peLcM$SNT8)d1okpn}E~TCQ z?pAd(M`*d0ni=%%?Mz)DfZT~2(%xyOsgqm1>4&Pu4=2$WMo5l`i9o-iqb33|_rIY8 zNONF;idP(6J;U8PY6d>oQV@!EC95INese9^0Nn&XaG~{-Y>O3H`ep13#KpeujR9!Y zjksR;PC8O)EUT;EM6x#G|FHm}o#WyT+%iu;Ohb3#%Hf1p{KFL0H!7(}KbKR6!fq0| z`5_}w61w=8LSv$dj^{B$dHiU?p>z!O!fWy%qNgur^0vI37w!oMMIpo+7>yffl}pg9 zm1tL)#Dn{J=OUp>G8nyrgacleM_xrVX)K;jeF>+x3DAc+iPF4p6kF0D$YNTK686}9#eh$r)Dar!^*->prZoG8 zW7i1*dd-EyGe-lU>Lm}SRKUeh?q9^cgGMM5tR=9{jCrn)WA_?|V-m4(gx%#J`V$w- zmr9KFsEjeU+`ByPxw|2=sZ#)UGE1g`7eq6&6S-11=PTSi9CGwLOV(HLt^UVeDb_?p zhm~SYZf)LM1rWhmzzJD=OB@W(FYQA$sz{vl8n@9Pwppk*cm?D z(aui4?+%8}{&2MGZ11@oru^=nGw}PPy+`}r-f-kDIOVIS`e)Ah4?f(*+UQjIaJL_P zxQi?x*kO{EcntY-o>I(AO6_d9TrKi4O^G6ZF;WfPNH z){bU<;&$EU3%F(<9Panl;U0oD3wE$r55R~l@k)W&MV9SKj<5A|xASo0r`qnBy!_@rw((-P*vJJ*+IA1C}u9*0b$ocB|rVY<;ifmd~2|0jZc8DF@Q;1|(G zwkBc+v8O<~cbv)fnH`TQbo8l=X^r&@kqM=`!J_-JShCqSIfqwr3KZbtAcH<}dW*iw zZS@9NALbKDx1WL}7zSaGUZ2U$A!#AKP_=W%`Xp1R*%BmA{|qCEr?omNsGNjR;cR8S z*qB2A-Gxv&E{q##O*v1ZO`?1fY{V9nNTnqrK7Y-f*YCGvEvQimKeh&ByJ2Qx^XhVdE~}ro6YYy1z|# zUVka>y!m+j3GHp>&GO{);QkYLEcaiD2g`n$oOfql9+#l&Sv!wH(ZIz+jL)KrXkxWT z^;>ZbmZk2iD>Tn4D~s3G+S30}k9>ub;>nBpYENDiBhG|L+-wsolD0R6y(o;t>HdqD zbE#(CiFv%_=$ms`2i5pNHJ)2JxT$JLCxh_D$O8+$UZ8=?BeG_kRMt zqP)#w0c@#SSAlv)S?PXv087c7%uhAX>sg-46qQ&L``X$@!6J<3lzs1&3ra~Xh^*X$ z0Z?xMn4{9(2>1dOeyPdbiB5UHH2uPcfl&PQw!wYX|F`bPzC*KLza6XI9^1{uM_+yQ z75g4Dr$mBBDCi$xiDBE==;Lk`(GYhHB?oP6u*d9B?q&*!!$Nn4iBfc462)x(jCTL< zks1q1PRB+#RHbdI{0WDRje*fV^Qfs@>vDVY(oNM0S>E}|L)-$0ujw8M0-*Lv2@ruk zl_W6ZjNIzxay=8oFdNKRLhxK=N|u5))NaToz*4EoHH&({GufTjgs9wLh5i6y&$voR zgI)VKEKio7Im%<==Ep#WCxUnc_bQ-wB1I0sqK#6#iG)(=1ens7HcIh2cM>W*9@9CO zL}guvIrlE#+{tXL+d3Rac=Tj$e)9PUG%1svItGH-ff}5qA0+e01i@57r0?bW9gAlZ z)f`TS0xQ0ZFP>kFGZGnq;9m~-Un`NCPy`H6plZ9Brf-)Wk8JFN@bE~G#Lvgy?&O+9 zP&TF(J3w`^C86pBPZl9VQrBq`!@nYJvC3*xi-y@tR$y0H5_lNe8TNJ^G8QSepn-rC zJp$fA51%CP0b5gM16hTKGiVz0z$C9mizqW?j-JdsJhxBrg+}L z8k?l>zabuuM&&newLWKNZG^%HRAp_Q@&Hn;#k>ah((p+rj-tWxk>s!7;l+%fs**2< zs7oJ(pv0(lXSof!&CMFisY4@HV2+z?Vq{r0Lq1AHQq8qIFH-_m^XV<&%a8Y66%wwAh;zC&2zBPb{!KJiroV~ zu8a*WpgK=jX>-*gPj7A6d3tLx6Kg^4MO^`{LDc!Q>Tv!YPxU^*+G_s2&Pk1BQA*=0 z;-c)FOMWh}*3*DB&H!d*egh){Mj9-rK!u(u=rk)X-Q*l~&NZ_SxvdPP!5=WGp~#5q z;t8MkNv3q&tVP;9Nx0lQVTJb0w(8bTwq{UaU4@$$*GPQU5x_`=f@aUL*^caXLkoqD zmYT`;TMTtJU^$_uys1%=1fU!X!|oslO%^c?lmq%zD1dK-od@q<#X*F|nJlCECf86W ztCD47mn2y47!7s`$_)*k1g+CTi+To3X?iq@U(xB3HGAJBW{#9|3(Z!wi*j?jLKmo% zn=rR70wD)Q)jL!U?o_r5WsC){DK6qArWswnrhEL)`1!Una}nw1aDTV zwG1xlzXDR*>TN{0pjSa80;6FI{pI;&V&v+FCY| zT(Q;ByR)qhx^Zx-E*wk>jy{FY&aHa-O6h56%89KkLCw27DWNUC43}yoia2N=y@J9& z&|JJwcg;y~wv~IQuyRW;>sH%sfdb;BEV-u7g~%#*s_4O*nrdzE*Y+m}{&@ac5a)h5LFH0$>_ZLQEU|?em_CeLc!gM= zguA&h#A3Z83=92PS%1@iTU>b+A|0cN4*U6%PmW^l(zP!1L+Kb?fuGzI!9!NBCYW< zK~X2WJycv9_?LhBpa0+g^Pky^DAUvnIS6z>iBajl|A&0=hpdvR(RQs{ZC9`V26U$7 zsP_*d>@Gyuz3g^Q86sg(k{0-BkQkX`%~eqtMm!D51tHH4v{=ADFJ>xu3L{}%Aynke z@PeQMyU%kPL+$qgrcRM@8B`slK5$mt(uP;Fe5d5Xvb#_2+Iy7CTMhp$cxo>fWQ~K9 zgIn~TQ1D{O%~SMy^d1D`k|e|zB^d9Mk(fT@)@uniSD`d2RytV5qg<|tUAe~=j0%Np z6Dp@4D+4}lxQ(WQ>&lY@fs9x+Z<`#c3 zITCim6<;5#QhC?B%P8R!wU;x_j6Bi|=>&snTAs-WVrCq9Eo%(WnuLZR(&|(%GgJjrx(E@nX~k>c~p<$phw91PmqUz9|E(cZ7;NH=1It&Xc#7 zHp>(#Z#!q7?&SG$9IT76nv`1ii{nHX&|1tv;CcL9sy&6D#nUZT&9eJM_|axTa>*$i zx})vtPH$aoLB2T?pOvE*2l_1`q`uMHxA}MLh0v@_M0^xwY$_eRl`8T5?pzUjYF}dB zc0X7#xUEL^x+pcWraDF;LsR+8c3EtiN~i7qZC;~kp<&!nppLm5=1?@yl2UaPN8?jI z2JTMzu`gSMbz#Co=eeS!l3f%4^hyN)p;m&CbB+`dh{Nv_?~;#Qf}@h{h(tS-T}MOQ zJevj^&oDTs-X)vEFdA--p*0?F3Xn8%__8bXuaCf(la4;Z)wOIzG^n(?-dWAYw0j~?@M=6)JF@nw8d+zx!*CN!3eE!QvBa_8C$OvQ z@Uf771$qo5Nduk$ekBS*0iP#c9MJhF?7`puszCq1uMg(q>8~kk!MA}}77h-7nZ^A4 zM2>bhd4KUWGg>3qr~)Ez@!*0ZdBH=;*od zEjv2P0%DlU(~Su83JT|@wfPr-V5Pj?AQ`@(cwPJCst zOk}2SVQ|o)ZSH!PM(K_`h8)O4*At##_d_~TsZO2?%P$xYV<`ZzVZbLgY0?GC0yCpj zPoD58Mu<*481sXZYXCWxXD{Ep6~$mxnZVB|ZYV4H{df$vSfYm2QcjAH1CSrx-q(z* z$c%L|LKE{a%{{_UqtS7g;-FMY*Vi2W0+})I%wn)e@_o&c*-#*a{SmW2gZHs(vcFAm zO({;xF8lNZtdMy^?Jd_mSCx-ciAosgs=?}tADcwD4Mi!;D%%jU+b$jq6i%XWRz)U5 z1X{*QNjeys!lbK!Rkh%pClUv-(3I;ImkfgD&eF>$uIyh4@d~71RSm)tM)Y(JWRlqw z6}2jC4192peTFxI+VR2VFW_;zl0fTsSkj_okdzjG9VM$bgCv>3iqW!9z9B^_$t=`M z8i$p`7f&jP?4hF%s0*du*!xmJw&HwydUC9IO|Y7<AChX6mrO<58@q<>3*tS;HnD$yjl1L$`|!XSB z9j=D35XbLl5?`1X7C<$+`0e?S?~# z)HEH@NAJkbVKxMNL;kcDSTs+7Tn1+3x`LFa#XgC;Bh1`YE<;O$vs%&%*3}(x^d|33 z9_MlLtE0sXe_Qkos!ljT+%PPnZsp9GjM!(i@7r%UT%jy@tBc;>tgFrss==sSg+8@S znd`l>3lL9_2g6RjrCZO;S6`>e<@=`QOff&J&1Leh7foGVU7M?$`X*M*H9`OmX-|0( zn3iS-{_jKeoai!v@~+ZU@udmc$OxRwZ%dOP3<(eBf4&P8Ri9o6|2=m(;(yHU%(PooDf(BPIcn%b2*O>0F^ga4$@A;!2c{IN{A2i+x}n zEIsKA;T{QXf-YfI(mi1Dx`c(WY1hWv@R~om_b6hhsriOCfF#tL!j-lqYEDUPCS7QCWG#t=UM zclpBP71m4cIzAg&l5O6GMuAL}AN`q52AUOIP%`7wZteFMIpJ@T#v=c6CEBW3qegTW z!o2mS2P5Tu?d*HCwVck%XXI%^dzi2TnwNEa-qquN^M{(%)PFwGrK!0`;nKR`^q%Bd zx6~E2c8>h>OAG1hY%WyO7ITV@6VDPzUzzNII410*k}>jiSo&SHo)!-up~yR?HiDBx zVpw@8*fo0`C8>zi-8m^@8Ih(3QQ;Fas9u@<;#CS!QH!Sd0Kc=k_@y4F>487?wKhvSJzCY&k>vPJPG0%#K*$>sf6FY@( zG#upOwH|Z*-)m0KFP@&o)S^5kK7G^A+P!cPgFGe=iTQnV@)NvD341N&FC9B^CHFI| zt3}OOyF5Sls=Bq_yAWRWaoRdNf08c#4EMIW4tenQ?d)f__6#-Bx(UlJaKxK=vaXo5 z{+FR@SNe$^+quVGZB!Fy zV9rM#e4O$yU~lcUfApeN*|tcE5*@!udt}kVgl!KO?zTDY9z)ps98E$ERA_d&0a_5_pf4eOdkT!4GwAc)E;gc1es3F>xyQ$F~ zr^YWRI5KMSN3otPk<8y6p+ig=y;809V4f8#BzPX{dUgVn?~}Qi3DY!2w)dd|B-J9Hf ziljs^^g#2Ku1tv`z#YWr>>5NU6hJ=;6AQwEY`-Ujy?)JDZ;X?skW0-Ahd_zomdK>I zMRlLRpwhOH$o+=FYuxA2+cm^80NeMPdJ#Wi5qL6m<5KkvQsPEo3_F-0Fl!?!y2*+g z8H0*kRQYMjRHlvyLUq;kzdy@RgW`}yUFH2w^|r+VL95BgkFD3>f7*t;c-L7-0R%o8kSmt=QXjCv}u*nlPRPu#i?qQp(%L2 z!SP7nQ%+{UOd9L6npDfa%I8|Xdtz)64E#w@jhnGZi#bB_-9bYaGz&AHaj5#NX{w0n?s1U9^MiKZ{0^`JPJEkP$dQ^nm~Q~cSq_2AKCq%VxQ3Epd} z3WMA8EO|xFRL}N#39u5e*k|Zuv%OyaZ9uAgdE6R)#(1P~P)?#FWnZeJL+&`j)VN5@ z14)mjTA2nPAh_&hP*%NQ-#jhZz5wcg+;;%wK-tk2(JeE< zM1?IH#{k`=VaD3l#7uT8!nAN|uT=@}%5X6=@Agk1VsBnI6Kul(0=SK1rsF*M#t3cfdhL@J{q~fq1cYD*zCQ0tjpi zS-j2FD|TeYIfv4T7Iaw2gM^NyVG}X8Ax!Bd=+Vw4!Pkw`*)s$sJMQ*0`g%Y|023$9>qaAu=HQ!L58s4fp-tQN_d`ljC9jqh|N)cDdA8EK%{gTRTHVQ2raUOacO# z$`2m%VXYBsX@_@#CUtHvUhLMGT2ED!PcaE!6I@BQsA_o`XRt<$_N}bxn-lFVl>$q}tf892)YBl2m;PK@io7y(YzLxh=7zMH|d--JSbMY=pJ5+!o6=A9uk>C2BI z4L$-#UZ~z$)vPnSXygr%xUh2{>=RZhHvAa3dz#TjZz+4z|d;?=QWSK$CpK zD(%4ETk#*kD!JEwW|q=)%q1msAy1j=hOJ_=C5;W4rUBSKM=%s%q+44)_jk&V@T-ne z12;phmLe9Jaqafw8}>O;M%?Jmzf$UE=)$^bMXHQiXu1fk+LGyGH1VpjZ8yI-^5puO zqeSoAL27|XrW@>wa?mjZU*@#&V4aQfw!D5`SUd))?B2PvvyMRMs3QCn2LM8%SivUb zJ*&fTaSrg0lmUZ|^2)L6m_1+l-;xcgDF*{1DGQZn&eoABBe7AnQC_`IcjesS#5~tX zvU}hJ;}5-#V46kQ?!+)o4Bx*vD!?&4drC<(uYOuz;w(^bL&Asq1sH z$6Mni6r!$w8_xM;DjTbSVd@_=-bF_;W$0VRhEzkdGZ6M>eECqS^FS{4H@E4w~hw`i952a7*?M z!9uP=2Fb*ay;%Iz2im9n;GeZ!TxZ-yjZA&E&~rP>l59~`IGl&N_c`6)rm(YS`zZcP zgol1lAD6o7f9}w`atJU*rh*{iJ>^|7k%h18Plb@x7&5K$njUR}fd~7@XzeLsINd~4 z0wA)O+I@DN*8GGO!lQ3A)agZBOwYEXqD9mw?XDEVN-y7K&PQM8Ado9&V$JwlsJ!Yt z?V}E}7|psmk2wn{mTZd66o@_BKlsYl24Q_r1pPI6gMk<2v+RQ2I5}=Om3LoAOe!$} z&aY~;thYy?w<6oPBc&rDxaEEEz&)VZ4r3FimnJ&9A2WVC_M2ZeY^mEcU?KJd+b&2} zn-^u}>7gu5TcRyt%v1#z$EF#{264p>s*x#r4 zy}$2}5m(=uiU`rD$aHRvtS}-x!=3?a`7*3_F)*Ocv3Z`8+rxNzuJdt3>VkBc=g|_& zOo_peMYRbOH-{+-)f{!&Oc>&0V#0b5JTQ2xBb)}Kiqw$m(2PT#U#aytlP0{zRl4! z{BCUY7-7SAm1y+Z1CI64sWgs|x%_*Qfg)4rwAk8e@oQx|ePZ0+`$t|&xpXq4K*!|< zcs3!d?bXr4E^|#;G~HPbwLigJXg|X}WLJ;br6A}t9MeivVuDu1=D^12L{vhy>>q_@ zdKixzmSWB<3VT(mET{WDU%fbu^oTgZV>*5ZTx%?@F~sKCXp3H!huoPMih*@77v_W9 zKiml?!~Ljqk%&nCdfL69e2`Bait3+b7Ekm0V*o)4NL2iTliY!q5W}>?ky2yreav@BWBwX1{I*Mct=CVA0ua`}+P4 z$~K*iSjt4ZnR1?Uk*Q*jTe7JD`>=a}|Bq<}HUdlig*TbZe>n~;TRZ_aQ22rA?PF8D z?CPV55(SzpTmCYs{v~Kk030xqwfHO-wP_zoXh0o%15u&~6`=Tz;pRr@MSKAdih*rx zm>+JVE{;t^=~w+@RQX+j7h@mhv|vKHfNzxC2J_37DZq3~xCtAo9&iE+GP+%?Q{<#)t8rOxEJ3=me zAiW}<$ee`MR&KSB#x&;)WiLcvI2CjvUqlATZ(&^m3oBhwE74hAujR!B_&+2~+eENv zdp4NGwM=pWq-|_jzBe@Gr+EQXaB7^mELT3M@gHhKjD48##79>(P*rFE@|NUUprKOS zQj>X3f&0d8O8wBNRFse%l{JYHdyUP3@h)TbT$>Bo&wZh|@caUHYl1@DhrW^oqjKuJ zK?7m)#MLK2jp#3TwG_xI8Rye(j`!C#50CH|p63n1!yjda%jPwntjpR} zb}FfCDlY+V*rzO~+!fb#)k5?p*Bd4D{O2Ets9=e)Y`!)-(P$@Ixb!hWn^NjFN8?i%zkvun!nyPYJ0^w7=fa zIp?zH!?eVRo4f3GhqZ;qrp1V0^3rk9UDz5RxMhsqWKp%*=_D^(huvi>B2> zdsb#KnX)A55HXqWIs9nvtJ@~FMQm_;a1$58<@qbg*lm){CX2uQ=o#eJtk^Og(b~<) zz@F>}WH8mdetMOp9%26{X_@*E9UuBBVrTGA;1A|f!6J|H2OwJWkJvTCMbD=De^vEt zj;Tv4uA%vI8_w0A2^~ML;LjE)vk>3e!^l@4X3~XSJkvIu;(n#Xkig2&S_@<=)E=Y# zn@3rx5W`)&`TO^5elQcQ{PonbrU5FvNRbEJ;ZJ zOQW`cf7~W+LO69uUokv!X)VL)M)cMBvgnTw+3&@O^r-u?Y3I4*%j&Zb4LVPYoh93(mCW5W$L9h$QId0!Xs_rGyeV~CxX~m7S5CAF3^dnxd~sV9V2Ppv zlkeBzoH(NC7jocU?}Pmp7cc^`^uH_*kc}@SiMG4n3%H4d)i<`CR(qyl9qqxuzMa0S z_-ugf);G>|bbgl_E<0Vf=IwGzJo`)pI`;_0ptL2F1jx(F1EG zs5Ychz5vEi&KJ`7EvGdG)1L`yavV?#3GvT=*7Y-`(TX%w@dLzt8q#2UX;P3vUfKlX zsK`-esBt}8FBy@b(+A2?&VKJbyj}L&B+$*553hs`Tyn#0f8~Z7o0-%=ZR#%$QxV4( z$Fhal7gw57QAYrs-;@k)7Xs~5T~Y~`R2%p65hLO$zUQf}?2ZV?XXif`YB$b%95iT0 z33i3r;;|%JZXdW)>NH^gK_0nDj+5Eea1#87A7f1RPrL&CD-M9ILBmBvGzqI7o>jL2 zNshSnAVvjNP(PY_PC642Om~?$F?L#`(ibYL2gO+ZhBTpQ(KB1ZS9@y9-vkMMD2+K9 zTo%&jvP~A`h_dWl+XZrp=O^`QgUUq@)|9iqVAr8$k6xVN183U zRIi=d>MCWCyWLrHO!{hgr;uK*l#H*1$2>rize{BTo8NM@mXnw%r-HQSjmrOVZBM=% z1xw8>3ZQ()Nc&}kr^lo@Fhln*W?k@={6v6Fu{Fa29-!`8O6&a|#k~5w>y4v`(_`;0g zEUIT}SFO2&FeRKV_dVf_P7%-UGb;UMXY|hDO_+UC%)C^287LT|5Y|O2x02hcT>ZdM zw=CRWwnw9DopxfSSJ5D0j!Zysm4#XCD9yO3YPn#48J5ve@sQPMf$FAS@jN)3cFT=e z7QuY7I*6P*$$;3)M7w<^c3OetFVj$oO}Dx8{(2^|wHV+pql}njQz8>r-QMIErladW zs=%}WpuLX5X=Lu6I9Xx?6%N5s6H}x?sPO zCf3g(kt8W4u9zOiCEdqs_G#p$s4?}qe4I6psjj^?!~s#waaVbttkIU0Hj9Q@>s8uW zI#C|tD+`}%U#K0Hd-ed97!G=MRz|hv7zKH$O(#uA$8Y+E8kCYSfD^Q~n#v z!eMds-hSB)T$y+~%86pw1Jvx3v5eXtl@ukRaKz6bulG+uX+g68=BQMggDSCanOTR6t$M@C>*h ztE28;tygFwU)*4Ghze!|=Cy4oZvsCliO{J+BaE~K-XnH&qnaNFSGE&tW*Ua#tLt(~ zYtM%a?_8Ru%8aJ~}Kp4^trjSKcjfdGTu*{1mRkq3rj5Yls z51l2HvY4NLzEM4DC|yiyzQ%R-w1x~FkS4Ynq4U9;R@{w^Bj*H8592F=*jZ^p)NXdW z@P5VA9e}K-L&H#kjJEQm`p;wUkFgaBPRuklog1}>OnNX?UFCy!*>4Q=PGF>U(v0^v z3VfKl&XSefCHMvmkLtOYKh#3T$(d5d@lS0c(XKPZ8cBvaM2<4krm0FdiLu30@(o{% z&7jNngMY+`m;QtgL6)yRzG|Wwz}vZf?r#eQC7l=-9rJp%w|GJG|FvHV`EGA3pDr80 za|n(pxUFyR;8`XOopyFTqnAihhK>&!ayevedJS)h-H~o zK&e7?VZ-P8PvUT3$T#+oznoX2{Kb6vmqW(kr|ik)M-q%1>FoT7T9SOo07+~cd5*09 zH9ZP_99S0Vroi{W6d$0~Am#Bnd8X$ixJo|mN2-iBsur#E&k9)QJjKd$SNuygz|6K` z7qPd8m2(lc8ANB=nzIM4LX!QVd{}`-%P0O5{Hr@PrZjwlXMwk(mfF0s@L%FCqurgK zvPQV{>(wJzp%4+T-r^G15BORVgd?m#1Kau^dyV-E8oaZhOCXP(W+)l#*HHQM44eA* zKk#bbWZ%wKJl-Go1%puNs1(=#s}=XZXU-d6awOWcPRkK{Mq;_OfxqK9K4)n!HVLen zDC^Cr3}VvE!SQNwWA2lneHu_6_F$Wd)I8p2fe|oCgvN?i6IF1z?;9~=#xN?111B00 zNI*)(}1ZoVpqz9@gl*t@*1wI zo(_g~i@z%|m{qFKv8zckr2%wodQjn-*Nf^>?mY7GL}7oEeQ(gi)fFsrS!V<*NISo3 zNSdo=HH2t5o%xnh>brD`i3w@9(}R^$eGla(%fifS{^2kQu)%f5Mk77i#HJ-|7v2Af z&EuqnUc>&(R^vpWFgh#QGMWV-P~F@u^LUTb%5OJkULo&l9FN?|&#SX}<2^Y&yosa^ zqwj_!O$jAVCUIipLx+o&4<46LwMtB zX>V>WYIARH%~@@48@UnwUZDSh*cPy4NGr!c(ZXo%;IrLpP^V|uzRL&O2&mnW#F|U) zkz6TCn*ZJza=9;(9NW2bP{T01+~Le{W}bQBe){7d7)$A+Dt%i?Cw?i?|5&a5 zl#INr1y{KQL$cnA%xJ4;EB<9#>E_LW<=>~$$uBcoLQ5-zHO{y_$r+Xx2UF-1%nbD zS%_@oPZIu)uW(T)kP|c(DmgjVb8W-B_wik7m-E|XC33ew{(t>T`2nSXm@i!O_}#6# zRr~w@)((#L_u2dF1sGrjU$ZH&n|q~KiV15guy=!~Aiqc7*@>;CSS>3$j`h@mc*sgH zj-#*CoH@h(W?;f=C{W-`qimt9<5J?r^gStu8nMQi?Ce8^PM!n1 zf~+#at=Vyv3&+s$?8G~#GMt34H_FmUEsOdg4VUYWU|S|yp&VdYZzHjidT!aw=z?)( zqa+E+lD4JMOObm`g9O^aG47mAgE@azIT*R7!?&tmL$**FISW()U7Mr9!vRG{NyqQ; zHD@`LfLv6zX0(b%m}x2X${V!9Y2>9_UEpbEM2B{5_L3yPP(mx$E)|O1T!c99IMgGg zXb|IZSe2zVZX#jM<)ntjm{z5SESF;pI}C#%Lw`Axjxxv`=v9l*BuPBaJyyBIr#V=E zK%~PPyagVJRVV$l~(s>Y5#2ylD@CA!XFY zAwZ2Q8;%$LjthTFoJF2vUW)G>pW4@@ULoukAmuRlvlgzDC$xl=S0lE+ zf58nx)IT56^E++sr&`~K7211qPHM4&BAZWj8z8GGZ%Wb3mN9kZ1_v7?mMQIV>EkF-1?i&%Hw>OJT)SLaaUy zs2&~qqtR8lr9Y>{a`r(W+7uNxXR0ov_;3ABWZc%bCN#Q*PGR+=bK@D$kKZ*%>1yTH zCG=}`6V~amDUM5lm~%$U{w}TMwV+cZK6TE7q$(*kJrx)BYpfgb>BI91xHelWe znAQpQkoS0FB?u{txZliu&tL|a_~&jh=oxV^OzDKf(ZTR8>6`jjEP!rTkSsKH3CWLV z*Zs)EUc)WCM3j%=G3bI51&MsL*FnQm0rWj4v~k_#ygocQJQyGRZG7-*4;9|!-A1Kd zUR*uVfhW4a6q}wJU7lh$(4&@o3X;foM?)!bWuavr8n`R(AFPBAh~9{T93|$|t*nHU zOp@QRx_3gN6A|{AAz_`tR>s*apL*ax{tK7ra__)`mxB^arFsibHh{4;|U+qlzyJ5Ew*kS z+|yOQM(Q81aNTch(PgOdTZNCroXM*d+YH>YOzKy>~IaM+c7GYu-T?J&0*Mx zAYLONc63xN>Qi<+Lm+jg3NP3;qe$%i!S~UiI7V(5S2mQx^3rzT^Gf7gWxk&dO;3A5 zYLwHYZ;sEK*4bFN>pu1?{L@@I_Q*F+_vxcySogLs5Pr3;-y#SD%O((ER~)W18ypTp z>NIuZfC*n&49B9LLLm3ykTT-Yyo7pC%($Z2if34KajwJRF2-4$G*7lB%=qR^ErrpF zOnOd5>t7V)>>riN0;v=@Dcf%!PY9L!!x#2WLPB=Ct&PL2(Wh3DOza^VisDwFdM-G) z6OT9|;S^*yM#L~2#(8N{GaviWFmisx*uBTjL*scrQa-Vzs3&nyr$^4Bsi&K zJA&CMcCjZ-f}?4KddwBSiUd`P-WOEOplf$TsE$gK%ydFRcM|D{MPUujxTKZ z=RyAW0kx|zr3o(M?a!Fn1`qM)LHk+e{5@O39rvGTBdit|Ml6K{d|nB+V3$7}pRh6e z$@fdYrE+`vtrP7;rYC)Vkoav+uiS{zm}W*Shg{%*gCIlvH5Lh{#ulzAsEAO@rWKA- z9>jbJbe$`T5?ee158aq5t;PsCm2;B^`{h7)o?bELi}jWWhi#&A)C_dgVtyF(SptR4 zHS&Rye>{CF0G5SMj z+LXO<7<;yqd>sO8fh9|ZvV|ryXp7c({qG-CS-26p>U=1{q*`J>K#;N}WMU>Vl3ojK zW3z*uQK*d6E7OOB9UoczjVG1^JW2D7#Rz*}f776U*YvT)X{@SSEinB&FL2w3wlfR= zG?xqNlz38h0*$lbe|^)(yV$z6Z}Y_zibHBlxw#j1hPEOPeTu)k@yD9P$@D z@eIAoouqfN_%P^^wAXM%vqM_ERrEH+KluAUP)h>@6aWAK2mpL?yZE$R1bY(7Tb8l|#z1wo+$dVZNK4$X|ao9)VWfRHFJ z)!kIrZHnyfIaVy=Ac05{r;v#}0J2!@o-)&e^d^~1defL>BR%Y{**@*#?(du**!hHY z_qZSc1TL9OvRKv3(}$G_M0j|3czC#bczFE!*MG&>%I_2Jl8@b$$86;?O{dA@%}w#7 zJ9a1T1t0TC+I4@K#k}i9WBD%G9Q6A8PH)@k^*4P!4Wnx;cgn}p&`o*wPf0ZSYNbOB zc+n(^g&h{3P;03Nxs^fHRE=<~pfqa+%o%wfrFI*sD= zZ^!BxA|!xNGh;*{!CEI#I7^{1mP&-!D2iDI>*)vY(w$szcEY_`9HiF(T|av{34;k= zL9ibMhEq3o0ZZtBfnykXZYnw?AHl=)ddd-jB#nc~g~AOx8BCt>$whhzZ~NI}pO4&G znEvF3GphF{=1DY*J^o!B&8BPXUDe846IO{}5?12H!Bpb3@*+yvEa85K4QDBvaPD)T zr4gIDNy6NC?4;>Cpih#re|RPvaZWCyS?D`Z)%k`y-@CEzMNsV@x{UqISujab?)nIo zrI(!j!&MZ&OQx>J9fjsUu&c|!yJSJad>#kyp~+Dkjj8yvL#8XND7-(4FCWz?mO-|o zZ;_C5lj{wzDKxmY`kG%5=R{2KHA@sTsj*3z1I);gE0D9We+pT69C8o8t#&f5SzA@_ zSJ&6yHupW(<(i&Vb6cw}|E$_$6F`)v$g}8z9ZuZvIt{!8#*)X}m^LRczhG*FIJ^l@ zXVcoQ45R2>-$Bre4WVVaKI1O%>nmWaAms4-Do8Kc>u(N^VE)Q!+c@Rg(dLDs2y(9K zO=EWl%k8d~POtg3R5CPI!q%tbeYp zW(~ZY@|fnf8y-)R;Nmh(HucO(Ry)j;0~$050@dIwIEp5t;NsZtV?$3*jvd7VV!)50 z5XA~CiMlI=I%bEAS7x`6AK=A=03C@%d7c()>YJ@s6syEUf#4sYB(g$A^)-{?&ub}u z)rR67WZ z;+-a#wZURb?a8~j+9}~dwR21$o-4!`Vc^Zg1-lg=Snm5_L0X z?vWU@8i|&SJ?BUannt2D7i}Qknr;nk&qB>N0&dxE$;hSjvSc$gdYmYfppH8Y3@^{1 zHyAiQ_^)pik@iuwT2$g|gMC=e>$393N?a$iwatpDdtq2D^yo71eLm3^$!phK_#u3QxG~h)f3ntrKJ}icmWu9tRn9FMLa@hMp0uQfW z$kCav6%A4MOMFq?TY#xH-wQrkl)L2Yn}f-UOR-fEHs}8r%#1#t@`<0koMeK5o>$1x ziZRR!(PJ) z(G?AW9xK`>p}mn=a#@lV8h6k1BNTR&v}>Ha=Sg50enRCUcBhwrH-pi$O(FHM4hMeF zu?qvQ*6GtIbweS}V(xL=Z?U&abP{|pB6S#+Vs^5#SF zkE#2Pvp%-?j||qVKSB4H(NSn2jc2@KIDqyyA1C*{8-(sK2w|M6)|QlEItMsApJTe**RBw(!`2Z^wCs&P2 z?*M9Uv)aNs?9B-mu_=D!%}~~eMINAp+>Iw}96@n+7|l`x1VVnhrmQxonRIje$D3rf ziNDS`ngpOSZlZw(*uYCrs#50)H1p^x`6?QwU?n=4LLc}JOacemSYL><8;N-bOznD7 zlUkGm?Jw+N85hu5l1Ag2C9|G&mDZB6?azF;nZU$MOx~&`Q$d4#T`kOjw+c23KJtK* zp`fduvcu^V<7O7()j|WUnRTRUYy$HwS3W2rXN|iv7&Pj`X7<(fyl6H_ZW|USfz}-j62ThPb@DOzg}tG#Y*JoZ68K4F=U zaATv!3NXgLR*Ke6ab^#Ett_m)K60osT-n;smwdv6gQw0_tKxP$y2H4E6Bb4nKyn#x+W}cRy{7S&PJT7~IQS^~Fg#ZQzH16@b=isg z{+8)?6b9ZqTrMzN1q0Vp;O(;sd%{Pw(+IT4WD+hNZt_m7FZk*blm$U?Sy0VJ03jd~ zSoZ={^y;-&eU?nW?Jj%GLCN=Lp6Eyd-7r?U5?xCR%OV6VGzqPNEWt^>CAYou%(hxH z@mGnI&19=DP~o=`pL&vK{;+~zr^6C8h*hFgKLXlo4r~*q8JwGIf<`Ds;*00EnC;as+Ym;1f4VA}?^!Raqp{#s;cy zzy!z7U%h;NdidfLIpG^VLQ_HjrG^2@DlD1RJ5D*#x|$);VV5Y#5P-J&+3^#?Eqm}P z4#sYL&3@q5Y|V2gY>54s2Iiq0O@{Rjiqk6&Tn7K*t8$pf#0C1$S&=oA88Fyg5E16E z0~B=O1fZu$?tIWp6OZrY0qL4u<6o);hpp%%b9ln0P z&Qw5&5KKSP`8`}3czPN6B#otb2GL-O!qE+6R2Q293rQ$m2xnvCi4>^Pa|1$AsCXcm zKniuq>OD)}{O*k`cq$8)EDnKW8qvxlV63+@OLV}2Lv;n9^|J{W2q$!QPw0*@AMqI7 z&ajNkhMMdf8y$F}sZ5Fo^aADX#)djZxv_yg0e$%?=vA@ox;f_slg4jg42(&r3JKq0$TDEiT!Tp>fd$4xWLI@+8NO_LY|X zC{Ltji#lq$&hXkHjn`ad3hVk}yp4ebGxA1|5?#dV-mQ4I?g=^6<~0(v$}PKy0Rs|* zeXFz;0r*uEr*7B*P2_!WL2X7BRkh@yol-R;2Jb6$!ft*K)BCA9d$##a99<!PA`q8O-f$g8V!=!_L z@Aq6cicUv5smcQKWH2A5f;do4b_?y*V2A*;Htv$}SbdIr`w>YkAxUxlEW}TVDTh&_ z09PDO?;s3#Bk3kM3Pe(~&DqFUb8+)GT^zBJSa_}jIoWftsYBi|tgi1cunU&k8Fm4E zmDtG+N+w}4&{DB3D=y?6gqiSCjHzYA0}Zl{JbezNlg$9_3{HgNz-z?d>;j}0kFO;I zBy=uF@=HE8Bhh-Qn8+7Er=J?^mbR-UNQ_5Uhj1K013Xn2D~w$x;kb8W>KcuP`8yk1c`9}qhw%Rc} z5-y?z*)|8V?BK>FSgU2|wI~&m#_I@J-DecG^_UfuJ-d!~LYUAT_;K<}FcsV)y{V%> zn)3hl{d2 zSY=T}C*CDTHSI12>9t;FrNb=vUzr#lZ)`UXQpB*Uf_&t7@PeD|Z= z^@V}rF?nO8ed9~2Lg{2-V!|@@U4-+9R+#cq)lsc&Y$%jq@}6*Fm@fNcG$Yep8`|H^ z0zV6gDs)DySg#HBoO%Z>{QmjzIea@{XDff7ea=?05Ed#~3HYwZ@dy?ncQ%n8H9=9e z{B3LqbI3VFaRZ_U45BE;b!c%Px#5#yw6Q0fln&&CJwFlRS-J&@W2k*}?BF&Tjxiv> zlSGfURHzB6=@}DR6hWfG&u2PNV{;KI{woX&M z#*!gB` z0)oiF)T0-zb}7C971H*&;&`P!2WhT|NH8$sk37%Y-gEe%KXkT-`#op4x5b@(Z_nNJ zhW$tWU{p0XR^Dg%9daoOO9fT#gj|+}%F<%nuTIa>098uT8V%4mM{P+*V&85SnFM~R z4D_wy2$ci1UPsg@9jW}RwWo5@K%4|@R~mZt4ofSA>jKu0*^u^JNu?2g9Tlj!337hM zD-XL@^;0JauO6b(NwBImY>zDuOOFZR@NQY$pe6SqxXrwUk#0ZMet=aRO}c3c1IrH)17*paekqCVHD zs9Pe_DC*mb`Sv1ydE&iMoSHukjYL0}UleUL5tb`v=Mb;=TC7&*b*l$u&CIrFF01O4 zZeN}(zp)H&mfbgz*%h+7K}Ih_HqS4UP4QPDgPUY;dzqVStWw4{%hqO@dUILYEDM(; zl3HE$(L)w{*4c&)PG-GeN64cYI?*3tsm?iS2) zw_tX=yoOSscXj5qa!(BpL3^CPhzx6WB=p*4QmZzzn=_}?WlUR$j`t>0+S~SYZb-OT zrtd8!So~Cp73*kIpCzt3J6wHMxV$-6p9QW}_BX3{WPu!BR-^uovb-&n-K}K;ta%b& zHD_^a%-+_NwXJOWmcT4)L>scQH4W}>DjVCpS=era`5LmVH91X+yD@dy)NCwPvZC5& zPg^8;*XNcst=&9TM9dm7@*iYh+h#{wgs_&t!t^uEidN)s^JifpZ4Ov!RAwHsoHZwc zYTLwZWI1aQPiGgbZQ|$dO%}5joSc0sI)k5^XDfTiQda&{hhwxFiX~?wyN_AOZb+e} zW*fVYS;lTipWDqQ_UW>SRRkni!;$PHoI4h()MU|dQfOvw1;R5utPk10>au^$P3wm& zU-vi5*X=55ZL&uQigP5Gm2)o+_Fjaj#v$!ws$wp4z|mi3S= z>po=5TAXpeysTKayFx78g1&i{tB34X5816+XSceciTG)=SS^0y{ULkR7oWZAhMawa zELFeJ>{K@-_*_}27N7ZI20vt{k z&K`Bc@ws7^sCzR?_aZyg4aZ{9EKoNcgoo@;pDO#)m#`i6khN)^tWCG;lDbh=rdx4n zEtY-hlVn}Gq4fS_*_D24S(R=$PPdgk=^<;KACdQJkM&&LV$?~j3WA|uYslrP&+k%A}8g~ zf-innHgzwGCt)uGA9&YM`^jbqMgcVqJUirHJfdCzCOy2Tl6)e{O;bK&lj?K21xaBI zD`a@6Qiafo)liZzhnt^2Bhm~?Ls=ewY)U8eqKx8+GvRIc1v5%?N(Hmr0$(;mRp!pH zXQikZu6!PeN>bZXZrl=2>wSztx7Y3Gh&2Y|SfRI4uxeI*kG_L3rgziX3&fM|Sns+S z`_bZEvN`DW_nqE0@Z)9{Jfj-v{wawjU*(s2l|{qg>9TyQOiNU-%knG9iiTr(rv|pw z84{c1Jr}5z#jUPYnyEdfx0jo#y6D^)5-Z(;+XIW9bC4bnNpGAhoLw$K1UO(>MN6XR&as_qrj7v7)CTdPRMOZM%39# zhp8gDCeZC^7Q|!ws6k(9~WHJlGwaU(~vnXcJA<6+zU8<8KO&WNoM4alQ=)r23EZAMQON}~`r3~LG<;CQ$=9vwL@4IRN+>jgTe#1whr3P#DHDj#)< zJR_eM;TZ#F8_6PPx);&fBY(Zaf}pwr^fU}cSRRY_dwV^okwypucTz3&){RlaV{@;; z+UCTC7*GkaGsI|{wb=w$q#zm1e);A408hfwq9r8q!6`~uGKj#c0jpHa?2V3*H(-Nd zJ2(wgCJIbHA=3qbh4lxMFj-N`Jms?!5wl42VryB0xER5zn9xi`I~8eF{BDfKdJzdd zx(8q|hT$rXsA}v$y)C1I=Zt;hJcV^6k?{=#1^?+U#Uu#pB?6UO2_~%E#(D|8rz+V3 zCZouP|EZDnBC8{FSUB#Ldu^s^$QT1%TVj?-mmRhh_AH=S{OLLo|)1&IBmO$xDdj zg1#PKOrn_g4lp@MA7;5Kjvu2!AFJpt>Uw>gufb$Zy;)~&;xQCd38kp3ga^>BIn zZUxdXXupq9^{OZ!n^K8zgxt2R!f$$SNw&*J=ZTnkmXhldrewdoOgmtCM%Bf%JLy1w z6+5oyNxtCG*auR+rUOH?0}C}sk3C1#d@Xjb(2!7bDVxkOCr4CnZObSDK-y)z!5$Q5 zZATFW-f8l5*sBwPDmuS!U?9w3)4YK~+0Z z%3v{VM+vwy?XZ+G}ccPtEO?YH~*{;D-9_-A@m0rw6ywgWKuB?eySwdT={ExSbx{P7iLU z&&us&x|^17F)Zt*m4yw0`{lf;4lJpFF<)rNy>rPd?uw~#!7Su@dAR{S>cw0WrbU| z=Ibvh;BrtHaCT1uF3WgPt%rciCJAb-dgGAGHjUW5-VGjVE2N_PdC88=6VDCZIPXPV zhU4&_IRmM`<-QiK-zl2SW!t>b(zcG_eG7Rga`O07siP@UZQ$)NKcx4w&@q%gpicv+UhXwjSo1G)%SF zem7!1_-ed9j}3|%?ka9ksG`}1>zB@ex3Nu8L-09Q;pSQJjDzxkR|vfiLVh8$G`{}k z@Cewpb~b$Gdl+R-{WQB6<$0acg(weparJ6g1uEkwWZgw)p$4E7m4t4BwiGDIn||dc zi`K>MzO~ZLlR={SvBP}sV_JHVz`iJCd1huLc(v_t7KD_rjqcQPSrVYl%22z<=)g$? z^FMVbz8m{u0^kMS7eoee*XyL>s;n-{p@peOqbtg-4~<>mwJLnde7x8Kpose<4A>%t zsZK)XhKb4%Mv0^8QrN6CW(M@anIFh|#bk72$lvo&XNRX;m@F6%W0kZ&l1X9>nzXst zxY_qvSO!b%gaqk3$gPzgKoxuKKM`!O^6QyWtIt**pRK%zQjTCY``sQzw+A4Cz_5M% z1`6Wzfv^2OJeLz5eik4+17+_RDrpEwdL43lmAb=(9-%_0fCfIj<2(DK-ssWD8Tq{( zXPbL_&i-g;-{IT-zPB~p+1notsIJGukU|!zn#$~^!3q}wz0>5;FX{FxdUrI7(PR?5 z_e77lKzKGZpkRqY0WeeX&UXE}2w)l|sV-2U0itoX^0AZke6ZWw+3oM`Igi}o$l2cS zZ#nM%;E}V}+wJY|^WFX~A1<}$G$$w%pQXFvHNI^`e1~&BgI>S+XzPy{8H(bW@ioe(@3fiUME z6>_Jd=RNqXGz9tR%(x{!%A6uW*(s9ec6V=YxXriw4j&F+n)YF??hpJuXYk0|+uGgf zx!c1<1{6buUyhE7Iq5ydl7 zXNd8cIG%#v^+~C6HFZSlEIvD%7!F&(LV`%=N6*Cj8=aal@X7tKoSu=5&3SevkD@V# z2TbJGKGz33Dvr{0*y=TWoafISA8aTEG4l!MfZ}P2?13(=&Q#>eVo&u+6(Yfjl*xFo z2Utke&JIto5im(K12$%Cja3iL&CW92)u`AHis9k5{hog(V>i4u;ELCD4yE`o8$oqU z0}tw{;p$|?jjwpnhnCG^X{04y48eYwL{}50hd*Cc71v19ty z=X(2~BW*eR{k@^H?QZQlL(kiG{LxO&-y3c3_8;vmAeptAk%{6H=vStGD0R5kD20DT zGOO0l@Dcoh2BAqM9hK&x-oAl9H~=sN>{px&X9R<^DEZ^De*8xuiTv8p4+YwFWnoOt zvPRU?iZ)(E>RV$IwxU|=Q>AI=?jwE|2)xa{;`@(+#4xeQ!u}w2GGET-=g4V;o&7Vb5BXr{U>iw6yEL1FS51!7*Q?Bfz$sZ}a#i!vx{4kU|G;{#TAiarNP zk5u+Zs__NO!)C1&5kU8iKpAgRl6H`3BFDJzImSIDGWEd}=O5_iEj%PBuWvNVt2?Pt zeie-Nt`H*P@2R|H?dmcBGaHQfS;BpNEuU!84FEef4Y`}BoBBkycvRXYG{jqCgfAlD zl!!zU|0&+(<+1OA^!wQ`yIG24Xbu}s-n=ehv&ZajTy`1r5h<;OYZQ1AT)C-tiPvD@ zYnEpE?fEct!OD<){fC;Gf3xZS!9?L$=A<8THlte{e3Y}|f+TmGVV$>W@Pdv4^Wppe zgJ$rlcn^tBmxriJOXp`s)&{7x(|8wsG`+q}W6t0Aw|UPUIKxLfzO%hI*m3qp+uV7y z+uPmggYw_w{RLJSw6aC!c3x8J^C~2tLf;HAnEokh%@NJ1Js5wB0 znyXA8L8X4R*jbNhrTbW28&t-Fl93{VRHPbh7`J)lvUI|>O93UnL&a2#<~q3$%jHb2 zz?rCQDVz)VZ%MT;LMZ63COpCc5ARD8tiE*`6a@_rfd><4uUJA#wELh5dZV5Fo&AyP zxO-b$&h~IPaQ1sc-|@FSQ0zT-XQ#Kj;5@CKpPxCq8eDRq_<~h1hMgITh63Fr;(kiw zAg}yQVU100Rr$--4OonJ@+;9+r+y{MvD|~y|6He$kopbcoWw8gVAJL5 zAoE@mg7VQ^9d3ISs;DNw=Wrv9Zjptnd9lhZP=+9DUgB)Emas@Fmyy^+0p^+pz(GIb zWt!xpss~$H%?@91?R>zCb*eBIa zdOAU)CvyZUhQ*=o5UX@b4AT*CJC$SDu@6AULcor-dPTR)RX4}MxB_RYSpt$*u12^3 zAHr&KodzDR$)>w%Ig4Wl4avaIulr)LFpMiN3TNZVb6jl*z8DBnDG`D$FYyt-Us8C2 z1nEhVBAlNCKfRPK61c5?cLyPVq}90C*lCoy;ZoY!?`~B$bA*;_shL6F-p^Ikv4bV;S0~cCP$+lRLrC-LrKwRwQ-WY&Z-H7Xj@1!G@#I{ z81Xm<^~Yr9hAgJ#C}EGyR}A>{NgbhqUhe~sYf7_kICh;7px0bDJaaSvs$TMNN(Eeu z-~L5hHfV$|!CC_A%$Vo;ICigbI3^JrN7!8sqCauLe5u4(kIEPm%Dv0up1Tk-n>qzx zC$nT4ctJEXJCQ4ObH2jO!y!k{vt)e*-|BztmEuc8L|7@l$&1fv29Vv` zqO!#ZetrDhc@7e37=0i?mn>osFUd%)_T+vthn?ZW9qsJ&`|e=q><>q~&i0XYFs(L=PAX^e8fdD zc~B#CzqsYJ%~JPyd$ezDdA|b}`Ez}WD??DmS~fAMW$kFzCvMkmzJP1?!Qp;y9qu7m zvtS2{^#F{>60a1PU8L5oIfxjTlNr4JZ_ohj!e3yGc92rymNhd z-f_aOGhf1 z9Fi8&3spOJlut5+nk_-{^v^Jocv`EYg33u470y%Ei;X!1&|L_XUs>wDxtu6fz z^~hH^DW1HjulD3cG2%>^#LYIbB58Y5*o(qQoan!ZIhShIotVco}bt5xT_;; z^=v{QZlEI7}7y$JKfH^Adjesvu;g_1+o#>SJ zOVclG7zo8*ZyVfK{eSCz>^n63_1m%P?XlfleDu{qjV+PJn5AX`>YHa3`U{<1w9cNmQzJm~-#)&7I7~x~;=;ghx;2 z<|m(zK$9}rsbe6R9jL)+`av>}ObSdTM9N;S-?4Z$QO)6GD6rzo_~QA+I3tk(2>#`O z|FsgS2}QsF1**22Y5I2A@yNzL2oH}0N&I~L?M|*)1Z87tu>({mTN0{H@MIA(Bz2u8 zG5jl16|1a9wP={VWCeDGC4q;bondd+A!CtZ3mOPW(Iem;^zcanAFwrLHjq_#ID@7^ z4@~lEw1_fO=IF`H!*fffwyk2HVC;d|hQ=n6W{T$>tg%T7{~O}rXjFdlR_k+S)Xr`J@98*hS1?S$QcxI~*c#nxYe>}WBxH(j zmEaNfn%0E@zS{i~8{XO>x_5z<*OC~wqwXkBBgi%NQp>W^1XXYmy2 ziS`XCz!dsIN2}@mpx}9JjL93jAF|repMNC^)+(tB3g0$jR*KKOheM98#ktWam9?Ku z@GvnUDWN`@3W8hW&^!klZPzhzq1Zj(s}ASi@l@{zveB7Ns=4A}-3#x#Z^pYdsBE;|yR{<~J}R zV5Gr<3RLKsf=;vI(oN1$=Ug-UklV^o8vFs18j6g#E}rmtpJYnc&03_*lZ4B?6IN)? zY^!elWNQW$)>XK9agD@h9RZ9~C}{Q^o9)PMH?&abXsMZezr|2z1C|qd%9|P`NdU^R zFzgO;&}0$QKslgag#!3S*m>~&RUAZUoXIkpZ*mQFvMO0Nc1eQuj?rMJpxn^lNzghi zw5Vsml%_|c_!XTlS+nk23wjk)=3Y)_ zW9Y*ej68H)iQ;smMY*`poL>4K^U@_ZAwIXnuB~Mg$rW22y*u0Lplb%F>XyNz;OJBM z?A)rSuausKrkvQy64boQlM>qE%W$biqKJd`(JLtY1I@(?b-$bhXIr^<3M;qtvTn8A z7APQ2%93mPT!^f4r-~k|xk(av0j-C!xEOJmuOboGdN;QbAX3?DS3K@J2v2u_zW#Ks zerNw}LELoC)i!m!YvmGw9Mx5brL zA<{9L=&+wJ`Q#|(E?w(FKji*yVIimpAgI5dV{dm`U(RuNp$1Ky+UQ5SHKq9ZYk`|m zPu6b0=j`4vx~baLyTeJpTx_31MMvJBZX4=ieXmI)v(#Eb=%Ivm(mrWGb)tiuhAu#s zliZfo^I$T;-HRM+*K7Ypm>p`%6gcW`zb{PS43@GsJ_wS#5F~}$@v1txdVG5F$JGvN z>e}Zq?HjRKpF=RvR;AqAY%d+8(cZ6YsB=VSDAF1)6BKo_+e5{*fq(g@|M~y@KmVD% zh%!yRkb^)6lo*x%`+vv>f5H}xREp2!;%XdmHEW7*UuDwUOyw&jEf~WR!LDo1pIk-jd2?Z~f+&o3UNAE!}E=fXs zQG)S48HwpbZoQUZa}`RXVx@y+Jj&&Y*p+*1!KhHkHlcF*u`=M(hTCW=$iDD(G@VLU z;>~;ppFDwTK5yNnV(QF}S# z%*Z3nkWMhDrsbK8AZEsq*RsX{tx0GILLNAH&1LjHh4qhUH^w8l9dWmY0TT1|4LOVX zIC_uwoV3w7mYY7H_sH9Gy}d1G>rvl#wjcEdjyv4lbsh~|J{-7%UTO6USX|qg`^0ssK=}w+6$HBT7t4XPK zzc@~W0jYSv=ih)hxSDgdc4dB$u4Rp*z~H?)28h7UY{V@mV=~aiHH4 zLh2j6eVc!`UI@*~M8ro?#-`H2Td5M?@6Hvmr}ic0ZTEu}gWGCkuZvP6YpP=uGBlOX zY?sBRsdU=z-{v)%78=GK1?rf~VGczDEh$w;aWp>VW8m(TAN#UJSQjQdbe=0pD%nK= zK(AB)5NahDIp;_bfjIm=@hyC;&BH0o9FIoFIhKRt{0xJG>Rqxq z45Q)Z7+T};rT|GJhcCNA|N01wIa%ra^IY#ULXIP#&ovXQUzItr~}LjU0usoM1xAJ>z&nX zOuHxY1h2+(wIge4j&8YSD?p0k~H86;8&s`6!3ZC z#Q~j2Go!TwG6+;xG2gb2 zERKhcqbxnOfNWlaM>(*Evmm6*(lRY~62PS7jE6AYFqQ%U8wPx0lO|oDEHE=l_2dbkVua|#gE2oixdxD9dG_+n zTTu*Fl?nWe;)b%4-;c*&izRAUE#;&LIRN?5?S0M2ip*FiBQ!A&)7&ErH5wg!M&5U)TAR@ERZVMI^oKqi?@QBkYH#=r;n*k^bXs2v|%{sJDi zD+#oIhb1ja21#l0*HN;1Gf0vdtQal(>RwC!Y5Etcr5 zFowjc!J-mt6ww;1Wx+T#z~YiW$aS1mP#rwDXmNMh#i6(rm*Vd3?(W5*xWmTXU5dNI z#@*d%aVZ;z;&A!r&YZaq=OzzHW|HqIlgwm&Sv5oqCX_gsm5$49#2S=FtnSQ6HztQ{ zS0X>YPf$MUh-eS3(LyCxomEg47>aU^vrknv9~61;ukNMMB@R%0tH=`5dG0r2Z1iH| zG{iqSbY3h|rw3Rt*i1C!8>}0K|l(M5hR2u%-A-mF+d0 zxVQ#UPkb*k|N30p-agCk_uo)_U18I7Kk+-oHZaFP4o%m5d0{qWpK11lNQv^f z&9W?kD%WHzUsko<=v%LmylSEZ*f$1PJ*Mt5y*Yk25@Z<2pC78*_hO+zX}DdUIizkX zTswftyLt5b)ex*0oTl}bwn3m>u0I!izTfe9Hs3zE2)ng~{D{?Bu)EYvDxK(U93Bf;|7~r?XancMQ%$oCuiTSKH zR*wulg+bgpI^(+k2*5_3BmrD8C#QaHb^CP-`m~VPwF+ZwbIHM?kbF@U;^JU_T_w=2 zL_?PxR=)WZnxI$8Uw2n@69-&jngNe;`8nI;#^qD z+Xwy}fcQ1yUG(X(tivg%?5{5%^-e%0hR2# zS2gKJ;*8$hYMejqTrC5#nM)dHQJ!Y=HM!~^g6w+SVW9Yq!#~_V0XUSk zvDtWFF#6Ax@+y$%R?27c^{srq4gj5CtLT;zH<*{NT?BkX@i=*?l;ITnKlUhmar@x$Rg{B!mZ-5%G=o4q0UJ zGbKfQZ9##ACMmNQ(I9_P#u(W6^%AvPN{?^GG2qv+J-TPdzT;{7bEoJ*A0BO6Aj5p- z2IP&f!Y`@(do&e#VQzv@XB=6A$I0t-3YB^>^!bbSt8ZPATP&W=4|L&TePX%aJ|?b? zN-&`flDB9tAKi}-#$|+o17pz>*1^sK&9LdwOwU`Q^HrQ?FPV8OAD@q%m)qHa&9F^#X-)}D8 z3Dcy!;d3))q#ev0u^#oQXW;Ly)9++zt{(z(c%athzzvxr^66P4Oy$XB@)pwQ;WJkc zDvu<{uwHMFd+Y;*JI2$3NRf16u|LXZr4+DX4X{&n4I-x^(7dLz#-aL;AC#s- zBvua$2XmvCWe7z?eQ2;W^TR|G^__iC;}?UN7eW#aPcbWAS}-_(>>t{BlKw-(euyj* zWA&^Eu*D&)1zKBvT7^y!FQ`_c^JFvP{ErGChZ$36zi0}Q-6&7hTk0l zUYA!a(t%$>c9bc|v$Ukg*{k?5(``oPYQ~0%#@Q4T_dP8c{Mz&;U@b)*&YyUuk%7_Oz?O| zS<@lQs!af>&`JLdtzw!-IPG~2-KO?VJ{%D{yt!IuU!r-nmiO=zWMhgmJ{V?zJ?0!2 zy9qSPR@Yo^?qj>=l^;S`IK(cJjIw;P6RaF(WV=HZR_hxvgOf<``t)c*$Cu64ujah8$b= zuR&>7LZv)j{Xj2eQyle0G<4R$Fr)a3SIw4m{7II;*bGE~}3wdr!Wx-Nj^Dv2si0dSNtP21z|($2sn{7X8g~+hQH|i6=Nr@6?GpNZAS$ zXAaVL347K|Qyr$r@=#fpRK-op+Di2;U#Zv}7w7BKpim@iDbLw$EE5l(D2HrbDFMj1 zSp+faMP-GkUbEXp`sQ^4uO(fg|1Cyg>BeJ!k+ngz{RcH{w1SFdTG#`qr|3~yb`M0% zGt|)f(75h3kg)5IDH*iXKB`Q%P1MSowzE->w@`ECUh`TJlC z&WnW+73e13sP%-OHU5n%8()g-h>%_gZi_KV_#SbJK5p+sI^rRnF->e|^NdxJQuq(I z3D{84Jd*&E$2#$*X z=sEI-utdCAmSy<>cv(XwAqLGwp25@82=_ND<2nar6Vk#9f{_%$U>rX^@$i@#oO0t@g!fIL|$9Dvv*rv#3wNj^fvb#8#F(^-NR1t8@6M{ z1x`Uy>EV}S$2q5|7_f5*+4hYXirdz~c5oTHz*K_9dw_E(O0@8jIsH@|SITzL1fymq zchZR)J$r~1gVb5;f(^_I_0!2^k*ck`9W8qrNW;1vL-tR|7HkGGd?eBUs}%_1*`h_~ zb#?ujR^8Dw&u^&ea*yA7H|4EKGewKNO7*K3%rdwq?o|T!E$~`2h9Pp&X}t_feDL23 z7QHNTk>wioWg_?fs5+~lDM5bCkhzKP8IF_{rspx%r{GXJz~WI8FzqB(%Jk?NzTtR3Z4BTmj>zBSZ>K`+)4(fi(C@bu_5C5bW1 z)EZk7gdtrp%Xl}g8_|M6YGidP-<8sZU=MG$&Q82a9OMT2fdPaXHnh9-}nW*zO9}CiQ5Z@L_I1f=^>BtYsV9_x?@Kf^f zwj-LLEw#L1rd%6>8NZZBekvtE)5<$m1m+3eS->fMUND{?Iy+(1Kqff}ge)ry^IC_6 zlu6wbtg;4}^r${og}5KllRLbOFU<`&=j#&z>|BVyuv;QeDtswxf}C#AlTz#Be`mBz z$MZ>TZ#($QO0Dl)K9m>i(78^5oR)lZjjRE?c|z!LUn&_}kD6dvS_P$^t6Ek5g8`9n z`r&(rxv;4K86$0oPCyDbQIq1uug5TVYpi3*+poLDutx$ikF+M{U?-HW7%hj1N?nK+ zFG*$O;_gJeeu8Ub%0vo!Z5~J*xtwC2iBqNbRD~0 z-nz?zGw%Xv7*I6MG-Hxpxd9F;H zOc9N^z^oG+WxuIljgCiv;%IOVn5-q5d{f00 z$mr#OR06I$`L+GzJ?B-;<+Pxp&rrQ@Rd?jBGYxSR)g>OF4u;G<6 z~^>P|H^IcP%iNsE1_R8V{_P;}PsoJ9+ueXOl z3wI4o^-wYI$^Upg8HxiNrwMXGm)d5)rEPJlH$mkFJC2#0(Dl(WhyeWyJj#fUo{g~% zxXEmsBsRV0VR$K3n}TVf0?AB*$9|b8M`T`vp+0=$s|j;o)^53zn7zus6)bF;R=){BP}E3WpcnTb_D$+fXHAIW{aFMpG4u+a`Y zG6PpB`Kpbl!G+Ze2*$3@TSlZ8=y5rS$SI0Hw%$B3ucu&&tuzy-u$!QWnHS~Gdvr!8 z=!e|Nai~e7&#cpBsya{{LP<^@n^a_^LHD%jpl``yb(}3u{PboqB#BAa9FZ$BV|Fy| zUgCThFSgFYoqe%25zy8`Us(=uzc)7c?B42W@$4VP?G;TkB0lX{zC! z3|miY5mNajXuXN_C~r&<7`8)w$<|yim%>Jcak_-`oeYzjj9yH39tHrFHR~25y>=CD zQc#WT0C%V;J#X_C)%^plH{Kn#PiB&>5jCid(R>n3?TArupI5+!Wa3JUW9Fd3yV@~t z2C+Cg^mp_SG#+jF{xcE)L)$}N*JG}NUXPuRumUr{5Vy{1EikE}gl+L-q^mByp(g7V%)WwT7>O|p@i zw`M}-N<+i$epQXq;cufgC)@F}aLd{QE`zG^%r9K!=asWIfTT6&<(7tti!fllm`pC1 zlz?@}_6|KybfVaGgYDuFwY#}1qZD4Y zu=wb>fVS>nn$q;gUpS82nAVj$5%xF~iOgzwL`h;a8h63{-TJql>!W2Hzc50>W) zQUXzU9nhtxJ;lct98c>P$Ot3#8L0HSJvFCV%CwWElOwmbJR4=V+)Q>z%e>_CAQ+GY z83DJ#}tN#x!-Ll57KZyn~aSp-T7WJ6$` ziC7^Py$B+n^TLuuLMy}2;IU> z;4fPCsEa|i97HXLFAQ(bYmTkaVK7JDPQPUs(=VUt^ye-xuywX^*jvbAf-PvF5WD?4 zNTfAuQN$7oT6uBlR&hM#NW&Z#gyD({O8vO|3FV5TIB7+C1-|aIw1gNBt!R5V!#BB8 zp*!Wip>Ct?*`HrLpXFM@@OJbCemwVL=X0;yf~ z%FDiLk#v=ssh01lxI&;FE7+$SJ!;6oDav%Ic^;$wOOeegMNn9JPL zH*%R?ccF-U&qL{NylYwt{&r1QlpG(X6q+U6fsWmxmLj6j#b4>{Re?olNkk3zPtD=! zB&g^hBA+(ppVtlQ!tsfJg@!{*E>8_E#Y|nH?l4lRPP;ep7;a6dt7v046{Sl15@B3V z*uGXo54s)nZ*djm8ucwSC5s_@NIAf_fyD6Ij^ag#8O>sZd*x$D&2c`9+Z*2M#rncT z0K`O}m}U|0FT(TKVtDA(1tkB1HxSsEbj?rsO*PuZMbGY8v=7QD z%~$@lP$NXE;Zcf&a95zwvRdgc|9IQ`r4Zx(J~lW%#Ij5)OmjlL!7ZxCj9alc;#pxb ziOEVw1Qt9(rH0c~+b62aC8`V?%@UWqg;HvUgj(!aqgurI8`l>vTsHoZ?uU`0VMW*a zUqmCVd&hg4zM_IuF50Hj8xMzf&R!riQM~5b##u@`Wb@2%;-8X$an<3C+2HXmr{c#B ze)8-ZvzEC^TiimiQ(+#C`B+Z1oDG+XilmHH(oZkeXmE38#Y_fgcDe?VFE&ZG1i zJ1!gVe-OaU1)k`1_sCbUDxV2C;`iL}M9B5qvw{eDs&q+`4BWaqGq(jezX?`b0v3FI zZ%->IT_sEbBo(EEZx*sKj8C`PNI$!8lank9RI|J4Sc_ujo=s^xl%%YjwlEg`jiOIH zWmjW!ql$eE;i7pJxVO!5CopZq zcg#;0BCNAGw?tU^zg%knIpRAoZg7peA4U3tF|dZ(~k$euu` zuJZ(Y1JeS}E-RhietkrZ69PoJ;g5SiBEkZznJYbLJs@jBwi#NAo1|ybEq=|Vo4;Qu z?&mazt6QvUgcGW`;ZY~^AMV>AV4bg}YX{o$>=qU)*_w-(KrPtucArZ-hdusBWKA?m zpVMu46-b;M4FgdH2t5i(vk4Z;68ENf(kM<}8J#ZWxgtzBwurhuRh(*pB_<>328GCe zFnKxEZtu@^+PlSo@c*Ff3bY+&ztN~*n)fY9c{DcpCzP$e%c>%;I&-Qa`%(N%4y?lr zEn1Ro*cyEeiH8;L1xzlQMqqFjb~3Za2{F08Qp;~WWazQ3!vI|7QB_7fhI8SBEX48e z;Glo4j((KwJ%UP+ZqQZWGhiv$nxwt|2gw4zapYAI>-cEIRyS=FzQnF#;k~=n2>>a-uwoD8=nVLQImt)91#0qfu^b>eR*+;L^f zGl-lMRlAp*VLtUlH?P&Y@VssOoQlwlEe#F=c@{{!gvmF0mjwjed`fYVfZVY`<^BWW zir-kc>h8&Cppm-OcCV8E7}JBDOK9PiV%`hbnL7L8PJkwKj~q~erLwK3&!~7!$U=t)#KS6822IXXm=)?Jd%xnTuAtlbi|A5wOrVM5G;aLT?mGGhzu2ctvUEBO# zI3${zU{OL8G0ElF1hpK0-14s8no?WugJXd+M+5DazX@N#=0mAd7roF;n#< z9olFPG=>P~JavrqWEzLUB|;w~`Z3KMr%$ILZXKc~w&kbDt%;r-zxrK#LID}_%8UZa zf1~)wyuAW+TTF{01JO35gbd!4O1g1Vu5GlMA6|TDuiO@*T&88t1h$SkeY-7sEHAgu z5{i9(?szRiC_=2)r*cC(bft<3l@KPMt#szCly(S__T0n7SIdJ=%o|<8atmA&1N=W0|<1b$^ z5loDcdI^8z0qVp(3duG$bikT2^PZA=2$pfCm|%wgcq(^dk3xFP7Mc#*zyTD0ekjmt zGQp!vZ$GOqT3LAS!#_yp1QC2G4f$%Z{l7tA5&sv%tFjy{+<#M`K5OV_n`HRk=>GuiTN~j3 literal 0 HcmV?d00001 diff --git a/Solutions/Microsoft Exchange Security - Exchange Online/Package/mainTemplate.json b/Solutions/Microsoft Exchange Security - Exchange Online/Package/mainTemplate.json index 05eb5ab9fd5..8c26918da1b 100644 --- a/Solutions/Microsoft Exchange Security - Exchange Online/Package/mainTemplate.json +++ b/Solutions/Microsoft Exchange Security - Exchange Online/Package/mainTemplate.json @@ -114,7 +114,7 @@ "[resourceId('Microsoft.Resources/templateSpecs', variables('dataConnectorTemplateSpecName1'))]" ], "properties": { - "description": "Microsoft Exchange Security - Exchange Online data connector with template version 2.0.0", + "description": "Microsoft Exchange Security - Exchange Online data connector with template version 2.0.1", "mainTemplate": { "$schema": "https://schema.management.azure.com/schemas/2019-04-01/deploymentTemplate.json#", "contentVersion": "[variables('dataConnectorVersion1')]", @@ -649,7 +649,7 @@ "[resourceId('Microsoft.Resources/templateSpecs', variables('parserTemplateSpecName1'))]" ], "properties": { - "description": "ExchangeConfiguration Data Parser with template version 2.0.0", + "description": "ExchangeConfiguration Data Parser with template version 2.0.1", "mainTemplate": { "$schema": "https://schema.management.azure.com/schemas/2019-04-01/deploymentTemplate.json#", "contentVersion": "[variables('parserVersion1')]", @@ -780,7 +780,7 @@ "[resourceId('Microsoft.Resources/templateSpecs', variables('parserTemplateSpecName2'))]" ], "properties": { - "description": "ExchangeEnvironmentList Data Parser with template version 2.0.0", + "description": "ExchangeEnvironmentList Data Parser with template version 2.0.1", "mainTemplate": { "$schema": "https://schema.management.azure.com/schemas/2019-04-01/deploymentTemplate.json#", "contentVersion": "[variables('parserVersion2')]", @@ -911,7 +911,7 @@ "[resourceId('Microsoft.Resources/templateSpecs', variables('workbookTemplateSpecName1'))]" ], "properties": { - "description": "Microsoft Exchange Least Privilege with RBAC - OnlineWorkbook with template version 2.0.0", + "description": "Microsoft Exchange Least Privilege with RBAC - Online Workbook with template version 2.0.1", "mainTemplate": { "$schema": "https://schema.management.azure.com/schemas/2019-04-01/deploymentTemplate.json#", "contentVersion": "[variables('workbookVersion1')]", @@ -1013,7 +1013,7 @@ "[resourceId('Microsoft.Resources/templateSpecs', variables('workbookTemplateSpecName2'))]" ], "properties": { - "description": "Microsoft Exchange Security Review - OnlineWorkbook with template version 2.0.0", + "description": "Microsoft Exchange Security Review - OnlineWorkbook with template version 2.0.1", "mainTemplate": { "$schema": "https://schema.management.azure.com/schemas/2019-04-01/deploymentTemplate.json#", "contentVersion": "[variables('workbookVersion2')]", @@ -1093,7 +1093,7 @@ "apiVersion": "2022-01-01-preview", "location": "[parameters('workspace-location')]", "properties": { - "version": "2.0.0", + "version": "2.0.1", "kind": "Solution", "contentSchemaVersion": "2.0.0", "contentId": "[variables('_solutionId')]", diff --git a/Tools/Create-Azure-Sentinel-Solution/V2/input/Solution_MicrosoftExchangeSecurity.json b/Tools/Create-Azure-Sentinel-Solution/V2/input/Solution_MicrosoftExchangeSecurity.json deleted file mode 100644 index 81fbe66e8f6..00000000000 --- a/Tools/Create-Azure-Sentinel-Solution/V2/input/Solution_MicrosoftExchangeSecurity.json +++ /dev/null @@ -1,30 +0,0 @@ -{ - "Name": "Microsoft Exchange Security - Exchange On-Premises", - "Author": "Microsoft - support@microsoft.com", - "Logo": "", - "Description": "The Exchange Security Audit and Configuration Insight solution analyze Exchange On-Premises configuration and logs from a security lens to provide insights and alerts.\n\n**Underlying Microsoft Technologies used:**\n\nThis solution takes a dependency on the following technologies, and some of these dependencies either may be in [Preview](https://azure.microsoft.com/support/legal/preview-supplemental-terms/) state or might result in additional ingestion or operational costs:\n\na. [Windows Event logs collection, including MS Exchange Management Event logs](https://learn.microsoft.com/azure/azure-monitor/agents/data-sources-windows-events)\n\nb. [Custom logs ingestion via Data Collector REST API](https://learn.microsoft.com/en-us/azure/azure-monitor/logs/data-collector-api?tabs=powershell)", - "Data Connectors": [ - "Data Connectors/ESI-ExchangeAdminAuditLogEvents.json", - "Data Connectors/ESI-ExchangeOnPremisesCollector.json" - ], - "Parsers": [ - "Parsers/ExchangeAdminAuditLogs.txt", - "Parsers/ExchangeConfiguration.txt", - "Parsers/ExchangeEnvironmentList.txt" - ], - "Workbooks": [ - "Workbooks/Microsoft Exchange Least Privilege with RBAC.json", - "Workbooks/Microsoft Exchange Search AdminAuditLog.json", - "Workbooks/Microsoft Exchange Admin Activity.json", - "Workbooks/Microsoft Exchange Security Review.json" - ], - "Analytic Rules": [ - "Analytic Rules/CriticalCmdletsUsageDetection.yaml", - "Analytic Rules/ServerOrientedWithUserOrientedAdministration.yaml" - ], - "BasePath": "C:\\Git Repositories\\Azure-Sentinel\\Solutions\\Microsoft Exchange Security - Exchange On-Premises\\", - "Version": "2.0.0", - "Metadata": "SolutionMetadata.json", - "TemplateSpec": true, - "Is1Pconnector": false -} \ No newline at end of file diff --git a/Tools/Create-Azure-Sentinel-Solution/V2/input/Solution_MicrosoftExchangeSecurityExchangeOnline.json b/Tools/Create-Azure-Sentinel-Solution/V2/input/Solution_MicrosoftExchangeSecurityExchangeOnline.json deleted file mode 100644 index 82a299b1fbd..00000000000 --- a/Tools/Create-Azure-Sentinel-Solution/V2/input/Solution_MicrosoftExchangeSecurityExchangeOnline.json +++ /dev/null @@ -1,23 +0,0 @@ -{ - "Name": "Microsoft Exchange Security - Exchange Online", - "Author": "Microsoft - support@microsoft.com", - "Logo": "", - "Description": "The Exchange Security Audit and Configuration Insight solution analyze Exchange Online configuration and logs from a security lens to provide insights and alerts.\n\n**Underlying Microsoft Technologies used:**\n\nThis solution takes a dependency on the following technologies, and some of these dependencies either may be in [Preview](https://azure.microsoft.com/support/legal/preview-supplemental-terms/) state or might result in additional ingestion or operational costs:\n\na. [Custom logs ingestion via Data Collector REST API](https://learn.microsoft.com/en-us/azure/azure-monitor/logs/data-collector-api?tabs=powershell)", - "Data Connectors": [ - "Data Connectors/ESI-ExchangeOnlineCollector.json" - ], - "Parsers": [ - "Parsers/ExchangeConfiguration.txt", - "Parsers/ExchangeEnvironmentList.txt" - ], - "Workbooks": [ - "Workbooks/Microsoft Exchange Least Privilege with RBAC - Online.json", - "Workbooks/Microsoft Exchange Security Review - Online.json" - ], - "Analytic Rules": [], - "BasePath": "C:\\Git Repositories\\Azure-Sentinel\\Solutions\\Microsoft Exchange Security - Exchange Online", - "Version": "2.0.0", - "Metadata": "SolutionMetadata.json", - "TemplateSpec": true, - "Is1Pconnector": false -} \ No newline at end of file From 5513ed2a61ddeac8dbc20ead4e03b9319d1c1acf Mon Sep 17 00:00:00 2001 From: nlepagnez Date: Thu, 24 Aug 2023 09:55:49 +0200 Subject: [PATCH 03/18] Packge rebuilt in V3 --- .../ESI-ExchangeAdminAuditLogEvents.json | 21 +- .../ESI-ExchangeOnPremisesCollector.json | 15 +- .../Solution_MicrosoftExchangeSecurity.json | 2 +- .../Package/2.0.1.zip | Bin 66380 -> 0 bytes .../Package/3.0.0.zip | Bin 0 -> 67456 bytes .../Package/createUiDefinition.json | 12 +- .../Package/mainTemplate.json | 774 +++++++++--------- .../ReleaseNotes.md | 4 + .../Microsoft Exchange Security Review.json | 2 +- .../ESI-ExchangeOnlineCollector.json | 11 +- ...crosoftExchangeSecurityExchangeOnline.json | 2 +- .../Package/2.0.1.zip | Bin 24364 -> 0 bytes .../Package/3.0.0.zip | Bin 0 -> 25180 bytes .../Package/createUiDefinition.json | 8 +- .../Package/mainTemplate.json | 340 ++++---- .../ReleaseNotes.md | 4 + .../common/commonFunctions.ps1 | 2 +- 17 files changed, 579 insertions(+), 618 deletions(-) delete mode 100644 Solutions/Microsoft Exchange Security - Exchange On-Premises/Package/2.0.1.zip create mode 100644 Solutions/Microsoft Exchange Security - Exchange On-Premises/Package/3.0.0.zip create mode 100644 Solutions/Microsoft Exchange Security - Exchange On-Premises/ReleaseNotes.md delete mode 100644 Solutions/Microsoft Exchange Security - Exchange Online/Package/2.0.1.zip create mode 100644 Solutions/Microsoft Exchange Security - Exchange Online/Package/3.0.0.zip create mode 100644 Solutions/Microsoft Exchange Security - Exchange Online/ReleaseNotes.md diff --git a/Solutions/Microsoft Exchange Security - Exchange On-Premises/Data Connectors/ESI-ExchangeAdminAuditLogEvents.json b/Solutions/Microsoft Exchange Security - Exchange On-Premises/Data Connectors/ESI-ExchangeAdminAuditLogEvents.json index 7b4977229a1..61309a35d7e 100644 --- a/Solutions/Microsoft Exchange Security - Exchange On-Premises/Data Connectors/ESI-ExchangeAdminAuditLogEvents.json +++ b/Solutions/Microsoft Exchange Security - Exchange On-Premises/Data Connectors/ESI-ExchangeAdminAuditLogEvents.json @@ -38,25 +38,25 @@ "sampleQueries": [ { "description": "All Audit logs", - "query": "Event | where EventLog == 'MSExchange Management'\n | sort by TimeGenerated" + "query": "Event | where EventLog == 'MSExchange Management' | sort by TimeGenerated" } ], "dataTypes": [ { "name": "Event", - "lastDataReceivedQuery": "Event | where EventLog == 'MSExchange Management'\n | summarize Time = max(TimeGenerated)\n | where isnotempty(Time)" + "lastDataReceivedQuery": "Event | where EventLog == 'MSExchange Management' | summarize Time = max(TimeGenerated) | where isnotempty(Time)" }, { "name": "Microsoft-W3CIISLog", - "lastDataReceivedQuery": "Microsoft-W3CIISLog | summarize Time = max(TimeGenerated)\n | where isnotempty(Time)" + "lastDataReceivedQuery": "Microsoft-W3CIISLog | summarize Time = max(TimeGenerated) | where isnotempty(Time)" }, { "name": "MessageTrackingLog_CL", - "lastDataReceivedQuery": "MessageTrackingLog_CL | summarize Time = max(TimeGenerated)\n | where isnotempty(Time)" + "lastDataReceivedQuery": "MessageTrackingLog_CL | summarize Time = max(TimeGenerated) | where isnotempty(Time)" }, { "name": "ExchangeHttpProxy_CL", - "lastDataReceivedQuery": "ExchangeHttpProxy_CL | summarize Time = max(TimeGenerated)\n | where isnotempty(Time)" + "lastDataReceivedQuery": "ExchangeHttpProxy_CL | summarize Time = max(TimeGenerated) | where isnotempty(Time)" } ], "connectivityCriterias": [ "SentinelKindsV2" ], @@ -521,7 +521,7 @@ }, { "title": "B. Create Custom DCR Table", - "description": "1. Download the Example file from [Microsoft Sentinel Gitbub](https://aka.ms/Sentinel-Sample-ESI-MessageTrackingExampleFile).\n2. From the Azure Portal, navigate to [Workspace Analytics](https://portal.azure.com/#view/HubsExtension/BrowseResource/resourceType/Microsoft.OperationalInsights%2Fworkspaces) and select your target Workspace.\n3. Click in 'Tables', click **+ Create** at the top and select **New Custom log (DCR-Based)**.\n4. In the **Basics** tab, enter **MessageTrackingLog** on the Table name, create a Data Collection rule with the name **DCR-Option6-MessageTrackingLogs** (for example) and select the previously created Data collection Endpoint.\n5. In the **Schema and Transformation** tab, choose the downloaded sample file and click on **Transformation Editor**.\n6. In the transformation field, enter the following KQL request :\n*source\n| extend TimeGenerated = todatetime(['date-time'])\n| extend\n clientHostname = ['client-hostname'],\n clientIP = ['client-ip'],\n connectorId = ['connector-id'],\n customData = ['custom-data'],\n eventId = ['event-id'],\n internalMessageId = ['internal-message-id'],\n logId = ['log-id'],\n messageId = ['message-id'],\n messageInfo = ['message-info'],\n messageSubject = ['message-subject'],\n networkMessageId = ['network-message-id'],\n originalClientIp = ['original-client-ip'],\n originalServerIp = ['original-server-ip'],\n recipientAddress= ['recipient-address'],\n recipientCount= ['recipient-count'],\n recipientStatus= ['recipient-status'],\n relatedRecipientAddress= ['related-recipient-address'],\n returnPath= ['return-path'],\n senderAddress= ['sender-address'],\n senderHostname= ['server-hostname'],\n serverIp= ['server-ip'],\n sourceContext= ['source-context'],\n schemaVersion=['schema-version'],\n messageTrackingTenantId = ['tenant-id'],\n totalBytes = ['total-bytes'],\n transportTrafficType = ['transport-traffic-type']\n| project-away\n ['client-ip'],\n ['client-hostname'],\n ['connector-id'],\n ['custom-data'],\n ['date-time'],\n ['event-id'],\n ['internal-message-id'],\n ['log-id'],\n ['message-id'],\n ['message-info'],\n ['message-subject'],\n ['network-message-id'],\n ['original-client-ip'],\n ['original-server-ip'],\n ['recipient-address'],\n ['recipient-count'],\n ['recipient-status'],\n ['related-recipient-address'],\n ['return-path'],\n ['sender-address'],\n ['server-hostname'],\n ['server-ip'],\n ['source-context'],\n ['schema-version'],\n ['tenant-id'],\n ['total-bytes'],\n ['transport-traffic-type']*\n\n8. Click 'Run' and after 'Apply'.\n9. Click **Next**, then click **Create**." + "description": "1. Download the Example file from [Microsoft Sentinel GitHub](https://aka.ms/Sentinel-Sample-ESI-MessageTrackingExampleFile).\n2. From the Azure Portal, navigate to [Workspace Analytics](https://portal.azure.com/#view/HubsExtension/BrowseResource/resourceType/Microsoft.OperationalInsights%2Fworkspaces) and select your target Workspace.\n3. Click in 'Tables', click **+ Create** at the top and select **New Custom log (DCR-Based)**.\n4. In the **Basics** tab, enter **MessageTrackingLog** on the Table name, create a Data Collection rule with the name **DCR-Option6-MessageTrackingLogs** (for example) and select the previously created Data collection Endpoint.\n5. In the **Schema and Transformation** tab, choose the downloaded sample file and click on **Transformation Editor**.\n6. In the transformation field, enter the following KQL request :\n*source\n| extend TimeGenerated = todatetime(['date-time'])\n| extend\n clientHostname = ['client-hostname'],\n clientIP = ['client-ip'],\n connectorId = ['connector-id'],\n customData = ['custom-data'],\n eventId = ['event-id'],\n internalMessageId = ['internal-message-id'],\n logId = ['log-id'],\n messageId = ['message-id'],\n messageInfo = ['message-info'],\n messageSubject = ['message-subject'],\n networkMessageId = ['network-message-id'],\n originalClientIp = ['original-client-ip'],\n originalServerIp = ['original-server-ip'],\n recipientAddress= ['recipient-address'],\n recipientCount= ['recipient-count'],\n recipientStatus= ['recipient-status'],\n relatedRecipientAddress= ['related-recipient-address'],\n returnPath= ['return-path'],\n senderAddress= ['sender-address'],\n senderHostname= ['server-hostname'],\n serverIp= ['server-ip'],\n sourceContext= ['source-context'],\n schemaVersion=['schema-version'],\n messageTrackingTenantId = ['tenant-id'],\n totalBytes = ['total-bytes'],\n transportTrafficType = ['transport-traffic-type']\n| project-away\n ['client-ip'],\n ['client-hostname'],\n ['connector-id'],\n ['custom-data'],\n ['date-time'],\n ['event-id'],\n ['internal-message-id'],\n ['log-id'],\n ['message-id'],\n ['message-info'],\n ['message-subject'],\n ['network-message-id'],\n ['original-client-ip'],\n ['original-server-ip'],\n ['recipient-address'],\n ['recipient-count'],\n ['recipient-status'],\n ['related-recipient-address'],\n ['return-path'],\n ['sender-address'],\n ['server-hostname'],\n ['server-ip'],\n ['source-context'],\n ['schema-version'],\n ['tenant-id'],\n ['total-bytes'],\n ['transport-traffic-type']*\n\n8. Click 'Run' and after 'Apply'.\n9. Click **Next**, then click **Create**." }, { "title": "C. Modify the created DCR, Type Custom log", @@ -619,7 +619,7 @@ }, { "title": "B. Create Custom DCR Table", - "description": "1. Download the Example file from [Microsoft Sentinel Gitbub](https://aka.ms/Sentinel-Sample-ESI-HTTPProxyExampleFile).\n2. From the Azure Portal, navigate to [Workspace Analytics](https://portal.azure.com/#view/HubsExtension/BrowseResource/resourceType/Microsoft.OperationalInsights%2Fworkspaces) and select your target Workspace.\n3. Click in 'Tables', click **+ Create** at the top and select **New Custom log (DCR-Based)**.\n4. In the **Basics** tab, enter **ExchangeHttpProxy** on the Table name, create a Data Collection rule with the name **DCR-Option7-HTTPProxyLogs** (for example) and select the previously created Data collection Endpoint.\n5. In the **Schema and Transformation** tab, choose the downloaded sample file and click on **Transformation Editor**.\n6. In the transformation field, enter the following KQL request :\n*source\n| extend TimeGenerated = todatetime(DateTime)\n| project-away DateTime\n*\n\n8. Click 'Run' and after 'Apply'.\n9. Click **Next**, then click **Create**." + "description": "1. Download the Example file from [Microsoft Sentinel GitHub](https://aka.ms/Sentinel-Sample-ESI-HTTPProxyExampleFile).\n2. From the Azure Portal, navigate to [Workspace Analytics](https://portal.azure.com/#view/HubsExtension/BrowseResource/resourceType/Microsoft.OperationalInsights%2Fworkspaces) and select your target Workspace.\n3. Click in 'Tables', click **+ Create** at the top and select **New Custom log (DCR-Based)**.\n4. In the **Basics** tab, enter **ExchangeHttpProxy** on the Table name, create a Data Collection rule with the name **DCR-Option7-HTTPProxyLogs** (for example) and select the previously created Data collection Endpoint.\n5. In the **Schema and Transformation** tab, choose the downloaded sample file and click on **Transformation Editor**.\n6. In the transformation field, enter the following KQL request :\n*source\n| extend TimeGenerated = todatetime(DateTime)\n| project-away DateTime\n*\n\n8. Click 'Run' and after 'Apply'.\n9. Click **Next**, then click **Create**." }, { "title": "C. Modify the created DCR, Type Custom log", @@ -671,10 +671,9 @@ "name": "ESI - Exchange Security Configuration Analyzer" }, "support": { - "tier": "Microsoft", - "name": "Microsoft Corporation", - "email": "support@microsoft.com", - "link": "https://support.microsoft.com/" + "name": "Community", + "tier": "Community", + "link": "https://github.com/Azure/Azure-Sentinel/issues" }, "author": { "name": "Microsoft" diff --git a/Solutions/Microsoft Exchange Security - Exchange On-Premises/Data Connectors/ESI-ExchangeOnPremisesCollector.json b/Solutions/Microsoft Exchange Security - Exchange On-Premises/Data Connectors/ESI-ExchangeOnPremisesCollector.json index f0f0cd73cf5..ba40af4132b 100644 --- a/Solutions/Microsoft Exchange Security - Exchange On-Premises/Data Connectors/ESI-ExchangeOnPremisesCollector.json +++ b/Solutions/Microsoft Exchange Security - Exchange On-Premises/Data Connectors/ESI-ExchangeOnPremisesCollector.json @@ -19,14 +19,14 @@ "dataTypes": [ { "name": "ESIExchangeConfig_CL", - "lastDataReceivedQuery": "ESIExchangeConfig_CL\n | summarize Time = max(EntryDate_s) by GenerationInstanceID_g, ESIEnvironment_s\n | where isnotempty(Time)" + "lastDataReceivedQuery": "ESIExchangeConfig_CL | summarize Time = max(EntryDate_s) by GenerationInstanceID_g, ESIEnvironment_s | where isnotempty(Time)" } ], "connectivityCriterias": [ { "type": "IsConnectedQuery", "value": [ - "ESIExchangeConfig_CL\n | summarize LastLogReceived = max(EntryDate_s) by GenerationInstanceID_g, ESIEnvironment_s\n |take 1\n | project IsConnected = true" + "ESIExchangeConfig_CL | summarize LastLogReceived = max(EntryDate_s) by GenerationInstanceID_g, ESIEnvironment_s |take 1 | project IsConnected = true" ] } ], @@ -127,7 +127,7 @@ }, { "title": "2. Configure the ESI Collector Script", - "description": "Be sure to be local administrator of the server.\nIn 'Run as Administrator' mode, launch the 'setup.ps1' script to configure the collector.\n Fill the Log Analytics (Sentinel) Workspace information.\n Fill the Environment name or leave empty.", + "description": "Be sure to be local administrator of the server.\nIn 'Run as Administrator' mode, launch the 'setup.ps1' script to configure the collector.\n Fill the Log Analytics (Microsoft Sentinel) Workspace information.\n Fill the Environment name or leave empty.", "instructions": [ { "parameters": { @@ -151,7 +151,7 @@ }, { "title": "3. Schedule the ESI Collector Script (If not done by the Install Script due to lack of permission or ignored during installation)", - "description": "The script needs to be scheduled to send Exchange configuration to Sentinel.\n We recommend to schedule the script once a day.\n The account used to launch the Script needs the be Exchange Organization Administrator" + "description": "The script needs to be scheduled to send Exchange configuration to Microsoft Sentinel.\n We recommend to schedule the script once a day.\n The account used to launch the Script needs the be Exchange Organization Administrator" } ], "metadata": { @@ -163,10 +163,9 @@ "name": "ESI - Exchange Security Configuration Analyzer" }, "support": { - "tier": "Microsoft", - "name": "Microsoft Corporation", - "email": "support@microsoft.com", - "link": "https://support.microsoft.com/" + "name": "Community", + "tier": "Community", + "link": "https://github.com/Azure/Azure-Sentinel/issues" }, "author": { "name": "Microsoft" diff --git a/Solutions/Microsoft Exchange Security - Exchange On-Premises/Data/Solution_MicrosoftExchangeSecurity.json b/Solutions/Microsoft Exchange Security - Exchange On-Premises/Data/Solution_MicrosoftExchangeSecurity.json index 647b5cc67c7..dea5ea879e3 100644 --- a/Solutions/Microsoft Exchange Security - Exchange On-Premises/Data/Solution_MicrosoftExchangeSecurity.json +++ b/Solutions/Microsoft Exchange Security - Exchange On-Premises/Data/Solution_MicrosoftExchangeSecurity.json @@ -23,7 +23,7 @@ "Analytic Rules/ServerOrientedWithUserOrientedAdministration.yaml" ], "BasePath": "C:\\Git Repositories\\Azure-Sentinel\\Solutions\\Microsoft Exchange Security - Exchange On-Premises\\", - "Version": "2.0.1", + "Version": "3.0.0", "Metadata": "SolutionMetadata.json", "TemplateSpec": true, "Is1Pconnector": false diff --git a/Solutions/Microsoft Exchange Security - Exchange On-Premises/Package/2.0.1.zip b/Solutions/Microsoft Exchange Security - Exchange On-Premises/Package/2.0.1.zip deleted file mode 100644 index fb22861e3001d39eb7fd8826d7d87b6f114d9d94..0000000000000000000000000000000000000000 GIT binary patch literal 0 HcmV?d00001 literal 66380 zcmZUaQ;=xEvZmX%ZQJ&4+qP|6yKURHZQHhOyJw#>6E`MiBI==5Rz$tzs?7TH%aWG@ z20;M;0Du5+^hQ-%)FBh&hXnv=Wd#60|7SIFG%;{CQLzvlGq0B2{T?qtq+6jsLoA@&_0GmmoSN^a}` z%qa38=YQY{8KG1YeX7iXWM^X9*Ef&)8}69C?s&>SX*?p0*UeMgmiTyVPj=mvh9Y`Y zS11BUXm>_(^STFuWkR(Ckp?Op6Z0gEz53e!3OjA+x}!0%He>M3@0+YMKqoYF((>{3 z!NV(;%k!?Qb$>99{Ic&%=h%86Qv4@H#%p| z-Zsh*ZDR5_<8?1DM!)_2--k*qdavsE}UCjrjL|>qU;zud-l1T!+fRxGZ^2>cFaAF4u{j-4|cN0hgvVJ)8}4hFsT? zR4Ki_Ua#~bP+?3aVZvq{C6aQ!6_b?az)E#(OCEt4?MsDi#0GABaUsQOMw3tm))IcQI$$i0&2ZqgwS6va+D-i5)YJ4 ztR-iu&{LBo!BESGOQD@plN}>_ z8P~3d0o@_^v`nrgJ_D!EW=+H)o{}HH}V>F3zJvb58O`Bwo z>@eO)T$Dm;p5P=8w|O#n=q$tb@#gamPO+mK5V~5M&bl3K=!m#tyE?jq|NxWiTDcsVjeac znJvM=kGw8~o;A;|Zx&WE@5Ry1&Cadvv$X$a5tpD%rUO;NMp4^0AK=vmD96n`?(zx% zK*p%)06E{@y_3xtO7lc>7%nI$&YK`cul_j$ZK%#D%HN7I*%0cuMhUe{I1kZODw%-| zoW*oHM0(s__={MLz!6D*ps_}2tcE%EMs^Xv)pHOO?zYiUJGT1^>mC`1Z?X9U!bou) zJmK~^-Og&c7Z2u4k{U^qe2`w^xD21B^`@wYbivv_)?_YWQdPWg5I!oJNByG6YJ1D*VZKTJbNiEBj z?Mp_I=;bEBt7+a5%f53}l3ROChz07WoB5Bp?t^(AfJv)Qz?_K*Sj3P?N)jpvDp+Ce zG~uu*8|EvP**D5BYp@Rb#KD~uM-GQJcO#)= zcsk=6C1b7Cr;w{T!=6wL+!PK&fxx(WgLpWKBGqMQ8*e~fhScR`pMd7c=`WIPYoYRguZE_i;s z!jIY3rC4kgKYDo|HF5|?$)g2Cl9o8_SjI~)g5uwbXL%L_ui;V)Hw9nC{t&#jK_gMw zVd9q!lWY@ab72emI2*lmYhwOSTHTRm{4)@LK7nvNw9YQLZN-D;Z8uSY*1R&92sFAw`a zpMxnOuGC`M=lkwZ91LZbh_=sF7iv3daq7YofbR2gtji+w@9(F6m?`E#pk$* zX8-DMoAIW?9hoq}NJv{U0Hqp0Nyh@ArkgKQPAu3ADZ!NR1PU(*7#Vauc<8L#f%)$8 z#2}|Dc5x8(0$ZMU>Ml>X1Ve7@)F&xdXe@AXv0HkVcl5I0oPSVc7vyAfwNnn zn^)&!oAe}z8}nj1YpB>nTO%Ob!|K6Bxfp9&we+xYP@&@oKX1T>c8pw=XsqHVBiPar zTPK}l{0*44Rg#XGK%9QUwkIyy*-P~vHtl@~DJxT30_4VQ>pSTJ&JGc25oOzyCfual zV)Lk?@PdhTP}(>P2h5AU_itd2`eYu$U51U8-c~_wbXL!-EPN@N#3Px%13gD4nw zphH)LeAAWWE){;H%g-9I!#PTwX76%42WE*i8JchDyTW=-=L!i_!18}kM2yLN{M+}1 zq0c5D(1ad*Ksg1za;XerCX>$lmK~vL?EwES&oOhBVQmVjw=t?28GEsGdhB)Vr9ZKUfd~N z&XfkWZ0FOlSoPVx)>F_(*$xgsstevKK-9`uf^5&x_W&l{>BenYJ2*c#T35)GkXAza z_n>+*_dTlgp|CN$VXWgRH81m0DAtl|7H`FQ%yeyS+|K1zbWwM|I6u~aQ-DfbyeYlpvX$3TkgTd{U4vISfmd=tj1<^fE zFMFQXPrb0R>A>c$k0H%VtlH=n)Q<%kG#?B~U?l($$|4O_P8 zlyH)HmkSH*qDD{aB*BY@-hz;jrY`w{5%$=Ou(qD@@q)H@{5LO}Wfgx!IZh=O)w@X8UFbF;#2Z}ajrhiX&u85)sCNCP6pm^Vk-Qy34QQhic;V@$^(J1tA z75}v34iHVLt}W_-<$*sz3x!Azq5S?%Wj|N^lpzLx7J7!1LT92*mqtGu%?jQfwL6Kf zzHMvu*n{vLbPjFyI9>r$0cV|>%`uDgemCrRTyv7}T0EJV^O#++$e!?bL=!#_D&Z_P zWcrCo@%+`hyX}?#AIHWSqdi<#>ip}7z7K_dvp;~ha`vV^Zf?)y0+0#vZZ&Z8I@!s|$?5-w%JZk+Yc1sZ z+o-$qpVFHV;s%FAlE%0B892X%%#HvrnNk*U&l|hPuouyN<*rCKu+DE}Gq>IK>sxnc zHptuh9c->_nXTZLAFR;+T(*v?00j(^yBl<@VP6b=?(ZGCpImqT;_%CMNW(jBK7X+r zo_0v$s*eGD5d)kUm3{4DXG^gbT>*8!d*(A+W1!0U=wJnj_D5u0Y6pls(l=%( z^2tE7V-LO_zd7x5${%Bz8R<9_flv%1uA*;Ue^JJ(=rUA}mzZQw-$D3F%T z30*yM*pt0M_Cpy|UkJl$aDo&%0e21@#9lP!qrRSCfZ>0_1=+TRpk?~Z>gcOQ?^FK? z9=PS^ZzrtH<>9MLY4RlTpo9#7q2^XtpX_(^@{rhuFg~jX*YV(a{Q?m^ess0BYsWR_ zC5{!8wG{;P+o`#xZ?&>i^^mdi@qD%T4EZH4snTM9*xnD$U`|msKE(@ERM{beb4?QLT@xLk%sVfiJj&~s<2y{>0Vj4c6G*{P0N~Y{`Ojt z1DU|fl1~Zxp=oXzAX?;W>*@?#Ysz9Mxt^UB8FNLEjN#TXq`U{kvbfjK-|mM7X7u~9 zb!qfxmTnez9Fp?f$8~ZFc{zK^&9pR1&2%+RWKRSjQ3@m5p|QfEl9WLj2C4$pkXUdo zRv!79N9J25@qu2F(oZe)LB~)azMw>)s7{DMv^0V%7i;Eq#TPZcB#LYSt0!w7ae^+C zL^>*P$AvqF-H}TtuD^GhQjIV3xkElUgrQ6061cAO6Kw|9*yBuvz-F(}p2@)8I*Xg) zWJ{3sl+CIcM3nUu&4^ggJN%#Vc*}7iX`W=VJt*|>KkE%EpWQv$j7TjQkrok+pPnM+ zJ68AlQKm|<^-ld2mP8wTtl?=sc1ZEPN)5JljGM|n%XN$ACkO_5rEC8DscEeS``K%M zMX*~1CNa2%3q;Pk}Di1hZQ*Mr+QkQ zlpTWDLMq7XMPOL#n3ndO7?=8H7Adt*sNL#fWD(Ryfewahdvy|@iBacOR{iEYW2wW6M( z!~Hdx81vz;g99})s4N}D2xYq7bjJZ}9?36Bu;zdZs&E)Pcfk%DaHuoi*n0H>J?x`> zKsVS6dbViui87#ARErKZs9j-LQl^IeH?hQU%$Nf!u*Z0@f*JHZXDG@x8$r0DcY=7a zg6;nag6a2NMz~Ug>+j(Nsj=Va&5<*|2QgT|Dt6u#{55xLV&8BJ87)LM`+d_t%6f9+ z9mRd>P8%fNUIP~hB&R*V*3M4kj;x759?AwhK(&{}=E-OvPhXHY;R z^zU;t6_KXG)z-K}1EVboYRithRdH-#Q1VG=xR(tG@>(JG?xT4g5NNL?gvV_!Pz|p& z<(Y@R&~!JVvbUwH0yrOwXCp;0>7Ro|nuK(5$wz5`z#~%Pbq;v02}Eg^{zoHs_g_UA zg~$>V_2oZ5p;zY6FB|R0ILj%s!4$0etyf%g7YS^jAJnE&u`}j-!?i%wL~D;gHW~~e z7O)y3zqHwgcQ=jD5QtY|iud3vcT3N};l5bp4|nYn6@>Y_upSi3)fsNPCjRCz!!cj+ zzU6%yI~pYj8oqMBO=HIO_$9_aGU2A#b!hWcfhdbN3p(qtxJ>%*eZgIKeI#trnTU#-&sJOcJQyJJyKuB zifKs5x}!s|JP9!`rUX+bgW>qQbIyi3f+l|myX^m^V)s#sui5>qs4aj0ZsBc82XbWM zLf~xlU?!A~qpz=o{bf@A9uFr$x`Mky-hb82WHtkg$5SeaD>aPxJ32BYH)r4vwiL_1 zr#0I_RcjCNOYVstFfH0pNM}%UC`Z%Lwf^~B1%TK-&P}f1%PkxPB&wBJuJs}YVATMkRDn4;Zqd^Ox1zG zMmt7It5o{R+&0i7_gs! zvqY)Yt+g2B&%2aMPWud#uYcG}!ajHd_o5!$;$ugA4GK2SDbKswltDc5PyWt?;NIYa zUi%Os#RZfA-VPgc3cK@U%6R9Wsy1DE9qlH3yB%4CCGz!$lMOKVp;+ac4TJ+D-T6?O!24e3dQc`^6JgY z;$voyaLUR#xOh?X{~|_dy|_r2*~IQ@Y_5mtFu0rpN%A*hxx+N_!U<^egYeV&*bt#Kkq#_ydWe3K; zVVfKglGRwlUz_GIV8 zU$7&REhxX+X0AgrpOxYt5>d6=Z0YGNq_TXFp~`4T57kefiSBxUjehow+^rWz8@1Y2 zb|Nqi?w_&2-ro&!7c&-c5#O4cWM}?3Fppzq(31?ECtZdOYK$f1;)XGU3=AUV+e)dE zcxSSeS%Ft5mhevY-aC_2ih7lYj#L+rdX{8=(-wIkx6cru5?|P@+H(q!$vrosNXB3zr=XuEPV>@aB?`q+#sSO1)KfE=%@H=n#5; zez;1HceogN7bBX=?#y(4!T&dr<`<;yI)|4(_4YaUuE1QD4zCd`5&Zyf8uM10%z0(P zdN%6VZF7@euiN9r+$)p&oM|5lv4D`^fo`AD9VFEf&+h^G0rlM%FRDmYfRof#`fL>Q zQTk=8{u99OZeXz!yo|RYU#F_Mc&<6x!Uu!_fncm7@%;Nl0mkt z4E6z*zq-4zPEKy|PpRrUmP-%?;gdsqqSIR!i?NP~lV2U&6| z%DR8Q`$H~z3K1_sjKKq8_G--{Y|qHbkq2e38}HB03i;}Jw9xHi4wNJF_3y;yrIkmM zBaj%(1)1zj%AZ;uI#bM$?vY`Aop^(?ass?Gd%>&Ta|{Q_BrRM3{*AgA5y`8I zLKjdMzSE>RGH3y@ah9{~8zFCR-JEibl_3w|WZSz5#F~W$9$y;(zWk!HK(3?JWO@LO?@q&}l?~9$K$i7uKFL!5uw?9uXFjf2u(+( z9X%0ONgv?t&;|3b{?Urtb48P{UY+r~t(R6EgJY`hd4p?9Yi;0dPlt$YkFu6|M-$GR zQ-2y;F9`nPbm;_bfaeRn-@3u?_c48PWv=r$oW1L@VicgKX|%FfPs%nNvs%X*Zg5u^`LqN8-5k@RSaFl9oV5&hM#k&8ryTyQYSJ9MOxZt2G zb=0LZC2R9yG22!K!=++rvqY^F>=JeSPr(Y!a7+66$=pUD=_F+LU&qx|7^PJ3Jw%Hm9!<-dz#SmhufH6>5tvEY7Xd@dhE%OvSe^F595u3Of z%t#0q2uqwW6 zlcZwKf@=`P)FjqtOHtq(s1se}ag(vbX|O1Chp#wDQ5Kgu6m=!Znzp|ydF;_(%_TWP zlLkVy+w(r-3q}$Vm(p3)gXj#>-+f8!EGP&UwUq=qa^}>L+=-NkWe0`i`zfMRV(Wh( z%1V9Vc;v-IRRi5F!HDG@8D-`gF_EJYr6ksNZX$q9_hFG>Rq*Wy=RW4v)atuoqhaMq zne0AZ*r-@EWTuUPpiDL#yf$m_>XBld^mj1)xBt`?WX={)M0Fggsh<{#q2*_Tr=1Zn zQ8N5KP_3~e^do@iuiE$VHCyU*jC6Fx1_Y-XdSgqvGiw}~6thZgSFjqa6w6)~$J4RO z*9v>0uKJSd_YRrN?`1=EUSVV!y9&S{a~(tR;hf^^x-=wQ2)6E=El~Q^atCucz?pKrupszMF*STO-NkrCa zs9nh%0U2fYc$B!Y$^hc)U9E~5n=TCsdGmFEa=9|fOWkgrL(tH5w*B&$7aeL)#G#|4 z!$x)!U*`p{uyOopayWce4$?^CF14#>8v| z>>f~wVCfB>Bqhp>)$3g&y70~lX-X!oH1##@_n1>BB8d$t5zhegF$lgA8KJ^3SkN2R zVSkf9^$y1IlBePsP8@yl0^x6$-1!;QQn-&UOOx_Cq$MMqyxU`FnNUgsB$n+8800%Z zXp#0pb;zm*!I%oz*y+iFM@5_qZK;mZ8933}2iV+6K{v3mGeUpyBr@##w2mP0o)3_7 z_4ll0pp-Y$j`rcYKY$w{n%n&gUUnzFht2izuS|hNb^ufDG&h830@<$)teNqEtSD-* z$5@EY+_BczHW>Fl2~Y_<80iY=(+1dyHOJ_9wqY-+w0>-&VaNc$2+)(;iTuDa97vQe zZv4z%kGn8T2i7(-aHaO7VR(_n+~wvDmCd+{$sQns8NpE8F=R@@lBM9HVQ;%!eC)2T zq27AYz(QL&DfFh#NTbsH7l1_~wT?yIq@)E`P>1GR>BuWxU~2uHC`uo9i8R0~vJ{*V z^e&~>(~|Kg$|i*QrP$$WJ=Z?6j_>-CH|Rk(*RX34?`&6&hyn0CG5m5q``4Gemny3D zZ9tDI&5zvtFIK|kGD()h>8}UD(*ZL3i?nGR}!0$xWSfb>f9yb%;~tJ9b|DBIyYBnyg5$Ivqm<#ejI zsD7LCLwyq5ry>`FdMP(iA|@8+kc@u3MZQ~eBk&;~u^Z5|i+WLT&_$TNM5y0Hw8wMu zmwBj9J@Lg2h5>5PghH&dZX3R^Wk=f68k3i@jm_k6>#xzc7>CPI z8YrHhWE6Vv!<#@(Fu;>M<>LhT+juR%e(@gv&B>n7P9O>(>C5G`a=oeLVl%2k1G zq;r>tl-<5|wLc#Z<62(Q^w*atbjeK1j(U!XQPl}8o=4tUJ1kLRHB7P1Ls?oAe%Yhp zOsT_D4^L6}5rCKe7_)Uwhh38uNI!g`vv5YI`s*W~%sz%3n(GdVQh!<(CRxEyq=;u0 zicw?F6+3Zh(0aVY?$D(1cv^7+5F9JZonh7o!f0*mw^hwBoX4?ct?hn?az7yDYCkq{ zIDpfYacTgqs(J_P58EFfgYjqg!HIYOqyUnglYA{T1h1=ii&j>3SYl2FI`5)8x8f7! ztA8@q4b!^hd>{@RG2P62M1UvKR#izww$yuvTU5`cxj`mIY97{M z@Lw(@T&Sa&;_9S~2zSr~!=rhv>@YWY@R13I)d2B){_18mPlxhy^Rn{%OsUeOLsBQg zd`rKmxxN}8x%&p_PLSfHEh!SX9I{nuJ@w7m*{Sm(JF_V z&o_8IouhT=#XE>uKjCiQ;^gX~)_kz(d`C8W-SXqGlJQ*|x;$aYLkh0vonoUm-U-&2 zlxMh6A&kA)V!eZG(A61VbPpcXe&nZP%Z9MZ z)QGxc%Gfm|SL1rTg}?7`5z$+bJ)FEQ^W3t>J{GX73ePO%A*2fP7mAnj{`)htnqALg z8q7vNts-04jpBD$lN?al8MRVsqJDw++1|ei`fly5iwHX;N2Owx)Zjb_VHuq`y)@`H zhq_`te46UjRVxQ=_v^mvY>I$}MSq3>e*Tl{Qnno}sU6I5bRiXZp@HR=(*hkVHcj_& zbTf#N=Wzc?$|l(ha~TKfnu@rS1675S3u)r1fA9JmI^f=tA!%xru&`1|8%#VTfr(4f zQg-wDA6*&?#vC}bPdTcbaNI4r<>~1E8&zVvmuK@(3#WmEmMLOR4$pJV2{^=#- zJQy|JTwIHD52$b;E|>5-La8{Z^pzHW)+lmyb0kX9#P?oy7l@Vn1(W-nK0>8ZjB)QY z_9Q5~QPraU@sx+31;bH#=tUCZt9)~2(IrDPxkOfri0?<~sWkHeB3Nuqpv{b?TK{eU zTA!bPGk-Dv9DoP(9oJt(a2c6Zb}_ED>`-I&{R$*A+SvO2D-(xAqOiUC<^1ctTUlUF_@ zaAPt1&@!@IE~THfFQ7NArNG`P^hFei$56tu=vE;HAs}oOqwaDQ{y`ljyPo zyBux7*Ij>n7$b#@jYqqkZaFbBztE{;fOPcHf0H^CXB{K*w9lLdY*Fuk;^|WM6dh<$ zrxiJA5<3hjsSzu<8jMm?g#anhATlvf9()K(H{aH028O#P7BXXsZI(QE;os_;Z!pZ3 z;Bv~{V`J)&yA?ek$MV5%tXkh@Jr-VeQQK9$}ZnO-%pgWwy0%1i=lRX-k0+I7N{ zj4o%fRIN;pH)%xDHxGDBWRD0($LdAa#}}?+LbYXeH`mzS|AZEF9#0KP!-Nx3~;SayO}yV#2iOc~5kmF3*?oa0FBa3 z^;#4u4iv9SSDrC&WSyA}S8 zb46@hnKYO3#$d<-u#05z+E-CliT-jzpZ9JBvD>j&yB%$Wxdi-MEj#6kMrupQ=_UnR z*0R9j`Ma|P%e;Tp2)L9C*GW%)<>-a5J9W*6P`b-+dDw}6hQx&e8=8L~)s!*Cq|5a* zQ(PT1(c#V-5co8enN?mbRGIQCpZWiZp2r_yt9$0%-xl59;i)TD`wt5VDAi$eHJ`Ms z6P}++9aXdy6%7b{>Z+>+ngnWBS{px2J4eQ}dgo;1&Mr)Hr=DJmrE5DRtlO~ygrYCU zH?~|0hwVG7OKi!=;sW>2s%+GeW9$I-*@!uGmr-}7N?!$-`}@T)Xxf|Mhb z)Y?(*zC2JG%>yiVS(4vT8hgtXM%lb(lzM{=J^#Pgrj=L==O}(Iui8VWbCf1L?z1@6 zs?3{5Mqs#HY2F59c(yXTs=#vE?+5#Er}4mUwg>k<2eRMcf!>n2y)oL{ZvOQ1I+5#Z zx4{qEqwnKJ)7hOF7xYDnk2Pqz^J4GQ!}f4&F13K^l4qJuaIOEl2K}E)WPeUYfG6of zWtz3-(}j+K*9Om@#6KW$^F;SSy#oi49_~vxv)>YUkY?J!*8K|V2k-P#C#p)6kn_D7vI>iP@@G2XC5&- zlqa6^2aaj7WKRK`bW6?x{sP2qG%J)E+E~=-evVIjk9l)XJ)Hh>E%>y)Mdfcac)JN=d)6G=D{c;e9bVngDiFgcb&8-&$ zsE!+hqtoZhZsbvzHdlP13-@pTm<-#qaL2mBv|CFDE-?oIrpo^Mc|jJndQ8F%Gh6zHj0d@oIE z$(Cj*cc)=sb&RD%=%i6W`xt07pArJ*gUW%9nEk;>yT)2a*iIlOUEVUwdlfHoWRp#! z#*5Z$Bo-m78dH_9fc`h)n_Bq{n)<;Kv?uIFFp?bMl^VurW#Mq9w5 zw0PNnT~kJaP~Sk@@9EJ47nLo6;_K=WR40aaIdF@J7sJFfhSRs+EX2X=aepY*j)NZ6 zp%oFf-`Qdcy8nXdQO~+Z__xRM`F`sW*;idZWKna@N zk3cEL-PGr`IbSRcSle$37zRcTX5ZC#?#}m8PJ5i@H~B{^$vsp3nN*>+-91WXo+aFQ z#AiF3`KD+{&<4liNo3rQTNKMEO#3g|UD)k3BFon|N;Ci7L~ea?2V~ljCs{cI#cpNX zW9*T--0Y}#wQg-)$<;A|*JvY7jVh-!*CS}3`}B?`u^-xXKe3z;1~bqz4oRXYYtees z1ukL=YG{*3j}J$EnAon&ZYT%R?3r3GvpYoR7iI%LbN$@SEA2|^b|t}oDd|@_o0EyF z5GmL4c_0NZ={oqG`I^@BMjd8wNzr{G)-zKn=Zd!`c23=wwnJB}+53l++vxa#Y`Y%t zEef}R$vfz0tw+z-O;T7EOQ|*QcUB(>z-zEMY&WE7!51iq=EtN?0Vv@Vmz_a}DV#gD zpX|8AJYeE|vmgQHlAYy7@yS|%`4ufC>}D=^4~niA?uZ;<<0 znUP9!5duXLC@QOKNfqc)?4BZPxr~hcKsyOhY1zdAO}c=y**_4fiockZhbzBAvPX1h zJRP{Pig7dCPW$Xt?x|<_4zqS$f)@tk9bj$=lgP6<#H?Lh=yhyUipq^B>V(3XCk9fU zY$+Ou2{ylj8|E||5Qy+{iS3Q)Mn*+${=NTU;6KRh)cbZX9yv{~YY;7T23L>jhZ2WO zAC}uw<<<+Xt`OK}O^%cDpik(47vQm-IRE>?QT9WS?V_h&t!w278#~g3wT_he5stkT zcAb-1U%FuA>L4#dS<=>o30wdH3=aHm5?b9lvb$y;B6a!Bgd_XFp=ykB7WEGco|iA1 z{73%ad*3N0%l`l~b*ku@@r!?`%!%;-MrB0Y?I)uJ!sTjqgw4>wf}0kGxXA2aGXVVVPkGa46qs zV2Q|XKxn{#aOcNOW4p`oDZmF_T;JD$AE@J*V1O+`5ASZ&Un*C`IT|B%vWFP2%R2Xt zSY~q9jX9^cbW~2L5`G@(_8AOIScc=-e!{MMPW1ch8Yz)O#93d@6z4E$I{vJ~#ufyn z1!@O_0LK}Ov#066ULleT4-p)_6Vjx=FEWZEP7GV9H;=K%d&z?aL~sj_2+?KC-SQA* zpIRHiL+pbr85CuOc(7ZLn_6hqC{O7i{G_k_4D;Sn9t4#Y;HCQGM+m1$-|XX4F?6IFhmyH9~)oxqW!9~1&qZF-ZG=5#NSY<7zS}`rE zKU+2#M#KrSki=&|3)|+}dvumPB;)H`k#~3Ai?MqL#y9d)aG^M%2OKa8;y^@FXh$Za zOfltw-i*Vp6&;~voQy&eVz_p}Nz0Yd0sig8PPM@&bEC7bW+Urpdrh*#F%`^8jx#+pExbu zz$w3QATnZ361#3(nHYBqJMPzHl0lGhSMHEvcHw;x?tT7PDqbj)J+1C(XyJPzd~a;l zIP|du;fhnjPv#3Wkz@4$5e&!9%fu7{7-{FQKNd43>nkqFSW(hOM=IQ}XoV7W5fNjE zkF?4@6(Lt2S$CGq7bk5^!#}6=R92N+Fiu93CuO2mhhcW6TSv@O_B!Kvc2RwMp`yS# z1LJCIm#NR&{fwoi4#UUq@NA`_eJoX9Tp%?Fh@43$=}KbDr!uL#Waalh3HNzR?^o{O zDZ8vdJWSho%{lT8=Xp;EH~Q3`VPZDK7_H;fDoZ@RT8w5<&$0y8QRI4<_GzFCNCrx>c?u3-!=8*M|z%9gR@uLM|F(HbqIq$4R$Eo@0@eclyqK3R_-DcNxlx3rM_h8OFQ*4@qP)-ez(n8_-@d%Iw z>IXAdY51H9w+Aw(cQF&hfK9bvc{zEC zUzgaY5%0ota7$fVW*WjDRD89Rx;kUNBHj6Zf|~z8CmvmyD>!m2Vh4&$2W1E(DeGUk zI6g^yOpnG30)+N+Jk*G)l9TYIdYsKo*XJSj*FrxGWaT$X700TvMhd7xx_8u-zh{hp z%-y2{dG=u2SxwErn>N3H_bO~GGK!9Gez+QjCMCsvRg#}I3oL0302?Dt-uAK`sc$hP z#<}}WAW_-JSh_UIQ(StUL^CPkLK{{eKd~(7%t7+V3ag|@1Jx@^^(RZBER!(L$W}PD zzDkg$9C~D0w?}9~*U`*+yvqPfWPApQ@aodI#uZqjj93HS9RrovY4GiJb7c3eUJx`N z+SzeojQsvJ6mm+TBVUXt&urlSXn-5x;7W^5Iadc^>@yDG;Q~_>O{%er@Kx1!YoUuT zlN3#QPSEB$N(u5OF|m??^;ks7!RZxPetYZ2F%hw;HL~7oYl!?cyZXH#XMc`A5IMEX zF;nWEl-%*r)@EBHW#OngDQ0WNu1xUNNy6j!4>RJM)fjx{tKF2o7PR0`xdzcp1+y`j z7y6ld-Jtc&-L^XSQ*Zvv2fO^tN9)C}sDXKCpvdH3V->FS_?Dk+mr4zJ8d=Z;zi6mq zTPjxhREL?IZj%+?A!yOjBwNpT>v_c)MTj;rA=Yt8@ zYgR<;Gqe^ZMm{IMMA;Kha65RD)|&17A2jh8t4H;~i#4^8aD6e%_OU5;Qxwz+ofn!B zbOFKc@*g&#`+u>Cn=3s24?ht)Rm+k)7mYv?eg)*F_P9AIhRqJ^a-g3G=8_!KvBP0v_C8a69A7o}!=hv|xBL4`|TtY>-d zw&WT{n;y|0bO{l$(Mp&5E`xM)cX6Mv?nYRo+h+s9?f%OhUQ#D$o>!ek|9a{#=4}a- znn}bE-sCgJHEeZ6%Z8R@g%Jf<^%s_dp zRUza*vs;(FW+ir48En_OCqRfjAv8h~*z*E@X6I}MCs!db(g{FgMqzi;A*Vx-Gh zYof6i?Rn%q2HSbP1jXO(&kgFkA^B2C4p>L&(o*+IP8(QAtojJ5eV%9!N5mSW*_A&o z#ZuTZ_lS{W+g|D7i44a$p4SWqD+x&8#!f`Vcv=;x)BgjGwCYSSz` z?U+g7DHAX2Csc+@C)O_&qY2h~i(q4J*5}Z{ZVWt-7Ps>n>4Hcbns2#s|11_0s?;}` z0_vcdg6U{B#}4NlKSo*S#7ZC>EFjMMccYu}Js3XsthPhPW{ojpc=E*0NUg|ABQ#{4lciOvalQ~ouqO~ z5zpmSFP){!;j5H7&KOa(tV(Vuj;>?T)lEtb(Xm+?H{G@>16+9@vyv)aHmfu*r-`fn zqPa88$0y09FwkIowU?M2<{Y0Ll5U#m@i81PM2~z>*`IVl8I1rDD{oLn;-;g;go&B@ zCv1XGAtv7AxApo4S}w2p3KTS%7t0qN>YSx%tardjnOxmJsiB#f_!} zrgRUAUle8j_{uFqr!4TV;a;uZ_EA#_NN=&X7_`?mR4H3n>cF6Kz=1j~Wv5uODSCx% z#9DJ}tP~4ssjm?3X#PKLHhIP=rA7|Z3U#NRL|Uui8JY|uE9qu8XYkIhBK!B^@iOg} z>qM&^s5$w6+=8^ixZ8ZbaM7s3qJtJz?ekBB(xt!QQ!vussCbdD&hJUHsAKTA$(g-_ z$zPbZo8jwhl~33Ko8~09zDHJ$!TUZOdZ#g)A9$&)z>F%w)KMgTQ%iIU45zbre5# z!M7;jHw$GA{=yDHNF1r@D&^&mu9tCe^BtH4H7tN$Vay}6S@MPs1L3X;cp#LGmrSc^ z_2q~q*ThDr6hMXkU$ot0j4k2YF8J=bmZeU-_qU{2%haK=2>=hx?WP%kf|N=MedC`A_&i<)8Fd{xSYb z{vY;IR>f5NSxu`ecW?NicKQ0&bLa7ff=6*V{saHgcfdvepWwf_i|BRpfaTD3^u>u} z#K}rY4d;2GUtLI9pUWNu`nmP3J9Y?g4Pld@V!U)FiI24x;2X7hm+oPh8D!wTxC%aM z&NEZ#6V4($5HE>UiSlf7FcS>;?Xez4h1msa$ zT~?SX|Bd@I|F7;3F!Dd$-|6!I5BHb(pYCt(`QPp@;v5TGg4B)pANM!C zu&h7*Z}&I!L28}BN@~wpKh>-V)}0*Esdk#3bm&B&7+H>GshXdfXjYdbZEbdsNEqvk ziYJO}U?|SSgcC_GON?RYj9`!)aFxpvrqamz2Lgr(AenTB7?3tgK{H$j}MB z1iD1>O1VB=T5^HYxY&&dOz+HN`TMock;;+K#pgLgc^}*-m6|>8vN}jMzpste*)_4g zit@BFVzU&~&FZo;a=pI#`|14Z5gKF`%5|BUb$82Km3&!jDyzzUD)MZVZaeGdJFzBY zzJ+r>=)Ln?P4jbkx>&^VVa26S-IaEq;-$L*PZhk0O%gg6N*fy<8UU-S&-!ST&S(7I zub7)cN2k5VIYRx6{>*pJ&Xw&9;pxslQ_&vu{?O94+mFA z?6W(qn*+1Vbx`8GR}ZSpV!=Z!fVLSwZPPwpBTy^ZgxKN?O!9i923AhvWKD?hBba*l z=yE?um$fH;2yi3Lw1pM<7i&nhHtl(?4sHB~w9@bD*WCGD+PxjGpSUz{pw%E_UWE{a zAfgHapUcWo4rK`)glSEkjEttO`z{Hd5$k8JVL@kTKUdf)@;Ju}#?b~0EN8HQSZS9) z!`i-m2>)b3hon4B$1qM}tCM``@9UT{4~#_LxHH=s*{N`R&o~At^^w5LbR$1<)3>}( ziWdpG|E5c#15Ns2px+k2;g)Cd)9clmAC}V~hnlxze4Z)oXbCx=4C_inBC^f2*nw!& zd9m~i`UgK!4Z<{-i~DF}yIqD*vs=7Call+wt@>=XW@Jk>m2{h+mU@)ciIMI+$J3*ka4R~~P zQt&X@klUrWCcsdaXw5uNj29`(rhS^nBp8wzvYY?&%0183yLO}_%7*mM+CJs#^yIfR z9ceV7$vu2ZBB^UC9F*khD{buotG+CRl$S=pngx6)teFfrSkS-+4#*e$cQ^% z)RBO0+;V#Qd#&Og#bY@gLJ|-d_oQq5zv3=-jc<1QqioEQ(Ne!L6)rteq>z+bCKlQ$ z_aNHbHSV7JO0ZxnPNisjMk(^-w^D;%J*Ixpstc3fEJ)~H!*~>R@I?xY9s;^Khe&UK zbh(zVh?DTw2BX;ONYDUeVDw(&q~n@0ug}eFPO2BXlVJq=4w{eU&!R=l$(12B7WaHB zfHC7kA07Uz)eG3^hNnXcCMPgGS5j_;jOZEk=Eb-N2OeLszF?|+z$5Ge5|b`G{80_C|_4x_&* z4Q65;C|K$vrT^UPd%Zvn{$6|3_d$DvI_zD(p4n3C4n;GNq3+3%i-}H>!a$wVx4OQ)}S5 z(STt{*5e=l=u_|lbr&{{(FT(UNP-7YvF=uKU{0}2U`tmn4Td=_-+bGS_5Vz1EZ@=n z7dXe-=MSf7ed?M{AThZdPSs{OC${5@ zFDrQgNu!!#irZ`kNpHH-@25L{0zpUaDr{vQfQAi4^VJb6V=&PQhV>fnA-^&SBIOvA zRDoyRbF1SRv#xH_?sOS`jk%-jTKwDN*;h{#1qyM0#74z-&K&bfF)tbttim&(T0xN!H1~*~ z4JBZ0aZ4E|{Al4NI#=+ALycBsrP8Q_>||?!6%gw3O{_B`_jc>@XIzo{o`Z*%D#THI2hA$@kVC1_? z6N9p9U>sP3q^H%cHw_XTele*2-w`L@I zgmu*#&s;^h4v8-7T1nu!HH*uF724BM&)iFRc{zhjhoQxJC9O zIF_FgxJl=KKClar4Ve(VZ+hi;oz5+0#@-RO z37l1hWRUVjg4H2G=B$j#lIez!X~Ul-j0l+}%N6$l1w{md)zW%~z$;dHCe1}6a+=rs zd2=;w}b4Ec-gD9zUk7RBC zC3Dawtcan&4Cu3sJ&H2u;JUV(I8Y>DAq;BRgSD=+-o^=_$wwON(cp@L{JrCJul6h z?nR{Zh1}|QV@=aNnDiP_Itpxn?z|732Hu^chuFxj68>`cAbr?I^{KiW!r55oVw2;E zLZ~v;)MZsyD9$P!O2Of)k)y03cWq}QH*qzQu)QQ_WV!4$6e_v-dG>I9F~a}bB~T)Sk-*$%9;A@i!sApB=x0hvz}|4#wO zK`+VGrHDh2gk{~Udp0_;`N4D~;L3bCN@9B0A!QCBzpK1Q;- zf~;U+6kA!2`BQszECv##$ZuzO1L^V116WO$7$~m^dL7XsJmEzVGMD;7;@FYayU5VFF=FQgS5>>JeMW2?>cswSV>oei2Qa;6@IcH`h?cdd5m zUUI*BwLhs*mGQU+CJGhGPMo75)Be3E9=#F7Rzx|ocDc^&3QBER{=`#2QFp0kxVz%G zpH-?@Yyo=K?T;Ox!(4a`rv#07Z@n=|6F9rW95m9~6z8Q}ayA2HPF6-_&M}%m|F>ro ztm3W2NyIq<)E3%5j?B}gBuP+oT@~EtWWi+m+1H{>k@%81a%9NO$ zHV82U(QL8DUuxDwAA8}@p9NF22! zR$P(3HCw_?HGtL`a7iqw`6zCPXV~DmgCAF}k}4cMje#mowD_<7UjH|Edrq%#)dy0_ zF3ywMCdM7Qy$d;;du)(oT5T7{HtQxWvZVu9H<&EwlW0M%4Ai}_M58yyZEZe8>?=g7 z^VRNIBb7IG>hXh9I-(6wTIHz4b3?aC@7`L(sPzqv7cQr@65ouHX1k~JIob43T9~{F zIFt@alxhiYDd#?1BTCk|a{f;*vRcyHW1CZmG>iLZL^KI>&~*s`jhG+o64bG`=W$~ zKP+VybfxsHhZ0M{ns9%(UB98D#=Ldw7npa>#EvyTmFMR8+9amJ98ay8iZ4 zoPOhv+NfS%d1K%;mNtNDkQQhWlSp5=htC> zAAJ&%mL7h=F~2Rzh_WHk+p{KnqHMdgL~Z600|S9W$H=IOh627L*Jo-T?&ykO>ue(G ze7**UEtvo~%ucSsfKZ(#ZH=J=>elrgk@~)b1)e74`jhF3@QNcpEeicrORGrjf}kU& zDsw%TpvJZC?rv9L#A|ou$vK8}F(fuhmf*%`b*u$?$8wC*)+;y=C*Qf$cO|+(K6uoOAWuzm%Xw{8dN1yA zo>*0j0Af*tNIBvsw@fodBBSuVjHRVWq>dut&pd;!sf?xpF1`lw#xzLn`6(@>+iBDk zP`vu%e3E#GHg$Dz7V*b#Xvr^522D||w=D_1m(2lQcKmqxMhztReT~L|%xA1h>=}Lw zqqMZB&>uY<8s~!SMD8C^@7fKnO?)=ad}s;n$<)^}N$Bl?=SpthVrj2&qW^JPuQZt# z=JjVf&qocB5jqGK?)7bHdTPd=m9m~WP@?DeaLb6`_R<9Hn-7c8ArDCp-}Y3i-NDGA z#URJaoSNkI-VN;@mdb1I8e9jCc5CBP%TLWl`}(eLQfps_77!dpx<&k#{k-5mgXu1`q`rH|$ruq`ls; z0*P^^b!nvDUXgh#VQTs#U=g0z*YEmMZ(^yIE#Yd1lQk#2Z{_E#D@L zDKaFfQD(>xJJtODbU}xLZ}``}9oLEtuV;qvO%oY~?{Uw$#LORr$C0H(nUnML>mBQQ z*izvE{!+|jtH37)1ED?9c+Vdn!9dHjF~f|mm(M$N(hNOeHk$6s^|J2fV0y(k>Rg*} zgrh;JxK7ALq|r1CxdbUTn$OA3enDeaQSPH%h=s&pCGxjTH*IMHd75hb@biV4m=LuwAJYy{UuT&{u1cf& z6<>OyS&Q90sEc%8P`Y<)=Db2N@N-i>s<9eMeVz%?`4qn z+3x}EDw5CgvuYqN2c~O#$RIvEPd!t)iPbjYWXkX2CdVpgtQ!RjJ~{g`^Qg0h&#W5V z)WKXiZ!4zv-CM1{;RGpO6%>Q@p;9v58unsAhs}b{Oq9NiQ61)OXqrfxo_5}11BlED z|I|#XQ^4pnpW=r2z&KcEH3!AHB8dx^9t&Zufc4eDQ*6WStjb|tq*_y2u%hs!P z>rR)A-z5u{W~cRv&4$rci}rslmY$q2Q-)G^(nB3KGOpK;YMWD?35_m_A1&T^FK}?p z`^-|J*)>^WO+4jH!oeDoPaM3Z4_Y0i4X==|A+;Ad$9?OF`F1NzjM!vCW!;5QC-3M$ zpFm1q;V2b88%O7fFv>=xNQHZiVWS;|`f8G=-s}RhdZ`eb0pI z`!@*l#qeH7c`sD9Tk_F}bW~j@WHbzV}N=ig5O_4$9B#1#Iqb*Bbp)5jdi+VQf zMBQz~Z%veOGX2`Q&Hd2Ye%9b0*xW)m-^jaKcdus`lrAyBfcPgxvsbHe6ee!uOU9pA zM%t_a&ADtOZX6dRYR9zrPdDzLt5#3c6N5z5m9bLWzk>~Z{f(0kqiE-4YggAy-q)8c zd#XnaIZ3v`UZ#kocoupz_8##vTllh~^i(6#3i`!;X31Y0=+V{Gh!#$A5@6^>fkc#8 zT*Epl^BN5QaZFGe@gl(Qd$JogI98p5IaA&m-WA@dBf5`w%I0Ook7vHgH3AO z(?->n)(e7xbZF#=!EXSl#E{CQn0fZxlatJa6YY+H`8l|;tf$66ym?If54RM#H#^`I zY(fm8;ND-u&kNpRi3%0@R+DU7!mwh&DJ#<2vmy5YnYof#E&&J4^&Co_V%GVTtp=+$ z9;s&oh7VtoD)j9d87St;dDoS@@W5_f5 z&Kd_3}P)gfnVZd(mo>ihBe%fH!%zm zi_-2cya{z06!Dg%zM*s*D0Y*+VhOb*v%3Kq^BU_WS^gdI*nKrcmK7<3yZUOPFI$XM zYxFo+B(0oHvP2j@n2z$);sa65cs~oqi`NaInUBfeH zIj8i0S)N7Sb5|?U^5y@Os81OG6WOB5bXYs=xP-KwDxgTc$gGzDx*6v@YLFn+Hr83$ zPVmC0%ph1{=9x~jNN3wUBa}!r?(5lYn(U7FeL1fmHO$k#q$InjXV&(X3{7@V`6Z%A zbWI%$_h^vmsF?q~D1|E3SvDWKey_1p)Fd$Wo|AgE(TUj%$12tipS;DbNfV2EV%u4n zGQM7GcJ%SrY2R##*{dk#HR4!(-r{`QBS4+?giH9Wdub--yQIna)XSwFpHIMp+^bE* zqfEW3(78J5q`o)=`znmi%nM&kp##Gr<)fa|ugf|NMO>(!ptUlFqqPC6x$31``PKx( z=go&%q6Ua>NIQR(P?=%0utlK3^c(B{{bm_3>?lo zK-h7DkWu4PAW|gry$CRko+y$$tvWsN#a?xU=F-=Vp=S#v&aj2nCU?<%1i{`O}#|&}3RrctQ9xsP16WJaUQ! zWv3sZ4rnF_TRYbrQjI<|%w598czlNt%M$2|Rm*kEhU&P92HW}cU)FYZqwi_My|tPV zn{F5s>A?jKk=SlG#}2q}s7d``|KK7dKH8JdXl58lyh;Up-Ay%PF>TACl%bWEWA54V=nLp%~PRTbyp!e0Me&h ztA1H)y^KCx1K`3w(AWeE4+OhRnyQRG^GbM4MZS?(f%{>FL)ume?FZ<&E9I{V41B4`}>2~`ZZS^JSXq%;4+bmlw-7DO;`=Z!Q_$h#O} zJJ4C`bSbF13&HjJ02jW8wf&|2O4D572JEeh$+S2r!PlGBwf@=x*z{Ets!ql+O>6s)nRb0c=;SpzH%k##= z6y;l_rTyIM&=`JnMS&;3Y3dM+u6u{<`>A=wI_^u_nyw|Hs_MUYzJKWM`<&IQZZ_-h zFL54feB*CcwKo&U95Hg5jp+0D$1@pKw+r2I)g%-1nB*9cnHJNuYqQbShVPk=WS{F`lTsH@ z7eYL1V_)oTM2a)i+CYw8Gj<+uLTfk2oh3h)2Wua*{~#v@glN5DctdkrtFwkT-&dDD_poYc+au0 z8fkfa^W)Tpjyi(9VIH(q)4VRlo133FV1g|^!Lhq|X7CwZh$eYjrsJ))dwAFYhaEfe z|Fjs;#ogZy;ypfRtqA(RFDpW^uNpe&NmV-#-kS2FQ}aJ78z3~7)a;YXrUN>CcXzP; zUEk%re!$2WP9cwd-pEz*a^_;_;ub)`$O5%h8aACjN4eY($zG6nQ?BW|iaqjMsBxLw zKv3>2vrK?(C67-{Qsz$85AgC_g=mk%)$SCpE#R-Cs!k3OEHGjxQC!7_v`gHCosX~M zW_@G+WfI^s$cf*~a>?oVjt*x)F}doR$$2?Ic0dfKA?k@<0$Ach*OKL}oj?#qQRfw3NmBbg z`MvkEPelPRLfDVl|878u^ep^Od~OLyzB+=3a7MH~^JPbp1>j^yIu8o#nVwzXvb;Gt zU1UeV$Y8f#WJNs(0}m4K{Jgme5+N2+E}2Mx5UF1v>Rcx*3v_r_q_*6H2=r#)~_|6c+R;-LqBqu zTt??!zW#+@;LtXoWHi!j9o61hlkAW7Rgrys)Hv3$mCStifAdNsj{Zi>+t?i7;L1;~ zujml$89w6i(wGs4{n}~6BC2$3x)lCWcDnIX;LLy5FcpQ0&3wPEI?Hw?_B8TgfyJ0VvOS?Nz^>*GR~9V8BfTSJDk5kyx$Ki zC4dtHE1GlcRvFv-rI_0;&TCQ2?6hFzJ97+Y!5j;_0@24Y+|INdMD8*3-46J<*Civ4 z^hN!x&*QMyqI=WSO<|`guMEcL!{4f>1-Hg8PQD#DGTJ(Sdf*Q8NS`iSr3Th#8dYks__Rirn65;f{5h$f*ibKFd@-nNzVLg3- zZsAZUtyvB8H2ckLi(S4vjld`k^M?gHay;(| zqPd8`xxozin1vaDE*)@ZKjZOcre%vPXa+J90E2FaZV{Q?E!?cuQ5SuXA0HDyh(48| zA7MoeaX4{_#x&3SEI>VG8P%}WM*)2{9c_Z5t(E7ocD@4SwM{rF^@adal;@rAvh?GK zLt4nV7UnYL%0{r`?3|we(CTQJU1Zn~`S#glSHMo~BTo4Ou)iBHHzDCsv0MLB5uX8) z_7@2T&AP@)H-Km7ZNal{V1pXRafZ9)qz_RNGNVTsM+! z?sW%{shiU-$H!oGq%Wa;oTV3Y{Wl$AHU<8NeD8d4R5dD~LmydLVs|gWC z^hQlB?rqP76hq)2%*&dK%1i4N)z2Qw*W3cES{b=hMJRp5V4skh3&mBjJk`dj@kY2{YBILJ_(^E+lC4U-^&=lu- zGjG%{icrOQnWCoDXn~$W%Wv_VR486U24x9GQ0Yi@1e=v+X(*Zv$cxS~%5N7)q^%es zr?p%9D4DvpURTEC$e}`018F{|A{c9@G3wQ!)@(14>kat+Fl~v(c^xe%4#R1Go{&(> zuEm1t!Y!_tES6CG&R{qi{(_6mZPaB=p?&w!_4bt@J1D8fyL-OfnR;!Il?A$`d&dLC>QyXI?kq6 z)|mbCxk{z7#(rYKhMpS(30nV2w45kp$Zs6Hs{wam>A{oRCSSqi@D&u%6lv|$s3_cu zyhBSS)M^KMidyzjBO~YPIKMUR;Jz~8s(rw|w#d-LD#XL0UhvQ6)x6KBbKZPCwjZEd z?h_&7j?f$!kI(S?fQ>-So_g8jIFWjE@!DW);AOrN+{O=6Csm$3T`myKtdsFI%d~B_ z%yJR!^>(Lr^%xP*fmjrD@AKSqJlZVYf8*i>7XBV@s%4h-`M08STw$H#>dYXCePfdSzZ&1q2>zhE25CBzws+71IP z*mc%^2fz{(vgJ_Dtuq12|0ib?inY&eQ7)-A-$5rFM*c(j(0<6>&Q%}4f?%vIN9?S_ z03t*8lNVxmCF}T`-D%mM*Q5pE^R9p7KKYq^j;F$Z4bY!A|R)N-^>XvhW*rFO&iGW^eh z-6L^!gd}T2Ar`Eq$z?5zF&ogPLT*LPD^M-4`(^(w5Fq!%ji|$D*yq?YyO$x3)lyHd zjXY0>eGZ`x*Sc0d-t{XyIF15m4T)g*<@heTC4?@oT&kDAU1X)7Oo0cv_sh)72(}mR zJxXtaQ49N_zmR>Uu&B-tmQhNtb-oS0i+m2*-e|~u-=}7?7}v1;&mY&Pue-0Ob-w$} zNnZx(Ka9Y8ia~Ix>~pznlx@8+kgS=|b(Ld~d~u5R#$$o=#p+uw8Yn;Sh$p?a#PILx zq(`+x9uXhOWux4p1F^bD=!hm#Lm}weZG$u4kqkblR&Ky5 zL#mMSlLjUGaVLb(A*B2}G-rTu=lJR>0IUi$P!%wzHpH)l{y+QqL^<-E^aw;{{ z2td4VZsUYnN7!7@BHbKo!W^aJV=x_R^q`&rDAf!P2+<=ECQl-i(oHRh#g3c&YegV| z^1UEgDBflRTvti&?e>jb%|`<8h`Lh|UDI6cchM(mf(Kg5Iswre5)^i{yN~i8E3q|>3vFMSD(-u>wAy%HTIXJxIY8a=Tr^y zjj{7ds`hE|NL_foJr8 z=Jk4N1q|rWfRl+0!>=xm%fNzGA|vNSXn`sDrVj4sZ5MO=*m*7DVJn_Pj|Bck_D+BA zoShh5o@2BmW8p>y1$=u!PNbNCICus>IW!xBq1Ddn)1bXDE?w_g>UKxajhKspSp!@>DbST-=LP}x{n~Tx&(sVcTb59a96AouDlh$@*a0uYI z>1LG10y$V@n{C73GCi42%TAu`B>e006jpjDCq$`R8);XyZKhlko)RXUwa#A7_GSXy zScDg6^`=o%0~sif38NB3kKh}MsQm*@W-(zLbQy^N7d+`r+FRQYv!I%7t8cln+mVj> zD?kb(f4VmJF8&CIS+O3m`V29y3u(5DDU|r6YO|E%Iz%W^yoArRB-W|ci-da3pKgAsc{P*qj^NVDsJFY6q4x`qAV0y zm9b+_s)gT*wu_@&9(leud^VQSHOeFXr#XZs9j_q+nngTXk#B$=l8m7D>5#KPiI}?9 zW-(v00j^x!_kovXb#4*)FD>M}kD(&c%lk$=5L4Z zl}Ii=eV^;Xp-Uva(@DO?zEn8Y?R6Cp*d!eGEz~%3s2#0BXH3Ka1TdOI2KhzV0Hqj8 z46LXpk!{zBTW2AU=@0xj$F^g6BOf~l2PX&TI^Jco{XtbBY>ys zqo$wD!PM_!o!h@>+?z)^*xT>f#2zMYOl;23!mZyeUf^JVep^mndf1^Ls`5Y`tb|sz z5TZ=eCuJ~kj`yd)`;p2hGDFw;1-LK?tujIwAtj$_tNhO(MHL^GhTi4m3ks}vRpJv* z2G9m;&0WA&hxgvVKrM1mO)IQrlYK_*Am&Bg2ph)oDdg8OOH$mYQV1tBi4xy>{Xjg- zhfhRk1TpyN7v*JT+3L=%L;<$f$!{OjwB3OY$}lS~WFj?-LK=!eqKK%NhOib;lMws; zn!X`I_8$-MtPu$^(t(3q>#CH(&qVYwtHJvd)_5o_3%)T1WnT80j5|d`BInLUL`^|) zrj<+>K@UaO^dlpyyP2ocL~G4ZR#n3TkALkb+Knvr2)FvKAU^sGAE7yGjFb*2$4&Qd zMZZJUY_>gL-=^jTC(Hj7sxrC|AFXwQ34RpHbp7=_fDWF4H%^{ZTH-8#}eh%vU{jkUQ7`}`buMvhH$(g8{QC_oabpYL=bXiI+a)~BZ(_Gv%M zn^0_w8x#TKURzsp8vz(OU~A3dogqj$LP#DZk`DIv4@HcVd46;4q|Q@2-JnW>Xr3@S zgZq@4Q+o&x1uLFEgKoRzn>O@Gprj3alA1!=rDul(J0eelNc0CuUZHzXbZ8WpvE$rt zeF_64fLy^=&c*r?dic9I8{*l|_Vm*`W}F zDAy-R#xVYIQQITVR6Onv3dd$>nE-T0+84CyzAgW5A95bPlvHHZB(+AOij*D+3kzIHuLZqi z^Jkl3x{;sgPTo-(yiy{Lg1ZmExOCIqa~_i9PXCI~q_H(|x1@X9m7a&CNP;%&C27ry za0Hwm$5xUNI$rWP0t)->cepm4V_sgKv%dy^-ObI5A15^i4vZ}Hz~}er1i-STi3Y{U zWelOp#Q8fGBWUM;KI!`r@Wzpmv1BS{bblFR;9gwU!sktF5U$`ruWQ7zzqiNzflxqU z#Ye)KFt2d^KC!WJnmXcLx^dS3=s`rivmD|&Uof4UPAjbIO2V65scU*J-#$&aFQ1dz zcn5|X$EOCRsXoj1ioY?BLr0V274}8uOvEn{|Ft>U0P$S^^ym~usS9q;ri^n@|T-A zIp&s#Aj(Uu_^6K2?R4k%-{Ay8IQcl_-T+`OSqbO?tOW7ARB5xOhJn6)yS-G0Kr3|S zMH0#y$Tb?w0dp_9>y3faZwC=y=;!>-krrtJ^(SPo(P67~k@2z8A)pUMWkpc=MZ zmPUYWj%)CC)}sUm;@J1SN@(>?*tAULfa!mKkb;D3Z&74FwL{747QFr82KG|?gJwyY zo!cR(QvNM%%^E%AL*2fEvJw<9BGv*Nf{R*ntF)Ok>`+=~BMPs`7&A~#AZd~ai~R7C z`z^fPHpu>UDt9Y7X38L!;M5W~mEcHt}S2tgYInVObg-)4>XaIoEn zLuE)W6JmPL1EC5p`7cYcY|5(~|<-b^V^=ZFt}AJ^pXLvG*;1%?qnC#}IR?}rhZ zA{HP5MZw+hxil@y&Tbnd086QZQ=PNt`k zoXh@_dJX}l6KqJ%z#YT7B_anRAVr`{7ZVgJG0KrkNL)3w1I!kQUPi{b`PA(xwvT-l zGFVM@U&<4!m)~ixu9Q8HSx{;GUuh?urm9CLxLzT+HkmiUXN6AQJ+uZymLCDVE#78E zlY^-vbn0>*+$5sfh1Cg0o`%h_mQw>uKGkM&u1^ok6>Z-A&1YnYk#e56ay;SW5ytpH zk|W1IL^#i0HtiML-`U$xN$oSYvpfDal2B5O-F(5L*XVN<1ZkRKQ828jORcCHHtQ1w ze}N>cH&75596eAJRQqo|$lBc8r0l_w_W!(>*4E(U3BdowSRfZtc(ml+NN@!U!e z-i#0%oEE2(;;hGUGC;z1e;%Q*&d;N%+AI@&3lDY)ot}EX@qTuGK6>@;>or!4Hfg5% z(HV#r#eOz^#=PZT(@35wK9lEJBBlmcH8zq!G`h!SXPQ;$maNkDSA?BbGQJ3yJ-y#g zWX4%B6>jbwkAe{lGVw%V|H3t#ivr{Q{KNQgv#Og+E+f<8vNF0Wq*JrrdcVWoj65#Hik?=7`d$D$5%EqiQ6oCgWZF!w*ht15NvY__7Sy;X zM3ibQ=WIYPhxWQNK1$Ch|Ck@-B!kKXgNnpjHqJ?+u`Sa! zE)2nmA;|u3Sn^kYOn^7L{4ZBZM*QEpl6Utui&LGNmufW!o6#7*UR z;8+O-dB+h?K?)b=xn%`OMd55`sB;}M+#v8vT|^aoH#cs(9#Y)2Z7Np#sDQHAz&X%o zvmKKWlQr|~VSH6>ZxZa8#ND)_n#?9Q3H27!quYd-B;W8pg!}17IlU!D{Qg)|Z$U(2 z&cY4zbY@B6%IQP--i0wsu4&J|)fj={!N+}Fe-`_v8+nqF{ z@kU?)H-@Y~@Y5EWf9k;TZ_r!{Ns#$f^fTEI$|xL@H8(e3r`jRrfB6`$^ht8ziwOH-ae_GiO znXLD)x4M2wTJGO48P6UYsX(qa4)45DUl@_x=V{j0uM_xyM~f1lmh7+ zuW0;vx_>qPLd|@U^UAHE&+;(SEJ(NV5(tf9OOC09~L!w>;ieqcEz{OnPYZVY;==Hu|ziw_6j z_^^b*(>BznuP)fc%Q3xEx3PBW6tAoIG+{CX|L9)9q7Ywv_(N-yaQOXG0m}YPH@rmx z=bG)xs}NNJKHDI%{i{$bP_`Cnsb zVy2-Xc1k)}dZ%RMlT>x58Cvq2+9Yc63VwM(=Vr1lJH7M(L;uizI6_mI7B=)^AX+UW zukzPCp{m;?0n&(|C}4)lk{>dUbw81+K?3RErl8AD!696KA=@h;$=Q z>{`J%z{ojXaJs~s2NCl{%;-Fo&>w9Df8v8fn1F zU9Z!~TD*yD7~J_fBFpaS~m<}<#z9?i$ctN_H zEb`K%9RT?>fp(SsQHt_rK`TphlZZaR>7gQ)j#kMi9n>iS2fg z2puJhf5*~$8l~!F-R>zKi5nE7XW*v??$H0lNb3SoFb|w+SzbL%S}iy;xb6pg4RC>vwiy>N4dEdG-CR?gJC)N zbe#H;CWBgsbmHp)pH(AeTlpvZH_ls@*Tu5;ey*QvG|MZ!8d~2yfc`rgzoZuZXIvFc zftGd&B%xi`e%y?I@JF&FIOA~3YkkRnOQe`qUdaK8(|KJI99#P?Vy7n=4{rjs*qeV0 z&WpC*7NOh4pPXFv3|+WvtBD_Ij~HiqB1NLm^}*uVjAO1zQFUG)Bhoz+fSeXY5DpF%n~xVf=BpS8Thh7OqcsT?Q(`bg+UcMz6GA^A~tPYN!?b; z)%b_=786e5k|DBM^4hsC#)=v5dr+h-`)Is;a%-n@?*){8E(R-k`nyy`=`99Keg>+!xH!Nk_I1;> zgcz}5mQKWLqXQl*+`k8~r9)o$pAOx~UO1^B(Up-QLr?*mX&!2RVkju;d)X;IU6ve6 zIpet5xlUSBSO4Yl>z@l$oBl;#QZg5zJcIl{0AoO$zs$_Zm=C4oCa+LB)gs)oUGI1b z$r&jF=Cc#kN=u`{Km-Bx0_Hb9gPS+p#?|E?68ZBNr~?R%+Ppvi#Xn#k<@X63K9xPw zb?c|IBsG(>EQFGYQx0SX+Gi^MI2%n981OQApH2~&*%&lQpm6X$oTst~?*|C_;A;^M zhp4Lbu+V4>W~p2gQMkYtbz#NLS**%2nO^~$V4E5NAZzLE5G3(Y@_QB^5f(fs3HMP( z@TJ0YzWR!YnTOO2>In+lJpSC-@l1@GP@G8Sk?W#Y-`R0n@vRJ;>kW|U_J?)WYPN%T zSZ@R^2$kvgJKdmNtA~U3uoK3ekW|i9Mp2-jCKv1#AR;~%khgqye2gOu1U2D6YtSAg zVK&Sm^_Db;*l$|RM#-Dpgi`3O+vt_NYP9=h{dH=svajlmTEA1)W2;`;r5ergu3hi7 z%HDOm-Hvz%N_%CuNH>mxu+tngy7jPM zkLxQSh-I?Imw6cp?X8YLjS>VZX4EjGip-N{Qb5aZ*cfi^oOb=Bu=Eq1QNvAfaOJ_J z+W|?Xkfk-6;qEpNsbzU#6$qfd@sNDN*zg?eDdgbCZRTw(D%6jA&Dx+=3;OM0D`*Yl zcF>E41O8{!V4dc$9oGhA6=S2(_saNX7|fts@_R7npk6*z=p}ifEKER<&Ia1&)Py&% zW&s_E1(C3~T4ArrhC#F29r6RxZ3X<#UeN0F>YYI+Vr}6sz8=^u76auKMk8W8u6gj6 z2M13VPGZ0Ywa#$R4Tf=-gU-oX5Y}QY1=l$diw1Em>U3^&63=o&LRqap$K(#4zIaCL zZNg58sEN+ije_^)Jv+OYE?j~r<_xb@9|pa+Uk_TnULzQUtxnL5YON?94jb+6I&o0l zbfDs+V{Rvum)-@mX^Y0=Bto8VBd}TA+hG6HLW2nF4bzB=yHFN=Q85qf(Is207v`HE zAzzhmp|XP^HKU^@*1h%DQc;LyhNG&-??d2~GYL@+SM^X}C!CiJqiDoqFxK&hlPi?w zfe!v2a-*@caH33h!xV%F_)EDlWW}m6hggY76mS=gXJkIZuD$P%UxM9{!7m=T1ER4r z6qo`ZeUOfV=&__g=k4L|-MIrE#uw-q3nQH{&e_1gCN4WPto^hK4A0VWGR4C53L3#P z5F$?k!=XW;9zTqv-xY3y;gU?j@*!4G;m~j#;a!JW4x7>C353y$4`rp2lJ7Y9qbp47 z58q_MLs0i1j@dAQw0FXFc=7DCr2v58NE=%~VO1RU_-!m1hf{Iyd*o?5#HCL*;g8_5 z7R$m7My*&;`vD0CWg0*T@;(TY1R_0>7)5tYsu+YW*49_Y8DQBX@7RTomr%}00OP{6 zeCFCzaj_e@PHugi9;Y{q$az{7*vDi>;YjE-^>74LZ*XIJ;47)5oeWW7^5E1@F zcMi`AGpxGPTE8g37CMI7E!XWFX7q}I%OFrJ-t;NX=``Pc7|BF*)QfUdmzd7Q__2=b z2C7SR%?Ere>7%g|GF-skic*|1_d)NgxFPw`)Vj|j5Onyo)h_=ER=)6M;N=VHoZ3Xa zwr6S2i$--!#M+m>Me^RsD!Gpa_DduNy^9%j>Lk@^=&>?NL}<| z0?Bt+j8oIug6I$XM?L~h@A4@C23rt%XLxTM0fOf4*P@wltkKzXvYwUEDQ|iHlxnGN zN`(tfEys+-kV}ZfS#Tx-@k9ljOw!9Z{V)cIcD*C*FFbU~SeneIB}rbaOXPZWSaCmY zv0BLG^=>=nl6#{a^oK1LbUU?9yWVNnYHSr11s7tUah^qjUao*xHGOCGg5%&6$0bKr z-W0t4;jQiY|LA)aF0e2`=gUwP@st_9=2Th7gHY^5mZIiZXbiVN(Neuox4ak5b%;L+ zFAgGf5C;yeX0EDMh)(2lvjA>})o;ZC^Y2K*qhH1A^+78NyFnvjwV+k6cY;Bm#X;N* z+x1pFXtrDN3fN4mR*uX->^MS?W-;>S5r&VL@kI1k#0=eZ$dCz(da-)!kcn|tOpmEA zToRY58NaYkXPG=oC$os}Y-yTXlq9`hK%{~>(IWEZAKV>!-l+nzy|yUE4Srt(zfEO0 zNCsOE3z26JZMH)t5vR;=e5fnAi_K0GcdN zr7XZyP{q>}k}l5pqFiw)x~L-sWi(Yj#=^&-uUlO9m{eHu@_-kUB%`bFMY+aYSD4>j zpxDC1J{D)YZepKieYZ`SeSF7Yr|C2tt!144ZnJzCjQ1-H)2O@0xeWONOlh?TXi@MN zO|n_L{8%>l!8pC(J0x~Q2cTXuQ5^t&8T}f=BA0-oat|oCU%Jz%nrnqj#Ju zCXsXn^3KC7*R1$Jj6R%mq6GYf14T_!BcDSb-JKV+&ce{2tG!QJbz}=yRYh(G?SU%Qi`DopqT|pT$LX)wSq7+gBq4M(BW(PnUx#%;Ji*81OA)ahM zRDCGsm)D4}%b{qEH9iQae%E|(UU>(=eE7{|Y!OzfeZf!9gnXcZUph-GwJqa<VjE0hoxct3@+X)5F)OeX#Wn^QYTMhV?? z`P)?Q;3E8(T+A*`_<_U}IOFM2!YM>1NR)W}WI_^*de`^_|CS(s<>jnz)*Q7FZZ@R% zhJ_nT4WNM%R#pMnR8%Uhh3I~}gwo*%yRf2U*|}d|5$Mg?`!den9f>{8v+GM}3Wpd$ zT;=?lCs!AM?)nf{()Cq6*Eh?xZ(Fs;VwZ;knZJtJ01MhZz8gtOMtzWNmHj#|h=C@|0Ml;Vx~Er zrlKxL9>fHjudK?tdU%wc85(lvnaHlQYqWc#r%#$2vaS9+C_pesKYD|iqp>@UD&Q}c zA5ky4paQFG0C(&*Hh|;S)n%BWDZn;Rd`QO+r-n|S)rGuwFWWEfaa^Oyi>@Cr#*Vg&*-1cl4x}0QE?LT9-*Cu6~H-iR51JbN~x&T@i4Xo z_B0$2bpQrB$GnoeZ3Nzd5CX0c$N9I>MNA1~rSWcl+mUPx1P38Eq=g*%60?JA4uqJH zDi^;oBJE&Cge-hW8>yt!s`vT>xc=BSolIuBbvlnohaf-qjMK0sD_Vex14?rd_H_}C zlgrtN?6|9R`GiAykxrQT4M*Jbg8L|L0r}eb9KVJf1l|Ay!a1&{ucf$ZZ<-m`2pFXj z?cK!2;Rxuk6$$}Zg+EdUWpR{9NweZMZ1#QOzAxbAH_duQ0z{|Qt1Z01mnv09F;WKN z;*gsxCSbc}3MldcGT2~eAwbl#>WT}cnsf!frhqko&4bi7@2Q6!~`(ls|V>DF13u6YAB>4f%)t{zu^5Y_0K1-bPLs76P3hLE*){L9 znw@L^P5M~S^sDWl{RVB1bQ@(#yK)|0awY+hJM;89LfcJt-^}C4oxX=qTRG;G>K>i4 zY#Qu{Xy0jY5Yr|J*Nxl(%%#e!l8`N1ZZnOTd z(XX$PnM!#m;p4nun&lNNrnD)zch?2?q&Z{Gpn8g?ZmZd>cUdD~gJ>AE`t4rO>(t|* zH5~T4!>AiYD`m3Z6x*xr{H1S4FO2#f1{DwMy+P0lo1I_~MXewnwrg>3*y_}~?G?5| zRs72L-~{Y;>bWG&wS`;o6Iklx=&#`s|AES2^q55NNkP-(+aLK4*Z|mqpTG|I8vCH! z`}D^n_4s!zlfU}vA%Q)wE#H&Z`5^LX$r#U5`P;%FTuqg2QMShDY=~7C0KCb6h4-Im ziIaJiFm;+>Vpq?~J{1l)U&0>Oii2*FZ@3lRL>34(vfMb0l z9ESZ~Cmcq#A=z-(QUg!;rR82-0O+h(hLJdJnoU)Wzo|7Ts*J}UC6QQxrW)@!6C3^Y zD2&-_Nu2Xp4_K`cb(`&=Q*YOT)}X^UukP`)-Wb#xP1bFa z(``(SML0Ne&i0P$0E*2Mjz6^c%LtgtH-xX1yqDk&B%|D8mM4gnC@fIUjl$JPJ|?GJ z5Zoy=yWrMAf!&$6rP6gN4|I1DClD_2m-#7Hwj~6i%)-p?Xj3Mf1HtRV$Pf10KY8j6 zXJhi*1X-SCZ(|0&5oyNWhDIjmeCNU4gXlxFjQ@q=EERn(epjGEG*Lto>g?u3=XTg{ zHP|2wqCOPj9Q0a2pFawsdb>G@!d{2f8!K>KzMU_|qbnEV1w2vj7BSz-LJ45{5$5ZA zgj{!`IIiM^#M&O5PUtUWYKr%Xm&8_)rOxlce*z)JY9DFD8c_k9b!+uB2-lPm6I z$nRJkew7NsdW#FaoC5~oupS2Cpw%6=SR)<|SGj{w6v`8%&UI@iML?Ohb-=XHZ{q}K z`C1cwQxUNF5ZlLW1W_3nhJg?K#WxgMpNiL%n~ed=^Qz`ckYwMY0v_B3pQh2fl`wa$ z(rAtxt*F=UH0t%B-R*`!tJ$vwgI+rfI>UY#)qBH6uhCisIgq>P$f4oECXnr(Bk^*9 zY-Op0*MjyH>D`(S$ZcN(>wHlO5hHUcvQ$^YJL%syTU`v^M^-zN}rl}==f2|w0C zJr1`7fJ&{lDtp&dq%N9W7+@i>-%#TK}uD;h-?C+zZ|}@x2J$GvMj>- zs?3z%vT!s#U!56IYsv!&&3+QM#7~75IRU|T#>FIWoolq65!0%f2$aS~Z|Phukt;?< zNdx^>G+XFFJkIfCT0HPt_xd$24zF|)D_sydRRB!n*td-!P!P_OgpK0op&^+mCQVIV z77n#8z-bKyht73ov{MjV;@@I4cQJPjq^rrq4QWk@Ypj)8K6j0V4EH{HjSot~@bcVT zxoN&()AaIMs}=Dt*<_{ly46*PDrGxsxU-$L+U7N=Bt5`}tF4KvRW(g+*xG7r?N3wQ z3HV6u1F=hIporh{+&dy}4B*P*-j(0*i$c29ti{{KmP>7n{^5enfu<{MkUmDWP13(8 z-zc+HmCd3rF2Z*#Agh9v!G-gGbDh!HB9|H@{&D(&x67vN(yPa=jiw=FLKB%Zb<@z8*{CsNbA5qe&)Rp{BsJlBDSA^R995Wfhy zXYmT&4`D=G`E>{)#zv~cMJe-W=PODcg_;$>+)Bg`r=}&h0G4W5G#l!jYfzL+&?+KM zKG*At9o^cp!cEIP%JM=-z0oeO#eU-wPpzs5v7*GY?vnA9;ax@Kfs^?4mB2P|L;Ecw zdEl34Z2Wc*PTnFeyd~o@w0P5SB8YQ09c8P|ibR&NHaxYr5#tigZl_gTB% zZHK)!(XmRSI30!T19ww?LYrH|J-jvC^##E8&9a0(QBY52IWD@Wgt0V=%Q)wpkNzku z+>ajdUigOkr5-J@Z9>z(^VcrtiD7K`bRV!reGs=;s~vROQ5dua{Xr1c`%zHucH_>V z*^PU(?h5B#zZyDEzfpVFCIXwYygAEN&a#eWg=?IyoG3rnx9f4)XZ>c}j+#Mj7!4qh zlm&xESPOQ!(3oGY9QX&zR}7d6|qx z*}55OxzlEEqwHS!2*NbQC4tIdMByl$i0quu-%t7#;uDUber#`l9tZg|RG9I1~l8?#w*^6ojiE@ z6!FZvT}V}VnCUDW9a22hzAQs+7}aqQ+y(JiNebDv)tdqRn#ytO&9{B?YkPcaHtVaz zt#`cbo8u@T=9k+xMl`!9$dv{evCRY^RW0=R{FalDR7Ba{n$mv-#lEo&(8qPv`}Ky< z?^jU-yVam=sf~@6aZ_Ir4?9MifaV^J0kr_Exvi_Tgs-el~mXvsFVv)#`S- z_a>48dO!;VrXYYwn{|n$#}`1L!twOr=paw8weQ7OeDEaN`Vp51R|ppf*2jmnd9$sF zd0dF%-$+sIP)|Cxbt1|poY2mLkcDL5$|LhyMdmBEa+HD$`{YlKp1;-WsL?^Cj8mv? z+szvmn1a@aZwY`J{Cq_zmD#@c_8Uzi-g+qK#9KVvHd5h$wfrqM$}7AbJQKB3VDGoL zJu!q#$A(#BR})>~%i|*yZJb-?UOU>C3FAjCVsGX8aV!Ma2VbyUyFi_M{c!i8U)%n% z_GTM?xWaAWa zJx;H-%m&-`P8-t2cjI^C^ustn0YkyDZHdyW-4$j?q5zdpCWNmfYM}^9vWWYAQKq8g zmW2v}@(oJo0SZdnKi2bNfpcmCs*G@&Tm!^ooI>>cGYBj@BZ?zVD@3G?RQ5uh9gvzz z|L#Q4Nu_>Tn}D-iT*%@O5Mvn(TY9Ac5Vy;~eT@I`OQK}N)+>MvX7eYocN{H|*K8Qg zhS6*o%^wJ(naf|S&ukFr+CLvMwLDfUq3i(V1CHj~-PkZ!9Q-`Yve|H$e8m2L=~6WO z520eQ2eh>!|M$;-@gI5f|F5LETO(t`H*Z(efM%oO(wOfTX+hLx+93O8Ke8L-6pNK1 zbBYA7U6#1#dK9-Lv5F3*+pexc@hkYk8C!@Dnu%y#@dFl?SYN#mg-cvtTKHrQC$i*; zaD#&Gr*Uh#A4t+?fN&6_pmQSgqq;hgU5Pv_K(=0M`4nk%%*USP3OAgTw}oDtjLch^H)d1V5YgD`0X=7d zWcrq35I__eQGj=dy!5b;lnNfKqe`dw`ktun=%i=s&4Kb6--1@SqCCR&{p199bMd&P zi-$Y3T&$!n8n!G(Cnz6P%z{)&g-Q+hwKLR4@4htHrpR{I$SeHyYoGF2p?*dbW}N#; zY?? z)G_o?c1S80gH3tk@kfC_fT^dnCDpjM7DsWRa*8QVDXNdStzF#>5q~XIaRPEB7L=;A zWQ$yGDAjNs<>gkC0}#q6D{%@_rN!wmNIDxfa+hpG_zsDs^G3-#>4s#Gaff%$4}1mF z51Bxww}($W;W1_4SV2=n&!4jo;K+raNoA4a4Y>w!x^sC+341Ly(BJ=e(*G2{wG~GH z{9j93E>hVjyedxFcR;NebR{pAIf|QG)3eMAQWZdOQU8$Ncf!kzeKWyptAM1aqgkj1 zDXijaQ#T=AIJF_g)waHc$3?XUAicy$*`yL@I%3l>8HqcMC~W1rC3;)769m1;Z=Wcm zP=ueEZxXMr+O^g6iSSyTM$0ItCGVw$K4!9q{AMarjf!h&;5~&o0FrpW{*Bl4ww}|y zPhI$g5kt0s6Z0&L&XY0A&wpU6O@DD7W|tEt)w<+d`HU~yApNL+COWs<6FP``Y7_k6 zUR@P&%{JG?&2{k)l+SD88qgy1rAbiCck_vfEkUkAQ>>9HP!`FXU6*Gy7o{)Pc(j&8 z6!`$o3Uqi7xDl;gCF;Al@@2v>uw4*C>ps?Ko7XYHx)5Bt?7vLdhK6lu*oKCE5j1S! zZAEtJd&idtam=Yv=37KglEcsAs^X%0-Gx+dB~ibm%!xBuNi zazF!Twr|PyfB%;SDpYLUkgfmuzZMBov3Xl{{@)$63eGP7@$*0Zb%9pt2hb_((-K^t zy%mcKlrfKcctvoL(hV8ikkJhp-H_1&8C`hapyg1Gt?Kqc*CO%f^(pQ(NM@A_grJE; z49V7UOP-LVZg%RRg)`*M$HM093@)nPkY7yj`BE{mXpKm~Kg@#yUXuh)D(8vdpEphU zEhn5r=jcbLl>y7|O2XxsywBiT1nzlu=;w!UGDbgLW3_&ur=o|c=wK}@P4p>&n#U9< z6LB|oNFdL`kDOjygdewzPfX_>i^`mVzq+8DUd)?=>*m`y84kBdvA~Z5oqA0A>%$=1 zo^Vt@=PxsWht9Hg`oLMG=o|h#^)AHv%jNShBMNNSMLK~xYkXh3B3-9{^CHbUoqHCB zlJTXZmdFd|Ha(!q@+FQp^8&i0leJZ@X1z|uo&KQNsyE`G*YCB0RwL{Ny+Jz+qDHgV z>NINo?qHQ{bDyy@apNZGfFNpc%65KoNEw2A2H}VB%KIe|T>0q@YTv3IaDxnUE*i zRt)&kl(e(xH-XEOX90p#$-?m@clwth0)yGq<$B?gJ8oO;32XKe{YPc2a4s719m+PE z&&qCzB$oASu^Yh6CHP1X&BM)J_D^xP+msT<{ki=XT7@$%?lN=NQEmbvfU%`|@Xjh!Hweo5tIhquJSzk$# zM&%M8b4!w#$X|fBq!Jq~UI3H1fXgqUn^mjiD4e`o=QIkHN*4MITl-+u5)lGW@e6Y` z@~?CNN(!#o!7b3;DV?E>v^D;rd3bz$@|26v8;R={dGShocm;_|ZSO|v+DKg+scRLf zE2oef$!jBdZ6vRiB`-Qf*+%SoZTY2aM6cUq$SX196+|zG>(NI1y7k@Oh+m(%_+?Vc zjR>|8!8Rh;$|9I?nAWTW`}QR#FtahZ9wgat_WR#oVG$!NdP7HZA4kNHDk-&nJDpy> zoTMMGd~d)fHVSuy%VW+b)i=MOBocz3zJBn9WG{w=+X#TSC=#qB4y+&m@{QeyeH*cF zBlfK#_7xa}Ci*#j;gpNfx2LBsJ^BQi6~DN-ata$M^7ED=Hv(h9T52CdDKy@WHzs<< zy*Awz(SK4T41`4l+I!0R2V_7Oi;(d(NXBdwJd>w4&t^sfu$E~TM*L+KowJJ&KbFNo zsW2#316AGZ9b9q-8zC78js+D6e&AF9{5-S0!6+TBS z;Q#x7=UM-xsQuuP_kc^-&L%{gj$>%^<9oh-uo>CbLq&#OG1=td_8Vsx9Cmh=POhK} zxl9l2cAv}#pRA64vfJbJ0eVymwfiEcmd8bExyM<}`y}Qw-s4CTf*WZO+6Uof@_oK2 zjas7-)avlR%L#+ZY>rO=OK^2KY68p4{l>Lb0zoL>(_M)Z3eJbV`1+yT+2En?jrg_- z`N~>)XmK1jvD=5+{GVg#AMhFTB>|6D4qssfc>`dflLW~T%;1lIl3o9nUF}yuT8 zvnL7Nmi7;RKbx?(Ct{0tv-iA#HpD)9^UC=_kWb8Fz-&=PU>v-hu!{sz8z|12PR_!y zi0H^L`GLw*_UuHpq6`-(YB9XYp+_*Jm{ya}{egv}ZlvGY_+KNDe}PLF=w!^_j~SG! zqk+%a=rRL9(e>R6p@yx@TkU%+gF9b18ePencUTGnfY?hX@GP&PNw+!PD=vs!b6NB+ z9AzmC135HJFJ?WXsb8LG0_IIGRoXe*8G83uI7JXSvLklMxf&ZsAPG{Q^IfX2`QsaE zcBmF&ep_)yjxYFTWD+YJ?F8A`=QL-x_A3u1uzkl)VVPi6^@2APB=;4Rp5P1lGMt_- z{tl_&uRNKXcOT#+N|1m1X;(iAE+WQHHAgHr9aM+0g#M9sqxkJx`SGD_QQ8OGnBa4H zdKQs$7l?wem5xDl+)XMp5KcJnFIy&!9L_s=LH7Cs}~L1SrmClTiU8e7XcM+3XVTBxTTO@bJ6P1!Q%;a>E1sFkzEwE%{yI9kg^v z9Z13HXCUeLUXo=qzB?7?6l)}+beU68dj!BZcz#r}$dSlC&0GEGo=eHH*@q6U3aOefpGRCTWZw*)V^2G#V>ME)FL>fNh#N6dy?&dR#%&`Q&t3VQEQ@PLkBrN)w%^n z*)r(z1K{9NF#FLdQwFk$`QbD?vku;a^CadcGLXXe53+|<#Cp3k!Mjey0xAZjmOO{7 zOdhr6(B)Z2E>&W^d%0r<+;N_c{JMjv{?~_BdxCkdieTdUPz}%E(%_d%2)xCYj*7&k zvKM2Mw>6|LHWYa+p$^`3`UC~}wJzm&AS2A8z!#?pcES^{dbX{npg zg#>!Cd!cSxyCFykC^gW#Y_CzP_k&uCW9S}V-%)x6?c^XRhJR%;49ROWET1E|whDr) z7NZSwFnQer)sy3$+~%w(TU1ds82Sa&!^~3*IHsf|{^F$Y+f|R8>OivJ?3`a*Vn>4l zaj6Hjo8Ddq(xZEEnk(Chs*3aU+WRBx5u#_?qOw@c>X_F>~yAejy8=kNGo14 zhMH9gq@_@$r}#~JLVfd(VU|!-i$7G~0|XZ-zl$fbgsOLN-%M`!UO4 zzNk0Muj(K_@k>2Qz8JVH)3IBM0Max_J-}=XN~8nP-H1;QesagJD~tbf5$JREJwz%k z)vkz0xAHrzH=Rbe)oj+gtP!w5Gz?n(b}#64>T%E-4*T6<)QuvxN{v3to@goFbw>ku zBW4B`s3d#E{%n>^Krt>&LKm~qG&wQ+ zH7EyJ`$@|Td4ZB_JR6O+3g&98Ma*{&&F1d6({z-6U=!C{QH~`XjnEPdKMut2%9Eh@ z8JAT3hpKpx;}&ljpid&cgRy1t=W{B~IFiX7bV!UpOq6_^ZCfrg#j(K5Ul_@Dq0x44 z-y?(ITbYb75^7Jdltm8%RR*C6f#8R4+`!iL(Pu;T?e?0{ zR{y>%{`EFsxlOpajWBxVOe*4}?%D%*-+ue(;=(JAV{Ce1G~bN}^r_2(YRhZ{|LzZN z5ZKqj550$KI6`0C6rLEpuNPO`L#>Q1_UDENq5Q`DL^yaAUpiknALh&komI*0ZcB0& zUxOT;BTR4kR@VLE)bd~JTpIA6f)r%;2Uz%&GcoVC;GX9xUbbxKvP0Y7ObsNaqtdGt z#nRgqL3?4;@328L=+}FLpcOVd!61rSK|E~N;@+^;sf!Gy%ZZ>W;gnVz4bpF^=kg*3 zQ<*Pr{sbE#M}G~E_z$%E;ts(NdC!t>f8;-40|4uO0z&f|`#=XB@y8?e_;+}bz+Zj! zkieeTmhZ{yd=UAxWQ^yj{B7Y7uBOTfNw!88bx80h0C)Xh?MkmrDR#UWbcsUfnr(V?`yc%dnhP$Lq? ze>%&iqKw7`^Cr+t^zii+KgoDheQW^e&EXn9jb_?MT$BVdma%qSvZkKhi^jMuLb=^n{(Z$83kdl z*$r4TVo}`c^#_f3jT1Rl3g1N&P%RfufejkHUM~uR?l9~GE!JxUyH|&$I?b?G ztFtvuL0JPtE^^o6Ps1{}-bdly_T3s7Q@1ID-ro{oj#1cV1~oKB6G(F}kE z*7^i9gJ)BH5*e}M2!@T)i;HB67sU@D2Zi56;Wi33mJsbiUihB#mXQ3wX^9#5h)%Mf z|KcB@J@6eqiOU&^>0X#6F<%MZY69THU&4U01+JsU4&*Ok#;+hc<^p`1H0#Rc1RO8H zFB9j7HXHUn9leJ}$v9$Er7M~6DNgw52_Z`@3MTx|v)L$|NYRHQ!20GsZLHOGc<>u%mx|y0(*~um%%~C+{$#?Md+AtXwI-`fX2j8#;|*q zS(#t538#hVKcn>x{ZiPCMD64YFTYe&0)` zydf7B0CT4y=5YtcHc3a4gckbdyD?zUkleXx4h4|ZsXoKaMR6ZairnT)ZKKY(xFWm) z=Aa53xOw|+(#jMxPgA%U@?FtC#X0l!vGA9V&Bobm!pv%lYTr+h#z8$2`jYIQu{WN{ zW#%)=U^bXS9L~Y0C^Z`{_?dyq8pOc0$QOZ%4?O}Gb}05Zm75~&HG;OE{zG z6hKmGQ2eV|@{Z|wVRYxcuiEHijzH+E5>8@$s_2>G=$1eL;YtuLT5pYv&HvJi_^xmY z#un4Bp-9t@bV_*3jDac;%O&xxNTtFoOQQri8;VbEQdNagS**sWoB?8;R5;N%P@{*T zuM-Goz}6(mki`P|TC1f-iB~pwu85O7gF^7rzXm1p7p949$V}lCzY=UPoB=GF8Lk7vR(cgkMX*-$-=xzj7QJbIJsr;Et;Ye2Xs=W+R@OG%%=3ARb3TaKup! z&S&X{rGDX<)W)|K3oXlm<|!5P^L`52#v4?@6f<&Jh&&XfvlZfNT7>15I106u^QjaM z)P-3mcKrU%@k`43#;u!!MU?kpW+K3@TjO81+z%JPn32uWFiNN;5G$_yK@Y#n^*aWq ze?OkU0gTt@aNAPy4Xq!~myOMMJ5 z?ffC$w!-lYV}56sF?KYd-I%iQLfODccfpr~@5SE9cgQ8BE=cZ(srbC@LO}{2>6-mL zq0k}Vz*XYkXVDbkctp;CK3^>L>q-7AZus-T!DwVW zI{fbWKs|UC{%JbV`Vrq~-I-6ee>?}Ql1M!XKkO0;fT$y;inu)^+S428jL^5fnsl@!U_&#_5DT0i_`* z9VannHQUa;DzxSD55MzIzVq{C@#S*(xD39UzOSY&{3-YLSntkMw`^QfU{cSM9# ze6&jo2R-j1m=(WD#w&bPgBZ_0kfOS+i3~$@1eU`{cZOnvA2Vn1*kB=@$>Q z4V*PEwHVGkTlCgm3vCdO>P~xG*8XH5@MS2BLPz!XZmoemdO88{BzN`~e_nTg-l4~f zzt8=I^v|2_UTZECJp4}hHWqN<*S~@GCo`cfl0ANhcT&*tOc=)$E&~>84ND~+e1m;| z$9u!C=^5Wd{OdV#eGmva*8@Yq6`M+F1A{gIU>o9-+khBGF+e_91!N~@5jViy)SzX|EYW|iK2ezsTS4EzJd9IRdi7~VeZvbSZ*KJW>p zRON%@fAESK7wYI%RynR zKFMa$IoRgDVbi@+mQA+}J(#Z8lH6s)!pYcFYoVmm?rnJG_@Vr^`v`^%DG4H1Mj=s z8)m@H!}m#=8^3-y2PY-4Z=q#Ym{a82R}6FJ*{B2#Jh^pu3l+Mv>E#Uc_p?!~AffCU zY3`SUHc#ocr5Vz<^$Gp_m;d^2|MEAv1DRX(JqpREr4xb%8MFG&fGZ4Zkp&oK#zLS5;Jshpow?KhhZM90n+ey?Iji~6bg;I;cP9hSWJAUQ_G zv2dHF;P3733^R1pWN{B%biOOkQ>{PXQ4^$pd@FHt+&%e=$NKet(;VwR{U0D9;oe~G z7}0yyq4Ts(1H~e>JD+{3XjNR#o&dg`!2hmTbCc;5XLOO$qAA*WN>9cn`O| zio;pOV4R&|pAUWb={lu{DEv;}mW+UE2lqRo8aue9k{pO2Yumj?w&1v%4Bg#f0vnL3 zMs%0)*eK)T{&;ldZjX*m1BT5j(4QjbtBOZ9TU&0F5`?fCF2JvqyDh;tyP5a!%>s&5 zgkT=(+5NjwP}4jLHoxXxxvcQ`@B}g_>Dx^ymFD)W5H??wQj3a1l%X(Ed#)K3Y!6*E7Bjmkj}nHaqYb%>s5Y8iRj}{vI&f!hBXd6)!WhG zp}nYPL%KD+UePc#TvTjl9$~~jRSyEfVX=(Nf(kn@64ifkn5n=#_w|(k4%BwPWmndn z*a8T?cp*$rb@D}AODF1{ihBZ%ak+Y6q4mq`L6&T(;rQj6%A3-b8o;1Ku-m=Y1%?ep z9%lO0S6-FA93F=Cs$(3J-!2SuBBDq@B?Ojvkj~KxoN~U2_GqDzzz8=|8YzEfk<^mH zj8NTy9(L0ETXI#%-3vB^2y~Xxk$KFfaIAK{gA4&lGNln2sH6=Tfh3f}Ds0LppG8jH z`7s6>C&NUIe3*v*7X~nWucdZtX9s5ki3oOfywj&A9Exaih38JH<|ZQf2|$Am#r1k^ z*F!}I>;VN`$XOG8!zs_kqA&jGj9*O zcO4L$Q(6-KZ_^Lp`s#aMhglNY_?BekeLkJycU1Bu^hAhDC~CCi;Az8ZkfKj7LtNs} z9p|$A|M&Ddxgx zD!e^2MtBCHTPdgKV&D@-SZ=Ks|5TeS24hV<@c+zDOmW8$apcJ+C8HL?Wz19@Sv|r_ z?5=bR5t?oS8b|;sb@lP`uuV-vEDoR4KRb_HalIxCR|%Ibk)`GXPt*-k5gSJ86|^BIJw#j!+yV8 z@AbCcqt)YVx8AC6?}pjsM^a(9%^p%i0}xod3o2s12u&3z(#nk?-u0ktw{j>uHG*;u zkQ_Is!OQegGFZ1!<{0o6LWq?yCPx4j`Y5t9k0gcS6U?zn9XN6Cl5ecxy+GK+PhNdr z_q^bxIATw8H4=Y2;JB7|z#oJo?*n7+GIVF>gewFY@b`pDBhB0(zLD2QnM9i-2>%y= ziO>Wl(}4MNZ#WXJNB$1)bSFn!(7(f$YD62O{2hGdzF0hPn#kbS=HtDbUQ}CWl=SbH zR#f`p;dVbKpUK5u8oSW4=&Ipqz8Xtv|M`gl@*uV6!Ha2>*vF65p zjXHksbKTo*D%vMuwf=0P1nf5U9d10)_rC=4h$F_?G$iFI{ zR9|6?uT8_J;q-Im7nZ=6fcgd$esR;~@TR{w?s+IOt}fQ}O_h%tr$M&V{YckXp!NZi zHYlaV>s$2!TtQc;wxOUHY&(lmA3AGimnad#v$KiH!uSZ{3@+xV4eg@h=Lw(iBs#w` zr!<`~xjc1W=*vh^Xv_x7DkprgzP_?2`sq_qZlw|agd|VDs*13Z0t}RF7`eZMmJQmU z65>@GL|oZ%oEucLWo3G{_iR$ov>`A{tJ;zZDmLu-Ms#f67^#D%WBVLbY^~;fQL(j} zYuB&|?S)ja;odLOu_e(ts*5mJR8hO;-JW6%oj@_He`KcNyE!GBJaD2^st)g9n&U1Xq51T{3ro(Y}3btDBZlzK8mRb=;UYinRs$7o>bfH=mjI#n|c1&RRRWQLR-Z6dTprMzywB z^R-c}`OB%+92a`;%T})4GbNZV<6TD!wnmRP13~6wsx-J~o{N%pZON!%Ex(&qBznB` z;AXP%NT$!+^}dD-#aJVZU$~&w4>ZK`b4lbKfNG7Z{h*2_&l`-mZ#R{yIFYt*7bp_~ z32B_iS9qmK##|=AP)i-~JX<^$BT}HRRl@qp7fxh($E#a1#4-=4tIz_f^@ONCt zAi4;zG^k*<>DaM=*@6V5Lc`+9Y6#JfLJLy1pTl%Ej-}6_RifJki_pG+n+K)1#l$$U zXOWhSU7Ua{mpb|Fnjdn^(k}?7ULRcK9F;G2cXzkdI48$Phz5Weu&FY+y=w4c6yu#& zOV*u1{4u}s!xCGCGn5Yay&1&pa+F?y#2;vY2fRlv)Q=+;n9a{c6|gdGk%AOj zdwJ&u!mG{;zGC-9?I9>p)1*Y}EvMeA4g2+GD-2qV+AwH!qkb@`ck4kt3VW>E;HcLm zc2sE;1-d{*$clozOc2qs8iznk`F%0OZ+{e$ov#hJjEK+ks}DS78{J5lwW(|D?VZpZ9(UewA0KKF&?mn;Ieq+0gPMbS zm5!Mji-zZHO)qw(P3esu0}pe~Chxud<+Nt9wZ2mKLtmz6fVv3ZvA2-5!J+Fw1;a`q z`XG=(OCVSGXyUfgpfF|GpiGm9_ljRARU&jM$sx)|#V?MtV|4{_e`t>B3Tnmdl&|P6 zCW3c=?Dv}OcKr=b3u}J=l=It9mPQn$UPr$`M@WB|r)ejia1f*+m*T( zilGV`%i|cRLC@&GE3>uT z+0k=vu6aPAbsRsfB2jtHDguPope39NHh zXVJ$+U_f3gUn#%(^!<60T4>M*z$~ji4Gly9r^XL;<NR4>`+L8I>(wMl}U)VC_l71s;C(eT|IY3%h zLM)*q6`1!`n06_7FPAk#%$2NWb3Hql<{qBtD<8lbENAutgOifsaS2ON+IF8l#&XUP z6=&aq(&^-ZqFUi9GW@(PbM?Iw0z1R`2P6bv!iFb zySpOovw1j-HH0(lspy;7m77jt7$qhu3M3eTqSE>zPEk|D=A1tj3g)I9hYg>9iNI6U z$8LU6#M5)v=E24v&Q)M(p|B|3Ehl-;xfCoXZs%7Sp*AXvI9G{O5bi7`l>T0*v@lQI z{GOntP$}2u3(k%&8u*1MnUu+5NR>aQ@=`whKwho>dYX*iu~uHk#W$h#xAUBg0;AN>KGo52-fFn}(N3q19@Kc*m4NUzxe#tQ??OABC<$|~TneuosM2$$ zL$K(WskYZSCsrq}V^aNV$04b-`Z?3mXfR4ga|xM?Vu`SYxt15VLwr6ojC`adKEb8j z_%Qz?T$GN68?wRpEXNQLoQdn=mBOTWFD6Vba?yQ@y=8iV$p7nafBuXA_&@*o|NMWk z(L6&|Q8#0C^|${I^|6!;uw4vUvD^5CImr+dzmy~TCG5|4@h!hV?R@*x`;K$ymm{Y? z7iE0B)*bR2Cr0+;A1JqyRb;XL>ef_H%iF_D?Z@@Awk}d=+=^C3=s5uZuwT;BuUVs# zdX&`OxU+%AK~p&-pbNm;KK%Of

X`i+kr|nF|>&vv_^Rg9i~8?)#_ke$FY64i^Wg z)FWzAYSLLkUE^HTogHtkvSzF+n;Z*A`SmS$Lr(@jU zmr>*t9GvAhSgT1X%0NLj#$=%rxTc7U`ziRUp;5SP|Rexa*esI@x8V0{Zmj8E$WsPpm`RF5n# z#TCY}>83BDC6wj|{pDfZLeTb2&=)*ODNRFiAt^ylY+v80ZihAz$mAWxz2CNmr<(8H zlIkCp+XPot*=$rS%PBxMDwbYR4jL^Vi6jaaz?sQ zvAn(;6^lQ|YuH|8n(Y#9$5lI6ql#yqcI8&pJLJcVd%$ZC8DEsv=3!tGt*x3<)K_QuPh#qEMI)LNsP7JxT zqxY#&8Ahbd0qv3+=OEkJu~Qd>#c_P7jS=xqI9^cEfcFXeP~t=+lyaC*l22K7wop+r zzk0-AP;WGQ-M*?G(OX`#4I87bKjsC4j*JLb}oUN^DvYS=5pwn0dN-(=Xb_L zfLgHzjJVW8!55(hQYb3)h2ncvG6d@&QEy83iJ3n69zh)_4sSBlNAdU`unB#~A78A9 z``%iRU+&lj^H;?Dd!zY-194YcKSJyyvB!#ipip|hRDrWGAkMX>M@xMV=T@R}^nU#t z{OqTPk0+CK^6=5a$KZiUEgm8$vWI0dOXOM6D5nJ8fmD03hE~q6xrhQk)D!Q!al+9N zlH=sbL4-JFy}C}03Kg%6j;IB}PZQ8+klPaf*PW^25dS7&e2vK}avUi3-0;7|G!^ILM+E(gbg=Ltu^_2E?L$fzD`{rr3nGEv=$@bCLB}AKEEKjnFq*-1l zY#PmpS31FOE@zWVnN(&&xDCQB5#cR~pmygQ+P#Q&pQ>GT=(hNIgyK^0L8HwVX+zxC zpLcl)3MusVd9vSXQmys5Tuhj(T%DvYRBw(` z815OVKJeS;sT7t2Lrg9E9w1E^5yg7N(L;7B($hrsjLkUr06wc!l@xpb)&8 z;2YnpfTdo{wE+C`jE&zCJHcPE@3%FRn7&3sfG;XEXt3ogejFE;n^a0u{Wgw%nW>*ebQ3k(@cOrr`vC?mArOp>^aJIpT^b{G8N-b%+C=AbbLV~{fL zK;K(!m*osX#9oOlz_%NoutuIh1oAS?I2rpooS0KUIt%qqu{|)5JLe#GO8Qrz*@Wy% z5^U2{Ey%tgqqmjB{YX1u1~|tu@wv=<9_i%xmW=36( z*F>Io+s+JsjvQkPcW$tGv5+HBh9!7R^Cg+4WM^0j4jlUNOJOlgdH)mWg=N#shq8&x z)3U{b{Rhsvf-7MT4cb2bT}|T z0rlH)GUQWYpzj7*hcBtG(&g{&?z&@0>Q*Mn^38eyuJX!{+48E-bE#S(7jrg?w@}^D zewhhHewWTf_(95d3%w4OLBra1e&Apxx{Bf>u3h1cO?$AH?Bs(5csJjZQ5hc&m((&wzX) zh>;6ozvd#6D_4(PSCz=JDwLn7_dBm1*{#ZKcXm$GORrv&hlV&ja;IFp5R~3|>;-Ay z(uJGtH`ij694)M4sY8|TP_cp~{Fp~HMU#a^C#g#>o_R5jff%ETJ1(b3p)=3>%Y%^a zmjb0M3hgP@nEu7SS2J6d6zqG3xbiXt44YdPP>_&M)ipRmfx<}>pV^tfkm)43c*`Ge z{qe)s;-Bk2@o=8kyw+o()SEV+xyqWno!!F=^esFbalvMO7g|GWSM)B-V8SzrP4a_+ zjaLHnfT7`j&Zx2hk|HE8!ZB_5j#$@ldM@^ZxFKGWbu#DrjmaB1*@>9k~fGP>g*<)RXMr`f+KCt@J*ay=TTme z#S~o=0E~=G?qd$L&>c|i5|vF8Y^#Yh&UjmKGU52nrHph!!OMg`i|x4(&Mfxdu#X?g zyo}^8k!TeVzNoI3GlJ zZh=wQ07nS{`!a>H8pwI!SFyr0p45K{UmWiOofL)LTlw7ViW766?87hFLCgKZo2*qEDaQ`8=~Hwwnm@j5cH;B} zhu1GZfUoi5Zm6BRACVGmekUb)(~h3c|Lo{_nd`akd7kf*uWh=I>+fsp=&Kd+^GW#v zH2>(ijk6X~W_m8Ozxy8^9yNW$Z4vaO!Lu?9QYoy15N44fSXFY8_fFF(KRC}hwkW2F zXOvQoD~Bx3??$s2+*ij8i7AdrqSAeKexIjyZu?GcvF*Puq`FT_xXZWPJy&;^zexvp zV@cllrW3sJ62;E47$n;ev3&HDy*K3Qglj-<&5OdI=7X?MZpme;g`V;o+2)IuZS>pu zmo3_?L%_Jccx3c|$!JZ$_D$=lN)+l5cU74}wGn(*4{*(y0ljo|!dbMV6SIw#-BfQ{ z$U7Q@AHplIY`gdNN@Wz^6ZB~RB7Dc*W^B5p@1QBdtSs*+(OrrT_?;KCELvJ<0BJ#D zz2>uxAYI*ik>DGrFi>~0_c_MqWy0qw%L8s9gP?GLd~-sAK5-a@e3(wtOC*@DHP`5c zY~EVKoXhJkw0T#Q4l>tA`SRz@pAWqJi#MN2#De_Gr6q!Lwb@tjkB<(1+E99ftZz_V zMT9yf(@g4vbY;=kc_m-0+=1a%={T_US{|fs)U`xfA3y)oUwe;4&_Om8fhTzs7giKO z?G}G?#vh0ZBwAyv9s)^*Clt3+@726Gyvp38s1P0O0TL)$gW>Z$kcUmp-kY5^^x&vIidQ#b0+EPNDdJ>}Y!VNSK=oRi4O_!{6ttpYD`?d^!=OJLG=e^3%~~Awo8cf{ z0oC=O8;wx&sSyEl=;ZZtfdM)oicFHr{35J>?KwaH!;0zgb=5qAW^8T0Rv!%e-FDDw z@Lg^7I)k9sh*>Zk*5VG|^JafASY>OaM#|b;c<$vd^qpMews=1|*0dJSSxZkyKhVOt zqH@2S+tr`bw|JLtIREGDgfq(WUOE@mI^q1Vyp#Hs(TTHzZgUP4jS3yqYrQ!jG%NMc z@0RzFM+8$}bGzcpF=sk?SM?h8rB020L>j|x*r_*%L9g5D2d!4r4+gyf3wo_qztb9o zTQ8i=LBP#UR#%mlgql#d(=_I*2h}NEy%)@m-mkszEZzD^r^TPP z@m4D&`D)z=&0%qxi{a6&sS+IZyc#S<7Y@SyNk*Hk+j(1yt>Tnqa^>iB$*>X>qPysc#s_&12aAj)pL${AYi{bb0;P!9>9 z*NO~-n&>%uue440Mzfgn_xMP4u)STtviz*_C0=}#=Y9RTZjec;e&gX5fdE#zMfw-{ z9??_RCMkJ!jJuVw>AbC?e)7G_Lu78r?W2R6 z?mf?K#gFE}k@w9jc{G-aVMh;Q-oHxKX6HD=q%W6~**(twU?Cgjmn`D@&48WXzNWF^`%^K+R3x(E-077joRdF5iI)+%lNzAA?m-pbA zZB82-!5on^(N9+~tq}_+W2=-F6Md^+f<~?03}SXUO0VE15ol$`0?Z4@#t{q5=HM8O z3~cHwxuqrmjlH~YqlB62+pfZ;t&hm?h5B7}(U1%>H!2Thrb8>CnXJGCyK{8#4K4TB zJAO%SYu@4W7rw{?#`|KIQ<;DbbJ2;f9u`O3Er2W2H6oV)FS5dd^Bv)b7@EYG8N9#$UrDs`;ctlmC2V9L7-WT^I zZ)rBS8VmU0<>$%*B=yJ3Q(0RYXTDL+(&Vi|;3YMu-|)Q1GTY=I#N{!0nVT@ajf~$U zNN&{U{dqDlx(BSx#vFGs!HCM`{#>9_Tbju&H9fB+Jph9r#e;$FwmK(d8&0_4gtx#6 z8xBr*^XgI8*>jvad5G3<>Kyvl>oI(F6Bx72y?1l(tuoCo;oi%!U3>{qT4qK$GJJYu z`TWm+kI*he7E1~eT|tfFN)p0KWBS+)2}mC}vvmkbF*pk9%Vglh>QYDX^6VgZi{*ql z{oTK7^kUO$H5PVya>S-#GFrwCxw+tNE_h4Qx@f%@ybYaPg-+hSgjkK_*11V1)-Tz+`zL0!dL_qPz%Q7YIsiu3(a1Nlq(VEp`-|N3wL@;BZq zS)DDU+n;893}o_`(ov;R67A>%s0YW1Qu;p6jRvF(&%A>(`j{{O1arp8*kf-C(%iu* z7Rszi%8x5KrEj~s5I*tp^G9e&CtV6;#iK9vy`!H?TfzskWHb$uaWF|oETA1*&fX2? zS9H|)T6E<>S7P(gyseHPqT!t-uXD!|ulXde?^aG53bNXZQT#muz}e%H_t1kQ{BRxe zn)~xr1h#7N2m6*lQan_MlpOJv>({Az;a$9uRZo+XW~v>uCuQoU0U zO^t1t%MxBogTP{rP-r@zArzXs`9YysDLcR$2`SIi!Cka4T8NHYL|>xFNFgdi+rI3Q zli00lF&fG+A^$zt{t=BR>2UQP-Z(5YRM{i%Q|rO5in2T^me)@y@J?N{hm5)U4Xv+=!2?MTp5Ioql$M$3gp?cn zLN`eUvnj*kE17qd&h+vtn0yi&@=lB-^G2lCmzCDCu{M8gC0adxeDZ}{i*lMLCFuDg zU)39uTfwH~2KdFk_s5GndR=0wLD)S&yyc+PuVMPsuYUnC`dK+yi_uHv91X@-OQv}- zzP(1O7o(r0GE;c+Mr$6iqnkZqKvH7<$Aa_p@auZ>;nHVlIiy_b2+2IJwe_O!pL-YY z1JZDnp4&_|Et#ayFlM{yoILZg4|yxqK=BQAdPeC`^!N0=`uD(*kVU}&TwvQTo`$-e z#eU8@xhBLvUvMtfS4Vg&KAR=kIg6hYJT&w-vt<6^P<`a>xAkhb$#@LD!b|#;eM!e- zz3A_tf(!RZ-y1A8to`lXw32R(`{T(YdHrRqw!vSr7S3ABl?8!S+4(wH`D$$3`nIz0 z^5>qVx8%aLuZsb)S;nBgLN(&?6MpF*YsA?27Z3qW#t70f1rEEN-_wR?wg%M(9NH) zNYuQwHwL(Fi74u0ZiOgnGN(Y4n$CjTgt!M7z-eV5bqp*Nf_$wxtjzI6FFLG14kvPj zn6T+=GUkkQ3?A^X`!b2uZ8@c^P{OHztgmga5qEW_dHyQyFY?tdd;l}Qc3tmMAdlmU z5IP%z8hcT$N98W_G8t>QV*A60dkqRL892fdcC6q~Pf}3ewM%_(gqFF~`TTBt@bTr^ z9qk{Fv)M$H1m|ZjBkiB6q0W)O3uVq3Q7GM+B5@bkhWG00gG1ELvk?>%rJQT*Bk2Dp z!eFJRAKR5sAclxa=bSj$x_4B8hxtu{f4l3NfXdegV4o%L**Gs;rH?F~4bz7}k@Iu`n%Y{V_M3G*%!4A4HbGD?Tqq zRt9Yye0U&37~uB{^#O-T5id++_g)pD*O!eb0IZvFQ@l{Q==1z)n6MD69#pj+KgU~| zcQE642vQDNMW_gT#>C=6yU@5FdK13RBbpMQR7n7hy6Qq#u30 zMse_r{>X!Sw)4S{k}QJVxpIOgF3zr3-(H<@n3?mPb@9#|Zwdi&p66)gh_1?8ef;>* z`_^%)y)6jl3dj7AoQE^YmN??uug&^kG@?^ayG5vii;H9eLNGE(4uB*Y9~$;GI5T#N zMS7Ee1jJNgBi~B?KLil-XL43d&_UWk1Fawds>)Yb08txG1QiXKcR>is;+)Pv`cEPP z9PSU=qydZwjcu{-0b7k3mr;wjEpg8|jvR*XPm;z7m%~R_`U#b3Qp73I7lwXrB5p=^ z8*!8K?Gq|Ns_#DL98E4jjt$3C-H&#CfjX;eQm0^wXrEURe3&5GZpJjw9xL?Pi+tt%GUGS0<|;Yp>};;Yw1XsCKbj z`Oegc+r7)d`3)npU!wX^UnT>^jxV?z$7z?~gQQ<6ZB2LH*RP9u$@vi^+Esi`?8vR% zsyCq?dZ@>3Fdq@e0c<(5_z>QrxGW^35GxY+#dqbdSTKYu;A6wQHq2|e4sM-!m6A;= zI$uINE2Y#}bYeDC_NJ+9t~VTtc(Wqi<^MlSFRu#Pz5_)Gmkz@F5+c~X41x=m)G7`Y zOJ)^XrAw!VW%-(UxX$-B#%K;nDLBBPKf?+S} zb$emG+33_(I5f)Qg^yiPN#1YtGgTUmalscZA-8pXEmA?*9%3gk8)4PS2|n|e+lo!( z)BOoL`2r%JjMLR@wwj$DKUl0&>vNXWXas{6i-RbR+qFTr8~0l`9rIN2oUM3VHsMi@ z9zGjP{XD{>O!I9X8np?D`hy9H`Z9#j?%_*tCUDbuQLIv(B8&v8udrMIf z^Xh49F7`zaUY7^1+I8hyi;u7C!z((O>%=SC%<s&+bf)+=+tuNqA@H-*m=_uuDHio3VI?Pa={ZcMHe=H zG19#g@!FM2?=ZT#Vc)7(g@3qBcjj3o;$@4aZ`W%gX>@vnxY_Om-MH2cTJ@+I^n0Cd zP^(3qa8U2}qIURtd41GcO(c5g@cp{IRTcj?ribhCuTQ!PwIA0SQ5ZLZVJiZZ?ZrXA z+ZhIfUT@Iu412X`&|U#$m0h^eXtWxgsN0D8jd+zKvW%7CCJ)QT#^C7Tv%%9lwK3GI+8AEEhkz~i0fbUJ znn6na*+VJ1ZcGQaVLGrpJ#WQyaDRo*jp<-xI#_gj*q9DBrh|>?;C41=V>;NF4nBX= z!5!u1fJ?z5tA#uKr}0{8Y?rhc4qbTBc*V4>@lE_1g;g zdc`6Jf%#luAM?G2ynQ9>aVs|w0gi$O3DW(#l9YP)E6;tpHxtV<<1!D%>GmZ}^)@53deBCWyBXJ3IqSeIrl8YbRlUOEZ5^BvGCS0hBbjfONRq^x%rc4x z0=ZC9>QBz{>doeBLm^ob0(v{g@zB7fdv+3qm~|ZU&w%1;;+uRX+vaDCq6INBP&O(@ z^%s|H{EC5Y>qEk&I2ipR3t$a{lV_(dgM$dH!@G$hpe}D86yfGUakW2x)IzSSzv<%)N3Hsj|*3G)zYFPOTSF zZ$N2}aC(*j{D|2S?9mlTN$eiuY~!^ZaY>4!!0X+a(B$Qmf>!l0?lQlMzQR0M*P$HC z%ciK)hpRz`5&JtkMSyp9lz_^C)P4R*PqxH_K>sc3K^DO9QoPMd*B;~e zdi=IA#jA>;?Wdow7&-TlvyXr>$xNZ!H~ob&QH2~Fa|VzrjvQz*IF0Or>Q>IC86;qW z?@}!}$*yEisKx|3P1pr4v`dMhC-D`e85MuDuYF zw*{e`WH15b|06g?`|u%Q4rI0J<3hRp?4Q)Pu0u8U*cHEpBx>jj+?{tbnr5 z)8m(XHTmL3B(deVyKZL}+6%W&%ISpua{6HWj?gamY$@%+e*#07cJw^WUm1=w@I!s- zPEGZ6bx|T^bD9#hq|}Kg)pIx3 zd%v|8`xyIH`wDx`0YCyIAd-@7s}m_*jx7R*2L}hhhwtEL8sXp)XRef2SdgAa4>1|t zYKBAhqLQg-l?BqPa3O^mXzb5IaHIDkeeTcP*-wVRSdhDhsYSM+A4g4oiW9VO`ZP{n z_0y+RRQVe{eWyPY3TM|c;mJV}hPqhoyP39_bzpS6(IYHeJFCDxdqhVGx7ESQGHP~J zsz4`$f8|d;aigkIidETd!@LS0AoTmRT|k%AY14oBD+ZTq<{rc6oAMvrAb5k(uetH( zQyDwctxt}#!^3Y`w`VysEiVpN#dMGBBz|0<^ywN|ACbQl@^p>a(hwNIsy^O;{Eh=8+ZwB0-WXh?Lt`6@Xdx42E1jLDa{H3wik;+t*&%9(W#R zp$^!g3f7-rK;;^UNU0XsaN>S|fx}mh<2$>6AwVm+F_}!k&+Ow(phbg;=9TH~A^AFP zX*Hx_`%GYp?aR;Ud%)ERWlIEFOLiwJ)66=X8kc9wCgT}c`ge}ETC1%}xJLqYTL|HS z&bXN41RJ4y4a$r%ewPq=j{ZT47BGGx2+(FfnVD4!Q}{DXZIJeKITNNb$r_LOd9t@_ zlDGWlj<38UzLG2Wdu1)VPrh^?KX$v$SFYQ0j=y|->7$>Ks4u9*?`7?g|vp zjI1} zgV|h4#6HT_Cl%-@KI|IU%+H>rd|2u+$LH;+$Iph5s@C1D$u_M;Ha#%cw0tEH3brl; zx;M_LbTF$4iSo6Wb~ zcSO~&=AZh!A%bBt8lUg|SY3MOog|7ldGF}*SCL1=5(#UqDXhC;<%B7l&E{ud!E{5E z;#9eQa;c;0Y4c8BoiE)4UAit?x+6Qc&dDIGSF43uTPsh1|Xr ze@|Gt4=URlmEX$oP^_t)G`cTp)W$ir#qn#%^yQ9V%X~XO{jdsC=Q4Dq?h-W+W5G0L z#uR|sqNDL9?&v0%`oxI_(_kLJ>;NxZMS`3qyg$p9@D>X%4y~iZ_)rPStE!~x{^iBs z{P0Z>FOtIxNDVK%Zo{XEC6{-jifeBD^pHNCe!UV&Qi3?4Wv5s+$iRC7o&XEWZw?;b z;t3kiDNTHZ=hILAI2+R((H$mHh^L5%+mQ=w_0S)=ct#!xizpLxZ?jn_`9v@B1&6zs zQG3ukqZSLO?!o-g^qQ_#)f^y9Z&HTIrpw0#UtAT7#)WzV_Xpc)HIvA$kWU)h>@+*g zFQ&d9R81DcsXy0BO?4*8*Bfp{z5|KRo~KMXlSMEN_!*cRK+fIvUq#K@nXuZF`L^Py zZ2vEaBzC;)j+b47hbW!O?s(Y}UUoPd_Kw|7*Ll)A21gwGBWHNjah*4>!>UmuiwWjUcca%)F!ZHnBo z@)tWk>#ujgXRTTz_d;@I9NQ0z&=S?*MKo(BarH$)rNe%nmeDn zqYsD#LAL)3R(6c^kOzPoxeQu6H)nbEh_fL62e};>^Wpa-z}O|5K!@PsC~sS5$LLr} z=1Mw99(ReiA-G}eyWTCkaY52}0kW|$aTMCA4Nlt;SCeTOD@LT95~x{fMM=1X@GfFO zu(0sQhvXXxRlkEq<000(iZb--!3Z3$PC_4cT7k*K+s*@33S z7ETSS!c1jf7>1S&a5hb$f#=up^~(T;n|O2sE#d5X3SLhIS%QzGBn~~Rq%?#rFXz}< zEr-RJBo7Yp%SA$vmJYNm$t_^5z!GwvQ#D&x0mF(2Jmzv)?$goFJPJ+GL>r#vhHuW5GA2mQWYV~@)vsDveYkW1-;gZF zTNY4c+FDW^sX|QhL56D*E27IS28QMXDZ49!wLIW3A)sos)fZoU!Tt=kz~Irj3_#@u z5%F9+E)F8gNwI^2f_#2%4t9_-K!z}cD1w;7P(oiRz{6$k0Cw>F`Gg0;#OuVZREZWm zOV~%WZ;H9}aFAKJ>5jm&sPghTby(-8F|=IhEcUM#p&N&{Li3+*B90NC zBSsu>@e)shF(uX?BqnwF>jvh11sa37A(-|zUM1lF%CB|7*`L##MO;?ceQ}qHJJ1V` zd=I8gwE?D5hD=Ca_l=f7)Vf2S?BLxFSQz8Cbqk|65+S5Q-E0?t7FF^<$XUGow}YE2 zK#G;YsAM{8!_izu8z5yRh%^&Z1CuIfeH}ViILb3@xq^0FF2|6eh%LpA&@xOZl4Vq8 zZGcw;KUM^T8F!=)_$jA_7wm9e#Lt|6+X==`roO4}F5>$j>{6pk=OCmZAqX-`LpP~b z9rb9ugcV+mZ_eJB(sFXi75@fM6v0cr_6i`D%)!aH6pD%>)JLIa5Sp21q;|^pgiBv( zFq9CZ6^knPRbM`~G9ax8M0ap>EyZ_mbY(cYT@Wt6%Kg| zvTRGw-C|ke!hsFoyo%5)pL%mdT}2djKTvAJj3K+@wLVs~s%!rP&r#E82R)tD!ropK& ziCX-k&4jlOlQnecD{FblGJc;jva9be;nz`oOAG2N;JEc*Tuim?2%9?cdqf0B4z9vn z0t>YEmTcePuhhx|4g1_e+(276=2soK#Uj6D!=-7k&d8KyIk|N(f7?Q)7+M#IBu=X+ zu9#R*Q**II+p?N6RhFkdAcLoi)9^2O0pRkLdAXN2n=SL=#&z}llU>jM`k(*%-~U`m zRZYx)|8o@?%~gStEErwix=j$NwLaUl3b3jaB;<$CL4%NkVm4UwV;}zR+s;5c&#fO? zZycG(_-L91M1H}$Vkw?ks2BxEwQ4WUJ;9iR%je)6%!$G#A+c^_e===m# zh=fLRI1Hm943r6&>5tDhBJ z{Sdl_k1(^3lSA+w7o$lzhaT?zrKsL^^6~m9Q^fa)J&|QYy2A54 z^lDCODC2xa|Eu&%LI+i(Hxmps~F(wC|uwM zAJ8fEulf60EatM+SY<2APe(ey;Ld^x_7yI?U0zBp7V`7MfK~BRKf&@|^9?;LD5N@U&{XW9Zz0Tit^@dOJ=n4KR)RgxKS>{h|wMm#dGicr5 zH0J&=ZIqUNki+(3-uE)|iA-UYf%k=AcG;53x^F?wm`Ujt zmsO0DeW&yQ7J;^r=zSs-;UiEnZ+}@C0sG_#AR?-if9}zyISAeK%^i++FK*ObYv1e~Nr=Y@&!>q;0gomyiN(<;wA(F#!Wz_k7t!qRusGDFrC2Zjkd zYlRS~^3}=%790GKN#2}`9g1;$RbLY`is~+hbBUHExp*t2`dxS?AH9;-Q+>>7yp7X0 z?(db>AWY$^TVH_-@9H;^6Yx(AcyrDx`4QQqQ(v4f_g>^u*i>pkcM8*a5TX%5z3{G>iQw0LP_kSXD(<0fnamth%Le!Un^9Qp<=vrr# ze2E4cdyI!|nUWC0ih_+0EXe{M0X$2n#p5lm`%U&ObFZWQqt2w6B|1wk)6)<7eMX_- z^x=<*AHR-ql@$iW|H1bD;wO7*UMyRh%UB@N_Id2X|ED8T`{L@Tb8b(20pLFJc*5>W zW4Z)yD8k7MB>FxwI4t9{sFjw|@*?)3!NylmCB_$s zELS)1mYXO<@g1WgwDE!*{3Cb`s$!HEi$mu$C~fG7_{TPt9Lbz(A^S$k9NFGasYr+g z?Hho-aSHIxXj|N2JF>nUT1wW6&1Gm@V3(Lc$2l^Zo8cUqCSfR|s#^Z&W*Yp*!fuwv zRkzbKa_#)tldrAMy4~Zddib@;fR?t71&bki(Tg~kxbdwBh+6!~GJiB%2tUF~5)_Je8Ks-2&-ZA*lV~!-D}rm- z4!3qt_Pa6H%P29o><72iioSLkcy?1+#oW1CJj08{c4~LWPB!2RXt&ePPFxrs>a@s* zGF0))!q~fuzl!*)Mh)15u`&dJ-fJ1((v4&zvDgSRJ*1&^j6l@SH@>nE!aS?35#dR*< zlbSvn@kexKFYdDyr~knd{3~=9Q!FGMWy}&N1kWB!<)7kJ^hLMBpk*!Qcz|&*@yA$b zBgV}QGU71s*Ew|upf0xC!UK$d80FRpO;D+&maNaZ-qXKM@k^+jDY#?6zwJ!K*K^5= z!?zvy&K%lccwv(aK3su}7ycAynV>umZS>ed_S&YJ8V1kFY<|11c2y#Q+&;pM{Y(Um zuDFWYTUz|WC~i?!vpS%=*i@-~; z?exK2Kwq{mZnt7)Tgs=)%&D7FO>GGb$wasTdokncg#LIQVG-H;7ykSwcRsoaVSL!% zlX|^5yVz@DeC`n@ZR;iNvq!Y_wmkyBnc_HthR)t3D-Rn^g{s33>Ta(*Jw;jd;U`yx z^p#qTy2K?Fsieo^T*Se26wG*um1hyB0Dn9?RlZCH=YsUfrKT92s6ViAs;tmaZ6gI6 zI;J-9FG?Hcx#f);@WrVg&Rr;0B~j+wXH$d$Sb>I@I|a#V0p?K{O|SP;QBC%3U+G%t zm^nR#c$uECdL*-JT%=ftV_K4_Va%7{u31D(Z+HCQD+y;dFW zLYog6+U#vxXtQU;l+{9;X3mP$4sBZH+(l^9`m$YUa~Im&+R)}2U1p80a%EoF9{W%l zW-%(UtWC*IotgUm7=*on1#W;6QN^P8OhYkAIQ^snbVIsLc5f6OP3RMh`?9sNtDW%feUSm0V?X17*b z*lbzqwF%oSHCGn(Pjxz>yr(e^;$(iY7=}S|bIRBHaKzv3IXxYGr*noz4!$U0F#B3% zm*g2_Cd4ET0L{yUC(6ldTFHzvqx5Z?Vr|sbT^eFe?MyG{#cV{2`D`)gtBC&i2l)5@ zP)h*<6aW+e000O8a(oq6(_JP1C&7XSbN000000RSKX00000003ihWnpw> zRcSY5VRU6KYIARHP)h{{000000ssO4ga7~lvH}4B006{7 Bz;XZp diff --git a/Solutions/Microsoft Exchange Security - Exchange On-Premises/Package/3.0.0.zip b/Solutions/Microsoft Exchange Security - Exchange On-Premises/Package/3.0.0.zip new file mode 100644 index 0000000000000000000000000000000000000000..072cfa2040b575957575ecaf468a80857731f718 GIT binary patch literal 67456 zcmZs?V{j(S6TTap8{4*RC!1tr+qP}%iJoL*+qP{x8{77IfB%C|r)p|G^mI+tbWL^F zJy*{kIdBMc5D*X;kac-%4TDifP-a9BkQjCl5Ul^KCeCI?u4Zah;%4Sn_ExS|4)%=J zE)MqFIzA5gt*Ae}!oA>540(J9ge_T3VM!y5%{yabmX)RU+$HTHIMFlkM)bc!v+-guYT4{PN%38S35AT% z*d=+hC$zRfsh5e$$l z7N#F$?8AaE2&`e;#Q5%dp{eGmRq`eC=uwzJ_61 z^-BC!lk(P^Et3r9_(82=wqte|7prxd`TAK_iZ+a?$a3cIW@*Fz^6+LeYXS{8C?ugg zM`BdIw%C7`7Qxw()LaYIYupLNCXQRS3Gw7y_@(9%<-=d~%G9R=%jYJ{!yae<)*{8V zjkK1qV;X4$8f~pz2e=!LjAe^3ho@ro$AIEP67+HZK)5X;^b>YV>zS>?I%`126eQRc zIi~21WVjcx*{?jHWXmDkKEd=|Fk^oA(OWecufcWZS{FY8*m0(oN|&n@AQn|Fq2a1W z_GQ7CAI^(>Cuvybv0<&M;e8|=jY?-JTWpFu_{NlAY!j$Hh|G3uEcW^ zXmKw$O7-kklKwC4ShPGRLa*L4Q&}n|t!vX_Hiy6koG~=VVE=*7j*(K^;LoJR8mr`k zBdf843&p2!*8L?+u^B8bdG6^Jq$6YZWVl!!L5hC<==V6M1&v-`36~W@jjn7}p?)b* zo8n(Z(H|U7bx&BdxjO3UwrnZfjzVu+I8I3dlD!VztyK@%GBw#m=_C zyLWMoflmJw%RCIc{7tB!`mOb;q@Wvd1cz(nt3Yyk&|{P!b>OkAE?T}tizXkf)bGvB zInJGI7(HXTj9=W$o7xtG#PeOQD$TfNs%C>wFqOqe>8N-rrPS^KPr$4U20`%%MQT5V z=rqNroAqTYsXFRPVmrOnwfV=mm1~IL`F+;shEHDY2gYf$ImomoY0I^Thue-6jT-QG zF}hB$uMiKHik|%7Tfq>ql_QU-e-;tW`PuvB?fRkrp%)>icMUXXQ=#=&`4xJ4D}SFr zcHjxYHD2}=c$C$nx-TiZyMvTiNuF7a+NIYCY&P=H9bKBfmbj_3d{IKtF=92>K(Fff6^i-CI5xDuzRtm-pop)>v-h z;d;%Y6n1j7hvR*>Al;_+-D(Ju-kG@QgDG}t2V}InKko~#&`lTb&86^dggtx3tosb# z*8`Hw!uRtc((f;S#L`GREAg%~GSRqYMw&}ikSo74fk0aeE?(rv3MGvA&G{zGM!amw z=+S*uUcm82&OmZQoOJ8;+$Mz&sOt5C-OyjUs{?fJ0Lc7*#wL+7zDrv$6x;+gN?<+v zoshH8>8(puotq}qxRqw$8#c1>%Xy0!UyC#)wmIWIIhcUQ=M*|s;W`0u=I!~OO^ViXF{ha;P5=c;PEYP5*24Fj-?6r|T+-%H}>VQvTC=GhT5A-~# zY(4m^wD6a`1HHVT^|aSE)b~!%N553!F&ZT~sl+u=XMvHbnJpW*Q!QKC~@>>u=VHEanAF`-F-9Pj~<0U?7CnWI`R%10VHI_KV^l3y`P`C zAmJC1;X(=amH`_JbJvHFbolY5ec&P5gm){-YF`r{aJ-mF&cymlW{4f96ajB<25A%< z#z8Vs5>8dF_jd7E$R#zvX=j`V_Ja3xq4@W{y1J)-`M$!s?rfPm+xZw0Svs8+)rY=t ze_m!WjOSVed@d*D_um95{8^hFYG@OAqGegTu**lPls=$BoZ)apgi@1?5R*e?=ny=l%xYB%KhBvrHXcL~VvR3taB|iz+Q#7t275K|4erxSw zUEj)>>EAPx&d^Qo1lfktTWqf4*kWek1{Tae$Kfmi;aP?6yksgrR#7|~Rcw_21W)H~ zned3q@HWWl5y<#r^h4A^xoS_=Q7QFLcgi1T$t!0^D?sJ_!6=9cU&gC@Np~u*!Ipk9 zm*i>M2E-{$!Ek*Nd^rR^Q}JIFfY$|cywIu{{<5V1wr=4gqhH=peJu9|CQwh)7-kFy zyBHFe3B#$4#{gz3F31@COUy?EH%HVO(LHTsYe`J06+_*7t3CZI>33p!U?A9}wA;>W#1Qf z7yO?zfHoTCy}XZ1Rp{UcEcy^Wj8(a6AdJFo4I(3OJnY$Q1>b=;F++5sx_%Yro@1g% z1k0EA$q3V%k~eJ;?CF^cD5zA2ES2~?uVP|h$YtQeid zd>w{m1sYy6T<{1|`ES_JP3Jd``VjItoQqoaU_7|WQ)}WaMOpu7)CfEA3L4&&MS>0U za#Rmu%`T+LjSb5chWYt>uOUl)Q^r0Wax9N2=Y$1U9{W4LTbPI;*g)Kp7c&ngH;ElN zuDViMpzc$~oy(wMQ$FkpXYf0H7}$1MRQ$`Al;uUC^f=)B44zZ`vozd~Or4~(0kUB= zc0$L_N=0PK$qW<*(yDz_YE_vy9o6Y;d{o-!4x~jzXsaRkk6xTrEpe=l!EST#TnBci z0c5`3fE^u7s%dW+oalqT84WHQ&q_XIB3+%bj|mTP!Cy`z#7>rEzo7=<>gk`424Q;q zmCriKsceE**Q-g7(n0cf;)B)E)99tVjWg%~Sl+H%zYxD&u`gsTN#TvVa5;|o^j8i| z^Y;B}vTIyay8M9VNbV85q}MRqSDbljgA*p&m%}+V9HOYC2~sm``k# zVTxA|{NS8iNZzjA(p@-Mhy#}oGRmSqmL4&4E_7` z`7MOiKnze=O-V~$14OUmD&O zH2OXsf16D7<@1c}84%2N0S}pXyDnc*EVAvwVVg%wM@Pr@->AIZ40x%9U4I=NYtLu% zIe=Yni#qUnG_{Bj!kMz&?I~e99|iwdm5_#3U`D$s$ezEx9opD#b&ud<%vKEXsd`D9 zIac8-3F(y#`YDYQyy%1d#NPS(JvavMduhSFHvEHjW5M2{$0v#4KL~w0ra#0b5~*h3 zt$;1wPfm#$h56uxGV(=q7`o*iIlZgk+(P9{@or!Sa@lRe*MJPpSD^4?a_SSNQ^( z&ovt)^J_9N(SZ8yle(lO=8uf8*m&<2L?*@*BRr^DYZ-Ut*{@-veGxVZd;t zqSsSaH3Tv0<>oVC_ek|vWTns{EirEV3CRK(*Y#`&WIH2%wOMD0{zGw_% zOrKjYik?458T#k^39V-Ra{Q&cy830=L=myw)O2`D-Da$J>^l-Ul9k5`RX4e`N1!`F zfGW7Xh-BIHiZ8x4Ovg4luIV#mbC3a3V0{-&*sh1Zuh@?7 z$77ZD!g zE25=$Bfnhj2(kO=bo(G4@rNv}N{8?9@-F3^4wHUoCk3&}mE$Y#yj$fDr_ZI4!-b!+ z{Q0m(mVfaQwWf(n9lM+nQ$1QEqd8skuywaHU;+Djxt(IRx1aZ0fRNu&*AF`8f6M$?uO8!@G`tnZh;9cW zQYm0&+vJy_TBs%a{XYIfcg64aP zZo&Cg`6n>U8NvBH=^15WWla)nyFU^k7M1lGqH0Ang;DHbOeaesd;bzc{gjwH{2fY7 z9lQP2Y$n~R^ohj(Ilxamt(Xgd*K(kA{hrb2#o8%s)=_Tfn4@olw*H*7}t%&jg>P zfU-n=mT4YJEtBq6{dcBiQiIqyh&zht&ob4+Nf{N%oq z8`}HAOwwEmltiI|eC30YW_2BNw&hAK;;_z@j&v!}^A%3f7PR#`oD;qn)+D+4QkZOH zD_>^@))=yYS1t8nFHK5P{CYM!HRj*lJxE9@7ltifECHHWRn}>NXC+>|=fI<~T#NzE zi)(&chEQK|ud_*$9JEe$J@_NLqQ!?;1_1ob9;H)dxfA@5ohf?j{K>D@B&{vyi)3#l z278XPhsb^Nm8LU}GV!hG^+MSVxUn)abs9Unw62JB&PCF6N}K$qtFuGj>s@c7e}yVv zVOYbIUYnJpijem$7AdXWvlI?K=3bk0fYxqnuS%I*ssC)O|2d?zvO<*u+Q3B5%hY6b zqw{RYoP5-Nr5AU&?qK}IXpr3C{S!-C8u&JlN{277*FmN$Lc@itQV_b#wpqr{D6nWK z7-Q$b#c1MBc1%OVwfLqte7YE7u}1!}i(hO}{C<(n>thH$qBU=6^1dCX6EngD7T4tn zgh@k7sDem=kL*VodtzmUgE2siRYI5Nov`g1SzxK4AV@Hd=17UJGBPYvq9L&AERWRM z)Ko|qtfIW2nT$J{veuMv>Au8Zrpw(=54sr+BJ^1BY@QOdo~ra|_Iy&B0)}^G>M0{~ z(0aMmV%E0Q^AJX8$h%9W;Y@nD^+MHNr{7!i4wc`Xebc_V_G0E<*OKI3YuumtQ{-N+ z?k|2dA1!`a3r+*ZG2f^hFjcf|DK46`QXoB;`8V92v;1s)FS9g1Mxo=~Shw65eArzT zk&vkg2$9hMn1k~t!@89kfo|>7*#}*vD!3zS3aoCDOe!M)nemS`k_AH;^v9Gz7UF$JFg1rFN`v&Tv zGAkKu^aArsQ&;)?wPk{Zh0X)>-%v{D?dXuL_F*wJZ-A`#j;94WGM$XuGG2$Pf*+Un z6_u&ctWW@E(4pAoo27w;n^H7h3t(ycWqiyq8l--0QRQkVQH91AE^On>3Bn?r+u7Q) zrBc?W_ee!S*~_`=Ami%InQ)OiDPs0bg8;U}I!kNJb$sGg5S%_eMVB^nR@#vIx!lg%NoWI_HVpNG0#^-%2qY5ua0@O_p8QvsTaHAe<#qQJa z667j$)fMysIlj+RD392IAAI^qlMe_4SnJtHfo$uHh0`|jl>9lWlaq9WTEVxyt4(+? zxsy^K*3?K^y8-6o+2y?$14GH+&d4d-laU9JR+#g9Hj)=&x)S~Xj$KpK{)Nn7hz>Az zNH3oQ8pE>qve^<45mM7b{W+8QY3@2PEM^bG#Juh-33O;~O+!%6=vN;$Qzd?LXL!j} zkLg!ASCF5YNOgm&py|s))&z&ehoD@EeTtc2{z-k9q$TvA^;y2T&W5{&-*T9E00+C{b``*cA&@89dMAu|S2b zxTHjEP#Y{zgW-@nh}9`8p>pA}I?!(pL<(hfYc7fqS%r*nFlz0e$E$PxfX3>qbePta zjNZh3*@|-lJ6vIlbJr31!_;z^t}#MBbPxs1)K~s+!3|)qPPOjDvg#nD>3cvf^}+hX zLs`hD)0(okrJdL6>H_2j8+7 zeyJK+nFy6Y+Aa#yMi~Gx{|dKW610P|0c&y}g7U(Ri-DlE13w8YU}%Wy)4L0j1q_| zE6?#7;WCVX+XUYNVqGe0F`U`9q3B#12dC7b80i?V_dNIX0NWQ%g&qptmU;r@goa@R zheAHvE;c*KJWK&V!~49EqGuom6u4gF~6~i2H#zXq(!3G>mm*QNUa~D$Hz34iYwN6CSL4X7h4mXGlKB#{LNoX9z zH;gpBcms%8kTu<(>JWjf#qOucS|H0;PIZwSC@^ndC6AJ#la`5x)A?wCcCxqLl~}5= z%e({Bx}fyah`Q@GjeW&_?(n$8RPGA?RWQ!hyo74?EIpYiDMRZ`RC5y@B=%lrI{l^l zDIS%A)k!TboAdoHGl#U>zHb7RE@SX#*f!gzBpH1F$Rr11;LQZGZw&bBo7oc8=WJqHoU}H1m+3dYy_k^?-z2tK)gb3kJlS|u0DhZdskQfqLt8_ z%IomGBFN_VdW_4P;2WAgdiD6Q%ZlNh=++?QLG~nYMhE92qy5v|=VSSzbvD=5!KGK1 zQk0~CA3}VGk{>bi-}TgyqQ7_#=`Mq>lr?0Eim_Cve-!2+;hHU-ZN4gA*-y4)@}KqMDq#C|lB zeL=s&jK-g2aKq{=o4R)(l=CzSQYuJs`oUOn( zMf-f4DlQ{K;jel#%w^s@M-P+Hs!2Y)A~KeOzC2M4Sl5v-`QefGOoH$zUTg*3yjMMN zD3_jtXK{!GBYLP{W*cL#muNijY2`7RI5+oK1vom&1BqpobzeRFFoIW9v#OXSg zJXm5)UT+FI4P@rm)1xJ3%U$GhKCm_y9_{Q_s?Jal#e>Vhw!L4XoE*Q`lY3}{*`7WV z_&+nN6#})fp=P)?7UZi;MU@|zC{4E!QlVSnbM7wQhhX6b=${s<|AHko!u;6+mFgM) z_rXET4HVf4^<<$}_JxEKi8OH?BzXhR4Qp$!GqZ4|5=w1mt`t&{DHma0FTMjW1zIU}OM-{3?RBT_t{3rbg~Pf6Jj8v-CaY)eQ}p>zN1Uh^x#j@|Nh zZ=kCd!lc*g+1$aTkKIbWbk!2t+|>ByGT5f%GN@o^Dr(A_bLj_C_Cn+?PFqYc1bII* z1*{wWd`ue9dI+5Xvj1Jq6k~%wPFYXZw3LHKb;IhW(E75Jv}ui`7A>`>GF7w7DdQ#) z%E{R!ry$}V>P&lv(wH`RU-iQIN{&O>j>w^zA5fU}$RglA>lo>l%9WRAGdAz7gleVp zR?EK^EeUu3I%Be)RkrjeopsgTZ6$qaDsI);p_}!hwded5FeQ}{ z%<8MCuWwz>MH?4LV=Z!$rsHMAx}6uomI#~c?XYjYMSjspDj8$zo>^XG z`PNK_L&{XmO+wRLKU!eN==kGbLYeE36(s?TSvJLrj$M8~7yz`w^3!cd)vCAk)A*)qLIYNZl|iG9Y?mHjTIGDm9M&- zyJ#@KWJ)uN5jt=hbw$cixG@)0hLrSWDmzazG(iTz3F+YLJ?P#h9m-W_sx(ei1BV7M35zmW`$O+ZKWhFWSA<4^mANLR;u+oCPuD;^S zJ0!&|v|uBJm87RI^66yiSq5=Pv@Cn~MD{O0ZZ1UM+?-p7Q6qgQad0RUO>B2f8KzK^OkUj}TI)=pW=K=xvI+(Vh^6M4AlN$XNU7hlq+G0^*KH zby=@=F~PBNnx z5?`*F#+bWQGk{tX_X+@HBX`4uyNYK=vTKntbjyQGMBWa1BTi_L+9Yoo-LgmdUClev zo)x^!EP)2q;$)dSWj>cF5SqhJXcin7$)z*Zgg+TW(@aKNolfYmG6*z6R!lVwUlEJV z$?hg$%m$$@nk1T0^~{={wpTH9!&)zLrIhYz($7y;uC2_>S_Al@b(b?Ze(G`=9QKq@ z{Cn`3o`~G?<*|&s!7BYjMF{1+UOI_OIw=Rh3($A{tgAwgkc*xiSt3+<#$a3K;t5!3 zd+@FhVUi`vhJ5fb9mGONGB?b0-}F>YKZ!a*msQq&jH6IuWwi(Q4y#1B@`p{Alji)d z?6pfQrE()$(aEV#e+~sdiPP#rHt%5TvX z2{(yQY@IQBKO#H|_H~q4(w|3sV!_k)`i*Q;OR2#nvpmUSIQCImTzxQ{vKk?4Xw z!0<~0@>;~*Fyx4qR=aITxmh4cXe!$ov;M-ZDU;E1wv(5geCumyvX`HjXtGsK8-R{6 zFRvhj$dh>wE$*jfYraCD98MIJ=t+hh%F1R6MtK(T+uv;UG(u4Uxp}R$fI3j*Gv~Ho zX#P9%9V!)?4BsQjOicv%X!BSLIecj)0R}#9mR~Jo|M*k&(#5vCju_Aa1E?&+Z~+&~ z+(4I;pLV9l{Z{uw9!rgp=e7hXe9smsNwVi+XLSu0330-R-=s~egvTEbihS_Rk#s0V z{ouXOLJwP##9kH~1QFabqXe-?Vxpn`gw zWLt_#{LVwD16Q-0lFefI-Lecp1!nq}7LC1`z_G&qgkLR@;G(cnwjFMauwVKZ)ro)p z-PENfKk0ogHKZ#B^I(HYi>c0wq*~xeCVYio;TX#t%SXZb?7s-O%1kiJ@(yt$ib0R3|XbtU9ftR`e|K*j$} zWlH-IzwR*)B9_aNGh`eb6%7^^NO0WL&7JLIeyKs(a7Sdq+h0iZ!0gDZ0|E7KQL!F> z`1yI2Ow0oO9$nJ&N=`49U2gk%mDpBEpSS-E!a}QGtHetltG1k;td7nR@~^C%auca& zOb_nMV%88Hg>4}TC$?^~5r^^x$Je@3y51A_x|;ELkZcr#^-Q@nSnS_g9`29zE&2wY zy-~JS06oJKb$adaj^msTtCySypWC>O-o3hA8;8+K@eEv(H{udq(lwy93u>ktcOhMI zXT!wXN=Rl;nMQ?SmV#@1jrPn&c!ugsY|wL(_CZr_s=fGgRRW#PMXQQ_cILGhyAC<> z7Kx8QvpkeI(S_YDi1QYS=`kd>a`Pe7BqG z)yt5OpG!9g#jL={7W($3CtSKR^^0N~16TmLTSdN9t>e`CG8@Aefa%1EoA0{#-v&*Ddi+=b=0r)Fat%zajH>5!RHFOZqsEJ~j;0V&>k%cems-uaU( z3=DD3(S+QiOYN|v=MNI)lZ^7|lD;9u#a-mZlZ*^>&C9H5nH4y4|4$TYm;Bs{Ws5om zl#|Vh!&Oi0NVy{ARl3fVxY#5l62)Gz{hOW>zaQ6B9sc8o9lY z;jHGDEZZE#NTR$-kelybEDyT}t64@x#9ARX3^DV84RSG|^n=tvKcKkfTep;m4iYyI z+OwE`azzfpCJ_m<9AbciEhTwDmBeBaZvB2UNLn)uw*NdCV8^9$)-aPrwQ!5v!Tz~i zyhl|$0#((fYCj!4$vUv?t)s554Jg1s-9YRumOPsgDU!2LQcEqq?QiJ8T>e!`p7U|d zfBX5Ggd{t5O?X`=ey0_AVk~jl@V!W31~{5|fjJrJxU=)BW=k9Yun#{`<+e z*p-?;Jjv>PU{lBWm&{JqYQyS)MlXjfZIM96YMv{Nu{fV& zxW1`~H?3HUiiXalpol&UIqk`WuGc)vd(H#2_;t4RaN~t32$=gLJl#p{Zs@<6Bo%8`Ugc^_q}!Fh`|wLq^dCVez}4 z@uOe!_d4=`^q@;TvPD^O55m`HavT>%-6`UWY4>EnT&nNQun_$S&!AjSDwH5 zxGNC$br;mLKehRghNVQ+vqm`*WbpK@6!`9`vWbL+ZZ&olx{n;YK)%oU9|p*JxTINw z+If=4|N1-cK^u>0cZL<&P<8K%o_RycYSv4s@ROinlu{-lc zj)drRjl8E(NRkDvwd&VJmPD;EDksvugdpGls@lt#{wEUQUu4e%I9Tb`WNgDR$;PF# zxc-m}A(_=vEsbr9sMzJ!i?HIC*>7UFKM?9R%tWna_H;gSa9QcN|3PX3`3A4*#`(&5 zAJYk3rJ3Tkw2tP2wePvu%fVe0VQE zz;^?<6!jkj3{i4AyTU*1yzG^uSP1@Ns7HJ?IjSkCt;NBDL4D{r+>kg4yF++HTHlv* z93(tp_U#s6eiruvi-obZC*Z!xr8R<}*JbMpKj<3r^_li(Rn>Aws86hx{(EUXuKU#Y zVXk0Pc;Q)!fVwYF%>{jnW(uhaQWr8-e0nEw>*4|PI`4QD(W$D*(c%mM*7}8e*pyr} zTyQ>cFc~$rjRnT7u~jp6h;4I8s;<#hA{2X~zGJ!j4qhBE!MoI`BCeHpvM&YRL-R;~ z)}w>#CneEQK_(H`s7sO2VEyh&f(VUOGeQm&zLZf;puu1A-but@7H`sFL< zr!y`&<$sER23;rX=R>p@snM5P7ZS89gQ3dPmIXRCKIEdgPgY59pve+ovWMC7LijYy zkC2$e@G;YKV)*;spo$yLHAw4IFJW2s`xb2QSP!&v4!mhCN;lI3C#x$PXu3*1o~8Q&yaNh= z>5QPNeVmE+H$&xZrAS-SN)$ zKysyH+StOqQfII+pZHALtVM2O_hzuK|2L(LF#p`nYVE-m7FTbYWwye}+&9FkeQ^w# z{r{xT8#T6C?CCW(K15UA$q<9eJ!l!j2-em?O}_TQLc}&umN2{pLC08DZtax4qsdb5 z6i_j?dw0d@q@M0C#zr%g+D-8g$Hsx(9KG+ZR8iE{?{_YrwP%`Cwd!YiTeL_io}e1! zu8@JOOtvth-5&ua_>Q$COviBqhq>&y^BKwF|F^cnVMgMXX^?Jb$5{h{Rm9%!Eehjz zl8JVDx{32Bgtl7+%T!NPm*6_A3b(BPK*|-K$;ehl$;w{&*DW>abUggwkR=;1u^K0m zIhzsVpx*W>qb!!#)%-7$N(f_$J(wR9=(?kxS5#HsSfp#Vrs7$fnN}RM7rci_QEPDkz+XzokcWJH!-5?o$b! zMK!1%T-`_i5*~OaFS!bVgki61_;j36XUtyfs%)w%5Q7e{>a17MlkS4_F_Q7?b;RD9 z%Y8QB?D5F_G`RE|A*|ACh|r8w(rv}I=^sK=X&d2sDir&V(BE1w&zsHSOsv*bJM5G> z2~Ep%DGzYs8i(|A;HVe6RhXmW4);#x_^e&>6lbN+W;71RbIz{;MMi5N1KPqOe3CVm z`(60FvD;=ojsEQjAoMU@wZ9Mt8f+d!1o>D9p>MJIz>S1`F(Y`OZq47`hbxrAbw!3& zRYY*PKnGC#i)oaX_xZ=T&aTp7y4awMXD<(QD{lnzsen39m98~uu$r%Y3Hzcr#>vDd z4UEN%I{CriG?*GJT=BeCbe3U0A+?3F9vX=4hmtOh!>cuZ+q%^qy8dT*VvuqVN?xTA<+U$g-3Wy zXhvx2G;LHu-m|pYlkB`He+hxk{zN7tK}pwiLtVa5ZPbS2Dd5 zk=4HEN_E2l|0>wA_-0 z8ao$3MHs?K%_yjl?F)k}ju~0TR}GA)!vk;u4tU4Ym8M z9Z8t4V*gYy&fQ6EHn~b@*ngw6S9N>dc_UXJ8pEVfET}DUhq?J|Zs0nKSO{CRu8qwu znm&_YmK6u4D*ds5mz1(et63lQw9%QVlfD+2b~<#Vps3;<>S9LU93(@*|*bhg9?@4Jj&{ zb(kzA2Mh|FEQP@8D0c~RY)oRPx$v)(VZ@wfwP?WWQAPVaphkX&?=;s3!xp5)d5fyL{$iz#IAS?oMJyJ zj}MlG5ahEa4u*B6zxs26DJBr-z$6}8pYP#a!=`aJTxgUziGhCbA0j@N@=lX!4}12v zHq3j&%pot~SWzEBoCvE9MQ?WC?!OEP_o2p7WY!aR;^FI;#~0UtDfKLh=c_x4N8`DY zH#jexJs9Z)|L!=<)pkjkP^$}As3h_q>93kpPn2WhNU4CUWt56;dMT(X%gs)EF@umC zfx&RL{KXu)yu}r=J(4>IJeyJWw%9KTk3GweR<-NRiU``?Bh^~Oi+MO z!bFdBRYDslOll{7YNS6UOGtjK@Od2qNSO6dU?fytfH_v&sU_+8-F_sT+kk2uA>q1^ zmvqC1cce{ZZ4Y0M*HT0L5KvnRJg?d2Kmvx-L0>ZkRA|g!H=w{-_t5joNuD$4b@X_| zo^cLy=L}8yN`FMF9uH4t=P5=8un$xYb0R9W!z1TGz}4GVUn_TDuED^!HhvZo!Iq5J zq#@^Er(cqaK6SVy|I24V`J-6OL(u4A{kNEHLg8YmgMLF-6?uPc?kCMB>>E{}-OuH4 zyKn9%EK>uWjX$GoiuaS(;Y9J>->WN)+FikbhVJPvwAkB;e(_K&BDM@WS9>XTa?8}t z&+&vYti#T*8|m_?9c~Wd-TER@%0W-4Y%7pGzJ3cU6x8}sLq-&AX+ZnyQnpvmJ&vtI zx`8Q)PSmFhP?`-t26@!+wO#VLK#3=aO0o8lE#-CWBeLqMeEcGNd1XK<(qLj)3y89+PMY!b<;!sqz#gPymb!4C#su zHyaTmG(peT&05rm`Az1Qr-f4HDQrr5SOEJq9ViQ7bFhm`q5O2_ga&<9fA z{(XR4It0C(czOm;&31?zWFt#WA)8!HkZX^xO6T9g?iW9piycKwOH`YD9G3e5qs(_ehLj0B)r~z zBD1gq$Bx2bSU}{k9dR&4Ok@}#Mqm(aUep}UH*<(>EfpEOYn;YnZUF+N>{x$1dJY^x z(3|H8TKh(fHghuDQORXjTwUV8iv$SyofH~rYmHq`<(GVb4W7vVJGoi`%zuu0*HVs4 zl1IlSX0j_Y;je;lo1B%^Abo3(=6iahAE)j3qxhOn`2m@u~C1+jAZ;+Y^&+qiDQxx z-xRm=c)nH=kei}iG`#Q!kDS7-Nlr-jX(IsRHCCBpEi|2XYG9IewEe$EnF=TCa;Pjg zY_&o=+f2%0h-T5Em4URGP3-q)t|ZYkXwpZJ2{eshXSpOTYoHo%_b*4wLWP85_7nlm zFTx%wCZ=YTR=65w$TVH-#i3uU{uaVFVRqzCRYk#bi7OHuZprt5N~WE~Q06kHOqFTt zhm;?XV3G+IPbVTU4Tzb&mRx_`BVZ(jVXl00g9b|W3mw>0v{jUjI;a|Ixqqe+vPHav zR-*UHMywfwcjb@JaWezR#L#kn%T|{U6`-5%d$3U6qo-D2h^M{7aG+%s9U^(UVBzl) zT(pWWlkqd{KbGz2x;p*AlGcN(j*?IU-_%Z4R#B|_t^q!K3>96#+8H@=v5T(GGiXB1>*yv`Hrgusgk9|~nmzGOaYn>Rw!~c^%W^J7< zy?xivZKtmISpxHjY+?`Bd;fa|!;3InWR0q~uLniI90sv>oWucM+&*qi0{yB6;OV&B z!YaRTUlGaMFf^$x?XQ+<&!p6x&K#&E<>LFO-=6Bx#D7R&_yCNaMdkSXt-)~Ndz8(o zM2u`!dy>Gqv^57KEN{+3lL}*8t{;qe!d#(bp7&St#P;Fu1kLCZ=e7r4Bfh$h?%RDn zlqP5L1@B$U%u;h+g-KQ=O;x&zZimrF;KjWyRQ0;p>G;8pD|2l3x^c-7z25I~0;P8A z7tcn*5pHi_6c9%nnPq^lT8|g>k92yieUz`JiBBtIVub`X%{D-%=P)hUpW3W~0pT+X z+W@~ueEI#Yi`Y!uw#M9Mzr7_IPH62m25WaoDmtB9gI0A+Cj=I(s5K zJU1ddoo^EpH?zcav-QvZ9;@b@-3IG+cZy%fJj!CVA5Hd2`47(2Pv$Vz z&CD5T<(~K(rK)ci6~A)vWejN4q){EfSjwG`s>2_FtJd!Z$RA62#rMei{~Lm6e0s%n zA$OJr@Rp83ZKGube8O|==J#i5Hhh^j#(lew<~-l3V4UV3=XnpvZy(6F&sS=XOY&6> z$Cq^$wl_k5^8K>8PpvVB6QZF@JakwFt9Bp!bY?%~J8n8c7 zqgXyifeOq=UW8CclKn;?g8nDwl%+S5$w`f%UT|dX&&3K78%6em<$FDhOxcF6!Sm|O z8|;;PHB)JvU~Qpt3#zzC&GW=~eKm-!g5&C_rKThki6w6vzxyCWhSTn8IDI5yiIl~ zvau&EVgoUHF98agG<(;+3*&^z7hmL0;>Et~`~fTEi$z5Vpgg%n$Z>m!;!}$>EXSBT z23Sf}Q~dc!x!HGv!-l<*o)&QgM|u>gw=X=t?zxoElStAz6zPHmZrH=cnbk>xI!Cih+VJRwg>k4JL^cJFkvyn&bcQw|bQ8F4ISW=9(3JoF4_9ZaXzf?1WCcQn5r z{%??BGV*e2IvBEDSy;xc#JJrIbcCZW$5YCfS8`Bnnu(dPkf}U%UgE59rXu8)n*JZR za5>sBD_yQw0q!O*n3bxf&2VBBH%_l#jo&XEj_|CxP2H{Z{iOzCFy+WcW~a!uX;!Ru z&8G2}nOF3aYM^CMx@4qiLk!7=#*nkY zl%80aN=#AzGGVcJIc<~GD z{5ord)_cFaKWmgJ-&zF9#&s*VG@+)AY{uL#IF`jht=oDcatNmVj}?*Y%BV07IkK*{$DnVZMbF((seJIH%N2Eu5iFx}$uwq_8qDi8=TOjhgI!aT>Q}ofl{~sQ zR?^hdB0p)y-+Cq{)^*#QLqjemc>fnA=MW}J&}QkfZQHhO+jiZuZQHh8 zb<4JG+qPXb_wVlM&8%h6%)&}q&vB;TIAvDI;g>>PDgQP~9q+(Y1bK2tn+2ms zP7RrHcaZL6bJ&~OEx+`Cw?$P5{qb5RO>KH*-dU5VY*F`w+`bJ2J3yN!$crmmzeE*A%J+# z4}1@FbvZF@NJ7ytQHl@{rsy=!=;9ETnOg^;IG_nRl7Fr$H+*sLIooljp{$O~Yn9#M z$xdvyqD`!+L|Auhc3$=5VRcgR&J}Pac!P{EAZ2AAd?$DJ`}o zylj{KcaSBM#9_ni?LJSBVLD9QC{O2oGrRfkS1&NF|1W@*omekAK9B48f2;+gNOl67 z|1WD{(hel=|8*9Y6;#(GbpV6DYg%99IS9A|xkXstmoo21J)!sP6rq0>^rw^vU}#N2 z{g8^Q`hu)U*C@YH*A;5f@69VK<&BdcSuPF=Ae}VyYI!l1G0Q%2E`)*KmnLTYy@%5{ zR|KkNdzGqI;VTZO5yzBQhvCBwU7n{J-Uq#}nY)l_bklT^Q)@jSv+6{_tcP+fT;^fV zdKe1_^fXN=hNI?s>khH?@clH?g9@jL1P|g$FzzCwbvP-*K^&U7uq4|J z4j|nSnAAde0f6esC3#Ejhq_J66k@(xhHOkVZxW^MXrFCJu^B%Lm}PMKsGhHVWQg?u z{RZTKeaTf7j`tkF2*{CV4IvGx8@vsNzhXkPM|ZrI&>tBD#9FSnKXZc^$NlOLDCR)T z?&T|}pJ~b_KlXts|uHpIHwq4V@x&E@SyulIFTUe64;BwdMW0XUzmeQ43X*ZsR-bnFIt zhjNZ!Cv;|q&a^8+^e2b(YMo~%9Xk;zM_%Gss~4tbnl+`!TAMv06UREEX)zJ;@aW|L)x%1C1q!e#1s1`q$muClqs;XL*GIv0#0b?OEOTax{ zntAydD)utFR-s+Z ztX)TM|7X#)xO#wx%0|sC|6|kLVzEN8G%Afv{VpA8zEZ1$ZR?X*6Rgl2ssQ}X^=EbC zb7_iL)X7m-jz4{dZjbhbrykE0!ihV&ISFbjD-IhViJSl0Sd6}>$m3qW$Gg(&p7Dv$ z&Sw#4d2{oYiLBFon`|R63-ssZ>fy8oC9U&<(A)Z7IQ1ucMJ*TQgp#gscLebSsA++VLs(>+a43xS6+#lC(?r?vADU#mh?g9i4LlXCkVUif^*&)`3@ zc=IJ*vk+gYq17m$lxh}Q+;o9I`9Z3fTO+OH>-JOBQ0;&H)2IH0>oUsQafp|aC8KP? zu_P8`&DIr)mCt=M|G#==JB@$dChk^#XvMV@K*w?-cp2-&GvWYO(eDcY#n@2$!ZNDJ zl()?p+frd802Eo<+Mr1#(gWzP3uc`L_!*B`$0_;K;H3W_`+%()Wp^3X7EFiU5lF3u z;hMFKiQjm|s@d|aA!NmyTj&2#DXW}vOcxQxtA-FfGHnUU(PO7z>w01t7BVxKdMkZ= zxqB!2vq~;^TXA^c)eL@^tVhgSU1eY!wyEWMq% zbCm#eyf4+~JF}a;S`cps*Bpzub<$OraTkq_qmIg>j;o?q&bEm5AnA4piUXlZ#69^2jQ&cU4(FWA&T;-B~-1)!oc zg$u<^$uA4;y3Y3JK7mNrH4A9|)C>|Wy=|~+`hzA!;?aMS_h0qNmF!bm3suE?6Y!zd zsRM+#U_Z_>INJ*`j-ldjm0%&vXc21b7nGUQ>O|W!rFh?e<&(1I#Sv~Q-FQcOpBvlI z@x1Pi;)~}9#JrsqwA>99g`?LFR0zQ}Xogqo8`4#BZm3e|tH&)+fpHUZod!TAd#Dxs>fN{Eqx1lA7xT16dBDwYW?*1DCb$xO+vzF7U z=%VPJoi}k`32??lG+IBV^!j8{7*xw0j32rU%xgG#4)tpi3$ccze*L1pUuDml4Fu<9 zj>h6plgeaiP#-hE`uvB|r|~M_V)orQTNM0rBph8TN|%90#TB zPT~;}58c$Hy@KXW^JIf%6G+v>f$8}CO|1!3fHe-r?r|KB+{eZC0=a~(a;V6AKP0Hu zu@?&U1&_Z<*Gou=X%doxvUta-ToBNG)98m4=-YD)tn{EMtk?eQ1ZTOUW|n$uU^uPQ zkD|`TYVc6&&Ta6LYsEL8X#sLDe=Xv?rm|G zweeg_owQD5)-seD7S?cv=(J%Ir?-RaQHi0(YjeaiuOT+mvN2?`J0pD!{Y9kG3S^CN zUoa0-OlN|-J4ua8OZ_^A^ufLlg&Lv72M-1(BfAq20zYzv!`5Jl_te92%8+SPfB*a; z_^cb_`?TL4wUKs@yIF)+#HUC6pSD}-uYyS#djU}ckS&OoqQb>#=oVvh5r&VU9SC@; zW8{uf8D>Y)IHk-=nQV-hc1hDzJU#3O90~}j-Vu0P^5|>UR7y7x6130xcAyjoa5n&q zRVz_z!wPXh49R(q(6dQ%&{T3O%)*Svn;RR52*+*ZTWuUE7tlJJ#qFmyN@8w_1= z)Irm0V2ol?MZKMkon>4%rHt%6RcIyINYRdhp@zUYEIpDrBAZk!2#WQ9L34-;F%n-O z5l->GGvQQ7gCy-ei1k#`OS4TflU-Qs4>LVb=i^Te$6NrV)Kr#Zn2vl?CDXbh|+VO44$SvF2HRfn?_>eNAI2w#v9|8OOy zF?mNohO=MstMq;N45qtp3?L~!U?o?55(tq}weXIvQik|GjY7>GD0cq83Brd7nt+QJ z4vi5kh>#o*_c_2jEE z8Q2GoU~tW*VdLyLdGf*zH0u}|c3@FQcJ4o60#U;%07xIifceA zR58&%LC5=+c_EwZ)e^yor-263jf_{$8ykjhB|1oNJ*`Vp#-VY6{uTqpSYgXa?*{o@ ztd=zk-q}|~eTTFP=`@Y;^H&okXNs?q zh2Y`i9RXP? z6d{L=&9ieuk?{RPE5K`CAmoiPB#^XnDF5D>sxvT6JivCJM1R)X^D8y}Y{`{bwZpgMf)gCy1 zPg#!$UKiLm1e@$JUJt4%ko7w~Aim;PseYB9xwp`Bb8{}rqBjNp_-9Qy$|1k7N9Bx4 z5F4fO_9$S%+40rPmvBca_5@M>@##!}rASUE7qM^^S;h#hkLsS!H#Y<)Zt(|bOTipf zE<5YgHY6OCnU)^=3N8$G+fZsIFQx2oIf+|mb58#?&_#jBj&zR?-G^QX-udf0?#b8m z2$et*bxKv)4bvtxHaNK}^J!g}vaEIdqli14b=RTKR#JY+oT~^#FH81KpFsp@auEib z7y(dG{~icGh;pd;wjQ+52)edq%6^_@+Z0OLonZy0GFh0rgjt$JVFIzB$XrL^s2kjN zuhAK@nnImWaadO&mcTE zBWpBe@+k_4qLEJeM0FB!evy2cjw?rFaHUTlx?5iqsRfbt#9g2n#Uf%HbF6=06v7Xa z{h`l1rz4#^&gHoD5=-UAXzCzz%JJw|O9{`-9~!-hLA~rx@C#874OUoJ(ykCN^oINec@H-XtXcaZbPTyhXg(S=blvsJI7F;?$taI;a43aOULZ(bB za;Kneua_Qy{1c%ahn5zPcCnX&B)?V4@q#uOiABv@*ryGLa@hn*g%($rA6!_!E}Fbb z*p~e)^#F39@&VV*!|;&eUlLcFZ}nTT<7_M@rus@^wjP&uxO|^e^xa)(yxE zUdo3WE(C$z>ZQ1?+s?1DNSS6#^U!I8lq0-aTx}sjuini7GO2jhp9o_mkJDbkCO@?3 zPlv_JCj>F!X`6ZX6}>mkFB=I{)!|augpKFtH#2R5p*9Un*#w=m37YrPSAQy5dw;a@ zE~*V|YPA-tRvwO5?=Fyw{%=;`Ij)$t=zjg-uk$nZL^Te9g*1v9vGO!dcDT znQ|4eJga;N3n#3SPgBK%gz~atX;&NxxS1-lhJ#9lCEc%rcycD5tS7`t6-S`TvF;?; z#Y8MdhK6;Ccx2C6k%;C%YWd}b^W?;E12>k6k9CnPx@;WS@)#7;q-73G3Y)l}C4-6* z)W>kc7h)ckN4sBJ5$~`CPjji!u(KRO1J!v#PkBB~1mq%aW;N_u`ktWCyOPW+K3J zTy^!fVhSlGf%=}9xDwx{VzP_A0^YHNH&F?ufKO8CNaa{qeRt zbw9UOzA~I<9=9qrPDw1yLEZdl$t+e>(E@ACf0S-GcUyqpp@jC_CuF{yhog8hpYo$1YW$asq4)PMBBHXR!B>`_;nZ^LB|`55i=GjNu)UJUpSQT7e2f(!55np4QkmXj!wJF%8)a3+^f+ki+BE+yapzw|-!ksz^*TVNT zPIYgvzQ;_d^$ODSbGzKW`K0|q{yAsGrgF|5c*Czh5fHvg{vvj2v7|Z{wk5C-9XQRf zwv?~HIUJu7Gm;jCJ zn0pHe%)Gr)@i+3pN@cBfXuh9i5mH?8x<-D*gVC8?e?niZFf@RK%CuK6=+6*xG+ID- z+uwby{Pg~Tbp4s`DDD~upG(U6MSL1rZp~U*Uf%BAGy;~32o9BFrCNu(G#)A)fD``w z8BG3It&10D`PuVKf}~;T5oU)iy2>i=ZVq8kj)#$L9g2Q9CmquTy@)WLiY6Z~$pZU1 z9y9=iK_N(om7M(kUEiYE05Vs+i?`O%XbX63wH}_t7nQT_>88 zA8N?cPHQNCeiS}m%^AU|J4!K=^nMRIxB6OMoxZ6~99I0DiRLK^2&0#J^_5I(%V1WM zh3n1eajQq%Tn$k?BI0j(0z1piAS!F(F;i&bW@Tj-X>**fap|5m3eFuE?V3Ia^!Rti z>7LO9eZd`W_@sv7iMsH~xFpx!MnEWcE}METsa(Slz@w|4we-4;Bt2jK zJSqnHVgmUD2nH|!Cf-^uI6pBs-3^ZczPaWFN*jLSy=6y?9{= zQ>$OA5D?{+F{JO%yutBCTE>GVvji$`hAkSfv1hz^$t3I_e{h?Hs{7czM1PF zcWH2VHZ2GI)7eYf)c8fQj?1ZR6@szcg6|bo_rvrGq@GMj&*Lcm4sEfr&4}wyNe>I8 zt5XS|rZb9Wwq+|Sl}Czy)69mSYPxR(XP7ZfX1uu6c^ug~tg0viW1KH#8TeH5ZSn4e zpgH(67_C8KZ`fEghQ3yG7xWcHLz~~BIiI4`qHcqDL8_6^XVUn7Kj(r7M_+|~$?m~ae zIQd}U_&xkpKN(e9{MG5SWIv^@|2GKN>m_9~jE1xpYDrJZ zPih&5ZJ}}O)O1B==sTlkaoQf_8mU}Cqs_jv^dR!J2iMSq4EP`^Am^z~Yyg?(NZ005 zfTLf|WN_@)nAK!)d_}Pn!3#{j?D4MYN60ECtaQcD%JTRr^==fs8Y3((Cpv+k2nL^< zQjs%=!;mA+;VyBT-cqTDZM0pi;)!BQ+*PU!?Vko?6)5vGVV-u^A}9hlC#f|2OVE*+ zX6w{#qZPtn|$WlbsV~h#Hqw1&Epn5Kx{MS7d7El=4 zY}8j^(VMyH)}ENqloIhIz7R6I$C;}D1fargnk|-qxYR!(c@bT9c^9FeYMW(Np!&S&v7 z^Xvhy&38pyWq~UAQyvz^isf*HR-TJ>QaAIdh*Oc8?{Sq$mdmLXlwRK`(>W^+z-;Sp zivI6pr@m?mm+e~1?x%Ljt}5WwLUAX{Ih|}r0NI~BvK&2HSb{7w$<=p%{pr+ZmsIP< z4u!!%Q^{JY=D+ zzhm^{TJI;8nWZZi&Fs8Mz;&9a#Q^rv&Q}$v^rdvdNX|Ud*J@Y0~|nQE1&CUOLF|@yfrpncp(!H71kxF0`yYfvN;xxT}XD_h&H$D6F z#8{@E0d%GJ;n)FYj4{bdwTD;Q+>gEy!`|cRVsLusi)ThydE})5+y6qh#;+k$VUd;? z#gCw%-!gPUw<}o-R<`Bw?7Mut#``?wXK!w;Ee7eFR*}K>rp8DFA>tZvxb!H4*B$?!DKJm zATR8g^j(yndmpgA4_jmjVVg*S9S}~FUwy3%?PJZtX^&mff)E&xL@%VC{GfV}F)OqF z#qq>1&RAOsp9TTjdf)&FGZ9f~U_dLzud&s4AGn~c`u_c!D7G_E5 z##AI@a}STXh@gatoLx7}Gcee_x{{5@mWSiZBUJ>Y5N7|Fg{GPdcoaly!#p0~sEXlx zv&il=#dyA^0AFvd6&u{S!rGt|f@%VfIxBmB{Os)9Ma0o?xsk1YkM`EM_;5N_eoP!4 zSsY?$jG5XkdV8&1z%za+?TQE;}Gh2C#cD+1ZQg+w|W@(#^r>qZt0NM7`-90F{ zr~49miy1MnwVyBFR< zJsCXd_NaQg@0s*LNvDJB&_8AsG%m17OYp)i9cR^se?758ZC>Ocdli3zq>AYzbitKx z@gkoeN{$1E$q30}6HyeV^yKi$H<-dWRnf&OnFcW-+hppuluhu~xg`HVXbs?9Oq(o} zQn^{@ocR!!u4Sh&&=uxFTRDXbQ?j%B4MxOw>+ci4 znTPx0u?fG$ZJCd^-tOUN0~~eiD$MIJ{(~#OA4Yh7%~})p|6Emt;aoR#Fp#TDl0R4o z;@1MbtDB;iRwf)!DQ1b@`i}N;0^KI@-+$j`59L#*e;y~T1#}2;_lU@0<7P*@YK}Xu z-rwHtOQP(`zw2xq?xm7pH>=*~kI76da33RSc1A@p>ol|N~MqCjKB?E;$$Cf&n~Z3_GtJ=^B%<#GH6o&z)$ z4s3u6(*KOY@<}8XoB)bs(TRk;XClPwhh$;~kP)nL#K8>Mjyc!d2R-|np7>K7wuUFJ z^Hm@>k|GE%N7k8C6v67?24C%Sful{H6oedg(@8$F^S1Y9!enHF%ay}qGoDF_8E?=o z@87Mghy45?+OVt}jG=b;btiKVEbh*@l5Y?r6XGGU>v+Fk+X!${cdLTR#3I15(D8D2 z_UHDd%LK>#k=iR3)u_Ec-KwN`qjRKSe|2(LFWf+SB=OQX3Ddn*G?PU z>z@IMe|0-ZR24)9^w*+TwDM3sdu5?{tQ9&E@6XHqow_tJzFYDvmbnijkGzn}?)BWO-gH8~!tuhB@#A4w2??46M48mFPjhk)fOc`Gyrf;@qQ{0?d)-2%Nja9s`W$g z*E$(HVGcuHX*BQpKc*DTMnQrbIX_-_tz>o^KYw%?TU`JHNDrmO`zh`xHg3pc`j*Ec zB^^Ul`=l7-NtKk$wI6g<%zD}85;~PFr)i1ykd_jOHh2JHo$~5MCDiNY0)SJ}=t9WE41OFe`1}L@@t1l_cN-dt4H3sSa=u$BbU}eYX zAd*G^aOr-WIO{blRHNz>w@`LdZ<)gx2%y>iHFy@qDS%EL5vSSvz!1K0l^WB3zpg(* zE`(knnY?VACxId9I&_;yeL=0&2;whbm`mk9 zC6{9O#oHs%zZ2rVuLxX3vk5sG7;VB;`O|lfMr2_KR%W$+6_kfoDdBFJ&q^uyPL4~( z>^00+fQKGri{z`y3R8 z&Xx2k0N?NF7MKPNCML0MGoi`r&~{np%NQ0uZrjSw{TaZE?&lI0*A_1i1|HtkO$!tu zd9>hgX3h}eBBLK}fsG-Oef_z#wPPS_ z9Ur{U=(UBDUS_ZDxA~pn+zf?nu5YdbFt|REFOP!pw2F!jzrVYY&5htUhrX8ib|`%H z!Q?Hc?5WD~P^NzK-4Bk1&%Mkq{l7WCuPyv8aIVmMG&N1}xtK|$0cfbe&qYmZ^?S;T z*Q%8Ftf*;(0@VMQmC7*orrY$U2mZ+V&3ckI3p}Ls&l|VHEZuet_|2)7vpUV|?)P`YydJ%m8rU|n zV#`#wpC?#WHX38HPT7Y-!f|=sO~_K-hi?2O0WljzAuL#4WW~!f5QS2TRw>9n$54sL zsO*f+Ht|m%D)zMsieD=HA$^ofrK&mQV{?sCW&7J6fgMdR4w|H~6CQJ_F9ToENL z8|rCUFH)rYxadFbno?}R4+{Lm_kzQ6D7pZ_=R5N?Y6o0*piwP5ORgDHu{|0ea$5SY z4GXZ`MJLCgJN1?Jr<3U|+q`YIymlG=?QXYreIE&M0g*Y#-uHg%P3&o`?-~{y9OB*0 zY}1_E3w!9rne;mw<|VR|Q#j1}Z`S?!AXkXhRzEmTQRbJ)Er>RH2c8=L~z&iY>t z=#xcm2Ob(YB|=_F5?ZFakT9tCUfCe8aAG70953mTP*OtFV!SHWXFetO8`;r*az{Sn zAWymxv`X|Z9sYHks;zn*6$D?yy9Go!5Yx?cg=w+p23B>fhAiM~irFQ#GQds&J@hec zrg-t6^aP$$gWvR6H~H!ypN`Qu*bQ>>zpSNR;9j3eMce!L>BL%PX(|u}QAa)%v3tv( zI_>x%Y55;EV$)eLnpsz|?5jQYX+6ot%^XG)pnLT}qTgS5#Hf5YxmWnGan@G5V4!uk zIMJhdXaCyYqGUzvUJ4BA9&LuUiHFJBA<6hqVw zmh$h{WrBBzT>BS5Y{Tsicb?qbF7}IhtU^Y(hnTuJow99>QO2v_tHbrE*>thp+1cI| z4p&%$#x}C=7r93l~Jh!gqpBo`re@(7Y*Y^{!>Nr3LbJ(@-wRIXY zxZQ(cKH(Qv{;vLh`w_{DJR$AL)+5tCfPRYR2?w&jDe4On)ii{?D(52&u?vLl-_to< ze~xWU>J-ir+yPft%&a-7LQ@y#|GOeNo{hYX+&CiI&7dmAQZ6V8&!Acl-Ux#lTkC)r zGa9`MB~U%eOcxi?W4~z?GayW)DdZ&n(zu7=62X_+z9gHGyfMnmC>=mP^2y-{ud^w< zp}DXF2&*YwWKmDlavHF56@Jcy=W5*8x0zqZk(007-`o#v$TUfxi7600n8AGPBu5^o7L8tEBeTUK#m2 znI7{^OTUOztG9oQKNZ}AgiU)5MQe!q`p#1S+24>aFJ%zrCIZywbsa5W;6oSc$WaAu za(kDLF?PoXIs~!zrxqki5f)%@`w$7`#Zr)ilPa_?RnFFtL8B!9PVI;*KeQ7E4g8sJ z`aLYEX#Xr-$%+M&bLHpHnU?XXiP1IgdNLlq%t+C`FZ4{B8JMGI=(|&k2{b0df-xuN z8`IkDk(EL3EY=n7Uy`-WsYLe?I!MXS)V5z28|x@(FETa&P{eK(dj?qA_SofQBYz`b zhcMqHMPH)j?9w0e>mo&q@mH`mLD` zgWXZ1o}}tDm77DU&9X9X=!0hrMgAaOZ524Ns`MxZDXbLXv43+!s2%<)mocC5Xb_p( z{_NwO137!brJnkMsJ{BLsQ?vdv42w6JopM4j<9Y$Ve=Jf+7#9zlTae_&G(s_?>WXO zl}y*cp*OF6OlfH6zw#EsexJ*$1aL=f3x?#>4}_&YsjGSEl2y=woV-H4i@+x86&5zE zT-+*g63)*mo5y;9dsqvEIV>k8{zid)2 zXqo+i2u7X`_Ekl`N?1Z<=;2cY_nqh@A^MROSJ59(TI%np82PwXT~|zw~BddEebIA(de@3yy*``h@@u(6Ba9%I%{}vv24;G1VzKs*VTd+^Zc&Vanx>LwB zEJ+xuh0CI4kSq`#VCCZijT)!LggAqp5!z!7cZWm7`L#4^#Xg8L#;*q)&)N{7w=MOg zIaPYw>#!OtUlX`=E+HukNieTwK?;2+xMds{znErGE?8T4SQN!&zy)dn(z@!MEPCq7*502lC@BlDMcJAf^+ zK3hlEkZZ9a{$Uhlz!b2r53W1?hX6dt%JwsFPa}c8vkw<|JFf&lkexvyx@gT zNVpB8ocdc4$fc!ohqOk-)E(&JhzO)!*6W()7ek&}@x#-_O8l@Wz4(uayx@5)e;Z{B zGc0wx8M3#s^BU6MhVprw8bl>Otpt}wvNwJ+Gr|qVfY;k@3hMyNXdPGHg=a{11>KeG zZ{2XRd)44?RA5)DK(<7eRKkCknqQBmj7~3A(#UDQ?x!X4MW(t1Mo!Nt??1Rlfs%;=HykX#E=NL3joyiI=mn9#f9x3cP{o6OPX5zhxpY~J(H5y2EnHb z^AUL2CEz{5T1}4@0sf_3DHch-Pl}vz{B~8}C&5fA2^tp9c34gVZYT=~`C#u|;Jl2p zl3YzWv0)zVzM}1v+fAD_ujPt#x!tn%pL&f+bFz;+HUB_RLo|jpWz#xjwV)&AIV6mT zRERV>y@Xhmrtr8zHjnvcf%c$-8>a3zt`%t|T$()q z_X6+1!So5g5`?XUnYp>18B+kyAz4qcj=slj(jI zi^M$%{)y?H{AwjZRorTw&O8Smu#KYoW^<{jqWuv@L{EpK;3TMZ%!6FHLmQH{_`^jY zFH52#9KOy4UcAIfRB$fHl-wmJ7dNm!o|637M{}oR=a^@T-gV?VQp;5K#^@??`A(mv zs&N9zyQe!Tw#FInZ_d=7D6GPjgZnT`#1E>AUywShq^OVZ#uczC?L_a~K!VcoX91fm zmNw3|bXSM!^B@ID=thGSoka#m(B)}tH3hNbHJ>wZ=FI&J??!9%)9Z8PXMd-Fm5(n! zRhB%gC~0uqzRhb0VClkixk6NTWbUKb*&7y9*r!R~tc_S?{ovp*5_dy7Ir?z$Ti3Oy zDOX!0tSF)TQpu{#&Cx(GBmp$h!H9F_25@Y)e_pVPe!+FL02V;4uUudFMzNQ#$ajUN zQu8TtL+(FhQte{>~Nx?t8KGJFczzEx9U!bh*2a{O8u zcS$4PtKgFQpB?~sz}@7&;Y_L1GCsm86~9t8Z80MH#4Wq1+2Ftt@fMI!JoKA8m96Aq zNAo&6F$88N$e;`|DbF-Cl<(KPACaAnLyGS+`6C(feda?2%zJ-sj_oy&biR))LNzJ( z)>i$24O;P;YD~2p(9b*NzZ8uEA(sHDfPM@JhDghl)#t6bQF(x_cR{&dSzS=MuAo2z zhP$UKdHbM_fKE=yEv+uaJ>9GK;87Uk)}IGxz&X87a6(i)zmu#ArG9LLk@Ra}-m|_~ zaLPmOre8`-&}t?<5mUFP6bF!Em@l%2^=M48F2i;Tckr z8s+T;#IW8NW<^sI1JnAPPkT4g@7f>K`S!9#)Veiq^xJ2#l|N@h=$8uBKL99PXYs3S`V;{=8$)$yyj%xW1I# zZQ#Ocv4VUI2E<&(_yg4M+l;`8qE=FpTb`j-^hmIhl(=g!dxfc!GkT$ShH==3XRb;%-u zqZd^DKL5V`{_OsOCdDoHkR93@!i~fe7GQnb{Sv?O?i;5rRXwOny;3m28&@?_LN|FP zC1vNR(Jx!4AFPTvb5H*uWOnm?KbD$c!)9bZG#-N!4>9sbQUN`wB+$O(wMhK_ksh5ktc$xeHg zyfBQ3wv%;IuQXKm#L%w1aD}Q^6emqJQ+6?7P{MpWh)XfIEbU3dTWZ(T=+)5hHqwJ%CyRhIK6j#m+rJCW>qvQ4q3UEioQ@G&mPWvj<+$+r6qn*)lZYBdJG{V%>U@~ z30fgu?ie3EZ&Z-cFJr$KQ2g{+*7M2h5xgYc!T-t1(BGf80K3t^o?@1PdL4l#nRq1< zsV&Fl&zUXD9c=225PkGkW@uf{ge6P`j&5^6(w3q8<8y%DX$DXHcF59QUO{h9%W4hSnLiQLPltoa~ z_kE;HvkZu^YPcjRkl{8?p;TCszGdj!Z`!_ydKl@xb zlECj_Gwbxi$vEJs*>(xKNRRoC>!rio#R`@n$C-1WEwM?E*joAWhAdA0f;!4sn3Seq zr(8ZT)igcpA+6Wpr_mRIH9Kgtt!PYnk(juPRI`|)b1P$YO!FTMF@!;?u7ih52NcJQ zzRjP(VX*~{@{_tc51`*Kd*Zqk_SDy-gz~)CWT|a2HS9iDl`;R`)Xn={m`pttxvsitTpU0GW`WDe<}BHB)(}mD0Skn&JzITD3Jmz`HCk47 z&JfEM4{5Z2`V92jf*pPc^M_#Z9MUYP8k>)i$!_kbx7>3?ti-p9=jv>+eFnE3u8xD_ z=_Pg*miwx?79t~$kMm69j1_IExRWy*h6uR}f-0yGW{->YV=>aS zpN6+zeK`Tghb4`k=b^v+^uZ@yPZ*rLO?A_z_}qM^iBcd1M)wPsg!vO99$TYDA|9R# zQ4hZLAXp`Hu3D{dDhc%IkZnw375dw}q|c$9rHcUz!B&_SgSWGbPixmX%aWDJkoZgq zj-uBo6ii`An1_ZqsOaGsoKsLv(=?q&W+-oKlW8O>1r&u~pB3Eq`?(rpBFD+Jx$Sa<1-`=;ogG1i$4Wd6T0c$r-b`ShlD6?mTrm`Bmv*AQy716v zFNG7R&Hfp7?x=w<8o@7u?g`#`^ioADe?XeKzHS4dia9y}2ZAYw~bYBgg*YaF5f1Z^Po}N9b zI|w}szLh8=51SN1BWy51v|>$hpoWOK>%w-^?2E^HXf%ZyVFWfr3ulBu`bY1pTB2Wb z{~G~-zQ4)kCn(51Cm(yYUwP=@lVeW4%vOf5 zJV6-mBZ%oM#((nFg_Mg+4S{6tS6nh0(C2?8(?U)1VLt8YxbC7-7bq&Z37tA^B?OMH zc*VZ&WamTKqI3)h`GM{d`xen_7l?v#m41T=wVM`bAe^M5S=lma^lo0w9xVr&cIrw7 zEMqb6G64v&mSSIz62-+WnBso;nO96$z~TIg)W2!!d7QvzH%kd za2h_T(vAzN@1dPTpg_V*KLbggA0}Bg6kkFb4?%qRR=1NP`wyS^gm2TBc#0* z;ZwBw=7GdS^#`0CK|pxDQ}P35i8z1nnA7Q zym#dH4aZF6(4Y*3-D(&s@c?V_$%Sy`0V9doecY^@AT#@daS#*TC&b{_9rN zRpOVOl6%vR?`fkHE>3dq>3qRBWrs`K+_(A6%I-+^-N-5JK%QwT^5IG1nO`5sO z9@G-DXq}XXb-<9o$=!oFn5^l68p-iaVoO#O1*%;74O~Kvh~pwW@5m_1Sez90UG>bU z0VKD~&iD-@b~GrQ{d!RA@vU<-Rho-R_jxnBG3G2Oxos<)PPHhsY|lHMLIOp~Qu*ve zwbD|ZFc20%1%Nq-PvLe9H)eG~hh+Qw1>Vy`qkitsfAJ5P>-a+gr%z?LbluG9EJ^L* zEDNEm;gkcJfrgk0G|ooT1U`6?d`PDV%xnx)7nB0t`;Uwx%hGpP9| z?C1D%ch@s9YC^FbnMdx0UVV4hZE3f%WUe=erQ09YS*zI&;$giJv>=?N-|uvTcC8)` z+QUv5cS2GNSNVzp{dIEAUI8NFV*z=~cgL_eLN!oZ4YUSrMiOSjWKnNPlZE}J)ohf! z$;}*v(YlRZ$*V@YUp8K+)+*~&Z`AsovJqSL(jnE?9PiroUaRa~x7+QAcc5rT^_%dA z5DNI}Mj#wrAV|C4>U9RuAczP3e$Z+TID&NJCKhLUB8&~s!Ja~%eB5T<#-c*~xYw)=YPF!>9=3wkFm4CEXgJ`1Mh(_!4%=~U zK$a^u8hx(}REALth9%zwa}Mg|Q-xlV7s}!R1nF#`b*Co0fi(*lNGyniz10ePO*Rag z-R_VdkZvpBfA)e_r&sR`IuUCNpYHX*Zm}3BfiM~o<8jS{zdSg2x^NN$HmG%mgKjX4 zyBu^*)`GAWb1AsaiC8pSji~IGU)$28aLD=d9-Kf@z;^DB-?yeID)lCPgGCJmVLb>BzK%4er zJWe7k`8I-&#l;QwPc1Zvu--6@xVQ_Y%NG^gz!6=t)p}vR`7h+F@-0+fFr;R5ro`H` z{#vU3u*`5K_4s`VJZB~$%HgVJ3G9UPvSAc(K1U<4DF9r~>Ov=~D1r++kQIFrol5sc{_r6D-wnJR{WE1`fE^DzYu3*%274;dAU{E#y zgdiV-Fi9ZNBZ*OT*QBaG=mu@|I?e#g9(l(ubi9C)O9B`drsXr&rjomM(RAbhk+!jy zVTLoYyS>b};gQ@>ZEJAyDlwe!DA(r#+YGxbx<1m81c(TKqC0SBg&9`eX>D8-U<(67 zeU7vsk|t{bQ>(KY|zV@V&4oscg5 z_EwbQl(`T3Sj7#=kES+!9wnf|r>%B*FIf3P&%nzU(mAz>dTr0ro)>-9F%fHD^0osO zg)?AAg!npINUFCiil7pz!pfmjTqG$YKR6N#GFRVxs*qmj#RL-Muo$PNvjs68j*ol< z9Mk1f01UPu^iJ{KI06LCU8F@b;rybr=VU!Aqf_4U94FP%(Ub}ooLY_DF z1LBDa3YnxAae6rhi1xfA?JqoZ$ygeQG-oa?lH5}qGK=)?^iTFqQlmJox; z=Vp=G3@g-%1Loh6hDX1O*Xx5;6n29~#A-pSUhf2hK8u668Mf=Kc+hOO;uWx&R;?VF zf!J|`9?fFp%_9u)Fk^n`v54!r>98IX7WHEF_#PAEthgIfU$`VLQ!{>HpUyIQlul+5 z-`Ubsv?xh>zkp~0bD~A$%{$y3dfur5vc0xQ!wr641HVmWI7kNDTZQPbEt~DoO;BBp zk!cCW`pM!ecqYu2^x{+T6s`HN$@omXJyOwn@%uiB!vLjmBmKobeGM~YW=5jPzeSkx zWR*A)cw(4Oyh15=T_Bf0XipY{VnOnE|E&Otd6Th#vR~S~+CUUv?5&TJ@pXuN4QxN( z0^hzq`Ht(EZ-e0%FO7vZT6fpI$k)YxTL>_*AAA5bS)fYl{;8mfuTw~jIOB_Q#ii(? zjue#9RGk=$6NA2PacN>wVadw_UQCjVuEOW#8gpG?es{rK3zP3yob9^FcbfIRHf7)O z9Upt0PQ%e!zSG}pmVX9g@(Q16)ZO2?2>Aj`X|)GvQScW{vRS+MSoZOQaeB^oNbHCX zK)qz5Isp7K`Zb0wE&)a5JV%PPU$bz{jVbUSgFbT{ina0AqOvchR8=*;byb0`AJvRv zGCzaV;9`OA37l?2ANyS<_4WEKo&1P63xo-PWnvme?>SdYBIyd`orPJhS@D4wU7m5G z1pI{qMNLyA=*IU7`gBaw3JeX%lV7ZVy{y`zS$Ojd>8f%WJa~F*A&|ntXh2i+Ttr`= z+p)fVGfD^HsDLX36SiFnM?Z7T590)fvECqvJIz7Ridy}kU#qo(PP^S6v^%wSJzT|m z30HS>RlZ+WiJKAm(W_F|E{SvvB-_I958=nokEmWshs8H?cs`wrKcOk(hZ)Liip3`p{jaXHrgnujk+y2 zn~g(>!-BtYDA_oaY#d6aY~xU}aVXh1lx!SIR#+LG@~)zp*;wN4{6esrr0=rCAu!eK za8EaOxQ!j|cI|LzAXsRDyF&}t#`3YTe5}**(Yigmh6oEYz;N3ZZb{!EWAOkdtcx94 z&9hSL#!Z2QCSxf@DWn8K<>j%>4uCdt(PtzV-HZf7JlTGz#!$>Juj62sEYTWkd=OCm zuKD1+5)6R(@SDllBCIC+f}frV`9K4|be2DATgC;+Gi#fh$L53?he*`Gm%F zMDvDtSOqYekX`Z6+RWy=al+A6srLAVP0q7~{oI#RKTYOJv#6Gm^F7p0Zo!9%=8Jx+f*OmJp7oP&(2Tyfy5Lz zq}?~hZsRz<@}l_R~LZp`Vd#r^;JFB zH_NqeTeZhxmxltGzlzxa3)(%t8%at=eUNRH{W>pNhtK(=E6aLU;&Q4KY>T#|EKvG0 z-44`0N_DGaM@Hdn9G&5P#Z<5@*b(V`w0J|-v>(laxJ%K#TEebd(v#B4VHz+49$i~0 z)RP$1!2ER4M&3efwda{B>j70ra7IaqIO3f!~~nKtjfB2c$A(R z8gdw!$gXo}w0oncPnsLDt?@i45->rMU>lIuFOm#cV`&+*O8r!XZ6RC(P`_ z5%;X%K8jmFzIHyxuOSD4HvoZfj;rY#DX!X^X2vxFMyW)5H?eW}1$5X7g#fI=A8CNH zI7+0XS#cXS`@V4B7x40%X1yW-qEqYD7GB^>m6M|wDFbowlbc#{#=lK1xfN>3HEy+* zoCA|rDI~W^Za-c_a{JGsf}9?+nxo9LV(~av@7t;y=PoSaEmgLsbc{9DjVt{|wy7Ie zguVo*P2D&bYuMC{s|wVnZXEsF)Q!{oEhKV!AF*5Ots7@E2if=9b>o}`Z{+C9*NrQ{ zxkTN#Lf<9$rtI}))QxLy>c-t%-8i8jqT9jMA4I{prggHsFQH&uaZ=cK)x)9&xZ{Fx z3LkI$P7RmWdAEVc3@aoth_vzO^AV}5D1P{ijV`j>XhC^VglWt77%C}IahsAZ6JmLk z(lm7_RQIfUXQ%?ssI)u(4B93&s3#v1j+Gw$&A$k{JW|?TO&b97rk9}cz^d-XFdVGg zD>&D@(}HuZ{Ws}jK^d>MgZ3K~GSah?DFw(`c)>Xj1lP<{y$FRgnPxMOBX{}%qG9DX zr&OBgHOr>Kt_aAT1_v>1lJKs`eY9NKX3H?Y-sDluZog5lccUQgH(Ei9Mcp85Ho8Hb z_2M?`4;%gZD#@di6A?bnYnoY(yJAY4ns|3z6Hi(k=6qDoqSS3QoAoYh1Z)rugI2%Y z3woV;9JGeRes>skqiCgM^P75j)%~;d?dXM3zr&y?VZAp9T4A#j45FwN#KU$i?hRX= zdbhp8cBrCU`5v5rX-z$s#JRR`3w{D)n*913c*K98z80Mt(ZNyBH2L;N{sT4uw%{i) z)xE(nC_O&?@kl-X9n0jezIsSt&uh!~wu? zz2i)5^w*;>W^W{M&SyPfwMNu!wu4T+T?<-+4&%JK$Ip6Wz;ErW+itP;8fT5-6Z4Mv znFa~@%6q1pfgFo)aO9lr9hd48nA@^#4J(&dp!^So zH;{ZxezPFBQ}lGf^MYcpGjCgE)KX63?mSB%T;ebDv!Luq2tt`CncvZ-O!)7CV}_B! z>$iXM)Emymq24BQvejJ*quWXt)^gGUC@hiDlW3B_3|x<~x3K!s?ch$b}H z&56$Ku-|I1K^R1RsFgYBwSqo>6h!rQa}b5S4y!j-;JSP}UyMgrF2)OZqTVfHzLkX% z!1N4$@$-|e-7Zllv~_FH`8I)fE9O&wd;*6B(CaBsZtTj<@^ z9ul2gaVJB5$LjE_R1nr%T<8V8bvUetK{#l2hb`8Khr?CwAQUL_1gUe~+DQ@frEMKB zEp)9o!CAi1MBh}zRBmDWn2jKC0wX2xfxq~MLhDoUnsT#YI(h2Tdp{EQ4TDy*Uke7kb{KSq{V=NchK*jMwF+_|chQkU!-Gw% z**!<%6~lSZS6^mLk{)jCBa3EJ8HT_-$zt>z zN#4seM9E3@LfQzf*7un4DRIL zD%b_IZ$%|JXp5h!n%!{6RCu$@@{o?gF*sH8Ne*WtFhh|1@6E>S9}p zdXMsrGFw&IEb4I{zGneh6|5vHod28ajK&tZ)FAPX(@Wkio3ab99=kT0J|T0)NK3_j zxe;RP>+JxsVnkiYY39)A8oTbRm=a4wdmZcX&qR4%1CIaBAYzjCP$ zl1B<5c{=kKk7&XZjs62HC@*amKB zzhxv3{PL8I-wndaJH&-|WL$>UFNA`xfuC3`GA%FvtO2a0v`YmwQmd+E@T;#1S#6QR z{VtuMQR^aspdAlXrP4Ggz3-eVXtaO=^%l-}vV&ot`uYlTgn@b(2T`W2A^(rEKth%# zFp9Yo6`iQ6;xd#+bi)wKbf(OmJ{rA5@cX1y)S{ zPd?Rt#bQt@0h96K@BW)+cO(U(KKRYoM{nMwpI)ujYjm4&JqT;{X3&azouJPe{I`Ce zwd>t>*lQCVtMnD8qmX^zZpu$+b8EPVw}!jE0NB1+me40^-pNG7MHiJYmPT&f#JudsK-;CQ)GpG%t z0R)n=V9*F_!7yqLhpkpv8`N4WoHkl-Hr5( z9z1=Dc;?+Mq^g3;bQX>dDIRKHR*E)^>i7}d1@Tx(3fYb|ngRWqDrW1=cYL$A{e5dT z>noP654_`>-%&u!uZV4Y(Hx>6R~lr*HWPqUwb0}9TTVh!5oLR8O8*rU`^GZB7}r(r z*Be5=Uqun@R)e;sHa1$uO?{QD;&h&h-s-@ygtGPqL$jBPzW(Yf)L9xChzW1$CkBg9 z_GC(}1j&4+DVC6UkHH60WA=if&e0I)+Lr6p96sk$J2wOgFL;~z87Edk0;UgkGMp*LbyP%K0d6? z+Z|2J<3begBSp1CJ?Yr?iKuLFLOTya7Lt7{kIWktnXlN&Q3^8blRr6n{!TA-MhBHL zPNBMOFK<|23fdUHB>-yh^A)93X8Yc|Z#0Q`drQuVx7gY-QsIEL{2eyRi?AI$6Xi`{ z?{{`Q@d=rZ4b!`>Cb~k;<0BMpoLlBzJKC2C<3}xG@8tS%ECkmFU$9)ehMau8wYTNh zc7CkA-GN{E57S}6!H&JthIH}W`29G&90w?1C^&X3QF^tz!VF0ipc2Z2&`Y8gil8KmxZf9L zDoSoyDDo%YpmZLfptSR2J+J3Cr);0f2&c(4Ks?4NM9)8iz_L@KIO4QIMA}GYFVxuq zsj2jSCxT8Y_0!q}oaN#|7KeZs%V5~jD+PeKT?X!B{D)r>B_p<80c0?nKY_jDXoBvxcUjn7DRY$I=S72b9p_#tzyb~q9|r7hUBQ1F5FF3*E*rCNL~O3hlMVovpp>{w=26#}PQ zYjzM!@$^zkrO12KP$zOIk%tAy)*CIKB7Gh6v1hr$4JYMoqt_-Q^H%1K*%UTJG`2=S z&siXuzNHuh5Jg55;2k0_JuD=pf(PrU(rLcAC#pL->DhX7pnS%+pcSqtk8piIIlGu+0Ghyg};97Q$8!y&xqQI zbGt$mNDo4cAd#Zbdl&p^UN;r!ZAooDPGevtc85$wq|lkXSlzl)RU2NCp{qc=!Ck zS1`TI1TwuleBud@DFep}nj(7soLzz=7j~1%BF7tY4dQg?;(`+PT56!b|L>&#DfYD$ zM*sX@OIt2d*(kg!PT6-rtr&DAFP1rqn_JVf%nMQ#KyXq2kl%O0i;R6U!E394q^P4= zs0Jyl;u}*pAznDOA;s0U`oiO)S_6E5RHYqMq6W zJKU?QBCgryy12P6{(BiurCnF|j4cRcMO!r3#cq@@CiNSAkrM8y=-|e!z|-V6>~C_$v_Hx)lmJ|7%p|O_O7ko#Ytwr?Bp-`q@+>z9!TX+ zVRHm*(%ioh&o`{?51h5Z7l2NH%VrCHG<@a3Y2)Gn#eD30QJAr9ojJk)_~HNg&;Q&1 z?jSj!fiv5;Wc$DW%K{ZDwrZ)tMmit6!vKe zuFu|z#RbZk$346vxJc=SjBd#2hKz2=Xn~9_yl>EQD92WH`=D!)`1AS{_ZlR#$^}Bu zL?VV{>$oLPNK!XDb@Ex0w zru>!@PNFmPqtnWO<##3Fa!lT5a4iD&JUjIBGMtRjPuEzjALywVVJZe#3riDYN}%R3 z1F# z$c`r*)zA3L4B(-&terk^Rw??1KTo}LvHo)TJj{p!+jX8!pw1fK*RDv{>EFCavrgxp zg`s48>8K_0!nsWksIq*C`dIaNje~i8l1A-pBz$#;GRKv8D4q6B!Vlu-k|oa+5tDnFz3?o zo;Yu6SD$d=tS|$|QG)NfH_&%E6)XzBa38SRt?_Q)mKN^8qbHny-X_zA&BhE#npJ8k z*8SC2UcVM_+HTmkT#k3Gs(MxFnx9eaRLsu{U?$+y2YVvDD@2)7E+Ggfz=C6{cAGZb zA7I6RFHK21i+&ThJb4x%NR=!cPjaV!86q&4OW~F zqxr1tmPle*zZSaz++5Oc>5^_02+{K)*dj2l+qR~Kq2;WyyVUXv+F@ftx46stk}tK> z)KM>Df*W}V+g+iONx!s`iGd{MvcLx_6*S2~5ztaq6ZaKNDU|m0Wz(XSWdoaTk+@f) zF{u{>KvfRK(6-X$)qFxqX;lEiB=36VTMv|jR0hslb zBxzJG@iDg~iHZCLcuOj=(c%R#nRB@OBDz_%N{+(G`*lvEP^o00&#<)*RxJ@B02O|8!B!T*jKj2MCD^wwIf0pt!Sx`?hO^)Q{tAm2VbL2pn)~=g45^Y*+qcu{ z#mh& zeH*cF6|t|tAT-g>=?kY^jJ|#S`lUx*pjolU&6QKwNRgkn6uA)?3)WKm7)qh>cDyms zGwzM)wut_dB4HpbBGBH~oPR(Dbg>8-UxQ@KM!_?Adh={%BmirfcHxV^%%U@P9%5%% z9Fz)!Vl_}T%)^5V&R`=X1HrMN0>KZQ3V@$y_HZyt2M^CfPWLAdX-Fgy@N$p*C_i!X zIey^(`+w(I|D>q>;F0%$OW4jPM4OIdX!GL-zJ9P7+4hzqL$8=@vbFQpIRuBDou-p3 z7(y=71H0WP^T8);pr7paczu8o)k5vP$f@OVky<|FtmZ=!^BF(nND_h@X%X57;YIR& zz9@}aqY>2V@V|=*gUW1h|k+A4t{l<(=D#0drGmM?m5$(;?hd~d|J zRmfM?(nE{mxQWAV?eKq&rGLO@%$Ec_UO9Y)732+og-#MAM=*mw{z(q~TXwZy0g-=& ziOrrQbX(d#`2B3c-kpdo-pfAl2HGd~(VJJ!4}yGR76WFBDgxu+<%FFlklH|T)^u_j zjzvUAhRF|9rm|-zsug9pKv9d~O%6SRA;q+sgzgV49Cai8&c^>5iTn#(!ayfu{(j7$ zTpfM*jEycb02E!{y%1{H%DmOS$1=F{g`?4xta*o}AOMJm=>(qTH8klq$4A8lk!voC z{)M9~h0j0^P1B26&uHqGCz^nH(@T|h&US|0`xQA zXN&tG75tSabMx*4oJ0xozMuB=qu?T9{8V$qa??R|7)$6MX*Y^}-^tF0vPJ0_aASh* z^7Jes=PnQhVJrOx(Q!Aa&_FohyuWOjG;%oa4=a4s$ zcGJ&5Qt*dKmd*ISRGdw$5r@(#rK0KxfN}8rs07eR;c&Jc#o|-}nVv0)`IFVCm*AVSm%ulPUg}I;=UO7*low0wh!w9T&7jtDUQ6=ph+`&lXs}PfZncb+cmP79 zybBaI5y1^)6SE^x{_Mrrq}LCAM7RiJ(l$5_RDZ4zPB?QqrBQ5J_A!(EQ26Hf((gQV; z`rKG-Wg^Ib+7nC)gK@@Px*B@kyTE;gCh@Ppffsd=L~A3=);d$2J=PLUVfVfL5JVF zQAEYqVwo}Bx~r2iKwi~nV<6yD00R>?PQq~pfLK$P??DX5Jda|5CQ0@_+bgQXirc(c zqf>zuw_L1PjR3YFNTLC{XvC)nKe86uUI_EiLpTPYaUoAILCYBuX# z)(F@j8V0R?yBG92^*Cq^hyCs_>P8V;rHr0s^0Rc~x-S5{5iO`dpu3h< zoAcRdnw+3YJAe3Rvs73Qwr~u7YQXp-5-s>|Os@&K;uc(@PAU2*Xr~_?6v}Lx!ZiZ_ zFM+p;IRGF8FKF47eeQ@2Lq3%^A}sxrzgC+V;)vMQu-6;3SgX!=wZV6_J{Si5M%)V; z-Kf{>v}<8&&|6_w`N3c>hKKsuF4#)&E(eDm5@A%?UDLJYok2OsAWw>5NZpfUjn|j_bB%BR+}v z4#t*Ip3kW`<4ERT&>=DYFj4Ydwqtp<6u$+Q_`;WLFBfh1_C2!My_30EuK2&;*|Q*yT^=09ppe8Ve^Bt?G1|gR!4LqSr6o9#nS%E{Kpw*d1YIk< zAx978TjAOi?^gE%7|UvVqW4_Fk7aE;NTcSvh;9{XY`0^Jw)*#F@vpZ5%WcBVZG`0d;jbIc=Mb;NShh4FdZ*_@R$b4M(WQP2q_# z`g(E2{i&7F#qMr6`N=+J7vY0deCd4Qe3&yE^d}|HxNXT5A@{Q-I z{B7YUTuqgqkZg@!jT)sc^iAyQS*Z-MvO|7RTNe&$ z*a8Gu!@0z9TAWgG(#UWbcOd%4i(V?_@ywDU$s1XU{Kb>V$QR(8Gc@t-Q zpJY6$J~jaK=5UR-_@QS~1I6M!?{zBw!gc_$??q>6nlbNpdGU>Dnx2jrcw`0;IO1W6axFDv4&R-s=s+VbBe0jiA-(cZ2?b zlaEF?4Ew!KIE-pT>>IJs=zHbAX863puynV_cS`%AUOrXi;~5o~fi%u6BcQU`Kjb_?MT$BVdma%qSvZkKhi^jMuLb=^n{(Z$83kdl*$r4TVo}`c^#_f3jT3pT z6uyflpjs}R0vj}Xy)Q9 zwe|+bLtBBx=rl75%WqRg^3i80)%|drS-i9G1M@E7O2v8nG~|+S>|L>tl5%_7S$d8a zmP|{oU9VA#ojvf1EI^4P4jAJicsdq_6A&J}aXK|#Ml%2wSnCr^-knYLNo2&1Blv8T zo}VXEyeM9V929;Nh1)3DSVFW5dEp1nTS9WxrX^Nr_P}@eBrawsrh8$Q z#C#=qs|kP)e+dK1Hh6a$JCMJG8NY%6mUD1I(yS{N6Yz}$*GZfo+HBZ|bo2olCF6)u zA+2P>r#RuKCxk?@D46g+PiLcWB1IpL3}Xh|k)MxZ30)m$`1K<>9g{f?GuN7^q3<#@ zmz%^pptUO0pilX7!lD5Ld)_gh8{BeW>+QYekYB+Er63fdpDf>@kpF+2dfy$(oft6# zeArka0Ou|y z46o?gLV*wOqP(F;4<@ zJf#T&B~anEsefyNK=*KF1m6^|xG$3nRqEkYRR;E6@8IcE5bR=%*V8S)@a;*;cb;C!ab6)k z#LLN*zRI$jB3L?H2N|6p)m{|wv)2qxJK3TQvR_z!-%F;vAr}?^bEhGuS_j59Nk@`| z7RKhgF<{V;Jg#XD1(4LKKE=&NaUV{K+~x~yqfWWFBD@0Tpb8wgdHZeB$`mwDQ@9xN zUD3PZoca1#_{+b|#@TGb%z}q%-(Mq*gOVZClkA_dH=fC5<}=D*Hkjob&cUcCH5*>? znSsh0#K5)47lG;nJpwOta7~)ZO%eBUwF$m=#0IldeFYvPm>D_r>zfzmkv;?~BDjsx zI-p}ln=@dF83Oal_~;_oK>zUWuJ=Fx`S1RVJ0|#&7tXN5q^!`w$}mlM2Tq zTfk=eqWFRj>oj^DPwkAo2tmntqS}iq7 zyt2V_MV#ar6oQ}LBg8(ci}prfi_*(d3nj-PnaU}sJ_{g!`81G-fpM8ag?#$`Le>z= z*wpuo+OH1$cZ+BhkP&6r97>}*iWcRHLpfsz)|}x%5-~sEqYib7UBKwgU%q&W$Z-7Z z;HCBDM_MeG54-+y1XmhR{2j~yA*Yf?YhwE!xpqm%(bTH`8<7A6`$TUH&4Krlvy{YM zM_BeURm0-t7L-lcmC9B;4A!KqIKyuG;KCl>;> zuJTdNq0|QDO@O6L`5s>iB2?U~9H3V-sDEsK@oRn~j}Oy}tJf)*g~l=b_Z5p1ek}oi zBQebX%5iASDH9BWJFXt^Ext&Yjd*I(z@RRGcpM4A5x;71K1(+&^$W+OHomoRWm&N^ z&w7}j_t&6pyg?OAF=>{C$U{-xS|PrsMOa>mqflEppGxsSU6^%Z$M5ePzoe{h+`2hf zM0vL|69M+z8vnZGez*X}jBJ*MQ9><&SaIbKdiY(g-!VA-6R~(04lw1H&txR!TCi>~ zes4r|6=>l&-THOtolV#f-S|A|6&|NiwwK$Dz!{tgKpu|SWiaGdLVl{Uhd6pbqh|q! zEfCs}0Iapy9|4cshpx140l1Rmm!`S%;Jd*n9KVO(exqjlH9}1cFZ=bw@HYioB^N8n zaEeor+r%4ki5CS6IEI2uUd#quM)oLj4RX|^83ZFseGD+|{2|`9!to5la%UGY4m6|d=x&?HT!!)p+mrd^_KDB+jjUJUxIyf zo&Zt_9@pNs2%iBs9+5Mk&lgMmdXoQ&8~%K7Fd7+;4!?UoP!FDkf0|CTaYP?&IP=NQ zk7s~Y5~(NQ%OSmg2z30R3N*@ z2-Bu7BA)I=*$4RETOj(|L{JdH#dAM79j6oa1eAuLbezPPcx)&4s?e6pKm5)=`OeRm z#h1(B<1+Ya`o5aB@TYwEP#z z@C5bAR3JPSZ8u^$ALWzd2^1ERu*w)zOm&8$-4PK|(P@ts4o2QXFe~;-#w+x~EfEt~ zemlO;JuB|jR+MkVoUC&Kt3{8(NQ8F!5WEB2!CCzE6}^0y6})Y=uYizI1_8WNeKl`O zJ&%~AURusDYj!GcSbiMkn4DKnlW{Z^)9{U+e(^xtz*+NBi{VU#MQ`o3&_3c(X=rcT z+Mf&rz6^y?7^vRft2J;$PbUDLp{`5=xJya_x-dH(!M|;?aPq~K6~-(c7&SZ5EeJT z3F*XUmEL@Q_OQqqcn8HCtWgCR-ahTJw{6Nk(1o&|@{iQdjf9H$Vod6}?VQpnBMh_9e}V}_C) zN+9$3PgtgGG9noo=)Hj&v)Gk-%-d!kL9@!`pfFZlvRQNnwz+TE^xYjH19*0s}ukQkSs+8Cp zYHQQzDtCgzXGc#_05tCmgfL2|hqRS1CSVw2v3jVYk+NG7^$95T;QFFI4e0B$^YdA0 zbsY{4p7JHyUQVbtjw#7T_eiW)VxF1DO(3YGD*J|VK$EviI>@o*3eRi1qb)FG7bJwF zGxHkx28!35MuwAZ8)0QwDUHR6XZ8+U^R{8D3Ol^B(xvRa@1HqGZHMM=u%J*yMU`uF zWn%*5$-&c;$2b-I)BE|K{@ObdEYA171(&o}N%lT(@$*0amG@YBiY&mqgHwijnE7`q zXP2tuX0w49*xADGRUBy1I5i)k`d%Fk23>`IDe*+ht@5=L3 z8xMHY1nD2&O57axNdDq){d&J?e(OK|A0Q#&-e7v-^wJZOd@>Z?bBjKz5BHCMHK*zP zCCe#RRrE21qD7;YY`SRRH`X&u3F^q#-WD>vtsSr8=d5}y&Ovd^EgycmPU#^EzteXm zUqH2k`yEk@UEESh4n&Z(?cO6>aNJFX?%^Vez^|2uEx|XtnYZX&wceU-PJ3R(O1P z0vVL_?WUAUb4OMPn=eYKMa9LEooCAYh%ohSd!AO9s6k(yi(BiiROor$uVRBCEE` zJi>@$>Xlw}zHcp*$rb@D}A%OL8W zihBZ%ak+Y6q4mogK~`0%;rGiml{cj=HGn~fV7Gg(3k(~IJk0c~ue>T_IXn#ORljje ze!K9Q6A?uMDj~4UgLIBo;FR-Cv_}h#1V*@#(n$F;i=>tmW`ybv^stlO-;%3B%@(jB zM4+>jj?7~=g=4kn9b^bdk|~YIKqYO!2qd8#R$)^<`7Cnk&W|zBI2k5tB zI?R&D#qUb!2dHpF~uE2#E~bPl#E&kmoZauWc3IyvAfbOL} z*cv@h`xOh(MO#MC&`+1mWXhs5PIoM;$tW32!pYUcFzolc^Z zd?Xcy+w37VGys9MyPzWGi_lboBCXsQ;$08Qb}NUnQzIzn0LgK48oW#|B!hJuWsU)F zA%s{NV{!ygp^qXv^GH%CKEWKT)PWQCF8Rj#ycYz)_96i4i7u14Z-2OQV( z0r-P(CY(?kZpHXrZh^rG52qojYow4%}%54Za{`AjbM(%6HR zMOO_^^VL{V`_E4dkO#3<8AX}h!}ZeD==!?g(nYCAB8lp`yto=ifu=Ev)J5mZUd1)W zm!c|maKqq>06oWRdT~PLD2#a`k>1^Og1(K^+SusL#+n=ZHR|}i&vkEisIH!b)%tUt zWI~LQU#s{KZmWuFvcK=uJz*UA&wroGkOlL};&B>c7}Ca+NTWCyHv7lF(uG;X6ni2L zmOXz_iXB{JSm1zM9W|czZf75l2u&S+$}6l0&ZQgA6kViImFqi4DSVxJ>yw~IcEhhB z2h2ErJdVY1Mwk2xb;lPZX4;>T&kNsrTnbiUcx=1q19`9FN%a-R_}Vml`ka2Q{K69W z5>VfO!Y^*R{JiNej(Z-8jH`<^eN*M5#%Yi(bwAQI7N~u|qzy`G@#a>209Vizs%GPT`Z7`!8neO5 z#|dAoudnQhe)?3DTj>jbLXxLnRYh1y0R~DojND&B%LeUV6XI3-h`6%jcWzM4mX+z* zKCnqa(}ut-t!hgusMv7i8_}_OW26q6j_q?$v9+4_Ma9-?u3f_>v=>svhI_wA$CgBA zs4l`>QAO>VcYBI8bOOb&{*jr6@8*_)X#kx*<@Ya7+tV$Ih^wdOCUT60|J zy)Rq2cF&Yxx{P-nE!Y}8-V6kpld00+o_Q`x+O;L4hPC`|T9N4S(jPaIjYl$l=AQR8 zWGKcOVf?}cwSJ%>mY+)^?*LS5RP6^yOtc%?xFvrWg2 z18I+#Vsbrfjx_~WbEPuWVzJI zZ`b^gW0rnFIQ9DABIl@lvA4IkqrP);e1vEKm;swAliRBXFGexmd9`HS8N?s+D?co; zRX9VrVNE0=XkVlM`~bNIA(k23Ub!eb!TjTs8E(?-!h3izVf;qR4vu^eR$azCOXQSE z*>%JfO66&K5n!qv$KvYB470A5wzG6d)b_%d`e(GQ-81Io&g00r7%l=}vcwdHCRX-$ zSElQw1Lx&05bWLzVsCdaID!eZWFpi3v>s|h`Wn0&_Xv+^WUVcz7IN7C@S)=r8oXGqXQ9Q*O)R7|y zv=$qToRnXC;w%2eB-)1Roe#8|0jKj|r_)wh=I90nB_88*jmc{7;KxaH#?C{d2X>Go z^L4SPOQDTm&uUDgQY57(!K~4$CuI}xo}?qt%UdmQ9whC-cY(9!JrAD0c>cR*FTOkR zp1%0z#q<2d^T)4$c=77D-pS)v-ya`p5zr^UJ9+*1nFcin^(q}R^)325XKQ+~D{V?| z^%!`Vb2jx{juL`w%hf$I4!LC z{Zr0wKUo@4ka`{C0v#d!VV~Iadd3l8^B} zEY7F7aGqut=S+ixY_%ym$DTh)cNc4#;!r}Wu7aM?fmdd0d$6PD-dyv5Ld&BBk`|xN zlI)Dd298#XQkL3A{y|kUeX*MH4poE|G<@ZOt{Sq^OqYq0t&gB)AMrDy)QKh`*B7I_J;W49(9-lG9;3uKxPqii8FCd2L z2&>c>Rm?)c??7%m0m5(1-+;*%Nw7~v%d=yn6ZmE1{Xh+?t~ z!*l8cI%~OmEGO4Jdv$QD;+&w5kQ!pHao3cr@Fp=wCVQ2R*g=LxU&&1O3lgfny*f=e zOSUd2ILH#CdM`Y&pFBFq(xbep|^vLmvleDnuH7X)U^?!x+3*I(0v58 zB`DGSYoay~nMGNFvFN6Bdd;?tu> z{_cbW3$&ZFTJ^d~#?*q8$+p)#n_?HEN7e$1%Yb}lB6?7<>6e5l_!un+F?zI9GwC zg~FnAx18iX=TfkoxSd~RgxaX^#koqPf^cUkq4f7crGdYX*ivsgW|XL^Xa*;Gl`A3(e~0U|zs0ZY3%wZ(@b0UV&^ za$m6fIEQybU$$Yz#^gMjFW_@&-CCk|L-jVRH7_?xQ;qWM>YIb7r8rR5zoq)0u+ebY zuXpKt@YC8~Y_#lfJ#8|eteqqSM7xb~<(RpvKFt1cbNAg>buh7uxAWNtk=(Qh4P+m7X&lfNrs^Kr5w>OVSm1hZ}|mk=i8^=cbr4N969~DDC6U`?vUR&F|r^3K)IEy zB8&A`x2A$x-X3OZKdzs(b&*2jR#$p z;n$ZZud!yixOYC5xsdTPi`Qp7co1>nzJChu=bZBBaB+Z2J)$P1CY>eJHO@ud-Sy@w zYsR{=$+2MQvyS>D7#i1$FVmiP3`1n894AAKHNMw%I>rrt8AVRP!CCgfT1`q(1`4t< zCJUXwHAP(9UxTkYUfnYpZ%_C9lJ(cqaKvfu5uSe-bRS^glX(av1Rm7?xsIYotW-e8 z%78XtEm|HYHrN`Tc?n#F4ru6Ir85tbnx~U+lE{1rma4`FgvpXvGH+>N;p)^0}FAwV$ zg0^phzTinpX&RDqNeOad`{qt{JG6;FChsWj{kAnc)qMAsRR6HtCb+7~W}{+RP64t} zv0U@&xKXiGxY|1KW}{-+s9122jf!QXV!2xti_ox?Gt!NU<;~rwSo}F&!}coEY?p95 zt~$UPRXp>wE4QlNAwRaY>vfc}0WO@3+t_6Un{q$_H^5bg3^X@hj_47_(~Xqa=;XoF<``5K~IQ4q<~Cn@!tJJk=-w!)d+=!aI< z4`qwIx2x!fsyoo%VTiy+iM5Q1X`{rt=H+~&#Hye?aNx~GiM3H;;UF6&)<%hSw@R#y zpU_5$HD`buP+}Q6q+8KmafD;Z2aZG!PxyI1$UKz+!^7+W5SGpF#^E5$#BMFA*J2q% zjX{24&SU~WIj)CU01f@Y?ydj~3dxj1w3T`30FJXeG34&9KBh`#7?Cyyv`gwc2ifkf zow^__e#eK}7!ei#65+@>|l*5FQe9CgLg^H5-)guOjdZXFv_Eq(W-s0jB zN;#sfY94y;t|YNoL2{JlC4{iPiV@7OutvtAjg4X_qKZvsclAA{)iObiiB(O7@7>RT z@ef&EW`y^@WRUQ2!p{LlroqO%AE%dN@OBDG!-j!u{M}du?UFy>9#KX7R9^H4v}99& zntvzdfDK0GzCke@{*k%Zxdd*`!%#Yy%b{lmz@0;!-zgITYQ-8b;!+O<@}n9DDXo)@xB`;933G!PM#b@h-22P>*T0V@yh6k zS`hp+0gXO#TjKw^GgTbo-z1E$Fb7sTcpB8?fJsORMN@9riIJYeDC=S$>spB@ctbXf>#rK>zfs@)QhJ8LP@|+DrcRLI#6@HeDh#| zA!CVYRN)6@g!Y?B5|?p@`Q^gyf3G8&H0EG@q>MXIf2-}XoI!}#E3pOWyWt6I zW}KY>wLHqCq}o5(yZTRhl*;H)bs^IDX`5M^Sv z1tZiW96&0P2;Ap00AtTHt)kD;OwCiQM`o-=1}sR20|OLLza1w-J|zbFZjg2OlKLuL z{@&i6JBFlgWs)r4tQX)aul$%TulhWfsuglEXR~+tIQA zK$G!=oV`3w4HEMMG65>ZGQbXE4b;4#06(Sg;p-R@62f9eQ2TKlU11QCnCXB`FPR8K zkn`}0-?5Ubs&UU#GJt|1RnEq&Jt@r?d)|}T1TYl3_@)sv-+&pZ;`rRPlYq!6R)TLM zt$MuY9jNrJ-Y9v`yr%~*Pxy++p)!K=9R0Dh)i&XiKp2Z#5nW_h%_u!3Q}SGt_?Arw z3@vV}A}(N%M`3uePb!az(G|*wCV7ER@G=-cs1uwa>B|_%>ZP)_8a-5>d0nimMlI$i z3lb#j#7?}M8TFwnpS9iHJ@0r3Y&9{`Azx`ntYC^4)5g%BSX83p?c~&OM2Yhnkmx7` zDT8vq4I-h)TqQ;P`RDqqQGKt2(~$OW-qa}mjvt4FS@N@Q6T z%1<=^Yg`4d+*J6|$Ev#dyLzVAP zv4SQ1m`5~4lZ8bmX-F@gc`<$iF-8@4TuzTdXP%Fj2O-@r1xi^I+Ec7C{fm9CX0|LT z*!K)^XWy%FH4z8tp)fpETY7S4GJ%P^ZU1?3OF1k(R)u+ ziYPEADWanI&2P+tpWztn;{^~I98yXiOX&}uSN@ud2i7($aKi#OEbwz>fgAqz2hQL4 z{}0oPE2)uJ4Gwa`ukj~c<@5X=xR4PG#vmTXT(cl@LLROI(1{Tg=9k=N;WaTBKwj_!frNSiZ!6KB|Ylow<%Mb`uXBO{ahm;)_z2UNR6 zWzz)PY9fs@-gcZ!IKFc!Bb`w2GNI36doF}Ci~Tq3NdN zLAgNf2ZWAKQ*Sor!(emrj3K`)`Z#pKd4V-`!Vi3$e?)g~fv>OuekBC#%M{9LAm@c& z#R}8+r2b3z;&|uiq$up(%I9WJoS6G$AAZRuLaVGce2o_mL+#w-h?Hpa z2Pw&$cJzFHx1;A}uIIYvdA>`&w&^~uzpt&MuU5p*C*=#!{G;bK&RR&B>AB4Q?tgfA z)buazh@dA8o|R#cN?{#@FpCVqs*;nu_d1>OgY%qYi(;C1Mk(dEa>(NRZZwO*eRa%` znBq4{RJza3@AK5oZQrRaw*A+IRQG8KclnlkctqS#p$gJc^b zmXDsY_l8`Za1F?PqGB(}TchD4JR+e{^=q^PE?B~TSiB>2WD4Ahl;*85ur}WG?V%uU0L*XUdb0L zcVM_xIu2~TmItXDbuE!L#?Sxs*WM!$bdXI&;7K0Eg%w3myT#v}@&}>5)R?w<-hCzQgXas%6nzcCUH^V`^0;=mlHyWYlQzHWA(8=rP z0t0kF6qzI!`9)ao?K!*uVa4?Lx@sOlGq$#0s}F|#ZaZi-_^!5kok7rR#4H#NYjKC~ zd9yzltg^LIBV}zaJooY!`cAHKTfCnfYg&uvtfeQUA86rRQMq5v?ds1NTfECRod0tU z!Wm`xD4p|agK&OWK1lt_7{ob1w>bxjMuh?DwcZ>Mnw3WAcgsh}BZ6tHxkK^gm@}Px zsCtdYQl~~gB8_1;?9`jXpx15ngH|i*2ZP>#1-(|Q-)Rj(E_C%)I3h2FPyeIO-IK9ck;#|1v9hT1nPy1g2p29Wj<GJ8w2ht68NnN;A@b-9R}RFvaOjt^(VT` zAmHX8tE);&LQQDcX&Up@gX)y7(FtZx|B8>@SyNk*Hk+j(1yt> zTnooQ>iGO2)iLGpc-zY&@NW=-L6qHbl{2*3`^k`hLp>yb-Y7B*YNF@tgVHwP8_i#B0s*Xai}W7(9??_RCMkJ!jJuVw>AbC? zaq_*&Lu78r?W2R6#Jao4b_nzmr;z#q~$ouA%JQ_>I zu%ibtA77 z24GGvQ|~-Qvj#f-LZP)HfKXdYRa}R>jv*Fs5;H2!mxFJp?+6gG$ez}jmkrr>Cj4OCM$5k?i?L_L(4t(j$e}7ns@m8g)j1e@v+#& zR3>1R`H8_1#o4$Mue2S-^ridrPSWb$q60u+)vx>r@s_AxxV|hTt$KP3h9e3 z+?5Z|56L)&MagTgWotY_n=@jc5m-!m?V@2PxSe7dmqXn-F$VVncLk#5c!tajN?5El z0O9fL6D~U@v1CpAqH+&L@}@{DwwKczx#BSIhvLW#T%Ip=Lkp&jsuasmvOJCT^DX1W^MLH=Wkl{cb4*@p#~E2j2UdzU8Hv5?->+n;7dUj&ct4#Atxc72w7d;_L%giW8hEI5o9I%s0YW1Qu-m!jRvF(&{4kqb{1+-(!*}K8~ijEpzi=jLiN^Cxwx786u zG`zFqb?#W=HJ{}5-O6c0K~{S)ioZtyID1_39(r(u9oHeRxx23-uvLpc*tZ0d;-NyM z2HMV6gOL!v<0*g69q3L{v zP-yPv2Zd&(>;P{hq&!mxchSOVAv$gmeTgC?g{TZ|`?3p8Vz;ZsXeh&k{P$qzM>L|O z!_`N4>#)#JWsiJJZ3Me2%JQgKUO%P4J9W_>Qnr+c_Rfm&wzMWlJa{n9#`i*o_SbLn zu$|?Xw{sMCr7%vzUug0WMP15G2}%Tz>5xGNu*7|Fu1Np}ig}}Af-dkwY8@{oJrGoe zusox4Ng8{)%8Ai43?UvuY_RW?L)M!$WzZUQ!%i3n&0akWTD`av^!v?TFc@~DL9gBz zw7M0+28?~r@FS504 zlCZqlBw<;G#Fr&uX;uxvdZ8=k#m!S*806nvFrI?b7HVeUM)Bf1oc%KisICByW|L$p zI3dYDBD_lFt|TEvOI=C#71U?b?F<+^zpZE~Ei*9)DL43qZjuaUQ-;M?GVdy#>E%~2 z`6M>vgBVHXjYzLAE3IW?ZT{Lyw0ivbc(uzP@b%R#GO!}O_N{{mu+vvRT)W0cA{8jM~`rg<^?UL)0uG0sw%DLi?jHILZQ z%^oozDKY1V2zM)RfC>@Iap8BhQ4;%?u6b!%xcKqULsM}fW=d6=!LcIHebE$eA;jQ>| zmSkrveopYvr@xsc^ACp_BX7T>SG!HdWAGJT(x>c8Iv(pqe+Ly@xJUZlV6kECZ||m+ zbZgunPaetZFJrY0{*twD)>^JC2&~G^*TKqHW8+re%EHT^dzRjk3)j9b2FPX^gZc{9 zh{sRZ`BP3Ps%IEn9{I<)^A4ur~I~CIhdRG2G_l}ih5G>s{JBOf~KVgxmd24Tc;JPKEXpFfPqNvH7 z0#Rx@3vLtQ9$)~cm4VbTuuur{jpnd2#}~cmumU-p$Q5G3rnAYIGtx15z{Bp#Bv!ZO zl(IqzrvkFRvAssz)tTn`tGIjQt6%5tH>g$6;)XuXJ6ceSKYwRQF|0lv=rKca;lTaXrh)U<2IM}*( zRDp;2O@jB`b4@_y>jSV)lMig17p~I3KbG+&98~s^MKgjl;lg8>z0bjdDgEgzo1(Kk zFf1CVN%2k z6WM)GMd z_d{>O*Lg%!;*%=Lg0H2_Q-D89Ieii~ktlaDgFlDqXp~;UN)lo{lIn+`>;rj&{NAg5 zUifj+_*zy!zS4YFBL;>O^TQKl5Z)t@8iMmM84c2pK3}6act(HZ!96?q$B&XMg59}t zf+jA`u2_|f~;ajLy-2<8gM{E(c5Gs>1Y z;@hvy`d~DoQ%}1^sDg`&WCB7kGD!}ABpMwJ`x=}XJH;Zs$vXitmDtF)lK&3@#Qd3@ z6%%xjcF;g8NPw#H6&66$J|}{T2FyDr1Z8nfXCVD25djYOr8a2*BSK?a?0djgW5#9F zB5q6EbACsDhVM_3#tE0hM_2j@m1$DMDbW{(er_UeMt2)=lk@EpDnY96KIR-v&Owe1 z$5Y*pc71_5t7}rPXKG!-(po_aUcno0v6|%`MK6e}srBxsiSZuDN$6rSgw3$YQ*i)<;VFABeP$k`cYpd z1I3Qdxg5u7m*9h>Uny-(ciuN|ih9ZU5hU7Gd`|4ht=+0Op&oju$89hl5yt^+IkWf> z-lDiHB%}~468Ob;<*r!p30J_!hIwt6*Kz~gI`b+en^bhZgmzX+sj=w9Y^dx_Q`uZ^ zI27?_MY_xXf0$le6|{W^iV`jzg!d&xuzeW>7c8k&94eN~DzwUwP7TZQHS=(t?`@3H z9FkT-F4suu^r(zsbI@L9yfx1YY+v)UexRM!g{mOsjYBml*J1lyP}f3 z-{@zmG#cZaFI+-y>-t)xg0gMlATb+Z)yWAy^OxI-P2|)42|D=#BA<-Y)oiw!ogP0} ztW)cAmegnjgBFW}D305;LAM+CTQ?o^RPmgxcw9E&QH~Kl8%+H?!lO*{Z5|r635oiH z35ohLgzP(YEd9buX)jg>*)n`J&5PleTJ`R6Ek(;0;m@tM?53P+Kbs=Y*YT;XP=z}s znvYMjqEDvke5v^5v|q6e?b16S?3@~y?k z*Y)8QgUof}6>a8t@p`s>fvSWTR>!wBw?dsQ)4ScJDR6PFdjGzZ0lz`-Q`@KWR&0V$ zFI%C+QZA(5S{_n-Bzc?RBJ?zTPd-kQbY$f6&fOuy@m21YDJ+fF#mKlt=pJ4Lucrgy zmHGm)4LlIhKUHK-Cuc{Gp*w*D)Z1nsq3|;ApJoh>&lIoi03tdEoE&|Nmi`@4t@fOS zRNnRqrzi%soVn;5mLu%EX$e={V=M(dkq)`w37Vn{8^0Lo-idhaN~L!g-P~|&HLAit z+@?G8tP=6E#nQLyHIXzry+Pb;cYn{KQOcd5Jm(yR=9*6!C^jeZdKSQxZwQ6u2Tq8>C_jZV~UMEyp* z$`M({%5am1Wn*J-jPTju>7Cjb>Q!wFFFruP7P|zY)Q)D5Qh&B3Mc0k#;5JMLmZ#^f zm=5l*@VPM^Y)l7>ZVwyN!Nzp3F&*5_=4?y{8`Ht(Z#uZ6+#GNzSY)+uhyOI*D2?rs z7K2=QPcN3z@Twc+5?Wr6JP(d6*;XmHL97RmUfrJg;`JmPXMkq8KUAbkr`UWcvj%GV z`KP4Z4;4^{Lk3%)af#LS5%Shjkic4|W4aGHZvpk&3ix`(A_jr^Twovby@tGfCF^l3 zHxU7jf(8lF{koErdiN{OeY!Uj%QNFL560>E>O7qpzWsS9(;?cYIIn>J0!LoMS9Uz$ zRB)u{)fFZaC6yNzw_c5k*9??V!+VE?bF^N{U5re+NEk<_32EN&HZy|Pg z2AKL*o`g3}!v2nC{*GuKZ+m49s3%7<-zIOg4e;%efXd?wrGXN;l+F)~m#Do6Df7i|2Bfo|(E;ZhuY{X7d` z4TFlU|W? zmkUsQSNqxeieO%d9bcSIhL1AQKt`AgA60~cXx{b@9ruA zl>@2$8q!=mjqH)vjXs}ji3x%JThxOrfZ?Tho0YCT#_{#|ZDWd86+_!kKVLC&?jdI% z0cDbzLbq@F3uU4TIXLDFAXgkY&}48L**Vp%oJ})Gzy$qLEjh`acf|Ojpifd>+tU70 zl%vBrU%P?jFm(Jf+w;CnFTwrC=YPq!30WY(ktYj>*2u=(f0xb>`sj>B?`4*#>N_F# zP;B8D-|7M5TOG!*vDO}`$(R^PYyFbXVsdiEMx#gGfB1$?1DmEpws&}baFh$I{LvqI zKmGFEo&`rRO5QIqjZgnUUy`L0SHVUH!%=$qFyF3+AtY}LLOID`0?7YIaE$h$BVi6? zwd&(Sx)WL*z#yI)#KS>gSuG62+*aBYP8cCvCU8OHkvfIJh0pgPUspvoz-f+1uwj9l zu+wmYsGIi=IeP-(C!!{BEjJKyj~K|^yNKC{mEE+n*f4Al``uPQh&#jozrAZ~ZW~w9 z@2Beg2OQ5-*>Z`x$GO_O8ao%Ci4$+^%+%CODn(J0%@a!0l2Q`SZ1!!R_kC+0_Gj$B z+P|>f4S)nmKqMvkl8khwd?FEOHX4ma<7=St!0L7PMwaciT9z}gyRE(Z?e4&KIM-#~ z61PK4&NPp#zFRD_v-A#nP=%2nlZ(Zh^afMGJvpFP?Dg<()_r>OQ}JH2l;ad{G80v^ zV6LQyNUrRrQu{U#FF!>6`z-WtD8zSy^&af?TC}~ZzE*!q-3im~J#2T}2VHBgWw))K z-Dz8Pw>PlvwOYg8-d@Mv+uK`0WnTryryxxbuERaHM0eM{*@gFoeoxAI$iHd#VEn?> zF4@^)BvF5cuQn2T6(o;R8)xuOT$LqTJj!?c?QRCi97SB@IbviwxWIh0^BH*Jv?+u3 zWT2PCN68~~;*xnu<+q&cASSIzfRjs@s8W_;0eW_CV=;QC5e{iZB~no@3Z$38LUJq6 z(4G3AM(;)W%-2lrCrx0?%Ur`$Ct1*+ZjEPgf)P%it;1LQ@l$H5{1-iamwqM~POfFb z%s~N$x>)7AneH&^!02|P@3C=>qyzWa_moPwp-xtYS+lJ|1!*w&5B}r}7ph7n-<9nK ztgFBU1iMei1=5sS4f-Gc6NAeYYmeabsQ3>T2;N}yM`r%{QiRU5tApdL**swFjv;4S zmK^SiY4@rW-m4D!w6&;@s9)&vw6)dZ5E!{t`*;V2u4<~7h%I+JBqu&GzL*c0#>8GLiYVDKwvx?P4l=HOSq=l>+k$NNRw;n91Z~KdJw)oZK%Q9{K7&c!V&( zI?_Nu6o@hnk#zS}24Iyvg(;UW5YuzSsl5D;?WA7W=nscjg$%Go9h`oC3Z1I~A|+cO z!?FDVCJt9g$9H@RQ$VWa+G4T<&)LU^K%FL&lvc*Khh+P>p6a2LZ=Vp1ef#1(eYdzf zp=gUheZlEOWtmy!P~+li$znWlmi~qNTlM93CEOr@dRGA9ej0Jn#|hQ~_iC7N5`33D z@(lcg5H0xlxgbD;{j5h;4M^c9SlS@$X>%k@MUqoE=GTedt_a@pzZ<;rn(#`_;GY$> zY(Knb@9o)b>%MJwtlqu7o;4VD2Ue%sZS@`w_eSkjdkF|=gIa#GsO1{H7!`}`xuf>5 z13GB8yCbVN81}4(?%tl&89ubz_w3;V`~EU#t&6Zo%*Gsg)0w1*Hp*m^a&Q!%b~R|` zR}WI&F7%ke^ES}qSA$5EGj}VZO)G&-w~RF{-U)<+jT?b(409@+%*umOD`8U0LsGYn zNUa5sGT~92rgC0H!BOyhP)rewYUI90Yq{v+1X;UQ`?dX!pc+>D+ddzNAeaQk=Vw2b zr`~!efg%pxTWR{s&?8`ph}Bml)?PDnLX@>y?JJOAd>~3us*IgnsHo|(S*0(Jm#zaY zT@@|efTimIOO;i1A!ND`4s#>|W!P^z%m8Hkof{A~55lf~CM-S&l^l)A9_6?#)YJ?b z-4rxx!kii+{Td>DnG|e^ZfBPtMq=t(hOX3Izy|tQu#A~9#X+r8YP_-STzV6iFi~&f z%{*8g;DxIQkh6%}vt$czzVRYy9VO#KCM2$^f~q@br~Q-WPhL2Wnx{}2UU<=fPYqix z??x5Z+`4g+zBK%LE{eneaYWlrv29R+TLNAH8_RDF9$aAt4KPY$SHbzxnLmz4v_`ZC zQQ%`15pg?m4y_)zj*U6;h*&_Cz`RYTzQhxUfh#cF`IN>(+8EWDM|}_C4<;9MwQ5QM z{P-qiSZvySUU0=#u_#>VH&B0&U8-jyX$twGvB8d#Y1stMqDZ9aC z3vk(iGwAf}R@-{m>474ST*n%8Tej8e3|jXdbe)0o;QkVdScJ>|x%Y@};McP7YjVxr z28G?Au%%JhySw49aK_qzueS=mvJBA;xU~Vd)&*`E@rwL{ogE@PGz5nlu?*Tf zH)C1$2(uvk2eBQP^Woo-hp|gG27_SZEN|Lp$0#i&vn3oP(_P|i2(}-(_V9{b+CXVE z2in+}F!0UL28Znkt4X*F6(Q0|3FIu6q6A!gco(4{*jV`TA$lZT)gNHc4AIv-4-)Tn z2rCq4cETH&JWz|Nf1g1^Df_RwZB4wP@&>f6YmXe~ftnjx9i*7JgG+<5Zl-cB3`5HrcQ!7Oa-Ls@ z7cV@RZbIi0M#AyM1hk$SvcNx*l(_3zrlclpc{W31wb(7jB3b7Uf1F3;(o#apg4)8Z z6~2UA=ajA1R-9pl1g5!M6uFf&uq>62|3Q?FyeKA>%W!!H5<3ry)(coBqWU?jTNInl6xUNd35Eq~6RRf{%?>0(ddr*_8IP9Ok5pYu(m{rM5=(lQ zci1u1C!}mI?W|=T4xI;74z~L4yYJZFK^7Q1I*|dW%p@Y7i^us%WHBhVyPKoW^X8y| zlmRkyLkJ=Wxf@E}SM1>7Hg|A#F#mkS17YHI;#R6C6+DaBN0e{ubEU&wk{K>Iko4Ri zVl*vu(Hju4NF_B4Xean6(F}ub7#eej4cQQ8&tWcCXe3#BRE`>~??(YPXvpE&IzoEE z#FaH|2Q-U1FIzM1*12&EEfYEm-HW+zhyIn|{L^K?eZ*(zBlbCY=}&?%rLW(QbnNoi z_4VfpQV8an+_Zo2E&=^l{#n&I`+Hn7@0aCHUtA~S7Fa>Y9m2AyvV*C#At93GeXT7J zy>5{vTX?qvHb(nv)yAX;i6ByMCFt z)4~gOI4Fr}n zJESEY(TzL065|_pbZK|=Zn>a|t+*v;^kne)=!Zln?w~_z+ToCuAWM$)T(2*y-8irY zKd+=~mMy(Lpsu7Bb~CQjn!&Z)cze!oKDZIbi3jf4Q7}eytUsRxqu`Sr4l`+;Ew(GC zZQSk5bA@2(XF-U?<+`P^19d!NySsTpySub?o2NLzU4A_GgxDoNByQ_`|9k94y`Il} z5CZur#Gp(zGQ*Ah0nXqKzs_akhUh~HugnW2Du}LEyb(Nh%;;q)=YTfj}DzQ z(yp)UTOHN)RMoWN6@u!7v=)DAT{2iyEpkO zy>d&_K9>*|&>fuf%TC;4li#B0Qa4#AV9KJJTsm04VE|J!qYFq9rj;j`FD#&`nb@Lj z*i9KT%S-Q)z~jwn_)T5_xOit?=H<0oUB9_;RX+b_=JUV)=l}lqKbK-PMdrW%V;LH? zWgR8iFuK0=F1bkc)zPM99IH}6LY{;U285gxlgXN=efZrq>pZf9vRE+K}}n* zBy6**4z2iRKn_xJcoAy>pCd;hCQoQnvYyO;HIQ;*dRJc$aLFgE8fPYWU}` zK8lC??X5i9G$xPr?$%C2M!$+Q*Y@ZTthvxjsMV zI^c1*veQGk86a8wWvm3>p}9+BCIKGe68m=2g~eKNmsWz*MiIBR)2XTt2r z3ueEnd8k)m9!f9p#dI&1^*3{+YjTpqutU>$vnm~c8->C6+#OGSuzbfu!Nmkx?fTY< z6u&gPlF}QB9S|emN6sZIN2#Km3@<>v<^!4oV-n4Na-!Qh7F}rl3|)wTM${bm!2l-8 z2*lCkB&mP#VS~@;UtnxZw(5WV3(I`u+_CkDZNZeGEy5M+c!*_w{Rm>kAs6jz$2#=J zl|{B|@3bUb72NqKI!?5X!tB9u<6)3I7@{BO#`KAI}1I3yj=5=@|zoK{q%v|X!jCw>62iVF%dqQ?@)!yb{{M*mnN`YmWNh-Buu5%8CjAQVvY3t|iY`436@ zNB3&KK#3pIh33yZ-^Ee5-~Syf-1{@py^ZMO#bc(B-zW4$whiHmp*uva=Aec$&nNJ| z3co~@s3N|Zm_Q?toX_vt0>1E?V#9#NNEV6@4@$(uo%pU|a916Fjt6{zC*Qr`@2j(r z(^g}Z^`t(fbb!g7d1JH{HoRS4N-Z|>^JKs(`H350doTEb9*`g2Y;O<8-UK`!;1!Q} zU~&Y0U|k?ivPJB-hvEG{cX%JCRaRY?8NloQ5hzl~=xA2XVC6Qxt5 zK!RtfcQaviaS}z(1g~^2QIV|SV@y54Uxl1>zjB z^L5|L%7?Oqkp|uug4N|nDl+Rj7KMQ`zJuFyy~$8mIK%8D1~DmSaZ$%u$#04UFc37& zMDHWP2%mxSb+dB`QR6FFVVM%alWF zfaNrP2ibA{*OJz}=|#~T`lV!RhKhMGHi`SC)B{`nS4Rd$VJN~x>e*20S6u;(V<122 z;r8_GIK2dZfA~`WPO2+){79HbP1EtCYd(I;Gi6DxUQeX@9|pcpcD5vcv0c7?Ci^&7 z^)X)mGPrp95ogbJF{%6cokroZKV|(!^{Y}}6$03B=L1YmKQ1t2vdm9$EQCeaP ztOIvmO7aNJVUM*_(%3@hRIUqh9Z4)(vPiljxBk)VN!n&_{Ysb=vYxCMcf#bK+hrvM z>mtJvt5#MP576H_}ID`LRrZnJAW>WF@wsPVxMg#u!xK!bP;TVdET6b3T6-H4!rB z`qYG8^nrtmQsBkz@Q(&ah2HNhHe_dD~6gf%MRC=Kvk@OgoQg_?Frux zk*tHc-s2kI{R}e3B`>Z-*-yu($%a_m@DW53qEBCdgF9Jp#hD!N_xLgVv8+w|RU6vX zOJ)*MUkb|aP3OLCT-@>95-98u=DpGtA+Qq(Yki_9i9NuAAC~(#;_*V&ofJM zZH;S5q2uT*PDHT3&nQY8KYSax;p-4LJYj75-`VyrV6@b_*tWQqwn4=0v(SbApE$(! z>3O$xVlI0M-gYqL1=}yQ}dKVWU z8)XUcJal2ehUd^F+82l_=a=x7%fLtSEiEH-27(m)BWMk>qNNv#{BJ4WR%3|x$KYzC z`Q$ZMa<#W&5Xba>Dn&#L?zhI%*81e{w6ev+u8#5LFjA6HtZ&2CDVoFx45y^wJqygsfTn_sgw9l~o zGpVKa-R0!>B8Ut~&h-cnPgjs2%FF987*Fvo;9HkfpYL6~NpYQd8sA1Ky^LlV>6K@T zzvB7)ZgRJTj+Nu>+tss*;yScp?pf1-%>S4xw+V%cP-wg~#)XwR9;z6Id!6SSm7#>emgQFX zkN2mK0(3INkbSdJfP71-{A%f z9z4NszCE8{BPri6i=Yv_x;K$u#jEItc8kHtn$IxHuQzr_pMeDCs}h%}5ZAtt z8;V=={1lZlic6iwx+=;_6ij}l6}X0uiew;L%2(cse*~Zry9d;i>>{cO*iOCRQkoo&e%cvIUojGTRsMH}gs z?z8V{e`>=4y_w)Vf`U%oBs&iWPKmC=5AtsAymX18?!!-}3+X4d8`BgQbfi)qn{yg^ z6UUqK7AwyJj?%q7K2m;+`X>Tk%9N()ndm=|am=jXQ5_>W8CtqA@c}Re&-z3e!@RaQ zgo96yTz_Umvr3WD*FK)08-N|CdAXINtTtd4_`&32Cni;62m6X?pI(o6Q!5tt;)F3GElCA zHz82`+)Y{G`zp%HHAarBbYuRsW62OU?%aaRjS=9*D4AepOQ(c;OP z*BFqLfwP3oD)Go=LlWk&+s8#(xX7GWQ09z|t!DMNrt^XCMVD@PlqRb+Y^pEtVm2mo z{A7CYgr|2rz)Yr(o;1Zb_QV|@oD;}5wy*F2MVw(Pfv@M*$r z;cr_9^o{Yamn zOhU<-Oo_vzR2cb-8Zp08hC?*QeUV_%mXj+(^(S|V=P1oJcjD~4+dOGJY$kmoS?6j?4IoA92W z`45axO0FJG4EfcSG#w{riH@Dbk#eOTibFJ|39MIafIG3~k+vB~n>WIdXTU8mwf{7; z2hsjC_yiW~()E34%i%o23+<^9iOfHGHbc0W9m?wL&C|1U);~SYv)l~)w3>^W5@}Y9 zOsCFdp;J4ANmYH=O&-ca!Rq5)@>ovk{NfLlelp}t){6usO&AE^B?^|`R%#D|`Aiv^ z($6EM{Wr5gOp%PO;xKS@EGlG_aklBkCDW_fr7eUm_XaD(a>ytN}T>}04_okoWEiPJ(`0GJQ-_h)un%1%l zs_2)31xvuSE&Zx5`BLi&{SvQeX;*$pmwK6D30JgqD_XLxzEn$bxhT=d;shfL5{u-K zE`1)0daj&Vi&N>74hv2Q8&&`*8p3&Pr@Ih8#lYQlHOH{ksX}u)t2BqtOqJR(r7BDI z2d})2j#!=ZYNAhZe#upQ5F;Rre@lPq>c;toA?36=A zM|?jw4}i5hRws3cY%9j-wleOE;sz!^t9wRdGFF|(Br>6AX~GjF1#PNjYE$GtlQyj@ zGFQA`pI*+Jxdp4W>3qg_ivRU5@ZbLfP)h*<6aW+e000O8*-aQ%U&n9(Fbx0zi!=ZL z7XSbN000000RSKX00000003ihWnpw>RcSwaQd0Q<0ROHB01*HH000000096X0001G4FCXbVQFquWo>Y5VRU6KYIARH ZP)h{{000000ssO4ga7~l<^}-(003Ja#l!#r literal 0 HcmV?d00001 diff --git a/Solutions/Microsoft Exchange Security - Exchange On-Premises/Package/createUiDefinition.json b/Solutions/Microsoft Exchange Security - Exchange On-Premises/Package/createUiDefinition.json index b218ff8f728..bc03e9a0edb 100644 --- a/Solutions/Microsoft Exchange Security - Exchange On-Premises/Package/createUiDefinition.json +++ b/Solutions/Microsoft Exchange Security - Exchange On-Premises/Package/createUiDefinition.json @@ -6,7 +6,7 @@ "config": { "isWizard": false, "basics": { - "description": "\n\n**Note:** _There may be [known issues](https://aka.ms/sentinelsolutionsknownissues) pertaining to this Solution, please refer to them before installing._\n\nThe Microsoft Exchange Security Audit and Configuration Insights solution analyzes Exchange on-premises configuration and logs from a security lens to provide insights and alerts.\n\n**Underlying Microsoft Technologies used:**\n\nThis solution takes a dependency on the following technologies, and some of these dependencies either may be in [Preview](https://azure.microsoft.com/support/legal/preview-supplemental-terms/) state or might result in additional ingestion or operational costs:\n\na. [Windows Event logs collection, including MS Exchange Management Event logs](https://learn.microsoft.com/azure/azure-monitor/agents/data-sources-windows-events)\n\nb. [Custom logs ingestion via Data Collector REST API](https://learn.microsoft.com/en-us/azure/azure-monitor/logs/data-collector-api?tabs=powershell)\n\n**Data Connectors:** 2, **Parsers:** 3, **Workbooks:** 4, **Analytic Rules:** 2\n\n[Learn more about Microsoft Sentinel](https://aka.ms/azuresentinel) | [Learn more about Solutions](https://aka.ms/azuresentinelsolutionsdoc)", + "description": "\n\n**Note:** _There may be [known issues](https://aka.ms/sentinelsolutionsknownissues) pertaining to this Solution, please refer to them before installing._\n\nThe Exchange Security Audit and Configuration Insight solution analyze Exchange On-Premises configuration and logs from a security lens to provide insights and alerts.\n\n**Underlying Microsoft Technologies used:**\n\nThis solution takes a dependency on the following technologies, and some of these dependencies either may be in [Preview](https://azure.microsoft.com/support/legal/preview-supplemental-terms/) state or might result in additional ingestion or operational costs:\n\na. [Windows Event logs collection, including MS Exchange Management Event logs](https://learn.microsoft.com/azure/azure-monitor/agents/data-sources-windows-events)\n\nb. [Custom logs ingestion via Data Collector REST API](https://learn.microsoft.com/en-us/azure/azure-monitor/logs/data-collector-api?tabs=powershell)\n\n**Data Connectors:** 2, **Parsers:** 3, **Workbooks:** 4, **Analytic Rules:** 2\n\n[Learn more about Microsoft Sentinel](https://aka.ms/azuresentinel) | [Learn more about Solutions](https://aka.ms/azuresentinelsolutionsdoc)", "subscription": { "resourceProviders": [ "Microsoft.OperationsManagement/solutions", @@ -103,7 +103,7 @@ "type": "Microsoft.Common.Section", "label": "Parsers", "elements": [ - { + { "name": "dataconnectors-parser-text", "type": "Microsoft.Common.TextBlock", "options": { @@ -159,7 +159,7 @@ "name": "workbook1-text", "type": "Microsoft.Common.TextBlock", "options": { - "text": "This Workbook, dedicated to on-premises environments is built to have a simple view of non-standard RBAC delegations on an on-premises Exchange environment. This Workbook allow you to go deep dive on custom delegation and roles and also members of each delegation, including the nested level and the group imbrication on your environment. Required Data Connector: Exchange Security Insights On-Premises Collector" + "text": "This Workbook, dedicated to On-Premises environments is built to have a simple view of non-standard RBAC delegations on an On-Premises Exchange environment. This Workbook allow you to go deep dive on custom delegation and roles and also members of each delegation, including the nested level and the group imbrication on your environment." } } ] @@ -173,7 +173,7 @@ "name": "workbook2-text", "type": "Microsoft.Common.TextBlock", "options": { - "text": "This workbook is dedicated to On-Premises Exchange organizations. It uses the MSExchange Management event logs to give you a simple way to view administrators’ activities in your Exchange environment with Cmdlets usage statistics and multiple pivots to understand who and/or what is affected to modifications on your environment. Required Data Connector: Exchange Audit Event logs via Legacy Agent" + "text": "This workbook is dedicated to On-Premises Exchange organizations. It uses the MSExchange Management event logs to give you a simple way to view administrators’ activities in your Exchange environment with Cmdlets usage statistics and multiple pivots to understand who and/or what is affected to modifications on your environment." } } ] @@ -187,7 +187,7 @@ "name": "workbook3-text", "type": "Microsoft.Common.TextBlock", "options": { - "text": "This Workbook is dedicated to On-Premises Exchange organizations. It uses the MSExchange Management event logs and Microsoft Exchange Security configuration collected by data connectors. It helps to track admin actions, especially on VIP Users and/or on Sensitive Cmdlets. This workbook allows also to list Exchange Services changes, local account activities and local logon on Exchange Servers. Required Data Connector: Exchange Audit Event logs via Legacy Agent" + "text": "This Workbook is dedicated to On-Premises Exchange organizations. It uses the MSExchange Management event logs and Microsoft Exchange Security configuration collected by data connectors. It helps to track admin actions, especially on VIP Users and/or on Sensitive Cmdlets. This workbook allows also to list Exchange Services changes, local account activities and local logon on Exchange Servers." } } ] @@ -201,7 +201,7 @@ "name": "workbook4-text", "type": "Microsoft.Common.TextBlock", "options": { - "text": "This Workbook is dedicated to On-Premises Exchange organizations. It displays and highlights current Security configuration on various Exchange components including delegations, rights on databases, Exchange and most important AD Groups with members including nested groups, local administrators of servers. This workbook helps also to understand the transport configuration and the linked security risks. Required Data Connector: Exchange Security Insights On-Premises Collector" + "text": "This Workbook is dedicated to On-Premises Exchange organizations. It displays and highlights current Security configuration on various Exchange components including delegations, rights on databases, Exchange and most important AD Groups with members including nested groups, local administrators of servers. This workbook helps also to understand the transport configuration and the linked security risks." } } ] diff --git a/Solutions/Microsoft Exchange Security - Exchange On-Premises/Package/mainTemplate.json b/Solutions/Microsoft Exchange Security - Exchange On-Premises/Package/mainTemplate.json index 7be8d76dde3..ba8c1a898e2 100644 --- a/Solutions/Microsoft Exchange Security - Exchange On-Premises/Package/mainTemplate.json +++ b/Solutions/Microsoft Exchange Security - Exchange On-Premises/Package/mainTemplate.json @@ -62,111 +62,107 @@ } }, "variables": { - "solutionId": "microsoftsentinelcommunity.azure-sentinel-solution-exchangesecurityinsights", - "_solutionId": "[variables('solutionId')]", "email": "support@microsoft.com", "_email": "[variables('email')]", - "workspaceResourceId": "[resourceId('microsoft.OperationalInsights/Workspaces', parameters('workspace'))]", + "_solutionName": "Microsoft Exchange Security - Exchange On-Premises", + "_solutionVersion": "3.0.0", + "solutionId": "microsoftsentinelcommunity.azure-sentinel-solution-exchangesecurityinsights", + "_solutionId": "[variables('solutionId')]", "uiConfigId1": "ESI-ExchangeAdminAuditLogEvents", "_uiConfigId1": "[variables('uiConfigId1')]", "dataConnectorContentId1": "ESI-ExchangeAdminAuditLogEvents", "_dataConnectorContentId1": "[variables('dataConnectorContentId1')]", "dataConnectorId1": "[extensionResourceId(resourceId('Microsoft.OperationalInsights/workspaces', parameters('workspace')), 'Microsoft.SecurityInsights/dataConnectors', variables('_dataConnectorContentId1'))]", "_dataConnectorId1": "[variables('dataConnectorId1')]", - "dataConnectorTemplateSpecName1": "[concat(parameters('workspace'),'-dc-',uniquestring(variables('_dataConnectorContentId1')))]", - "dataConnectorVersion1": "2.0.1", + "dataConnectorTemplateSpecName1": "[concat(parameters('workspace'),'/Microsoft.SecurityInsights/',concat(parameters('workspace'),'-dc-',uniquestring(variables('_dataConnectorContentId1'))))]", + "dataConnectorVersion1": "2.0.0", + "_dataConnectorcontentProductId1": "[concat(take(variables('_solutionId'),50),'-','dc','-', uniqueString(concat(variables('_solutionId'),'-','DataConnector','-',variables('_dataConnectorContentId1'),'-', variables('dataConnectorVersion1'))))]", "uiConfigId2": "ESI-ExchangeOnPremisesCollector", "_uiConfigId2": "[variables('uiConfigId2')]", "dataConnectorContentId2": "ESI-ExchangeOnPremisesCollector", "_dataConnectorContentId2": "[variables('dataConnectorContentId2')]", "dataConnectorId2": "[extensionResourceId(resourceId('Microsoft.OperationalInsights/workspaces', parameters('workspace')), 'Microsoft.SecurityInsights/dataConnectors', variables('_dataConnectorContentId2'))]", "_dataConnectorId2": "[variables('dataConnectorId2')]", - "dataConnectorTemplateSpecName2": "[concat(parameters('workspace'),'-dc-',uniquestring(variables('_dataConnectorContentId2')))]", + "dataConnectorTemplateSpecName2": "[concat(parameters('workspace'),'/Microsoft.SecurityInsights/',concat(parameters('workspace'),'-dc-',uniquestring(variables('_dataConnectorContentId2'))))]", "dataConnectorVersion2": "1.1.0", - "parserVersion1": "1.0.0", - "parserContentId1": "ExchangeAdminAuditLogs-Parser", - "_parserContentId1": "[variables('parserContentId1')]", + "_dataConnectorcontentProductId2": "[concat(take(variables('_solutionId'),50),'-','dc','-', uniqueString(concat(variables('_solutionId'),'-','DataConnector','-',variables('_dataConnectorContentId2'),'-', variables('dataConnectorVersion2'))))]", "parserName1": "ExchangeAdminAuditLogs", "_parserName1": "[concat(parameters('workspace'),'/',variables('parserName1'))]", "parserId1": "[resourceId('Microsoft.OperationalInsights/workspaces/savedSearches', parameters('workspace'), variables('parserName1'))]", "_parserId1": "[variables('parserId1')]", - "parserTemplateSpecName1": "[concat(parameters('workspace'),'-pr-',uniquestring(variables('_parserContentId1')))]", - "parserVersion2": "1.0.0", - "parserContentId2": "ExchangeConfiguration-Parser", - "_parserContentId2": "[variables('parserContentId2')]", + "parserTemplateSpecName1": "[concat(parameters('workspace'),'/Microsoft.SecurityInsights/',concat(parameters('workspace'),'-pr-',uniquestring(variables('_parserContentId1'))))]", + "parserVersion1": "1.0.0", + "parserContentId1": "ExchangeAdminAuditLogs-Parser", + "_parserContentId1": "[variables('parserContentId1')]", + "_parsercontentProductId1": "[concat(take(variables('_solutionId'),50),'-','pr','-', uniqueString(concat(variables('_solutionId'),'-','Parser','-',variables('_parserContentId1'),'-', variables('parserVersion1'))))]", "parserName2": "ExchangeConfiguration", "_parserName2": "[concat(parameters('workspace'),'/',variables('parserName2'))]", "parserId2": "[resourceId('Microsoft.OperationalInsights/workspaces/savedSearches', parameters('workspace'), variables('parserName2'))]", "_parserId2": "[variables('parserId2')]", - "parserTemplateSpecName2": "[concat(parameters('workspace'),'-pr-',uniquestring(variables('_parserContentId2')))]", - "parserVersion3": "1.0.0", - "parserContentId3": "ExchangeEnvironmentList-Parser", - "_parserContentId3": "[variables('parserContentId3')]", + "parserTemplateSpecName2": "[concat(parameters('workspace'),'/Microsoft.SecurityInsights/',concat(parameters('workspace'),'-pr-',uniquestring(variables('_parserContentId2'))))]", + "parserVersion2": "1.0.0", + "parserContentId2": "ExchangeConfiguration-Parser", + "_parserContentId2": "[variables('parserContentId2')]", + "_parsercontentProductId2": "[concat(take(variables('_solutionId'),50),'-','pr','-', uniqueString(concat(variables('_solutionId'),'-','Parser','-',variables('_parserContentId2'),'-', variables('parserVersion2'))))]", "parserName3": "ExchangeEnvironmentList", "_parserName3": "[concat(parameters('workspace'),'/',variables('parserName3'))]", "parserId3": "[resourceId('Microsoft.OperationalInsights/workspaces/savedSearches', parameters('workspace'), variables('parserName3'))]", "_parserId3": "[variables('parserId3')]", - "parserTemplateSpecName3": "[concat(parameters('workspace'),'-pr-',uniquestring(variables('_parserContentId3')))]", + "parserTemplateSpecName3": "[concat(parameters('workspace'),'/Microsoft.SecurityInsights/',concat(parameters('workspace'),'-pr-',uniquestring(variables('_parserContentId3'))))]", + "parserVersion3": "1.0.0", + "parserContentId3": "ExchangeEnvironmentList-Parser", + "_parserContentId3": "[variables('parserContentId3')]", + "_parsercontentProductId3": "[concat(take(variables('_solutionId'),50),'-','pr','-', uniqueString(concat(variables('_solutionId'),'-','Parser','-',variables('_parserContentId3'),'-', variables('parserVersion3'))))]", "workbookVersion1": "1.0.0", "workbookContentId1": "MicrosoftExchangeLeastPrivilegewithRBAC", "workbookId1": "[resourceId('Microsoft.Insights/workbooks', variables('workbookContentId1'))]", - "workbookTemplateSpecName1": "[concat(parameters('workspace'),'-wb-',uniquestring(variables('_workbookContentId1')))]", + "workbookTemplateSpecName1": "[concat(parameters('workspace'),'/Microsoft.SecurityInsights/',concat(parameters('workspace'),'-wb-',uniquestring(variables('_workbookContentId1'))))]", "_workbookContentId1": "[variables('workbookContentId1')]", + "workspaceResourceId": "[resourceId('microsoft.OperationalInsights/Workspaces', parameters('workspace'))]", + "_workbookcontentProductId1": "[concat(take(variables('_solutionId'),50),'-','wb','-', uniqueString(concat(variables('_solutionId'),'-','Workbook','-',variables('_workbookContentId1'),'-', variables('workbookVersion1'))))]", "workbookVersion2": "1.0.0", "workbookContentId2": "MicrosoftExchangeSearchAdminAuditLog", "workbookId2": "[resourceId('Microsoft.Insights/workbooks', variables('workbookContentId2'))]", - "workbookTemplateSpecName2": "[concat(parameters('workspace'),'-wb-',uniquestring(variables('_workbookContentId2')))]", + "workbookTemplateSpecName2": "[concat(parameters('workspace'),'/Microsoft.SecurityInsights/',concat(parameters('workspace'),'-wb-',uniquestring(variables('_workbookContentId2'))))]", "_workbookContentId2": "[variables('workbookContentId2')]", + "_workbookcontentProductId2": "[concat(take(variables('_solutionId'),50),'-','wb','-', uniqueString(concat(variables('_solutionId'),'-','Workbook','-',variables('_workbookContentId2'),'-', variables('workbookVersion2'))))]", "workbookVersion3": "1.0.0", "workbookContentId3": "MicrosoftExchangeSecurityMonitoring", "workbookId3": "[resourceId('Microsoft.Insights/workbooks', variables('workbookContentId3'))]", - "workbookTemplateSpecName3": "[concat(parameters('workspace'),'-wb-',uniquestring(variables('_workbookContentId3')))]", + "workbookTemplateSpecName3": "[concat(parameters('workspace'),'/Microsoft.SecurityInsights/',concat(parameters('workspace'),'-wb-',uniquestring(variables('_workbookContentId3'))))]", "_workbookContentId3": "[variables('workbookContentId3')]", + "_workbookcontentProductId3": "[concat(take(variables('_solutionId'),50),'-','wb','-', uniqueString(concat(variables('_solutionId'),'-','Workbook','-',variables('_workbookContentId3'),'-', variables('workbookVersion3'))))]", "workbookVersion4": "1.0.0", "workbookContentId4": "MicrosoftExchangeSecurityReview", "workbookId4": "[resourceId('Microsoft.Insights/workbooks', variables('workbookContentId4'))]", - "workbookTemplateSpecName4": "[concat(parameters('workspace'),'-wb-',uniquestring(variables('_workbookContentId4')))]", + "workbookTemplateSpecName4": "[concat(parameters('workspace'),'/Microsoft.SecurityInsights/',concat(parameters('workspace'),'-wb-',uniquestring(variables('_workbookContentId4'))))]", "_workbookContentId4": "[variables('workbookContentId4')]", + "_workbookcontentProductId4": "[concat(take(variables('_solutionId'),50),'-','wb','-', uniqueString(concat(variables('_solutionId'),'-','Workbook','-',variables('_workbookContentId4'),'-', variables('workbookVersion4'))))]", "analyticRuleVersion1": "1.0.0", "analyticRulecontentId1": "5170c3c4-b8c9-485c-910d-a21d965ee181", "_analyticRulecontentId1": "[variables('analyticRulecontentId1')]", "analyticRuleId1": "[resourceId('Microsoft.SecurityInsights/AlertRuleTemplates', variables('analyticRulecontentId1'))]", - "analyticRuleTemplateSpecName1": "[concat(parameters('workspace'),'-ar-',uniquestring(variables('_analyticRulecontentId1')))]", + "analyticRuleTemplateSpecName1": "[concat(parameters('workspace'),'/Microsoft.SecurityInsights/',concat(parameters('workspace'),'-ar-',uniquestring(variables('_analyticRulecontentId1'))))]", + "_analyticRulecontentProductId1": "[concat(take(variables('_solutionId'),50),'-','ar','-', uniqueString(concat(variables('_solutionId'),'-','AnalyticsRule','-',variables('_analyticRulecontentId1'),'-', variables('analyticRuleVersion1'))))]", "analyticRuleVersion2": "1.0.0", "analyticRulecontentId2": "7bce901b-9bc8-4948-8dfc-8f68878092d5", "_analyticRulecontentId2": "[variables('analyticRulecontentId2')]", "analyticRuleId2": "[resourceId('Microsoft.SecurityInsights/AlertRuleTemplates', variables('analyticRulecontentId2'))]", - "analyticRuleTemplateSpecName2": "[concat(parameters('workspace'),'-ar-',uniquestring(variables('_analyticRulecontentId2')))]" + "analyticRuleTemplateSpecName2": "[concat(parameters('workspace'),'/Microsoft.SecurityInsights/',concat(parameters('workspace'),'-ar-',uniquestring(variables('_analyticRulecontentId2'))))]", + "_analyticRulecontentProductId2": "[concat(take(variables('_solutionId'),50),'-','ar','-', uniqueString(concat(variables('_solutionId'),'-','AnalyticsRule','-',variables('_analyticRulecontentId2'),'-', variables('analyticRuleVersion2'))))]", + "_solutioncontentProductId": "[concat(take(variables('_solutionId'),50),'-','sl','-', uniqueString(concat(variables('_solutionId'),'-','Solution','-',variables('_solutionId'),'-', variables('_solutionVersion'))))]" }, "resources": [ { - "type": "Microsoft.Resources/templateSpecs", - "apiVersion": "2022-02-01", + "type": "Microsoft.OperationalInsights/workspaces/providers/contentTemplates", + "apiVersion": "2023-04-01-preview", "name": "[variables('dataConnectorTemplateSpecName1')]", "location": "[parameters('workspace-location')]", - "tags": { - "hidden-sentinelWorkspaceId": "[variables('workspaceResourceId')]", - "hidden-sentinelContentType": "DataConnector" - }, - "properties": { - "description": "Microsoft Exchange Security - Exchange On-Premises data connector with template", - "displayName": "Microsoft Exchange Security - Exchange On-Premises template" - } - }, - { - "type": "Microsoft.Resources/templateSpecs/versions", - "apiVersion": "2022-02-01", - "name": "[concat(variables('dataConnectorTemplateSpecName1'),'/',variables('dataConnectorVersion1'))]", - "location": "[parameters('workspace-location')]", - "tags": { - "hidden-sentinelWorkspaceId": "[variables('workspaceResourceId')]", - "hidden-sentinelContentType": "DataConnector" - }, "dependsOn": [ - "[resourceId('Microsoft.Resources/templateSpecs', variables('dataConnectorTemplateSpecName1'))]" + "[extensionResourceId(resourceId('Microsoft.OperationalInsights/workspaces', parameters('workspace')), 'Microsoft.SecurityInsights/contentPackages', variables('_solutionId'))]" ], "properties": { - "description": "Microsoft Exchange Security - Exchange On-Premises data connector with template version 2.0.1", + "description": "Microsoft Exchange Security - Exchange On-Premises data connector with template version 3.0.0", "mainTemplate": { "$schema": "https://schema.management.azure.com/schemas/2019-04-01/deploymentTemplate.json#", "contentVersion": "[variables('dataConnectorVersion1')]", @@ -220,25 +216,25 @@ "sampleQueries": [ { "description": "All Audit logs", - "query": "Event | where EventLog == 'MSExchange Management'\n | sort by TimeGenerated" + "query": "Event | where EventLog == 'MSExchange Management' | sort by TimeGenerated" } ], "dataTypes": [ { "name": "Event", - "lastDataReceivedQuery": "Event | where EventLog == 'MSExchange Management'\n | summarize Time = max(TimeGenerated)\n | where isnotempty(Time)" + "lastDataReceivedQuery": "Event | where EventLog == 'MSExchange Management' | summarize Time = max(TimeGenerated) | where isnotempty(Time)" }, { "name": "Microsoft-W3CIISLog", - "lastDataReceivedQuery": "Microsoft-W3CIISLog | summarize Time = max(TimeGenerated)\n | where isnotempty(Time)" + "lastDataReceivedQuery": "Microsoft-W3CIISLog | summarize Time = max(TimeGenerated) | where isnotempty(Time)" }, { "name": "MessageTrackingLog_CL", - "lastDataReceivedQuery": "MessageTrackingLog_CL | summarize Time = max(TimeGenerated)\n | where isnotempty(Time)" + "lastDataReceivedQuery": "MessageTrackingLog_CL | summarize Time = max(TimeGenerated) | where isnotempty(Time)" }, { "name": "ExchangeHttpProxy_CL", - "lastDataReceivedQuery": "ExchangeHttpProxy_CL | summarize Time = max(TimeGenerated)\n | where isnotempty(Time)" + "lastDataReceivedQuery": "ExchangeHttpProxy_CL | summarize Time = max(TimeGenerated) | where isnotempty(Time)" } ], "connectivityCriterias": [ @@ -846,16 +842,16 @@ ], "metadata": { "id": "5738bef7-b6c0-4fec-ba0b-ac728bef83a9", - "version": "2.0.1", + "version": "2.0.0", "kind": "dataConnector", "source": { "kind": "solution", "name": "ESI - Exchange Security Configuration Analyzer" }, "support": { - "name": "Community", - "tier": "Community", - "link": "https://github.com/Azure/Azure-Sentinel/issues" + "name": "Community", + "tier": "Community", + "link": "https://github.com/Azure/Azure-Sentinel/issues" }, "author": { "name": "Microsoft" @@ -866,7 +862,7 @@ }, { "type": "Microsoft.OperationalInsights/workspaces/providers/metadata", - "apiVersion": "2022-01-01-preview", + "apiVersion": "2023-04-01-preview", "name": "[concat(parameters('workspace'),'/Microsoft.SecurityInsights/',concat('DataConnector-', last(split(variables('_dataConnectorId1'),'/'))))]", "properties": { "parentId": "[extensionResourceId(resourceId('Microsoft.OperationalInsights/workspaces', parameters('workspace')), 'Microsoft.SecurityInsights/dataConnectors', variables('_dataConnectorContentId1'))]", @@ -883,19 +879,30 @@ "email": "[variables('_email')]" }, "support": { - "name": "Community", - "tier": "Community", - "link": "https://github.com/Azure/Azure-Sentinel/issues" + "name": "Community", + "tier": "Community", + "link": "https://github.com/Azure/Azure-Sentinel/issues" } } } ] - } + }, + "packageKind": "Solution", + "packageVersion": "[variables('_solutionVersion')]", + "packageName": "[variables('_solutionName')]", + "packageId": "[variables('_solutionId')]", + "contentSchemaVersion": "3.0.0", + "contentId": "[variables('_dataConnectorContentId1')]", + "contentKind": "DataConnector", + "displayName": "Microsoft Exchange Logs and Events", + "contentProductId": "[variables('_dataConnectorcontentProductId1')]", + "id": "[variables('_dataConnectorcontentProductId1')]", + "version": "[variables('dataConnectorVersion1')]" } }, { "type": "Microsoft.OperationalInsights/workspaces/providers/metadata", - "apiVersion": "2022-01-01-preview", + "apiVersion": "2023-04-01-preview", "name": "[concat(parameters('workspace'),'/Microsoft.SecurityInsights/',concat('DataConnector-', last(split(variables('_dataConnectorId1'),'/'))))]", "dependsOn": [ "[variables('_dataConnectorId1')]" @@ -916,9 +923,9 @@ "email": "[variables('_email')]" }, "support": { - "name": "Community", - "tier": "Community", - "link": "https://github.com/Azure/Azure-Sentinel/issues" + "name": "Community", + "tier": "Community", + "link": "https://github.com/Azure/Azure-Sentinel/issues" } } }, @@ -968,19 +975,19 @@ "dataTypes": [ { "name": "Event", - "lastDataReceivedQuery": "Event | where EventLog == 'MSExchange Management'\n | summarize Time = max(TimeGenerated)\n | where isnotempty(Time)" + "lastDataReceivedQuery": "Event | where EventLog == 'MSExchange Management' | summarize Time = max(TimeGenerated) | where isnotempty(Time)" }, { "name": "Microsoft-W3CIISLog", - "lastDataReceivedQuery": "Microsoft-W3CIISLog | summarize Time = max(TimeGenerated)\n | where isnotempty(Time)" + "lastDataReceivedQuery": "Microsoft-W3CIISLog | summarize Time = max(TimeGenerated) | where isnotempty(Time)" }, { "name": "MessageTrackingLog_CL", - "lastDataReceivedQuery": "MessageTrackingLog_CL | summarize Time = max(TimeGenerated)\n | where isnotempty(Time)" + "lastDataReceivedQuery": "MessageTrackingLog_CL | summarize Time = max(TimeGenerated) | where isnotempty(Time)" }, { "name": "ExchangeHttpProxy_CL", - "lastDataReceivedQuery": "ExchangeHttpProxy_CL | summarize Time = max(TimeGenerated)\n | where isnotempty(Time)" + "lastDataReceivedQuery": "ExchangeHttpProxy_CL | summarize Time = max(TimeGenerated) | where isnotempty(Time)" } ], "connectivityCriterias": [ @@ -989,7 +996,7 @@ "sampleQueries": [ { "description": "All Audit logs", - "query": "Event | where EventLog == 'MSExchange Management'\n | sort by TimeGenerated" + "query": "Event | where EventLog == 'MSExchange Management' | sort by TimeGenerated" } ], "availability": { @@ -1597,33 +1604,15 @@ } }, { - "type": "Microsoft.Resources/templateSpecs", - "apiVersion": "2022-02-01", + "type": "Microsoft.OperationalInsights/workspaces/providers/contentTemplates", + "apiVersion": "2023-04-01-preview", "name": "[variables('dataConnectorTemplateSpecName2')]", "location": "[parameters('workspace-location')]", - "tags": { - "hidden-sentinelWorkspaceId": "[variables('workspaceResourceId')]", - "hidden-sentinelContentType": "DataConnector" - }, - "properties": { - "description": "Microsoft Exchange Security - Exchange On-Premises data connector with template", - "displayName": "Microsoft Exchange Security - Exchange On-Premises template" - } - }, - { - "type": "Microsoft.Resources/templateSpecs/versions", - "apiVersion": "2022-02-01", - "name": "[concat(variables('dataConnectorTemplateSpecName2'),'/',variables('dataConnectorVersion2'))]", - "location": "[parameters('workspace-location')]", - "tags": { - "hidden-sentinelWorkspaceId": "[variables('workspaceResourceId')]", - "hidden-sentinelContentType": "DataConnector" - }, "dependsOn": [ - "[resourceId('Microsoft.Resources/templateSpecs', variables('dataConnectorTemplateSpecName2'))]" + "[extensionResourceId(resourceId('Microsoft.OperationalInsights/workspaces', parameters('workspace')), 'Microsoft.SecurityInsights/contentPackages', variables('_solutionId'))]" ], "properties": { - "description": "Microsoft Exchange Security - Exchange On-Premises data connector with template version 2.0.1", + "description": "Microsoft Exchange Security - Exchange On-Premises data connector with template version 3.0.0", "mainTemplate": { "$schema": "https://schema.management.azure.com/schemas/2019-04-01/deploymentTemplate.json#", "contentVersion": "[variables('dataConnectorVersion2')]", @@ -1658,14 +1647,14 @@ "dataTypes": [ { "name": "ESIExchangeConfig_CL", - "lastDataReceivedQuery": "ESIExchangeConfig_CL\n | summarize Time = max(EntryDate_s) by GenerationInstanceID_g, ESIEnvironment_s\n | where isnotempty(Time)" + "lastDataReceivedQuery": "ESIExchangeConfig_CL | summarize Time = max(EntryDate_s) by GenerationInstanceID_g, ESIEnvironment_s | where isnotempty(Time)" } ], "connectivityCriterias": [ { "type": "IsConnectedQuery", "value": [ - "ESIExchangeConfig_CL\n | summarize LastLogReceived = max(EntryDate_s) by GenerationInstanceID_g, ESIEnvironment_s\n |take 1\n | project IsConnected = true" + "ESIExchangeConfig_CL | summarize LastLogReceived = max(EntryDate_s) by GenerationInstanceID_g, ESIEnvironment_s |take 1 | project IsConnected = true" ] } ], @@ -1802,9 +1791,9 @@ "name": "ESI - Exchange Security Configuration Analyzer" }, "support": { - "name": "Community", - "tier": "Community", - "link": "https://github.com/Azure/Azure-Sentinel/issues" + "name": "Community", + "tier": "Community", + "link": "https://github.com/Azure/Azure-Sentinel/issues" }, "author": { "name": "Microsoft" @@ -1815,7 +1804,7 @@ }, { "type": "Microsoft.OperationalInsights/workspaces/providers/metadata", - "apiVersion": "2022-01-01-preview", + "apiVersion": "2023-04-01-preview", "name": "[concat(parameters('workspace'),'/Microsoft.SecurityInsights/',concat('DataConnector-', last(split(variables('_dataConnectorId2'),'/'))))]", "properties": { "parentId": "[extensionResourceId(resourceId('Microsoft.OperationalInsights/workspaces', parameters('workspace')), 'Microsoft.SecurityInsights/dataConnectors', variables('_dataConnectorContentId2'))]", @@ -1832,19 +1821,30 @@ "email": "[variables('_email')]" }, "support": { - "name": "Community", - "tier": "Community", - "link": "https://github.com/Azure/Azure-Sentinel/issues" + "name": "Community", + "tier": "Community", + "link": "https://github.com/Azure/Azure-Sentinel/issues" } } } ] - } + }, + "packageKind": "Solution", + "packageVersion": "[variables('_solutionVersion')]", + "packageName": "[variables('_solutionName')]", + "packageId": "[variables('_solutionId')]", + "contentSchemaVersion": "3.0.0", + "contentId": "[variables('_dataConnectorContentId2')]", + "contentKind": "DataConnector", + "displayName": "Exchange Security Insights On-Premise Collector", + "contentProductId": "[variables('_dataConnectorcontentProductId2')]", + "id": "[variables('_dataConnectorcontentProductId2')]", + "version": "[variables('dataConnectorVersion2')]" } }, { "type": "Microsoft.OperationalInsights/workspaces/providers/metadata", - "apiVersion": "2022-01-01-preview", + "apiVersion": "2023-04-01-preview", "name": "[concat(parameters('workspace'),'/Microsoft.SecurityInsights/',concat('DataConnector-', last(split(variables('_dataConnectorId2'),'/'))))]", "dependsOn": [ "[variables('_dataConnectorId2')]" @@ -1865,9 +1865,9 @@ "email": "[variables('_email')]" }, "support": { - "name": "Community", - "tier": "Community", - "link": "https://github.com/Azure/Azure-Sentinel/issues" + "name": "Community", + "tier": "Community", + "link": "https://github.com/Azure/Azure-Sentinel/issues" } } }, @@ -1892,14 +1892,14 @@ "dataTypes": [ { "name": "ESIExchangeConfig_CL", - "lastDataReceivedQuery": "ESIExchangeConfig_CL\n | summarize Time = max(EntryDate_s) by GenerationInstanceID_g, ESIEnvironment_s\n | where isnotempty(Time)" + "lastDataReceivedQuery": "ESIExchangeConfig_CL | summarize Time = max(EntryDate_s) by GenerationInstanceID_g, ESIEnvironment_s | where isnotempty(Time)" } ], "connectivityCriterias": [ { "type": "IsConnectedQuery", "value": [ - "ESIExchangeConfig_CL\n | summarize LastLogReceived = max(EntryDate_s) by GenerationInstanceID_g, ESIEnvironment_s\n |take 1\n | project IsConnected = true" + "ESIExchangeConfig_CL | summarize LastLogReceived = max(EntryDate_s) by GenerationInstanceID_g, ESIEnvironment_s |take 1 | project IsConnected = true" ] } ], @@ -2038,33 +2038,15 @@ } }, { - "type": "Microsoft.Resources/templateSpecs", - "apiVersion": "2022-02-01", + "type": "Microsoft.OperationalInsights/workspaces/providers/contentTemplates", + "apiVersion": "2023-04-01-preview", "name": "[variables('parserTemplateSpecName1')]", "location": "[parameters('workspace-location')]", - "tags": { - "hidden-sentinelWorkspaceId": "[variables('workspaceResourceId')]", - "hidden-sentinelContentType": "Parser" - }, - "properties": { - "description": "ExchangeAdminAuditLogs Data Parser with template", - "displayName": "ExchangeAdminAuditLogs Data Parser template" - } - }, - { - "type": "Microsoft.Resources/templateSpecs/versions", - "apiVersion": "2022-02-01", - "name": "[concat(variables('parserTemplateSpecName1'),'/',variables('parserVersion1'))]", - "location": "[parameters('workspace-location')]", - "tags": { - "hidden-sentinelWorkspaceId": "[variables('workspaceResourceId')]", - "hidden-sentinelContentType": "Parser" - }, "dependsOn": [ - "[resourceId('Microsoft.Resources/templateSpecs', variables('parserTemplateSpecName1'))]" + "[extensionResourceId(resourceId('Microsoft.OperationalInsights/workspaces', parameters('workspace')), 'Microsoft.SecurityInsights/contentPackages', variables('_solutionId'))]" ], "properties": { - "description": "ExchangeAdminAuditLogs Data Parser with template version 2.0.1", + "description": "ExchangeAdminAuditLogs Data Parser with template version 3.0.0", "mainTemplate": { "$schema": "https://schema.management.azure.com/schemas/2019-04-01/deploymentTemplate.json#", "contentVersion": "[variables('parserVersion1')]", @@ -2073,7 +2055,7 @@ "resources": [ { "name": "[variables('_parserName1')]", - "apiVersion": "2020-08-01", + "apiVersion": "2022-10-01", "type": "Microsoft.OperationalInsights/workspaces/savedSearches", "location": "[parameters('workspace-location')]", "properties": { @@ -2082,6 +2064,7 @@ "category": "Samples", "functionAlias": "ExchangeAdminAuditLogs", "query": "\nlet cVIPs = _GetWatchlist('ExchangeVIP') | project tostring(canonicalName) ;\r\nlet sVIPs = _GetWatchlist('ExchangeVIP') | project tostring(sAMAccountName) ;\r\nlet CmdletCheck = externaldata (Cmdlet:string, UserOriented:string, RestrictToParameter:string, Parameters:string)[h\"https://raw.githubusercontent.com/nlepagnez/ESI-PublicContent/main/Operations/Watchlists/CmdletWatchlist.csv\"]with(format=\"csv\",ignoreFirstRecord=true);\r\nlet SensitiveCmdlets = externaldata (Cmdlet:string, UserOriented:string, RestrictToParameter:string, Parameters:string)[h\"https://raw.githubusercontent.com/nlepagnez/ESI-PublicContent/main/Operations/Watchlists/CmdletWatchlist.csv\"]with(format=\"csv\",ignoreFirstRecord=true) | project tostring(Cmdlet) ;\r\nlet Env = ExchangeConfiguration(SpecificSectionList=\"ESIEnvironment\")\r\n| extend DomainFQDN_ = tostring(CmdletResultValue.DomainFQDN)\r\n| project DomainFQDN_, ESIEnvironment;\r\nlet MSExchange_Management = (){\r\n Event\r\n | where EventLog == 'MSExchange Management'\r\n | where EventID in (1,6) // 1 = Success, 6 = Failure\r\n | parse ParameterXml with '' CmdletName '' CmdletParameters '' Caller '' *\r\n | extend TargetObject = iif( CmdletParameters has \"-Identity \", split(split(CmdletParameters,'-Identity ')[1],'\"')[1], iif( CmdletParameters has \"-Name \", split(split(CmdletParameters,'-Name ')[1],'\"')[1], \"\"))\r\n | extend Status = case( EventID == 1, 'Success', 'Failure')\r\n | extend IsVIP = iif(TargetObject in (cVIPs) or TargetObject in (sVIPs), true, false)\r\n | extend CmdletNameJoin = tolower(CmdletName)\r\n | join kind=leftouter ( \r\n CmdletCheck\r\n | extend CmdletNameJoin = tolower(Cmdlet)\r\n ) on CmdletNameJoin\r\n | extend DomainEnv = replace_string(Computer,strcat(tostring(split(Computer,'.',0)[0]),'.'),'')\r\n | join kind=leftouter ( \r\n Env\r\n ) on $left.DomainEnv == $right.DomainFQDN_\r\n | extend ESIEnvironment = iif (isnotempty(ESIEnvironment), ESIEnvironment, strcat(\"Unknown-\",DomainEnv))\r\n | extend IsSenstiveCmdlet = iif( isnotempty(CmdletNameJoin1) , true, false) \r\n | extend IsRestrictedCmdLet = iif(IsSenstiveCmdlet == true, iif( RestrictToParameter == \"Yes\", true, false), dynamic(null))\r\n | extend RestrictedParameters = iif(IsSenstiveCmdlet == true, split(tolower(Parameters),';'), dynamic(null))\r\n | extend ExtractedParameters = iif(IsSenstiveCmdlet == true,extract_all(@\"\\B(-\\w+)\", tolower(CmdletParameters)), dynamic(null))\r\n | extend IsSenstiveCmdletParameters = iif(IsSenstiveCmdlet == true,iif( array_length(set_difference(ExtractedParameters,RestrictedParameters)) == array_length(ExtractedParameters), false, true ) , false)\r\n | extend IsSensitive = iif( ( IsSenstiveCmdlet == true and IsRestrictedCmdLet == false ) or (IsSenstiveCmdlet == true and IsRestrictedCmdLet == true and IsSenstiveCmdletParameters == true ), true, false )\r\n //| project TimeGenerated,Computer,Status,Caller,TargetObject,IsVIP,CmdletName,CmdletParameters,IsSenstiveCmdlet,IsRestrictedCmdLet,ExtractedParameters,RestrictedParameters,IsSenstiveCmdletParameters\r\n | project TimeGenerated,Computer,Status,Caller,TargetObject,IsVIP,CmdletName,CmdletParameters,IsSenstiveCmdlet,IsRestrictedCmdLet,ExtractedParameters,RestrictedParameters,IsSenstiveCmdletParameters,IsSensitive,UserOriented, ESIEnvironment\r\n};\r\nMSExchange_Management\r\n", + "functionParameters": "", "version": 1, "tags": [ { @@ -2113,14 +2096,25 @@ "email": "[variables('_email')]" }, "support": { - "name": "Community", - "tier": "Community", - "link": "https://github.com/Azure/Azure-Sentinel/issues" + "name": "Community", + "tier": "Community", + "link": "https://github.com/Azure/Azure-Sentinel/issues" } } } ] - } + }, + "packageKind": "Solution", + "packageVersion": "[variables('_solutionVersion')]", + "packageName": "[variables('_solutionName')]", + "packageId": "[variables('_solutionId')]", + "contentSchemaVersion": "3.0.0", + "contentId": "[variables('_parserContentId1')]", + "contentKind": "Parser", + "displayName": "ExchangeAdminAuditLogs", + "contentProductId": "[variables('_parsercontentProductId1')]", + "id": "[variables('_parsercontentProductId1')]", + "version": "[variables('parserVersion1')]" } }, { @@ -2134,7 +2128,14 @@ "category": "Samples", "functionAlias": "ExchangeAdminAuditLogs", "query": "\nlet cVIPs = _GetWatchlist('ExchangeVIP') | project tostring(canonicalName) ;\r\nlet sVIPs = _GetWatchlist('ExchangeVIP') | project tostring(sAMAccountName) ;\r\nlet CmdletCheck = externaldata (Cmdlet:string, UserOriented:string, RestrictToParameter:string, Parameters:string)[h\"https://raw.githubusercontent.com/nlepagnez/ESI-PublicContent/main/Operations/Watchlists/CmdletWatchlist.csv\"]with(format=\"csv\",ignoreFirstRecord=true);\r\nlet SensitiveCmdlets = externaldata (Cmdlet:string, UserOriented:string, RestrictToParameter:string, Parameters:string)[h\"https://raw.githubusercontent.com/nlepagnez/ESI-PublicContent/main/Operations/Watchlists/CmdletWatchlist.csv\"]with(format=\"csv\",ignoreFirstRecord=true) | project tostring(Cmdlet) ;\r\nlet Env = ExchangeConfiguration(SpecificSectionList=\"ESIEnvironment\")\r\n| extend DomainFQDN_ = tostring(CmdletResultValue.DomainFQDN)\r\n| project DomainFQDN_, ESIEnvironment;\r\nlet MSExchange_Management = (){\r\n Event\r\n | where EventLog == 'MSExchange Management'\r\n | where EventID in (1,6) // 1 = Success, 6 = Failure\r\n | parse ParameterXml with '' CmdletName '' CmdletParameters '' Caller '' *\r\n | extend TargetObject = iif( CmdletParameters has \"-Identity \", split(split(CmdletParameters,'-Identity ')[1],'\"')[1], iif( CmdletParameters has \"-Name \", split(split(CmdletParameters,'-Name ')[1],'\"')[1], \"\"))\r\n | extend Status = case( EventID == 1, 'Success', 'Failure')\r\n | extend IsVIP = iif(TargetObject in (cVIPs) or TargetObject in (sVIPs), true, false)\r\n | extend CmdletNameJoin = tolower(CmdletName)\r\n | join kind=leftouter ( \r\n CmdletCheck\r\n | extend CmdletNameJoin = tolower(Cmdlet)\r\n ) on CmdletNameJoin\r\n | extend DomainEnv = replace_string(Computer,strcat(tostring(split(Computer,'.',0)[0]),'.'),'')\r\n | join kind=leftouter ( \r\n Env\r\n ) on $left.DomainEnv == $right.DomainFQDN_\r\n | extend ESIEnvironment = iif (isnotempty(ESIEnvironment), ESIEnvironment, strcat(\"Unknown-\",DomainEnv))\r\n | extend IsSenstiveCmdlet = iif( isnotempty(CmdletNameJoin1) , true, false) \r\n | extend IsRestrictedCmdLet = iif(IsSenstiveCmdlet == true, iif( RestrictToParameter == \"Yes\", true, false), dynamic(null))\r\n | extend RestrictedParameters = iif(IsSenstiveCmdlet == true, split(tolower(Parameters),';'), dynamic(null))\r\n | extend ExtractedParameters = iif(IsSenstiveCmdlet == true,extract_all(@\"\\B(-\\w+)\", tolower(CmdletParameters)), dynamic(null))\r\n | extend IsSenstiveCmdletParameters = iif(IsSenstiveCmdlet == true,iif( array_length(set_difference(ExtractedParameters,RestrictedParameters)) == array_length(ExtractedParameters), false, true ) , false)\r\n | extend IsSensitive = iif( ( IsSenstiveCmdlet == true and IsRestrictedCmdLet == false ) or (IsSenstiveCmdlet == true and IsRestrictedCmdLet == true and IsSenstiveCmdletParameters == true ), true, false )\r\n //| project TimeGenerated,Computer,Status,Caller,TargetObject,IsVIP,CmdletName,CmdletParameters,IsSenstiveCmdlet,IsRestrictedCmdLet,ExtractedParameters,RestrictedParameters,IsSenstiveCmdletParameters\r\n | project TimeGenerated,Computer,Status,Caller,TargetObject,IsVIP,CmdletName,CmdletParameters,IsSenstiveCmdlet,IsRestrictedCmdLet,ExtractedParameters,RestrictedParameters,IsSenstiveCmdletParameters,IsSensitive,UserOriented, ESIEnvironment\r\n};\r\nMSExchange_Management\r\n", - "version": 1 + "functionParameters": "", + "version": 1, + "tags": [ + { + "name": "description", + "value": "ExchangeAdminAuditLogs" + } + ] } }, { @@ -2160,40 +2161,22 @@ "email": "[variables('_email')]" }, "support": { - "name": "Community", - "tier": "Community", - "link": "https://github.com/Azure/Azure-Sentinel/issues" + "name": "Community", + "tier": "Community", + "link": "https://github.com/Azure/Azure-Sentinel/issues" } } }, { - "type": "Microsoft.Resources/templateSpecs", - "apiVersion": "2022-02-01", + "type": "Microsoft.OperationalInsights/workspaces/providers/contentTemplates", + "apiVersion": "2023-04-01-preview", "name": "[variables('parserTemplateSpecName2')]", "location": "[parameters('workspace-location')]", - "tags": { - "hidden-sentinelWorkspaceId": "[variables('workspaceResourceId')]", - "hidden-sentinelContentType": "Parser" - }, - "properties": { - "description": "ExchangeConfiguration Data Parser with template", - "displayName": "ExchangeConfiguration Data Parser template" - } - }, - { - "type": "Microsoft.Resources/templateSpecs/versions", - "apiVersion": "2022-02-01", - "name": "[concat(variables('parserTemplateSpecName2'),'/',variables('parserVersion2'))]", - "location": "[parameters('workspace-location')]", - "tags": { - "hidden-sentinelWorkspaceId": "[variables('workspaceResourceId')]", - "hidden-sentinelContentType": "Parser" - }, "dependsOn": [ - "[resourceId('Microsoft.Resources/templateSpecs', variables('parserTemplateSpecName2'))]" + "[extensionResourceId(resourceId('Microsoft.OperationalInsights/workspaces', parameters('workspace')), 'Microsoft.SecurityInsights/contentPackages', variables('_solutionId'))]" ], "properties": { - "description": "ExchangeConfiguration Data Parser with template version 2.0.1", + "description": "ExchangeConfiguration Data Parser with template version 3.0.0", "mainTemplate": { "$schema": "https://schema.management.azure.com/schemas/2019-04-01/deploymentTemplate.json#", "contentVersion": "[variables('parserVersion2')]", @@ -2202,7 +2185,7 @@ "resources": [ { "name": "[variables('_parserName2')]", - "apiVersion": "2020-08-01", + "apiVersion": "2022-10-01", "type": "Microsoft.OperationalInsights/workspaces/savedSearches", "location": "[parameters('workspace-location')]", "properties": { @@ -2243,14 +2226,25 @@ "email": "[variables('_email')]" }, "support": { - "name": "Community", - "tier": "Community", - "link": "https://github.com/Azure/Azure-Sentinel/issues" + "name": "Community", + "tier": "Community", + "link": "https://github.com/Azure/Azure-Sentinel/issues" } } } ] - } + }, + "packageKind": "Solution", + "packageVersion": "[variables('_solutionVersion')]", + "packageName": "[variables('_solutionName')]", + "packageId": "[variables('_solutionId')]", + "contentSchemaVersion": "3.0.0", + "contentId": "[variables('_parserContentId2')]", + "contentKind": "Parser", + "displayName": "ExchangeConfiguration", + "contentProductId": "[variables('_parsercontentProductId2')]", + "id": "[variables('_parsercontentProductId2')]", + "version": "[variables('parserVersion2')]" } }, { @@ -2265,7 +2259,13 @@ "functionAlias": "ExchangeConfiguration", "functionParameters": "SpecificSectionList:string = \"\", SpecificConfigurationDate:string = \"lastdate\", Target:string = \"On-Premises\", SpecificConfigurationEnv:string = \"All\"", "query": "\nlet _SpecificSectionList = split(SpecificSectionList,',');\r\nlet _configurationDate = iff(isnull(SpecificConfigurationDate) or isempty(SpecificConfigurationDate),\"lastdate\",tostring(SpecificConfigurationDate));\r\nlet _configurationEnv = split(iff(isnull(SpecificConfigurationEnv) or isempty(SpecificConfigurationEnv) or tolower(SpecificConfigurationEnv) == \"all\",\"All\",tostring(SpecificConfigurationEnv)),',');\r\nlet _target = iff(isnull(Target) or isempty(Target),\"On-Premises\",Target);\r\nlet _targetDate = iff(_configurationDate == \"lastdate\", ago(7d), iif(_configurationDate == \"alllife\",ago(1080d),todatetime(_configurationDate)));\r\nlet baseRequest = materialize (union isfuzzy=true withsource=TableName ESIAPIExchange*,ESIExchange* \r\n | where TimeGenerated > _targetDate\r\n | extend Source = iff (TableName contains \"Online\", \"Online\", \"On-Premises\")\r\n | where _target == 'All' or Source == _target\r\n | extend ScopedEnvironment = iff(_configurationEnv contains \"All\", \"All\",ESIEnvironment_s) \r\n | where ScopedEnvironment in (_configurationEnv)\r\n | extend EntryDate = todatetime(EntryDate_s)\r\n | project-away EntryDate_s);\r\nlet findConfigDate = baseRequest\r\n | extend Env =strcat(Source, \"_\",ESIEnvironment_s)\r\n | summarize count() by GenerationInstanceID_g,Env,EntryDate\r\n | extend distance = iff(_configurationDate == \"lastdate\" or _configurationDate == \"alllife\", now() - EntryDate, (EntryDate - todatetime(_configurationDate)))\r\n | top-nested of Env by Ignore0=max(1), \r\n top-nested 1 of distance by Ignore1 = min(distance) asc nulls last, \r\n top-nested of GenerationInstanceID_g by Ignore2=max(2) \r\n | project GenerationInstanceID_g;\r\nlet ParseExchangeConfig = () { baseRequest \r\n | join kind=leftsemi (findConfigDate) on $left.GenerationInstanceID_g == $right.GenerationInstanceID_g\r\n | where isempty(_SpecificSectionList[0]) or Section_s in (_SpecificSectionList)\r\n | extend TimeGenerated = EntryDate\r\n | extend Identity = IdentityString_s\r\n | extend CmdletResultValue = parse_json(rawData_s)\r\n | project-rename ConfigurationInstanceID = GenerationInstanceID_g, ESIEnvironment = ESIEnvironment_s, Section = Section_s, PSCmdlet = PSCmdL_s, CmdletResultType = ExecutionResult_s, WhenChanged = WhenChanged_t, WhenCreated = WhenCreated_t, Name = Name_s\r\n | project-away TenantId,SourceSystem,Type,EntryDate\r\n};\r\nParseExchangeConfig", - "version": 1 + "version": 1, + "tags": [ + { + "name": "description", + "value": "ExchangeConfiguration" + } + ] } }, { @@ -2291,40 +2291,22 @@ "email": "[variables('_email')]" }, "support": { - "name": "Community", - "tier": "Community", - "link": "https://github.com/Azure/Azure-Sentinel/issues" + "name": "Community", + "tier": "Community", + "link": "https://github.com/Azure/Azure-Sentinel/issues" } } }, { - "type": "Microsoft.Resources/templateSpecs", - "apiVersion": "2022-02-01", + "type": "Microsoft.OperationalInsights/workspaces/providers/contentTemplates", + "apiVersion": "2023-04-01-preview", "name": "[variables('parserTemplateSpecName3')]", "location": "[parameters('workspace-location')]", - "tags": { - "hidden-sentinelWorkspaceId": "[variables('workspaceResourceId')]", - "hidden-sentinelContentType": "Parser" - }, - "properties": { - "description": "ExchangeEnvironmentList Data Parser with template", - "displayName": "ExchangeEnvironmentList Data Parser template" - } - }, - { - "type": "Microsoft.Resources/templateSpecs/versions", - "apiVersion": "2022-02-01", - "name": "[concat(variables('parserTemplateSpecName3'),'/',variables('parserVersion3'))]", - "location": "[parameters('workspace-location')]", - "tags": { - "hidden-sentinelWorkspaceId": "[variables('workspaceResourceId')]", - "hidden-sentinelContentType": "Parser" - }, "dependsOn": [ - "[resourceId('Microsoft.Resources/templateSpecs', variables('parserTemplateSpecName3'))]" + "[extensionResourceId(resourceId('Microsoft.OperationalInsights/workspaces', parameters('workspace')), 'Microsoft.SecurityInsights/contentPackages', variables('_solutionId'))]" ], "properties": { - "description": "ExchangeEnvironmentList Data Parser with template version 2.0.1", + "description": "ExchangeEnvironmentList Data Parser with template version 3.0.0", "mainTemplate": { "$schema": "https://schema.management.azure.com/schemas/2019-04-01/deploymentTemplate.json#", "contentVersion": "[variables('parserVersion3')]", @@ -2333,7 +2315,7 @@ "resources": [ { "name": "[variables('_parserName3')]", - "apiVersion": "2020-08-01", + "apiVersion": "2022-10-01", "type": "Microsoft.OperationalInsights/workspaces/savedSearches", "location": "[parameters('workspace-location')]", "properties": { @@ -2374,14 +2356,25 @@ "email": "[variables('_email')]" }, "support": { - "name": "Community", - "tier": "Community", - "link": "https://github.com/Azure/Azure-Sentinel/issues" + "name": "Community", + "tier": "Community", + "link": "https://github.com/Azure/Azure-Sentinel/issues" } } } ] - } + }, + "packageKind": "Solution", + "packageVersion": "[variables('_solutionVersion')]", + "packageName": "[variables('_solutionName')]", + "packageId": "[variables('_solutionId')]", + "contentSchemaVersion": "3.0.0", + "contentId": "[variables('_parserContentId3')]", + "contentKind": "Parser", + "displayName": "ExchangeEnvironmentList", + "contentProductId": "[variables('_parsercontentProductId3')]", + "id": "[variables('_parsercontentProductId3')]", + "version": "[variables('parserVersion3')]" } }, { @@ -2396,7 +2389,13 @@ "functionAlias": "ExchangeEnvironmentList", "functionParameters": "Target:string = \"On-Premises\"", "query": "\nlet _target = iff(isnull(Target) or isempty(Target),\"On-Premises\",Target);\r\nlet ScalarbaseRequest = union isfuzzy=true withsource=TableName ESIAPIExchange*,ESIExchange*\r\n | extend Source = iff (TableName contains \"Online\", \"Online\", \"On-Premises\")\r\n | where _target == 'All' or Source == _target;\r\nScalarbaseRequest | summarize by ESIEnvironment_s | project-rename ESIEnvironment = ESIEnvironment_s", - "version": 1 + "version": 1, + "tags": [ + { + "name": "description", + "value": "ExchangeEnvironmentList" + } + ] } }, { @@ -2422,40 +2421,22 @@ "email": "[variables('_email')]" }, "support": { - "name": "Community", - "tier": "Community", - "link": "https://github.com/Azure/Azure-Sentinel/issues" + "name": "Community", + "tier": "Community", + "link": "https://github.com/Azure/Azure-Sentinel/issues" } } }, { - "type": "Microsoft.Resources/templateSpecs", - "apiVersion": "2022-02-01", + "type": "Microsoft.OperationalInsights/workspaces/providers/contentTemplates", + "apiVersion": "2023-04-01-preview", "name": "[variables('workbookTemplateSpecName1')]", "location": "[parameters('workspace-location')]", - "tags": { - "hidden-sentinelWorkspaceId": "[variables('workspaceResourceId')]", - "hidden-sentinelContentType": "Workbook" - }, - "properties": { - "description": "Microsoft Exchange Security - Exchange On-Premises Workbook with template", - "displayName": "Microsoft Exchange Security - Exchange On-Premises Workbook template" - } - }, - { - "type": "Microsoft.Resources/templateSpecs/versions", - "apiVersion": "2022-02-01", - "name": "[concat(variables('workbookTemplateSpecName1'),'/',variables('workbookVersion1'))]", - "location": "[parameters('workspace-location')]", - "tags": { - "hidden-sentinelWorkspaceId": "[variables('workspaceResourceId')]", - "hidden-sentinelContentType": "Workbook" - }, "dependsOn": [ - "[resourceId('Microsoft.Resources/templateSpecs', variables('workbookTemplateSpecName1'))]" + "[extensionResourceId(resourceId('Microsoft.OperationalInsights/workspaces', parameters('workspace')), 'Microsoft.SecurityInsights/contentPackages', variables('_solutionId'))]" ], "properties": { - "description": "Microsoft Exchange Least Privilege with RBAC Workbook with template version 2.0.1", + "description": "Microsoft Exchange Least Privilege with RBAC Workbook with template version 3.0.0", "mainTemplate": { "$schema": "https://schema.management.azure.com/schemas/2019-04-01/deploymentTemplate.json#", "contentVersion": "[variables('workbookVersion1')]", @@ -2499,9 +2480,9 @@ "email": "[variables('_email')]" }, "support": { - "name": "Community", - "tier": "Community", - "link": "https://github.com/Azure/Azure-Sentinel/issues" + "name": "Community", + "tier": "Community", + "link": "https://github.com/Azure/Azure-Sentinel/issues" }, "dependencies": { "operator": "AND", @@ -2523,37 +2504,30 @@ } } ] - } + }, + "packageKind": "Solution", + "packageVersion": "[variables('_solutionVersion')]", + "packageName": "[variables('_solutionName')]", + "packageId": "[variables('_solutionId')]", + "contentSchemaVersion": "3.0.0", + "contentId": "[variables('_workbookContentId1')]", + "contentKind": "Workbook", + "displayName": "[parameters('workbook1-name')]", + "contentProductId": "[variables('_workbookcontentProductId1')]", + "id": "[variables('_workbookcontentProductId1')]", + "version": "[variables('workbookVersion1')]" } }, { - "type": "Microsoft.Resources/templateSpecs", - "apiVersion": "2022-02-01", + "type": "Microsoft.OperationalInsights/workspaces/providers/contentTemplates", + "apiVersion": "2023-04-01-preview", "name": "[variables('workbookTemplateSpecName2')]", "location": "[parameters('workspace-location')]", - "tags": { - "hidden-sentinelWorkspaceId": "[variables('workspaceResourceId')]", - "hidden-sentinelContentType": "Workbook" - }, - "properties": { - "description": "Microsoft Exchange Security - Exchange On-Premises Workbook with template", - "displayName": "Microsoft Exchange Security - Exchange On-Premises Workbook template" - } - }, - { - "type": "Microsoft.Resources/templateSpecs/versions", - "apiVersion": "2022-02-01", - "name": "[concat(variables('workbookTemplateSpecName2'),'/',variables('workbookVersion2'))]", - "location": "[parameters('workspace-location')]", - "tags": { - "hidden-sentinelWorkspaceId": "[variables('workspaceResourceId')]", - "hidden-sentinelContentType": "Workbook" - }, "dependsOn": [ - "[resourceId('Microsoft.Resources/templateSpecs', variables('workbookTemplateSpecName2'))]" + "[extensionResourceId(resourceId('Microsoft.OperationalInsights/workspaces', parameters('workspace')), 'Microsoft.SecurityInsights/contentPackages', variables('_solutionId'))]" ], "properties": { - "description": "Microsoft Exchange Search AdminAuditLog Workbook with template version 2.0.1", + "description": "Microsoft Exchange Search Admin AuditLog Workbook with template version 3.0.0", "mainTemplate": { "$schema": "https://schema.management.azure.com/schemas/2019-04-01/deploymentTemplate.json#", "contentVersion": "[variables('workbookVersion2')]", @@ -2597,9 +2571,9 @@ "email": "[variables('_email')]" }, "support": { - "name": "Community", - "tier": "Community", - "link": "https://github.com/Azure/Azure-Sentinel/issues" + "name": "Community", + "tier": "Community", + "link": "https://github.com/Azure/Azure-Sentinel/issues" }, "dependencies": { "operator": "AND", @@ -2621,37 +2595,30 @@ } } ] - } + }, + "packageKind": "Solution", + "packageVersion": "[variables('_solutionVersion')]", + "packageName": "[variables('_solutionName')]", + "packageId": "[variables('_solutionId')]", + "contentSchemaVersion": "3.0.0", + "contentId": "[variables('_workbookContentId2')]", + "contentKind": "Workbook", + "displayName": "[parameters('workbook2-name')]", + "contentProductId": "[variables('_workbookcontentProductId2')]", + "id": "[variables('_workbookcontentProductId2')]", + "version": "[variables('workbookVersion2')]" } }, { - "type": "Microsoft.Resources/templateSpecs", - "apiVersion": "2022-02-01", + "type": "Microsoft.OperationalInsights/workspaces/providers/contentTemplates", + "apiVersion": "2023-04-01-preview", "name": "[variables('workbookTemplateSpecName3')]", "location": "[parameters('workspace-location')]", - "tags": { - "hidden-sentinelWorkspaceId": "[variables('workspaceResourceId')]", - "hidden-sentinelContentType": "Workbook" - }, - "properties": { - "description": "Microsoft Exchange Security - Exchange On-Premises Workbook with template", - "displayName": "Microsoft Exchange Security - Exchange On-Premises Workbook template" - } - }, - { - "type": "Microsoft.Resources/templateSpecs/versions", - "apiVersion": "2022-02-01", - "name": "[concat(variables('workbookTemplateSpecName3'),'/',variables('workbookVersion3'))]", - "location": "[parameters('workspace-location')]", - "tags": { - "hidden-sentinelWorkspaceId": "[variables('workspaceResourceId')]", - "hidden-sentinelContentType": "Workbook" - }, "dependsOn": [ - "[resourceId('Microsoft.Resources/templateSpecs', variables('workbookTemplateSpecName3'))]" + "[extensionResourceId(resourceId('Microsoft.OperationalInsights/workspaces', parameters('workspace')), 'Microsoft.SecurityInsights/contentPackages', variables('_solutionId'))]" ], "properties": { - "description": "Microsoft Exchange Admin Activity Workbook with template version 2.0.1", + "description": "Microsoft Exchange Admin Activity Workbook with template version 3.0.0", "mainTemplate": { "$schema": "https://schema.management.azure.com/schemas/2019-04-01/deploymentTemplate.json#", "contentVersion": "[variables('workbookVersion3')]", @@ -2695,9 +2662,9 @@ "email": "[variables('_email')]" }, "support": { - "name": "Community", - "tier": "Community", - "link": "https://github.com/Azure/Azure-Sentinel/issues" + "name": "Community", + "tier": "Community", + "link": "https://github.com/Azure/Azure-Sentinel/issues" }, "dependencies": { "operator": "AND", @@ -2719,37 +2686,30 @@ } } ] - } + }, + "packageKind": "Solution", + "packageVersion": "[variables('_solutionVersion')]", + "packageName": "[variables('_solutionName')]", + "packageId": "[variables('_solutionId')]", + "contentSchemaVersion": "3.0.0", + "contentId": "[variables('_workbookContentId3')]", + "contentKind": "Workbook", + "displayName": "[parameters('workbook3-name')]", + "contentProductId": "[variables('_workbookcontentProductId3')]", + "id": "[variables('_workbookcontentProductId3')]", + "version": "[variables('workbookVersion3')]" } }, { - "type": "Microsoft.Resources/templateSpecs", - "apiVersion": "2022-02-01", + "type": "Microsoft.OperationalInsights/workspaces/providers/contentTemplates", + "apiVersion": "2023-04-01-preview", "name": "[variables('workbookTemplateSpecName4')]", "location": "[parameters('workspace-location')]", - "tags": { - "hidden-sentinelWorkspaceId": "[variables('workspaceResourceId')]", - "hidden-sentinelContentType": "Workbook" - }, - "properties": { - "description": "Microsoft Exchange Security - Exchange On-Premises Workbook with template", - "displayName": "Microsoft Exchange Security - Exchange On-Premises Workbook template" - } - }, - { - "type": "Microsoft.Resources/templateSpecs/versions", - "apiVersion": "2022-02-01", - "name": "[concat(variables('workbookTemplateSpecName4'),'/',variables('workbookVersion4'))]", - "location": "[parameters('workspace-location')]", - "tags": { - "hidden-sentinelWorkspaceId": "[variables('workspaceResourceId')]", - "hidden-sentinelContentType": "Workbook" - }, "dependsOn": [ - "[resourceId('Microsoft.Resources/templateSpecs', variables('workbookTemplateSpecName4'))]" + "[extensionResourceId(resourceId('Microsoft.OperationalInsights/workspaces', parameters('workspace')), 'Microsoft.SecurityInsights/contentPackages', variables('_solutionId'))]" ], "properties": { - "description": "Microsoft Exchange Security Review Workbook with template version 2.0.1", + "description": "Microsoft Exchange Security Review Workbook with template version 3.0.0", "mainTemplate": { "$schema": "https://schema.management.azure.com/schemas/2019-04-01/deploymentTemplate.json#", "contentVersion": "[variables('workbookVersion4')]", @@ -2793,9 +2753,9 @@ "email": "[variables('_email')]" }, "support": { - "name": "Community", - "tier": "Community", - "link": "https://github.com/Azure/Azure-Sentinel/issues" + "name": "Community", + "tier": "Community", + "link": "https://github.com/Azure/Azure-Sentinel/issues" }, "dependencies": { "operator": "AND", @@ -2817,37 +2777,30 @@ } } ] - } + }, + "packageKind": "Solution", + "packageVersion": "[variables('_solutionVersion')]", + "packageName": "[variables('_solutionName')]", + "packageId": "[variables('_solutionId')]", + "contentSchemaVersion": "3.0.0", + "contentId": "[variables('_workbookContentId4')]", + "contentKind": "Workbook", + "displayName": "[parameters('workbook4-name')]", + "contentProductId": "[variables('_workbookcontentProductId4')]", + "id": "[variables('_workbookcontentProductId4')]", + "version": "[variables('workbookVersion4')]" } }, { - "type": "Microsoft.Resources/templateSpecs", - "apiVersion": "2022-02-01", + "type": "Microsoft.OperationalInsights/workspaces/providers/contentTemplates", + "apiVersion": "2023-04-01-preview", "name": "[variables('analyticRuleTemplateSpecName1')]", "location": "[parameters('workspace-location')]", - "tags": { - "hidden-sentinelWorkspaceId": "[variables('workspaceResourceId')]", - "hidden-sentinelContentType": "AnalyticsRule" - }, - "properties": { - "description": "Microsoft Exchange Security - Exchange On-Premises Analytics Rule 1 with template", - "displayName": "Microsoft Exchange Security - Exchange On-Premises AR template" - } - }, - { - "type": "Microsoft.Resources/templateSpecs/versions", - "apiVersion": "2022-02-01", - "name": "[concat(variables('analyticRuleTemplateSpecName1'),'/',variables('analyticRuleVersion1'))]", - "location": "[parameters('workspace-location')]", - "tags": { - "hidden-sentinelWorkspaceId": "[variables('workspaceResourceId')]", - "hidden-sentinelContentType": "AnalyticsRule" - }, "dependsOn": [ - "[resourceId('Microsoft.Resources/templateSpecs', variables('analyticRuleTemplateSpecName1'))]" + "[extensionResourceId(resourceId('Microsoft.OperationalInsights/workspaces', parameters('workspace')), 'Microsoft.SecurityInsights/contentPackages', variables('_solutionId'))]" ], "properties": { - "description": "CriticalCmdletsUsageDetection_AnalyticalRules Analytics Rule with template version 2.0.1", + "description": "CriticalCmdletsUsageDetection_AnalyticalRules Analytics Rule with template version 3.0.0", "mainTemplate": { "$schema": "https://schema.management.azure.com/schemas/2019-04-01/deploymentTemplate.json#", "contentVersion": "[variables('analyticRuleVersion1')]", @@ -2856,7 +2809,7 @@ "resources": [ { "type": "Microsoft.SecurityInsights/AlertRuleTemplates", - "name": "[variables('AnalyticRulecontentId1')]", + "name": "[variables('analyticRulecontentId1')]", "apiVersion": "2022-04-01-preview", "kind": "Scheduled", "location": "[parameters('workspace-location')]", @@ -2893,48 +2846,48 @@ ], "entityMappings": [ { + "entityType": "Mailbox", "fieldMappings": [ { - "columnName": "TargetObject", - "identifier": "MailboxPrimaryAddress" + "identifier": "MailboxPrimaryAddress", + "columnName": "TargetObject" } - ], - "entityType": "Mailbox" + ] }, { + "entityType": "Host", "fieldMappings": [ { - "columnName": "Computer", - "identifier": "FullName" + "identifier": "FullName", + "columnName": "Computer" } - ], - "entityType": "Host" + ] }, { + "entityType": "Account", "fieldMappings": [ { - "columnName": "TargetObject", - "identifier": "Sid" + "identifier": "Sid", + "columnName": "TargetObject" }, { - "columnName": "TargetObject", - "identifier": "ObjectGuid" + "identifier": "ObjectGuid", + "columnName": "TargetObject" }, { - "columnName": "TargetObject", - "identifier": "FullName" + "identifier": "FullName", + "columnName": "TargetObject" } - ], - "entityType": "Account" + ] }, { + "entityType": "Account", "fieldMappings": [ { - "columnName": "Caller", - "identifier": "Name" + "identifier": "Name", + "columnName": "Caller" } - ], - "entityType": "Account" + ] } ] } @@ -2959,44 +2912,37 @@ "email": "[variables('_email')]" }, "support": { - "name": "Community", - "tier": "Community", - "link": "https://github.com/Azure/Azure-Sentinel/issues" + "name": "Community", + "tier": "Community", + "link": "https://github.com/Azure/Azure-Sentinel/issues" } } } ] - } + }, + "packageKind": "Solution", + "packageVersion": "[variables('_solutionVersion')]", + "packageName": "[variables('_solutionName')]", + "packageId": "[variables('_solutionId')]", + "contentSchemaVersion": "3.0.0", + "contentId": "[variables('_analyticRulecontentId1')]", + "contentKind": "AnalyticsRule", + "displayName": "VIP Mailbox manipulation", + "contentProductId": "[variables('_analyticRulecontentProductId1')]", + "id": "[variables('_analyticRulecontentProductId1')]", + "version": "[variables('analyticRuleVersion1')]" } }, { - "type": "Microsoft.Resources/templateSpecs", - "apiVersion": "2022-02-01", + "type": "Microsoft.OperationalInsights/workspaces/providers/contentTemplates", + "apiVersion": "2023-04-01-preview", "name": "[variables('analyticRuleTemplateSpecName2')]", "location": "[parameters('workspace-location')]", - "tags": { - "hidden-sentinelWorkspaceId": "[variables('workspaceResourceId')]", - "hidden-sentinelContentType": "AnalyticsRule" - }, - "properties": { - "description": "Microsoft Exchange Security - Exchange On-Premises Analytics Rule 2 with template", - "displayName": "Microsoft Exchange Security - Exchange On-Premises AR template" - } - }, - { - "type": "Microsoft.Resources/templateSpecs/versions", - "apiVersion": "2022-02-01", - "name": "[concat(variables('analyticRuleTemplateSpecName2'),'/',variables('analyticRuleVersion2'))]", - "location": "[parameters('workspace-location')]", - "tags": { - "hidden-sentinelWorkspaceId": "[variables('workspaceResourceId')]", - "hidden-sentinelContentType": "AnalyticsRule" - }, "dependsOn": [ - "[resourceId('Microsoft.Resources/templateSpecs', variables('analyticRuleTemplateSpecName2'))]" + "[extensionResourceId(resourceId('Microsoft.OperationalInsights/workspaces', parameters('workspace')), 'Microsoft.SecurityInsights/contentPackages', variables('_solutionId'))]" ], "properties": { - "description": "ServerOrientedWithUserOrientedAdministration_AnalyticalRules Analytics Rule with template version 2.0.1", + "description": "ServerOrientedWithUserOrientedAdministration_AnalyticalRules Analytics Rule with template version 3.0.0", "mainTemplate": { "$schema": "https://schema.management.azure.com/schemas/2019-04-01/deploymentTemplate.json#", "contentVersion": "[variables('analyticRuleVersion2')]", @@ -3005,7 +2951,7 @@ "resources": [ { "type": "Microsoft.SecurityInsights/AlertRuleTemplates", - "name": "[variables('AnalyticRulecontentId2')]", + "name": "[variables('analyticRulecontentId2')]", "apiVersion": "2022-04-01-preview", "kind": "Scheduled", "location": "[parameters('workspace-location')]", @@ -3042,48 +2988,48 @@ ], "entityMappings": [ { + "entityType": "Mailbox", "fieldMappings": [ { - "columnName": "userPrincipalName", - "identifier": "MailboxPrimaryAddress" + "identifier": "MailboxPrimaryAddress", + "columnName": "userPrincipalName" }, { - "columnName": "userPrincipalName", - "identifier": "Upn" + "identifier": "Upn", + "columnName": "userPrincipalName" } - ], - "entityType": "Mailbox" + ] }, { + "entityType": "Host", "fieldMappings": [ { - "columnName": "Computer", - "identifier": "FullName" + "identifier": "FullName", + "columnName": "Computer" } - ], - "entityType": "Host" + ] }, { + "entityType": "Host", "fieldMappings": [ { - "columnName": "ServerCmdletTargetObject", - "identifier": "HostName" + "identifier": "HostName", + "columnName": "ServerCmdletTargetObject" } - ], - "entityType": "Host" + ] }, { + "entityType": "Account", "fieldMappings": [ { - "columnName": "Caller", - "identifier": "Name" + "identifier": "Name", + "columnName": "Caller" }, { - "columnName": "TargetObject", - "identifier": "ObjectGuid" + "identifier": "ObjectGuid", + "columnName": "TargetObject" } - ], - "entityType": "Account" + ] } ] } @@ -3108,24 +3054,42 @@ "email": "[variables('_email')]" }, "support": { - "name": "Community", - "tier": "Community", - "link": "https://github.com/Azure/Azure-Sentinel/issues" + "name": "Community", + "tier": "Community", + "link": "https://github.com/Azure/Azure-Sentinel/issues" } } } ] - } + }, + "packageKind": "Solution", + "packageVersion": "[variables('_solutionVersion')]", + "packageName": "[variables('_solutionName')]", + "packageId": "[variables('_solutionId')]", + "contentSchemaVersion": "3.0.0", + "contentId": "[variables('_analyticRulecontentId2')]", + "contentKind": "AnalyticsRule", + "displayName": "Server Oriented Cmdlet And User Oriented Cmdlet used", + "contentProductId": "[variables('_analyticRulecontentProductId2')]", + "id": "[variables('_analyticRulecontentProductId2')]", + "version": "[variables('analyticRuleVersion2')]" } }, { - "type": "Microsoft.OperationalInsights/workspaces/providers/metadata", - "apiVersion": "2022-01-01-preview", + "type": "Microsoft.OperationalInsights/workspaces/providers/contentPackages", + "apiVersion": "2023-04-01-preview", "location": "[parameters('workspace-location')]", "properties": { - "version": "2.0.1", + "version": "3.0.0", "kind": "Solution", - "contentSchemaVersion": "2.0.0", + "contentSchemaVersion": "3.0.0", + "displayName": "Microsoft Exchange Security - Exchange On-Premises", + "publisherDisplayName": "Community", + "descriptionHtml": "

Note: There may be known issues pertaining to this Solution, please refer to them before installing.

\n

The Exchange Security Audit and Configuration Insight solution analyze Exchange On-Premises configuration and logs from a security lens to provide insights and alerts.

\n

Underlying Microsoft Technologies used:

\n

This solution takes a dependency on the following technologies, and some of these dependencies either may be in Preview state or might result in additional ingestion or operational costs:

\n
    \n
  1. Windows Event logs collection, including MS Exchange Management Event logs

    \n
  2. \n
  3. Custom logs ingestion via Data Collector REST API

    \n
  4. \n
\n

Data Connectors: 2, Parsers: 3, Workbooks: 4, Analytic Rules: 2

\n

Learn more about Microsoft Sentinel | Learn more about Solutions

\n", + "contentKind": "Solution", + "contentProductId": "[variables('_solutioncontentProductId')]", + "id": "[variables('_solutioncontentProductId')]", + "icon": "", "contentId": "[variables('_solutionId')]", "parentId": "[variables('_solutionId')]", "source": { @@ -3138,9 +3102,9 @@ "email": "[variables('_email')]" }, "support": { - "name": "Community", - "tier": "Community", - "link": "https://github.com/Azure/Azure-Sentinel/issues" + "name": "Community", + "tier": "Community", + "link": "https://github.com/Azure/Azure-Sentinel/issues" }, "dependencies": { "operator": "AND", diff --git a/Solutions/Microsoft Exchange Security - Exchange On-Premises/ReleaseNotes.md b/Solutions/Microsoft Exchange Security - Exchange On-Premises/ReleaseNotes.md new file mode 100644 index 00000000000..90b2d92ed28 --- /dev/null +++ b/Solutions/Microsoft Exchange Security - Exchange On-Premises/ReleaseNotes.md @@ -0,0 +1,4 @@ +| **Version** | **Date Modified (DD-MM-YYYY)** | **Change History** | +|-------------|--------------------------------|---------------------------------------------| +| 3.0.0 | 08-23-2023 | ** ExchangeEnvironmentList ** parser not correclty named in Workbooks. Correction to call the good parser name.| +| 2.0.0 | 07-04-2023 | Initial solution release | diff --git a/Solutions/Microsoft Exchange Security - Exchange On-Premises/Workbooks/Microsoft Exchange Security Review.json b/Solutions/Microsoft Exchange Security - Exchange On-Premises/Workbooks/Microsoft Exchange Security Review.json index 86c7b456e03..50428e48bc4 100644 --- a/Solutions/Microsoft Exchange Security - Exchange On-Premises/Workbooks/Microsoft Exchange Security Review.json +++ b/Solutions/Microsoft Exchange Security - Exchange On-Premises/Workbooks/Microsoft Exchange Security Review.json @@ -143,7 +143,7 @@ { "type": 1, "content": { - "json": "# Workbook goals\r\n\r\nThe goal of this workbook is to outline key security configurations of your Exchange on-premises environment.\r\n\r\nMost of Exchange organizations have were installed years ago (sometimes more than 10 years). Many configurations have been done and might not have been documented. For most environments, the core commitment was maintaining a high availability of the users’ mailboxes putting aside other consideration (even security considerations). Recommended security practices have also evolved since the first released and a regular review is necessary.\r\n\r\nThis workbook is designed to show your Exchange organization is configured with a security point of view. Indeed, some configurations easy to display as there are no UI available.\r\n\r\nFor each configuration, you will find explanations and recommendations when applicable.\r\n\r\n- This workbook does not pretend to show you every weak Security configurations, but the most common issues and known to be used by attackers. \r\n- It will not show you if you have been comprised, but will help you identify unexpected configuration.\r\n\r\n----\r\n\r\n## Quick reminder of how Exchange works\r\n\r\nDuring Exchange installation two very important groups are created :\r\n- Exchange Trusted Subsystem : Contain all the computer accounts for Exchange Server\r\n- Exchange Windows Permissions : Contain the group Exchange trusted Subsystem\r\n\r\nThese groups have :\r\n- Very high privileges in ALL AD domains including the root domain\r\n- Right on any Exchange including mailboxes\r\n\r\nAs each Exchange server computer account is member of Exchange Trusted Subsystem, it means by taking control of the computer account or being System on an Exchange server you will gain access to all the permissions granted to Exchange Trusted Subsystem and Exchange Windows Permissions.\r\n\r\nTo protect AD and Exchange, it is very important to ensure the following:\r\n- There is a very limited number of persons that are local Administrator on Exchange server\r\n- To protect user right like : Act part of the operating System, Debug\r\n\r\nEvery service account or application that have high privileges on Exchange need to be considered as sensitive\r\n\r\n** 💡 Exchange servers need to be considered as very sensitive servers**\r\n\r\n-----\r\n\r\n\r\n## Tabs\r\n\r\n### Mailbox Access\r\n\r\nThis tab will show you several top sensitive delegations that allow an account to access, modify, act as another user, search, export the content of a mailbox.\r\n\r\n### Exchange & AD Groups\r\n\r\nThis tab will show you the members of Exchange groups and Sensitive AD groups.\r\n\r\n### Local Administrators\r\n\r\nThis tab will show you the non standard content of the local Administrators group. Remember that a member of the local Administrators group can take control of the computer account of the server and then it will have all the permissions associated with Exchange Trusted Subsytem and Exchange Windows Permissions\r\n\r\nThe information is displayed with different views : \r\n- List of nonstandard users\r\n- Number of servers with a nonstandard a user\r\n- Nonstandard groups content\r\n- For each user important information are displayed like last logon, last password set, enabled\r\n\r\n### Exchange Security configuration\r\n\r\nThis tab will show you some important configuration for your Exchange Organization\r\n- Status of Admin Audit Log configuration\r\n- Status of POP and IMAP configuration : especially, is Plaintext Authentication configured ?\r\n- Nonstandard permissions on the Exchange container in the Configuration Partition\r\n\r\n### Transport Configuration\r\n\r\nThis tab will show you the configuration of the main Transport components\r\n- Receive Connectors configured with Anonymous and/or Open Relay\r\n- Remote Domain Autoforward configuration\r\n- Transport Rules configured with BlindCopyTo, SendTo, RedirectTo\r\n- Journal Rule and Journal Recipient configurations\r\n- Accepted Domains with *\r\n\r\n" + "json": "# Workbook goals\r\n\r\nThe goal of this workbook is to outline key security configurations of your Exchange On-Premises environment.\r\n\r\nMost of Exchange organizations have were installed years ago (sometimes more than 10 years). Many configurations have been done and might not have been documented. For most environments, the core commitment was maintaining a high availability of the users’ mailboxes putting aside other consideration (even security considerations). Recommended security practices have also evolved since the first released and a regular review is necessary.\r\n\r\nThis workbook is designed to show your Exchange organization is configured with a security point of view. Indeed, some configurations easy to display as there are no UI available.\r\n\r\nFor each configuration, you will find explanations and recommendations when applicable.\r\n\r\n- This workbook does not pretend to show you every weak Security configurations, but the most common issues and known to be used by attackers. \r\n- It will not show you if you have been comprised, but will help you identify unexpected configuration.\r\n\r\n----\r\n\r\n## Quick reminder of how Exchange works\r\n\r\nDuring Exchange installation two very important groups are created :\r\n- Exchange Trusted Subsystem : Contain all the computer accounts for Exchange Server\r\n- Exchange Windows Permissions : Contain the group Exchange trusted Subsystem\r\n\r\nThese groups have :\r\n- Very high privileges in ALL AD domains including the root domain\r\n- Right on any Exchange including mailboxes\r\n\r\nAs each Exchange server computer account is member of Exchange Trusted Subsystem, it means by taking control of the computer account or being System on an Exchange server you will gain access to all the permissions granted to Exchange Trusted Subsystem and Exchange Windows Permissions.\r\n\r\nTo protect AD and Exchange, it is very important to ensure the following:\r\n- There is a very limited number of persons that are local Administrator on Exchange server\r\n- To protect user right like : Act part of the operating System, Debug\r\n\r\nEvery service account or application that have high privileges on Exchange need to be considered as sensitive\r\n\r\n** 💡 Exchange servers need to be considered as very sensitive servers**\r\n\r\n-----\r\n\r\n\r\n## Tabs\r\n\r\n### Mailbox Access\r\n\r\nThis tab will show you several top sensitive delegations that allow an account to access, modify, act as another user, search, export the content of a mailbox.\r\n\r\n### Exchange & AD Groups\r\n\r\nThis tab will show you the members of Exchange groups and Sensitive AD groups.\r\n\r\n### Local Administrators\r\n\r\nThis tab will show you the non standard content of the local Administrators group. Remember that a member of the local Administrators group can take control of the computer account of the server and then it will have all the permissions associated with Exchange Trusted Subsytem and Exchange Windows Permissions\r\n\r\nThe information is displayed with different views : \r\n- List of nonstandard users\r\n- Number of servers with a nonstandard a user\r\n- Nonstandard groups content\r\n- For each user important information are displayed like last logon, last password set, enabled\r\n\r\n### Exchange Security configuration\r\n\r\nThis tab will show you some important configuration for your Exchange Organization\r\n- Status of Admin Audit Log configuration\r\n- Status of POP and IMAP configuration : especially, is Plaintext Authentication configured ?\r\n- Nonstandard permissions on the Exchange container in the Configuration Partition\r\n\r\n### Transport Configuration\r\n\r\nThis tab will show you the configuration of the main Transport components\r\n- Receive Connectors configured with Anonymous and/or Open Relay\r\n- Remote Domain Autoforward configuration\r\n- Transport Rules configured with BlindCopyTo, SendTo, RedirectTo\r\n- Journal Rule and Journal Recipient configurations\r\n- Accepted Domains with *\r\n\r\n" }, "name": "WorkbookInfo" } diff --git a/Solutions/Microsoft Exchange Security - Exchange Online/Data Connectors/ESI-ExchangeOnlineCollector.json b/Solutions/Microsoft Exchange Security - Exchange Online/Data Connectors/ESI-ExchangeOnlineCollector.json index 80980650cf0..e95b22caafb 100644 --- a/Solutions/Microsoft Exchange Security - Exchange Online/Data Connectors/ESI-ExchangeOnlineCollector.json +++ b/Solutions/Microsoft Exchange Security - Exchange Online/Data Connectors/ESI-ExchangeOnlineCollector.json @@ -19,14 +19,14 @@ "dataTypes": [ { "name": "ESIExchangeOnlineConfig_CL", - "lastDataReceivedQuery": "ESIExchangeOnlineConfig_CL\n | summarize Time = max(EntryDate_s) by GenerationInstanceID_g, ESIEnvironment_s\n | where isnotempty(Time)" + "lastDataReceivedQuery": "ESIExchangeOnlineConfig_CL | summarize Time = max(EntryDate_s) by GenerationInstanceID_g, ESIEnvironment_s | where isnotempty(Time)" } ], "connectivityCriterias": [ { "type": "IsConnectedQuery", "value": [ - "ESIExchangeOnlineConfig_CL\n | summarize LastLogReceived = max(EntryDate_s) by GenerationInstanceID_g, ESIEnvironment_s\n |take 1\n | project IsConnected = true" + "ESIExchangeOnlineConfig_CL | summarize LastLogReceived = max(EntryDate_s) by GenerationInstanceID_g, ESIEnvironment_s |take 1 | project IsConnected = true" ] } ], @@ -210,10 +210,9 @@ "name": "ESI - Exchange Online Security Configuration Analyzer" }, "support": { - "tier": "Microsoft", - "name": "Microsoft Corporation", - "email": "support@microsoft.com", - "link": "https://support.microsoft.com/" + "name": "Community", + "tier": "Community", + "link": "https://github.com/Azure/Azure-Sentinel/issues" }, "author": { "name": "Microsoft" diff --git a/Solutions/Microsoft Exchange Security - Exchange Online/Data/Solution_MicrosoftExchangeSecurityExchangeOnline.json b/Solutions/Microsoft Exchange Security - Exchange Online/Data/Solution_MicrosoftExchangeSecurityExchangeOnline.json index f635e6b49c9..43caf97a35b 100644 --- a/Solutions/Microsoft Exchange Security - Exchange Online/Data/Solution_MicrosoftExchangeSecurityExchangeOnline.json +++ b/Solutions/Microsoft Exchange Security - Exchange Online/Data/Solution_MicrosoftExchangeSecurityExchangeOnline.json @@ -16,7 +16,7 @@ ], "Analytic Rules": [], "BasePath": "C:\\Git Repositories\\Azure-Sentinel\\Solutions\\Microsoft Exchange Security - Exchange Online", - "Version": "2.0.1", + "Version": "3.0.0", "Metadata": "SolutionMetadata.json", "TemplateSpec": true, "Is1Pconnector": false diff --git a/Solutions/Microsoft Exchange Security - Exchange Online/Package/2.0.1.zip b/Solutions/Microsoft Exchange Security - Exchange Online/Package/2.0.1.zip deleted file mode 100644 index 586073257f6fbd126f9b147782a6bfdb199865e8..0000000000000000000000000000000000000000 GIT binary patch literal 0 HcmV?d00001 literal 24364 zcmV)DK*7IIO9KQH0000806l&cSGu7kna~IT00JHW02crN0Aq4xVRU6xX+&jaX>MtB zX>V>WYIARH%~@@48@UnwUZDSh*cPy4NGr!c(ZXo%;IrLpP^V|uzRL&O2&mnW#F|U) zkz6TCn*ZJza=9;(9NW2bP{T01+~Le{W}bQBe){7d7)$A+Dt%i?Cw?i?|5&a5 zl#INr1y{KQL$cnA%xJ4;EB<9#>E_LW<=>~$$uBcoLQ5-zHO{y_$r+Xx2UF-1%nbD zS%_@oPZIu)uW(T)kP|c(DmgjVb8W-B_wik7m-E|XC33ew{(t>T`2nSXm@i!O_}#6# zRr~w@)((#L_u2dF1sGrjU$ZH&n|q~KiV15guy=!~Aiqc7*@>;CSS>3$j`h@mc*sgH zj-#*CoH@h(W?;f=C{W-`qimt9<5J?r^gStu8nMQi?Ce8^PM!n1 zf~+#at=Vyv3&+s$?8G~#GMt34H_FmUEsOdg4VUYWU|S|yp&VdYZzHjidT!aw=z?)( zqa+E+lD4JMOObm`g9O^aG47mAgE@azIT*R7!?&tmL$**FISW()U7Mr9!vRG{NyqQ; zHD@`LfLv6zX0(b%m}x2X${V!9Y2>9_UEpbEM2B{5_L3yPP(mx$E)|O1T!c99IMgGg zXb|IZSe2zVZX#jM<)ntjm{z5SESF;pI}C#%Lw`Axjxxv`=v9l*BuPBaJyyBIr#V=E zK%~PPyagVJRVV$l~(s>Y5#2ylD@CA!XFY zAwZ2Q8;%$LjthTFoJF2vUW)G>pW4@@ULoukAmuRlvlgzDC$xl=S0lE+ zf58nx)IT56^E++sr&`~K7211qPHM4&BAZWj8z8GGZ%Wb3mN9kZ1_v7?mMQIV>EkF-1?i&%Hw>OJT)SLaaUy zs2&~qqtR8lr9Y>{a`r(W+7uNxXR0ov_;3ABWZc%bCN#Q*PGR+=bK@D$kKZ*%>1yTH zCG=}`6V~amDUM5lm~%$U{w}TMwV+cZK6TE7q$(*kJrx)BYpfgb>BI91xHelWe znAQpQkoS0FB?u{txZliu&tL|a_~&jh=oxV^OzDKf(ZTR8>6`jjEP!rTkSsKH3CWLV z*Zs)EUc)WCM3j%=G3bI51&MsL*FnQm0rWj4v~k_#ygocQJQyGRZG7-*4;9|!-A1Kd zUR*uVfhW4a6q}wJU7lh$(4&@o3X;foM?)!bWuavr8n`R(AFPBAh~9{T93|$|t*nHU zOp@QRx_3gN6A|{AAz_`tR>s*apL*ax{tK7ra__)`mxB^arFsibHh{4;|U+qlzyJ5Ew*kS z+|yOQM(Q81aNTch(PgOdTZNCroXM*d+YH>YOzKy>~IaM+c7GYu-T?J&0*Mx zAYLONc63xN>Qi<+Lm+jg3NP3;qe$%i!S~UiI7V(5S2mQx^3rzT^Gf7gWxk&dO;3A5 zYLwHYZ;sEK*4bFN>pu1?{L@@I_Q*F+_vxcySogLs5Pr3;-y#SD%O((ER~)W18ypTp z>NIuZfC*n&49B9LLLm3ykTT-Yyo7pC%($Z2if34KajwJRF2-4$G*7lB%=qR^ErrpF zOnOd5>t7V)>>riN0;v=@Dcf%!PY9L!!x#2WLPB=Ct&PL2(Wh3DOza^VisDwFdM-G) z6OT9|;S^*yM#L~2#(8N{GaviWFmisx*uBTjL*scrQa-Vzs3&nyr$^4Bsi&K zJA&CMcCjZ-f}?4KddwBSiUd`P-WOEOplf$TsE$gK%ydFRcM|D{MPUujxTKZ z=RyAW0kx|zr3o(M?a!Fn1`qM)LHk+e{5@O39rvGTBdit|Ml6K{d|nB+V3$7}pRh6e z$@fdYrE+`vtrP7;rYC)Vkoav+uiS{zm}W*Shg{%*gCIlvH5Lh{#ulzAsEAO@rWKA- z9>jbJbe$`T5?ee158aq5t;PsCm2;B^`{h7)o?bELi}jWWhi#&A)C_dgVtyF(SptR4 zHS&Rye>{CF0G5SMj z+LXO<7<;yqd>sO8fh9|ZvV|ryXp7c({qG-CS-26p>U=1{q*`J>K#;N}WMU>Vl3ojK zW3z*uQK*d6E7OOB9UoczjVG1^JW2D7#Rz*}f776U*YvT)X{@SSEinB&FL2w3wlfR= zG?xqNlz38h0*$lbe|^)(yV$z6Z}Y_zibHBlxw#j1hPEOPeTu)k@yD9P$@D z@eIAoouqfN_%P^^wAXM%vqM_ERrEH+KluAUP)h>@6aWAK2mpL?yZE$R1bY(7Tb8l|#z1wo+$dVZNK4$X|ao9)VWfRHFJ z)!kIrZHnyfIaVy=Ac05{r;v#}0J2!@o-)&e^d^~1defL>BR%Y{**@*#?(du**!hHY z_qZSc1TL9OvRKv3(}$G_M0j|3czC#bczFE!*MG&>%I_2Jl8@b$$86;?O{dA@%}w#7 zJ9a1T1t0TC+I4@K#k}i9WBD%G9Q6A8PH)@k^*4P!4Wnx;cgn}p&`o*wPf0ZSYNbOB zc+n(^g&h{3P;03Nxs^fHRE=<~pfqa+%o%wfrFI*sD= zZ^!BxA|!xNGh;*{!CEI#I7^{1mP&-!D2iDI>*)vY(w$szcEY_`9HiF(T|av{34;k= zL9ibMhEq3o0ZZtBfnykXZYnw?AHl=)ddd-jB#nc~g~AOx8BCt>$whhzZ~NI}pO4&G znEvF3GphF{=1DY*J^o!B&8BPXUDe846IO{}5?12H!Bpb3@*+yvEa85K4QDBvaPD)T zr4gIDNy6NC?4;>Cpih#re|RPvaZWCyS?D`Z)%k`y-@CEzMNsV@x{UqISujab?)nIo zrI(!j!&MZ&OQx>J9fjsUu&c|!yJSJad>#kyp~+Dkjj8yvL#8XND7-(4FCWz?mO-|o zZ;_C5lj{wzDKxmY`kG%5=R{2KHA@sTsj*3z1I);gE0D9We+pT69C8o8t#&f5SzA@_ zSJ&6yHupW(<(i&Vb6cw}|E$_$6F`)v$g}8z9ZuZvIt{!8#*)X}m^LRczhG*FIJ^l@ zXVcoQ45R2>-$Bre4WVVaKI1O%>nmWaAms4-Do8Kc>u(N^VE)Q!+c@Rg(dLDs2y(9K zO=EWl%k8d~POtg3R5CPI!q%tbeYp zW(~ZY@|fnf8y-)R;Nmh(HucO(Ry)j;0~$050@dIwIEp5t;NsZtV?$3*jvd7VV!)50 z5XA~CiMlI=I%bEAS7x`6AK=A=03C@%d7c()>YJ@s6syEUf#4sYB(g$A^)-{?&ub}u z)rR67WZ z;+-a#wZURb?a8~j+9}~dwR21$o-4!`Vc^Zg1-lg=Snm5_L0X z?vWU@8i|&SJ?BUannt2D7i}Qknr;nk&qB>N0&dxE$;hSjvSc$gdYmYfppH8Y3@^{1 zHyAiQ_^)pik@iuwT2$g|gMC=e>$393N?a$iwatpDdtq2D^yo71eLm3^$!phK_#u3QxG~h)f3ntrKJ}icmWu9tRn9FMLa@hMp0uQfW z$kCav6%A4MOMFq?TY#xH-wQrkl)L2Yn}f-UOR-fEHs}8r%#1#t@`<0koMeK5o>$1x ziZRR!(PJ) z(G?AW9xK`>p}mn=a#@lV8h6k1BNTR&v}>Ha=Sg50enRCUcBhwrH-pi$O(FHM4hMeF zu?qvQ*6GtIbweS}V(xL=Z?U&abP{|pB6S#+Vs^5#SF zkE#2Pvp%-?j||qVKSB4H(NSn2jc2@KIDqyyA1C*{8-(sK2w|M6)|QlEItMsApJTe**RBw(!`2Z^wCs&P2 z?*M9Uv)aNs?9B-mu_=D!%}~~eMINAp+>Iw}96@n+7|l`x1VVnhrmQxonRIje$D3rf ziNDS`ngpOSZlZw(*uYCrs#50)H1p^x`6?QwU?n=4LLc}JOacemSYL><8;N-bOznD7 zlUkGm?Jw+N85hu5l1Ag2C9|G&mDZB6?azF;nZU$MOx~&`Q$d4#T`kOjw+c23KJtK* zp`fduvcu^V<7O7()j|WUnRTRUYy$HwS3W2rXN|iv7&Pj`X7<(fyl6H_ZW|USfz}-j62ThPb@DOzg}tG#Y*JoZ68K4F=U zaATv!3NXgLR*Ke6ab^#Ett_m)K60osT-n;smwdv6gQw0_tKxP$y2H4E6Bb4nKyn#x+W}cRy{7S&PJT7~IQS^~Fg#ZQzH16@b=isg z{+8)?6b9ZqTrMzN1q0Vp;O(;sd%{Pw(+IT4WD+hNZt_m7FZk*blm$U?Sy0VJ03jd~ zSoZ={^y;-&eU?nW?Jj%GLCN=Lp6Eyd-7r?U5?xCR%OV6VGzqPNEWt^>CAYou%(hxH z@mGnI&19=DP~o=`pL&vK{;+~zr^6C8h*hFgKLXlo4r~*q8JwGIf<`Ds;*00EnC;as+Ym;1f4VA}?^!Raqp{#s;cy zzy!z7U%h;NdidfLIpG^VLQ_HjrG^2@DlD1RJ5D*#x|$);VV5Y#5P-J&+3^#?Eqm}P z4#sYL&3@q5Y|V2gY>54s2Iiq0O@{Rjiqk6&Tn7K*t8$pf#0C1$S&=oA88Fyg5E16E z0~B=O1fZu$?tIWp6OZrY0qL4u<6o);hpp%%b9ln0P z&Qw5&5KKSP`8`}3czPN6B#otb2GL-O!qE+6R2Q293rQ$m2xnvCi4>^Pa|1$AsCXcm zKniuq>OD)}{O*k`cq$8)EDnKW8qvxlV63+@OLV}2Lv;n9^|J{W2q$!QPw0*@AMqI7 z&ajNkhMMdf8y$F}sZ5Fo^aADX#)djZxv_yg0e$%?=vA@ox;f_slg4jg42(&r3JKq0$TDEiT!Tp>fd$4xWLI@+8NO_LY|X zC{Ltji#lq$&hXkHjn`ad3hVk}yp4ebGxA1|5?#dV-mQ4I?g=^6<~0(v$}PKy0Rs|* zeXFz;0r*uEr*7B*P2_!WL2X7BRkh@yol-R;2Jb6$!ft*K)BCA9d$##a99<!PA`q8O-f$g8V!=!_L z@Aq6cicUv5smcQKWH2A5f;do4b_?y*V2A*;Htv$}SbdIr`w>YkAxUxlEW}TVDTh&_ z09PDO?;s3#Bk3kM3Pe(~&DqFUb8+)GT^zBJSa_}jIoWftsYBi|tgi1cunU&k8Fm4E zmDtG+N+w}4&{DB3D=y?6gqiSCjHzYA0}Zl{JbezNlg$9_3{HgNz-z?d>;j}0kFO;I zBy=uF@=HE8Bhh-Qn8+7Er=J?^mbR-UNQ_5Uhj1K013Xn2D~w$x;kb8W>KcuP`8yk1c`9}qhw%Rc} z5-y?z*)|8V?BK>FSgU2|wI~&m#_I@J-DecG^_UfuJ-d!~LYUAT_;K<}FcsV)y{V%> zn)3hl{d2 zSY=T}C*CDTHSI12>9t;FrNb=vUzr#lZ)`UXQpB*Uf_&t7@PeD|Z= z^@V}rF?nO8ed9~2Lg{2-V!|@@U4-+9R+#cq)lsc&Y$%jq@}6*Fm@fNcG$Yep8`|H^ z0zV6gDs)DySg#HBoO%Z>{QmjzIea@{XDff7ea=?05Ed#~3HYwZ@dy?ncQ%n8H9=9e z{B3LqbI3VFaRZ_U45BE;b!c%Px#5#yw6Q0fln&&CJwFlRS-J&@W2k*}?BF&Tjxiv> zlSGfURHzB6=@}DR6hWfG&u2PNV{;KI{woX&M z#*!gB` z0)oiF)T0-zb}7C971H*&;&`P!2WhT|NH8$sk37%Y-gEe%KXkT-`#op4x5b@(Z_nNJ zhW$tWU{p0XR^Dg%9daoOO9fT#gj|+}%F<%nuTIa>098uT8V%4mM{P+*V&85SnFM~R z4D_wy2$ci1UPsg@9jW}RwWo5@K%4|@R~mZt4ofSA>jKu0*^u^JNu?2g9Tlj!337hM zD-XL@^;0JauO6b(NwBImY>zDuOOFZR@NQY$pe6SqxXrwUk#0ZMet=aRO}c3c1IrH)17*paekqCVHD zs9Pe_DC*mb`Sv1ydE&iMoSHukjYL0}UleUL5tb`v=Mb;=TC7&*b*l$u&CIrFF01O4 zZeN}(zp)H&mfbgz*%h+7K}Ih_HqS4UP4QPDgPUY;dzqVStWw4{%hqO@dUILYEDM(; zl3HE$(L)w{*4c&)PG-GeN64cYI?*3tsm?iS2) zw_tX=yoOSscXj5qa!(BpL3^CPhzx6WB=p*4QmZzzn=_}?WlUR$j`t>0+S~SYZb-OT zrtd8!So~Cp73*kIpCzt3J6wHMxV$-6p9QW}_BX3{WPu!BR-^uovb-&n-K}K;ta%b& zHD_^a%-+_NwXJOWmcT4)L>scQH4W}>DjVCpS=era`5LmVH91X+yD@dy)NCwPvZC5& zPg^8;*XNcst=&9TM9dm7@*iYh+h#{wgs_&t!t^uEidN)s^JifpZ4Ov!RAwHsoHZwc zYTLwZWI1aQPiGgbZQ|$dO%}5joSc0sI)k5^XDfTiQda&{hhwxFiX~?wyN_AOZb+e} zW*fVYS;lTipWDqQ_UW>SRRkni!;$PHoI4h()MU|dQfOvw1;R5utPk10>au^$P3wm& zU-vi5*X=55ZL&uQigP5Gm2)o+_Fjaj#v$!ws$wp4z|mi3S= z>po=5TAXpeysTKayFx78g1&i{tB34X5816+XSceciTG)=SS^0y{ULkR7oWZAhMawa zELFeJ>{K@-_*_}27N7ZI20vt{k z&K`Bc@ws7^sCzR?_aZyg4aZ{9EKoNcgoo@;pDO#)m#`i6khN)^tWCG;lDbh=rdx4n zEtY-hlVn}Gq4fS_*_D24S(R=$PPdgk=^<;KACdQJkM&&LV$?~j3WA|uYslrP&+k%A}8g~ zf-innHgzwGCt)uGA9&YM`^jbqMgcVqJUirHJfdCzCOy2Tl6)e{O;bK&lj?K21xaBI zD`a@6Qiafo)liZzhnt^2Bhm~?Ls=ewY)U8eqKx8+GvRIc1v5%?N(Hmr0$(;mRp!pH zXQikZu6!PeN>bZXZrl=2>wSztx7Y3Gh&2Y|SfRI4uxeI*kG_L3rgziX3&fM|Sns+S z`_bZEvN`DW_nqE0@Z)9{Jfj-v{wawjU*(s2l|{qg>9TyQOiNU-%knG9iiTr(rv|pw z84{c1Jr}5z#jUPYnyEdfx0jo#y6D^)5-Z(;+XIW9bC4bnNpGAhoLw$K1UO(>MN6XR&as_qrj7v7)CTdPRMOZM%39# zhp8gDCeZC^7Q|!ws6k(9~WHJlGwaU(~vnXcJA<6+zU8<8KO&WNoM4alQ=)r23EZAMQON}~`r3~LG<;CQ$=9vwL@4IRN+>jgTe#1whr3P#DHDj#)< zJR_eM;TZ#F8_6PPx);&fBY(Zaf}pwr^fU}cSRRY_dwV^okwypucTz3&){RlaV{@;; z+UCTC7*GkaGsI|{wb=w$q#zm1e);A408hfwq9r8q!6`~uGKj#c0jpHa?2V3*H(-Nd zJ2(wgCJIbHA=3qbh4lxMFj-N`Jms?!5wl42VryB0xER5zn9xi`I~8eF{BDfKdJzdd zx(8q|hT$rXsA}v$y)C1I=Zt;hJcV^6k?{=#1^?+U#Uu#pB?6UO2_~%E#(D|8rz+V3 zCZouP|EZDnBC8{FSUB#Ldu^s^$QT1%TVj?-mmRhh_AH=S{OLLo|)1&IBmO$xDdj zg1#PKOrn_g4lp@MA7;5Kjvu2!AFJpt>Uw>gufb$Zy;)~&;xQCd38kp3ga^>BIn zZUxdXXupq9^{OZ!n^K8zgxt2R!f$$SNw&*J=ZTnkmXhldrewdoOgmtCM%Bf%JLy1w z6+5oyNxtCG*auR+rUOH?0}C}sk3C1#d@Xjb(2!7bDVxkOCr4CnZObSDK-y)z!5$Q5 zZATFW-f8l5*sBwPDmuS!U?9w3)4YK~+0Z z%3v{VM+vwy?XZ+G}ccPtEO?YH~*{;D-9_-A@m0rw6ywgWKuB?eySwdT={ExSbx{P7iLU z&&us&x|^17F)Zt*m4yw0`{lf;4lJpFF<)rNy>rPd?uw~#!7Su@dAR{S>cw0WrbU| z=Ibvh;BrtHaCT1uF3WgPt%rciCJAb-dgGAGHjUW5-VGjVE2N_PdC88=6VDCZIPXPV zhU4&_IRmM`<-QiK-zl2SW!t>b(zcG_eG7Rga`O07siP@UZQ$)NKcx4w&@q%gpicv+UhXwjSo1G)%SF zem7!1_-ed9j}3|%?ka9ksG`}1>zB@ex3Nu8L-09Q;pSQJjDzxkR|vfiLVh8$G`{}k z@Cewpb~b$Gdl+R-{WQB6<$0acg(weparJ6g1uEkwWZgw)p$4E7m4t4BwiGDIn||dc zi`K>MzO~ZLlR={SvBP}sV_JHVz`iJCd1huLc(v_t7KD_rjqcQPSrVYl%22z<=)g$? z^FMVbz8m{u0^kMS7eoee*XyL>s;n-{p@peOqbtg-4~<>mwJLnde7x8Kpose<4A>%t zsZK)XhKb4%Mv0^8QrN6CW(M@anIFh|#bk72$lvo&XNRX;m@F6%W0kZ&l1X9>nzXst zxY_qvSO!b%gaqk3$gPzgKoxuKKM`!O^6QyWtIt**pRK%zQjTCY``sQzw+A4Cz_5M% z1`6Wzfv^2OJeLz5eik4+17+_RDrpEwdL43lmAb=(9-%_0fCfIj<2(DK-ssWD8Tq{( zXPbL_&i-g;-{IT-zPB~p+1notsIJGukU|!zn#$~^!3q}wz0>5;FX{FxdUrI7(PR?5 z_e77lKzKGZpkRqY0WeeX&UXE}2w)l|sV-2U0itoX^0AZke6ZWw+3oM`Igi}o$l2cS zZ#nM%;E}V}+wJY|^WFX~A1<}$G$$w%pQXFvHNI^`e1~&BgI>S+XzPy{8H(bW@ioe(@3fiUME z6>_Jd=RNqXGz9tR%(x{!%A6uW*(s9ec6V=YxXriw4j&F+n)YF??hpJuXYk0|+uGgf zx!c1<1{6buUyhE7Iq5ydl7 zXNd8cIG%#v^+~C6HFZSlEIvD%7!F&(LV`%=N6*Cj8=aal@X7tKoSu=5&3SevkD@V# z2TbJGKGz33Dvr{0*y=TWoafISA8aTEG4l!MfZ}P2?13(=&Q#>eVo&u+6(Yfjl*xFo z2Utke&JIto5im(K12$%Cja3iL&CW92)u`AHis9k5{hog(V>i4u;ELCD4yE`o8$oqU z0}tw{;p$|?jjwpnhnCG^X{04y48eYwL{}50hd*Cc71v19ty z=X(2~BW*eR{k@^H?QZQlL(kiG{LxO&-y3c3_8;vmAeptAk%{6H=vStGD0R5kD20DT zGOO0l@Dcoh2BAqM9hK&x-oAl9H~=sN>{px&X9R<^DEZ^De*8xuiTv8p4+YwFWnoOt zvPRU?iZ)(E>RV$IwxU|=Q>AI=?jwE|2)xa{;`@(+#4xeQ!u}w2GGET-=g4V;o&7Vb5BXr{U>iw6yEL1FS51!7*Q?Bfz$sZ}a#i!vx{4kU|G;{#TAiarNP zk5u+Zs__NO!)C1&5kU8iKpAgRl6H`3BFDJzImSIDGWEd}=O5_iEj%PBuWvNVt2?Pt zeie-Nt`H*P@2R|H?dmcBGaHQfS;BpNEuU!84FEef4Y`}BoBBkycvRXYG{jqCgfAlD zl!!zU|0&+(<+1OA^!wQ`yIG24Xbu}s-n=ehv&ZajTy`1r5h<;OYZQ1AT)C-tiPvD@ zYnEpE?fEct!OD<){fC;Gf3xZS!9?L$=A<8THlte{e3Y}|f+TmGVV$>W@Pdv4^Wppe zgJ$rlcn^tBmxriJOXp`s)&{7x(|8wsG`+q}W6t0Aw|UPUIKxLfzO%hI*m3qp+uV7y z+uPmggYw_w{RLJSw6aC!c3x8J^C~2tLf;HAnEokh%@NJ1Js5wB0 znyXA8L8X4R*jbNhrTbW28&t-Fl93{VRHPbh7`J)lvUI|>O93UnL&a2#<~q3$%jHb2 zz?rCQDVz)VZ%MT;LMZ63COpCc5ARD8tiE*`6a@_rfd><4uUJA#wELh5dZV5Fo&AyP zxO-b$&h~IPaQ1sc-|@FSQ0zT-XQ#Kj;5@CKpPxCq8eDRq_<~h1hMgITh63Fr;(kiw zAg}yQVU100Rr$--4OonJ@+;9+r+y{MvD|~y|6He$kopbcoWw8gVAJL5 zAoE@mg7VQ^9d3ISs;DNw=Wrv9Zjptnd9lhZP=+9DUgB)Emas@Fmyy^+0p^+pz(GIb zWt!xpss~$H%?@91?R>zCb*eBIa zdOAU)CvyZUhQ*=o5UX@b4AT*CJC$SDu@6AULcor-dPTR)RX4}MxB_RYSpt$*u12^3 zAHr&KodzDR$)>w%Ig4Wl4avaIulr)LFpMiN3TNZVb6jl*z8DBnDG`D$FYyt-Us8C2 z1nEhVBAlNCKfRPK61c5?cLyPVq}90C*lCoy;ZoY!?`~B$bA*;_shL6F-p^Ikv4bV;S0~cCP$+lRLrC-LrKwRwQ-WY&Z-H7Xj@1!G@#I{ z81Xm<^~Yr9hAgJ#C}EGyR}A>{NgbhqUhe~sYf7_kICh;7px0bDJaaSvs$TMNN(Eeu z-~L5hHfV$|!CC_A%$Vo;ICigbI3^JrN7!8sqCauLe5u4(kIEPm%Dv0up1Tk-n>qzx zC$nT4ctJEXJCQ4ObH2jO!y!k{vt)e*-|BztmEuc8L|7@l$&1fv29Vv` zqO!#ZetrDhc@7e37=0i?mn>osFUd%)_T+vthn?ZW9qsJ&`|e=q><>q~&i0XYFs(L=PAX^e8fdD zc~B#CzqsYJ%~JPyd$ezDdA|b}`Ez}WD??DmS~fAMW$kFzCvMkmzJP1?!Qp;y9qu7m zvtS2{^#F{>60a1PU8L5oIfxjTlNr4JZ_ohj!e3yGc92rymNhd z-f_aOGhf1 z9Fi8&3spOJlut5+nk_-{^v^Jocv`EYg33u470y%Ei;X!1&|L_XUs>wDxtu6fz z^~hH^DW1HjulD3cG2%>^#LYIbB58Y5*o(qQoan!ZIhShIotVco}bt5xT_;; z^=v{QZlEI7}7y$JKfH^Adjesvu;g_1+o#>SJ zOVclG7zo8*ZyVfK{eSCz>^n63_1m%P?XlfleDu{qjV+PJn5AX`>YHa3`U{<1w9cNmQzJm~-#)&7I7~x~;=;ghx;2 z<|m(zK$9}rsbe6R9jL)+`av>}ObSdTM9N;S-?4Z$QO)6GD6rzo_~QA+I3tk(2>#`O z|FsgS2}QsF1**22Y5I2A@yNzL2oH}0N&I~L?M|*)1Z87tu>({mTN0{H@MIA(Bz2u8 zG5jl16|1a9wP={VWCeDGC4q;bondd+A!CtZ3mOPW(Iem;^zcanAFwrLHjq_#ID@7^ z4@~lEw1_fO=IF`H!*fffwyk2HVC;d|hQ=n6W{T$>tg%T7{~O}rXjFdlR_k+S)Xr`J@98*hS1?S$QcxI~*c#nxYe>}WBxH(j zmEaNfn%0E@zS{i~8{XO>x_5z<*OC~wqwXkBBgi%NQp>W^1XXYmy2 ziS`XCz!dsIN2}@mpx}9JjL93jAF|repMNC^)+(tB3g0$jR*KKOheM98#ktWam9?Ku z@GvnUDWN`@3W8hW&^!klZPzhzq1Zj(s}ASi@l@{zveB7Ns=4A}-3#x#Z^pYdsBE;|yR{<~J}R zV5Gr<3RLKsf=;vI(oN1$=Ug-UklV^o8vFs18j6g#E}rmtpJYnc&03_*lZ4B?6IN)? zY^!elWNQW$)>XK9agD@h9RZ9~C}{Q^o9)PMH?&abXsMZezr|2z1C|qd%9|P`NdU^R zFzgO;&}0$QKslgag#!3S*m>~&RUAZUoXIkpZ*mQFvMO0Nc1eQuj?rMJpxn^lNzghi zw5Vsml%_|c_!XTlS+nk23wjk)=3Y)_ zW9Y*ej68H)iQ;smMY*`poL>4K^U@_ZAwIXnuB~Mg$rW22y*u0Lplb%F>XyNz;OJBM z?A)rSuausKrkvQy64boQlM>qE%W$biqKJd`(JLtY1I@(?b-$bhXIr^<3M;qtvTn8A z7APQ2%93mPT!^f4r-~k|xk(av0j-C!xEOJmuOboGdN;QbAX3?DS3K@J2v2u_zW#Ks zerNw}LELoC)i!m!YvmGw9Mx5brL zA<{9L=&+wJ`Q#|(E?w(FKji*yVIimpAgI5dV{dm`U(RuNp$1Ky+UQ5SHKq9ZYk`|m zPu6b0=j`4vx~baLyTeJpTx_31MMvJBZX4=ieXmI)v(#Eb=%Ivm(mrWGb)tiuhAu#s zliZfo^I$T;-HRM+*K7Ypm>p`%6gcW`zb{PS43@GsJ_wS#5F~}$@v1txdVG5F$JGvN z>e}Zq?HjRKpF=RvR;AqAY%d+8(cZ6YsB=VSDAF1)6BKo_+e5{*fq(g@|M~y@KmVD% zh%!yRkb^)6lo*x%`+vv>f5H}xREp2!;%XdmHEW7*UuDwUOyw&jEf~WR!LDo1pIk-jd2?Z~f+&o3UNAE!}E=fXs zQG)S48HwpbZoQUZa}`RXVx@y+Jj&&Y*p+*1!KhHkHlcF*u`=M(hTCW=$iDD(G@VLU z;>~;ppFDwTK5yNnV(QF}S# z%*Z3nkWMhDrsbK8AZEsq*RsX{tx0GILLNAH&1LjHh4qhUH^w8l9dWmY0TT1|4LOVX zIC_uwoV3w7mYY7H_sH9Gy}d1G>rvl#wjcEdjyv4lbsh~|J{-7%UTO6USX|qg`^0ssK=}w+6$HBT7t4XPK zzc@~W0jYSv=ih)hxSDgdc4dB$u4Rp*z~H?)28h7UY{V@mV=~aiHH4 zLh2j6eVc!`UI@*~M8ro?#-`H2Td5M?@6Hvmr}ic0ZTEu}gWGCkuZvP6YpP=uGBlOX zY?sBRsdU=z-{v)%78=GK1?rf~VGczDEh$w;aWp>VW8m(TAN#UJSQjQdbe=0pD%nK= zK(AB)5NahDIp;_bfjIm=@hyC;&BH0o9FIoFIhKRt{0xJG>Rqxq z45Q)Z7+T};rT|GJhcCNA|N01wIa%ra^IY#ULXIP#&ovXQUzItr~}LjU0usoM1xAJ>z&nX zOuHxY1h2+(wIge4j&8YSD?p0k~H86;8&s`6!3ZC z#Q~j2Go!TwG6+;xG2gb2 zERKhcqbxnOfNWlaM>(*Evmm6*(lRY~62PS7jE6AYFqQ%U8wPx0lO|oDEHE=l_2dbkVua|#gE2oixdxD9dG_+n zTTu*Fl?nWe;)b%4-;c*&izRAUE#;&LIRN?5?S0M2ip*FiBQ!A&)7&ErH5wg!M&5U)TAR@ERZVMI^oKqi?@QBkYH#=r;n*k^bXs2v|%{sJDi zD+#oIhb1ja21#l0*HN;1Gf0vdtQal(>RwC!Y5Etcr5 zFowjc!J-mt6ww;1Wx+T#z~YiW$aS1mP#rwDXmNMh#i6(rm*Vd3?(W5*xWmTXU5dNI z#@*d%aVZ;z;&A!r&YZaq=OzzHW|HqIlgwm&Sv5oqCX_gsm5$49#2S=FtnSQ6HztQ{ zS0X>YPf$MUh-eS3(LyCxomEg47>aU^vrknv9~61;ukNMMB@R%0tH=`5dG0r2Z1iH| zG{iqSbY3h|rw3Rt*i1C!8>}0K|l(M5hR2u%-A-mF+d0 zxVQ#UPkb*k|N30p-agCk_uo)_U18I7Kk+-oHZaFP4o%m5d0{qWpK11lNQv^f z&9W?kD%WHzUsko<=v%LmylSEZ*f$1PJ*Mt5y*Yk25@Z<2pC78*_hO+zX}DdUIizkX zTswftyLt5b)ex*0oTl}bwn3m>u0I!izTfe9Hs3zE2)ng~{D{?Bu)EYvDxK(U93Bf;|7~r?XancMQ%$oCuiTSKH zR*wulg+bgpI^(+k2*5_3BmrD8C#QaHb^CP-`m~VPwF+ZwbIHM?kbF@U;^JU_T_w=2 zL_?PxR=)WZnxI$8Uw2n@69-&jngNe;`8nI;#^qD z+Xwy}fcQ1yUG(X(tivg%?5{5%^-e%0hR2# zS2gKJ;*8$hYMejqTrC5#nM)dHQJ!Y=HM!~^g6w+SVW9Yq!#~_V0XUSk zvDtWFF#6Ax@+y$%R?27c^{srq4gj5CtLT;zH<*{NT?BkX@i=*?l;ITnKlUhmar@x$Rg{B!mZ-5%G=o4q0UJ zGbKfQZ9##ACMmNQ(I9_P#u(W6^%AvPN{?^GG2qv+J-TPdzT;{7bEoJ*A0BO6Aj5p- z2IP&f!Y`@(do&e#VQzv@XB=6A$I0t-3YB^>^!bbSt8ZPATP&W=4|L&TePX%aJ|?b? zN-&`flDB9tAKi}-#$|+o17pz>*1^sK&9LdwOwU`Q^HrQ?FPV8OAD@q%m)qHa&9F^#X-)}D8 z3Dcy!;d3))q#ev0u^#oQXW;Ly)9++zt{(z(c%athzzvxr^66P4Oy$XB@)pwQ;WJkc zDvu<{uwHMFd+Y;*JI2$3NRf16u|LXZr4+DX4X{&n4I-x^(7dLz#-aL;AC#s- zBvua$2XmvCWe7z?eQ2;W^TR|G^__iC;}?UN7eW#aPcbWAS}-_(>>t{BlKw-(euyj* zWA&^Eu*D&)1zKBvT7^y!FQ`_c^JFvP{ErGChZ$36zi0}Q-6&7hTk0l zUYA!a(t%$>c9bc|v$Ukg*{k?5(``oPYQ~0%#@Q4T_dP8c{Mz&;U@b)*&YyUuk%7_Oz?O| zS<@lQs!af>&`JLdtzw!-IPG~2-KO?VJ{%D{yt!IuU!r-nmiO=zWMhgmJ{V?zJ?0!2 zy9qSPR@Yo^?qj>=l^;S`IK(cJjIw;P6RaF(WV=HZR_hxvgOf<``t)c*$Cu64ujah8$b= zuR&>7LZv)j{Xj2eQyle0G<4R$Fr)a3SIw4m{7II;*bGE~}3wdr!Wx-Nj^Dv2si0dSNtP21z|($2sn{7X8g~+hQH|i6=Nr@6?GpNZAS$ zXAaVL347K|Qyr$r@=#fpRK-op+Di2;U#Zv}7w7BKpim@iDbLw$EE5l(D2HrbDFMj1 zSp+faMP-GkUbEXp`sQ^4uO(fg|1Cyg>BeJ!k+ngz{RcH{w1SFdTG#`qr|3~yb`M0% zGt|)f(75h3kg)5IDH*iXKB`Q%P1MSowzE->w@`ECUh`TJlC z&WnW+73e13sP%-OHU5n%8()g-h>%_gZi_KV_#SbJK5p+sI^rRnF->e|^NdxJQuq(I z3D{84Jd*&E$2#$*X z=sEI-utdCAmSy<>cv(XwAqLGwp25@82=_ND<2nar6Vk#9f{_%$U>rX^@$i@#oO0t@g!fIL|$9Dvv*rv#3wNj^fvb#8#F(^-NR1t8@6M{ z1x`Uy>EV}S$2q5|7_f5*+4hYXirdz~c5oTHz*K_9dw_E(O0@8jIsH@|SITzL1fymq zchZR)J$r~1gVb5;f(^_I_0!2^k*ck`9W8qrNW;1vL-tR|7HkGGd?eBUs}%_1*`h_~ zb#?ujR^8Dw&u^&ea*yA7H|4EKGewKNO7*K3%rdwq?o|T!E$~`2h9Pp&X}t_feDL23 z7QHNTk>wioWg_?fs5+~lDM5bCkhzKP8IF_{rspx%r{GXJz~WI8FzqB(%Jk?NzTtR3Z4BTmj>zBSZ>K`+)4(fi(C@bu_5C5bW1 z)EZk7gdtrp%Xl}g8_|M6YGidP-<8sZU=MG$&Q82a9OMT2fdPaXHnh9-}nW*zO9}CiQ5Z@L_I1f=^>BtYsV9_x?@Kf^f zwj-LLEw#L1rd%6>8NZZBekvtE)5<$m1m+3eS->fMUND{?Iy+(1Kqff}ge)ry^IC_6 zlu6wbtg;4}^r${og}5KllRLbOFU<`&=j#&z>|BVyuv;QeDtswxf}C#AlTz#Be`mBz z$MZ>TZ#($QO0Dl)K9m>i(78^5oR)lZjjRE?c|z!LUn&_}kD6dvS_P$^t6Ek5g8`9n z`r&(rxv;4K86$0oPCyDbQIq1uug5TVYpi3*+poLDutx$ikF+M{U?-HW7%hj1N?nK+ zFG*$O;_gJeeu8Ub%0vo!Z5~J*xtwC2iBqNbRD~0 z-nz?zGw%Xv7*I6MG-Hxpxd9F;H zOc9N^z^oG+WxuIljgCiv;%IOVn5-q5d{f00 z$mr#OR06I$`L+GzJ?B-;<+Pxp&rrQ@Rd?jBGYxSR)g>OF4u;G<6 z~^>P|H^IcP%iNsE1_R8V{_P;}PsoJ9+ueXOl z3wI4o^-wYI$^Upg8HxiNrwMXGm)d5)rEPJlH$mkFJC2#0(Dl(WhyeWyJj#fUo{g~% zxXEmsBsRV0VR$K3n}TVf0?AB*$9|b8M`T`vp+0=$s|j;o)^53zn7zus6)bF;R=){BP}E3WpcnTb_D$+fXHAIW{aFMpG4u+a`Y zG6PpB`Kpbl!G+Ze2*$3@TSlZ8=y5rS$SI0Hw%$B3ucu&&tuzy-u$!QWnHS~Gdvr!8 z=!e|Nai~e7&#cpBsya{{LP<^@n^a_^LHD%jpl``yb(}3u{PboqB#BAa9FZ$BV|Fy| zUgCThFSgFYoqe%25zy8`Us(=uzc)7c?B42W@$4VP?G;TkB0lX{zC! z3|miY5mNajXuXN_C~r&<7`8)w$<|yim%>Jcak_-`oeYzjj9yH39tHrFHR~25y>=CD zQc#WT0C%V;J#X_C)%^plH{Kn#PiB&>5jCid(R>n3?TArupI5+!Wa3JUW9Fd3yV@~t z2C+Cg^mp_SG#+jF{xcE)L)$}N*JG}NUXPuRumUr{5Vy{1EikE}gl+L-q^mByp(g7V%)WwT7>O|p@i zw`M}-N<+i$epQXq;cufgC)@F}aLd{QE`zG^%r9K!=asWIfTT6&<(7tti!fllm`pC1 zlz?@}_6|KybfVaGgYDuFwY#}1qZD4Y zu=wb>fVS>nn$q;gUpS82nAVj$5%xF~iOgzwL`h;a8h63{-TJql>!W2Hzc50>W) zQUXzU9nhtxJ;lct98c>P$Ot3#8L0HSJvFCV%CwWElOwmbJR4=V+)Q>z%e>_CAQ+GY z83DJ#}tN#x!-Ll57KZyn~aSp-T7WJ6$` ziC7^Py$B+n^TLuuLMy}2;IU> z;4fPCsEa|i97HXLFAQ(bYmTkaVK7JDPQPUs(=VUt^ye-xuywX^*jvbAf-PvF5WD?4 zNTfAuQN$7oT6uBlR&hM#NW&Z#gyD({O8vO|3FV5TIB7+C1-|aIw1gNBt!R5V!#BB8 zp*!Wip>Ct?*`HrLpXFM@@OJbCemwVL=X0;yf~ z%FDiLk#v=ssh01lxI&;FE7+$SJ!;6oDav%Ic^;$wOOeegMNn9JPL zH*%R?ccF-U&qL{NylYwt{&r1QlpG(X6q+U6fsWmxmLj6j#b4>{Re?olNkk3zPtD=! zB&g^hBA+(ppVtlQ!tsfJg@!{*E>8_E#Y|nH?l4lRPP;ep7;a6dt7v046{Sl15@B3V z*uGXo54s)nZ*djm8ucwSC5s_@NIAf_fyD6Ij^ag#8O>sZd*x$D&2c`9+Z*2M#rncT z0K`O}m}U|0FT(TKVtDA(1tkB1HxSsEbj?rsO*PuZMbGY8v=7QD z%~$@lP$NXE;Zcf&a95zwvRdgc|9IQ`r4Zx(J~lW%#Ij5)OmjlL!7ZxCj9alc;#pxb ziOEVw1Qt9(rH0c~+b62aC8`V?%@UWqg;HvUgj(!aqgurI8`l>vTsHoZ?uU`0VMW*a zUqmCVd&hg4zM_IuF50Hj8xMzf&R!riQM~5b##u@`Wb@2%;-8X$an<3C+2HXmr{c#B ze)8-ZvzEC^TiimiQ(+#C`B+Z1oDG+XilmHH(oZkeXmE38#Y_fgcDe?VFE&ZG1i zJ1!gVe-OaU1)k`1_sCbUDxV2C;`iL}M9B5qvw{eDs&q+`4BWaqGq(jezX?`b0v3FI zZ%->IT_sEbBo(EEZx*sKj8C`PNI$!8lank9RI|J4Sc_ujo=s^xl%%YjwlEg`jiOIH zWmjW!ql$eE;i7pJxVO!5CopZq zcg#;0BCNAGw?tU^zg%knIpRAoZg7peA4U3tF|dZ(~k$euu` zuJZ(Y1JeS}E-RhietkrZ69PoJ;g5SiBEkZznJYbLJs@jBwi#NAo1|ybEq=|Vo4;Qu z?&mazt6QvUgcGW`;ZY~^AMV>AV4bg}YX{o$>=qU)*_w-(KrPtucArZ-hdusBWKA?m zpVMu46-b;M4FgdH2t5i(vk4Z;68ENf(kM<}8J#ZWxgtzBwurhuRh(*pB_<>328GCe zFnKxEZtu@^+PlSo@c*Ff3bY+&ztN~*n)fY9c{DcpCzP$e%c>%;I&-Qa`%(N%4y?lr zEn1Ro*cyEeiH8;L1xzlQMqqFjb~3Za2{F08Qp;~WWazQ3!vI|7QB_7fhI8SBEX48e z;Glo4j((KwJ%UP+ZqQZWGhiv$nxwt|2gw4zapYAI>-cEIRyS=FzQnF#;k~=n2>>a-uwoD8=nVLQImt)91#0qfu^b>eR*+;L^f zGl-lMRlAp*VLtUlH?P&Y@VssOoQlwlEe#F=c@{{!gvmF0mjwjed`fYVfZVY`<^BWW zir-kc>h8&Cppm-OcCV8E7}JBDOK9PiV%`hbnL7L8PJkwKj~q~erLwK3&!~7!$U=t)#KS6822IXXm=)?Jd%xnTuAtlbi|A5wOrVM5G;aLT?mGGhzu2ctvUEBO# zI3${zU{OL8G0ElF1hpK0-14s8no?WugJXd+M+5DazX@N#=0mAd7roF;n#< z9olFPG=>P~JavrqWEzLUB|;w~`Z3KMr%$ILZXKc~w&kbDt%;r-zxrK#LID}_%8UZa zf1~)wyuAW+TTF{01JO35gbd!4O1g1Vu5GlMA6|TDuiO@*T&88t1h$SkeY-7sEHAgu z5{i9(?szRiC_=2)r*cC(bft<3l@KPMt#szCly(S__T0n7SIdJ=%o|<8atmA&1N=W0|<1b$^ z5loDcdI^8z0qVp(3duG$bikT2^PZA=2$pfCm|%wgcq(^dk3xFP7Mc#*zyTD0ekjmt zGQp!vZ$GOqT3LAS!#_yp1QC2G4f$%Z{l7tA5&sv%tFjy{+<#M`K5OV_n`HRk=>GuiTN~j3 diff --git a/Solutions/Microsoft Exchange Security - Exchange Online/Package/3.0.0.zip b/Solutions/Microsoft Exchange Security - Exchange Online/Package/3.0.0.zip new file mode 100644 index 0000000000000000000000000000000000000000..aaa3009f523db506e1163f603d1b8a77ad0d6561 GIT binary patch literal 25180 zcmV)0K+eBVO9KQH0000802)phS5LA$na&6R0O}n802crN0Aq4xVRU6xX+&jaX>MtB zX>V>WYIARH%~@@4+c*;be!%?)LU%yyz?Rbhhdl(>U1XEoUUBJdkYu+XlAxfavCIoa zYDvnj+wFh98A{ZPq%@pZvscQ}`B+d2Nx0m+@38n;A#Y$wZyPa^I7v zNyEbEl}NpI#NYZI9AnMdxH91{Dg`4qbl@iT*fk_erIE7$%g~)E8o4?Y+N06Y@q2vD zSqcRp7nN)nt>VEKT1vh4M(l8!c!1RLX(3Z_!k^~q&XxZA0Lb02RDz-aL^r*-i zlz8lwMWKzGNyxaI)o_^7s`N1Ba*Cmbt{*e>kwfVy!<*ZHML3cqo~9n3T;fv()*le* zGzJ8(UnJT(dqj5NF}pb_twW=G^S4`8g0oZZIQmygNF1`bJiEGP#}}{KLtq#gwRH$k z)6!PQtNu@OjVVK$8A+I>$a9(mo>N|k9~__CmxW#<)R!RTxbkN$Tq#dz2^}vcY=8fP z8-%5QKBVV2+T72zzOPnj@69=>#d3;fKG&t|1Vn)508L)i0I4zioejAJ{0yPk+uYzW z)yX)TbaIa^=iTJfNlW+=8R*g^a8X6NPkT3A3f4`kKL>Z(*G(3mHIlnhAKJ)eja55a zqX})n6R@))NS}FdU6v9)#jVG}d*Ktrm?A~uDHjMT8+8fq+J}!_lS!TMo#w*Qz$uot zUr-eiDFTtQ`@cj=*bPi3Yz-^}#EGjC4M7~EvPx18iv?>;(bMi@?@-Z7STUCnD$WC{ z2Z#P-bXg4a=ag8^-U&pTqJrj3*<}>I)?WhSwx%_q(JgKYD<+*A&v<_Pra4MiE4L}2 zU!R+>j*m@#TnNORGg|g{X)Uh>og(t7b0H*EW;Wln7Q;Nfff;Fxm`iB)YKV7Kb>9o zBNO`zxAYQGK8DAr3r-Xy(#c*24NnEo517!Vb!YSP@Zj)Zdhqw@!HYdqc$aq@m3Db? z{X_?z=p0jQd}?%YiXA|YTJkwaBHtYig~XMmmTA?rU3vdtC44~iRurTtF{KV=Eu>_U z{H~SkghVGI>@!2cI)m+tvjd-c;6VB-m*{fuz?>JODj-J{JVtwc0PKz96_HO^O*dvQ zzo!m_IwU)C`kabS{SG}pp0KdCGycX%FcJ=O&!?b*G^(R$@560n^V{g?HrksoBJ;Z@ zZ0|Oj+(urL-ETkcA?v%XIHlMY2GU`U=vu5zNnN5k(C$L^z)rPzGG0;n@Vc)_+AJ3`M7zJCVAF=DIHWJ@_LD{beUl_KRT@qKjF?6fDO204!U z=J>d6ovnqt?qk2QKh336k9hNRpFSFXbx%7W__ENe_52nASg~w^5O&4jTC>sNxJs9% zZWb`fD~q9+*OLdNJ``d`JerqK4~Gd?G*9sa3oXuaIM9U{3)AJvV5$sn&eTd6t;n3` zRH*(<0nYwes-z;70w-eo?PCdHa)0=hy%Uj;-EM1Ra4_!FN|K2^JgY)D2vW}lhjro+ z#v+`2?ABOV4TNDvn$^swejE&(A2D|CvGdS4;qi8AFrxGuq~UAq3eRhbej9?*Ikq5} znL_7!(j+$u$Oq=3sKC*?zwcD5?y%9T>itr>Tf^t(h(@z-kry5-OhK8E9n&ojj{gPK z8J1yV*537CAL#F>nDd8qW)n&mCIPAngQE0kDZ*vrIte5w@>xaZX~1s{@8S5B4gWmI z|1qF;C8jjNWw`N~Qp?~W{ybs4H240O{!aSq#s1;{N93(6ljo z+0saK{S4|e>p;%_;z9N^mRi&usDrXbq5w1>Vz}& zE_9;a$-={^N77!s5zP*1;U>}B6#wDh{{T=+0|XQR000O8YEBqewFts6kXQf!WJv-5 z5dZ)HZDDC{RAp^&Y+-a|E^2dcZtcC>a^%L6Ao$*9{SR@dGsDX!lFTGoMV3T$Q>>E2 zQC-+YO6p_9GBy&3BykD}67(!@uWX- zBlnz7c$D?sUuFsKd+|iROV@`RgI#B1%h?#L`+OS4S6J?ZPo|-p@&2FFIQn9#M-6y! zl)<~7c#;NjgzXIa8~8u@e!?@?cQeG`S9}1E+*x)JCs_1F;3aVyk2B`5bT*yFN%r>> z^$ZabK&Y7sqL5;(<2amU&=|`kLTnr-EQj^%gLmOZ=bRmLZ=;#ufBP}TW{JKwvB@5NBGK-lbF5P2`99MXmK5F}#g~t26ssV+(YH*< zxykhg*c2LES$@sWiF0Bm_?o4Pnbg>%%mHTP$Q8(0*gu6VJPx^s-bb2`mw#66u?P^QDe^o%XZw*GUS)xo!dUWz8`I_(<`+zj5QjJA*=*X_ zl~EkO8#oAhu_3ff*XP^?emw%l3PKLQFN5rYz5ZtZ0OqfpwyjgH8*N@HiXi8z-n4di zc(dKr(&;sSAMndh)JgnD3c~kp61by~n{p6VgCL|HHj3vnUG9yBva(DMmsj8B#nfzj zDG1p}ma5RMfH78`&3w&)5~{$VkMA_jsbq0nO=b}^B9=Z!J$F<+ha+5jqXMSc&-{(q z*;#N9N8{l9&>vuhXUB(*>X7KqK^&qufu&HlQL1A$V!Se2K|X*N5dk_7i}5@yHq;S2sO?xvUFX`%yhZOOo^*sfXMAJ z1B&7v4WfV*f-yQ(*LjlTb_%tTrims>e>$FW4=2FDT$yTm*IQn1=-hIzt+wNP&TJkevSCY_kDGr`t5nM$SGIiP^L zQG2b30Q98t+K{puxh6|oBOZ(<5glZB_C=uvgG|v-@e5$lEw9XU7Q^GY+KR=olpSkD9u+#jwlQm+_`B9cvmJ+S= zqbSbn*mV(semCrD6Y6DtER#t!SnlNlolL`pJE{En)lOE*GTU3(JJ~txn{;StmoD_@ zjp%dLb=O&2nnZ}XnP5CLLY zV7f46mkX}Zx!jHn2ZecRRD@evZ#}&iqs*Uo{t|3K= zo=FSrMJKoh@Ggi*lz+z~o&?^Hhn6yRQ$`oijQ^u_K-ny#fNDGa-XS#PvThw~5jke>`z%u-V%6Z~WFaBW$qi35!>SG-a{NPRz47}QH zIf*kj6yhx59>)z_d%IK@Ei}PD&yEkv`v};zvxDai)kkj15%a4S2zCG;ZI9pDiIln^ z|M)eiR9YQ=!ri!w_>zGrzG4T3VT5tRRv7;fq#47VZUhVP)3fs)dj{=aJq2NZmckDJm-{r%(i@;9GRFzXw1w!X1o%Sy z61r)IPW#uAGdu8(S>L4JNigAT4~Flbr~XA zhdK+TkartkGeMtD1$`cJ4YR(amGkLEE%=+}l=buiM$-R*UtNo7OjZF^OaNu?0BRxT z#lkx5%`q1tZhq{|P|k>@9iW8VO(Hglp}0GWXPE&4A-`Qwwi?t-`-M=Lbu!k(UuP0W z0Vs;=XqEvs@Dfz1%((=8Jibi7h({UNhEA@=2fhQ7z=1Ya7vk(zV%`B$yPnja7Ue+u z3%gjxrE`{M@uXp~Y-U}htK@9^Gas#|Ffmh;w;IV*(i>mb3p3!YlBI%=Jm6#~=<26z ze>%nRyM=hQ)Ieuu9jhAazagAbuLBGk2hW|L@ z(}h&e(qMeOw)XPX$+IVGYwY9#BZZ6JGwFQ9<=tgs(~+U6=!+*m;H=K)1AIp*$y~I! zrlj-r*|%{Rf^~+&ks{J0@VV<3@nx@f=rnkf{x9gqibu{NQ||$e8AjyZhrzx zmNeHLGo-FiNp8_NqDQO5jYb2dt>>;yly|I4jhsfOfbH?gvm?-u9ohSo<(|Q{wFdp) z82d&k+Bn6TJ$}Bnu=e%Hp~`V(D?eZGhzYk&lY>@m7xZ+8ad}r$$8*E*N`mEnjX%gh zsQV1aKP{caPu|f%pFNE)qc8>;h3qIhJ`TcWtyx1V&94)HLAwr__C3dAf;<#JYZ<$r zedx@2*I@2>nrUY6TFIwA^{bNl%r#WQK06R{Lk?1{gkWmXTx0|fBeo1Ca=MH%ErgXL z!4bRy+s)!3TuxaSp99Hd*nSUW>GX=mTe|ku@Z;d4=))*~1^BKhxY=jN?)zJ&-$597 z?{K-m_$fU9k^yg@M(imcqXQOck;^1pI^6V~SYPnf1t<%G;DL1={%(mPx@t28|?PO~% zP~*1|pJtNhp0JW&r!!X#h}EK0=R~SOV_`+fGxrzLs@jTLjVOX&^&rT7hh?!L5r&}3 zruky&%KZfvMDV^UUizZ#30moR1Zoy$P?Wj8ACP7)w+moRh6M+)@ZvN}K~7$9m?_8@ zZz_mRlfc78dNQ*CD(lp26330`tK_7yL?eM53fB2QhOSL_H=L&$0<>`QhTo4QIo6}n`8j!e!GIf6KO@QItIu@|`Lsw|UfZ4K2oV1mOJN3UL= z?7uugPWXn8(UcHCsbPS!3`=JHK2t%oF6T(}*aZqQ1fZ>ccKDQV%O4yi!Ng6j*bn@Q zt$1$4M%a&OV4m&MWLWK?IKAY+W$-V)Dq{sQ!Ug)!ku!|`$Y8MhAR^3R2Po*m2|!Pi z-c=C3_f1g+F&6$D(8;S-eK7Z`9QrMyug;yJK1)Ci9u_<`FlLQFJIccYP#ciae1 zIoJU1Q_)v4De&lxk=Nk+JEiVjuQF?Eujo5jh(ZRb=pOchLQN93vj6(UDpO%3LNNVE z$AEEZ;Mqm&lQfp%8AO9A3dh%wQGIL*EF__LA)K|fr&6Fw&kYDgq2hsL0x8rdtM@c} z^M^OG;E60)u{Z>hSxhUBfU(-mEYV>G4%HQaR!<`^5RT~xu+SY7KIRF!onaZ7jWpTU z)_U+nQ<)SG=mpB%wKa7bdufB^}@zE#?a0DKfD znH%;%6L}w;Q=73xRjqhvr&P^|y!!&3u%Qr&abO|SB#r5LeuhQ z{@w7~{D*8ZUG0-RQFG{jVEew0QbNdMmh`bbJx6obRb( zl5T>dKqR%>oUM#C7dL;?#}TWDg%>(}lf3|&I^;dW>iQ1DxnQ}SVHeO>iJk1BWD+I= zEfuS>;zHg*m-u{Bo;tA*$mLm;6x}6yhaSp&Ov(d>zZ9cF z@=in934s;dD_6@P6YELdf_OnqZ}pY!C4(>F^>%*%kl^cUz#F4^l&g~%t_bXKf|EA) z1HI-`E@u%5cC{Ux%YA_%?g1FV$TT+n;?OMjswHr+(q%%S@{Yz2tYer@8G1`-ba6VU ziE!xxDGH&0)^=$z0^*AwBViLxli1@axyK{^Ayd6rTf1w{KPY*$)sESLa1kxYwgr$? z2RAOkS}jAbMWv85UdO=dKBIuGC#${Q!i46)kI^r|RB(&*rj7$?%KwMsS1-j= zW!xVf55xl;P#O~CH{ig#9+0PcVU;YUR-3T021D}-70mdOC&w2&3{m4%GNCLka;dN^nqC$tNdZCHZ_#B=aozDO zrGZ;c^AQcA0%wcB4I$Eu4jzf9;=7-L&-8$Q7sewuEXJt*Bm=PTf(ukz4Qzm`q^prC zF#-SJdLby$%a)F4Zjf9c&J?NT3ea4p^g7F8QK;V-DUY(A$x6dY1D~4}(LV*Iu=Iyh zoMei?408PrDCJ<@wg<1(7k^&wRc6hn$gil613F)}cn7RH0 zbi;G9^T-pS1COw{oSS6rO=e*hOhYpq@!q-oa@U*~DI?w&PiY9ls7-X;iQ`aPhX!|a zLytg}(}5aLew_L!vc>z#_JG}DH0X5aK}z3Xh=^p^%;MRr&Y16hl)Jt#P&^@TjI?ij zNmVGFE=){VroM}D9?=R@U8;JjwY4>c5=`D>P7Kp$e~M>hx@$xGyIJ7p0a2ySh!yL# zp`KIkpoKraI6Q-Id+c=SAM?-YQXaxWC2IlS^*A2DBIM2@=}{9DRm9sli?Tx0z6IiXiJ5f&@PF2 z(&0|C6SH#|H{fGfQ7J?lDWC=fWiA14&L8~w&LpA zvww7mML~C=g|n^fT{FegYJXqHu!acvJXzekwx1eo#Y$||W9Kx1K_QC^Bd>~RAFNS=O*%3bvq6m#4 zSgqF9kc|qqU3F~+Ol^LrT2J+|cwW#madQMiT&X0et%0xhwDR5}LIebngQ-U^I_*;Y z22@Df<`Cvb7Sd! zp4Fj{vb0iAWlSjKW~ePKw*8v)EDccQE@{vJjnmVXBqa9jW|2SOm)bzzI*w53oEvdh z2py!H47puK~6 zLWnsS+VZgSsPv$WYX!6Gq!ZCIsX~xBk`n1EHRTsBc0fu(J#7JCpK|F+w=C(Y<^wRV{8LpWw<_k; zbMaiE?9Pgg)@j8;aI7JPZ3(Ka4 zw2t+1%Tp-SrE$E)G>o0nFW!T+i!JFEtLFLw=@pk2ORKnGI>n-*T%vbIw(c-ZZoamLg@rMW?Y*m(^`Alz}9quZD|6lewPZE zn;OxUG=Ob``@2g2H*ea%+hD$y^nPs~yYlv5Q~Ev|i&d|aT{s%Is|aq1#6dp z&3ltJuLCFNpPJ6#=lbdK9@64fKlSlHordCu)8F04w0GB}(2b_IyN_w@u1TNUO<(uv z($>{Pz**zp>?E8!_^#4q*>O^8W^M(-GySR$>E@c!&CN~ghqQ9{H?7?5Dr#NQnsrDQ zXOEU;^Q4Dskwa|>%WTzen=Y+s-rC91me%dMRJm!X{E(jQAwAoDNYA!70+BHqYPn$Mv@e~UW>C%4l>C&#r+1E&m_B&07c1?oMmG*4$ znJ;GWL%OpL>CUb>pw~}pcHL3Fu{=k=_jG30dCTG{@x{;5)+QVHL@giAN@2w5V|^Ynw}dOeu2-wy1P3@uWY|yCKFt zp?H_B4>tz8f?d}0pa#`Q|IcY0eNhy_Dw{z~N*BRRwONWv`f@3ZU&FDyQ@qhBw%^9* zX9Be`$iG@6CsN^R#?Sq$cNDo$nBm+BQrlf|Nk4HfE8 z1M=uzwc!V4+tE{nvN*(zoQ6VsI36yJM^BDROGmKQYKhJnF-4KMf>8>n%16C2&&cOx zc*cO)MzYMA?s>fO*oP%82JU683CM^4 znURSguOo8{IPRr;Wgef;83SDoVwOml2B%oshS?5N3^UCLLSmQCY#q+)=12RLn_|U{2qYV+<2e8Ail6Z=x@OC9=;!JE3ANoBZiH@&;>nA-#r6@u^64P23)~d$k$=1r*Kj?Mlp4a;5>vjl~!D8Bu zb^8G-X-$m=ZL4MRx>P(ar84asPIKEpi{(-tqATMrb14g}ydlk^FeF>EC)c<>^!p~` zv|PM;Fr(ezo0^#v7jdl=jn;ZcOTlwe=*Zl;l|}7?&PkQUShdX3c^nk7a@w3mxsoko z{^W-mR>zdgYWON7dq|_K$~~k}=D&$F$}K{moIklL1LpQ-wWmTBIF*Za$${LlW@mAw z>fGEeLyd2;gFkdWN9)2)&U#tbA}*J~%5MoRtsG z$_HoVgR}C%S@~HxD{GvTR_A2N>h9uY{Vc<)eZ?&(bTUN^URMlu}HNmW7c;6x@${cK~_YgyI8&=HlR$?fI zzm*t@;q_xE?29G4u^5V4_zy7@4>1%EF% z&v)-M`)e%b*WAgdz&HSk6tEfvRo`WfiwWM45V}? zu%$pn5P+hxW8a6-nvUK5R$^ef+e-0ckNMok1mz-?d1+l?JlEq=yySE=3qnfWMYk)t zEDg{+VJMg|vMh=t2SbZ|H}S;;z^k0ki45Y_oBzfhQo+d8c@`+j2p|NwkV1rMY zk5?Q36mheF0b3-q)aj_)Fjd*2D1|Ux51N<89C2Pa^8w!245CSrx1kRSsms`^DVgjB`t`cDNLEd6?_l$O(_C#Op<@J;`oP!00G`VU4?jx~p2LEA2$eL1G`k8py~^BCN{?{SRX_uu z-tq0-@y7V^*ctm9+s+pEcAVYu_O8RX{9SKzw7s)C9#UP8harW#Q8kt0OM?~GBE8e( z(J$#9Bzku+OHd&dy!TX(xIlO|GN53IQUO?D@%C>0x(r|%rgW`?qJh#cZZLiosCBuySx0+;1M6)XwPX*P);^Wcg1Ub+lu%$=X}Hm z8_tM7dhBeCcU))J-yJwxBkz&-c*EP|gGV=rxSsOg^Kfdx9OOxo*^z$x5uW0_&<|5s zaW`dmBwOz`arF;>3AIC{z}@*AEb{ZN%QuHR{v&617g%}A+uCw=eBkG;q2~fi@9u8w z?ht@Zt!Ug!_Oc+8CXw-$-pHN}aUQ3y zfQIA=J)kl?xe_hf?Re?T**iVeei8V#sy!ejr^Fxj7`~_fE4+_ox?wREgo8l!B!)*Q zg3^ol@~OC32A+&TnDdVcxf9Xz4ft(dz(Y7s^y(ky8fH+{FpJ#o?(B@V_}0MTqajSw z0nF9ip}*q{AA38SkG415t99`cOd4F$}O`uHfUmc;Wb9j3|h?`>y~LBk}VGy0nVN zFOQfFxf@3L@@lXh`kgA;r-m@_Vh$@J6c?{uRlrT0g}{@MnOgyq1ni^H6W!z#kj{7y|YyPKHy0L0Xjj@kBrV z6OcrH?dgXC?WVFYCZ~BL>S;|IFJtwswFz5Mt@WwWv`O<3zY7H3=3nvsM?qqkSY%;; zkUE(!XY&i>wBh#daDzT&?%MhIwrA>rbdzMRy4(~G8r*`yz+9fo^TVjMSV&RmCMLPE>-s?@aDBz#Ot zYbl{VPlHQ0^Dgj01bof1T)#aVg)UeblCQsRsQJ~p`?ZO}q0CM`;%r9w{C$+O;;I~X zl4D)8Y4ECs67%8w0E1@usdx{GPuEDO>nrDHM%D$WwbOVjc|5(kO=HgA^|$zjJ9I{m zw|!@8XSnU`j<>k;_|e9r?ExtN8+@?93WHX*$l=W^YJE|KhsE^8>wQ?yQ71`2AfXqJ zt)M4J?#ZvdxiI-QaWDH~D`S=ia*&TV3i;H97Js2zBIpt{PdYKz(U-ig-R|l7&x&)? zb>*!CH00Fw()ZZnTXa;f2)&5rgM8i#=#1#ML6T;#xfdrs?aQy4TF}IO$IlQx^+YTF zwli+FqzBX-AVkg8CLf?uzgq09C$!Ritgj6!<6gx`k?{ypjW&$iqH`>8~a{!T}F{OB1ZQbs7`}4G$0p5wuq>Atl;< z&;-5l_U`uX*mc~U%}r-(G#Wa)8zbNGw>(hnJ$HM1K%} zW+)p9bf<*-DUE}o@;8MwHoaBlFJCucG1@M!M4P?lm8igS4^sbgokl|Hw}^8Rzql<< zo4W++SMxn##X5m3dQAw*M{{+!?Nz9zngCzGjWoJN7OwWis<1#Af~tRMN+wp z#3l+b*E9eQ`WdfPBp+2X*xG7#_=0Qa175CEhq;i8oxv6=RA_6ZgN3Tqa%JqQJ+@#} zDpZ1ToVnR7ZS2#t2#ucH5vUjzhq_0s(yK5`Pr&Wfj$zL}06hxdNn^bOo$mo-l?tP_j zm^jigJZAWgA4eQYCr~fEA`c>Z`VuBDODlNco^ntWLcD;_xPVl-1kGBhc9lsyxL_;D~OHOW&>S1YH&HJXzEeW+2K z6@8=Fk_IX7I0TG%Qh@qnI&(vo&~lWrC*~^#eEPJB&_J*EfyXta**6@!P6*IzE*zc( z8UR%>-$V+%hX1 znRHEOTFN|l=lb%zW5h4z5y&hqct0f?rW@@Ocva{1e~KP%qt9eaYocF>6ZC>QrtHNek(vs$DqBCz(RcmLPrh7Z^!At<_UOgEE9^9@nvJN9EeW;U{W_MrHTUrFG2ilreAn>@1B~|@ z?>ajhJ7Z^Kyfc2ZGuj?(5BY+=qB{3*`*FM9mBs&?uyJqRro6YYy1!3%-rz>udGqo5 zQ`*}sn&s)|!TrbXMDD*54_5s$1@F$hJT5^uvvv`MvVn_-7@x=Iab&ee^;>aolBMp^ zC7NfomBnjoZRvk#M!v>L@$_YLwWlx35of|AZnudQNxPfEUL3~aME`lhxm2_6#5}&? z=$mud?rj(`U<;5;(P3MQvvlRe2T7&;sr;?yZUJ95($2GM6i0{Z!D z#d=)u{JeI@T^(6#W)lK&4IQ~W1cabL<4>R(Ki>8>J%7CE_!}Om#*g67&Zf(qt>NzO zvDVY!p+nQS>5?6Lfiz1uPN^}0Z@CT1c*SNND`QFMs9s` zg`Npwm<{GEA$YDfB}+*g>NaE%uvDh<%c36eTz2O*Au2amp+A7wbFLE7VAuYR70L25 zM|n)#`~=AGR1lBgUIz3|q{snSv{8yTO;9SG0Mq!=Mk!qvcPr9^5<5imf3y6t9~zI}E$wy_Vw!y`cwKOcX)(G`oKY(g#efa+vR zLe&UQ79m4Y*J%>Nzamw!%4*bzhS^J2Vpmuaco^Cl_I4dI7Adx%fq)b}0Nz0lpCs@e zTTx~MS%v#EXd3juw5UdlC^Kb_9?v{Hw`6MDD)tG+9*AvdY$9o!k3%As&v$ z)i-aoK4)fagu;7NWo4D}08*{RyaxBu@JT6-qQ&x& zg$=s(^#;qSMXWG;xD^g9a zd(|>eZ*JOodUG)oYeDWsT>-5@)cLgPaP}R~^ghALa`C;+NsVPuO5-cyqWqjoaW1gV z(}1*6|)b8tqi5X?=h*N$cXFm37_|Au5?|m zMcO<`x!gNprS{CWn$}OYVo+gKg`1bxNPN~4z(|FHX3wzMp6qr@3#E=$nkn{M40S$W z1)-zoQ||87Z;k-H@?SwYpIc%#*0PD@nyrqFJKO4@ zYX+z4mcg{-=u`M?->RptlAea9oY=||)V#}+658U+aj8e5jDz;kD=7Q}&Bb$dznlbT zTe-JOE4TErZg$-kC?QVDl56^0h^%s_iXN=EX&QS0t%tI>7;%`dA`#bWzpxP?QrT-) zJnlOPPj`U6{%o#(ZGD2^j~A~6aqgEBR4x^VKGeX?5?iQ&>BA_5SBT|FxSLx;ELMBM zu+X2S)i;B;<&{?<(leUqv7aw^bdYeDu63awa(}n95Yz+^G+)oL^Jq(7&T)6425p?$ z>PNdZrTE2bftylKR<6P4?A|cCsoFKW!%4qfY@b6#N8X=q8|q?nuSp}b)VhJtLkaD; zd(wdVL8U4X16xvi?_K@{QcMS-=Owf{2A9<^l(9Cf$fZ%p6}Z)9zJ5F~dYNJ_Wk z)pc_D@Z|VU%RScCwa;VPw_>w8hhU(sO1Zb$T{=jkeNfv_?|{ruq%~e9DC*?5hl*S}fq7mopVSg^{qX5GwLEctKEs-RC)t zq4xU#Q>Vzd45|)NA2=)NXv3>nzFl!)+1)31?L8{wt%m;=JhfK{vc|zFz%6@ED0s2r z<|+F7mTdyP7LWRnxSm|IHk7~IxcGVtRFe(+YO{ju?tPJ?9 zLXa#&`s` zC+^lTKw`eW5oZaX#P9K*lP)^P&8837cQB)Yym1WHxN{v7Cmsj6fK>+UjJWj38iNou zq57|KCO)h(@jA@Q_W|%^x(;mP`flb{v0ZYf!B06+h8x47voXN`rU{*Gwp2luA?g6L zLRVMv715y5@@j86AJhJ^Ji)8+T<*!*%W7nu9URm`{TBa7pq<2X-GEg+lM;870j(JTllv$Rahodz%|IisWJ!nf?`EDMNX zAx}3t7^6xPAnDym9b#5!q2UodKSR$F}TNoU4 zXq&sgiKH#R$>J zgE8Mbz5r?1B8~Z+ywfip*IjCp0k+ z)7&ErH5wgSal1|St@Z53r)3ddC4GX?ku~AliL1O5U)WBR@ES^U_?*nKqj3{QBiBf26xzJ zcn@d|HXzZHF6DsA@35Rjy&(B4{yIuZuLo&5gSDb#Z+t_3)OJZImNWuO`!Ao?AnKuu z59kV|-q;FQeVtWM9YC|7(ctdx?(XgfcXuav(BLk?<>2n_4ncyuLvRTM*TBKg<*%)+ z-KxEJXCAtyYNj7&dirZw4SHahZT-vuik*T^cUPg1I z!PBSI-XW`7g{H69>uUOY=pQyP&1FrR+@#QWC*AufFr_NXMN4VAL!ypnPx)*=L8Dl=kj zeTw4ig?_o^Wvp=5FlAf?gKH4q)UjdtB`vnCV$@`sEnJhYD{e3#2UI)T$VB9!{E|7n zQpSC}b%tR`@2->=19otPC`_Pe_i_gpLlNuUAqeOgYN4$ZV}{^>EX{UXKwLSZS+q zTeaKQyTo2G_Smq4a2Ql#8$iBefn{6@+H<@ZnAeYWNK~W~lU_iq5TE}73U1uKy{n(@ z#6o61K_YjRmtM`VvcCc;?TQ+#$eZ`_0i@*MEQpimDAI|b*1H|K`F2qLN~-1_1GebP za_VB^=}So4+)orJVu-Y8t|9&VBsF<{^zkdbYP0F5w_d8`qn_{0x1&11Gn^fp-ynes zVmXYee><+`2z+xw4H^_2XE+jQyZi-g&vW)7^IAK~`9%UwZs|F{4}u{hBzOwE%dgMZ$%Pw`$_;o5}A|F!D|TV|cuWtl;g95flTvgVzv zICiJs7+?q)weDM7xSV2L*|{F^u;XQJ_*VU9rXhx@K8ah)A@9gZ+Pr!07cd^;g04_> znGu@X&dXcC-6iDr=Oz|13|m@@(h#YnzaTa}t<0x+t%>1Pcq}{Nh1y zY0-I*rMppX<)_pc$AQczU!sp+ujR$6d&|yr4s9zt?y7Xzl^x4YQOy3S6T^dH4*eqE@HF=|pVa@Xws@rD@Hx~tnFHSeis{ND z{>Y$Ac|os8TU}Ri-DbU@09@+{oMxC-WW)m;|6DvaVzPg|4rZQ^C&TZJDPol{p16}1 zs)`l1S}DOIk<420aF&*4n0bdqfp+V*9E|O~)TUe@VUyq6m7_X4qwD6h+$g%e<8+r@AMOrD*C4sU#3OQD+>0q1GGO$P42-2;rnS|vUrV(yDPU!bLmBns z;rj#JoB+opYnuVXa{pgE5H$D8UICj-sy{QZei<0A!|=wGqTd!6o4AK|8D)1`xs34u zv>?EI!)h{h!zK41MRWg2LqWu5H0|%q@QU75AzX++? zG-KV}A=!jsx-#3@xAWw#);IArKe67vs-RX0 z`c8;hgahEZ^{(DjbZyDNn6;O!Spg%zC0V`8W9<@~I}>X#Wj;}(ADvqSQCJ~ddHat! zW7c!d{6kkROgTN#ZF~{P=i8<)_xg@&yKG|Tq4QO+Fi`?;WX{{|Bku0c!343_G2M$@ zu8l+USJj8@-SiJCwkxqVujS#ur*Xg5!)xbYi(Zt__0508-nREmzxYJ1o(+Y1N{WKQ z)(h;ox~oO;Zr5lGdmtv?XJ-@s3MP(SQQ7{uM$XG43HpO9I}nt}yPX#g*+0l?hZkw0 z6&p=v>rApZ;!~CC^Aal8f|ae+fe$TO@w@)jo3zJ#Kl>63*(5khu;aaKe`dnsOE+zo z`p#|57KTPrFgBMucDh@5g7pS3)38`3N`Lf-Kv!={GK0R!pTL+i^I-3hD4&Wk9B+=u zH(?tleAt9gUh7o;qJP&IM2^vzH37nbMuREj3H%w}sU>##YFC`o+%7-=*+esgUM~#U z>uIAa2-Ye667Mb3gf^m% z$R8PDX=EgGO>i|)dN3R(Em9{$4t*XFh1~7I&p5pFB6i|(7X)!hNZ>?^$3yc#B1y;q zV)IxK1H^?oJ%(`!$Cnx;=A^er!u=1;W#F7$ytmAgX%|8ij{To8qb+9$&2VI*Fg12T z{3hRtZEv2JFO9o)wAd&IO2c9FF_4hqn?jt75GT=k@mGniEz=J>ked%#l4tB#B+^PA z_mDGImb`^7JR!apKWwVLoXHorqUDmsHLNp3AtL-*DJPzw-M9SsI6!(tYZ>s1lH-Hw z9fgh}#8~K+1mx=i5FmkB{ziu zwlQf-9I^tEbPt^cNpZiX)TNd8c^~yl6R)KbH7-y{N{4)dg%l`CqA?nI=?~yyw2RZ6 z$;UFUw2QW&=ck1d_|OM6)v7sp=oeL%!sabipY6PyHTDRKVw?u5tx)rGqEwKKVg{#} zohV~*)6?7?IEF`<%8<;VkOAC8CWe;a#|H3Gf5vOpYFKh6K(G33!$7|j$0{4>SPFql z8ZZbrRyKEl^Vm-@Q(=kMG(s_JZT4|6vltzZH80y+dvj+zuyZJZ`x=f0MTo54D(Dt~ z-VKXtqiQ0$Xi3S_pQ~3Yevs7d&<&a*S&)7MMYb*OkQlVwu^XbuDA;@GoS8tG-S#fN z+_gXu3mV_QAMM;G7w1 z1Jcp7He|H%6toQ-5b;im3@WZLu`VHW;{}|Si`^rqvM~u5!LaiNsRpIJ>9BWOln$tX zk-1umW|uR@QKAW!4OKdTorsDNxRj>yHxhP`FQ0sL#0zGB{*$P72B^$uRm*r;cMR-> zQwPnJf|_HgU#U_pqi)a3maHxUBaEl_38p zC?+M;Rc6I?2tVvEbu<>7BZpZj8lpdlK_CaL=R; z=AJA#iZV$FK3vvFOpWeIu{@$W8fh6jVobA&U!x`>z2Q%))<=ZYetmBamiZ!srucAY zE+%l#&~p%f?51obOZ7xhHKxhr7iHci*n!0W!%`2hlbV5b>?rHaJM>iRF9gkt_Y$s- z=+g*`dX|FE)oJiosk;PvuwX^xD!)q%P;d9P_^ji#a0b%-%YN^3`oRmu376(?U8ur8 zIw9rBu>MvFN#w^-)rb41JD35z@^JKKDud27?Y^1Yqe zUcb;_$Yo^PM)Gw4oA3x}4>Nsws2A)M3`N{fZ&%CsWv^Cpu!VEG<|e9d73tVWFXadz zi46wE{&4qkh8q-)>}WzD-$lHUfKuK{%Fh4H{+e*SW9c%Hh=ctrA)8bB++!(@OM_dB z{qk@;mUx!rvoFpo8iwFXKDRxO^Hs*+EC+YFXK-vN1zzKkEIjzCoua$lMm}}O3W|y_ z07ZS)V>A@V7&HkOGTxWL9sSG5>S?`+39R$y$u9e|^7`CqI?V`Zwu>!N#($6`4-svd zr~68>D(UZ^PDggBSx(VN5@$WB1a{M-MGkjMDRgwVl5t&T_oSMw%^}=4xRuG6r!YIsKqkUap~3Fw*aQtUW)7se z1i|!6NpE821ESanTdh=TCwn&9DFF-nwZeB<1S;Dg%XRBs2Se0l%*v5_Zv%Ye3VGJ% z3zHa7A&nAZsMyD)DR>V2wg!F@18??!kb(Jds*MgC4H!QPz-;REi*JlAHW78@KHP5S zNmsY!Eh4K4#&h!TcE{n&hQd4(=~uMY8ZOB_OR<8F4_GX1_88v9la(aZQtnn95-&tL zmKK{{SR2rhk)b&)XBKtQBqRmwg?+KrKC};dk@orU07)z&P{+k&(-xcdLf8ls>P>0p zdxBR@#Zo;LkG`f(aVW!zqau#iy#wzF<>DDSF9!07wA?xUwA>Jep}$fj=lW$v|Ho92 zOLGsRb$^!z_f^w$ZJ5b~k%&wic4Ns5ej`b#zMIAt#54*p8&VuDmQY=6_OSIXl7kjD zpm=-=8%)JvCc&|O(EvUK|L8F4WsSVVj^oF84y~|1gt0A6LfAT7=^pc8n%*uSKt{N>D)fe zpLg!tEER6&hySuEh&BSiHpHnkhE^LXyhTwHakP`MxF# zK1gip4A?>~K`_Jc1!R;&7#F88gveLu3_-@Ahg2dn$YANg+lel5P@4ZDiVSIHZ6(m+ zr;w?5pz;+V4lFo93{C}FTM~beG@AbBY^RPz$GW6la zz_F{TjXk6@lQ&*;wq6u!dbZmH@@i0h6tkMlHA2!@DrhE!lnNCs=Th37Oh4c3LmT>1 zeD}mqY7>wJ){=|70U9W;p)Mem_z>P8r=+SgjUr1hibd}sqG0B*>yA-)1;sMm;0Bw5 zeWEIl#w?KmQ@lTl67P&ik(sx@sh7G@VrGjDmRKct`1}hd@y97jC;Q1o*pY*FR>z{F z)VCD15F6#^lBLH_x@%a9YbZen?;IA`>1v*D>A^6%M5v8sCV&Kux1_fI(n1y~d4gbL zU1mAB9(CqbU2PZ3k4bP;GJK$HGJ)KTqS01zxtPqZ<^_8c~t& z>!V$U+2Z4@J}y4+x_H7pf>UFt#WBA1H?z2ivkgbgU{igDIC%-?!Z0q27bb0{D}4vA z01%&e*S;K@s)v!11*g5@#wf$6$1@!tz`{Nbq@XI7E$YPLLubrc_U5?1&QP>7==?U< zNFfvQi2(UjLZ)R*=ezFI(`L*#EaFFNy1BIu^@1+sLa}W9xbrpx__S*O;7-+;cAgS^ zADIZ`(Y2ry#b|bJ(-O@VY)JL_DsOP^m)t-6GTDv%wfEv{0)k#IUv-S~>kuYUI+0A9 z;O)|+;+rNy#}xv%_KlQiY}0rKgDUDoQ7Ys23A3O2_n`7bWqTD0c%*_n4eUw?g2!&s zr0nbHl(Owf^D=W$^avfs_NP&MfwgQ4WlCj6_iwusjBeWzAwii39KKMs^iPd?)BSpH zsK8h_ipL%-3o8O;A+j~*iUsw^!O0dhf_w=YI5ft`hCu2^m+rxRA$#mW?6lPwdEPn_ zR{ea7xr&^S!BI}l+CB3LrNhEp%()TmEP}>&_;(4)3Dy@0n@muAN+f#hfyzuu6l0x0 zxmS(1Lfq%KcU!Lh+VKk6$X0QSv8n4YZZxrPVb+X)<9jbnxk82x_t`T{k{+5LA9?q6 z>ink>9l{SG}yw3Sw1awPElfN~9%((M)3$^0)eEdsn8L_Jdm?03`^ zWf7@-D$^}rOi+i&(t5!c^UPzw2uho|N|^uZpzuy_vV6?L!!zw%3mVAzY~KMDD|(fh5F)f_<<5?RxlcU7OD3wrKaT^5sV0k2M~W3`oqG@P?S;ao@FXnm-pE zuEw*{r}%J42Vn?2{KGlbCt(4%xZT7|mO2g{3#}YKbU1gm`h#Je4CzN29TT-^RDM(c zF86F>x!W&UAx0!EP8&ls3(sqavyq&aduB6BOc&0>)RLTs4 z)T%E4IOr!5HD~qO@0oXaV0uZ4>`ygfa5G8`hFO!cLaysd)=HAcPgyn6=nQ)it?;S5# zX6lOo!?fQ3-yU9Ywka)Sf*hUWr6=PSgu&k*>n=ru6K z8(5#H38Ks4bTfWyC)D0aFWZ2(!>;|esoc`b(mTvEv!(E(rLTN3tp0g(m1nb6*bidF z=`{CfN>Dn`t16E@875cd*Ld*7v*&z3d5R(x+VrIE3x}Y6nCKA<4@xF-eQysJY+Xeh zX+&kkIFOS@Hvi3+5>{mASwVqIt%_x94PR5%E`TF#tD>ZZ&pFz@zd`z+P}%wDEVUa4 zTbN8XK=%0Yuel&4^njKizk$qomx=<+P^UQGSfA6d`x>H{z z;c9|o_5R_S9qEX`P7*Jjy9Zc$aYJ(;ZcunaE^3)>>r$^w@v5aCcvW6zXOQ-WzVQ6z ztnsaCT}BPGRCMxvXk@YVZl2t5o-amfMFlW{vjw4K#yU>QX_(*ZI$adcF76u!qb%Fo zbzrGA$oB=2umvEYVh>v}gaX~%KktcjI<<#=Z8cNLUbxIzFl8tu8V1zhyn0;eKfTCs zvd`yXn4*Q;oEXm}nN&e&VRqZO!$#~&r8w|dP?DD(mtzsvz zCgh5Ajz=q*XBV8U(UYMB&DE^ZxIv&_+*dKsLsgj!ybejIrP{(glLudPlZ4znROl{* z11LH=<&yG*#UdL_++`pq-(QPE@kQRGU!wLDIl9DDAEaKs-PRa~Ejf`0UbPaO%+W29`AW%3Usg%s=6Klv-UJVC{3~aKs;Lq2%P%Gx zctCsT{4|+={Xs!0G7P>q1usd8>)>e%VfO^D4ql~iEErP%ol>rt&#?NqQaQ|RjnuMT zTZtr6_rRx372Z#^hsV5}&(I5YAh?}hpyRnKWQRQEA=&XN?UeNY$o!7iSgrB?gE^;M zb#-lSFfu>>Wj@gp#eQ4f?U;Bn*&`6x;az@S!cJPJx`kcY%qqUfemM1WK0*{qRaUXD z|D8zZr82_&6u~g`VZcE8X00gEdZ!oe>>ylT7s$iZcU(PwcV@^0zf~!kn92lGMBn!5 z&uV(wvqYG0IJ#?Hr;t{z{HV!2M5`h0N5uk(9P22pg+v&6NNN2)y!PO!uMF`HO&u;1 zmWuOU-Zu;|RnvFmuk;$r!ks@QqVK04U)!=(@*1zJf&bxHCjGs;YlRGR-5OgJcacpZ zu>zlIKy#o$Qi6W(epwMp!|DI<+VjyV(?#Ry-7gd)loyv^sOqENO~glmFCTA;Hm%Ka z-GyhA#u_sLu~y_bb!pp))*g+5WlWfVC}@*+pl~MCsLvsCPc**1=8gzyC42a+HALp` z66Dr|XKrb86G~?W^U(hZ#1XI$k5$DiF721SW7k6OqgpX64y|_HC|P@YK*URAemr2m z3{ps7Puu*&u`+pFcV>l;38&QY$R~mKI@m(AF!6&q8?f9{!z`b%F;Ob zY0Q60ph1-u9%@wQSI$UQiP^@!1B;=p`?f`E=|m5(*W8RmuYY|0TIkBmM&CNfZl$#Z zFK~3K3ti(Z!>^e^9h+Wg(80WfK$w|}=ccjQk9fc%pB!K?7@a>Gq9mAeaN+z3VDoPh z7HS9`#sAP6PZsqKxC0*wV5*+Z>D{_XOHYx*eaCj5B5NxzQ`E5RVStaOqMt!kskV+q z%S48dQ&4rHBUz6ZPik&iW}N0Xc_hLe9ZKlfsbcAvOOg<8>(RjlSCs++&JJsDna#rvps#wMmJZiUfowo3MB}8-wVA|w zk;HN}r`Yd^KHT`b0EP9M4YqVz`}qC~zfHAJNj>+yE{#+e0fEion4MIaN@5)j`AXcyAsPj-_^+S=qLPU7pS7t`&Zv zJ2=N?3G_RBIiaE4G>GPH-1HDQk=n3&#P*0&;2$8FbA<&$Z0QX+YW@+P2y$=P4fy*= zciPYjit>RIv9mdo_7k{(}r)vJT3R7XBl*E)6iru2cn z%}uq&l|4SV%R~@c+yP^MEFYye1-gnHt@zWV;EUORkxz8>R zbB(8TW(1hC?eCPsXt@X~pfQjVsIJwRR4me$!r4U}3NMQFUsd9-)EIl# z$3`-GE%lH5=||8E3dHI!WZP7J;nn=vgJ5b`J8I>^wX&)7?>y%imN`f1)&{G0@L&DQ z@FlHQgGPOR2-1#h-40sqPL&{RCxq0QOIS5t`SwUdHx>0iqxVdWbXXyB#$B}O%Y;Fd zOtgkD-#*oEq&=>p-5JakU)4WsZVD1#lz|0L9(R0kVbn7T;WDA-SnJ4_(kPL$u4+cw zX*ha7)X20MvVIn33k%&@+9WG^RqcaJ-F&?7HeNCTGp`<+hE}!C42vG+qcVIM;%M2k zoM$A$k>HOYHAP4$Y>5B4hr?$LV+cqH^8bj>@jrBQ_`j9>cU6%8bM${HfkyamY9gyC T!hZSB7O2k|{wasd|Filp<*5t$ literal 0 HcmV?d00001 diff --git a/Solutions/Microsoft Exchange Security - Exchange Online/Package/createUiDefinition.json b/Solutions/Microsoft Exchange Security - Exchange Online/Package/createUiDefinition.json index cce5399b4ae..650c17ea5ab 100644 --- a/Solutions/Microsoft Exchange Security - Exchange Online/Package/createUiDefinition.json +++ b/Solutions/Microsoft Exchange Security - Exchange Online/Package/createUiDefinition.json @@ -6,7 +6,7 @@ "config": { "isWizard": false, "basics": { - "description": "\n\n**Note:** _There may be [known issues](https://aka.ms/sentinelsolutionsknownissues) pertaining to this Solution, please refer to them before installing._\n\nThe Microsoft Exchange Security Audit and Configuration Insights solution analyzes Exchange online configuration and logs from a security lens to provide insights and alerts.\n\n**Underlying Microsoft Technologies used:**\n\nThis solution takes a dependency on the following technologies, and some of these dependencies either may be in [Preview](https://azure.microsoft.com/support/legal/preview-supplemental-terms/) state or might result in additional ingestion or operational costs:\n\na. [Custom logs ingestion via Data Collector REST API](https://learn.microsoft.com/en-us/azure/azure-monitor/logs/data-collector-api?tabs=powershell)\n\n**Data Connectors:** 1, **Parsers:** 2, **Workbooks:** 2\n\n[Learn more about Microsoft Sentinel](https://aka.ms/azuresentinel) | [Learn more about Solutions](https://aka.ms/azuresentinelsolutionsdoc)", + "description": "\n\n**Note:** _There may be [known issues](https://aka.ms/sentinelsolutionsknownissues) pertaining to this Solution, please refer to them before installing._\n\nThe Exchange Security Audit and Configuration Insight solution analyze Exchange Online configuration and logs from a security lens to provide insights and alerts.\n\n**Underlying Microsoft Technologies used:**\n\nThis solution takes a dependency on the following technologies, and some of these dependencies either may be in [Preview](https://azure.microsoft.com/support/legal/preview-supplemental-terms/) state or might result in additional ingestion or operational costs:\n\na. [Custom logs ingestion via Data Collector REST API](https://learn.microsoft.com/en-us/azure/azure-monitor/logs/data-collector-api?tabs=powershell)\n\n**Data Connectors:** 1, **Parsers:** 2, **Workbooks:** 2\n\n[Learn more about Microsoft Sentinel](https://aka.ms/azuresentinel) | [Learn more about Solutions](https://aka.ms/azuresentinelsolutionsdoc)", "subscription": { "resourceProviders": [ "Microsoft.OperationsManagement/solutions", @@ -60,8 +60,8 @@ "name": "dataconnectors1", "type": "Microsoft.Common.Section", "label": "Data Connectors", - "elements": [ - { + "elements": [ + { "name": "dataconnectors1-text", "type": "Microsoft.Common.TextBlock", "options": { @@ -75,7 +75,7 @@ "type": "Microsoft.Common.Section", "label": "Parsers", "elements": [ - { + { "name": "dataconnectors-parser-text", "type": "Microsoft.Common.TextBlock", "options": { diff --git a/Solutions/Microsoft Exchange Security - Exchange Online/Package/mainTemplate.json b/Solutions/Microsoft Exchange Security - Exchange Online/Package/mainTemplate.json index 8c26918da1b..d4171c7c435 100644 --- a/Solutions/Microsoft Exchange Security - Exchange Online/Package/mainTemplate.json +++ b/Solutions/Microsoft Exchange Security - Exchange Online/Package/mainTemplate.json @@ -46,75 +46,65 @@ } }, "variables": { - "solutionId": "microsoftsentinelcommunity.azure-sentinel-solution-esionline", - "_solutionId": "[variables('solutionId')]", "email": "support@microsoft.com", "_email": "[variables('email')]", - "workspaceResourceId": "[resourceId('microsoft.OperationalInsights/Workspaces', parameters('workspace'))]", + "_solutionName": "Microsoft Exchange Security - Exchange Online", + "_solutionVersion": "3.0.0", + "solutionId": "microsoftsentinelcommunity.azure-sentinel-solution-esionline", + "_solutionId": "[variables('solutionId')]", "uiConfigId1": "ESI-ExchangeOnlineCollector", "_uiConfigId1": "[variables('uiConfigId1')]", "dataConnectorContentId1": "ESI-ExchangeOnlineCollector", "_dataConnectorContentId1": "[variables('dataConnectorContentId1')]", "dataConnectorId1": "[extensionResourceId(resourceId('Microsoft.OperationalInsights/workspaces', parameters('workspace')), 'Microsoft.SecurityInsights/dataConnectors', variables('_dataConnectorContentId1'))]", "_dataConnectorId1": "[variables('dataConnectorId1')]", - "dataConnectorTemplateSpecName1": "[concat(parameters('workspace'),'-dc-',uniquestring(variables('_dataConnectorContentId1')))]", + "dataConnectorTemplateSpecName1": "[concat(parameters('workspace'),'/Microsoft.SecurityInsights/',concat(parameters('workspace'),'-dc-',uniquestring(variables('_dataConnectorContentId1'))))]", "dataConnectorVersion1": "1.1.0", - "parserVersion1": "1.0.0", - "parserContentId1": "ExchangeConfiguration-Parser", - "_parserContentId1": "[variables('parserContentId1')]", + "_dataConnectorcontentProductId1": "[concat(take(variables('_solutionId'),50),'-','dc','-', uniqueString(concat(variables('_solutionId'),'-','DataConnector','-',variables('_dataConnectorContentId1'),'-', variables('dataConnectorVersion1'))))]", "parserName1": "ExchangeConfiguration", "_parserName1": "[concat(parameters('workspace'),'/',variables('parserName1'))]", "parserId1": "[resourceId('Microsoft.OperationalInsights/workspaces/savedSearches', parameters('workspace'), variables('parserName1'))]", "_parserId1": "[variables('parserId1')]", - "parserTemplateSpecName1": "[concat(parameters('workspace'),'-pr-',uniquestring(variables('_parserContentId1')))]", - "parserVersion2": "1.0.0", - "parserContentId2": "ExchangeEnvironmentList-Parser", - "_parserContentId2": "[variables('parserContentId2')]", + "parserTemplateSpecName1": "[concat(parameters('workspace'),'/Microsoft.SecurityInsights/',concat(parameters('workspace'),'-pr-',uniquestring(variables('_parserContentId1'))))]", + "parserVersion1": "1.0.0", + "parserContentId1": "ExchangeConfiguration-Parser", + "_parserContentId1": "[variables('parserContentId1')]", + "_parsercontentProductId1": "[concat(take(variables('_solutionId'),50),'-','pr','-', uniqueString(concat(variables('_solutionId'),'-','Parser','-',variables('_parserContentId1'),'-', variables('parserVersion1'))))]", "parserName2": "ExchangeEnvironmentList", "_parserName2": "[concat(parameters('workspace'),'/',variables('parserName2'))]", "parserId2": "[resourceId('Microsoft.OperationalInsights/workspaces/savedSearches', parameters('workspace'), variables('parserName2'))]", "_parserId2": "[variables('parserId2')]", - "parserTemplateSpecName2": "[concat(parameters('workspace'),'-pr-',uniquestring(variables('_parserContentId2')))]", + "parserTemplateSpecName2": "[concat(parameters('workspace'),'/Microsoft.SecurityInsights/',concat(parameters('workspace'),'-pr-',uniquestring(variables('_parserContentId2'))))]", + "parserVersion2": "1.0.0", + "parserContentId2": "ExchangeEnvironmentList-Parser", + "_parserContentId2": "[variables('parserContentId2')]", + "_parsercontentProductId2": "[concat(take(variables('_solutionId'),50),'-','pr','-', uniqueString(concat(variables('_solutionId'),'-','Parser','-',variables('_parserContentId2'),'-', variables('parserVersion2'))))]", "workbookVersion1": "1.0.0", "workbookContentId1": "MicrosoftExchangeLeastPrivilegewithRBAC-Online", "workbookId1": "[resourceId('Microsoft.Insights/workbooks', variables('workbookContentId1'))]", - "workbookTemplateSpecName1": "[concat(parameters('workspace'),'-wb-',uniquestring(variables('_workbookContentId1')))]", + "workbookTemplateSpecName1": "[concat(parameters('workspace'),'/Microsoft.SecurityInsights/',concat(parameters('workspace'),'-wb-',uniquestring(variables('_workbookContentId1'))))]", "_workbookContentId1": "[variables('workbookContentId1')]", + "workspaceResourceId": "[resourceId('microsoft.OperationalInsights/Workspaces', parameters('workspace'))]", + "_workbookcontentProductId1": "[concat(take(variables('_solutionId'),50),'-','wb','-', uniqueString(concat(variables('_solutionId'),'-','Workbook','-',variables('_workbookContentId1'),'-', variables('workbookVersion1'))))]", "workbookVersion2": "1.0.0", "workbookContentId2": "MicrosoftExchangeSecurityReview-Online", "workbookId2": "[resourceId('Microsoft.Insights/workbooks', variables('workbookContentId2'))]", - "workbookTemplateSpecName2": "[concat(parameters('workspace'),'-wb-',uniquestring(variables('_workbookContentId2')))]", - "_workbookContentId2": "[variables('workbookContentId2')]" + "workbookTemplateSpecName2": "[concat(parameters('workspace'),'/Microsoft.SecurityInsights/',concat(parameters('workspace'),'-wb-',uniquestring(variables('_workbookContentId2'))))]", + "_workbookContentId2": "[variables('workbookContentId2')]", + "_workbookcontentProductId2": "[concat(take(variables('_solutionId'),50),'-','wb','-', uniqueString(concat(variables('_solutionId'),'-','Workbook','-',variables('_workbookContentId2'),'-', variables('workbookVersion2'))))]", + "_solutioncontentProductId": "[concat(take(variables('_solutionId'),50),'-','sl','-', uniqueString(concat(variables('_solutionId'),'-','Solution','-',variables('_solutionId'),'-', variables('_solutionVersion'))))]" }, "resources": [ { - "type": "Microsoft.Resources/templateSpecs", - "apiVersion": "2022-02-01", + "type": "Microsoft.OperationalInsights/workspaces/providers/contentTemplates", + "apiVersion": "2023-04-01-preview", "name": "[variables('dataConnectorTemplateSpecName1')]", "location": "[parameters('workspace-location')]", - "tags": { - "hidden-sentinelWorkspaceId": "[variables('workspaceResourceId')]", - "hidden-sentinelContentType": "DataConnector" - }, - "properties": { - "description": "Microsoft Exchange Security - Exchange Online data connector with template", - "displayName": "Microsoft Exchange Security - Exchange Online template" - } - }, - { - "type": "Microsoft.Resources/templateSpecs/versions", - "apiVersion": "2022-02-01", - "name": "[concat(variables('dataConnectorTemplateSpecName1'),'/',variables('dataConnectorVersion1'))]", - "location": "[parameters('workspace-location')]", - "tags": { - "hidden-sentinelWorkspaceId": "[variables('workspaceResourceId')]", - "hidden-sentinelContentType": "DataConnector" - }, "dependsOn": [ - "[resourceId('Microsoft.Resources/templateSpecs', variables('dataConnectorTemplateSpecName1'))]" + "[extensionResourceId(resourceId('Microsoft.OperationalInsights/workspaces', parameters('workspace')), 'Microsoft.SecurityInsights/contentPackages', variables('_solutionId'))]" ], "properties": { - "description": "Microsoft Exchange Security - Exchange Online data connector with template version 2.0.1", + "description": "Microsoft Exchange Security - Exchange Online data connector with template version 3.0.0", "mainTemplate": { "$schema": "https://schema.management.azure.com/schemas/2019-04-01/deploymentTemplate.json#", "contentVersion": "[variables('dataConnectorVersion1')]", @@ -149,14 +139,14 @@ "dataTypes": [ { "name": "ESIExchangeOnlineConfig_CL", - "lastDataReceivedQuery": "ESIExchangeOnlineConfig_CL\n | summarize Time = max(EntryDate_s) by GenerationInstanceID_g, ESIEnvironment_s\n | where isnotempty(Time)" + "lastDataReceivedQuery": "ESIExchangeOnlineConfig_CL | summarize Time = max(EntryDate_s) by GenerationInstanceID_g, ESIEnvironment_s | where isnotempty(Time)" } ], "connectivityCriterias": [ { "type": "IsConnectedQuery", "value": [ - "ESIExchangeOnlineConfig_CL\n | summarize LastLogReceived = max(EntryDate_s) by GenerationInstanceID_g, ESIEnvironment_s\n |take 1\n | project IsConnected = true" + "ESIExchangeOnlineConfig_CL | summarize LastLogReceived = max(EntryDate_s) by GenerationInstanceID_g, ESIEnvironment_s |take 1 | project IsConnected = true" ] } ], @@ -340,9 +330,9 @@ "name": "ESI - Exchange Online Security Configuration Analyzer" }, "support": { - "name": "Community", - "tier": "Community", - "link": "https://github.com/Azure/Azure-Sentinel/issues" + "name": "Community", + "tier": "Community", + "link": "https://github.com/Azure/Azure-Sentinel/issues" }, "author": { "name": "Microsoft" @@ -353,7 +343,7 @@ }, { "type": "Microsoft.OperationalInsights/workspaces/providers/metadata", - "apiVersion": "2022-01-01-preview", + "apiVersion": "2023-04-01-preview", "name": "[concat(parameters('workspace'),'/Microsoft.SecurityInsights/',concat('DataConnector-', last(split(variables('_dataConnectorId1'),'/'))))]", "properties": { "parentId": "[extensionResourceId(resourceId('Microsoft.OperationalInsights/workspaces', parameters('workspace')), 'Microsoft.SecurityInsights/dataConnectors', variables('_dataConnectorContentId1'))]", @@ -370,19 +360,30 @@ "email": "[variables('_email')]" }, "support": { - "name": "Community", - "tier": "Community", - "link": "https://github.com/Azure/Azure-Sentinel/issues" + "name": "Community", + "tier": "Community", + "link": "https://github.com/Azure/Azure-Sentinel/issues" } } } ] - } + }, + "packageKind": "Solution", + "packageVersion": "[variables('_solutionVersion')]", + "packageName": "[variables('_solutionName')]", + "packageId": "[variables('_solutionId')]", + "contentSchemaVersion": "3.0.0", + "contentId": "[variables('_dataConnectorContentId1')]", + "contentKind": "DataConnector", + "displayName": "Exchange Security Insights Online Collector (using Azure Functions)", + "contentProductId": "[variables('_dataConnectorcontentProductId1')]", + "id": "[variables('_dataConnectorcontentProductId1')]", + "version": "[variables('dataConnectorVersion1')]" } }, { "type": "Microsoft.OperationalInsights/workspaces/providers/metadata", - "apiVersion": "2022-01-01-preview", + "apiVersion": "2023-04-01-preview", "name": "[concat(parameters('workspace'),'/Microsoft.SecurityInsights/',concat('DataConnector-', last(split(variables('_dataConnectorId1'),'/'))))]", "dependsOn": [ "[variables('_dataConnectorId1')]" @@ -403,9 +404,9 @@ "email": "[variables('_email')]" }, "support": { - "name": "Community", - "tier": "Community", - "link": "https://github.com/Azure/Azure-Sentinel/issues" + "name": "Community", + "tier": "Community", + "link": "https://github.com/Azure/Azure-Sentinel/issues" } } }, @@ -430,14 +431,14 @@ "dataTypes": [ { "name": "ESIExchangeOnlineConfig_CL", - "lastDataReceivedQuery": "ESIExchangeOnlineConfig_CL\n | summarize Time = max(EntryDate_s) by GenerationInstanceID_g, ESIEnvironment_s\n | where isnotempty(Time)" + "lastDataReceivedQuery": "ESIExchangeOnlineConfig_CL | summarize Time = max(EntryDate_s) by GenerationInstanceID_g, ESIEnvironment_s | where isnotempty(Time)" } ], "connectivityCriterias": [ { "type": "IsConnectedQuery", "value": [ - "ESIExchangeOnlineConfig_CL\n | summarize LastLogReceived = max(EntryDate_s) by GenerationInstanceID_g, ESIEnvironment_s\n |take 1\n | project IsConnected = true" + "ESIExchangeOnlineConfig_CL | summarize LastLogReceived = max(EntryDate_s) by GenerationInstanceID_g, ESIEnvironment_s |take 1 | project IsConnected = true" ] } ], @@ -623,33 +624,15 @@ } }, { - "type": "Microsoft.Resources/templateSpecs", - "apiVersion": "2022-02-01", + "type": "Microsoft.OperationalInsights/workspaces/providers/contentTemplates", + "apiVersion": "2023-04-01-preview", "name": "[variables('parserTemplateSpecName1')]", "location": "[parameters('workspace-location')]", - "tags": { - "hidden-sentinelWorkspaceId": "[variables('workspaceResourceId')]", - "hidden-sentinelContentType": "Parser" - }, - "properties": { - "description": "ExchangeConfiguration Data Parser with template", - "displayName": "ExchangeConfiguration Data Parser template" - } - }, - { - "type": "Microsoft.Resources/templateSpecs/versions", - "apiVersion": "2022-02-01", - "name": "[concat(variables('parserTemplateSpecName1'),'/',variables('parserVersion1'))]", - "location": "[parameters('workspace-location')]", - "tags": { - "hidden-sentinelWorkspaceId": "[variables('workspaceResourceId')]", - "hidden-sentinelContentType": "Parser" - }, "dependsOn": [ - "[resourceId('Microsoft.Resources/templateSpecs', variables('parserTemplateSpecName1'))]" + "[extensionResourceId(resourceId('Microsoft.OperationalInsights/workspaces', parameters('workspace')), 'Microsoft.SecurityInsights/contentPackages', variables('_solutionId'))]" ], "properties": { - "description": "ExchangeConfiguration Data Parser with template version 2.0.1", + "description": "ExchangeConfiguration Data Parser with template version 3.0.0", "mainTemplate": { "$schema": "https://schema.management.azure.com/schemas/2019-04-01/deploymentTemplate.json#", "contentVersion": "[variables('parserVersion1')]", @@ -658,7 +641,7 @@ "resources": [ { "name": "[variables('_parserName1')]", - "apiVersion": "2020-08-01", + "apiVersion": "2022-10-01", "type": "Microsoft.OperationalInsights/workspaces/savedSearches", "location": "[parameters('workspace-location')]", "properties": { @@ -699,14 +682,25 @@ "email": "[variables('_email')]" }, "support": { - "name": "Community", - "tier": "Community", - "link": "https://github.com/Azure/Azure-Sentinel/issues" + "name": "Community", + "tier": "Community", + "link": "https://github.com/Azure/Azure-Sentinel/issues" } } } ] - } + }, + "packageKind": "Solution", + "packageVersion": "[variables('_solutionVersion')]", + "packageName": "[variables('_solutionName')]", + "packageId": "[variables('_solutionId')]", + "contentSchemaVersion": "3.0.0", + "contentId": "[variables('_parserContentId1')]", + "contentKind": "Parser", + "displayName": "ExchangeConfiguration", + "contentProductId": "[variables('_parsercontentProductId1')]", + "id": "[variables('_parsercontentProductId1')]", + "version": "[variables('parserVersion1')]" } }, { @@ -721,7 +715,13 @@ "functionAlias": "ExchangeConfiguration", "functionParameters": "SpecificSectionList:string = \"\", SpecificConfigurationDate:string = \"lastdate\", Target:string = \"On-Premises\", SpecificConfigurationEnv:string = \"All\"", "query": "\nlet _SpecificSectionList = split(SpecificSectionList,',');\r\nlet _configurationDate = iff(isnull(SpecificConfigurationDate) or isempty(SpecificConfigurationDate),\"lastdate\",tostring(SpecificConfigurationDate));\r\nlet _configurationEnv = split(iff(isnull(SpecificConfigurationEnv) or isempty(SpecificConfigurationEnv) or tolower(SpecificConfigurationEnv) == \"all\",\"All\",tostring(SpecificConfigurationEnv)),',');\r\nlet _target = iff(isnull(Target) or isempty(Target),\"On-Premises\",Target);\r\nlet _targetDate = iff(_configurationDate == \"lastdate\", ago(7d), iif(_configurationDate == \"alllife\",ago(1080d),todatetime(_configurationDate)));\r\nlet baseRequest = materialize (union isfuzzy=true withsource=TableName ESIAPIExchange*,ESIExchange* \r\n | where TimeGenerated > _targetDate\r\n | extend Source = iff (TableName contains \"Online\", \"Online\", \"On-Premises\")\r\n | where _target == 'All' or Source == _target\r\n | extend ScopedEnvironment = iff(_configurationEnv contains \"All\", \"All\",ESIEnvironment_s) \r\n | where ScopedEnvironment in (_configurationEnv)\r\n | extend EntryDate = todatetime(EntryDate_s)\r\n | project-away EntryDate_s);\r\nlet findConfigDate = baseRequest\r\n | extend Env =strcat(Source, \"_\",ESIEnvironment_s)\r\n | summarize count() by GenerationInstanceID_g,Env,EntryDate\r\n | extend distance = iff(_configurationDate == \"lastdate\" or _configurationDate == \"alllife\", now() - EntryDate, (EntryDate - todatetime(_configurationDate)))\r\n | top-nested of Env by Ignore0=max(1), \r\n top-nested 1 of distance by Ignore1 = min(distance) asc nulls last, \r\n top-nested of GenerationInstanceID_g by Ignore2=max(2) \r\n | project GenerationInstanceID_g;\r\nlet ParseExchangeConfig = () { baseRequest \r\n | join kind=leftsemi (findConfigDate) on $left.GenerationInstanceID_g == $right.GenerationInstanceID_g\r\n | where isempty(_SpecificSectionList[0]) or Section_s in (_SpecificSectionList)\r\n | extend TimeGenerated = EntryDate\r\n | extend Identity = IdentityString_s\r\n | extend CmdletResultValue = parse_json(rawData_s)\r\n | project-rename ConfigurationInstanceID = GenerationInstanceID_g, ESIEnvironment = ESIEnvironment_s, Section = Section_s, PSCmdlet = PSCmdL_s, CmdletResultType = ExecutionResult_s, WhenChanged = WhenChanged_t, WhenCreated = WhenCreated_t, Name = Name_s\r\n | project-away TenantId,SourceSystem,Type,EntryDate\r\n};\r\nParseExchangeConfig", - "version": 1 + "version": 1, + "tags": [ + { + "name": "description", + "value": "ExchangeConfiguration" + } + ] } }, { @@ -747,40 +747,22 @@ "email": "[variables('_email')]" }, "support": { - "name": "Community", - "tier": "Community", - "link": "https://github.com/Azure/Azure-Sentinel/issues" + "name": "Community", + "tier": "Community", + "link": "https://github.com/Azure/Azure-Sentinel/issues" } } }, { - "type": "Microsoft.Resources/templateSpecs", - "apiVersion": "2022-02-01", + "type": "Microsoft.OperationalInsights/workspaces/providers/contentTemplates", + "apiVersion": "2023-04-01-preview", "name": "[variables('parserTemplateSpecName2')]", "location": "[parameters('workspace-location')]", - "tags": { - "hidden-sentinelWorkspaceId": "[variables('workspaceResourceId')]", - "hidden-sentinelContentType": "Parser" - }, - "properties": { - "description": "ExchangeEnvironmentList Data Parser with template", - "displayName": "ExchangeEnvironmentList Data Parser template" - } - }, - { - "type": "Microsoft.Resources/templateSpecs/versions", - "apiVersion": "2022-02-01", - "name": "[concat(variables('parserTemplateSpecName2'),'/',variables('parserVersion2'))]", - "location": "[parameters('workspace-location')]", - "tags": { - "hidden-sentinelWorkspaceId": "[variables('workspaceResourceId')]", - "hidden-sentinelContentType": "Parser" - }, "dependsOn": [ - "[resourceId('Microsoft.Resources/templateSpecs', variables('parserTemplateSpecName2'))]" + "[extensionResourceId(resourceId('Microsoft.OperationalInsights/workspaces', parameters('workspace')), 'Microsoft.SecurityInsights/contentPackages', variables('_solutionId'))]" ], "properties": { - "description": "ExchangeEnvironmentList Data Parser with template version 2.0.1", + "description": "ExchangeEnvironmentList Data Parser with template version 3.0.0", "mainTemplate": { "$schema": "https://schema.management.azure.com/schemas/2019-04-01/deploymentTemplate.json#", "contentVersion": "[variables('parserVersion2')]", @@ -789,7 +771,7 @@ "resources": [ { "name": "[variables('_parserName2')]", - "apiVersion": "2020-08-01", + "apiVersion": "2022-10-01", "type": "Microsoft.OperationalInsights/workspaces/savedSearches", "location": "[parameters('workspace-location')]", "properties": { @@ -830,14 +812,25 @@ "email": "[variables('_email')]" }, "support": { - "name": "Community", - "tier": "Community", - "link": "https://github.com/Azure/Azure-Sentinel/issues" + "name": "Community", + "tier": "Community", + "link": "https://github.com/Azure/Azure-Sentinel/issues" } } } ] - } + }, + "packageKind": "Solution", + "packageVersion": "[variables('_solutionVersion')]", + "packageName": "[variables('_solutionName')]", + "packageId": "[variables('_solutionId')]", + "contentSchemaVersion": "3.0.0", + "contentId": "[variables('_parserContentId2')]", + "contentKind": "Parser", + "displayName": "ExchangeEnvironmentList", + "contentProductId": "[variables('_parsercontentProductId2')]", + "id": "[variables('_parsercontentProductId2')]", + "version": "[variables('parserVersion2')]" } }, { @@ -852,7 +845,13 @@ "functionAlias": "ExchangeEnvironmentList", "functionParameters": "Target:string = \"On-Premises\"", "query": "\nlet _target = iff(isnull(Target) or isempty(Target),\"On-Premises\",Target);\r\nlet ScalarbaseRequest = union isfuzzy=true withsource=TableName ESIAPIExchange*,ESIExchange*\r\n | extend Source = iff (TableName contains \"Online\", \"Online\", \"On-Premises\")\r\n | where _target == 'All' or Source == _target;\r\nScalarbaseRequest | summarize by ESIEnvironment_s | project-rename ESIEnvironment = ESIEnvironment_s", - "version": 1 + "version": 1, + "tags": [ + { + "name": "description", + "value": "ExchangeEnvironmentList" + } + ] } }, { @@ -878,40 +877,22 @@ "email": "[variables('_email')]" }, "support": { - "name": "Community", - "tier": "Community", - "link": "https://github.com/Azure/Azure-Sentinel/issues" + "name": "Community", + "tier": "Community", + "link": "https://github.com/Azure/Azure-Sentinel/issues" } } }, { - "type": "Microsoft.Resources/templateSpecs", - "apiVersion": "2022-02-01", + "type": "Microsoft.OperationalInsights/workspaces/providers/contentTemplates", + "apiVersion": "2023-04-01-preview", "name": "[variables('workbookTemplateSpecName1')]", "location": "[parameters('workspace-location')]", - "tags": { - "hidden-sentinelWorkspaceId": "[variables('workspaceResourceId')]", - "hidden-sentinelContentType": "Workbook" - }, - "properties": { - "description": "Microsoft Exchange Security - Exchange Online Workbook with template", - "displayName": "Microsoft Exchange Security - Exchange Online workbook template" - } - }, - { - "type": "Microsoft.Resources/templateSpecs/versions", - "apiVersion": "2022-02-01", - "name": "[concat(variables('workbookTemplateSpecName1'),'/',variables('workbookVersion1'))]", - "location": "[parameters('workspace-location')]", - "tags": { - "hidden-sentinelWorkspaceId": "[variables('workspaceResourceId')]", - "hidden-sentinelContentType": "Workbook" - }, "dependsOn": [ - "[resourceId('Microsoft.Resources/templateSpecs', variables('workbookTemplateSpecName1'))]" + "[extensionResourceId(resourceId('Microsoft.OperationalInsights/workspaces', parameters('workspace')), 'Microsoft.SecurityInsights/contentPackages', variables('_solutionId'))]" ], "properties": { - "description": "Microsoft Exchange Least Privilege with RBAC - Online Workbook with template version 2.0.1", + "description": "Microsoft Exchange Least Privilege with RBAC - Online Workbook with template version 3.0.0", "mainTemplate": { "$schema": "https://schema.management.azure.com/schemas/2019-04-01/deploymentTemplate.json#", "contentVersion": "[variables('workbookVersion1')]", @@ -955,9 +936,9 @@ "email": "[variables('_email')]" }, "support": { - "name": "Community", - "tier": "Community", - "link": "https://github.com/Azure/Azure-Sentinel/issues" + "name": "Community", + "tier": "Community", + "link": "https://github.com/Azure/Azure-Sentinel/issues" }, "dependencies": { "operator": "AND", @@ -983,37 +964,30 @@ } } ] - } + }, + "packageKind": "Solution", + "packageVersion": "[variables('_solutionVersion')]", + "packageName": "[variables('_solutionName')]", + "packageId": "[variables('_solutionId')]", + "contentSchemaVersion": "3.0.0", + "contentId": "[variables('_workbookContentId1')]", + "contentKind": "Workbook", + "displayName": "[parameters('workbook1-name')]", + "contentProductId": "[variables('_workbookcontentProductId1')]", + "id": "[variables('_workbookcontentProductId1')]", + "version": "[variables('workbookVersion1')]" } }, { - "type": "Microsoft.Resources/templateSpecs", - "apiVersion": "2022-02-01", + "type": "Microsoft.OperationalInsights/workspaces/providers/contentTemplates", + "apiVersion": "2023-04-01-preview", "name": "[variables('workbookTemplateSpecName2')]", "location": "[parameters('workspace-location')]", - "tags": { - "hidden-sentinelWorkspaceId": "[variables('workspaceResourceId')]", - "hidden-sentinelContentType": "Workbook" - }, - "properties": { - "description": "Microsoft Exchange Security - Exchange Online Workbook with template", - "displayName": "Microsoft Exchange Security - Exchange Online workbook template" - } - }, - { - "type": "Microsoft.Resources/templateSpecs/versions", - "apiVersion": "2022-02-01", - "name": "[concat(variables('workbookTemplateSpecName2'),'/',variables('workbookVersion2'))]", - "location": "[parameters('workspace-location')]", - "tags": { - "hidden-sentinelWorkspaceId": "[variables('workspaceResourceId')]", - "hidden-sentinelContentType": "Workbook" - }, "dependsOn": [ - "[resourceId('Microsoft.Resources/templateSpecs', variables('workbookTemplateSpecName2'))]" + "[extensionResourceId(resourceId('Microsoft.OperationalInsights/workspaces', parameters('workspace')), 'Microsoft.SecurityInsights/contentPackages', variables('_solutionId'))]" ], "properties": { - "description": "Microsoft Exchange Security Review - OnlineWorkbook with template version 2.0.1", + "description": "Microsoft Exchange Security Review - Online Workbook with template version 3.0.0", "mainTemplate": { "$schema": "https://schema.management.azure.com/schemas/2019-04-01/deploymentTemplate.json#", "contentVersion": "[variables('workbookVersion2')]", @@ -1057,9 +1031,9 @@ "email": "[variables('_email')]" }, "support": { - "name": "Community", - "tier": "Community", - "link": "https://github.com/Azure/Azure-Sentinel/issues" + "name": "Community", + "tier": "Community", + "link": "https://github.com/Azure/Azure-Sentinel/issues" }, "dependencies": { "operator": "AND", @@ -1085,17 +1059,35 @@ } } ] - } + }, + "packageKind": "Solution", + "packageVersion": "[variables('_solutionVersion')]", + "packageName": "[variables('_solutionName')]", + "packageId": "[variables('_solutionId')]", + "contentSchemaVersion": "3.0.0", + "contentId": "[variables('_workbookContentId2')]", + "contentKind": "Workbook", + "displayName": "[parameters('workbook2-name')]", + "contentProductId": "[variables('_workbookcontentProductId2')]", + "id": "[variables('_workbookcontentProductId2')]", + "version": "[variables('workbookVersion2')]" } }, { - "type": "Microsoft.OperationalInsights/workspaces/providers/metadata", - "apiVersion": "2022-01-01-preview", + "type": "Microsoft.OperationalInsights/workspaces/providers/contentPackages", + "apiVersion": "2023-04-01-preview", "location": "[parameters('workspace-location')]", "properties": { - "version": "2.0.1", + "version": "3.0.0", "kind": "Solution", - "contentSchemaVersion": "2.0.0", + "contentSchemaVersion": "3.0.0", + "displayName": "Microsoft Exchange Security - Exchange Online", + "publisherDisplayName": "Community", + "descriptionHtml": "

Note: There may be known issues pertaining to this Solution, please refer to them before installing.

\n

The Exchange Security Audit and Configuration Insight solution analyze Exchange Online configuration and logs from a security lens to provide insights and alerts.

\n

Underlying Microsoft Technologies used:

\n

This solution takes a dependency on the following technologies, and some of these dependencies either may be in Preview state or might result in additional ingestion or operational costs:

\n
    \n
  1. Custom logs ingestion via Data Collector REST API
  2. \n
\n

Data Connectors: 1, Parsers: 2, Workbooks: 2

\n

Learn more about Microsoft Sentinel | Learn more about Solutions

\n", + "contentKind": "Solution", + "contentProductId": "[variables('_solutioncontentProductId')]", + "id": "[variables('_solutioncontentProductId')]", + "icon": "", "contentId": "[variables('_solutionId')]", "parentId": "[variables('_solutionId')]", "source": { @@ -1108,9 +1100,9 @@ "email": "[variables('_email')]" }, "support": { - "name": "Community", - "tier": "Community", - "link": "https://github.com/Azure/Azure-Sentinel/issues" + "name": "Community", + "tier": "Community", + "link": "https://github.com/Azure/Azure-Sentinel/issues" }, "dependencies": { "operator": "AND", diff --git a/Solutions/Microsoft Exchange Security - Exchange Online/ReleaseNotes.md b/Solutions/Microsoft Exchange Security - Exchange Online/ReleaseNotes.md new file mode 100644 index 00000000000..90b2d92ed28 --- /dev/null +++ b/Solutions/Microsoft Exchange Security - Exchange Online/ReleaseNotes.md @@ -0,0 +1,4 @@ +| **Version** | **Date Modified (DD-MM-YYYY)** | **Change History** | +|-------------|--------------------------------|---------------------------------------------| +| 3.0.0 | 08-23-2023 | ** ExchangeEnvironmentList ** parser not correclty named in Workbooks. Correction to call the good parser name.| +| 2.0.0 | 07-04-2023 | Initial solution release | diff --git a/Tools/Create-Azure-Sentinel-Solution/common/commonFunctions.ps1 b/Tools/Create-Azure-Sentinel-Solution/common/commonFunctions.ps1 index 6078b1ac721..9c3785bd732 100644 --- a/Tools/Create-Azure-Sentinel-Solution/common/commonFunctions.ps1 +++ b/Tools/Create-Azure-Sentinel-Solution/common/commonFunctions.ps1 @@ -2682,7 +2682,7 @@ function PrepareSolutionMetadata($solutionMetadataRawContent, $contentResourceDe Write-Output "Missing arm-ttk validations. Downloading module..." Invoke-Expression "$armTtkFolder/download-arm-ttk.ps1" } - Invoke-Expression "$armTtkFolder/run-arm-ttk-in-automation.ps1 '$solutionName'" + Invoke-Expression "& '$armTtkFolder/run-arm-ttk-in-automation.ps1' '$solutionName'" } } From 7f095b3b880e4114a079de20e8fe2c1f086439b1 Mon Sep 17 00:00:00 2001 From: nlepagnez Date: Fri, 25 Aug 2023 06:45:44 +0200 Subject: [PATCH 04/18] Adding the correction of MMA depreciation date --- .../ESI-ExchangeAdminAuditLogEvents.json | 2 +- .../Package/3.0.0.zip | Bin 67456 -> 67458 bytes .../Package/mainTemplate.json | 4 ++-- 3 files changed, 3 insertions(+), 3 deletions(-) diff --git a/Solutions/Microsoft Exchange Security - Exchange On-Premises/Data Connectors/ESI-ExchangeAdminAuditLogEvents.json b/Solutions/Microsoft Exchange Security - Exchange On-Premises/Data Connectors/ESI-ExchangeAdminAuditLogEvents.json index 61309a35d7e..fb823d35ec2 100644 --- a/Solutions/Microsoft Exchange Security - Exchange On-Premises/Data Connectors/ESI-ExchangeAdminAuditLogEvents.json +++ b/Solutions/Microsoft Exchange Security - Exchange On-Premises/Data Connectors/ESI-ExchangeAdminAuditLogEvents.json @@ -143,7 +143,7 @@ "description": "**Deploy the Azure Arc Agent**\n> [Learn more](https://docs.microsoft.com/azure/azure-monitor/agents/azure-monitor-agent-install?tabs=ARMAgentPowerShell,PowerShellWindows,PowerShellWindowsArc,CLIWindows,CLIWindowsArc)" }, { - "title": "Install Azure Log Analytics Agent (Deprecated on XX/XX/XXXX)", + "title": "Install Azure Log Analytics Agent (Deprecated on 31/08/2024)", "description": "1. Download the Azure Log Analytics Agent and choose the deployment method in the below link.", "instructions": [ { diff --git a/Solutions/Microsoft Exchange Security - Exchange On-Premises/Package/3.0.0.zip b/Solutions/Microsoft Exchange Security - Exchange On-Premises/Package/3.0.0.zip index 072cfa2040b575957575ecaf468a80857731f718..02a94bb9986662a65d1d6904e2eb8a3dc3f1fddc 100644 GIT binary patch delta 28451 zcmZ6yQ*ds-sDD7WM-tUFwzus;w8 zfnHLt@7s{XYCf0T2FMWmY3gJdGp0YVze3BrL!cdqDl@4IkPRv(^jTu_SyADFM!BFR zLC+7(j+dV7sM?CA`5yM5{Hk-h9;+hb`3Wy62|ycCzx>>!>u>V84=hIjIOlE| zj0}?&xkhZq5A91*1s=10L*k)cZ@&`uOq5LqR!VHs5#uGE^WV@ox2}3f*kQke2eER7 zlSz!Vg@-}lOUBd2b=iBPYPj>|BYrNPQfN1<#$WSlX%Uu>_#cF<3BKRcB1>QmCjU!L@x_1$j%+qY@-*nmS8=) z-;6xaV0*5+UQ#-}Za*3|=g;B~qRGHnD)B`Rsh}nZ4#}HD;_{Cf;16Fn9u3oy8F_nm z9ic|W#d89)HvB<9>qXYJu4Wg??_#z*9zHEbLcUO>m$C^wpUj0HG2k!(JG*{Jwe}2O zmB%ews!W2X+J;BsGK$ANJh>hvOZ3V*ZuN{}CYcNH-^8?89WQdk-(jMIFnc#bb6VRB z$Bt91%@pSVGKGMl$&R*Y1g;x~hdN3-XVA&6KfQ!roX56=c%7YmEeAx(1@Ct;s}$wA zGQ3@+m&sdbcTk--1|~2-zp|||`(+b&NX(BPO~Te>&~G@FdkbA?kq2!ZI23>@y3@nf zwE5_gu$Lplk-kKgw_>UEgNt&PUvPso8&yIBdKkJIv^bv1+|H_{b%_Fo#ke_%?Cu1P zivkxHnSma9RQ38QHI8Jt+Nx{PAw%8=^X3V+s3Skh^P6CopFO~IlM$T!gJyjFr^gC^aF82$( zKk6&Kaqx8&W7C=iQ#un7MLZ#TJlWxj?3Xp&?tcE z5u)}uUX=DYm?E`oeUuo>hpH%iauhZuGdQ{+lf$%_y;LN%KyX|JX^N|+5}se?O*IeZ zjp>t`^W~;fKeMqQ1$Y+qJQS@HS`7GoY2sS)6}Lk4q_#p#J@7Ec)@wDlEa#754sFya z>;|MfXpMk4ns8d8q8QEM!D8rk7F5p4gjTx6;`{2A$~gA&YVF+xw)E+1TJhZPd;=7#Uq@8@^ox2uORHdb zOw$qKcz>>a7c|*?G0YEw2SjVL+>Ocew1wb9gsOp5e?_4eOZ}(<^La(nefE@?AM~g0 zsLGZ3&c+B}BGFQ(Ki6f&Cf9}?J#kIhHRLsH>CDsyXfn=C)O#zvBlMuUv7kIRB=;9t z-hVUKAX?p?C8jYWc(8XA;aaNPoz-I2G}m$Gg#40ql}N#v@NlVtthq|Qv*Z~pyFJ}v zd36SAFmtb}h;pw~?@o2ebFUWn{&XcD{^_z5m`WJKe5JfTLesP+KX1xPf@s+m+;9n* z&SB?qjH&7>^cmr~x^7S5Kj|2OdQWG5+Sr%s1s*_hH;t!51J_?zexr6Pt zeOKIY9Z{R>*kkgOR}@yOgA=O;6I%@;w#<9x^PYpLdy>AjZS8{(YEg3Vh$9rJH7Y;? zRn##*p_4#EWwVwOCZt;qoX;h+BXxQ_xR^znhvwFTz8llQ>gp2RBt?F>cFP`-o9*pv zP)<=o4(Ar$(14VZ&SMBew&Hg5)*Fn*$~|MQ7}4vjtH3I!hECF6NEMmOvj_`I8i^3y z(}M~x^MML%u5iAqCw^Z#aZDC&&LvPjzjpnSl&F$}f9`JS)txoMCUpMb z$)Z!w;ye0HvIHIK&g-oh)Xd!sSw!PA<+Ds$EP0DjkKMVuEZ(7nI4*IgyNQ=gs@AgJ zk4Ex%3R}M=*%4wV@tD=;6YSCAgj+Bd?+kq`x;zj2%PgM6q#BC7OMAE^#~82>jcT{JtSN_@t8{S2QVq~?d{(GJR-sn@Cp!)^Gl&m#&bivh@pU^on zk3kUa?pwX#`2DYY*&`IXDr(?o9<7jaT!ofAh=_}*4+jJ^DlzGE!1qX734elizc#Qy z@XN!=LayFEP`F;@!R<_v$UWvnUZ(O+ykWfpuouD{6XL?q`9eNNBiy<`hOFK2$ro~# z!&Go10YjZ-8hthx8;r?)S@Rj&FAKyh8zshiYz+*!67N8T(ZafB=*DR?>r z=js~bFFy**C{aEL;gB)6sJlR>EMNYyn)8Xso!#gblq2R&fxLY_3^NK_6l%VCKT3VP zf@cNyk&jKgA~{F8O)4Y?hl_(fn2GgG8i2)i8s;Av=>`i zqvkvtx|Zh9DBFz5)Knz@3_7$hG@dJXM-YKq9G zC$ld^2QUq@-;ZZ1nMU@_pELO5a`pYv_iHW)YHVIb9&a6pF$82DeJHWZVul&=z!MAw zvIBfx@Jt4YDD`1{wq)i^r2QXA1bcndK6)*!>1EXqW@R;hLlDF3tJ(b)zx-obOCdzd zsa^PH!K{gvHG*pm)|VP0kh9JQAp)|HuTucdaUi!xxxyye10RKr?rgHXx;6OS1C5VF zv-VzO2!H(+UlBOLQt%jvWEf<4!@*fk49hr6H}eK_{awr78|~4@ki3{M9RgQ3#6a;A z1`ef}Jmu2r`aCk7Hu^IiYl`A&0OKz{=?gN_-G24?ce8kN46j3EhzQUu?PnnQC5a;@ zOMfZP^XC`Ov+$YjLOS^3uy`N|;&CH5n~L#%wd$W@v~r*vbD1py#Y+*|ceS$?ZF5bi zCii4O*gC&!*oO^DN&sYG0mb+V+s{o@P9?Upr|82Ln$!NM_32Iv<=c4BTE2V6_asNBz^n1e4(#at?$jbLslqGwPZdB@9;N!GIzv$~P4Asu=#p=MSM zA0cMi*unP56BUog=hdT=w+mmO%ZBeX~>)cl1_qy)q5|p!cSNfyv>(5zIMR_;lQqo?RIu zUyF&ZG7j7&Dk7<&)Mic~;_bP2!P0R5+4Q;|V5SjqNq& z^Sdp`)1OgPOuuJUL9-nUllusV=7-xzrLvJR(_N|BkV~3yafjp&cdn# zdOaM^gJOh%B#}M{@F@Hc%7S1SoENrm3CJ6HXk%7ucymzblo+|O@kJ1L0S|6=__b%F zvzTvJ+A%4|mtzdXy??lPiELYg;$#t&pNgztXJz=l(2#meE70;VL;UZfo1FnP+Vr@E zk4P8|c9Fxm%K%niom{RTKhlbI+g+5295F#6cy~rQalCsV!J$}3@z5AU#3E{hh@l;# zY`MsQod#r1tmccTtAo;dOw&g*8fx~ikm9)ua`OCV@{Tiw6V7HWsk;0XZtB0J!6NHN z1}FO(1UxtM5y1&cUSaA92Hijp^l2I>ls9t640>QZ?~I&l@#9DU`Gnj0dO&b|M?yBk zxtZ7d+SgU)`oWQOQ*cUB3YsSa_Md~)9jA7Wk`2_~W}$zxHw&}-uJmghpA#8YVWzLN zBbbF|Dw{7XGkM}x)_cXu`msnOGEKB4rLwhN=cO9RicwDM8W%VuS9^gUx)#HvGQ@?8 zT3@m|tWq5MthyOYc#PEds)n<*+pzmQI#RNi&SeNK6qD@>7B=&g#gJ#oKLJ&*6vK5H zHz%^SfWr}(u3*QRq)({3HznyVMGJ5lML3?8 zjd8fdQ%r&^f0>sBFEoI2pF$%S%Ay!JK*h@n3A1T3(Gl8J1Hc9ili!-vLbZ-)At|HX1 zjoDg+*QaKtrRJ7k(^C+06`|4%$kVL)Fon=OiUW-~0ncn6Q%T?yI@R~5hF>JR`&9rW zt>iOvvKn7@lDKlT81>sA@GApaL*=YGtDa4wFMxa-Gge?lTOkhI|6U@1u~?JQ2kCk16260 z%Vp^~jE#xC84ExTs>=63wlNp?O63I&^0+Y54R`i)LdyQydK-isYYv+~6Gf8AkQ!!v zUFWt6(mhaAWO2mn2F>R;LGj8~$TZ|{)O1cCFFcHl%915!kYJX})-D^hSoQD`ZYC@E zUPP2i?4t=L_N!WQ9Gewp6W3dRaXc2_^1E zY0^#v#*QMgv$D~&OsnZX*}K@Kq!1Qp<8_C+^k7zM9JJV8^7N)@}i@h?O@57QU zZ1sffdFP%4!$Gp;EU@TE$4Idd^Se=(r&9yUD1?AdH33HxikXMkM?#wiQsHN+U{=`; zTW02FN$(j$y`)Aa(d)ctu$)v^wWXt>^porZP}1Cc>$K?||DKZK$9T<7OX_%km`B{L zmn}@-g?(a@%U~5o$0%w0;W2kRP_Kl~K+S-M<|VrNYf@$V;G@#v_)#TLH%Wj8!4zpU zqz0R0s+aAu`L>8*8ZDAKsi^S;PrAU^cmwhQ_80a12P#8qoV5V(>>2r+)&X~3Eu}I8 zcuj{m{$Ugz$A_CiVuAY*j9HI`Q=uOu31GNw?hKF}lkThpD(zC|@HKCft{m|Aej#0p z4bdtxr#=mPMS-R4_8C|wmr{X=XSst#vhN``J9}X`WYvLVPx`NIb!Ww*qs)djS4HXc zFKO+5Ti;6APTJfWCWiMSG3*_wj3jFWPJ|K(^0u^OU}adUhregHDnc2doLu+wD!WtM z(7Omk2h0S8bBUbevpM|K5N2BP%PIL#LZ`gZF?}!;$I8U^LT3VS^qXot<{0$hTl9Z{ z@n|CI;K^Cgbac{5!$T55_C7m#2~R80QK3eNssU*0#5$9Pe(!XXzGAuLCDR%}Ayj1P ztc6wflj0_|2ug}dW?EEG2(6_OrnXk%yrV!ZU8PoHJsW*yQt(Y*fkycmG>CZugMmfu zxQq>Npd@pVeEhWuD6`pdBvFu$Lh8#CfiCtSdau{#*`)r5#R$AvWwGm@)!dsfd&jea_H@2ieM;}GYkQs0Nx588z|?V91fDBiCbpL{I6 zmH6X49h~(-hVKqLtKV^=SCYpybcWDTJn&h^b?#i~46>9Z!h*ou^XIJJ17)9d-vCg{dxuTZs z>JKX%{c~UvL1+-yFb~5dAf*!n;xTC!+%uOcu|Cl5N6a#EN{Cb%P8 zv79##2{V=7NX?z&V5?(i6U>9G@oQD7f;-73{CR8iYrvjVg>5%5JmdZ$KdSOX&~RPw zJw(8WFMJ3b4Fduegm==y%Yo;4a-~MbcwbQ5IZ8s%)L=)y85+K~G}nkb;_}i?B1F#X zfII4DIJF(yBBlMZ=Eq7wXC;IgJy#^`G|7}zySuCjioZ?(?TU(KLIDPf=EGuZ?h%b^hlXha2x(6NX2?S-!z)Zp; zRh9gMA2D~cXS%OG@VRu1eAnDW!hs%PQ;KmpO@S_&i>NJYdf1Mi1mO-h_sAvT*pUA+^NC!?DP(tng3YtAfl)-ahyvv_$w zXZtuT-lZ%ahOBH=v7L&TAn9N9)Kb&^=ac{j${IpXvA9NV;Lp@1F;!K}eyE8vO%=GT z1ozX9hTi*qN**fW4zJDu)FCrs-3Sba?8jUN>O?xXZV4_cO?^C)-o)Y$N zXt{6kazfczRvTIlS$Frqxcxecy~k_p%@xwn4~1E0#*}3TatApH8`~>U1u8)e@ep zKrMU7K+^m3o1~i!qc*vQYvVfSAeW_Eo^y4^rro6=jZ_|Kg>ZI-8c|OIMZ5asYGR+) zu(v)a5`i_jgJ0`fP+jMuOQ}m5cw)e>K;eIas{RvH^FKk4%Kws+UbLlux{_R8zK~Mm z)x9LOxUQjB!TJUYwz%^N3fkRVkQB8_569w^2yh=jvh`0MUyOJz;;dQp_He#u5ESEH zAch=nuQAXFS@Utiuf$$Ts@xS@IhA#Ql8Y%X?h7%gR$)+4%ktXr6-NS2gNE&-)bww| z^>P;GvJQ0rkAIlB5ZutBsq2=qu`x&+PuwLzip$i|>E-v`+cXr6I&i5Ub5%OwyIXWA zGBDCh&P709hHNVh{WHy**chrN|2wqm+bNbn>-GedVnkA9I^~mgP_vjJmRFI64aa?v z#R1$LCvQFx`bU$K)Lfg+GCwi9R?2gq&%o*fD8^3*fpHw&yDpb8Kc;tSF3zF>nclDO zy>Qi)y8(KoVZjyn-g*vPr%UqZ0Otb9nGe84+OzN`q)c|Y^7Kv zN!}qsrGK#dKEQ)bve7j@K&6e)J1$ipLEZ)uiRXdTWg;HG<#WifZwmW-L7m%a8_>gr z_c$%!F&X4n_&a>cBeO4wT51!Y`+17-C(1pzufYn)Y*=dga?69bA=JN=Jw;lO*aGd8 z(;xn!tlTMSfA0hJ)p&C~9a>d1)fBr2OC=I22&p)Ev=h{MeIv0{<-YVfyI7H;WYS{QN!4jd zuknD%9P)s)9?Y?DnIkysW-aK~)i9wNx}WW--Ph731T@l|iY8+2!<CiiAc4cy8ia|r5*IBJD{I{HoTNBBzvYP zgC7d#qPZ6OVTC!@fu}}Tl>z1{;|A#q7}6Ty3XAas4V~z)KkJ0j2J_;s;kY*kXG}2} zj#N{&oXKnor#sqaYO0z>S_@onjlR5qHJ$JfYBEK3XbfKy_eRsMAlLcv= za?y-#6kWeH$=obT0o`;hwDFGCUm63JQy1Qu#Z*pOS*4TVdWgzM*HS%LPhu+ z3CMMU)7!<{8wtFvu$Pp5D7uaw?YNGfnP*S;XK@eU<3nD2snd(Qla{C9nYX;W&VN!B z$ct)<7^wE+G3r_J_~+g214hLtC#;>dE8gi3q}-p8?l$oEG*(9H3wn41s&H>>*t&QF zR!0A<(ne{(%W>lk5H#1nbV)L$6-?%#FIbyElX_uFp!%n z>yN$u(oKQTx%dg!Y8Th@|6OJ5scR|`O!QYKCKWR)D*bnOQJm*gj}s?7di)+X3Ab+R-dhyZCImDI zfxY5K-PX=VGBH|`Mm%5X=z4+ABnGR<@^ZQ$q?E;`-u2#fb=E6qeqd~tt>OgVaW1cJZUqN#SZYkwN69Jr@Dx{H<0_z zMcrf-0h?_*Od)tF6?y3UkL;W=}apOPx+%YapZ6w?%*Lx{&_!yRMdIOLeb^*wZ;5QTtHvk=T|c@0l_1b4NA zbix%8>SfQ|oDj>R5WxX7GS;!BMN1upj%EqZ4J|CtJGkl9v`(gp%1@CgJyqg?L*dj= zwRWMGYALCk6{+jRzo@&VUv_`nT%8Rnm}|!DM2T8V(-3gPl__;1d}HY2dHNQb;i8yn zsAEyS<$inVJ=n=Jd35}xIq$rATVO5+*H&pB^u*VV(60%m5^0Sl$H6zrKh8J0moXqC z>0MUiLwVbHJ=woA9atsVSSU&*5rC?U1Vfo~)_X&lZmuVF1bWRQ`uHxb~P%vaii zA`Ad!dc}TIp&C}E29HD_A1cKJ9NI_=t$%My)XA7B`kUiFSe;93_0LZO{I!B@n_UsD z>=eJrx@1|?q$%Fzpf(*=pCG8+CF}NaYQuJzb9zP&%r<|Kvr-;OEy+Hi;Gx9}jze1E z7n4^MnRd*2zd%lf3_boRPM=kGerPsr$OHQE)iZEryOWEI-u4XIQu@sgqxEJ-C)f5u`YWS@?`3lq&cH)Qk z&umdUVH~K7wRvV#Ev}q;v)vYGO-qV-R}HN)p%Ajh)VA{}lf*n49{hZK^S<(A?g1d_ z&&rXk+#VZx(8ALatV4(affNf05^=GTW+yo7@$Rwcg*=9kCv}<(VlhUT^C{8?yVJN8 zYGpp*Q)+!CCgIh1wNFVMzbI`{ZQgbQ2-mP}AuLHFl14Lm{qh~^y=&Qc6RO(}Ugyfq zS`RFOuwDvZflirH1Kdq2Xn{KSVnAOAb*v?4M`@DGjCAQi7c}b4O&9wm%`qpvCv!Gu z^YafrR}60Fy+6Mk?GI*7j+$ zM=(CO!69s9Um+JhL}nnBY69(K`^ZK|21!g7**Hnb!S$~!Mytyu65cNDs1D@WOEm+^ z=HP*Ug;xm8SB_)mmT{%7y3_yBz3y3k#HK`kRy^P^iP9^Umy|7WJ3N0m-lCzOM1ea) zzEuDALtLX8kK4cL^4^r@(&j%b7k285DOiiE6F|yOIHAd~r2_zq< zM3@B?yI+2~gL4j^!d-KsR^lK^^MQK*;dLNuKaq03YkOnGv@0f<_{mBENS`fl$sdm8 zieE>0;nfTlQ@MLbYb-vGN{d#QPf99MWfy0soM}hYDIS0~;4U7NRY$TImbY^-csp>F zLMkZuN0&B+NK>k)jxCRR%{b|&u$%GDRUzzuh6^-i2wbvvJcWah=6=g)kE2-4+Z_^0 znB~9wOc*z!pT;MTff@n<{$Kn?CXcEq-c^Q6{l>dO4E9;Weh3Badh>}Yqqc4E{^LC7 z8u1G~%8<#g%9!-J4YRfo!Y8d}l6tRKc#j|SelNy@6Y6HdYDF(H@K1gquZ1~|OsRVdqvJU3 z5OVZ!jviaGuepQ3jXTd$Pwb_l^WDd$RZ40y*^5h}V6Y(Z7kKSuPB%~Lb)w*|n5)Uu zj99o*jXl3=L-+ zsC%)856!hQX3Q9>mcumM%k0=WSYTjXGlsd_5K%oMNSMB3*kvLqVH^7UGiM;?&Z$=a zPkIuJNKuAYf)W!p-I!l}soBssW+1l<8U~VRAmLY9Ino8nkSI9*fe9NO>*pzUA@t#1 zR=1`x?r*TE0HGl;5+heChhz{Fwd=7PZjtJ1zSU)joF=Klj{PJ8#gQ`bGV>vjE0C3aDPq zbxwT(bV3r^(LZb@Q5hCXTw-j?CM6AL(dI+{ItfgFk~Cq4i7M_MHY*;|F1K-IdH+wx zowt8{g&-9Vx)YxNUbZqmG#trBST=ekOCH4cQTmml1H|?tH)UdM*I#IK^1m5Cg5R|= zv&AT%IqYo=Wt?w`SOtTpg8-q|rH%~#{unBku~;YcNW5PCVK?KPuy0IJP0CC7i&N&b z9<*05B#buLCHSy3rs@|sIboPA$~%9^a{8*hPj+SHxC2ut{Dj!uq||~C^>4-|$^>UU z36 zyMPi(-O1+m=Xw+q*8B$OJ`j1VFDKZ>UZ`%Pd6m$D6&t(yI$oL>31FA3trV?d;9uax74?dry5F= zQzKByWbIIMZ~dcX&0W8jL;inScBCq!`n-hxJUQ)Yks3^viRAF7d}NWX!#>X9B157F zSJGF>G9FV}#3n9jVUFRi{r?iOMSV2gGbT7jAQJz$+`+VLxU3l0op^v z)_!z#M*|r&>Cu;LkS?s|_=Sc9SYZ)Oti=V{aiesONQ56kRxF8IQXCndc==N$FM9Hfc!h?1h3!D#~0)Tt+6Inl<=u zGf8FzquQuH##y<49hhK48l--}z6(F35wm?zgm%&+x3L>yDK>UU?aisK&$CHR02L%> zqo|Cu#ILHVOJ3pST|pp|G#UGWNaIzVg@?q~-!ey3ykmavnzdVM97|s}hJ$+0dGP~D z`9~q*-z-@sB+EpRr5{nPxk44AS->_2dCW4mRphv4@51umpGyJ_E@Y3D>CH|Jg)hU#RXYYUU6_XF z`eX(tXL-UMq&g(Wo@+YY5|sZU0fO4j;&XTooXcCA#Z z^rqpI#0QTon<;W=D}LVuBJ_CP+V~W?OFFX8G?ZUHr3w z+k^bE^GY5s$$c!4f8@oMh9=#dY27@xeYKK^=vxlTzkshI(OSmaNzLi0O1o+v+O&e= z;>PCY8Vg7mignK~%Is2_z$APK)6c$%ldJ}$Kbc5l+_YpdCz^x+d~R9#i2PH%3-gBL zHDFl5G9e-=^PJEqXflpQMm+n0O!y?@0>RVix{gm;PcHW=LdN60PY>(&U0hzrf&j6g z61m~PUI4Cp*Y^26l42KFCo_U_j+6dgCZwxCcHMn3i}YWDY{mTVD=btM**|)Ljt{xB?`B)#_|`3e!+jZl%#?tqccxM#d&ZH4dv$(Sj~UgZ--r># zF=g3G+fW?+jbSH&EjdKQhHVtG)@q_Scx=qWlh?ZI?1vgoSQqs+#h zz>4z2=+UOku2t&ad@V{OPCV}-dlW79X5#~v$o>=+#eU}|EJcdmMG&3*L(P1Ixutic zSUJfDXCLf49DD6CrG_`;R|%gCkC28k;x}Y6VCBO?I}$y{miB3wq6hV zm7oNJ73mKM#Qpj{2@a=*8iqrQXeQ^{ok5OY#+CA@rC@Lp7(Q97zpGflPf2m!L~~{*oK~%T!7q7@ z(KOTjd7E|%#&xHww+i%EmuKjwXU7iWHW6mpOQ+!Io(%n6w?B^CE7>laceDnQKZrj z3@LRT`P3c!U{^-KY|9vBOP?rOAfZaJJ0UXSU6Pgx?5_2ewXkJO#{x;j#(mz5`AV3N zD_7TS5K_W44f$_}aZenRuksP13HDZzZh^cLU3nk;NmIRNui|f(oIVJ&!tQUtbT(my^dN*7ppd?HmYEb zs`>sebdXX{+2q%qcXW`uldeOpYOvG8zB?Hz@m76t%odwzIAP}nWX{m~#^kef7_&JD z>OC--_($G*-#_-Xl2BjS#s7ymh^@N8{$JvNajCx$@EZP)IHV-?(A=$-Xpn-1rgC`h zSk>>H{i;T25g1Dm{;etU+uxg@(aPdEqkGdmdq+Kfhe|a?%5bELJg_hR)x}-PJtj|^ zaP=8ZeFbpMCQw&7yWwU$hd$r|O|Mumj$Eb!^|) z#S-`CTBXaB`fuQ7-|PoMX94Koppy|^$hB%pG7Xe$Ho7cC3|L~E5IS&cGKy6 z`6^8Y1Ki-!=TGKshIIE_syV@pifOs(!oGC#S|;C{tm!+1yoJ<5UEhD51~gx|O!q)# z=M2yq@v$=`I4!{)DBj(|fP-wh946cDyaWBR4d&kG(sV%1tfZ1wr1bOKz{%lp+MD~p zBqA2L1<_^D9@0ZO<=%o9Z(&x$1x)4G)|3tY-}Am_nralAQ>@gw!uUFZt=Tjx@U|>_ z#XIkLgZp6kvn0t>L|3nOgs$ZcK4SpwXcN@G@G7NKqf`j7>|;YBFSMDYC& z-GF57CLF$#+1Q0kWXFv+EF=g{qYFu+!%2QI3#NnO$g>2LXQ4;D(sQP03P~WV8OQgn z^q0*2Zv2Yb@+XH`mDSg^5ZsPn?^@L0(u^>{-8sPNNe;FLY>mw5NW}< zN&!DO7S6>!(#y~OU?1{Dx4WD7geUxQ08n=A(%TIu#vSm%J?)tPDPI0Inq*HOP~f2rX} z-SRy!Uc96%kLY0@<^9I31#`9d4RVO&824gC4cSRT`b!R$PBe^paK=a6tP^~-2ZyUia#J1cSxxk2IfR$ZMRoLM zQ{6vnaovOz_g{UU4!@R_`$5kY;>io9B{>>eljOU%&_@b|6lYG`COwDVEc zNyW~tXD01p&n43w&KC1!{m+D6vl7+bl4j3Du8p3OMx*6+KZk+4GyKWhC@=OT1h?wT z?ce2z`n(VV3y|o^8_)9wqM_oLh5LE|xPL35Vu9?jFsS3+><6M?9AQm01GIVi3{o_b z`2sftQ2*_PLMmUl#428+Vk>AzvMeaF_^7>0;442_GiYeuJ}0qW;LCvO{GL$#Ush`3 z^I527@l%zqN`r_Rj#WfS^D)-sF@Z|{7dbWX?_NEf|K(@zuMdLiSg*=hFBMxB+2UOV zJcRny8(d4jM~B#^;{OSfnlx|+OCRwuUX=ini??(r&us88pZWPdzPv-0h-EFIzi`yW z1pkyn+T`&YzQpeN=<_`D>)P2zRG3G#oB31&D%@+zvKVdHsz`kw5k;}dt6PRYn4lZ=>p1-eKtV< zz_ltY#m$gIY8**mP{7P=6sGh3<{pvj^&@q$Pny>gzjgY;VP{JavAgCn{h7*dd#!N9 z-^)%Ab3@q+G_vC_7rfj5ZHtEOyxC!_2z6tH0?2nF8_s3CCS4pidD;*sc-pFI+8EwX zL=bHauXdCeKqFe`@2`hgXMiA0-ZsKP^1i6ZpSbGfEza_IIgvV@Jq;qUIE0zmu}-n; z|7Ov88XkWH7Vm@!k})UsQt>2tF1VrsYls)NSA0xy1q7~Z{jnw#;VHjbK+Yq%Yz9Z` zc(FA*yq0XYGj2P{t7vF)F8p3nH1PN0Zy3!M`eZl1g{C#;hAB`5#slWTQ!)Lk399o5 zI6hFO#%v!VPn!)ge*{UI9?R{Z2r)4FTU=QmX#e zI~;y0d(?ZIl{Zx$aHph1*&_5&lIk!C(~=0^Yx4CxPx>W@o92<{?&P3;rG$kHx+E|2J@@^+67*kn zqjGk_V#W{~(2WIo3o{69Murm1Z~a>^h;)bOUBz;&&XkF0X_YgXxY5m07U{%#xDWhP z&{CbFNcPmRgdFL#UNB^sZ}S~s$@Z|GAlOT`Vzwq#62f?r^B9S5(>aqC4tkYx5Q{Da zJpt)~z~7dvRa^^V~X4ZDE*Bvard`O_oGJHgRci)>!d72tK$l#cj9Qzn>Qu-isi*U zd}v65RNzY6BL)#-I8!D-*4O?%0DG_FNX=E;P!+o_SS117qi^OxB*-uh6PR z;2shaqmKR-AY!V2iO1Aijy94a)6@0cL!vLp=@^mlXHea~aoyM)z+Sq&j?DIl{QD6O z6EPu$#|&1GzqJL{ICGg+K z1!p0O>}qRd?k2=O1J?hlFG*c-dglfpRS|N=M87hT-Mu}7V9cG6y^b2Z#aZCo*Z7b( zwX(byLG{8-Nnx|c*%j>1xzh3y^Xn7&=zX7ndsAwJ5&7+mo%?Lz!Ml(kvtKY`2{EE_ zrB^}2+Hq#YVgtuxSP8lQ{)3X2krM*D4GZI22Udn*a=7?{!1fhY+{dh@pXZKn@C#Fz zKMNqRWD$m?u|ixu$g##YP05$WaqR9XFHdX{uW%Ql2NCgZhbu;&AqAF5JTEP{2UEL; zo`}uTk@Rh49P*J`ZohnE{r@ZMtYY$fgEx)4YjM}&?(VL|%ZGc>;_%|`P~?Xecc-|! zTXA>!aCf%<%_f^Y+OtXK_(>*nUvoW^=ij$wIzfks=(HL6tB@b zSUs`K&y982MW9;eEWu`buKMEQM2ahC+Pk52OFh~-FTYFcm{FVvr{VG-c}ax|J|mPk ze*Oa~8B+BNFg-SZeL6}~?QmSjo*I5b3bKtUZE9 zQdUCYyYkCfUCO+6{l_ty>7)m7t-&1jeZ~}h;F2ZwhYm_&&kfh$5Q3E0U!9JgVGxq@ zIlO&f>2hBMGp8Y!vPVWA7HJGuFyq0D%E<&4YKn^#aC}UFkK=V2Nc6;H1od@HTTaXQ zD1|DPG`tQ^Q=;j3;|X#oWu2c?*&H7vrWtn4A@N3@&m&M59jdi2q5kLzc$|^yyE%T& ztTsHxR}~aoS91%v$34b5_&7Bhq$e~urxoVk`@Flkn3U%$-73(e;4U6IA8@?qLyT39 zCwVOZE)sWl@=ehybc?mzSIrWaI*B0;Qnv)8YRvzD1Q#S1wnz3pny!znYP z){{2KUxH+HEffvJ&)umh!z9~%{LB*z41~Xh;~j%*7a@{U{=j9~d#3xOcqI&Shp$kM z#w&!lz}O_nR{h7s;HuSlk#!Pe{&NN)W_QvW;JMzN>^sv)-9->~`}1dFrRY~iY5@1( zofc0LYfeJ8it6OP8ShvH4I}ciP%ec&!vDnurVk0Gp=4UCwMGn6Pe(hp7gdB=A?RDl zWtD`LKZ3=D)Bmc5{{P^BLjZQB41zEq+yAL7q{ciuD8&E&umN@%ex~+OtjMd{H(8r9 z2=7H76gjAtP?qruOy#810lDRk{b89?U3%nuh7Vr7lw7}Btn7}$KqEPhaCv2Y$;xDV z>016?jv&3)Mv(&9rocc(40u`gt5L8@9|UZTlruv71=&B25A}TDMwq$@An3vYCwWT-qcSW3O^9{}SIoT-jgchd1ay zrOHlb3x`2nQB-o;n@#q4)n^fjk%Ot;g~t^l3Mn-9kw9CuN^_+l(~@j(dA!5l^Zb+9 zJVHHjOTDV(qPfFkRn#yA1@UfOJkecED%MAIkH!+d*pfvpre}m{M$!$v1PMjq{Dvr5 zSG>aMJ<{H17g@(tC+lV#OQ-5_-~9PB5edy~zj`EDiyUiITz&J3q_<~XOr^sW;#0)ka{+01@g{8Np z$OhR3$lP%u`x!B5aI#{IPu-_#L1oWo^F=rGvfO&*aX*+8e$lSxO(w<+_4)leUK1Ug zjb0FTQOC0??~>#x`=0%$PD~->)*9dM_T2R$>=O8R3A?1(xMD5}9UZ=H1)Dta?~*-W z`K&meAURH{>{^H>XQvu?aE-qswjtunrS?O7-vWoaSL<8_14FGe`8&5AtQ5ybBA|6sK?KVolgir#CGg>`(jOZ?M|Px{ zcciC{qY?Ds$hXjQcRki2nNHg=Sw)6(1p5=-Ll*bYgnVN-z3;1K-J6ITe!~N*P8nf#G3JJMDlu>QQQD;%#8QvuMwHYKT zV4=h`7-(AwlSxCKGW*;WS<%G%kfk_AjV#1%jqsK0)b3#Sh(Pu&7nmf;8e^Aa_Za70qU|r6ry&cUEy!;10y~XLXI67mpgbo z4@*Rgt<4H=#CFEVtf3inPH#H8?*eVGM zM$#m{WVz}vP-SQ1UI9x^uC zIGbYBBfh_!7~v%Je9CvbOmmCOkN}9lv;g9UP+#+EQm~@6HE$8cH|QTK(%6P$2^qJjRqn zS67EzGu#nzU)eR|M*oTtZvE&r$Q^sMvs^f$ z;LC*qN$ylJc~!l3;*PcSE=woKxE>Zae4HDo{A9Vaz48qkZlHrfIg;odl6F4bS9w6nndY#%&RL|*^gAP5Uxx;Pz;F!1+`vIhl7zO*6c3H8O@}J7(W6cqrNv#i$xjIp`TCJaBn)6I4*SJ(rp}Czk8CkKJdzcs< ztB~htUoe}^%a|J+IUj9LOR{SUQ(-zljmyL*Q*pMnYHx3msMg>kA<#oklBK=^tVH@| z%EDg?yK#2St}9XQ*&(=mXaa>E*PgEqc+I}7$AZ)MCQfgo?cX!V43s|=&&xNmY6j{r z&*9%wmqXZxY7uudC_%ParpH8uMlF8)6wV`L%FrsSw7kppBj=VY$~_PT6*Ch*(ZOFT z^bH!F`YH}0pL&Hs7Bn!YNg+AFRfobDmed}|@>z_(L(6Vr1lCO0YIbA;y92WoU8DN- zrU}l^K0mB<)x_H2^f~ip60eRbJTE^gohlE5RE$%TKTsINhw65bvdQhLImk27rd)Hw zv?}+Js=;vd_nTBd8!`(@r37W)JTR0xvE z2OEva%&wD+@Jqkn7(XQe%#d_vqESu^Kiy%?#U7Q@?DEIqw_j}V)#WQNE=0N6DraL1 znuJdNGS$o%=1xTFUuSfu+RSCNGkZQ0&KIuv!m#bRSG~O$Z@!n8|8?&F^S-%N|5lB( zEuie3P1~uG{38!>wM4!|M-h6YSa0s9$hJ;{g+n&Y8WZc^D^I;SU>u2tiB7T2{N+4V zevUuk^VGPA(6`Eeys6veyvFeL>(a;A|5M&n+~|mS5n9Hr?|;o4 zT-k5m)>a9DZQxtVg`h)S2f$2Ibkn=UETi}JQ@bg1B`bIn@6HdhBYVV_cf@*$LQ_KD zD*^4MagBd3dED5B)GEv&RvCY4zj8iug-(B`n@eI$fG+Lqq0Q|qlBC#AY24{+ReD84 zEU)O|gzR8LX8GGxl?$0=R=@Um;fPCZ*@i&cF8d#je%aBYFaBR!ary^c8787>^z>Pz zDc*jvNFUHDEL3!6Bw1uD_U71mR=G0#XA1;9wBpd<8L!z#5xX=sFt{+=*)gwJdKr8S zj~DAMruy@*;1r>#b>&(&#q0Wh)^76pcD{zu#apMG!!NSO(yb$KMcWjnc#~Ldjb%I{ zGaVuiak*Um>-<#O8z11RZCA(e)dwhU>+%WVPJE@sMU$gv+HYy^!iX66H=>V9fHUwM zAIX+hmgG&k=lh^YW(Ix_jwnS`v6E!Raw$#zc4nr-fed7VqL>@jne2&2RdQL3h z=$|7f-L|tf^Q{l!F!9|&H9tV<#0^GE3a0FQ-L|QH;5K`7eNY+QzgW+FRQZ@ByY}Jf ziWcRNb5~jR_b?r{Ae?U>&LY2+(q^63InAU!ma9@I%!z^jCTBjm6i4_HAiOtGd);hj z^T*IpsD1OF3=pUH?9Qj1NpTfg8m2wn>hd=w66Tv1N_^ey}kZA*JHlMX^6k4u<+Bi=6~?cXkM9o z9+-WoWO#ZYWm{Hm#CEqKf%d6uZ!>}1flZo0bT2yePXTn(O`Y&wh_35mvFZe2aQ$c9 zB-`a|#{uT+W-=Ij_XpGeM;VEkCH5nFEoAr5xa5irT-+N?Y%gDH^;fqdO3l-i$4>L#@?FdrBby0wy_n87Q{T>Oz=tw#m%{X9e5A~mN-=4A*5(kq8 zT4`ITAi3zrlf3}Vv%f}i4!Fwh5PI{ko5!nV8&>MV4r<&3<=bz`(qXEOL9=Ulq!$;j z!F6pr_feiDG$I;@IpwEh4ijv^Hhs@EY+g2f%%4}ZaerE*P3Ze?+?3F8!zUy^G|?S+ zs0jV>|De+TO+SPo>>3I`sl$Q|Mxh$+Y?NoH*7!y83V#1w7bVp5dARB!TsF4UW(_&N$ay{QWq7|$+f(&^oRxoVwppYkHL=#)klJi2h;dvfB=W5L5-eIg2L_~}J9c|$_{-6U05l#|=X-F8)qNoKLOHNPp)GKCeDLwQ|I< zRqwMib?9iNcIc0(5iPp!Bj`$mk)}QC7*f*TSb2>Z=zmE9>m@01*1!_sY_O!Aqp!Ka z@P+f%DiJ^Y)J`>L;k(6D?9D_uEW2<${h$8jn7ij7>Ibc+-U?7b_ zv}mjhJa{~guPD!yfT8qj1k#E*7`jo(ry%vvwCwfIIY!ku!%%Mq_Qpf6*bscrHKh7_-!igx+`zZ_AGpaw{dZckQX;Q==Qa}PFO5*g7z=mPXV;_WTBxV z*fPc)F^53dE`*k7cRsc*W>Kc4QI;CXq2bV zdCS7=QEuw(1f%VY~3Vxf0MQhzn$aEy4qN)M4%saL{{Ijb$ZaVD_1iewfWI4)r}G$9e_DCR*XUq9Pw*S z5_pLxM$p5)aUc9gC9RxJ)(EEuOLWWaUjU$JGv~#e}MY&-ToLH<~-0nY?56HIgyVw0YLDL z;&;rb_*QQ>N*hq{Ke9W(;}SZxh05ut_nzqUyl$6-GGgTrS}QB4edvXcp%~vl{iZaA z(&|`&{%yOA&+IxQS}AG&`hr{z zX01U)(@>cWF!P3-k+%D|Es^RL^!qKX3KE|6ciF}3hr_qSzrF{*Z)|*{*biYZ)on=T zGZnBzfO`geOv^v)P07ieH%u(WKbagV)&)Tko)t_itxR(m-=cH&15qNAm4J^#Ngj$Q zr8y5Au9;HnMCkb7o3!OIyqd`d?k2{t?fWFgoZrxw)5qOK*7x>gU!fE#2BV$U3KwrC zzgM!EqNyXhXnxL{`#Ue$J>@W~3>_8se5kOM!}=hn0C3M2s3Nkwsl{(*eHB?kWG~~3 zGllPpf`*T1S;0ojY6k876hOr92Hrn$@h5@Yd_t>hM5Kad?OU{mH4oP^*RKMe8fIbG z{O^UJ51&D7Rx*VxK?C?R))Pn7S4}HW_toSW$LmZ6g&q`0eMOa(vH!<&ev)ZT6O^%@ z2_{m91Sh9O)bpVI>mbhE*4<;JhXyjWF#)k~>bTf@_18C9BW6&z8w>s;PiehX2;M$*zn@4v+iDZhhmUUtHdYL;2C74e(4G|yR2%-0(q zB{#`FGBb?7l`*tXIRI={ExC^}Or5!}+uXLp(^i~nixbiwvG9)^>&Zu%L9LUE_H1>B z#o^^;Q*jo5+4@iD_>Rwdzw#Ch2->zMVWg92hJ<`mUGnq|!ex+S*9dhfHdCXqEWe<1 zNrE)RN`9$AmC%TONt+PVD{uV%vb@avZKdUq_6J)RF|LxS7Zt#h1nnSU0sBdtvFLGU zDN@(}7qtI@h--uYdTf~%@q?l3lp}2?Sg!R==-*g5%Ad-8?ZvT_n}~=L z>jvcsKvDcOt~H1!0tK$Mu(bf8M{v5lYPEEZeXqX^5rDVHUGZATp#uMWU-VzM3ic7J zj*@9qQ^D=X&}u~DL-#@oOSlFzZ-phr;VH?(ujfyd45b_#cg;6nL_asL}u1QE8@6L0cppTGP%OU)&QABk;6p-(^Zy zy&Sx*tS1t~`O6|1r62Rt;KBu6b z7JV@&{eI>8Zthy>GVG!*{uJ7)D9eYL;$SAhO|&q+XlOg~1Fo?^NYfx2&Jg})F|Y#` z+G{_aVAS>DG49yT9fwpPFXJ2y^@7jO{((h43kZ?gF;;eke9h$~D04Q;3z``^^5e1ddg2`whvhJkjb=-vU&n>|KyG-~i=) z=1{0hc7$*JODm(M>sJ%VLY+Vq@sO${b!F7wo(26>Lkcjob9~hl)_x2&in=% z6%Ai0I378Yk2w+EAneLH9}E}zkN}3`{$OadjW1ivMohbtt(0Tz(gL<4tw9dUex;z8 z*k}-w43jZ~hDA}9Rwe(%6!&Rh(PXxONpf{@APV5AxS z8XVHr?+ZB4h=PKjtMoH7d?j4C+cd$9+4%Wm_~NFuuRX~*X>8TT_3YEOHPE=VMdoy_ zQ<0W3-$oD8_6t2A8*qHq=D$w8WHnohue8Xr`{460SwLnvNi6(eiJ;yT6m%Mbwz~uY zOZD-?es*#vy_|S%O6nmbujBeNJ zdEAYL?9Uv%GEzP7;aERG0PS7VvbBwlHDX1}cuC|2dMd1+A(TM}6&A#%ofQle*p)pc z*hZMVKlt60{5>28gDRlk1Q9Qo5aOj>mWCe1PMlAKDXb?|<%bKKZc*OVw|#-Umv&-2 z_h4_cz0&$=Q_DGQvfaVwOf8#f(4@LQM zQkRb6OLFG%#$3CFkNWVChIQs(DW6rRC^6SXa{>JGiS5qiM4^g_OR?e-D@iI=n{gL? z$xAn0FUUPgGDzB=K1*HcJ`s@k?)g2dECJp%f5UbQgY3_P<&63?cqa+UM69UVPdg=6 z_lK2H?WGy}mi(e3!1(A~bUr_y4SVe#QkvVB!^{X@pgke|g(h~4!dzYt3idL0L14ej zTn4K65j5rE=uF3lZ@ZA2h}iKs`zEE9SIq9MFVl0HlmX%imlry+6$BXzR2)=S-j`3RZ6GRue_bME z=I`{1U*nuGC-Lv9Dkm4lkmgQ)liI5<+jT;5rRgI&pwxCsy*yL)YG~kHDUGz)T0;+; zK-W_aBP<*$BQtRdlJDvEcEQ$Q#7foSJ)L3Z57#Q}eoiMOwzfs0$A`56YRe*h-p6Ih zo)Qrk^Aihz&&rC{mG-U^`VS&Vf-c+NFFd>oY?yh}v=1*@v$->!&Ly_nk&&T! zz%#?>IY89RPc56*Ee^KNARA-~fD;B!pJKY35~M$!mPqd7A1gnuMf^W+TO4E2;Nceo z8+>YkMu3eEBbUyama;WL`WIWJB-Ro*K?<9>TY(}nEf+}eZ(U%Q=BjxRfKrcC)P~8A z7^?x6mr6f(U>Xa%bL;b8lC^E=_dr& z4v}$G&f>mQRWMMjXoU%I(P)XT*7YT#-g-q1M^PgTzcXf4l=5v|QLCf*-^lr|D!cA| z#~a4uvkvdMUbX+ya})QLK?x#%jV$?XWIJ4`yz9-tGe@?>hOBMP z`4x|}Xiy>-Wj!@amY>UC4P>ON`~LgZmGhVAZm-HGzB`A&+qzW?bf+*BS18nuE@ll( zuMD8uI%f5`DGL#qfg@9uVf2+SmEbT8nJCU$@%bT<)h+dRM9=z%t+-xNguGg=OLM_c zpA0Rsnw>`!95;S!fh*kFYO>MD-=PeoigjvLrX;sd@0KoZYOV)37IMQqET#PY9lWD- zl=L0nM_vENizky*Im>O%JfEdl3;{ZHdZ``A%^yNn=3`CDZn}OOcbU2;zXuL+Vn`R6dHw zrN*NwgJTYEb~uw=RLuxKoov+dV3PP6l>7C7{u-vz4J-N0|NUOarkJaBX8ZcvS;)Rv z2O=8~ z^2X>IMP?@3`2E9MFVq6anGybnj)Y`GBYM&%f901dnqQ&#WV&&kxyQ79X2QLP4XnZT z?Bsfspi`9i9ZlP5vb%h9Z22--RL{CePq81T?IPYkfT<-L?`uHtyI*z^(+y76?-8^l zuu62H=L6plZRggg%A6U84mS+H=MOw4K$b3y*K0;E5=d4g&s_t|<|sdB{WEssFf5{@ zA5i zp$k>ukK8J|@e=bQ-H`H-iWQ>gv$&YU?c3>+)6^De0Q5-J(>V*UFpo#KZxHU6IxCD< zwrrrZ{G8LxPALR_&MgbroS|oM(N<{FMJ(Jn6n?r)>_5)LO6 zjrY4x{Zp8->(*d>lD|09F_h$BOmdxteV^@3E{Z|;btBmq#c$4G&@Q_dsZ+}#Qx`jn zkyWUJGwPifa<;6g@Avd;iI(Iq|~8DS&++B5~gu4Gbv!H39K7+1=OhLvS*{-@aW3inpF4Hncll%wx| zo|NdVea#g?$Lc$1s)NdUOdd$DmN4uzdu-{p`Gp=f;7pg<9Ng9xr&Q`5bl?&=@*7S0y{COzPh=X=zX2HhmOadwDK^>3?~4bkc4RY zex}*wDSg^Y;277UKj(a`UzS8%4?Pu`<5iCMVrOhks}EquaGYfhQ8AnUcN(>om(=bg zVFajTzlWT2D#yFWD*T-^LbC{k6_Z>Da} zGbn8Rko-Cz!kZmVG;>w|`}K5#%h!y6$Ya-T`CP)^gZFIzxzA5~)WT=3?!c&Ly9&@B zqkNDASCJ;d6QmP@jIF-axfGfXi1b1e*{%2U5a`Ij>A%cnK3f`h?+us;f=gVc+-vw2 zS~Rb#k{3K#MXMKeQf)>zX1;$^43-nG4X7dfzNbGcVWhbdi$VlFni z{3beQGQE@vKHb|oX%NepCir+3OqTSL(iJXy=!JL$dl2)|CimcFDr+bG(MVpH$p1h)3`szBD+Kj9Q^-n9-&rrMYNhY3`sD;IB{K=iFCngS_a9DI*!xv8Q zX^9ETos~PBNE0j9oDTDoF_zQ!zjS5c+#FrplSXA>MkglrW#zycLt&E$V;xs!IaP4t zSPwo>DWu7H-+7leHQDzv*td%e=1?6=Y1W!Cd{q*PPa8L0wIC{s#G+zuj7u}sDiPRW zTC5DWC%UyKsH=Ht^VP^;#X*EzfWIL6pEZxNh)Qm#>5D*TBz)BBW!b~&>m8~-+0Dn* z*2Ei9yb7n2EU*fiVq;h*noOh@jlk&4cYpKc$@D~<|DeU2yjAX9x3uF)*L9tjT+p%_ z=CDoQv7ReyfUj9k!Ak$9APO8(!Nk%RHe$F&{8mUlD2F?i5hwmDy{s*IL>?|eUg@-% z2SJ|slv`!W7`CHlGa`38K5R%$dyI$C{&J{5i6B9>Xe%7K%JVaZOJ4-qVI zr2^yCglz)GX$7RYb5-Ek48^qW)9Y zu9F)SA@k}vhOoZ8VaGujJ1q^ZzAjECpPvuaRjm$&^4+=Rw`5L2nik_Ur=&-=m$qky zzO*VGb)5gOqcR+6bsklEbwvevp@x-azs<)gzvbMzPutHvcU}lAYRJTteMOGBjGIWQ rycKIM!q}R?q5jv-@I@!byN2lVN`n9U2VR;OJfr~JF&rcW1jPRWr0SVV delta 28418 zcmb6AV{j%+)V7Vrnb@{%+qP}n#ub}aY&)6Qwrx-BWRgrY(Kq+=yx&{3Ywth1s;hr= zcXd^x*4e#|wL%ghf)XJboDg7w6|l9e-F~a8rg$R|v+PVX5kL3f9egWioZWIxI;m>L}?iLDq@Qdl2c+vV?O#IkA1sP7LbVI|G2V@pcdb_WX)tWJ&zj! zBVmOR1rGRrO?EbZ+Q~9jHUH>+B`mD5st>p#EoEaWUW6L@$}8b%7sFEySFwRqa$ zs~jQo#@?T&F+~|IIx~`ka4F6I4*9!&kI+LvnFui8ZNyrBwessSzS#?Bhs7)s>qiP5 z^>?!)_VcM9o>Ea5h{;{Zfy?DIgk;eXU%5%SC#4iDWAu>0PwFI)7(uks#0Nl-O0c|T zU=^cXJy2@P8^C4j?yFuw^SS4NWPeTvB^goQe^8gV#VX7Ai%s_LKpu=+JMygnt-s(p zy8-vPc!v@rWkp_a28u(*W7YlMvg)A-(Jyx&iTfw&ry^@5PU%VUlTV1=7`!{zy+!MB z0boN}IpV;Q;~nu4u!PbHj0r<-!DxE^d{yZ0%O|v-o7a;sy>)djt7b|Fo#y7FJDPSA z{S#kNNKvdjJ}CMr6@3D|i2_t1ouwqJ=72NQu$jjT^a`%xds9Q+R2O7_eBB>iyXd&) z&ycObModACJv8C_UWWc+d;af#YIT<`laJHLAy{ki#ZRcEY6wm!TE&uzDj4BUE{2{= zGt=hz26|T!lj7s}A$d9>AwPT~+xoYPsx(dzdY{gBj}j2R$>t z;D~$=Ph%(w^qTS{B)*e{VKCY5{!()O8t7ga&+l1;Y4|+{1~@b*=oYj8{qe8^43&?* zeblqesSISj`IFG1<*PJ7^m`~WjRNpvzC&TPWgQip7YcF}wlSIboT@Tf?M0Fvcy?=< z`LU@s!{RMaL81qDbJ3X@O3?Zs(JQ#PuJ8ngIVZSSC_Sf2tg20d?Vv0XYE{#iC8|+M zQxeS{&UCgSa_}oDEI@_1E6}OJ+_^VU!*1H6){sd2mlNF7)0(9Km_0_kXcT}{EHD)~ z%Fb?bWE2+M?Tju5<8Ss(ra)30tNLw>#d7!L_jB0{fGij!CkO&s(!gW)SAINPtct^V z&uH<_)S%Um)QK}{I{*5Bs@1uWi&RjS=#NV6W2sfr{n~$vS|v4#i-)+Ui20~gKc1FR zlT4|dNLRGa_*60w2cdvD2 zNQqvqaf-H~Z8qSX@x`(x%Pm&?$V0O6cV%FWB?G+bXpZ`5Qol%lGynBC1^( zxB0LDw6SV!(}OO`eRwZ3Pbv#AhB&Wo`Ry6P{Kb7Prp@xvy4eljP5=(2%a3skK)AUB zN|%}{7q}4zbM*GbGt~BEogLS!6kinvM~;ifs6)%OmJ5zb@tv5>64@=-iApj}8V85; zp2!T&Wzq~vyP}qxi(~)WeP5GbC2F7HSfi9a+co1#kPmHEsqMY<6i$AYKHGG__Fh|` z8kqvAe{HP)2BfwFSfQ$b9blrDl^U}8F@<(yE`A!Q8D(AWdl)$wO_E!@%5kI>L2pB8 zboc@XU1a(qG+el9#bK*#+m-x`0?WpNu?}8bjAnskr!+KN%Wnpw=gXm18|3f%_+?gQ zf3Grl{fxoKbQZ16{_e)>#f~w7#rHU8{zykltc6I0iyA}*Ogyo&!u~Kqh*LpV;GMGX z8CznhrXWZ(jp0a5s5LRJRG}fT>8^^>+16G}9ImCjqM43AnX%QDaO=IsV5TcL%m}_4 z4JPzj@@}0Gw4JH(YxRConaPak$u>|$;Gp&KsK=~tYvdt})Kc)2O2?V@@#u%Dzs-2C zbnPjwT60q& zy_os8Jf3p{?EJ5Dwcp2~6FgXVJQ)1g-IWlLs0j#>(14i3i)W+yHCjO)owIpIJr!!W zV;hRB9+KoSyiDhx&Dckt7m6*;5H$D9E4ou7t=o5iFLgxpL!i}T@%^#(?#T4&wPS-% zyg-w$lv!l{HRAZ%Tjvz(0I271Fr18 zOimcbfHZC_tKEzwsnPhuhHqWCKv+d^yV?T0+iGO(`cKppRefA*kFsvwTnU%ClOyNf zvR&;8ZNj^xFNsRqUD zyymF~t0z&b$@93(f_62hFoF{E=l{IDtW*@8eYiVTs*!V5hnRj8h{vRM60ZDl#mNEq z0?SY&))=1;ZA_|toC#32y<~WkS;0;Eu$6kxBg&C#(bd<`hvfJ^&Y`^GhQ9IXqs-nR z;9+d%qXhD7vzE>~$Wx0JsLswZ;Ohn74sN#Lz~s&<{8-bXXdQ-_Pv=(;VvUR?L%O48 z?9av?McRK{KCqFz5Yv_O13320Q3e4^*&z^JVC;}Sen&LMl?j#e^xK;t2)+ACeiILe~B5T72zo3~jZhM;DJO9@P}8q>j4CuGAaJJ;4k4@yZN_(59Y68CFdd-78Le4 z)FSI4l%`~5-z%O|aEC4x3QjZ!6pKKxJEwH zEk@|O9)f^{=9)4W>=5?)O#5COs~&v1p%>)J08Ahplr^2Kv|SEDQ5=BpntDuqpDQH! z()t=qmY4>!8D}H1UsV#`6*hgLViw(?4PBb)0er`5^rd!eZ7NIxakn&F7kLQ8@-xDA zMbH7t4y?sxn0T=crQASqfPzOpLcXN=1@5_TJWCll*hRfpli zz5`kB+B77!0og>)bhGcduP?K6>0Ics_-&;RASX2XLvSSYqvNV;SchD9RD?%7xEO?L z{nLnCuq>X8DwC^{aH*f6C#eg|gHoimaj`IJ7?J@L0b{enZWZ8uky>3n$`NlmVu&7M z#KCke&c(TKCFR?Xu4i5ELNpr;Oa$TZfXL#5`bCh8#zB0?NYjrugpdpQv-d+2B8auj z^E^cdWc9|SA&LX}$J=N5A4$<^>!jn^A~awp*<1fw9M!~i;SowhaK?FL!)=Gwq0%6C zM0`>jcQyYy7$=~;FtJWE*Fa`Q%Gh=r#nManhDWV)uXkCGoD``7Kv ziBh0=AL%}WzmzRxs+y@(SYS4r)p3wNG(GYT3jr$0QXE6aJaR#qi1F=w=YUrIcBg{*%0pSIACKkx0j%TaRKaSMpAElO~POw9m1!q3OZoG0X!f zZZ&br#I=Hzzs*`-6&L;t6N$o7=Ex)r9rV{T=<^OzyMb{!6;G^EaGj#eG)Ws6j0k*(x|J&T4$Tun8JdPy_L=){U`YTbQl${GFh9CC4JWS}qe~;m<}3 z%vIh(XD_qy+G#$#QZkm}fkII&827Pog;BuR-)w@2XkKhZ{lZrRa45IFqi1o5L=$?b z5Y=&&-MBVjyT1i?(itbb8X_bXGP5goeiSCF#jj;@LYx61lBC%NmO>a}ZC+mrIxQsT z*YlGVX6t>VDn76dHy+)*cB<|$5T&E*ppFAnQBDr|&6GYGVYa7_ME;NLI>jJeY$(7S z*Vd9kt+}Y`BNL_hE_@nvJ6!(#)!z{q*dh9-rMeujH?q9td0p-|nJHDPxbag_Q^g4ap zdzkcbJ89SMIzrpqT3=j7yOdl;)eJ4AEx8MBgPD~55CzM#R#ObYzRyg6O_T5UX(L)M zp$lN%uj{!oZ16ubw$ne`s=%XrVf0gJ{aMO8bjH$3S31*}>e%H}agzz<`_Nicu{U#COM9rCMYQUUR+>aSYzGN|AN_Ux)s>$g@q98#t_ zZW5Z-#_?hYM(6Lqa>@dy+-Ql+*j00^n7GxyM?=8&9|g_sx))YjyO9e5Trdjx26-d= zDN5!rk?LT{c(`pO`+JyUThDC^^xz=zu;+2x#Jy~oD3>TJVf=JkQuP3}d3qXwgC!&y zIOj$vC4&WHiVMN=rI?D8CF|-&YKel^J6SZ6SlQh)we-`dHnfS-(%PzZw@WuI=9g?~ zMlnJsPLrM}ISLQv;+oL%foxURS%wy<5*zj^jwf_oL^WRrz84C;L=2jrY%XMY`vc5R z;BtG~YQmNMKR?_Bis}IHxANuUg)x!&VS2c%L?<95h53Icy+jCXbYO1lZukn1NpVZ8 z*hpa{=_yS7x|#Y`L7bATEB|^U1r{TwN91VE7Ypg(Ra59LgfGTGJXTx!iH3!JlMH*In+kz@FuHFyr@X8m1FG z87-kln9JFI{tA_uyEl-cTiv1%&^~iOH$i|kwP8<_Sv0ubBnv>`D(q=F1eUHy;>)$t zm~vNW1E{reZ-9VIHgXS4*qa1)M29vhV~;|}B&6NoH{!%5scrJM@f}BG`8wXQ&fJh) zW(hQ?HW%xH8Ow!ifv|jjLW_|2C@#I37X0a0npQH}x(q_6wc$(?B&9U-h&8de{JdTg z#yk+}(rKbOb?@BSSw}Tv53J2ncS`BL7Q>jz5oe)E!oZG8G||?`Fj`F6p!!5D#GJ{?Sm29w`?yJ+?xq_Kd-{%Ebd%>v;67 z7GaVl%7c9LGatr+PqsA9_T2VX%{YrbL6=q4{S!~2!piCh?i*f%ZW9QTAt%lGPXs$9 zR?@f;Y|QE8G-p3XLLLhn#ia=m6q4By{))nF#>Qzd50&=EbUXew0Y0KQUyD@zMpq)- zCPKD%#pr*J^eR5oQ(?(?9`lO>Pd^wmu}`a@2A9nBCX3}bL~e8U!*I!MhQOW)-rDQa zkHbhIA;AD#BZ!X#CF)?wSTBZB@(K5@XQF4C>nrf{dXx~3kuL0qdzJr||Alwyj}Kk& z1I;C3jmP>hsVU637F1yNwTxQvSNF{MXdELa%QLs}7wf>K@ME#T0Jh`6Pbl{m{4UPi zC3R09oiyw?VfdgstmjmIxyC|iYE+$11^Y;MmRL~0Z8P&bMnHNduT}gVL%wK5oyV4x zhZVepwyJ|ED=O~KN*Ntj2L;*bw}GY>M}?`W7JJq7A?R4ks%kQbLYco|WrMVAtvB$L zqe+4ieJL;_xp_<>$j>4HhuiJmCdg_acds>8P)AC9mfThhtvPdFVNzi!aD9Tz)I`Ad z4zCSB=2S)0CNI>nA8omd0prlyXnD)?V`QY@@UHMZ zrCb8+7nf@q_jR*mRK#kkAqs)LRJ_OPH2aoe-Rr0>K3#3dDpz*m-i&9d<+~CTxsV@^aR=9G+%?b%FGAm`r@zxmowVz3Y_(#sRJ~jDS|8s>gT^X1c z8&rC1U11c}5=RQ*E8H5#MD|1xGSq?(PAp(q~VR z8|@0Tp5aOGwfWNt_F?;IyTeJI~MZT8pyjp2&=Mu!QK5*_l}n0_xYYQX~H8^Yc2Hm=*W~x}^7w zoIxDB-0t%_vAv2R@8AW5mCm3}xsL)?eHA@f1D!Kuj;x$&3#n*qAMVR??g$-#!oGxr z6I(yUghTa;<8#v`!{CW~Q^RyJST>r$cCN}6EH0;>hx>hVhrWsDV4STTNYC&@ol!r! z=e(fD>LcgH=P{{g@Sy3?!C|siHV50{i?BkMd<$&vftu^ZUCL0}+cNXD5t2DjrBP#; zr{J30puMmYo};=D8}^>2ebffX&2*N1tV^KNx#`r>&(FPDo9eEmJ-Bmw zz5en*Oeg3Ol4FFCqT`FPvpLuF?Hmg;wHeWou^Ba!soF)t1mEwadi60TKpH#WbjxE@XO4WHT}ouOE(I`qMxwE^K5V>N(NESCQK;YWgb ziF8oPi_wp@rp!(4P|5DvE?b;wp!+_SJC_k@k@h=H!ze>*z7NT$9qa9)PYhN{ZT{h* zCHh6e_=u;l!tTs`T$82W8ZI3YQ`!|0lZREsQ#LTw*I?B=xXrg{nuUQO-Zh4hdwiu6 zhV=4LqH3B^Aw$wXv?emqQ zhze^!?!Nl5yc`~F<{6a`>V?=a#4Lxl$i;**j?#t$GR3XmdZk445V?v0jxu-zIvL5y1-%#lr4n*GRccMky1G;6^*pA--Atkn5(E2Utw5I} zdyqaD)%`=@{u)IiMRLz?#^wYslDe*!*{=)3a-y&*B=+EdO3bx3nK6mfDXTs_kvrsI}0( zB7E%}-hX`b3^vCm9WvqwS!Vt{PQqLG!B)^rbfsZsZ3X(hcP;0cYTLrMMfbhtsRC+x z)M+vhXsT2KWHQK++r^-!$*#_a2&u9K)CtSjY}p*q803?sFB8bvEOMnYmKAY~Hnx=V zrkCkZ(a@O{m(qtLr9XKL)GHWw%Gp@!Yfhw}&>+NRn(73`Ld~zw#*mI5G)%jkyW)G> z^r|p2F~}^&{J4qOR~>cdLA+SX($=t`@o%WDk8TyOeN9X~TA)(9Bctemu#z7HFuo6J z%WonLNe{avAX!zG^}&CBq{MS!G@K*6nDEdelR5$>5V zulu0hgK4eDG%V%n-al2NK!(rXDl-3it8F755R|0T1>2>9z%nF2&lzjut@} z-R@BjG>XZxnH%kf4N>LMYmBN%v@fAZ52&>VS+l=HA_Geud4NZ2{o0Ix4ji*QTso`U zcezlKc?0!|xQ@u`eQtwD8-AI?7KVo-pu|eW_>_}mtFZ) z(-r3<2a`#2$3#&423s9tm)I_sr1}P34Sbn5%3mx`|KY16COEgB>IfTE-Rvtt570c) zAC2hXhRMlvRFKKUKQ*PuXt3mak|Dz4G)$0!gs){(6KU{WzRzgX&H5Q!uB_6#OHuvh z0`w*&X9CaR(V!auvH^ZX%TZbb1r4FW`!X2nJRP~96O$uu+J|H{^hVk&0J8(kwim*u zQGWQOWQO;-zB6O_2cueUSodI^54B5KfoYl$*P?ltZj}Kz@hRTpcl)jxN&C~W>Ytm}z z**B}2+Q~4db}CNj8iucznn%BT>pi)u9*`X5waDk^>fwO`wO%AZ)*%-2^C$Yr&!4Ql zMh2h!{2g5YU%Ijzg#p}OnT0yOg<4wM;OBLbe5jU)p_(F3aW67w(hmpMkTnxru=Vzy zcozpC1=6t{Y!Nb5Pi+hJuMn&LD* zIYuo0e;Cp`4Yqph*$sdPAA&jWbf{6y0kn*9By0PyHecs(2|@=bOE}(=pmQ86w{Gge z$#jKpDySISgQwDLa$oN!W3vTv{kC|hbMw%CzQI>dnkY*9*IzEbjc1xPjk;$Ad$cGi zp5UKIJ)uLn*=*rN``-dga9tb8n9h^%P78VQmvfS3|Esise{UAdDBMad(%rmxTVRNq z*xv`Ml7zh!qP@Oe;zA0c-FCrB^)vMq*e;ur9b08cxsnSR*_vos*_*(Il@`6OM`aFK zvLQ2@Ng|nxIWZ3EU7t$IGKqcde;su+31t+kjr6m;GCDYD6#rubotkbpyYNN-8_Gy$ zK79*_(fY3B`&uCY9F{#9cJ#E6OVE+F;04OXFA)G_Gv=Xeg`k$1|9yAVh?_NJC!*9CRf{H?y)wz?uQ=;*rMW-UGGKF9zg z8NWeS+;2;{k0zW09+~eZw?Py5b$TrknlV5P-A-JG;W0$5t_iNUVp-rA{cqdVMT>cy zsr80Br@cxSp;?(8)gew?)6hW<9L*AsYD;w7(f;Xtzm032vfPaMtme@K&c%&Pk@269 zfR6A;zZ9+2K{q~M?2fq)lV5uR@O?}-oiD^eM%zb`!G2ak=sRqFuw&t$%wbhYaZqNXVU$M;!3Vy#BH`&#?%$J)~@f;O0J*t|){HmcY)1>Ronrs$p zUcx^qPI0pFNrU1rqtCuEIE`k8OV+$^m0V?*&q(c|Y)6LT2BD-Y;_>QD-*$fMkKF#U zzVnu+l3IIR*lc~KT4@}6zTIfbD?tJDaql%N#k4F&a0ib{b@FX6)c(N4xQg$F84>9l z+VXGKF4sjLpw48RBJ;(obZ?~9wlzk#lik+|GxS$d-Pb!PzprPf&khyM#d346N+o4r z;eoSk4o3>eFedN|5}WO+RA~Iku2J9nYRO`0NMQN+2w<@3y7g9RDGb-wWETbaq3lDL z)PYt@w82o}5uOrS5SqKpnv|3Gt*rN@cyD=~nmAt#u90u4kfxGNKxuml+12**Z8dwo z)a@2=oZ%ElPy*TSatFMwz1eg`x%{f%_cZ$}!Xe3HY5DyE7Q0^LvB+!IsnqylxJuqu zV!51d7R>m{XZIpg2lBeb*2Dn+u(uyLklDKsF|cuhf41Yd8o$7dq^L!zSl7|q?kw|L zvsT7wPyi@L+i%h^Q`b_cNMl&3IYl+HLt&8R2@~st+MzK`I3P}vy25<5d)`mMCq%VR z7(u%0I(;o#b4Ix*b3aj^WsU9!%oRMD4 zx>0b$Zmd8^s#^Ht(duu2(9e5gSf%h(keyYg2Ff1vxY$=Nl>R%d_OUsu7XvQp1!pe3 z&PXQQ#x{ltZcF1KcTe)iXIWqx80Y@9E}L8pG|aDY+M9+0-@>t*cdb#5gHdb8H&XEI&aXK(H6LdNau#IP7 zdeNBn|2z>`)fsd(Y>m@m*q>(Fw&h_|52ss_Zq4MPI0x|5@w9lp%;>toc;uz4Az0c$ zQfwALb_kqRJn~LWCsThM=doysBxt18RBYuw@}>ox53j$=$$Vuie}Oh`{4{N%aYVo-Q1FoYoPo(XGa?0($qS! ztQbf24-n9>M=JWAju@TCI!czB4+aHJmP%lAQm_I!F(EP1T9V^p9Qlgip3F`u>i3LZ z4x3NgfjZwWF}}r-i>|*f?DRz$F11ih)X}vCC(i0^W*U5a z9I(-azG4~y5p9dVh)Hlc>3O1`;{9&28AOwg$N=aP#q!83o7pl4KQ$$~>7U<-Z%wsK z*2ilQ-2qg*%IIaYh6w$X-ypKxI7?Vu$CbV9%R;jHH;r*ZOA0?59^f>U$}f?Rj6G#P zs%Smgrg?}|nMZfV()j*ER_7-kPk8IivL)?}gIw?*QlY2|d&2!@T)p@T7OQ64k6q)! zh|>ZmYRNB0R&2DOc}{$?5-#lcs?Ta@HB#%PurA0t08}+mE&MjIJKhqf*tgoBN9z&@ z@_92S;|6oo!Tb=4DJp~oFp0-ZJcM-p91()gc#{Gv0oDZ^sWA}so!i> zg2#UQv9J=(J_&`u1O*HuO!CT5C$w|Hq;}z_Mg%CAuOJ4n!WDK2AYwK`fss)802f$s zXI7*a_XiPiego=ogoGPHUowoF{vvK8>3aEly;d0Ghl1Ku;Q7qA1`#lv5BpmvqCjJ! z-hpP$dxl-sO!HhoZ=xq4^i6VDx@Kw9*90Qi^m%!!y3Q~%fW4z|SQ1fb9G|!j18?3w z2LSEdK?O!bU%L3Yhy*(_V$;T)!`%VNYKGJi*8DFY#Z`aAVjqLYmm9yt>=R3tE1V3Q zdTPlB>kB?;K49Lcf*iiDM?3usK46%d=$k@`r&exSZpS}kid#4N|a}vGi54TKdHvCwmap%`g$>(C7>q~PI%DzrGMa3J| z5`}c)c>#5cJ(3IhJ2XTxQ(3j0#ABXoY9VMi&ODhcX7TDyDjLYpK_EP}pRXo7GT?DD zHpv)-mHrJ=?I~EGI5R3Jv?ngYVoZq8482G{cUdb|p3I|A2f5N)*qrpZ80K>>V99S# zF*+DoQG_63N-6Ut?wK?l+*)pQ2l}8OwmEEPGoMs2iuTe4=Cw#Vj0){~JCZbs7Xj0R z=)*I2Fipu2Qsx6O11oUIFq8Us4&V`T{)O-Y9rgRM~nVPm|hqK!MgcmC^<<61+EP{#I^$A)c($tYmxyLOA+(abIt}!J< z1FB^}pc6DFbw_ml!;uzZ_|`V$1ZI`uKZMrYe11F!^;01(T9DBEv|=F(fK0vbYt$^Y zfl?;;W)f`bf`C2qmN0{c0us^aIh9?~h2ucsG%6r++=(!pDkd@tA1g47wkT=|>z_Ts zwvmPe-ZM#KwXg(%TzP6Z8M6QmFX+qj1g(1~Mw>mI=d9wkFRm$Z95v@Ak)3^x-7q z-)JD6^u})Wf9Qhi_h_5|GjzWG?o*dj>rK_ZioEO~EE_irV%l-&x$+h13X4@IOf_H zH)xRLpwN+Bbw_o@xRbiEj^{@@AzS22SPgo=Y~+S1cu&z79XB(OObjhwUbe1kq!``u z(2Irg0X?l6Lp=TO4-T~4(qlw#H!S>pf~$7%RWg32!#|aK`tB~uSkeZtb zs%lELUq1nv&t4;?S1=AH&Ri@c5wwK2^d@GL{?ehvdY1MtYtIBdHA?y%!l-d02!O3# zHfeg74Dq->Du1Qr(lpwqCh+i;izaMs^Q3q0n|d8Il|IUU{6R8vgzbNjpTqDWj1bwN z>L2Js7O?z*&_7Ay1SjqozafEs^AqUpyxPX9u=D_^j^b?^nbwsK)JSt=QfbX#4$_fw z^Z#Smnda5Pe@tNfm>DyV!to)m#c<_+lEsak@XW*4Z}cbpy)NNrKg0RNGTZG_(^zWVpAhuA{g{->qgVP{(mtkA~q zSgidOshA9Mtw;WxO9Rb^+oQv#!9MG-~5}NY41}GQzd=-QY-shvz|rr}t%M=3$YPVX^r!*k{w4zu#or z=}A#W(%aaw7A&Kqi$__e@vY51t?8uA3*5ASH9>w`D=7VqYW!dRq4nVt+k@0y0pP6|huTHU0(`)6>=zB@YBznF zH^+Z@j^{uBR>L?iIxX}aQrJCG=v=JPos{IO9Zjh0F6nHB{@_Ekdr13f2`fZHmvrp3 z3RdSt4rIu*F=|r<1dyEdH9TIn^*Q1crY%58A2aG44PzJ;qT$&J2mXGmFMdlM9LMTMZK@$+cz%xtA zio5BQbQuli^O;X zKM~pmCpASYb;T-!{RvtCc2%p{fy*7!us$2L$VCrDs-{O-ZX($rN0ugtbAg-{VE}Qo zm0y}bgJQyy2l)*=L|-||yq2#(nd#X;hSRYnU$cFRJnU(!xFC%FYoMYw&B3kz(j;NZ z)hGFrc$q&tKVXe~xwJG9l&7E+DgFRKd}f)31`EH zaAH7__WOm$-?M-cdKytWpCUuB*aLgCEW0jQP|szf4W^#F43!ZR{JV#Wi9Zttvz8rS z0HI@5nU`ut*ou<#mdKV7n`byUZ!p)Fjp_7)1fVwnPu3hQHht*E=M8yIdODsjuz#zjFPIO8M{ofQvYskAuJs^Xz%xaeX!w-wB-(Y~jVfBavBVK(-1Zay5kTT@cWt-`q5 zn&}KnU4^HTwW#8x)G`-4WhGN{?z+NR?Mg++Ej9Zev2Z)tv#40DUd!B1S+c0mNT1`x zDr=tIyqSDhIv(TM@R+$@8_1!~#9+!-h{{Wq?a&5PulLNS^H*9{50Yx3Wl_3irRqYA zK41`-+mHLo*eqbBGttc6@H~$Hrw`{wo;XwMuq)U03NyVDDuoi$~dR)8=$bC1cmav2Qf|G%0QSW zc_sjA!b;M!B4w&-h?^}S?O$$$1824AGcVB?72;prb*$!4FPfnZ{$4*^G|N=&EN9Bb z_o}wFprns&$384MSH?qa+Iu5#2xlbj=+M?>*OintiMKtt?dL(~6A7sfHC^8x0MldL zfCaH>mD7EnYe`Z}oF`X983vdF^Tq4e%vAs-2r400&tCVfKNF|TK^HuG(0gY@`-Q0! z^(-;a$w2C6<+q!P>-rIE$E#?lXuhA7tKjeLgY z?AoHc4r$x7RLtA+|;0vFnh; z}kU=sR(ZRPkwSFX&~1NoS1Ja*{h@t4_H;huO2qT>x8_ulEIp%(IbFrUm+M z+qtbjKl;HLg1$lQoFx0Pi1+J;j#PCti!!0MK8h4& z;_)=o^fv5&!`6dFZ;)YtmR|1zlhYspWj~T{t;z<43EYK9AdfHhLd2$VaI^jcIX$A7ksI9TZ10%dR^uKHUV!lNo{nh7`dAsWg;Nez`&sQ=!e9z!=vy`J0S>#E0vR@A<7@Ju(YRwq5hR z=ZCUP0vZpg7a%R~m8$5T=qr9qg$q($OM)^XUzox$VyvqI7U|Q5S*z&Mn^23Y$@naN zXwZ{PgPEg6NcOQ@yP^wb>Gfx7=y#8`wpKngkK`RAOzF>$oaWG*1OM7yLO|{j6ElE)Gp1;wd%-HwzvAk z04KWRlE`8KO)OG5%z~r!3oB2oQfqw|MiJ zWoTW*8L0HLdDdWF&u!eq?fzF8*jzs#!RBJ*R|2dZdfRN)s8`12@aW#;VyxEc_3<17 zfOTQYtr5!LZ@kv)Tkk6~WD;(!28u$NbBwY=YRk$A>|zdJ{Ga^Yen{0VB~@$d0-A+Y(=8)PTP}&F|5B*r*U6~{dVQ5N)dt;s z4QPE3c#I2l9TBGG$gA0KuSka4bM{2w7V_OL{$E{koF%&Gkn*ZLvg2I|W@JAVxk_;3 zA9F#h8Vm%1WofE^W*=8!E!gErXsdD%28*e0Z_=R^?*k1ofU?g3eNO`5H1NoLHMtr6 zhXgol(f3y|9HI1?T){N!m~S{LScS~i>{@Nlo5I)p`Skz4)W|Nc630WF<+>@HkWx>Y zX8go0%)XIKo}JPXzR}KzNb%l{>AafP+ffP$d_7ADey2Nf@TE-Pg%IMmo!n>jf^5K zk{6zi=+02N&L7l=vh)2|^ZaPGH^+g<84zxaq&CJ?drJZi-i)62w`+(3mj3q7g7o~3 z`?=l2dux6O=^i8#tl#EOK4LU8q{7!xj{> z@qgO(KRJ|Zxn~SE8Y=hZ&?D_LhscRx0Gk&G2P;Yo8U{U%T~h^T{`Pn+FLj#xCL#7tKy@R*LT1HfymThM>aV2qmd#_S~($FkGOa=gJW@9P^JcjKa_7~$8&JCgx zx7H20jbu~Gpi#-dx0-L=7BawnmAg6VLOhSXo`v`#oT|=%6Pupx0`HC+{Yk2 zz|6q}nZ|Jwv`KuPKW=GjxB-RVKKm%)Zl;L@yXoG6WQGvojJ|y&Whf&047D-#m;=xq zaL+QAOc&jD0@sGH{F|0k+V0(vcvYXoyVA|zMrkikqiti4XoAHMIdyh7ycr9OFxyxl zn|ld&m{o|URM;CEXaWqDP{=7$HY0w(Kg_V6i|p^EG_R}->YFfy1wIsON0c5u7@v;q zPyG=7QY;>|hXUTyjV7wWWYGS!wkCdWm=Jt--W_+4^G>{7Mp7YSLis=0Zt363<`rB; zq)lLs5V|VLmuC?>EUhKj0VYlm(CMx*d#V*UT`7|^@@s$!g?LH5vX+@7CWOC;=nxc! z$Iu$Uu;ZZ z-H%^&+zY`pvNJiZk@`w4G1uO)^3^mR<<$O=_MJ&pBjHP9$!Ifp>KWJuD_JOu5%CDN zBsJ*+l)3n=v|aA97&C|2;ew&2LZj6j6lS?&Np>5JTb)Etg?U_2-V5ok4UV+sVR zYOUCwfohi20ljkFZ%Dktf6jxy=9t1Be)#mJ2oR!*V9@{LO^$N$8hzIJFtQsX+v0mj z$>O`-Nb?vE1qZ;6vDjbLj)1-B!+Gz82u{tTW4L%yun+}TIY?mByr(;i3VS~Dn3l=EZKTaos`QY5kv5ApaY)%*_l z_)ns^gaNF#^Sh9i3FDrBk}X~)jrCAOKNudxh6_lxZqU`>B}SsDet^N+QkA*}#FU)U z{YF`vkEnC71vK}5UOsJ~DYdmv>hW`=0q!e)6rgWyzPhX-lD;z>rAq+lyzEwe+kzKVW z>WRlDMpfk45LlNl!fjZr+>kEQFUv&RXbW+w{G`hsAqM6N6huh#;b~#0+6+X=0ICL{ z#v!bZ(T0-5^tukpxU{$8mWTKMH5z7_M`nmd|#JX*;T9qKtIxs$bca*3o z3dz}kgon}){>#cxLvALx-i9tO0LcD{X`l-_Bh;#xo8(6cB0O7z8yLMk7oAFrRU`7I{o8^7h>5pGR#j# zdF&^%*F0w5i#mA6qN^MFOXp^KAn=+iJe`*NQl%Qfws!{mCFDNhu(E=GI@Ten5k_E}{Kp1t) zpx9>{Trb{?54AeqoC+bKz{v|;I?$RySireR)E|39 zI7_JDoP8vg{u)`!6wd+ojEqoT&zZk>ydtSZn%ZZy9&GfJE4~<20Z_oOY& zg;=*Z%)Xje1l9{V=@0S5kpCz8Ed|m-J7nqg@>`f;Hs8#-g3<9Qu@MKbg22QLlzGXq z1zA9w|INZj)_ z_+KzY0?X438zT?_QD5-_AA>2xwSVui1)^dLueQu^(KOv<3QKq})(onYLp!B2OEgf* z5uu}JTu|h_2X5fAbP22|S0PcwT~LlRdK@NNObOMZckKrlQ*sx0G?86^0Zkdks|fLf zh}!7HE*4Ue3q{?NgWZXHWYPVDBWvG2II)h8C%e}8#5vhNvF*|EZec>s#(!;+iZ&b! z)5(RYiZabBl~7h#o5z*Q^os&0vo1^KRm%y{(*h(8dUCL%;JX3a^(M7QXY4J3m3F7SEp!%_9DIs z!de4NQra4Dvf*LwQRYDw*MA&l%OpQ45y}yyK_0bgvZBmU(Yp6c7bL5PMqm_gM)Ro` zZx&{kvJ^+?p|`bV&MvLYv;?dvrl+!zeD;Lwbb4wgAG=XrEm2v>=lKlLLP%ynQZ+rR z(sjD}Y@YEfV3g}hh0JBCp3Dnw?bP!EfRYPx#MIN|-y76}N&Qr)9)E+{F(XB1wl~dT z#GW=lrb5%#)$(;U{OYuOr8d=nYF+@H3ZMbl>4zUn_)69(Na$BAAl_#gM&+Ue`FA(mGTl{Q0T(b3zQZG;Nj zU}ZKzb6X&_;F#C`sx`mhYH9q>)_qwN*t=8hCOMW`i=&kVRQ>!CSHBW^!ISo>Mw5jq)Q`J$XypJRYW>phd zaa5^lF8@$Rlz*BYO?n9Ct2lyGdKB7nOJP4M~c4aqeNN4mZ+j-8t+EIgaa=>>0lTUtg&9Kf;!%fKdVZUP@YJvhuQ z^6#%g4lim6FM9e?M9?w-`F{8ezvB*IQP+jQ7c88#$=^NUAo}Dd;K|pa2NFeH^$?UI zW`9k^Z-WcT3hJGD5{XA!?{2P?%!l^ffM*=SYA&<1nZyHPbNkw-zcRPQ1?HSNXZ-yR zYL*?v!O@N)LbSutRSyPEbbGb&9#z&Rx9(4`HrTU1Uvt0n!YF+=`Hx9Q^v$n9H_=huvr2^8J+K&xPMxE6VJJ%OtR3!3w@^ZYOXf65S03a;z9`j;}2S7_>^pJ{f1RgsGr{= zcH)OjLSqkclX-dytG5E8g_nEACg;!4Pr5nmA8wJI9WsQjE*H!x(kF-T<2&1%!hh12 zv}KDy!ZClDP5Cn1`!jp?O;5-$3N}34;ZHL!6NWQY0fQ43_xy|P1Pl3DOZGkF*JDQB zQ{s7(&3q3xu(7||u+Cky_v3r`yHEJ30se2cLBE&O?QOjqzVG+0HuxXqJ+L9yfX+#i zfqbwn$u`z`zv z{^>OvDs-O0_#d(6Ktt@5{3CO=YAWSJZXjtz!snT6YDuZ-3R_v#1MJF&dA0GA|IrWb zd<%G3VPW9O^9Wa@WI>XWr}dd8{&0(=*@zfm$_0wL(D;Rdn(ypXfMR_bmNl$#wein1 zLQ&Lv?GyJN3|!CI^cT~qVSiu=3Yu_Np~0C#a$?dD_~GC8s{4HY33mR?x}?0x2hfw7 z{}J@Y)wi40)z#g<+hPMwiG+quH7eN->tn>G!VW|G{=<~|*RYUBH2&avlL;&|zC$++ zqwJfgy|slfQ;-Zzx5SL{=_SZr1?q`o%#0_=rJDx+<-=eB3=<=sa)0oI>B&MWlr+~~ z7n4|2OKV)B#DQgc9I)h- zW=VYcgXwGh)z{7Ltdhl1|IUm&qk)GnO80(Am$;cTR!t7SnZ9?i5!=^=QRE^&w)6(* zo|z)2v^-`|v^zC5Gk-+5a?!1Iz0G2Tp2Ekx&EkT2VM@-u&RGTa9mTTyD+)Y|>V28( zCtKYR5U6yg%=M$KZ9JE0mr$`EGv$~}4W#ky7QFSDd~bGxk>t1>pQ{QnZQ}kDjVms) zkQ}${X;cNU=FJ$553kB%3Q%5nL`#N0JD&PQL&OT|E#S1Lp2m@!3~xSUZ^ zsESAZEPv04=UI5#gqdbC%bE6duzBQeao1E)0~qPln_zvcKHNRtg%)vuFk;vV8`^DY zvxfJny`jLPj0#&O4y>sHS+0O)UeF+3_H`O7wV4E z?f&!R!qRQcF~@@hsm(e0Mkh?(SIv6j^dg%{hkv*j!KxTBNd*gz(JK45HXB=6B-HGl zk{&Qf4`)<%b}HZI(ZPEU-HdNEH7 zSu}F@6mLWxf|TpNe67I{o2VhGb{JZldH$w+vqkL4A*iS#<_IW+2hhw^PGFB1P9vQ= zrFYHTRIv@SZqutgi#C$qQmTf*%?33Nu6ULW0YeLB$9_Q5d^5D~ za3djQDG}z7q6wV7bUL8~0I7G)HjW@8wS7qxc&EtICl{A0V8i}=fe&@;@m_ZX_kRiY zVc3X2#aeiW*coFIq?q>WLo8mh>jKqF{tI8SCE%3(M-eWi&fWqU(0$YAn&|Q#xPI10 zRMIMh`%euFYc%85El)Z%%UzoEqd8G4KJ(WyO*(V81utJ>nsl3w0A}2-m0$nMyI)n6 zI&Rpu-}_sY-&FzZ(xkgI=`KyWfqy1wpC+ANEe#->W=YrifM3m)wRM(kv${~j!(~aY zDwMFAEa{Tzw_7Gj=Rp3ef0b(RrTQ&9e`V*d?EICTzq0dJcK*uFU)lL9JAdUD<*$77 zG|trQby=LB%K_Oei?is99RPb z^l7#QbALShBjj=JW%L|blRVBmUaVEM%TiTsEX!YL9%qJajZK%%7t`os8lNYof!&RR;A8iN%!i6<7^L$B1^rAeLhsg_(ra$0kT>5x zJ!4;&#_9N~;vAC4#Ou%Y+048EruYd_G=&?=#6~R<1>f9kD>n*&TmqsSSUz1tg`E6@ zk#cMf#3(Dr?0?IB#o3D#KlXo#OI^=lDK~MTFC~N~_FDw@HyJOyDf{614Sw?6CXt8R z5`wx2bIbg|w=lWLwL_Qlyh}j{7zrZwC3-&vUI~rX&w!+mBldI}+>!fWf!$sQ0Flm# zi*c zZ|Rh^$A{Npu$U8XHV!>LnbDkR9z^7Eb%1tF3-yzVp3 z3>&{)Nwei@779)4v2{P?%2+B=>@ zTLmaVRzUMy*5GJ=Z*PBiL`N1KI}>aFmEJbO&n>lM%xvQR0XE=QczGy0&A@+=zoao3C)W|55QYfH z_iX@=hEOZI3GSZJi48-6C+vpG-zA1``S5q)x74cQ5sY1F%ph5ez5HT)wefpDnN|Dv zc)U;dhcK%nnAPEUVx5fKV{3He9Pb?-?ArU|;})}u33{(5XL=%BW@g3r)=>^I`?k*P zCX-bAu)=SdY5Y_@<;yU?mB$kdZ%_G*;>m<7#Q2IQh2!7qd_umNJeY75US0W`FN2fk z!`Tb|W~nT74U^OlL$K9p6jh|<^$f;ba(q^x)PT4;SG-VGW?-KsK+C`#Y6E) z3i@h!#oSeEcF8u^4jUzH(oOi2IAIfiYnbD6hSLX_%3(i0wB*krx;$Q>6_kaCT=)Wg z4nN`t0*G46ngW*q)%qHQF;Yr(B!+`q$pW+VaZS);+c`O;<2~zScs#cD?Y%>5>^S?D zJ2}{Ok0<+w!=r;1Cg=}zI?vdgmoP4(o(pSph(jqiH-E#4kiB2wBlu^CejYY|L->!} zXUVtk;2)d-V;*n?>(_$G$4EvS&+;4&ixcvCV*Ka);k7k?+HWn3;-+#M11nc@-EnY%+i|0zOm zhJeI8A%j2feEa4bF4kO_x%(ms9)#Dn@BNxMP;B?F(4L`$GeJVEHsBDxy_cx;Sp^ge z7?0lrWkHki49MF+{$llRpkALiH$f0l0?dd5U>yX(^%OMwB1VLf1rlky5*y%TLOp*H zWPfG=nS@y6I5Ppc8PK)B3(x*6ZP^%vejLL7*^x_@J#UoM|d&T zpkR$mg?UKda`EA>vjFC>?^G2sG(a@cx_|cY=xFccWVmOI_YU{1{oSLXb$qz*S`&K$ zW8Zg9Z1-@bBTqQnFkJo`-&P`i49t46zi(RydlPEyAMEeLB5^#i4#sO*ae9xqjC=PpNY1dNKO)#ZnRr zBm`3>a==;3-~cVt-l(OySn9rQJ4EYphH-G_M7Mn~kTICa4seU<)El^g&pg;l31eVJ zs94aPcoG^+e$Tlr%t37=8ehEHMMaXN8#i9Jb)&|5`{Qxa1|2gFg0*_Zn~ zfdlXo7bmkAG~~YZYRw=68lS zWqeHI&Ikg}!PpNpQOp3lTtsuv@q&duh*Yg*cvCWf5S|ELf+kN*k4f8t+7JCfvSq;t zKNSjAv!08quX<-JZYuW6BpBAb}cxs?EDM9%s9V#K?4^l4_@6FLKB_yHlaF{l`0%4IHG zF6J*XLqC8D>wm8BhB#L1H$zDG31g_=i(5bUZ%^~_P>!T@h3Bry8L;&2e?XTypRX-d17ir3et*RzUTBD=m{r$ZYXJQZA#QfDh-hU{5Uj|QV%y25FpA^jhpm^ft zL+N{G>wx_^{q1Rg>KyDBzFApiA38H6O8_h?2kAv+uV22Xq}Z!d;A<-^LV;IkW~NLr zznE>mn1cRIf6sa+wLtQf!O>&64Ak$s!hg_JrJxOmokEOlUUa;KYN=jZQfft0NYyJ+ zVbc{XY=1He&0V&@Ds%h{?=PVjQx*;{2V2<8h%&Fu8L?Rp**0d17_oQ2Og9lEU-|S@ z@k1Z~c?FwO_M<`Tk!r0+ZJI*aQ&3*sfB*Ca`(->Ac8gUuuDOXDj4ww8lUUw}jpR_9P+7shPNww@y}e9;QfFHrY=lb-J9q`RNx^1gxZ`q~Agsf$ZZhI(qTM5A5v(}2l# zm85Au1q1Xx_8c_hMbZd9e$M>IZv(L6SgcLYCs~cD-N%rH=cacN+yK?QE>19A%>0*V zyE6EkXSmO(uhkd$@ZYc5;SvGT5i^5uet+@Y_(t@|!0inO2MGChX4_{wdmF^|bS3?q z4EBn3W-voyMsx&*1q0O)2&wxm zyY;vM7PyTIgS!`aZh&ke{4N?1b=yJq)aDR7c z0BR%1xSmJp`eF;3-~4_Xh}MYz?->ZS;%=WO0*HtR^8{-?T;vZs;+a83p}t3m@nI}P zy~T}?URz*C&V84nl1=A1$%AIN(=7_6gSCh8b`|Kd^|%gD2Hx4OI1A>}J8?WL4pJdK zNhB>Y@P&s8`M*trdx#?vNE~}hrGJJcAr+(^t2OmLQh4r7$H6CZK4XJ=F2)wB7yMj5 z*&M6fv0PLTeqr#^5l#eU+n7+zM)k5aR~oXL1MMi!)K;efyFgwS$XhayNB)?RJm+Bl zn2vW(tb={J$Bzx#Cnv5orh5l_`;(*H;qjOwTBny(2%(GQeW{M%)%#qzAAbawp!#h_ z&6^Bao9vD^*S>I>mw}Y-`^J1+ecN?OEg95y<|~ zc8(8@j}C_?ZcEuOmiaG35FR6ZxWbA4yivjZE-Kh;F~FfBD|}B*$(JDyN|$DJ+i6w& z>q}h!{vd(S&$1|g9nn)fuYW{c<}ng}{F=a!Fk2!v#OT5u_WUp)D8wsqYESv?r$O)$ zI^pU9HpRJd@OnEtb#T*OH9}$?;~8BXyG^*Wi(}UZ*Tu0FoGy;NoSb~AaqJpFV{J|O z>I2BQV_ECaaaBn1cVkG8=jyK{q^AeccwMK7(=>Gkwx;7Wd)B%f!GA}JFrH`P7|e1_ zc|=Vy#?OKckHCufN+D`l%v2omT!g{!23(Brh=5Dq6amG)Su}@55yzDJNx;Ss>PrVV z0a8hjNX3UH@Sh|&C$Jij*Z9F^ytVS9&rasrEJi6>0X`A2$qh&uG?6#OYMA#~Q#|i> zXZzZPo33Q-6izG%$A7MXc@bPADK6|N0@-!>Ly)n-AT?ZZ3xqgtx!}0FVK8^`1{w4p zq^ked|NVa=Pek+*;7zd;E%F8XMV~{0H~3LsK_acPhxb#U62vz^hvD%qaqaua+{;{| z&miyvtf|h}b5#o~q@eE|9&+f$_{Q#X5pT{FQI09nQA5rZY=6VtoHcOn2r4{ zFVhmQUg6~*%!IxY8!hb$EnyY+`82Wn!Lp!FN??n3M1KOnd+m%sV0|uzayY98Wbg2x z7|8HG1;hy8Xs-l|Q4IjY-QyAz_G&>mIVy(0mQHSRFj%Fa@K)qHpoY5~7619j+wU+su-9#x4m-`b!}{mOM50Z00j}fRB$j2ExC@>lwyElesPC> zo=a{?l0UOsW`EOlguL*)I8z}H=2W}Yz9Bwr?aiR0p4Y=A1;T(zUHhsi8?oHZx?tbO zV!o5CmsIZKO53NWI}76V7*RiiJzG=`Myr^MFn>xKl|#sqvIGj=KdW`feaVajOz*** z<=)~>a3R#bvBHbMv8T*|R0~EQ|9Q2;_XUU$*=)*f{EB6?hqg?SrA+-k`<9@3$T3Qk zF1k2g(OcyyVQ+xe_=Pv|o;^|k@GEWx5_7=<8du9*S?hJ1p}G^4)+^r-Hbr}fhs9H* zw|_|Hh(9$=k}`UHHd_&m%chFMG0c?+ZWY2PUojq&+5dJydv#GT|IypHyIXc=O?X_{^ zbWw#as!$bGXq|=Ibf^5sh(y?XMW5e*g1iXpN6Xht{F9dw6hs za5y>?pC@Q0BDs)7l`wQ6iK{Lo(L~FyQ%K_Zr|+d-ZhcG<&8yu-AS!XGia-=m`33tL z^*@}#{e{}*66|-f5@;# zU+A~Kri5fu8S2oKQ2l7f8b>zF=P4d4k{}%S>u|23;(WuSL^=4$Bl&4J&5e6i6x(rA*GuN95Li$j5ndPJ%@y?Ct(T=S{pX+gOz3ASGzTTTS z2>7t40>7}B{X?&885Ow>Yg+kwQg6@?x9&asdS>XMcfZS~d}AF-0&LK!0$tgs|scOBvUk?(>j%&w_|I$B)t64)X#y@GXe5dv4Izjl{@jVG3={ye-jBl6Qr(^I@+(t7Pr z?~85>#Y*qnh2YlS_l3c@6#M0tgDOwWQVy3S;K}aJ#ybWu9>2L|4S#VBF>H^hydGgD z>)fdP$oM6vIKmQ?~&} zTo9q-ok06!yY0swaDVI~BA0V}rcyAH4&ML*xc9~3h5R}jfRE`$^o}K#q-Z1edRLk$ zBW)0UyczQY)pddSk!)68Ef5d(xl)c2PryniG0E@OUwx5gN|Or>9&W`>NDjoC0u$ok z`9SHXIjSdCQ>HJ`TZCDplVuYV#>$V)jl$$xXT{s=1wvxl^tEpeN+ z7ZRUwk;X)+M6+}Dg=?mjJa!4S$bOpzz842!mf^G5qgdk?wJFQBn^ItWmM&(q`@)4F zK?k<$X7U5S1K2TUY;6sP0Lvb?z4twD|&r?kw9+s%OM zlE&(!By~w+UDDVeGHFa!t4##56m!ICx;P{@w1Ui3v zpC14k)oeqc0Z#~f?iz=zZxJ=}{r>)s8ZtO8RDY&6TSg);lH6~L&xC@; zN45lp9vANLRNR!sa%Zq_Mi4VH34@s?N_v+T6#e&~{zTr|<0$>;PvlG|;WOh<8S#KS zINjI;m_GWOAy!Iwx3^!y+AT-UtQl6F1^e(*t|+rWh3f#80e>(MVG`9Ttm(I&i+`U1 zcJPCq{F}TAo^}NS!eQU%RG;AmashL5l(x5Zq`tk^@dt|-$!z=L76YBX^bSHQzW>WL zP^N!2A&M{9hkVa|8V*y$cxC)jG7DB@zKP85=P2R{Mj7@^HqiG)?0;|IAT1J_Ned_nFyqwnNU-Q3g-4dZ`q>2s*Nwo> zLB&r;t7o`e-FWl43_Q9atY&l&#t8Jxn@v@cwo;SzQcU$3p7DCS zFtXIiYc}?;Rw=JaBQ{}=L?8Bf|NY#cB+$PGu#X`hJ>NZ@ET+?drK4`9gltQm&@4a% z|1&J?sGpPIc{YEmvndO-dXtl!omMZ^Y?$KLM07jN{t%kIKK=8iWE%~cobt2f2P4EW zKa3op9%R+E2tNLkWbEU$!8TW-u5j(JnZ-t5u-dxyq6NGapGC&zu;2lUOMhlv{j`@0 z{h6JCkL?SM^i>P~mjs-b^-1bsjf`(ib62WiS9%y*s_K7s3aQgaC6;DWb!0G78TjIl zm1kQpD3#hUey zZDXD-BlcBamrpA5g(4xK`oMjI)+5!r$;aulP)uK^H}ODG`+e13eV@KT>m%MD{+pR! z;n8UZ?pS{t%ri_1_r?n(%J(8fuc#eAozJJ9!?eGNMe}@9Ft^#74JOvy^hh<;*|Cfo zW;mL3>g>TQH>Ct-(Mv+0u~USER!>(-e1a7zNHJ1{a;9TYC1$GbGIEjuViJ@3tqnp_ zi~7laSJS~_^If&)C|q9*OIgvZmN#NUJJe=aR`7qXlX-r_uRma;Bh`)>WlE>l!qdzm zrRBf=xBv2g{pbJsKm5=C?Z5n={|~FwZ{pk8%7FUM|2KzGwS=dE5Ti>c2gpEM?uO#7f2$+Rih>B&s5oRiMq$R z+PfM%7oUj}Z|uy})J!TxQIyRSO4O2463=Y*ZJ+mjYajM!?7!N-u-y%S1W7<7CHaz! sbf$bF5ok6VjYi{Zpz*Vf?W`FIflU}!XmjvVQkOyp0Xhce1_1y70Kvv`VE_OC diff --git a/Solutions/Microsoft Exchange Security - Exchange On-Premises/Package/mainTemplate.json b/Solutions/Microsoft Exchange Security - Exchange On-Premises/Package/mainTemplate.json index ba8c1a898e2..a09ea026bff 100644 --- a/Solutions/Microsoft Exchange Security - Exchange On-Premises/Package/mainTemplate.json +++ b/Solutions/Microsoft Exchange Security - Exchange On-Premises/Package/mainTemplate.json @@ -321,7 +321,7 @@ "description": "**Deploy the Azure Arc Agent**\n> [Learn more](https://docs.microsoft.com/azure/azure-monitor/agents/azure-monitor-agent-install?tabs=ARMAgentPowerShell,PowerShellWindows,PowerShellWindowsArc,CLIWindows,CLIWindowsArc)" }, { - "title": "Install Azure Log Analytics Agent (Deprecated on XX/XX/XXXX)", + "title": "Install Azure Log Analytics Agent (Deprecated on 31/08/2024)", "description": "1. Download the Azure Log Analytics Agent and choose the deployment method in the below link.", "instructions": [ { @@ -1080,7 +1080,7 @@ "description": "**Deploy the Azure Arc Agent**\n> [Learn more](https://docs.microsoft.com/azure/azure-monitor/agents/azure-monitor-agent-install?tabs=ARMAgentPowerShell,PowerShellWindows,PowerShellWindowsArc,CLIWindows,CLIWindowsArc)" }, { - "title": "Install Azure Log Analytics Agent (Deprecated on XX/XX/XXXX)", + "title": "Install Azure Log Analytics Agent (Deprecated on 31/08/2024)", "description": "1. Download the Azure Log Analytics Agent and choose the deployment method in the below link.", "instructions": [ { From 4732cfae0f3e8265ead55a23557d603f4577f88f Mon Sep 17 00:00:00 2001 From: nlepagnez Date: Fri, 25 Aug 2023 07:40:09 +0200 Subject: [PATCH 05/18] Removing parsers in TXT format as required by the validation process. Adding function parameters in Yaml files. --- .../Parsers/ExchangeAdminAuditLogs.txt | 61 ---------------- .../Parsers/ExchangeConfiguration.txt | 72 ------------------- .../Parsers/ExchangeConfiguration.yaml | 17 +++++ .../Parsers/ExchangeEnvironmentList.txt | 33 --------- .../Parsers/ExchangeEnvironmentList.yaml | 5 ++ .../Parsers/ExchangeConfiguration.txt | 72 ------------------- .../Parsers/ExchangeConfiguration.yaml | 17 +++++ .../Parsers/ExchangeEnvironmentList.txt | 33 --------- .../Parsers/ExchangeEnvironmentList.yaml | 5 ++ 9 files changed, 44 insertions(+), 271 deletions(-) delete mode 100644 Solutions/Microsoft Exchange Security - Exchange On-Premises/Parsers/ExchangeAdminAuditLogs.txt delete mode 100644 Solutions/Microsoft Exchange Security - Exchange On-Premises/Parsers/ExchangeConfiguration.txt delete mode 100644 Solutions/Microsoft Exchange Security - Exchange On-Premises/Parsers/ExchangeEnvironmentList.txt delete mode 100644 Solutions/Microsoft Exchange Security - Exchange Online/Parsers/ExchangeConfiguration.txt delete mode 100644 Solutions/Microsoft Exchange Security - Exchange Online/Parsers/ExchangeEnvironmentList.txt diff --git a/Solutions/Microsoft Exchange Security - Exchange On-Premises/Parsers/ExchangeAdminAuditLogs.txt b/Solutions/Microsoft Exchange Security - Exchange On-Premises/Parsers/ExchangeAdminAuditLogs.txt deleted file mode 100644 index 75c7471c2ae..00000000000 --- a/Solutions/Microsoft Exchange Security - Exchange On-Premises/Parsers/ExchangeAdminAuditLogs.txt +++ /dev/null @@ -1,61 +0,0 @@ -// Title: ESI - Exchange Admin Audit Logs Parser -// Author: Microsoft -// Version: 1.0 -// Last Updated: 15/11/2022 -// Comment: -// v1.0 : -// - Function initilisation for Sentinel Solution -// -// DESCRIPTION: -// This parser takes raw Exchange Admin Audit Logs and add elements like ESI Environment, VIP information, sensitive information, etc... -// -// USAGE: -// 1. Open Log Analytics/Microsoft Sentinel Logs blade. Copy the query below and paste into the Logs query window. -// 2. Click the Save button above the query. A pane will appear on the right, select "as Function" from the drop down. Enter the Function Name "ExchangeAdminAuditLogs". -// 3. Function App usually take 10-15 minutes to activate. You can then use Function Alias for other queries -// -// DEPENDENCY: -// This parser is linked to "ExchangeVIP" whatchlist -// -// REFERENCE: -// Using functions in Azure monitor log queries: https://docs.microsoft.com/azure/azure-monitor/log-query/functions -// -// LOG SAMPLES: -// This parser assumes that MS Exchange Management Logs from Exchange Servers Event Logs are collected in Log Analytics. -// -// -let cVIPs = _GetWatchlist('ExchangeVIP') | project tostring(canonicalName) ; -let sVIPs = _GetWatchlist('ExchangeVIP') | project tostring(sAMAccountName) ; -let CmdletCheck = externaldata (Cmdlet:string, UserOriented:string, RestrictToParameter:string, Parameters:string)[h"https://raw.githubusercontent.com/nlepagnez/ESI-PublicContent/main/Operations/Watchlists/CmdletWatchlist.csv"]with(format="csv",ignoreFirstRecord=true); -let SensitiveCmdlets = externaldata (Cmdlet:string, UserOriented:string, RestrictToParameter:string, Parameters:string)[h"https://raw.githubusercontent.com/nlepagnez/ESI-PublicContent/main/Operations/Watchlists/CmdletWatchlist.csv"]with(format="csv",ignoreFirstRecord=true) | project tostring(Cmdlet) ; -let Env = ExchangeConfiguration(SpecificSectionList="ESIEnvironment") -| extend DomainFQDN_ = tostring(CmdletResultValue.DomainFQDN) -| project DomainFQDN_, ESIEnvironment; -let MSExchange_Management = (){ - Event - | where EventLog == 'MSExchange Management' - | where EventID in (1,6) // 1 = Success, 6 = Failure - | parse ParameterXml with '' CmdletName '' CmdletParameters '' Caller '' * - | extend TargetObject = iif( CmdletParameters has "-Identity ", split(split(CmdletParameters,'-Identity ')[1],'"')[1], iif( CmdletParameters has "-Name ", split(split(CmdletParameters,'-Name ')[1],'"')[1], "")) - | extend Status = case( EventID == 1, 'Success', 'Failure') - | extend IsVIP = iif(TargetObject in (cVIPs) or TargetObject in (sVIPs), true, false) - | extend CmdletNameJoin = tolower(CmdletName) - | join kind=leftouter ( - CmdletCheck - | extend CmdletNameJoin = tolower(Cmdlet) - ) on CmdletNameJoin - | extend DomainEnv = replace_string(Computer,strcat(tostring(split(Computer,'.',0)[0]),'.'),'') - | join kind=leftouter ( - Env - ) on $left.DomainEnv == $right.DomainFQDN_ - | extend ESIEnvironment = iif (isnotempty(ESIEnvironment), ESIEnvironment, strcat("Unknown-",DomainEnv)) - | extend IsSenstiveCmdlet = iif( isnotempty(CmdletNameJoin1) , true, false) - | extend IsRestrictedCmdLet = iif(IsSenstiveCmdlet == true, iif( RestrictToParameter == "Yes", true, false), dynamic(null)) - | extend RestrictedParameters = iif(IsSenstiveCmdlet == true, split(tolower(Parameters),';'), dynamic(null)) - | extend ExtractedParameters = iif(IsSenstiveCmdlet == true,extract_all(@"\B(-\w+)", tolower(CmdletParameters)), dynamic(null)) - | extend IsSenstiveCmdletParameters = iif(IsSenstiveCmdlet == true,iif( array_length(set_difference(ExtractedParameters,RestrictedParameters)) == array_length(ExtractedParameters), false, true ) , false) - | extend IsSensitive = iif( ( IsSenstiveCmdlet == true and IsRestrictedCmdLet == false ) or (IsSenstiveCmdlet == true and IsRestrictedCmdLet == true and IsSenstiveCmdletParameters == true ), true, false ) - //| project TimeGenerated,Computer,Status,Caller,TargetObject,IsVIP,CmdletName,CmdletParameters,IsSenstiveCmdlet,IsRestrictedCmdLet,ExtractedParameters,RestrictedParameters,IsSenstiveCmdletParameters - | project TimeGenerated,Computer,Status,Caller,TargetObject,IsVIP,CmdletName,CmdletParameters,IsSenstiveCmdlet,IsRestrictedCmdLet,ExtractedParameters,RestrictedParameters,IsSenstiveCmdletParameters,IsSensitive,UserOriented, ESIEnvironment -}; -MSExchange_Management diff --git a/Solutions/Microsoft Exchange Security - Exchange On-Premises/Parsers/ExchangeConfiguration.txt b/Solutions/Microsoft Exchange Security - Exchange On-Premises/Parsers/ExchangeConfiguration.txt deleted file mode 100644 index 151ccaa2dee..00000000000 --- a/Solutions/Microsoft Exchange Security - Exchange On-Premises/Parsers/ExchangeConfiguration.txt +++ /dev/null @@ -1,72 +0,0 @@ -// Title: ESI - Exchange Configuration Parser -// Author: Microsoft -// Version: 1.6 -// Last Updated: 13/10/2022 -// Comment: -// v1.6 : -// - Change consumption of Identity_Name_S by IdentityString_s. Requires CollectExchSecIns Script version 7.5.1 minimum -// v1.5 : -// - Change the usage of TimeGenerated instead of EntryDate for filtering BaseRequest. -// - Change alllife duration to 1080 days instead of 90 days. -// v1.4 : -// - Capacity to find all configuration without date limitation with the keyword "alllife" in SpecificConfigurationDate -// v1.3 : -// - Adding fuzzy mode to be able to have only On-Premises or Online tables -// - Simplify the request -// -// DESCRIPTION: -// This parser takes raw ESI Exchange Configuration Collector to pivot raw information and retrieve a specific date configuration. This is the same parser for Exchange On-Premises version and Exchange online version of the solution. -// -// USAGE: -// 1. Open Log Analytics/Microsoft Sentinel Logs blade. Copy the query below and paste into the Logs query window. -// 2. Click the Save button above the query. A pane will appear on the right, select "as Function" from the drop down. Enter the Function Name "ExchangeConfiguration". -// Parameters : 4 parameters to add during creation. -// 1. SpecificSectionList, type string, default value "" -// 2. SpecificConfigurationDate, type string, default value "lastdate" -// 3. Target, type string, default value "On-Premises" -// 4. SpecificConfigurationEnv, type string, default value "All" -// 3. Function App usually take 10-15 minutes to activate. You can then use Function Alias for other queries -// -// -// REFERENCE: -// Using functions in Azure monitor log queries: https://docs.microsoft.com/azure/azure-monitor/log-query/functions -// -// LOG SAMPLES: -// This parser assumes the raw log from the ESI Exchange Collector are on the ESIExchangeConfig_CL and/or ESIExchangeOnlineConfig_CL tables and are uploaded using the builtin REST API uploader of the Collector. -// -// -// Parameters -let _SpecificSectionList = split(SpecificSectionList,','); -let _configurationDate = iff(isnull(SpecificConfigurationDate) or isempty(SpecificConfigurationDate),"lastdate",tostring(SpecificConfigurationDate)); -let _configurationEnv = split(iff(isnull(SpecificConfigurationEnv) or isempty(SpecificConfigurationEnv) or tolower(SpecificConfigurationEnv) == "all","All",tostring(SpecificConfigurationEnv)),','); -let _target = iff(isnull(Target) or isempty(Target),"On-Premises",Target); -// Building Base Request -let _targetDate = iff(_configurationDate == "lastdate", ago(7d), iif(_configurationDate == "alllife",ago(1080d),todatetime(_configurationDate))); -let baseRequest = materialize (union isfuzzy=true withsource=TableName ESIAPIExchange*,ESIExchange* - | where TimeGenerated > _targetDate - | extend Source = iff (TableName contains "Online", "Online", "On-Premises") - | where _target == 'All' or Source == _target - | extend ScopedEnvironment = iff(_configurationEnv contains "All", "All",ESIEnvironment_s) - | where ScopedEnvironment in (_configurationEnv) - | extend EntryDate = todatetime(EntryDate_s) - | project-away EntryDate_s); -// Find Config Id (can be multiple id in all) -let findConfigDate = baseRequest - | extend Env =strcat(Source, "_",ESIEnvironment_s) - | summarize count() by GenerationInstanceID_g,Env,EntryDate - | extend distance = iff(_configurationDate == "lastdate" or _configurationDate == "alllife", now() - EntryDate, (EntryDate - todatetime(_configurationDate))) - | top-nested of Env by Ignore0=max(1), - top-nested 1 of distance by Ignore1 = min(distance) asc nulls last, - top-nested of GenerationInstanceID_g by Ignore2=max(2) - | project GenerationInstanceID_g; -// Parse Result -let ParseExchangeConfig = () { baseRequest - | join kind=leftsemi (findConfigDate) on $left.GenerationInstanceID_g == $right.GenerationInstanceID_g - | where isempty(_SpecificSectionList[0]) or Section_s in (_SpecificSectionList) - | extend TimeGenerated = EntryDate - | extend Identity = IdentityString_s - | extend CmdletResultValue = parse_json(rawData_s) - | project-rename ConfigurationInstanceID = GenerationInstanceID_g, ESIEnvironment = ESIEnvironment_s, Section = Section_s, PSCmdlet = PSCmdL_s, CmdletResultType = ExecutionResult_s, WhenChanged = WhenChanged_t, WhenCreated = WhenCreated_t, Name = Name_s - | project-away TenantId,SourceSystem,Type,EntryDate -}; -ParseExchangeConfig \ No newline at end of file diff --git a/Solutions/Microsoft Exchange Security - Exchange On-Premises/Parsers/ExchangeConfiguration.yaml b/Solutions/Microsoft Exchange Security - Exchange On-Premises/Parsers/ExchangeConfiguration.yaml index 2cb0c5fff34..12781036a25 100644 --- a/Solutions/Microsoft Exchange Security - Exchange On-Premises/Parsers/ExchangeConfiguration.yaml +++ b/Solutions/Microsoft Exchange Security - Exchange On-Premises/Parsers/ExchangeConfiguration.yaml @@ -6,6 +6,23 @@ Function: Category: Microsoft Sentinel Parser FunctionName: ExchangeConfiguration FunctionAlias: ExchangeConfiguration +FunctionParams: + - Name: SpecificSectionList + Type: string + Description: The list of section to query. Default is all. + DefaultValue: '' + - Name: SpecificConfigurationDate + Type: string + Description: The date to query. Default is last 7 days. + DefaultValue: 'lastdate' + - Name: SpecificConfigurationEnv + Type: string + Description: The environment to query. Default is all. + DefaultValue: 'All' + - Name: Target + Type: string + Description: The target environment to query. Valid values are "On-Premises" or "Online". Default is "On-Premises". + DefaultValue: 'On-Premises' FunctionQuery: | let _SpecificSectionList = split(SpecificSectionList,','); let _configurationDate = iff(isnull(SpecificConfigurationDate) or isempty(SpecificConfigurationDate),"lastdate",tostring(SpecificConfigurationDate)); diff --git a/Solutions/Microsoft Exchange Security - Exchange On-Premises/Parsers/ExchangeEnvironmentList.txt b/Solutions/Microsoft Exchange Security - Exchange On-Premises/Parsers/ExchangeEnvironmentList.txt deleted file mode 100644 index e3b7ba30a1c..00000000000 --- a/Solutions/Microsoft Exchange Security - Exchange On-Premises/Parsers/ExchangeEnvironmentList.txt +++ /dev/null @@ -1,33 +0,0 @@ -// Title: ESI - Exchange Configuration Environment List Generator -// Author: Microsoft -// Version: 1.2 -// Last Updated: 19/09/2022 -// Comment: -// v1.2 : -// - Adding fuzzy mode to be able to have only On-Premises or Online tables -// -// DESCRIPTION: -// This parser takes raw ESI Exchange Configuration Collector to list Exchange Environments that are loaded in the tables. This is the same parser for Exchange On-Premises version and Exchange online version of the solution. -// -// USAGE: -// 1. Open Log Analytics/Microsoft Sentinel Logs blade. Copy the query below and paste into the Logs query window. -// 2. Click the Save button above the query. A pane will appear on the right, select "as Function" from the drop down. Enter the Function Name "ExchangeEnvironmentList". -// Parameters : 1 parameter to add during creation. -// 1. Target, type string, default value "On-Premises" -// 3. Function App usually take 10-15 minutes to activate. You can then use Function Alias for other queries -// -// -// REFERENCE: -// Using functions in Azure monitor log queries: https://docs.microsoft.com/azure/azure-monitor/log-query/functions -// -// LOG SAMPLES: -// This parser assumes the raw log from the ESI Exchange Collector are on the ESIExchangeConfig_CL and/or ESIExchangeOnlineConfig_CL tables and are uploaded using the builtin REST API uploader of the Collector. -// -// -// Parameters -let _target = iff(isnull(Target) or isempty(Target),"On-Premises",Target); -let ScalarbaseRequest = union isfuzzy=true withsource=TableName ESIAPIExchange*,ESIExchange* - | extend Source = iff (TableName contains "Online", "Online", "On-Premises") - | where _target == 'All' or Source == _target; -// Base Request -ScalarbaseRequest | summarize by ESIEnvironment_s | project-rename ESIEnvironment = ESIEnvironment_s \ No newline at end of file diff --git a/Solutions/Microsoft Exchange Security - Exchange On-Premises/Parsers/ExchangeEnvironmentList.yaml b/Solutions/Microsoft Exchange Security - Exchange On-Premises/Parsers/ExchangeEnvironmentList.yaml index 7a75a162d1b..b88423ed75b 100644 --- a/Solutions/Microsoft Exchange Security - Exchange On-Premises/Parsers/ExchangeEnvironmentList.yaml +++ b/Solutions/Microsoft Exchange Security - Exchange On-Premises/Parsers/ExchangeEnvironmentList.yaml @@ -6,6 +6,11 @@ Function: Category: Microsoft Sentinel Parser FunctionName: ExchangeEnvironmentList FunctionAlias: ExchangeEnvironmentList +FunctionParams: + - Name: Target + Type: string + Description: The target environment to query. Valid values are "On-Premises" or "Online". Default is "On-Premises". + DefaultValue: 'On-Premises' FunctionQuery: | let _target = iff(isnull(Target) or isempty(Target),"On-Premises",Target); let ScalarbaseRequest = union isfuzzy=true withsource=TableName ESIAPIExchange*,ESIExchange* diff --git a/Solutions/Microsoft Exchange Security - Exchange Online/Parsers/ExchangeConfiguration.txt b/Solutions/Microsoft Exchange Security - Exchange Online/Parsers/ExchangeConfiguration.txt deleted file mode 100644 index 151ccaa2dee..00000000000 --- a/Solutions/Microsoft Exchange Security - Exchange Online/Parsers/ExchangeConfiguration.txt +++ /dev/null @@ -1,72 +0,0 @@ -// Title: ESI - Exchange Configuration Parser -// Author: Microsoft -// Version: 1.6 -// Last Updated: 13/10/2022 -// Comment: -// v1.6 : -// - Change consumption of Identity_Name_S by IdentityString_s. Requires CollectExchSecIns Script version 7.5.1 minimum -// v1.5 : -// - Change the usage of TimeGenerated instead of EntryDate for filtering BaseRequest. -// - Change alllife duration to 1080 days instead of 90 days. -// v1.4 : -// - Capacity to find all configuration without date limitation with the keyword "alllife" in SpecificConfigurationDate -// v1.3 : -// - Adding fuzzy mode to be able to have only On-Premises or Online tables -// - Simplify the request -// -// DESCRIPTION: -// This parser takes raw ESI Exchange Configuration Collector to pivot raw information and retrieve a specific date configuration. This is the same parser for Exchange On-Premises version and Exchange online version of the solution. -// -// USAGE: -// 1. Open Log Analytics/Microsoft Sentinel Logs blade. Copy the query below and paste into the Logs query window. -// 2. Click the Save button above the query. A pane will appear on the right, select "as Function" from the drop down. Enter the Function Name "ExchangeConfiguration". -// Parameters : 4 parameters to add during creation. -// 1. SpecificSectionList, type string, default value "" -// 2. SpecificConfigurationDate, type string, default value "lastdate" -// 3. Target, type string, default value "On-Premises" -// 4. SpecificConfigurationEnv, type string, default value "All" -// 3. Function App usually take 10-15 minutes to activate. You can then use Function Alias for other queries -// -// -// REFERENCE: -// Using functions in Azure monitor log queries: https://docs.microsoft.com/azure/azure-monitor/log-query/functions -// -// LOG SAMPLES: -// This parser assumes the raw log from the ESI Exchange Collector are on the ESIExchangeConfig_CL and/or ESIExchangeOnlineConfig_CL tables and are uploaded using the builtin REST API uploader of the Collector. -// -// -// Parameters -let _SpecificSectionList = split(SpecificSectionList,','); -let _configurationDate = iff(isnull(SpecificConfigurationDate) or isempty(SpecificConfigurationDate),"lastdate",tostring(SpecificConfigurationDate)); -let _configurationEnv = split(iff(isnull(SpecificConfigurationEnv) or isempty(SpecificConfigurationEnv) or tolower(SpecificConfigurationEnv) == "all","All",tostring(SpecificConfigurationEnv)),','); -let _target = iff(isnull(Target) or isempty(Target),"On-Premises",Target); -// Building Base Request -let _targetDate = iff(_configurationDate == "lastdate", ago(7d), iif(_configurationDate == "alllife",ago(1080d),todatetime(_configurationDate))); -let baseRequest = materialize (union isfuzzy=true withsource=TableName ESIAPIExchange*,ESIExchange* - | where TimeGenerated > _targetDate - | extend Source = iff (TableName contains "Online", "Online", "On-Premises") - | where _target == 'All' or Source == _target - | extend ScopedEnvironment = iff(_configurationEnv contains "All", "All",ESIEnvironment_s) - | where ScopedEnvironment in (_configurationEnv) - | extend EntryDate = todatetime(EntryDate_s) - | project-away EntryDate_s); -// Find Config Id (can be multiple id in all) -let findConfigDate = baseRequest - | extend Env =strcat(Source, "_",ESIEnvironment_s) - | summarize count() by GenerationInstanceID_g,Env,EntryDate - | extend distance = iff(_configurationDate == "lastdate" or _configurationDate == "alllife", now() - EntryDate, (EntryDate - todatetime(_configurationDate))) - | top-nested of Env by Ignore0=max(1), - top-nested 1 of distance by Ignore1 = min(distance) asc nulls last, - top-nested of GenerationInstanceID_g by Ignore2=max(2) - | project GenerationInstanceID_g; -// Parse Result -let ParseExchangeConfig = () { baseRequest - | join kind=leftsemi (findConfigDate) on $left.GenerationInstanceID_g == $right.GenerationInstanceID_g - | where isempty(_SpecificSectionList[0]) or Section_s in (_SpecificSectionList) - | extend TimeGenerated = EntryDate - | extend Identity = IdentityString_s - | extend CmdletResultValue = parse_json(rawData_s) - | project-rename ConfigurationInstanceID = GenerationInstanceID_g, ESIEnvironment = ESIEnvironment_s, Section = Section_s, PSCmdlet = PSCmdL_s, CmdletResultType = ExecutionResult_s, WhenChanged = WhenChanged_t, WhenCreated = WhenCreated_t, Name = Name_s - | project-away TenantId,SourceSystem,Type,EntryDate -}; -ParseExchangeConfig \ No newline at end of file diff --git a/Solutions/Microsoft Exchange Security - Exchange Online/Parsers/ExchangeConfiguration.yaml b/Solutions/Microsoft Exchange Security - Exchange Online/Parsers/ExchangeConfiguration.yaml index 00293a1474e..d27dda0a98d 100644 --- a/Solutions/Microsoft Exchange Security - Exchange Online/Parsers/ExchangeConfiguration.yaml +++ b/Solutions/Microsoft Exchange Security - Exchange Online/Parsers/ExchangeConfiguration.yaml @@ -6,6 +6,23 @@ Function: Category: Microsoft Sentinel Parser FunctionName: ExchangeConfiguration FunctionAlias: ExchangeConfiguration +FunctionParams: + - Name: SpecificSectionList + Type: string + Description: The list of section to query. Default is all. + DefaultValue: '' + - Name: SpecificConfigurationDate + Type: string + Description: The date to query. Default is last 7 days. + DefaultValue: 'lastdate' + - Name: SpecificConfigurationEnv + Type: string + Description: The environment to query. Default is all. + DefaultValue: 'All' + - Name: Target + Type: string + Description: The target environment to query. Valid values are "On-Premises" or "Online". Default is "On-Premises". + DefaultValue: 'On-Premises' FunctionQuery: | let _SpecificSectionList = split(SpecificSectionList,','); let _configurationDate = iff(isnull(SpecificConfigurationDate) or isempty(SpecificConfigurationDate),"lastdate",tostring(SpecificConfigurationDate)); diff --git a/Solutions/Microsoft Exchange Security - Exchange Online/Parsers/ExchangeEnvironmentList.txt b/Solutions/Microsoft Exchange Security - Exchange Online/Parsers/ExchangeEnvironmentList.txt deleted file mode 100644 index e3b7ba30a1c..00000000000 --- a/Solutions/Microsoft Exchange Security - Exchange Online/Parsers/ExchangeEnvironmentList.txt +++ /dev/null @@ -1,33 +0,0 @@ -// Title: ESI - Exchange Configuration Environment List Generator -// Author: Microsoft -// Version: 1.2 -// Last Updated: 19/09/2022 -// Comment: -// v1.2 : -// - Adding fuzzy mode to be able to have only On-Premises or Online tables -// -// DESCRIPTION: -// This parser takes raw ESI Exchange Configuration Collector to list Exchange Environments that are loaded in the tables. This is the same parser for Exchange On-Premises version and Exchange online version of the solution. -// -// USAGE: -// 1. Open Log Analytics/Microsoft Sentinel Logs blade. Copy the query below and paste into the Logs query window. -// 2. Click the Save button above the query. A pane will appear on the right, select "as Function" from the drop down. Enter the Function Name "ExchangeEnvironmentList". -// Parameters : 1 parameter to add during creation. -// 1. Target, type string, default value "On-Premises" -// 3. Function App usually take 10-15 minutes to activate. You can then use Function Alias for other queries -// -// -// REFERENCE: -// Using functions in Azure monitor log queries: https://docs.microsoft.com/azure/azure-monitor/log-query/functions -// -// LOG SAMPLES: -// This parser assumes the raw log from the ESI Exchange Collector are on the ESIExchangeConfig_CL and/or ESIExchangeOnlineConfig_CL tables and are uploaded using the builtin REST API uploader of the Collector. -// -// -// Parameters -let _target = iff(isnull(Target) or isempty(Target),"On-Premises",Target); -let ScalarbaseRequest = union isfuzzy=true withsource=TableName ESIAPIExchange*,ESIExchange* - | extend Source = iff (TableName contains "Online", "Online", "On-Premises") - | where _target == 'All' or Source == _target; -// Base Request -ScalarbaseRequest | summarize by ESIEnvironment_s | project-rename ESIEnvironment = ESIEnvironment_s \ No newline at end of file diff --git a/Solutions/Microsoft Exchange Security - Exchange Online/Parsers/ExchangeEnvironmentList.yaml b/Solutions/Microsoft Exchange Security - Exchange Online/Parsers/ExchangeEnvironmentList.yaml index edde14a9176..6c58f1cd898 100644 --- a/Solutions/Microsoft Exchange Security - Exchange Online/Parsers/ExchangeEnvironmentList.yaml +++ b/Solutions/Microsoft Exchange Security - Exchange Online/Parsers/ExchangeEnvironmentList.yaml @@ -6,6 +6,11 @@ Function: Category: Microsoft Sentinel Parser FunctionName: ExchangeEnvironmentList FunctionAlias: ExchangeEnvironmentList +FunctionParams: + - Name: Target + Type: string + Description: The target environment to query. Valid values are "On-Premises" or "Online". Default is "On-Premises". + DefaultValue: 'On-Premises' FunctionQuery: | let _target = iff(isnull(Target) or isempty(Target),"On-Premises",Target); let ScalarbaseRequest = union isfuzzy=true withsource=TableName ESIAPIExchange*,ESIExchange* From 7530409f2c0357f6f9bf15a83b7facd5bd3eab5c Mon Sep 17 00:00:00 2001 From: nlepagnez Date: Tue, 29 Aug 2023 23:34:45 +0200 Subject: [PATCH 06/18] Change parsers TXT to Yaml --- .../Data/Solution_MicrosoftExchangeSecurity.json | 6 +++--- .../Solution_MicrosoftExchangeSecurityExchangeOnline.json | 4 ++-- 2 files changed, 5 insertions(+), 5 deletions(-) diff --git a/Solutions/Microsoft Exchange Security - Exchange On-Premises/Data/Solution_MicrosoftExchangeSecurity.json b/Solutions/Microsoft Exchange Security - Exchange On-Premises/Data/Solution_MicrosoftExchangeSecurity.json index dea5ea879e3..01d2863a010 100644 --- a/Solutions/Microsoft Exchange Security - Exchange On-Premises/Data/Solution_MicrosoftExchangeSecurity.json +++ b/Solutions/Microsoft Exchange Security - Exchange On-Premises/Data/Solution_MicrosoftExchangeSecurity.json @@ -8,9 +8,9 @@ "Data Connectors/ESI-ExchangeOnPremisesCollector.json" ], "Parsers": [ - "Parsers/ExchangeAdminAuditLogs.txt", - "Parsers/ExchangeConfiguration.txt", - "Parsers/ExchangeEnvironmentList.txt" + "Parsers/ExchangeAdminAuditLogs.yaml", + "Parsers/ExchangeConfiguration.yaml", + "Parsers/ExchangeEnvironmentList.yaml" ], "Workbooks": [ "Workbooks/Microsoft Exchange Least Privilege with RBAC.json", diff --git a/Solutions/Microsoft Exchange Security - Exchange Online/Data/Solution_MicrosoftExchangeSecurityExchangeOnline.json b/Solutions/Microsoft Exchange Security - Exchange Online/Data/Solution_MicrosoftExchangeSecurityExchangeOnline.json index 43caf97a35b..a7a78abf932 100644 --- a/Solutions/Microsoft Exchange Security - Exchange Online/Data/Solution_MicrosoftExchangeSecurityExchangeOnline.json +++ b/Solutions/Microsoft Exchange Security - Exchange Online/Data/Solution_MicrosoftExchangeSecurityExchangeOnline.json @@ -7,8 +7,8 @@ "Data Connectors/ESI-ExchangeOnlineCollector.json" ], "Parsers": [ - "Parsers/ExchangeConfiguration.txt", - "Parsers/ExchangeEnvironmentList.txt" + "Parsers/ExchangeConfiguration.yaml", + "Parsers/ExchangeEnvironmentList.yaml" ], "Workbooks": [ "Workbooks/Microsoft Exchange Least Privilege with RBAC - Online.json", From 895c388888743bfa25d866ab3064b7bb16bf9202 Mon Sep 17 00:00:00 2001 From: nlepagnez Date: Wed, 30 Aug 2023 22:56:14 +0200 Subject: [PATCH 07/18] Update package as requested and update date of samples as requested. --- ...ESI-ExchangeAdminAuditLogs-SampleData.json | 36 +- ...xchangeOnPremisesCollector-SampleData.json | 3198 ++++++++--------- Sample Data/Custom/ESI-HttpProxyLogs-CSV.txt | 120 +- Sample Data/Custom/ESI-HttpProxyLogs.json | 240 +- .../Custom/ESI-MessageTrackingLogs.json | 24 +- .../Package/3.0.0.zip | Bin 67458 -> 67525 bytes .../Package/createUiDefinition.json | 10 +- .../Package/mainTemplate.json | 164 +- .../Package/3.0.0.zip | Bin 25180 -> 25244 bytes .../Package/createUiDefinition.json | 10 +- .../Package/mainTemplate.json | 44 +- 11 files changed, 1923 insertions(+), 1923 deletions(-) diff --git a/Sample Data/Custom/ESI-ExchangeAdminAuditLogs-SampleData.json b/Sample Data/Custom/ESI-ExchangeAdminAuditLogs-SampleData.json index 9cdd36f62b7..d34fbb249fa 100644 --- a/Sample Data/Custom/ESI-ExchangeAdminAuditLogs-SampleData.json +++ b/Sample Data/Custom/ESI-ExchangeAdminAuditLogs-SampleData.json @@ -2,7 +2,7 @@ { "TenantId": "74ea6a49-7ec1-489b-941b-7bdb61aef216", "SourceSystem": "OpsManager", - "TimeGenerated [UTC]": "11/15/2022, 7:03:19.865 PM", + "TimeGenerated [UTC]": "08/28/2023, 7:03:19.865 PM", "Source": "MSExchange CmdletLogs", "EventLog": "MSExchange Management", "Computer": "IT-X2016-04.MyCompany.de", @@ -27,7 +27,7 @@ { "TenantId": "74ea6a49-7ec1-489b-941b-7bdb61aef216", "SourceSystem": "OpsManager", - "TimeGenerated [UTC]": "11/15/2022, 7:03:19.764 PM", + "TimeGenerated [UTC]": "08/28/2023, 7:03:19.764 PM", "Source": "MSExchange CmdletLogs", "EventLog": "MSExchange Management", "Computer": "IT-X2016-04.MyCompany.de", @@ -52,7 +52,7 @@ { "TenantId": "74ea6a49-7ec1-489b-941b-7bdb61aef216", "SourceSystem": "OpsManager", - "TimeGenerated [UTC]": "11/15/2022, 7:03:19.671 PM", + "TimeGenerated [UTC]": "08/28/2023, 7:03:19.671 PM", "Source": "MSExchange CmdletLogs", "EventLog": "MSExchange Management", "Computer": "IT-X2016-04.MyCompany.de", @@ -77,7 +77,7 @@ { "TenantId": "74ea6a49-7ec1-489b-941b-7bdb61aef216", "SourceSystem": "OpsManager", - "TimeGenerated [UTC]": "11/15/2022, 7:03:19.564 PM", + "TimeGenerated [UTC]": "08/28/2023, 7:03:19.564 PM", "Source": "MSExchange CmdletLogs", "EventLog": "MSExchange Management", "Computer": "IT-X2016-04.MyCompany.de", @@ -102,7 +102,7 @@ { "TenantId": "74ea6a49-7ec1-489b-941b-7bdb61aef216", "SourceSystem": "OpsManager", - "TimeGenerated [UTC]": "11/15/2022, 7:03:19.451 PM", + "TimeGenerated [UTC]": "08/28/2023, 7:03:19.451 PM", "Source": "MSExchange CmdletLogs", "EventLog": "MSExchange Management", "Computer": "IT-X2016-04.MyCompany.de", @@ -127,7 +127,7 @@ { "TenantId": "74ea6a49-7ec1-489b-941b-7bdb61aef216", "SourceSystem": "OpsManager", - "TimeGenerated [UTC]": "11/15/2022, 7:00:29.847 PM", + "TimeGenerated [UTC]": "08/28/2023, 7:00:29.847 PM", "Source": "MSExchange CmdletLogs", "EventLog": "MSExchange Management", "Computer": "IT-X2016-04.MyCompany.de", @@ -152,7 +152,7 @@ { "TenantId": "74ea6a49-7ec1-489b-941b-7bdb61aef216", "SourceSystem": "OpsManager", - "TimeGenerated [UTC]": "11/15/2022, 7:00:29.684 PM", + "TimeGenerated [UTC]": "08/28/2023, 7:00:29.684 PM", "Source": "MSExchange CmdletLogs", "EventLog": "MSExchange Management", "Computer": "IT-X2016-04.MyCompany.de", @@ -177,7 +177,7 @@ { "TenantId": "74ea6a49-7ec1-489b-941b-7bdb61aef216", "SourceSystem": "OpsManager", - "TimeGenerated [UTC]": "11/15/2022, 7:00:29.419 PM", + "TimeGenerated [UTC]": "08/28/2023, 7:00:29.419 PM", "Source": "MSExchange CmdletLogs", "EventLog": "MSExchange Management", "Computer": "IT-X2016-04.MyCompany.de", @@ -202,7 +202,7 @@ { "TenantId": "74ea6a49-7ec1-489b-941b-7bdb61aef216", "SourceSystem": "OpsManager", - "TimeGenerated [UTC]": "11/15/2022, 7:00:29.152 PM", + "TimeGenerated [UTC]": "08/28/2023, 7:00:29.152 PM", "Source": "MSExchange CmdletLogs", "EventLog": "MSExchange Management", "Computer": "IT-X2016-04.MyCompany.de", @@ -227,7 +227,7 @@ { "TenantId": "74ea6a49-7ec1-489b-941b-7bdb61aef216", "SourceSystem": "OpsManager", - "TimeGenerated [UTC]": "11/15/2022, 7:00:28.339 PM", + "TimeGenerated [UTC]": "08/28/2023, 7:00:28.339 PM", "Source": "MSExchange CmdletLogs", "EventLog": "MSExchange Management", "Computer": "IT-X2016-04.MyCompany.de", @@ -252,7 +252,7 @@ { "TenantId": "74ea6a49-7ec1-489b-941b-7bdb61aef216", "SourceSystem": "OpsManager", - "TimeGenerated [UTC]": "11/15/2022, 11:03:43.461 AM", + "TimeGenerated [UTC]": "08/28/2023, 11:03:43.461 AM", "Source": "MSExchange CmdletLogs", "EventLog": "MSExchange Management", "Computer": "IT-X2016-04.MyCompany.de", @@ -277,7 +277,7 @@ { "TenantId": "74ea6a49-7ec1-489b-941b-7bdb61aef216", "SourceSystem": "OpsManager", - "TimeGenerated [UTC]": "11/15/2022, 11:03:43.291 AM", + "TimeGenerated [UTC]": "08/28/2023, 11:03:43.291 AM", "Source": "MSExchange CmdletLogs", "EventLog": "MSExchange Management", "Computer": "IT-X2016-04.MyCompany.de", @@ -302,7 +302,7 @@ { "TenantId": "74ea6a49-7ec1-489b-941b-7bdb61aef216", "SourceSystem": "OpsManager", - "TimeGenerated [UTC]": "11/15/2022, 11:03:43.152 AM", + "TimeGenerated [UTC]": "08/28/2023, 11:03:43.152 AM", "Source": "MSExchange CmdletLogs", "EventLog": "MSExchange Management", "Computer": "IT-X2016-04.MyCompany.de", @@ -327,7 +327,7 @@ { "TenantId": "74ea6a49-7ec1-489b-941b-7bdb61aef216", "SourceSystem": "OpsManager", - "TimeGenerated [UTC]": "11/15/2022, 11:03:43.019 AM", + "TimeGenerated [UTC]": "08/28/2023, 11:03:43.019 AM", "Source": "MSExchange CmdletLogs", "EventLog": "MSExchange Management", "Computer": "IT-X2016-04.MyCompany.de", @@ -352,7 +352,7 @@ { "TenantId": "74ea6a49-7ec1-489b-941b-7bdb61aef216", "SourceSystem": "OpsManager", - "TimeGenerated [UTC]": "11/15/2022, 11:03:42.902 AM", + "TimeGenerated [UTC]": "08/28/2023, 11:03:42.902 AM", "Source": "MSExchange CmdletLogs", "EventLog": "MSExchange Management", "Computer": "IT-X2016-04.MyCompany.de", @@ -377,7 +377,7 @@ { "TenantId": "74ea6a49-7ec1-489b-941b-7bdb61aef216", "SourceSystem": "OpsManager", - "TimeGenerated [UTC]": "11/15/2022, 11:00:22.461 AM", + "TimeGenerated [UTC]": "08/28/2023, 11:00:22.461 AM", "Source": "MSExchange CmdletLogs", "EventLog": "MSExchange Management", "Computer": "IT-X2016-04.MyCompany.de", @@ -402,7 +402,7 @@ { "TenantId": "74ea6a49-7ec1-489b-941b-7bdb61aef216", "SourceSystem": "OpsManager", - "TimeGenerated [UTC]": "11/15/2022, 11:00:22.306 AM", + "TimeGenerated [UTC]": "08/28/2023, 11:00:22.306 AM", "Source": "MSExchange CmdletLogs", "EventLog": "MSExchange Management", "Computer": "IT-X2016-04.MyCompany.de", @@ -427,7 +427,7 @@ { "TenantId": "74ea6a49-7ec1-489b-941b-7bdb61aef216", "SourceSystem": "OpsManager", - "TimeGenerated [UTC]": "11/15/2022, 11:00:22.065 AM", + "TimeGenerated [UTC]": "08/28/2023, 11:00:22.065 AM", "Source": "MSExchange CmdletLogs", "EventLog": "MSExchange Management", "Computer": "IT-X2016-04.MyCompany.de", diff --git a/Sample Data/Custom/ESI-ExchangeOnPremisesCollector-SampleData.json b/Sample Data/Custom/ESI-ExchangeOnPremisesCollector-SampleData.json index 9332c9aba36..473f9b6e7cf 100644 --- a/Sample Data/Custom/ESI-ExchangeOnPremisesCollector-SampleData.json +++ b/Sample Data/Custom/ESI-ExchangeOnPremisesCollector-SampleData.json @@ -1,8 +1,8 @@ -[ +[2023-08-27 { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "ESIEnvironment", "PSCmdL": "Get-Domain", "Name": "", @@ -16,7 +16,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "ESIEnvironment", "PSCmdL": "Get-Domain", "Name": "", @@ -30,7 +30,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "ESIEnvironment", "PSCmdL": "Get-Domain", "Name": "", @@ -44,7 +44,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "MbxDBJournaling", "PSCmdL": "Get-Mailboxdatabase", "Name": "", @@ -58,7 +58,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "MbxDBJournaling", "PSCmdL": "Get-Mailboxdatabase", "Name": "", @@ -72,7 +72,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "MbxDBJournaling", "PSCmdL": "Get-Mailboxdatabase", "Name": "", @@ -86,7 +86,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "MbxDBJournaling", "PSCmdL": "Get-Mailboxdatabase", "Name": "", @@ -100,7 +100,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "DAGEncryption", "PSCmdL": "Get-DatabaseAvailabilityGroup", "Name": "DAG01", @@ -114,7 +114,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "MailboxDatabases", "PSCmdL": "Get-MailboxDatabase", "Name": "", @@ -128,7 +128,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "MailboxDatabases", "PSCmdL": "Get-MailboxDatabase", "Name": "", @@ -142,7 +142,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "MailboxDatabases", "PSCmdL": "Get-MailboxDatabase", "Name": "", @@ -156,7 +156,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "MailboxDatabases", "PSCmdL": "Get-MailboxDatabase", "Name": "", @@ -170,7 +170,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "DAG", "PSCmdL": "Get-DatabaseAvailabilityGroup", "Name": "", @@ -184,7 +184,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "AdminAuditLog", "PSCmdL": "Get-AdminAuditLogConfig", "Name": "Admin Audit Log Settings", @@ -198,7 +198,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "RemoteDomain", "PSCmdL": "Get-RemoteDomain", "Name": "Default", @@ -212,7 +212,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "RemoteDomain", "PSCmdL": "Get-RemoteDomain", "Name": "Hybrid Domain - Contoso.mail.onmicrosoft.com", @@ -226,7 +226,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "RemoteDomain", "PSCmdL": "Get-RemoteDomain", "Name": "Hybrid Domain - Contoso.onmicrosoft.com", @@ -240,7 +240,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "MailboxDatabaseReceiveAs", "PSCmdL": "Get-MailboxDatabase -IncludePreExchange2013 | Get-ADPermission | ? {$_.ExtendedRights -like \"Receive-AS\" -and $_.Deny -eq $false }", "Name": "", @@ -254,7 +254,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "MailboxDatabaseReceiveAs", "PSCmdL": "Get-MailboxDatabase -IncludePreExchange2013 | Get-ADPermission | ? {$_.ExtendedRights -like \"Receive-AS\" -and $_.Deny -eq $false }", "Name": "", @@ -268,7 +268,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "MailboxDatabaseReceiveAs", "PSCmdL": "Get-MailboxDatabase -IncludePreExchange2013 | Get-ADPermission | ? {$_.ExtendedRights -like \"Receive-AS\" -and $_.Deny -eq $false }", "Name": "", @@ -282,7 +282,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "MailboxDatabaseReceiveAs", "PSCmdL": "Get-MailboxDatabase -IncludePreExchange2013 | Get-ADPermission | ? {$_.ExtendedRights -like \"Receive-AS\" -and $_.Deny -eq $false }", "Name": "", @@ -296,7 +296,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "MailboxDatabaseReceiveAs", "PSCmdL": "Get-MailboxDatabase -IncludePreExchange2013 | Get-ADPermission | ? {$_.ExtendedRights -like \"Receive-AS\" -and $_.Deny -eq $false }", "Name": "", @@ -310,7 +310,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "MailboxDatabaseReceiveAs", "PSCmdL": "Get-MailboxDatabase -IncludePreExchange2013 | Get-ADPermission | ? {$_.ExtendedRights -like \"Receive-AS\" -and $_.Deny -eq $false }", "Name": "", @@ -324,7 +324,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "MailboxDatabaseReceiveAs", "PSCmdL": "Get-MailboxDatabase -IncludePreExchange2013 | Get-ADPermission | ? {$_.ExtendedRights -like \"Receive-AS\" -and $_.Deny -eq $false }", "Name": "", @@ -338,7 +338,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "MailboxDatabaseReceiveAs", "PSCmdL": "Get-MailboxDatabase -IncludePreExchange2013 | Get-ADPermission | ? {$_.ExtendedRights -like \"Receive-AS\" -and $_.Deny -eq $false }", "Name": "", @@ -352,7 +352,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "MailboxDatabaseSendAs", "PSCmdL": "Get-MailboxDatabase -IncludePreExchange2013 | Get-ADPermission | ? {$_.ExtendedRights -like \"Send-AS\" -and $_.Deny -eq $false }", "Name": "", @@ -366,7 +366,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "MailboxDatabaseSendAs", "PSCmdL": "Get-MailboxDatabase -IncludePreExchange2013 | Get-ADPermission | ? {$_.ExtendedRights -like \"Send-AS\" -and $_.Deny -eq $false }", "Name": "", @@ -380,7 +380,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "MailboxDatabaseSendAs", "PSCmdL": "Get-MailboxDatabase -IncludePreExchange2013 | Get-ADPermission | ? {$_.ExtendedRights -like \"Send-AS\" -and $_.Deny -eq $false }", "Name": "", @@ -394,7 +394,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "MailboxDatabaseSendAs", "PSCmdL": "Get-MailboxDatabase -IncludePreExchange2013 | Get-ADPermission | ? {$_.ExtendedRights -like \"Send-AS\" -and $_.Deny -eq $false }", "Name": "", @@ -408,7 +408,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "AcceptedDomain", "PSCmdL": "Get-AcceptedDomain", "Name": "contosolife.com", @@ -422,7 +422,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "AcceptedDomain", "PSCmdL": "Get-AcceptedDomain", "Name": "contoso.com", @@ -436,7 +436,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "AcceptedDomain", "PSCmdL": "Get-AcceptedDomain", "Name": "Contoso.mail.onmicrosoft.com", @@ -450,7 +450,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "OrganizationConfig", "PSCmdL": "Get-OrganizationConfig", "Name": "", @@ -464,7 +464,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "ExchangeServers", "PSCmdL": "Get-ExchangeServer", "Name": "Contoso-EDGE-01", @@ -478,7 +478,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "ExchangeServers", "PSCmdL": "Get-ExchangeServer", "Name": "AX-EX19-01", @@ -492,7 +492,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "ExchangeServers", "PSCmdL": "Get-ExchangeServer", "Name": "AX-EX19-02", @@ -506,7 +506,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "ExchangeServers", "PSCmdL": "Get-ExchangeServer", "Name": "AX-EX19-03", @@ -520,7 +520,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "ExchangeServers", "PSCmdL": "Get-ExchangeServer", "Name": "AX-EX19-04", @@ -534,7 +534,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "ExchVersion", "PSCmdL": "invoke-command -ComputerName AX-EX19-01 -ScriptBlock {Get-Command Exsetup.exe | ForEach {$_.FileVersionInfo}}", "Name": "", @@ -548,7 +548,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "ExchVersion", "PSCmdL": "invoke-command -ComputerName AX-EX19-02 -ScriptBlock {Get-Command Exsetup.exe | ForEach {$_.FileVersionInfo}}", "Name": "", @@ -562,7 +562,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "ExchVersion", "PSCmdL": "invoke-command -ComputerName AX-EX19-03 -ScriptBlock {Get-Command Exsetup.exe | ForEach {$_.FileVersionInfo}}", "Name": "", @@ -576,7 +576,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "ExchVersion", "PSCmdL": "invoke-command -ComputerName AX-EX19-04 -ScriptBlock {Get-Command Exsetup.exe | ForEach {$_.FileVersionInfo}}", "Name": "", @@ -590,7 +590,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "MRA", "PSCmdL": "Get-ManagementRoleAssignment", "Name": "Active Directory Permissions-Organization Management", @@ -604,7 +604,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "MRA", "PSCmdL": "Get-ManagementRoleAssignment", "Name": "Active Directory Permissions-Organization Management-Delegating", @@ -618,7 +618,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "MRA", "PSCmdL": "Get-ManagementRoleAssignment", "Name": "Address Lists-Organization Management", @@ -632,7 +632,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "MRA", "PSCmdL": "Get-ManagementRoleAssignment", "Name": "Address Lists-Organization Management-Delegating", @@ -646,7 +646,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "MRA", "PSCmdL": "Get-ManagementRoleAssignment", "Name": "ApplicationImpersonation-ContosoSvcAcc1", @@ -660,7 +660,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "MRA", "PSCmdL": "Get-ManagementRoleAssignment", "Name": "ApplicationImpersonation-BRSvcAcc2", @@ -674,7 +674,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "MRA", "PSCmdL": "Get-ManagementRoleAssignment", "Name": "ApplicationImpersonation-Hygiene Management", @@ -688,7 +688,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "MRA", "PSCmdL": "Get-ManagementRoleAssignment", "Name": "ApplicationImpersonation-Organization Management-Delegating", @@ -702,7 +702,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "MRA", "PSCmdL": "Get-ManagementRoleAssignment", "Name": "ArchiveApplication-Exchange Online-ApplicationAccount", @@ -716,7 +716,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "MRA", "PSCmdL": "Get-ManagementRoleAssignment", "Name": "ArchiveApplication-Organization Management-Delegating", @@ -730,7 +730,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "MRA", "PSCmdL": "Get-ManagementRoleAssignment", "Name": "ArchiveApplication-Teams-ApplicationAccount", @@ -744,7 +744,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "MRA", "PSCmdL": "Get-ManagementRoleAssignment", "Name": "Audit Logs-Compliance Management", @@ -758,7 +758,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "MRA", "PSCmdL": "Get-ManagementRoleAssignment", "Name": "Audit Logs-Organization Management", @@ -772,7 +772,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "MRA", "PSCmdL": "Get-ManagementRoleAssignment", "Name": "Audit Logs-Organization Management-Delegating", @@ -786,7 +786,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "MRA", "PSCmdL": "Get-ManagementRoleAssignment", "Name": "Audit Logs-Records Management", @@ -800,7 +800,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "MRA", "PSCmdL": "Get-ManagementRoleAssignment", "Name": "Cmdlet Extension Agents-Organization Management", @@ -814,7 +814,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "MRA", "PSCmdL": "Get-ManagementRoleAssignment", "Name": "Cmdlet Extension Agents-Organization Management-Delegating", @@ -828,7 +828,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "MRA", "PSCmdL": "Get-ManagementRoleAssignment", "Name": "Compliance Admin-Compliance Management", @@ -842,7 +842,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "MRA", "PSCmdL": "Get-ManagementRoleAssignment", "Name": "Compliance Admin-Organization Management", @@ -856,7 +856,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "MRA", "PSCmdL": "Get-ManagementRoleAssignment", "Name": "Compliance Admin-Organization Management-Delegating", @@ -870,7 +870,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "MRA", "PSCmdL": "Get-ManagementRoleAssignment", "Name": "Data Loss Prevention-Compliance Management", @@ -884,7 +884,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "MRA", "PSCmdL": "Get-ManagementRoleAssignment", "Name": "Data Loss Prevention-Organization Management", @@ -898,7 +898,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "MRA", "PSCmdL": "Get-ManagementRoleAssignment", "Name": "Data Loss Prevention-Organization Management-Delegating", @@ -912,7 +912,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "MRA", "PSCmdL": "Get-ManagementRoleAssignment", "Name": "Database Availability Groups-Organization Management", @@ -926,7 +926,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "MRA", "PSCmdL": "Get-ManagementRoleAssignment", "Name": "Database Availability Groups-Organization Management-Delegating", @@ -940,7 +940,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "MRA", "PSCmdL": "Get-ManagementRoleAssignment", "Name": "Database Copies-Organization Management", @@ -954,7 +954,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "MRA", "PSCmdL": "Get-ManagementRoleAssignment", "Name": "Database Copies-Organization Management-Delegating", @@ -968,7 +968,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "MRA", "PSCmdL": "Get-ManagementRoleAssignment", "Name": "Database Copies-Server Management", @@ -982,7 +982,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "MRA", "PSCmdL": "Get-ManagementRoleAssignment", "Name": "Databases-Organization Management", @@ -996,7 +996,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "MRA", "PSCmdL": "Get-ManagementRoleAssignment", "Name": "Databases-Organization Management-Delegating", @@ -1010,7 +1010,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "MRA", "PSCmdL": "Get-ManagementRoleAssignment", "Name": "Databases-Server Management", @@ -1024,7 +1024,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "MRA", "PSCmdL": "Get-ManagementRoleAssignment", "Name": "Disaster Recovery-Organization Management", @@ -1038,7 +1038,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "MRA", "PSCmdL": "Get-ManagementRoleAssignment", "Name": "Disaster Recovery-Organization Management-Delegating", @@ -1052,7 +1052,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "MRA", "PSCmdL": "Get-ManagementRoleAssignment", "Name": "Distribution Groups-Organization Management", @@ -1066,7 +1066,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "MRA", "PSCmdL": "Get-ManagementRoleAssignment", "Name": "Distribution Groups-Organization Management-Delegating", @@ -1080,7 +1080,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "MRA", "PSCmdL": "Get-ManagementRoleAssignment", "Name": "Distribution Groups-Recipient Management", @@ -1094,7 +1094,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "MRA", "PSCmdL": "Get-ManagementRoleAssignment", "Name": "Edge Subscriptions-Organization Management", @@ -1108,7 +1108,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "MRA", "PSCmdL": "Get-ManagementRoleAssignment", "Name": "Edge Subscriptions-Organization Management-Delegating", @@ -1122,7 +1122,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "MRA", "PSCmdL": "Get-ManagementRoleAssignment", "Name": "E-Mail Address Policies-Organization Management", @@ -1136,7 +1136,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "MRA", "PSCmdL": "Get-ManagementRoleAssignment", "Name": "E-Mail Address Policies-Organization Management-Delegating", @@ -1150,7 +1150,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "MRA", "PSCmdL": "Get-ManagementRoleAssignment", "Name": "Exchange Connectors-Organization Management", @@ -1164,7 +1164,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "MRA", "PSCmdL": "Get-ManagementRoleAssignment", "Name": "Exchange Connectors-Organization Management-Delegating", @@ -1178,7 +1178,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "MRA", "PSCmdL": "Get-ManagementRoleAssignment", "Name": "Exchange Connectors-Server Management", @@ -1192,7 +1192,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "MRA", "PSCmdL": "Get-ManagementRoleAssignment", "Name": "Exchange Server Certificates-Organization Management", @@ -1206,7 +1206,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "MRA", "PSCmdL": "Get-ManagementRoleAssignment", "Name": "Exchange Server Certificates-Organization Management-Delegating", @@ -1220,7 +1220,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "MRA", "PSCmdL": "Get-ManagementRoleAssignment", "Name": "Exchange Server Certificates-Server Management", @@ -1234,7 +1234,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "MRA", "PSCmdL": "Get-ManagementRoleAssignment", "Name": "Exchange Servers-Organization Management", @@ -1248,7 +1248,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "MRA", "PSCmdL": "Get-ManagementRoleAssignment", "Name": "Exchange Servers-Organization Management-Delegating", @@ -1262,7 +1262,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "MRA", "PSCmdL": "Get-ManagementRoleAssignment", "Name": "Exchange Servers-Server Management", @@ -1276,7 +1276,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "MRA", "PSCmdL": "Get-ManagementRoleAssignment", "Name": "Exchange Virtual Directories-Organization Management", @@ -1290,7 +1290,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "MRA", "PSCmdL": "Get-ManagementRoleAssignment", "Name": "Exchange Virtual Directories-Organization Management-Delegating", @@ -1304,7 +1304,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "MRA", "PSCmdL": "Get-ManagementRoleAssignment", "Name": "Exchange Virtual Directories-Server Management", @@ -1318,7 +1318,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "MRA", "PSCmdL": "Get-ManagementRoleAssignment", "Name": "ExchangeCrossServiceIntegration-Organization Management-Delegati", @@ -1332,7 +1332,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "MRA", "PSCmdL": "Get-ManagementRoleAssignment", "Name": "Federated Sharing-Organization Management", @@ -1346,7 +1346,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "MRA", "PSCmdL": "Get-ManagementRoleAssignment", "Name": "Federated Sharing-Organization Management-Delegating", @@ -1360,7 +1360,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "MRA", "PSCmdL": "Get-ManagementRoleAssignment", "Name": "Information Rights Management-Compliance Management", @@ -1374,7 +1374,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "MRA", "PSCmdL": "Get-ManagementRoleAssignment", "Name": "Information Rights Management-Organization Management", @@ -1388,7 +1388,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "MRA", "PSCmdL": "Get-ManagementRoleAssignment", "Name": "Information Rights Management-Organization Management-Delegating", @@ -1402,7 +1402,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "MRA", "PSCmdL": "Get-ManagementRoleAssignment", "Name": "Journaling-Compliance Management", @@ -1416,7 +1416,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "MRA", "PSCmdL": "Get-ManagementRoleAssignment", "Name": "Journaling-Organization Management", @@ -1430,7 +1430,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "MRA", "PSCmdL": "Get-ManagementRoleAssignment", "Name": "Journaling-Organization Management-Delegating", @@ -1444,7 +1444,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "MRA", "PSCmdL": "Get-ManagementRoleAssignment", "Name": "Journaling-Records Management", @@ -1458,7 +1458,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "MRA", "PSCmdL": "Get-ManagementRoleAssignment", "Name": "Legal Hold-Discovery Management", @@ -1472,7 +1472,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "MRA", "PSCmdL": "Get-ManagementRoleAssignment", "Name": "Legal Hold-Organization Management", @@ -1486,7 +1486,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "MRA", "PSCmdL": "Get-ManagementRoleAssignment", "Name": "Legal Hold-Organization Management-Delegating", @@ -1500,7 +1500,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "MRA", "PSCmdL": "Get-ManagementRoleAssignment", "Name": "LegalHoldApplication-Exchange Online-ApplicationAccount", @@ -1514,7 +1514,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "MRA", "PSCmdL": "Get-ManagementRoleAssignment", "Name": "LegalHoldApplication-Organization Management-Delegating", @@ -1528,7 +1528,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "MRA", "PSCmdL": "Get-ManagementRoleAssignment", "Name": "Mail Enabled Public Folders-Organization Management", @@ -1542,7 +1542,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "MRA", "PSCmdL": "Get-ManagementRoleAssignment", "Name": "Mail Enabled Public Folders-Organization Management-Delegating", @@ -1556,7 +1556,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "MRA", "PSCmdL": "Get-ManagementRoleAssignment", "Name": "Mail Enabled Public Folders-Public Folder Management", @@ -1570,7 +1570,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "MRA", "PSCmdL": "Get-ManagementRoleAssignment", "Name": "Mail Recipient Creation-Organization Management", @@ -1584,7 +1584,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "MRA", "PSCmdL": "Get-ManagementRoleAssignment", "Name": "Mail Recipient Creation-Organization Management-Delegating", @@ -1598,7 +1598,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "MRA", "PSCmdL": "Get-ManagementRoleAssignment", "Name": "Mail Recipient Creation-Recipient Management", @@ -1612,7 +1612,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "MRA", "PSCmdL": "Get-ManagementRoleAssignment", "Name": "Mail Recipients-Organization Management", @@ -1626,7 +1626,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "MRA", "PSCmdL": "Get-ManagementRoleAssignment", "Name": "Mail Recipients-Organization Management-Delegating", @@ -1640,7 +1640,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "MRA", "PSCmdL": "Get-ManagementRoleAssignment", "Name": "Mail Recipients-Recipient Management", @@ -1654,7 +1654,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "MRA", "PSCmdL": "Get-ManagementRoleAssignment", "Name": "Mail Tips-Organization Management", @@ -1668,7 +1668,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "MRA", "PSCmdL": "Get-ManagementRoleAssignment", "Name": "Mail Tips-Organization Management-Delegating", @@ -1682,7 +1682,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "MRA", "PSCmdL": "Get-ManagementRoleAssignment", "Name": "Mailbox Import Export-contosolife-A", @@ -1696,7 +1696,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "MRA", "PSCmdL": "Get-ManagementRoleAssignment", "Name": "Mailbox Import Export-Organization Management", @@ -1710,7 +1710,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "MRA", "PSCmdL": "Get-ManagementRoleAssignment", "Name": "Mailbox Import Export-Organization Management-Delegating", @@ -1724,7 +1724,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "MRA", "PSCmdL": "Get-ManagementRoleAssignment", "Name": "Mailbox Import Export-U_SvcAccount", @@ -1738,7 +1738,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "MRA", "PSCmdL": "Get-ManagementRoleAssignment", "Name": "Mailbox Search-Discovery Management", @@ -1752,7 +1752,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "MRA", "PSCmdL": "Get-ManagementRoleAssignment", "Name": "Mailbox Search-Exchange Online-ApplicationAccount", @@ -1766,7 +1766,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "MRA", "PSCmdL": "Get-ManagementRoleAssignment", "Name": "Mailbox Search-Organization Management-Delegating", @@ -1780,7 +1780,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "MRA", "PSCmdL": "Get-ManagementRoleAssignment", "Name": "Mailbox Search-U_SvcAccount", @@ -1794,7 +1794,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "MRA", "PSCmdL": "Get-ManagementRoleAssignment", "Name": "MailboxSearchApplication-Exchange Online-ApplicationAccount", @@ -1808,7 +1808,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "MRA", "PSCmdL": "Get-ManagementRoleAssignment", "Name": "MailboxSearchApplication-Organization Management-Delegating", @@ -1822,7 +1822,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "MRA", "PSCmdL": "Get-ManagementRoleAssignment", "Name": "MeetingGraphApplication-Exchange Online-ApplicationAccount", @@ -1836,7 +1836,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "MRA", "PSCmdL": "Get-ManagementRoleAssignment", "Name": "MeetingGraphApplication-Organization Management-Delegating", @@ -1850,7 +1850,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "MRA", "PSCmdL": "Get-ManagementRoleAssignment", "Name": "Message Tracking-Compliance Management", @@ -1864,7 +1864,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "MRA", "PSCmdL": "Get-ManagementRoleAssignment", "Name": "Message Tracking-Organization Management", @@ -1878,7 +1878,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "MRA", "PSCmdL": "Get-ManagementRoleAssignment", "Name": "Message Tracking-Organization Management-Delegating", @@ -1892,7 +1892,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "MRA", "PSCmdL": "Get-ManagementRoleAssignment", "Name": "Message Tracking-Recipient Management", @@ -1906,7 +1906,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "MRA", "PSCmdL": "Get-ManagementRoleAssignment", "Name": "Message Tracking-Records Management", @@ -1920,7 +1920,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "MRA", "PSCmdL": "Get-ManagementRoleAssignment", "Name": "Migration-Organization Management", @@ -1934,7 +1934,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "MRA", "PSCmdL": "Get-ManagementRoleAssignment", "Name": "Migration-Organization Management-Delegating", @@ -1948,7 +1948,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "MRA", "PSCmdL": "Get-ManagementRoleAssignment", "Name": "Migration-Recipient Management", @@ -1962,7 +1962,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "MRA", "PSCmdL": "Get-ManagementRoleAssignment", "Name": "Monitoring-Organization Management", @@ -1976,7 +1976,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "MRA", "PSCmdL": "Get-ManagementRoleAssignment", "Name": "Monitoring-Organization Management-Delegating", @@ -1990,7 +1990,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "MRA", "PSCmdL": "Get-ManagementRoleAssignment", "Name": "Monitoring-Server Management", @@ -2004,7 +2004,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "MRA", "PSCmdL": "Get-ManagementRoleAssignment", "Name": "Monitoring-View-Only Organization Management", @@ -2018,7 +2018,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "MRA", "PSCmdL": "Get-ManagementRoleAssignment", "Name": "Move Mailboxes-Organization Management", @@ -2032,7 +2032,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "MRA", "PSCmdL": "Get-ManagementRoleAssignment", "Name": "Move Mailboxes-Organization Management-Delegating", @@ -2046,7 +2046,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "MRA", "PSCmdL": "Get-ManagementRoleAssignment", "Name": "Move Mailboxes-Recipient Management", @@ -2060,7 +2060,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "MRA", "PSCmdL": "Get-ManagementRoleAssignment", "Name": "My Custom Apps-Default Role Assignment Policy", @@ -2074,7 +2074,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "MRA", "PSCmdL": "Get-ManagementRoleAssignment", "Name": "My Custom Apps-Organization Management-Delegating", @@ -2088,7 +2088,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "MRA", "PSCmdL": "Get-ManagementRoleAssignment", "Name": "My Marketplace Apps-Default Role Assignment Policy", @@ -2102,7 +2102,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "MRA", "PSCmdL": "Get-ManagementRoleAssignment", "Name": "My Marketplace Apps-Organization Management-Delegating", @@ -2116,7 +2116,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "MRA", "PSCmdL": "Get-ManagementRoleAssignment", "Name": "My ReadWriteMailbox Apps-Default Role Assignment Policy", @@ -2130,7 +2130,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "MRA", "PSCmdL": "Get-ManagementRoleAssignment", "Name": "My ReadWriteMailbox Apps-Organization Management-Delegating", @@ -2144,7 +2144,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "MRA", "PSCmdL": "Get-ManagementRoleAssignment", "Name": "MyBaseOptions-Default Role Assignment Policy", @@ -2158,7 +2158,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "MRA", "PSCmdL": "Get-ManagementRoleAssignment", "Name": "MyBaseOptions-Organization Management-Delegating", @@ -2172,7 +2172,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "MRA", "PSCmdL": "Get-ManagementRoleAssignment", "Name": "MyContactInformation-Default Role Assignment Policy", @@ -2186,7 +2186,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "MRA", "PSCmdL": "Get-ManagementRoleAssignment", "Name": "MyContactInformation-Organization Management-Delegating", @@ -2200,7 +2200,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "MRA", "PSCmdL": "Get-ManagementRoleAssignment", "Name": "MyDiagnostics-Organization Management-Delegating", @@ -2214,7 +2214,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "MRA", "PSCmdL": "Get-ManagementRoleAssignment", "Name": "MyDistributionGroupMembership-Default Role Assignment Policy", @@ -2228,7 +2228,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "MRA", "PSCmdL": "Get-ManagementRoleAssignment", "Name": "MyDistributionGroupMembership-Organization Management-Delegating", @@ -2242,7 +2242,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "MRA", "PSCmdL": "Get-ManagementRoleAssignment", "Name": "MyDistributionGroups-Organization Management-Delegating", @@ -2256,7 +2256,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "MRA", "PSCmdL": "Get-ManagementRoleAssignment", "Name": "MyMailboxDelegation-Organization Management-Delegating", @@ -2270,7 +2270,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "MRA", "PSCmdL": "Get-ManagementRoleAssignment", "Name": "MyProfileInformation-Organization Management-Delegating", @@ -2284,7 +2284,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "MRA", "PSCmdL": "Get-ManagementRoleAssignment", "Name": "MyRetentionPolicies-Organization Management-Delegating", @@ -2298,7 +2298,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "MRA", "PSCmdL": "Get-ManagementRoleAssignment", "Name": "MyTeamMailboxes-Default Role Assignment Policy", @@ -2312,7 +2312,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "MRA", "PSCmdL": "Get-ManagementRoleAssignment", "Name": "MyTeamMailboxes-Organization Management-Delegating", @@ -2326,7 +2326,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "MRA", "PSCmdL": "Get-ManagementRoleAssignment", "Name": "MyTextMessaging-Default Role Assignment Policy", @@ -2340,7 +2340,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "MRA", "PSCmdL": "Get-ManagementRoleAssignment", "Name": "MyTextMessaging-Organization Management-Delegating", @@ -2354,7 +2354,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "MRA", "PSCmdL": "Get-ManagementRoleAssignment", "Name": "MyVoiceMail-Default Role Assignment Policy", @@ -2368,7 +2368,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "MRA", "PSCmdL": "Get-ManagementRoleAssignment", "Name": "MyVoiceMail-Organization Management-Delegating", @@ -2382,7 +2382,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "MRA", "PSCmdL": "Get-ManagementRoleAssignment", "Name": "OfficeExtensionApplication-Organization Management-Delegating", @@ -2396,7 +2396,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "MRA", "PSCmdL": "Get-ManagementRoleAssignment", "Name": "Org Custom Apps-Organization Management", @@ -2410,7 +2410,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "MRA", "PSCmdL": "Get-ManagementRoleAssignment", "Name": "Org Custom Apps-Organization Management-Delegating", @@ -2424,7 +2424,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "MRA", "PSCmdL": "Get-ManagementRoleAssignment", "Name": "Org Marketplace Apps-Organization Management", @@ -2438,7 +2438,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "MRA", "PSCmdL": "Get-ManagementRoleAssignment", "Name": "Org Marketplace Apps-Organization Management-Delegating", @@ -2452,7 +2452,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "MRA", "PSCmdL": "Get-ManagementRoleAssignment", "Name": "Organization Client Access-Organization Management", @@ -2466,7 +2466,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "MRA", "PSCmdL": "Get-ManagementRoleAssignment", "Name": "Organization Client Access-Organization Management-Delegating", @@ -2480,7 +2480,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "MRA", "PSCmdL": "Get-ManagementRoleAssignment", "Name": "Organization Configuration-Organization Management", @@ -2494,7 +2494,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "MRA", "PSCmdL": "Get-ManagementRoleAssignment", "Name": "Organization Configuration-Organization Management-Delegating", @@ -2508,7 +2508,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "MRA", "PSCmdL": "Get-ManagementRoleAssignment", "Name": "Organization Transport Settings-Organization Management", @@ -2522,7 +2522,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "MRA", "PSCmdL": "Get-ManagementRoleAssignment", "Name": "Organization Transport Settings-Organization Management-Delegati", @@ -2536,7 +2536,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "MRA", "PSCmdL": "Get-ManagementRoleAssignment", "Name": "POP3 And IMAP4 Protocols-Organization Management", @@ -2550,7 +2550,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "MRA", "PSCmdL": "Get-ManagementRoleAssignment", "Name": "POP3 And IMAP4 Protocols-Organization Management-Delegating", @@ -2564,7 +2564,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "MRA", "PSCmdL": "Get-ManagementRoleAssignment", "Name": "POP3 And IMAP4 Protocols-Server Management", @@ -2578,7 +2578,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "MRA", "PSCmdL": "Get-ManagementRoleAssignment", "Name": "Public Folders-Organization Management", @@ -2592,7 +2592,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "MRA", "PSCmdL": "Get-ManagementRoleAssignment", "Name": "Public Folders-Organization Management-Delegating", @@ -2606,7 +2606,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "MRA", "PSCmdL": "Get-ManagementRoleAssignment", "Name": "Public Folders-Public Folder Management", @@ -2620,7 +2620,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "MRA", "PSCmdL": "Get-ManagementRoleAssignment", "Name": "Receive Connectors-Hygiene Management", @@ -2634,7 +2634,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "MRA", "PSCmdL": "Get-ManagementRoleAssignment", "Name": "Receive Connectors-Organization Management", @@ -2648,7 +2648,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "MRA", "PSCmdL": "Get-ManagementRoleAssignment", "Name": "Receive Connectors-Organization Management-Delegating", @@ -2662,7 +2662,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "MRA", "PSCmdL": "Get-ManagementRoleAssignment", "Name": "Receive Connectors-Server Management", @@ -2676,7 +2676,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "MRA", "PSCmdL": "Get-ManagementRoleAssignment", "Name": "Recipient Policies-Organization Management", @@ -2690,7 +2690,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "MRA", "PSCmdL": "Get-ManagementRoleAssignment", "Name": "Recipient Policies-Organization Management-Delegating", @@ -2704,7 +2704,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "MRA", "PSCmdL": "Get-ManagementRoleAssignment", "Name": "Recipient Policies-Recipient Management", @@ -2718,7 +2718,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "MRA", "PSCmdL": "Get-ManagementRoleAssignment", "Name": "Remote and Accepted Domains-Organization Management", @@ -2732,7 +2732,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "MRA", "PSCmdL": "Get-ManagementRoleAssignment", "Name": "Remote and Accepted Domains-Organization Management-Delegating", @@ -2746,7 +2746,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "MRA", "PSCmdL": "Get-ManagementRoleAssignment", "Name": "Retention Management-Compliance Management", @@ -2760,7 +2760,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "MRA", "PSCmdL": "Get-ManagementRoleAssignment", "Name": "Retention Management-Organization Management", @@ -2774,7 +2774,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "MRA", "PSCmdL": "Get-ManagementRoleAssignment", "Name": "Retention Management-Organization Management-Delegating", @@ -2788,7 +2788,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "MRA", "PSCmdL": "Get-ManagementRoleAssignment", "Name": "Retention Management-Records Management", @@ -2802,7 +2802,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "MRA", "PSCmdL": "Get-ManagementRoleAssignment", "Name": "Role Management-Organization Management", @@ -2816,7 +2816,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "MRA", "PSCmdL": "Get-ManagementRoleAssignment", "Name": "Role Management-Organization Management-Delegating", @@ -2830,7 +2830,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "MRA", "PSCmdL": "Get-ManagementRoleAssignment", "Name": "Security Admin-Organization Management", @@ -2844,7 +2844,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "MRA", "PSCmdL": "Get-ManagementRoleAssignment", "Name": "Security Admin-Organization Management-Delegating", @@ -2858,7 +2858,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "MRA", "PSCmdL": "Get-ManagementRoleAssignment", "Name": "Security Admin-Security Administrator", @@ -2872,7 +2872,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "MRA", "PSCmdL": "Get-ManagementRoleAssignment", "Name": "Security Group Creation and Membership-Organization Management", @@ -2886,7 +2886,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "MRA", "PSCmdL": "Get-ManagementRoleAssignment", "Name": "Security Group Creation and Membership-Organization Management-D", @@ -2900,7 +2900,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "MRA", "PSCmdL": "Get-ManagementRoleAssignment", "Name": "Security Reader-Organization Management", @@ -2914,7 +2914,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "MRA", "PSCmdL": "Get-ManagementRoleAssignment", "Name": "Security Reader-Organization Management-Delegating", @@ -2928,7 +2928,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "MRA", "PSCmdL": "Get-ManagementRoleAssignment", "Name": "Security Reader-Security Reader", @@ -2942,7 +2942,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "MRA", "PSCmdL": "Get-ManagementRoleAssignment", "Name": "Send Connectors-Organization Management", @@ -2956,7 +2956,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "MRA", "PSCmdL": "Get-ManagementRoleAssignment", "Name": "Send Connectors-Organization Management-Delegating", @@ -2970,7 +2970,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "MRA", "PSCmdL": "Get-ManagementRoleAssignment", "Name": "SendMailApplication-Organization Management-Delegating", @@ -2984,7 +2984,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "MRA", "PSCmdL": "Get-ManagementRoleAssignment", "Name": "Support Diagnostics-Organization Management-Delegating", @@ -2998,7 +2998,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "MRA", "PSCmdL": "Get-ManagementRoleAssignment", "Name": "Team Mailboxes-Organization Management", @@ -3012,7 +3012,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "MRA", "PSCmdL": "Get-ManagementRoleAssignment", "Name": "Team Mailboxes-Organization Management-Delegating", @@ -3026,7 +3026,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "MRA", "PSCmdL": "Get-ManagementRoleAssignment", "Name": "Team Mailboxes-Recipient Management", @@ -3040,7 +3040,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "MRA", "PSCmdL": "Get-ManagementRoleAssignment", "Name": "TeamMailboxLifecycleApplication-Exchange Online-ApplicationAccou", @@ -3054,7 +3054,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "MRA", "PSCmdL": "Get-ManagementRoleAssignment", "Name": "TeamMailboxLifecycleApplication-Organization Management-Delegati", @@ -3068,7 +3068,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "MRA", "PSCmdL": "Get-ManagementRoleAssignment", "Name": "Transport Agents-Hygiene Management", @@ -3082,7 +3082,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "MRA", "PSCmdL": "Get-ManagementRoleAssignment", "Name": "Transport Agents-Organization Management", @@ -3096,7 +3096,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "MRA", "PSCmdL": "Get-ManagementRoleAssignment", "Name": "Transport Agents-Organization Management-Delegating", @@ -3110,7 +3110,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "MRA", "PSCmdL": "Get-ManagementRoleAssignment", "Name": "Transport Hygiene-Hygiene Management", @@ -3124,7 +3124,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "MRA", "PSCmdL": "Get-ManagementRoleAssignment", "Name": "Transport Hygiene-Organization Management", @@ -3138,7 +3138,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "MRA", "PSCmdL": "Get-ManagementRoleAssignment", "Name": "Transport Hygiene-Organization Management-Delegating", @@ -3152,7 +3152,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "MRA", "PSCmdL": "Get-ManagementRoleAssignment", "Name": "Transport Queues-Organization Management", @@ -3166,7 +3166,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "MRA", "PSCmdL": "Get-ManagementRoleAssignment", "Name": "Transport Queues-Organization Management-Delegating", @@ -3180,7 +3180,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "MRA", "PSCmdL": "Get-ManagementRoleAssignment", "Name": "Transport Queues-Server Management", @@ -3194,7 +3194,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "MRA", "PSCmdL": "Get-ManagementRoleAssignment", "Name": "Transport Rules-Compliance Management", @@ -3208,7 +3208,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "MRA", "PSCmdL": "Get-ManagementRoleAssignment", "Name": "Transport Rules-Organization Management", @@ -3222,7 +3222,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "MRA", "PSCmdL": "Get-ManagementRoleAssignment", "Name": "Transport Rules-Organization Management-Delegating", @@ -3236,7 +3236,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "MRA", "PSCmdL": "Get-ManagementRoleAssignment", "Name": "Transport Rules-Records Management", @@ -3250,7 +3250,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "MRA", "PSCmdL": "Get-ManagementRoleAssignment", "Name": "UM Mailboxes-Organization Management", @@ -3264,7 +3264,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "MRA", "PSCmdL": "Get-ManagementRoleAssignment", "Name": "UM Mailboxes-Organization Management-Delegating", @@ -3278,7 +3278,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "MRA", "PSCmdL": "Get-ManagementRoleAssignment", "Name": "UM Mailboxes-UM Management", @@ -3292,7 +3292,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "MRA", "PSCmdL": "Get-ManagementRoleAssignment", "Name": "UM Prompts-Organization Management", @@ -3306,7 +3306,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "MRA", "PSCmdL": "Get-ManagementRoleAssignment", "Name": "UM Prompts-Organization Management-Delegating", @@ -3320,7 +3320,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "MRA", "PSCmdL": "Get-ManagementRoleAssignment", "Name": "UM Prompts-UM Management", @@ -3334,7 +3334,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "MRA", "PSCmdL": "Get-ManagementRoleAssignment", "Name": "Unified Messaging-Organization Management", @@ -3348,7 +3348,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "MRA", "PSCmdL": "Get-ManagementRoleAssignment", "Name": "Unified Messaging-Organization Management-Delegating", @@ -3362,7 +3362,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "MRA", "PSCmdL": "Get-ManagementRoleAssignment", "Name": "Unified Messaging-UM Management", @@ -3376,7 +3376,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "MRA", "PSCmdL": "Get-ManagementRoleAssignment", "Name": "UnScoped Role Management-Organization Management-Delegating", @@ -3390,7 +3390,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "MRA", "PSCmdL": "Get-ManagementRoleAssignment", "Name": "User Options-Help Desk", @@ -3404,7 +3404,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "MRA", "PSCmdL": "Get-ManagementRoleAssignment", "Name": "User Options-Organization Management", @@ -3418,7 +3418,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "MRA", "PSCmdL": "Get-ManagementRoleAssignment", "Name": "User Options-Organization Management-Delegating", @@ -3432,7 +3432,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "MRA", "PSCmdL": "Get-ManagementRoleAssignment", "Name": "UserApplication-Exchange Online-ApplicationAccount", @@ -3446,7 +3446,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "MRA", "PSCmdL": "Get-ManagementRoleAssignment", "Name": "UserApplication-Organization Management-Delegating", @@ -3460,7 +3460,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "MRA", "PSCmdL": "Get-ManagementRoleAssignment", "Name": "UserApplication-Teams-ApplicationAccount", @@ -3474,7 +3474,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "MRA", "PSCmdL": "Get-ManagementRoleAssignment", "Name": "View-Only Audit Logs-Compliance Management", @@ -3488,7 +3488,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "MRA", "PSCmdL": "Get-ManagementRoleAssignment", "Name": "View-Only Audit Logs-Organization Management", @@ -3502,7 +3502,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "MRA", "PSCmdL": "Get-ManagementRoleAssignment", "Name": "View-Only Audit Logs-Organization Management-Delegating", @@ -3516,7 +3516,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "MRA", "PSCmdL": "Get-ManagementRoleAssignment", "Name": "View-Only Configuration-Compliance Management", @@ -3530,7 +3530,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "MRA", "PSCmdL": "Get-ManagementRoleAssignment", "Name": "View-Only Configuration-Delegated Setup", @@ -3544,7 +3544,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "MRA", "PSCmdL": "Get-ManagementRoleAssignment", "Name": "View-Only Configuration-Hygiene Management", @@ -3558,7 +3558,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "MRA", "PSCmdL": "Get-ManagementRoleAssignment", "Name": "View-Only Configuration-Organization Management", @@ -3572,7 +3572,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "MRA", "PSCmdL": "Get-ManagementRoleAssignment", "Name": "View-Only Configuration-Organization Management-Delegating", @@ -3586,7 +3586,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "MRA", "PSCmdL": "Get-ManagementRoleAssignment", "Name": "View-Only Configuration-View-Only Organization Management", @@ -3600,7 +3600,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "MRA", "PSCmdL": "Get-ManagementRoleAssignment", "Name": "View-Only Recipients-Compliance Management", @@ -3614,7 +3614,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "MRA", "PSCmdL": "Get-ManagementRoleAssignment", "Name": "View-Only Recipients-Help Desk", @@ -3628,7 +3628,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "MRA", "PSCmdL": "Get-ManagementRoleAssignment", "Name": "View-Only Recipients-Hygiene Management", @@ -3642,7 +3642,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "MRA", "PSCmdL": "Get-ManagementRoleAssignment", "Name": "View-Only Recipients-Organization Management", @@ -3656,7 +3656,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "MRA", "PSCmdL": "Get-ManagementRoleAssignment", "Name": "View-Only Recipients-Organization Management-Delegating", @@ -3670,7 +3670,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "MRA", "PSCmdL": "Get-ManagementRoleAssignment", "Name": "View-Only Recipients-View-Only Organization Management", @@ -3684,7 +3684,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "MRA", "PSCmdL": "Get-ManagementRoleAssignment", "Name": "SleeploadManagement-Organization Management", @@ -3698,7 +3698,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "MRA", "PSCmdL": "Get-ManagementRoleAssignment", "Name": "SleeploadManagement-Organization Management-Delegating", @@ -3712,7 +3712,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "MRCustom", "PSCmdL": "Get-ManagementRole | ? { $_.IsRootRole -eq $false -and $_.IsEndUserRole -eq $false }", "Name": "", @@ -3726,7 +3726,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "MRCustomDetails", "PSCmdL": "$result=@();$AllCustomMR=Get-ManagementRole | ? { $_.IsRootRole -eq $false -and $_.IsEndUserRole -eq $false };foreach ($CustomMR in $AllCustomMR) {$ParentRole = $CustomMR.Parent ; $result += Get-ManagementRole $CustomMR | Get-ManagementRoleEntry | select Role,Name,Type,WhenCreated,WhenChanged,@{Name=\"Parameters\";Expression={[string]::join(\";\",($_.Parameters))}} };$result", "Name": "", @@ -3740,7 +3740,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "MRScope", "PSCmdL": "Get-Managementscope", "Name": "", @@ -3754,7 +3754,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PopSettings", "PSCmdL": "Get-ClientAccessService | Get-PopSettings", "Name": "", @@ -3768,7 +3768,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PopSettings", "PSCmdL": "Get-ClientAccessService | Get-PopSettings", "Name": "", @@ -3782,7 +3782,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PopSettings", "PSCmdL": "Get-ClientAccessService | Get-PopSettings", "Name": "", @@ -3796,7 +3796,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PopSettings", "PSCmdL": "Get-ClientAccessService | Get-PopSettings", "Name": "", @@ -3810,7 +3810,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "IMAPSettings", "PSCmdL": "Get-ClientAccessService | Get-IMAPSettings", "Name": "", @@ -3824,7 +3824,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "IMAPSettings", "PSCmdL": "Get-ClientAccessService | Get-IMAPSettings", "Name": "", @@ -3838,7 +3838,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "IMAPSettings", "PSCmdL": "Get-ClientAccessService | Get-IMAPSettings", "Name": "", @@ -3852,7 +3852,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "IMAPSettings", "PSCmdL": "Get-ClientAccessService | Get-IMAPSettings", "Name": "", @@ -3866,7 +3866,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "POPIMAPServicesStatus", "PSCmdL": "Get-Service -ComputerName AX-EX19-01 | where {$_.Name -like \"MSExchangePOP3*\" -or $_.Name -like \"MSExchangeIMAP*\"}", "Name": "MSExchangeImap4", @@ -3880,7 +3880,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "POPIMAPServicesStatus", "PSCmdL": "Get-Service -ComputerName AX-EX19-01 | where {$_.Name -like \"MSExchangePOP3*\" -or $_.Name -like \"MSExchangeIMAP*\"}", "Name": "MSExchangeIMAP4BE", @@ -3894,7 +3894,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "POPIMAPServicesStatus", "PSCmdL": "Get-Service -ComputerName AX-EX19-01 | where {$_.Name -like \"MSExchangePOP3*\" -or $_.Name -like \"MSExchangeIMAP*\"}", "Name": "MSExchangePop3", @@ -3908,7 +3908,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "POPIMAPServicesStatus", "PSCmdL": "Get-Service -ComputerName AX-EX19-01 | where {$_.Name -like \"MSExchangePOP3*\" -or $_.Name -like \"MSExchangeIMAP*\"}", "Name": "MSExchangePOP3BE", @@ -3922,7 +3922,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "POPIMAPServicesStatus", "PSCmdL": "Get-Service -ComputerName AX-EX19-02 | where {$_.Name -like \"MSExchangePOP3*\" -or $_.Name -like \"MSExchangeIMAP*\"}", "Name": "MSExchangeImap4", @@ -3936,7 +3936,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "POPIMAPServicesStatus", "PSCmdL": "Get-Service -ComputerName AX-EX19-02 | where {$_.Name -like \"MSExchangePOP3*\" -or $_.Name -like \"MSExchangeIMAP*\"}", "Name": "MSExchangeIMAP4BE", @@ -3950,7 +3950,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "POPIMAPServicesStatus", "PSCmdL": "Get-Service -ComputerName AX-EX19-02 | where {$_.Name -like \"MSExchangePOP3*\" -or $_.Name -like \"MSExchangeIMAP*\"}", "Name": "MSExchangePop3", @@ -3964,7 +3964,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "POPIMAPServicesStatus", "PSCmdL": "Get-Service -ComputerName AX-EX19-02 | where {$_.Name -like \"MSExchangePOP3*\" -or $_.Name -like \"MSExchangeIMAP*\"}", "Name": "MSExchangePOP3BE", @@ -3978,7 +3978,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "POPIMAPServicesStatus", "PSCmdL": "Get-Service -ComputerName AX-EX19-03 | where {$_.Name -like \"MSExchangePOP3*\" -or $_.Name -like \"MSExchangeIMAP*\"}", "Name": "MSExchangeImap4", @@ -3992,7 +3992,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "POPIMAPServicesStatus", "PSCmdL": "Get-Service -ComputerName AX-EX19-03 | where {$_.Name -like \"MSExchangePOP3*\" -or $_.Name -like \"MSExchangeIMAP*\"}", "Name": "MSExchangeIMAP4BE", @@ -4006,7 +4006,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "POPIMAPServicesStatus", "PSCmdL": "Get-Service -ComputerName AX-EX19-03 | where {$_.Name -like \"MSExchangePOP3*\" -or $_.Name -like \"MSExchangeIMAP*\"}", "Name": "MSExchangePop3", @@ -4020,7 +4020,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "POPIMAPServicesStatus", "PSCmdL": "Get-Service -ComputerName AX-EX19-03 | where {$_.Name -like \"MSExchangePOP3*\" -or $_.Name -like \"MSExchangeIMAP*\"}", "Name": "MSExchangePOP3BE", @@ -4034,7 +4034,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "POPIMAPServicesStatus", "PSCmdL": "Get-Service -ComputerName AX-EX19-04 | where {$_.Name -like \"MSExchangePOP3*\" -or $_.Name -like \"MSExchangeIMAP*\"}", "Name": "MSExchangeImap4", @@ -4048,7 +4048,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "POPIMAPServicesStatus", "PSCmdL": "Get-Service -ComputerName AX-EX19-04 | where {$_.Name -like \"MSExchangePOP3*\" -or $_.Name -like \"MSExchangeIMAP*\"}", "Name": "MSExchangeIMAP4BE", @@ -4062,7 +4062,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "POPIMAPServicesStatus", "PSCmdL": "Get-Service -ComputerName AX-EX19-04 | where {$_.Name -like \"MSExchangePOP3*\" -or $_.Name -like \"MSExchangeIMAP*\"}", "Name": "MSExchangePop3", @@ -4076,7 +4076,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "POPIMAPServicesStatus", "PSCmdL": "Get-Service -ComputerName AX-EX19-04 | where {$_.Name -like \"MSExchangePOP3*\" -or $_.Name -like \"MSExchangeIMAP*\"}", "Name": "MSExchangePOP3BE", @@ -4090,7 +4090,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "RoleGroup", "PSCmdL": "Get-RoleGroup", "Name": "Compliance Management", @@ -4104,7 +4104,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "RoleGroup", "PSCmdL": "Get-RoleGroup", "Name": "Delegated Setup", @@ -4118,7 +4118,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "RoleGroup", "PSCmdL": "Get-RoleGroup", "Name": "Discovery Management", @@ -4132,7 +4132,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "RoleGroup", "PSCmdL": "Get-RoleGroup", "Name": "Help Desk", @@ -4146,7 +4146,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "RoleGroup", "PSCmdL": "Get-RoleGroup", "Name": "Hygiene Management", @@ -4160,7 +4160,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "RoleGroup", "PSCmdL": "Get-RoleGroup", "Name": "Organization Management", @@ -4174,7 +4174,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "RoleGroup", "PSCmdL": "Get-RoleGroup", "Name": "Public Folder Management", @@ -4188,7 +4188,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "RoleGroup", "PSCmdL": "Get-RoleGroup", "Name": "Recipient Management", @@ -4202,7 +4202,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "RoleGroup", "PSCmdL": "Get-RoleGroup", "Name": "Records Management", @@ -4216,7 +4216,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "RoleGroup", "PSCmdL": "Get-RoleGroup", "Name": "Security Administrator", @@ -4230,7 +4230,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "RoleGroup", "PSCmdL": "Get-RoleGroup", "Name": "Security Reader", @@ -4244,7 +4244,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "RoleGroup", "PSCmdL": "Get-RoleGroup", "Name": "Server Management", @@ -4258,7 +4258,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "RoleGroup", "PSCmdL": "Get-RoleGroup", "Name": "UM Management", @@ -4272,7 +4272,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "RoleGroup", "PSCmdL": "Get-RoleGroup", "Name": "View-Only Organization Management", @@ -4286,7 +4286,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "ETS", "PSCmdL": "Get-adgroupmember \"Exchange Trusted Subsystem\" -server contoso.com", "Name": "ContosoSvcO365EWS", @@ -4300,7 +4300,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "ETS", "PSCmdL": "Get-adgroupmember \"Exchange Trusted Subsystem\" -server contoso.com", "Name": "AX-EX19-01", @@ -4314,7 +4314,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "ETS", "PSCmdL": "Get-adgroupmember \"Exchange Trusted Subsystem\" -server contoso.com", "Name": "AX-EX19-02", @@ -4328,7 +4328,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "ETS", "PSCmdL": "Get-adgroupmember \"Exchange Trusted Subsystem\" -server contoso.com", "Name": "AX-EX19-03", @@ -4342,7 +4342,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "ETS", "PSCmdL": "Get-adgroupmember \"Exchange Trusted Subsystem\" -server contoso.com", "Name": "AX-EX19-04", @@ -4356,7 +4356,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "EWP", "PSCmdL": "Get-adgroupmember \"Exchange Windows Permissions\" -server contoso.com", "Name": "Exchange Trusted Subsystem", @@ -4370,7 +4370,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "ExGroup", "PSCmdL": "get-adgroup -filter * -searchbase \"ou=Microsoft Exchange Security Groups,DC=Contoso,DC=com\" -server contoso.com", "Name": "", @@ -4384,7 +4384,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "ExGroup", "PSCmdL": "get-adgroup -filter * -searchbase \"ou=Microsoft Exchange Security Groups,DC=Contoso,DC=com\" -server contoso.com", "Name": "", @@ -4398,7 +4398,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "ExGroup", "PSCmdL": "get-adgroup -filter * -searchbase \"ou=Microsoft Exchange Security Groups,DC=Contoso,DC=com\" -server contoso.com", "Name": "", @@ -4412,7 +4412,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "ExGroup", "PSCmdL": "get-adgroup -filter * -searchbase \"ou=Microsoft Exchange Security Groups,DC=Contoso,DC=com\" -server contoso.com", "Name": "", @@ -4426,7 +4426,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "ExGroup", "PSCmdL": "get-adgroup -filter * -searchbase \"ou=Microsoft Exchange Security Groups,DC=Contoso,DC=com\" -server contoso.com", "Name": "", @@ -4440,7 +4440,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "ExGroup", "PSCmdL": "get-adgroup -filter * -searchbase \"ou=Microsoft Exchange Security Groups,DC=Contoso,DC=com\" -server contoso.com", "Name": "", @@ -4454,7 +4454,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "ExGroup", "PSCmdL": "get-adgroup -filter * -searchbase \"ou=Microsoft Exchange Security Groups,DC=Contoso,DC=com\" -server contoso.com", "Name": "", @@ -4468,7 +4468,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "ExGroup", "PSCmdL": "get-adgroup -filter * -searchbase \"ou=Microsoft Exchange Security Groups,DC=Contoso,DC=com\" -server contoso.com", "Name": "", @@ -4482,7 +4482,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "ExGroup", "PSCmdL": "get-adgroup -filter * -searchbase \"ou=Microsoft Exchange Security Groups,DC=Contoso,DC=com\" -server contoso.com", "Name": "", @@ -4496,7 +4496,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "ExGroup", "PSCmdL": "get-adgroup -filter * -searchbase \"ou=Microsoft Exchange Security Groups,DC=Contoso,DC=com\" -server contoso.com", "Name": "", @@ -4510,7 +4510,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "ExGroup", "PSCmdL": "get-adgroup -filter * -searchbase \"ou=Microsoft Exchange Security Groups,DC=Contoso,DC=com\" -server contoso.com", "Name": "", @@ -4524,7 +4524,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "ExGroup", "PSCmdL": "get-adgroup -filter * -searchbase \"ou=Microsoft Exchange Security Groups,DC=Contoso,DC=com\" -server contoso.com", "Name": "", @@ -4538,7 +4538,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "ExGroup", "PSCmdL": "get-adgroup -filter * -searchbase \"ou=Microsoft Exchange Security Groups,DC=Contoso,DC=com\" -server contoso.com", "Name": "", @@ -4552,7 +4552,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "ExGroup", "PSCmdL": "get-adgroup -filter * -searchbase \"ou=Microsoft Exchange Security Groups,DC=Contoso,DC=com\" -server contoso.com", "Name": "", @@ -4566,7 +4566,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "ExGroup", "PSCmdL": "get-adgroup -filter * -searchbase \"ou=Microsoft Exchange Security Groups,DC=Contoso,DC=com\" -server contoso.com", "Name": "", @@ -4580,7 +4580,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "ExGroup", "PSCmdL": "get-adgroup -filter * -searchbase \"ou=Microsoft Exchange Security Groups,DC=Contoso,DC=com\" -server contoso.com", "Name": "", @@ -4594,7 +4594,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "ExGroup", "PSCmdL": "get-adgroup -filter * -searchbase \"ou=Microsoft Exchange Security Groups,DC=Contoso,DC=com\" -server contoso.com", "Name": "", @@ -4608,7 +4608,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "ExGroup", "PSCmdL": "get-adgroup -filter * -searchbase \"ou=Microsoft Exchange Security Groups,DC=Contoso,DC=com\" -server contoso.com", "Name": "", @@ -4622,7 +4622,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "ExGroup", "PSCmdL": "get-adgroup -filter * -searchbase \"ou=Microsoft Exchange Security Groups,DC=Contoso,DC=com\" -server contoso.com", "Name": "", @@ -4636,7 +4636,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "ExGroup", "PSCmdL": "get-adgroup -filter * -searchbase \"ou=Microsoft Exchange Security Groups,DC=Contoso,DC=com\" -server contoso.com", "Name": "", @@ -4650,7 +4650,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "ExGroup", "PSCmdL": "get-adgroup -filter * -searchbase \"ou=Microsoft Exchange Security Groups,DC=Contoso,DC=com\" -server contoso.com", "Name": "", @@ -4664,7 +4664,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "ExGroup", "PSCmdL": "get-adgroup -filter * -searchbase \"ou=Microsoft Exchange Security Groups,DC=Contoso,DC=com\" -server contoso.com", "Name": "", @@ -4678,7 +4678,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "ExGroup", "PSCmdL": "get-adgroup -filter * -searchbase \"ou=Microsoft Exchange Security Groups,DC=Contoso,DC=com\" -server contoso.com", "Name": "", @@ -4692,7 +4692,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "ExGroup", "PSCmdL": "get-adgroup -filter * -searchbase \"ou=Microsoft Exchange Security Groups,DC=Contoso,DC=com\" -server contoso.com", "Name": "", @@ -4706,7 +4706,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "ExGroup", "PSCmdL": "get-adgroup -filter * -searchbase \"ou=Microsoft Exchange Security Groups,DC=Contoso,DC=com\" -server contoso.com", "Name": "", @@ -4720,7 +4720,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "ExGroup", "PSCmdL": "get-adgroup -filter * -searchbase \"ou=Microsoft Exchange Security Groups,DC=Contoso,DC=com\" -server contoso.com", "Name": "", @@ -4734,7 +4734,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "ExGroup", "PSCmdL": "get-adgroup -filter * -searchbase \"ou=Microsoft Exchange Security Groups,DC=Contoso,DC=com\" -server contoso.com", "Name": "", @@ -4748,7 +4748,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "ExGroup", "PSCmdL": "get-adgroup -filter * -searchbase \"ou=Microsoft Exchange Security Groups,DC=Contoso,DC=com\" -server contoso.com", "Name": "", @@ -4762,7 +4762,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "ExGroup", "PSCmdL": "get-adgroup -filter * -searchbase \"ou=Microsoft Exchange Security Groups,DC=Contoso,DC=com\" -server contoso.com", "Name": "", @@ -4776,7 +4776,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "ExGroup", "PSCmdL": "get-adgroup -filter * -searchbase \"ou=Microsoft Exchange Security Groups,DC=Contoso,DC=com\" -server contoso.com", "Name": "", @@ -4790,7 +4790,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "ExGroup", "PSCmdL": "get-adgroup -filter * -searchbase \"ou=Microsoft Exchange Security Groups,DC=Contoso,DC=com\" -server contoso.com", "Name": "", @@ -4804,7 +4804,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "ExGroup", "PSCmdL": "get-adgroup -filter * -searchbase \"ou=Microsoft Exchange Security Groups,DC=Contoso,DC=com\" -server contoso.com", "Name": "", @@ -4818,7 +4818,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "ExGroup", "PSCmdL": "get-adgroup -filter * -searchbase \"ou=Microsoft Exchange Security Groups,DC=Contoso,DC=com\" -server contoso.com", "Name": "", @@ -4832,7 +4832,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "ExGroup", "PSCmdL": "get-adgroup -filter * -searchbase \"ou=Microsoft Exchange Security Groups,DC=Contoso,DC=com\" -server contoso.com", "Name": "", @@ -4846,7 +4846,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "ExGroup", "PSCmdL": "get-adgroup -filter * -searchbase \"ou=Microsoft Exchange Security Groups,DC=Contoso,DC=com\" -server contoso.com", "Name": "", @@ -4860,7 +4860,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "ExGroup", "PSCmdL": "get-adgroup -filter * -searchbase \"ou=Microsoft Exchange Security Groups,DC=Contoso,DC=com\" -server contoso.com", "Name": "", @@ -4874,7 +4874,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "ExGroup", "PSCmdL": "get-adgroup -filter * -searchbase \"ou=Microsoft Exchange Security Groups,DC=Contoso,DC=com\" -server contoso.com", "Name": "", @@ -4888,7 +4888,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "ExGroup", "PSCmdL": "get-adgroup -filter * -searchbase \"ou=Microsoft Exchange Security Groups,DC=Contoso,DC=com\" -server contoso.com", "Name": "", @@ -4902,7 +4902,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "ExGroup", "PSCmdL": "get-adgroup -filter * -searchbase \"ou=Microsoft Exchange Security Groups,DC=Contoso,DC=com\" -server contoso.com", "Name": "", @@ -4916,7 +4916,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "ExGroup", "PSCmdL": "get-adgroup -filter * -searchbase \"ou=Microsoft Exchange Security Groups,DC=Contoso,DC=com\" -server contoso.com", "Name": "", @@ -4930,7 +4930,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "ExGroup", "PSCmdL": "get-adgroup -filter * -searchbase \"ou=Microsoft Exchange Security Groups,DC=Contoso,DC=com\" -server contoso.com", "Name": "", @@ -4944,7 +4944,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "ExGroup", "PSCmdL": "get-adgroup -filter * -searchbase \"ou=Microsoft Exchange Security Groups,DC=Contoso,DC=com\" -server contoso.com", "Name": "", @@ -4958,7 +4958,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "ExGroup", "PSCmdL": "get-adgroup -filter * -searchbase \"ou=Microsoft Exchange Security Groups,DC=Contoso,DC=com\" -server contoso.com", "Name": "", @@ -4972,7 +4972,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "ExGroup", "PSCmdL": "get-adgroup -filter * -searchbase \"ou=Microsoft Exchange Security Groups,DC=Contoso,DC=com\" -server contoso.com", "Name": "", @@ -4986,7 +4986,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "ExGroup", "PSCmdL": "get-adgroup -filter * -searchbase \"ou=Microsoft Exchange Security Groups,DC=Contoso,DC=com\" -server contoso.com", "Name": "", @@ -5000,7 +5000,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "ExGroup", "PSCmdL": "get-adgroup -filter * -searchbase \"ou=Microsoft Exchange Security Groups,DC=Contoso,DC=com\" -server contoso.com", "Name": "", @@ -5014,7 +5014,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "ExGroup", "PSCmdL": "get-adgroup -filter * -searchbase \"ou=Microsoft Exchange Security Groups,DC=Contoso,DC=com\" -server contoso.com", "Name": "", @@ -5028,7 +5028,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "ExGroup", "PSCmdL": "get-adgroup -filter * -searchbase \"ou=Microsoft Exchange Security Groups,DC=Contoso,DC=com\" -server contoso.com", "Name": "", @@ -5042,7 +5042,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "ExGroup", "PSCmdL": "get-adgroup -filter * -searchbase \"ou=Microsoft Exchange Security Groups,DC=Contoso,DC=com\" -server contoso.com", "Name": "", @@ -5056,7 +5056,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "ExGroup", "PSCmdL": "get-adgroup -filter * -searchbase \"ou=Microsoft Exchange Security Groups,DC=Contoso,DC=com\" -server contoso.com", "Name": "", @@ -5070,7 +5070,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "ExGroup", "PSCmdL": "get-adgroup -filter * -searchbase \"ou=Microsoft Exchange Security Groups,DC=Contoso,DC=com\" -server contoso.com", "Name": "", @@ -5084,7 +5084,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "ExGroup", "PSCmdL": "get-adgroup -filter * -searchbase \"ou=Microsoft Exchange Security Groups,DC=Contoso,DC=com\" -server contoso.com", "Name": "", @@ -5098,7 +5098,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "ExGroup", "PSCmdL": "get-adgroup -filter * -searchbase \"ou=Microsoft Exchange Security Groups,DC=Contoso,DC=com\" -server contoso.com", "Name": "", @@ -5112,7 +5112,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "ExGroup", "PSCmdL": "get-adgroup -filter * -searchbase \"ou=Microsoft Exchange Security Groups,DC=Contoso,DC=com\" -server contoso.com", "Name": "", @@ -5126,7 +5126,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "ExGroup", "PSCmdL": "get-adgroup -filter * -searchbase \"ou=Microsoft Exchange Security Groups,DC=Contoso,DC=com\" -server contoso.com", "Name": "", @@ -5140,7 +5140,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "ExGroup", "PSCmdL": "get-adgroup -filter * -searchbase \"ou=Microsoft Exchange Security Groups,DC=Contoso,DC=com\" -server contoso.com", "Name": "", @@ -5154,7 +5154,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "ExGroup", "PSCmdL": "get-adgroup -filter * -searchbase \"ou=Microsoft Exchange Security Groups,DC=Contoso,DC=com\" -server contoso.com", "Name": "", @@ -5168,7 +5168,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "ExGroup", "PSCmdL": "get-adgroup -filter * -searchbase \"ou=Microsoft Exchange Security Groups,DC=Contoso,DC=com\" -server contoso.com", "Name": "", @@ -5182,7 +5182,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "ExGroup", "PSCmdL": "get-adgroup -filter * -searchbase \"ou=Microsoft Exchange Security Groups,DC=Contoso,DC=com\" -server contoso.com", "Name": "", @@ -5196,7 +5196,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "ExGroup", "PSCmdL": "get-adgroup -filter * -searchbase \"ou=Microsoft Exchange Security Groups,DC=Contoso,DC=com\" -server contoso.com", "Name": "", @@ -5210,7 +5210,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "ExGroup", "PSCmdL": "get-adgroup -filter * -searchbase \"ou=Microsoft Exchange Security Groups,DC=Contoso,DC=com\" -server contoso.com", "Name": "", @@ -5224,7 +5224,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "ExGroup", "PSCmdL": "get-adgroup -filter * -searchbase \"ou=Microsoft Exchange Security Groups,DC=Contoso,DC=com\" -server contoso.com", "Name": "", @@ -5238,7 +5238,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "ExGroup", "PSCmdL": "get-adgroup -filter * -searchbase \"ou=Microsoft Exchange Security Groups,DC=Contoso,DC=com\" -server contoso.com", "Name": "", @@ -5252,7 +5252,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "ExGroup", "PSCmdL": "get-adgroup -filter * -searchbase \"ou=Microsoft Exchange Security Groups,DC=Contoso,DC=com\" -server contoso.com", "Name": "", @@ -5266,7 +5266,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "ExGroup", "PSCmdL": "get-adgroup -filter * -searchbase \"ou=Microsoft Exchange Security Groups,DC=Contoso,DC=com\" -server contoso.com", "Name": "", @@ -5280,7 +5280,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "ExGroup", "PSCmdL": "get-adgroup -filter * -searchbase \"ou=Microsoft Exchange Security Groups,DC=Contoso,DC=com\" -server contoso.com", "Name": "", @@ -5294,7 +5294,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "ADGroup", "PSCmdL": "@( \"S-1-5-32-544\", \"S-1-5-32-548\",\"S-1-5-21-955129242-3502184188-2641241535-512\",\"S-1-5-21-955129242-3502184188-2641241535-518\",\"S-1-5-21-955129242-3502184188-2641241535-519\") | %{ Get-ADgroup -identity $_ -server Contoso-DC-01.contoso.com }", "Name": "", @@ -5308,7 +5308,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "ADGroup", "PSCmdL": "@( \"S-1-5-32-544\", \"S-1-5-32-548\",\"S-1-5-21-955129242-3502184188-2641241535-512\",\"S-1-5-21-955129242-3502184188-2641241535-518\",\"S-1-5-21-955129242-3502184188-2641241535-519\") | %{ Get-ADgroup -identity $_ -server Contoso-DC-01.contoso.com }", "Name": "", @@ -5322,7 +5322,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "ADGroup", "PSCmdL": "@( \"S-1-5-32-544\", \"S-1-5-32-548\",\"S-1-5-21-955129242-3502184188-2641241535-512\",\"S-1-5-21-955129242-3502184188-2641241535-518\",\"S-1-5-21-955129242-3502184188-2641241535-519\") | %{ Get-ADgroup -identity $_ -server Contoso-DC-01.contoso.com }", "Name": "", @@ -5336,7 +5336,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "ADGroup", "PSCmdL": "@( \"S-1-5-32-544\", \"S-1-5-32-548\",\"S-1-5-21-955129242-3502184188-2641241535-512\",\"S-1-5-21-955129242-3502184188-2641241535-518\",\"S-1-5-21-955129242-3502184188-2641241535-519\") | %{ Get-ADgroup -identity $_ -server Contoso-DC-01.contoso.com }", "Name": "", @@ -5350,7 +5350,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "ADGroup", "PSCmdL": "@( \"S-1-5-32-544\", \"S-1-5-32-548\",\"S-1-5-21-955129242-3502184188-2641241535-512\",\"S-1-5-21-955129242-3502184188-2641241535-518\",\"S-1-5-21-955129242-3502184188-2641241535-519\") | %{ Get-ADgroup -identity $_ -server Contoso-DC-01.contoso.com }", "Name": "", @@ -5364,7 +5364,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "ADGroup", "PSCmdL": "@( \"S-1-5-32-544\", \"S-1-5-32-548\",\"S-1-5-21-955129242-3502184188-2641241535-512\",\"S-1-5-21-955129242-3502184188-2641241535-518\",\"S-1-5-21-955129242-3502184188-2641241535-519\") | %{ Get-ADgroup -identity $_ -server Contoso-DC-01.contoso.com }", "Name": "", @@ -5378,7 +5378,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "ADGroup", "PSCmdL": "@( \"S-1-5-32-544\", \"S-1-5-32-548\",\"S-1-5-21-955129242-3502184188-2641241535-512\",\"S-1-5-21-955129242-3502184188-2641241535-518\",\"S-1-5-21-955129242-3502184188-2641241535-519\") | %{ Get-ADgroup -identity $_ -server Contoso-DC-01.contoso.com }", "Name": "", @@ -5392,7 +5392,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "ADGroup", "PSCmdL": "@( \"S-1-5-32-544\", \"S-1-5-32-548\",\"S-1-5-21-955129242-3502184188-2641241535-512\",\"S-1-5-21-955129242-3502184188-2641241535-518\",\"S-1-5-21-955129242-3502184188-2641241535-519\") | %{ Get-ADgroup -identity $_ -server Contoso-DC-01.contoso.com }", "Name": "", @@ -5406,7 +5406,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "ADGroup", "PSCmdL": "@( \"S-1-5-32-544\", \"S-1-5-32-548\",\"S-1-5-21-955129242-3502184188-2641241535-512\",\"S-1-5-21-955129242-3502184188-2641241535-518\",\"S-1-5-21-955129242-3502184188-2641241535-519\") | %{ Get-ADgroup -identity $_ -server Contoso-DC-01.contoso.com }", "Name": "", @@ -5420,7 +5420,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "ADGroup", "PSCmdL": "@( \"S-1-5-32-544\", \"S-1-5-32-548\",\"S-1-5-21-955129242-3502184188-2641241535-512\",\"S-1-5-21-955129242-3502184188-2641241535-518\",\"S-1-5-21-955129242-3502184188-2641241535-519\") | %{ Get-ADgroup -identity $_ -server Contoso-DC-01.contoso.com }", "Name": "", @@ -5434,7 +5434,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "ADGroup", "PSCmdL": "@( \"S-1-5-32-544\", \"S-1-5-32-548\",\"S-1-5-21-955129242-3502184188-2641241535-512\",\"S-1-5-21-955129242-3502184188-2641241535-518\",\"S-1-5-21-955129242-3502184188-2641241535-519\") | %{ Get-ADgroup -identity $_ -server Contoso-DC-01.contoso.com }", "Name": "", @@ -5448,7 +5448,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "ADGroup", "PSCmdL": "@( \"S-1-5-32-544\", \"S-1-5-32-548\",\"S-1-5-21-955129242-3502184188-2641241535-512\",\"S-1-5-21-955129242-3502184188-2641241535-518\",\"S-1-5-21-955129242-3502184188-2641241535-519\") | %{ Get-ADgroup -identity $_ -server Contoso-DC-01.contoso.com }", "Name": "", @@ -5462,7 +5462,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "ADGroup", "PSCmdL": "@( \"S-1-5-32-544\", \"S-1-5-32-548\",\"S-1-5-21-955129242-3502184188-2641241535-512\",\"S-1-5-21-955129242-3502184188-2641241535-518\",\"S-1-5-21-955129242-3502184188-2641241535-519\") | %{ Get-ADgroup -identity $_ -server Contoso-DC-01.contoso.com }", "Name": "", @@ -5476,7 +5476,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "ADGroup", "PSCmdL": "@( \"S-1-5-32-544\", \"S-1-5-32-548\",\"S-1-5-21-955129242-3502184188-2641241535-512\",\"S-1-5-21-955129242-3502184188-2641241535-518\",\"S-1-5-21-955129242-3502184188-2641241535-519\") | %{ Get-ADgroup -identity $_ -server Contoso-DC-01.contoso.com }", "Name": "", @@ -5490,7 +5490,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "ADGroup", "PSCmdL": "@( \"S-1-5-32-544\", \"S-1-5-32-548\",\"S-1-5-21-955129242-3502184188-2641241535-512\",\"S-1-5-21-955129242-3502184188-2641241535-518\",\"S-1-5-21-955129242-3502184188-2641241535-519\") | %{ Get-ADgroup -identity $_ -server Contoso-DC-01.contoso.com }", "Name": "", @@ -5504,7 +5504,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "ADGroup", "PSCmdL": "@( \"S-1-5-32-544\", \"S-1-5-32-548\",\"S-1-5-21-955129242-3502184188-2641241535-512\",\"S-1-5-21-955129242-3502184188-2641241535-518\",\"S-1-5-21-955129242-3502184188-2641241535-519\") | %{ Get-ADgroup -identity $_ -server Contoso-DC-01.contoso.com }", "Name": "", @@ -5518,7 +5518,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "ADGroup", "PSCmdL": "@( \"S-1-5-32-544\", \"S-1-5-32-548\",\"S-1-5-21-955129242-3502184188-2641241535-512\",\"S-1-5-21-955129242-3502184188-2641241535-518\",\"S-1-5-21-955129242-3502184188-2641241535-519\") | %{ Get-ADgroup -identity $_ -server Contoso-DC-01.contoso.com }", "Name": "", @@ -5532,7 +5532,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "ADGroup", "PSCmdL": "@( \"S-1-5-32-544\", \"S-1-5-32-548\",\"S-1-5-21-955129242-3502184188-2641241535-512\",\"S-1-5-21-955129242-3502184188-2641241535-518\",\"S-1-5-21-955129242-3502184188-2641241535-519\") | %{ Get-ADgroup -identity $_ -server Contoso-DC-01.contoso.com }", "Name": "", @@ -5546,7 +5546,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "ADGroup", "PSCmdL": "@( \"S-1-5-32-544\", \"S-1-5-32-548\",\"S-1-5-21-955129242-3502184188-2641241535-512\",\"S-1-5-21-955129242-3502184188-2641241535-518\",\"S-1-5-21-955129242-3502184188-2641241535-519\") | %{ Get-ADgroup -identity $_ -server Contoso-DC-01.contoso.com }", "Name": "", @@ -5560,7 +5560,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "ADGroup", "PSCmdL": "@( \"S-1-5-32-544\", \"S-1-5-32-548\",\"S-1-5-21-955129242-3502184188-2641241535-512\",\"S-1-5-21-955129242-3502184188-2641241535-518\",\"S-1-5-21-955129242-3502184188-2641241535-519\") | %{ Get-ADgroup -identity $_ -server Contoso-DC-01.contoso.com }", "Name": "", @@ -5574,7 +5574,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "ADGroup", "PSCmdL": "@( \"S-1-5-32-544\", \"S-1-5-32-548\",\"S-1-5-21-955129242-3502184188-2641241535-512\",\"S-1-5-21-955129242-3502184188-2641241535-518\",\"S-1-5-21-955129242-3502184188-2641241535-519\") | %{ Get-ADgroup -identity $_ -server Contoso-DC-01.contoso.com }", "Name": "", @@ -5588,7 +5588,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "ADGroup", "PSCmdL": "@( \"S-1-5-32-544\", \"S-1-5-32-548\",\"S-1-5-21-955129242-3502184188-2641241535-512\",\"S-1-5-21-955129242-3502184188-2641241535-518\",\"S-1-5-21-955129242-3502184188-2641241535-519\") | %{ Get-ADgroup -identity $_ -server Contoso-DC-01.contoso.com }", "Name": "", @@ -5602,7 +5602,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "ADGroup", "PSCmdL": "@( \"S-1-5-32-544\", \"S-1-5-32-548\",\"S-1-5-21-955129242-3502184188-2641241535-512\",\"S-1-5-21-955129242-3502184188-2641241535-518\",\"S-1-5-21-955129242-3502184188-2641241535-519\") | %{ Get-ADgroup -identity $_ -server Contoso-DC-01.contoso.com }", "Name": "", @@ -5616,7 +5616,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "ADGroup", "PSCmdL": "@( \"S-1-5-32-544\", \"S-1-5-32-548\",\"S-1-5-21-955129242-3502184188-2641241535-512\",\"S-1-5-21-955129242-3502184188-2641241535-518\",\"S-1-5-21-955129242-3502184188-2641241535-519\") | %{ Get-ADgroup -identity $_ -server Contoso-DC-01.contoso.com }", "Name": "", @@ -5630,7 +5630,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "DirectRoleAssignments", "PSCmdL": "Get-ManagementRoleAssignment | where {$_.RoleAssigneeType -in (\"SecurityGroup\",\"User\")} | select *, @{Name=\"ObjectClass\";Expression={\"ManagementRoleAssignment\"}} -ExcludeProperty ObjectClass", "Name": "", @@ -5644,7 +5644,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "DirectRoleAssignments", "PSCmdL": "Get-ManagementRoleAssignment | where {$_.RoleAssigneeType -in (\"SecurityGroup\",\"User\")} | select *, @{Name=\"ObjectClass\";Expression={\"ManagementRoleAssignment\"}} -ExcludeProperty ObjectClass", "Name": "", @@ -5658,7 +5658,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "DirectRoleAssignments", "PSCmdL": "Get-ManagementRoleAssignment | where {$_.RoleAssigneeType -in (\"SecurityGroup\",\"User\")} | select *, @{Name=\"ObjectClass\";Expression={\"ManagementRoleAssignment\"}} -ExcludeProperty ObjectClass", "Name": "", @@ -5672,7 +5672,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "DirectRoleAssignments", "PSCmdL": "Get-ManagementRoleAssignment | where {$_.RoleAssigneeType -in (\"SecurityGroup\",\"User\")} | select *, @{Name=\"ObjectClass\";Expression={\"ManagementRoleAssignment\"}} -ExcludeProperty ObjectClass", "Name": "", @@ -5686,7 +5686,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "DirectRoleAssignments", "PSCmdL": "Get-ManagementRoleAssignment | where {$_.RoleAssigneeType -in (\"SecurityGroup\",\"User\")} | select *, @{Name=\"ObjectClass\";Expression={\"ManagementRoleAssignment\"}} -ExcludeProperty ObjectClass", "Name": "", @@ -5700,7 +5700,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "DirectRoleAssignments", "PSCmdL": "Get-ManagementRoleAssignment | where {$_.RoleAssigneeType -in (\"SecurityGroup\",\"User\")} | select *, @{Name=\"ObjectClass\";Expression={\"ManagementRoleAssignment\"}} -ExcludeProperty ObjectClass", "Name": "", @@ -5714,7 +5714,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "DirectRoleAssignments", "PSCmdL": "Get-ManagementRoleAssignment | where {$_.RoleAssigneeType -in (\"SecurityGroup\",\"User\")} | select *, @{Name=\"ObjectClass\";Expression={\"ManagementRoleAssignment\"}} -ExcludeProperty ObjectClass", "Name": "", @@ -5728,7 +5728,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "DirectRoleAssignments", "PSCmdL": "Get-ManagementRoleAssignment | where {$_.RoleAssigneeType -in (\"SecurityGroup\",\"User\")} | select *, @{Name=\"ObjectClass\";Expression={\"ManagementRoleAssignment\"}} -ExcludeProperty ObjectClass", "Name": "", @@ -5742,7 +5742,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "DirectRoleAssignments", "PSCmdL": "Get-ManagementRoleAssignment | where {$_.RoleAssigneeType -in (\"SecurityGroup\",\"User\")} | select *, @{Name=\"ObjectClass\";Expression={\"ManagementRoleAssignment\"}} -ExcludeProperty ObjectClass", "Name": "", @@ -5756,7 +5756,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "DirectRoleAssignments", "PSCmdL": "Get-ManagementRoleAssignment | where {$_.RoleAssigneeType -in (\"SecurityGroup\",\"User\")} | select *, @{Name=\"ObjectClass\";Expression={\"ManagementRoleAssignment\"}} -ExcludeProperty ObjectClass", "Name": "", @@ -5770,7 +5770,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "DirectRoleAssignments", "PSCmdL": "Get-ManagementRoleAssignment | where {$_.RoleAssigneeType -in (\"SecurityGroup\",\"User\")} | select *, @{Name=\"ObjectClass\";Expression={\"ManagementRoleAssignment\"}} -ExcludeProperty ObjectClass", "Name": "", @@ -5784,7 +5784,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "DirectRoleAssignments", "PSCmdL": "Get-ManagementRoleAssignment | where {$_.RoleAssigneeType -in (\"SecurityGroup\",\"User\")} | select *, @{Name=\"ObjectClass\";Expression={\"ManagementRoleAssignment\"}} -ExcludeProperty ObjectClass", "Name": "", @@ -5798,7 +5798,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "DirectRoleAssignments", "PSCmdL": "Get-ManagementRoleAssignment | where {$_.RoleAssigneeType -in (\"SecurityGroup\",\"User\")} | select *, @{Name=\"ObjectClass\";Expression={\"ManagementRoleAssignment\"}} -ExcludeProperty ObjectClass", "Name": "", @@ -5812,7 +5812,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "DirectRoleAssignments", "PSCmdL": "Get-ManagementRoleAssignment | where {$_.RoleAssigneeType -in (\"SecurityGroup\",\"User\")} | select *, @{Name=\"ObjectClass\";Expression={\"ManagementRoleAssignment\"}} -ExcludeProperty ObjectClass", "Name": "", @@ -5826,7 +5826,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "DirectRoleAssignments", "PSCmdL": "Get-ManagementRoleAssignment | where {$_.RoleAssigneeType -in (\"SecurityGroup\",\"User\")} | select *, @{Name=\"ObjectClass\";Expression={\"ManagementRoleAssignment\"}} -ExcludeProperty ObjectClass", "Name": "", @@ -5840,7 +5840,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "DirectRoleAssignments", "PSCmdL": "Get-ManagementRoleAssignment | where {$_.RoleAssigneeType -in (\"SecurityGroup\",\"User\")} | select *, @{Name=\"ObjectClass\";Expression={\"ManagementRoleAssignment\"}} -ExcludeProperty ObjectClass", "Name": "", @@ -5854,7 +5854,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "DirectRoleAssignments", "PSCmdL": "Get-ManagementRoleAssignment | where {$_.RoleAssigneeType -in (\"SecurityGroup\",\"User\")} | select *, @{Name=\"ObjectClass\";Expression={\"ManagementRoleAssignment\"}} -ExcludeProperty ObjectClass", "Name": "", @@ -5868,7 +5868,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "DirectRoleAssignments", "PSCmdL": "Get-ManagementRoleAssignment | where {$_.RoleAssigneeType -in (\"SecurityGroup\",\"User\")} | select *, @{Name=\"ObjectClass\";Expression={\"ManagementRoleAssignment\"}} -ExcludeProperty ObjectClass", "Name": "", @@ -5882,7 +5882,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "DirectRoleAssignments", "PSCmdL": "Get-ManagementRoleAssignment | where {$_.RoleAssigneeType -in (\"SecurityGroup\",\"User\")} | select *, @{Name=\"ObjectClass\";Expression={\"ManagementRoleAssignment\"}} -ExcludeProperty ObjectClass", "Name": "", @@ -5896,7 +5896,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "DirectRoleAssignments", "PSCmdL": "Get-ManagementRoleAssignment | where {$_.RoleAssigneeType -in (\"SecurityGroup\",\"User\")} | select *, @{Name=\"ObjectClass\";Expression={\"ManagementRoleAssignment\"}} -ExcludeProperty ObjectClass", "Name": "", @@ -5910,7 +5910,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "DirectRoleAssignments", "PSCmdL": "Get-ManagementRoleAssignment | where {$_.RoleAssigneeType -in (\"SecurityGroup\",\"User\")} | select *, @{Name=\"ObjectClass\";Expression={\"ManagementRoleAssignment\"}} -ExcludeProperty ObjectClass", "Name": "", @@ -5924,7 +5924,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "DirectRoleAssignments", "PSCmdL": "Get-ManagementRoleAssignment | where {$_.RoleAssigneeType -in (\"SecurityGroup\",\"User\")} | select *, @{Name=\"ObjectClass\";Expression={\"ManagementRoleAssignment\"}} -ExcludeProperty ObjectClass", "Name": "", @@ -5938,7 +5938,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "DirectRoleAssignments", "PSCmdL": "Get-ManagementRoleAssignment | where {$_.RoleAssigneeType -in (\"SecurityGroup\",\"User\")} | select *, @{Name=\"ObjectClass\";Expression={\"ManagementRoleAssignment\"}} -ExcludeProperty ObjectClass", "Name": "", @@ -5952,7 +5952,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "DirectRoleAssignments", "PSCmdL": "Get-ManagementRoleAssignment | where {$_.RoleAssigneeType -in (\"SecurityGroup\",\"User\")} | select *, @{Name=\"ObjectClass\";Expression={\"ManagementRoleAssignment\"}} -ExcludeProperty ObjectClass", "Name": "", @@ -5966,7 +5966,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "DirectRoleAssignments", "PSCmdL": "Get-ManagementRoleAssignment | where {$_.RoleAssigneeType -in (\"SecurityGroup\",\"User\")} | select *, @{Name=\"ObjectClass\";Expression={\"ManagementRoleAssignment\"}} -ExcludeProperty ObjectClass", "Name": "", @@ -5980,7 +5980,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "DirectRoleAssignments", "PSCmdL": "Get-ManagementRoleAssignment | where {$_.RoleAssigneeType -in (\"SecurityGroup\",\"User\")} | select *, @{Name=\"ObjectClass\";Expression={\"ManagementRoleAssignment\"}} -ExcludeProperty ObjectClass", "Name": "", @@ -5994,7 +5994,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "DirectRoleAssignments", "PSCmdL": "Get-ManagementRoleAssignment | where {$_.RoleAssigneeType -in (\"SecurityGroup\",\"User\")} | select *, @{Name=\"ObjectClass\";Expression={\"ManagementRoleAssignment\"}} -ExcludeProperty ObjectClass", "Name": "", @@ -6008,7 +6008,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "DirectRoleAssignments", "PSCmdL": "Get-ManagementRoleAssignment | where {$_.RoleAssigneeType -in (\"SecurityGroup\",\"User\")} | select *, @{Name=\"ObjectClass\";Expression={\"ManagementRoleAssignment\"}} -ExcludeProperty ObjectClass", "Name": "", @@ -6022,7 +6022,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "DirectRoleAssignments", "PSCmdL": "Get-ManagementRoleAssignment | where {$_.RoleAssigneeType -in (\"SecurityGroup\",\"User\")} | select *, @{Name=\"ObjectClass\";Expression={\"ManagementRoleAssignment\"}} -ExcludeProperty ObjectClass", "Name": "", @@ -6036,7 +6036,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "DirectRoleAssignments", "PSCmdL": "Get-ManagementRoleAssignment | where {$_.RoleAssigneeType -in (\"SecurityGroup\",\"User\")} | select *, @{Name=\"ObjectClass\";Expression={\"ManagementRoleAssignment\"}} -ExcludeProperty ObjectClass", "Name": "", @@ -6050,7 +6050,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "DirectRoleAssignments", "PSCmdL": "Get-ManagementRoleAssignment | where {$_.RoleAssigneeType -in (\"SecurityGroup\",\"User\")} | select *, @{Name=\"ObjectClass\";Expression={\"ManagementRoleAssignment\"}} -ExcludeProperty ObjectClass", "Name": "", @@ -6064,7 +6064,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "DirectRoleAssignments", "PSCmdL": "Get-ManagementRoleAssignment | where {$_.RoleAssigneeType -in (\"SecurityGroup\",\"User\")} | select *, @{Name=\"ObjectClass\";Expression={\"ManagementRoleAssignment\"}} -ExcludeProperty ObjectClass", "Name": "", @@ -6078,7 +6078,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "LocalAminGroup", "PSCmdL": "$res = Get-WmiObject -Class Win32_GroupUser -Filter \"GroupComponent=\"\"Win32_Group.Domain=\u0027AX-EX19-01\u0027,Name=\u0027Administrators\u0027\"\"\" -ComputerName AX-EX19-01 |% {if ($_.PartComponent -match \u0027cimv2:(.+).Domain=\"(.+)\",Name=\"(.+)\"\u0027){$members=@();$members+=$Matches[1]+\";\"+$Matches[2]+\"\\\"+$Matches[3];$members}};@{\"List\"=$res;\"srv\"=\"AX-EX19-01\"}", "Name": "", @@ -6092,7 +6092,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "LocalAminGroup", "PSCmdL": "$res = Get-WmiObject -Class Win32_GroupUser -Filter \"GroupComponent=\"\"Win32_Group.Domain=\u0027AX-EX19-01\u0027,Name=\u0027Administrators\u0027\"\"\" -ComputerName AX-EX19-01 |% {if ($_.PartComponent -match \u0027cimv2:(.+).Domain=\"(.+)\",Name=\"(.+)\"\u0027){$members=@();$members+=$Matches[1]+\";\"+$Matches[2]+\"\\\"+$Matches[3];$members}};@{\"List\"=$res;\"srv\"=\"AX-EX19-01\"}", "Name": "", @@ -6106,7 +6106,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "LocalAminGroup", "PSCmdL": "$res = Get-WmiObject -Class Win32_GroupUser -Filter \"GroupComponent=\"\"Win32_Group.Domain=\u0027AX-EX19-01\u0027,Name=\u0027Administrators\u0027\"\"\" -ComputerName AX-EX19-01 |% {if ($_.PartComponent -match \u0027cimv2:(.+).Domain=\"(.+)\",Name=\"(.+)\"\u0027){$members=@();$members+=$Matches[1]+\";\"+$Matches[2]+\"\\\"+$Matches[3];$members}};@{\"List\"=$res;\"srv\"=\"AX-EX19-01\"}", "Name": "", @@ -6120,7 +6120,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "LocalAminGroup", "PSCmdL": "$res = Get-WmiObject -Class Win32_GroupUser -Filter \"GroupComponent=\"\"Win32_Group.Domain=\u0027AX-EX19-01\u0027,Name=\u0027Administrators\u0027\"\"\" -ComputerName AX-EX19-01 |% {if ($_.PartComponent -match \u0027cimv2:(.+).Domain=\"(.+)\",Name=\"(.+)\"\u0027){$members=@();$members+=$Matches[1]+\";\"+$Matches[2]+\"\\\"+$Matches[3];$members}};@{\"List\"=$res;\"srv\"=\"AX-EX19-01\"}", "Name": "", @@ -6134,7 +6134,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "LocalAminGroup", "PSCmdL": "$res = Get-WmiObject -Class Win32_GroupUser -Filter \"GroupComponent=\"\"Win32_Group.Domain=\u0027AX-EX19-01\u0027,Name=\u0027Administrators\u0027\"\"\" -ComputerName AX-EX19-01 |% {if ($_.PartComponent -match \u0027cimv2:(.+).Domain=\"(.+)\",Name=\"(.+)\"\u0027){$members=@();$members+=$Matches[1]+\";\"+$Matches[2]+\"\\\"+$Matches[3];$members}};@{\"List\"=$res;\"srv\"=\"AX-EX19-01\"}", "Name": "", @@ -6148,7 +6148,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "LocalAminGroup", "PSCmdL": "$res = Get-WmiObject -Class Win32_GroupUser -Filter \"GroupComponent=\"\"Win32_Group.Domain=\u0027AX-EX19-01\u0027,Name=\u0027Administrators\u0027\"\"\" -ComputerName AX-EX19-01 |% {if ($_.PartComponent -match \u0027cimv2:(.+).Domain=\"(.+)\",Name=\"(.+)\"\u0027){$members=@();$members+=$Matches[1]+\";\"+$Matches[2]+\"\\\"+$Matches[3];$members}};@{\"List\"=$res;\"srv\"=\"AX-EX19-01\"}", "Name": "", @@ -6162,7 +6162,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "LocalAminGroup", "PSCmdL": "$res = Get-WmiObject -Class Win32_GroupUser -Filter \"GroupComponent=\"\"Win32_Group.Domain=\u0027AX-EX19-01\u0027,Name=\u0027Administrators\u0027\"\"\" -ComputerName AX-EX19-01 |% {if ($_.PartComponent -match \u0027cimv2:(.+).Domain=\"(.+)\",Name=\"(.+)\"\u0027){$members=@();$members+=$Matches[1]+\";\"+$Matches[2]+\"\\\"+$Matches[3];$members}};@{\"List\"=$res;\"srv\"=\"AX-EX19-01\"}", "Name": "", @@ -6176,7 +6176,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "LocalAminGroup", "PSCmdL": "$res = Get-WmiObject -Class Win32_GroupUser -Filter \"GroupComponent=\"\"Win32_Group.Domain=\u0027AX-EX19-01\u0027,Name=\u0027Administrators\u0027\"\"\" -ComputerName AX-EX19-01 |% {if ($_.PartComponent -match \u0027cimv2:(.+).Domain=\"(.+)\",Name=\"(.+)\"\u0027){$members=@();$members+=$Matches[1]+\";\"+$Matches[2]+\"\\\"+$Matches[3];$members}};@{\"List\"=$res;\"srv\"=\"AX-EX19-01\"}", "Name": "", @@ -6190,7 +6190,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "LocalAminGroup", "PSCmdL": "$res = Get-WmiObject -Class Win32_GroupUser -Filter \"GroupComponent=\"\"Win32_Group.Domain=\u0027AX-EX19-01\u0027,Name=\u0027Administrators\u0027\"\"\" -ComputerName AX-EX19-01 |% {if ($_.PartComponent -match \u0027cimv2:(.+).Domain=\"(.+)\",Name=\"(.+)\"\u0027){$members=@();$members+=$Matches[1]+\";\"+$Matches[2]+\"\\\"+$Matches[3];$members}};@{\"List\"=$res;\"srv\"=\"AX-EX19-01\"}", "Name": "", @@ -6204,7 +6204,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "LocalAminGroup", "PSCmdL": "$res = Get-WmiObject -Class Win32_GroupUser -Filter \"GroupComponent=\"\"Win32_Group.Domain=\u0027AX-EX19-01\u0027,Name=\u0027Administrators\u0027\"\"\" -ComputerName AX-EX19-01 |% {if ($_.PartComponent -match \u0027cimv2:(.+).Domain=\"(.+)\",Name=\"(.+)\"\u0027){$members=@();$members+=$Matches[1]+\";\"+$Matches[2]+\"\\\"+$Matches[3];$members}};@{\"List\"=$res;\"srv\"=\"AX-EX19-01\"}", "Name": "", @@ -6218,7 +6218,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "LocalAminGroup", "PSCmdL": "$res = Get-WmiObject -Class Win32_GroupUser -Filter \"GroupComponent=\"\"Win32_Group.Domain=\u0027AX-EX19-01\u0027,Name=\u0027Administrators\u0027\"\"\" -ComputerName AX-EX19-01 |% {if ($_.PartComponent -match \u0027cimv2:(.+).Domain=\"(.+)\",Name=\"(.+)\"\u0027){$members=@();$members+=$Matches[1]+\";\"+$Matches[2]+\"\\\"+$Matches[3];$members}};@{\"List\"=$res;\"srv\"=\"AX-EX19-01\"}", "Name": "", @@ -6232,7 +6232,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "LocalAminGroup", "PSCmdL": "$res = Get-WmiObject -Class Win32_GroupUser -Filter \"GroupComponent=\"\"Win32_Group.Domain=\u0027AX-EX19-01\u0027,Name=\u0027Administrators\u0027\"\"\" -ComputerName AX-EX19-01 |% {if ($_.PartComponent -match \u0027cimv2:(.+).Domain=\"(.+)\",Name=\"(.+)\"\u0027){$members=@();$members+=$Matches[1]+\";\"+$Matches[2]+\"\\\"+$Matches[3];$members}};@{\"List\"=$res;\"srv\"=\"AX-EX19-01\"}", "Name": "", @@ -6246,7 +6246,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "LocalAminGroup", "PSCmdL": "$res = Get-WmiObject -Class Win32_GroupUser -Filter \"GroupComponent=\"\"Win32_Group.Domain=\u0027AX-EX19-01\u0027,Name=\u0027Administrators\u0027\"\"\" -ComputerName AX-EX19-01 |% {if ($_.PartComponent -match \u0027cimv2:(.+).Domain=\"(.+)\",Name=\"(.+)\"\u0027){$members=@();$members+=$Matches[1]+\";\"+$Matches[2]+\"\\\"+$Matches[3];$members}};@{\"List\"=$res;\"srv\"=\"AX-EX19-01\"}", "Name": "", @@ -6260,7 +6260,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "LocalAminGroup", "PSCmdL": "$res = Get-WmiObject -Class Win32_GroupUser -Filter \"GroupComponent=\"\"Win32_Group.Domain=\u0027AX-EX19-01\u0027,Name=\u0027Administrators\u0027\"\"\" -ComputerName AX-EX19-01 |% {if ($_.PartComponent -match \u0027cimv2:(.+).Domain=\"(.+)\",Name=\"(.+)\"\u0027){$members=@();$members+=$Matches[1]+\";\"+$Matches[2]+\"\\\"+$Matches[3];$members}};@{\"List\"=$res;\"srv\"=\"AX-EX19-01\"}", "Name": "", @@ -6274,7 +6274,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "LocalAminGroup", "PSCmdL": "$res = Get-WmiObject -Class Win32_GroupUser -Filter \"GroupComponent=\"\"Win32_Group.Domain=\u0027AX-EX19-01\u0027,Name=\u0027Administrators\u0027\"\"\" -ComputerName AX-EX19-01 |% {if ($_.PartComponent -match \u0027cimv2:(.+).Domain=\"(.+)\",Name=\"(.+)\"\u0027){$members=@();$members+=$Matches[1]+\";\"+$Matches[2]+\"\\\"+$Matches[3];$members}};@{\"List\"=$res;\"srv\"=\"AX-EX19-01\"}", "Name": "", @@ -6288,7 +6288,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "LocalAminGroup", "PSCmdL": "$res = Get-WmiObject -Class Win32_GroupUser -Filter \"GroupComponent=\"\"Win32_Group.Domain=\u0027AX-EX19-01\u0027,Name=\u0027Administrators\u0027\"\"\" -ComputerName AX-EX19-01 |% {if ($_.PartComponent -match \u0027cimv2:(.+).Domain=\"(.+)\",Name=\"(.+)\"\u0027){$members=@();$members+=$Matches[1]+\";\"+$Matches[2]+\"\\\"+$Matches[3];$members}};@{\"List\"=$res;\"srv\"=\"AX-EX19-01\"}", "Name": "", @@ -6302,7 +6302,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "LocalAminGroup", "PSCmdL": "$res = Get-WmiObject -Class Win32_GroupUser -Filter \"GroupComponent=\"\"Win32_Group.Domain=\u0027AX-EX19-01\u0027,Name=\u0027Administrators\u0027\"\"\" -ComputerName AX-EX19-01 |% {if ($_.PartComponent -match \u0027cimv2:(.+).Domain=\"(.+)\",Name=\"(.+)\"\u0027){$members=@();$members+=$Matches[1]+\";\"+$Matches[2]+\"\\\"+$Matches[3];$members}};@{\"List\"=$res;\"srv\"=\"AX-EX19-01\"}", "Name": "", @@ -6316,7 +6316,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "LocalAminGroup", "PSCmdL": "$res = Get-WmiObject -Class Win32_GroupUser -Filter \"GroupComponent=\"\"Win32_Group.Domain=\u0027AX-EX19-01\u0027,Name=\u0027Administrators\u0027\"\"\" -ComputerName AX-EX19-01 |% {if ($_.PartComponent -match \u0027cimv2:(.+).Domain=\"(.+)\",Name=\"(.+)\"\u0027){$members=@();$members+=$Matches[1]+\";\"+$Matches[2]+\"\\\"+$Matches[3];$members}};@{\"List\"=$res;\"srv\"=\"AX-EX19-01\"}", "Name": "", @@ -6330,7 +6330,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "LocalAminGroup", "PSCmdL": "$res = Get-WmiObject -Class Win32_GroupUser -Filter \"GroupComponent=\"\"Win32_Group.Domain=\u0027AX-EX19-01\u0027,Name=\u0027Administrators\u0027\"\"\" -ComputerName AX-EX19-01 |% {if ($_.PartComponent -match \u0027cimv2:(.+).Domain=\"(.+)\",Name=\"(.+)\"\u0027){$members=@();$members+=$Matches[1]+\";\"+$Matches[2]+\"\\\"+$Matches[3];$members}};@{\"List\"=$res;\"srv\"=\"AX-EX19-01\"}", "Name": "", @@ -6344,7 +6344,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "LocalAminGroup", "PSCmdL": "$res = Get-WmiObject -Class Win32_GroupUser -Filter \"GroupComponent=\"\"Win32_Group.Domain=\u0027AX-EX19-01\u0027,Name=\u0027Administrators\u0027\"\"\" -ComputerName AX-EX19-01 |% {if ($_.PartComponent -match \u0027cimv2:(.+).Domain=\"(.+)\",Name=\"(.+)\"\u0027){$members=@();$members+=$Matches[1]+\";\"+$Matches[2]+\"\\\"+$Matches[3];$members}};@{\"List\"=$res;\"srv\"=\"AX-EX19-01\"}", "Name": "", @@ -6358,7 +6358,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "LocalAminGroup", "PSCmdL": "$res = Get-WmiObject -Class Win32_GroupUser -Filter \"GroupComponent=\"\"Win32_Group.Domain=\u0027AX-EX19-01\u0027,Name=\u0027Administrators\u0027\"\"\" -ComputerName AX-EX19-01 |% {if ($_.PartComponent -match \u0027cimv2:(.+).Domain=\"(.+)\",Name=\"(.+)\"\u0027){$members=@();$members+=$Matches[1]+\";\"+$Matches[2]+\"\\\"+$Matches[3];$members}};@{\"List\"=$res;\"srv\"=\"AX-EX19-01\"}", "Name": "", @@ -6372,7 +6372,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "LocalAminGroup", "PSCmdL": "$res = Get-WmiObject -Class Win32_GroupUser -Filter \"GroupComponent=\"\"Win32_Group.Domain=\u0027AX-EX19-01\u0027,Name=\u0027Administrators\u0027\"\"\" -ComputerName AX-EX19-01 |% {if ($_.PartComponent -match \u0027cimv2:(.+).Domain=\"(.+)\",Name=\"(.+)\"\u0027){$members=@();$members+=$Matches[1]+\";\"+$Matches[2]+\"\\\"+$Matches[3];$members}};@{\"List\"=$res;\"srv\"=\"AX-EX19-01\"}", "Name": "", @@ -6386,7 +6386,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "LocalAminGroup", "PSCmdL": "$res = Get-WmiObject -Class Win32_GroupUser -Filter \"GroupComponent=\"\"Win32_Group.Domain=\u0027AX-EX19-01\u0027,Name=\u0027Administrators\u0027\"\"\" -ComputerName AX-EX19-01 |% {if ($_.PartComponent -match \u0027cimv2:(.+).Domain=\"(.+)\",Name=\"(.+)\"\u0027){$members=@();$members+=$Matches[1]+\";\"+$Matches[2]+\"\\\"+$Matches[3];$members}};@{\"List\"=$res;\"srv\"=\"AX-EX19-01\"}", "Name": "", @@ -6400,7 +6400,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "LocalAminGroup", "PSCmdL": "$res = Get-WmiObject -Class Win32_GroupUser -Filter \"GroupComponent=\"\"Win32_Group.Domain=\u0027AX-EX19-01\u0027,Name=\u0027Administrators\u0027\"\"\" -ComputerName AX-EX19-01 |% {if ($_.PartComponent -match \u0027cimv2:(.+).Domain=\"(.+)\",Name=\"(.+)\"\u0027){$members=@();$members+=$Matches[1]+\";\"+$Matches[2]+\"\\\"+$Matches[3];$members}};@{\"List\"=$res;\"srv\"=\"AX-EX19-01\"}", "Name": "", @@ -6414,7 +6414,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "LocalAminGroup", "PSCmdL": "$res = Get-WmiObject -Class Win32_GroupUser -Filter \"GroupComponent=\"\"Win32_Group.Domain=\u0027AX-EX19-01\u0027,Name=\u0027Administrators\u0027\"\"\" -ComputerName AX-EX19-01 |% {if ($_.PartComponent -match \u0027cimv2:(.+).Domain=\"(.+)\",Name=\"(.+)\"\u0027){$members=@();$members+=$Matches[1]+\";\"+$Matches[2]+\"\\\"+$Matches[3];$members}};@{\"List\"=$res;\"srv\"=\"AX-EX19-01\"}", "Name": "", @@ -6428,7 +6428,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "LocalAminGroup", "PSCmdL": "$res = Get-WmiObject -Class Win32_GroupUser -Filter \"GroupComponent=\"\"Win32_Group.Domain=\u0027AX-EX19-01\u0027,Name=\u0027Administrators\u0027\"\"\" -ComputerName AX-EX19-01 |% {if ($_.PartComponent -match \u0027cimv2:(.+).Domain=\"(.+)\",Name=\"(.+)\"\u0027){$members=@();$members+=$Matches[1]+\";\"+$Matches[2]+\"\\\"+$Matches[3];$members}};@{\"List\"=$res;\"srv\"=\"AX-EX19-01\"}", "Name": "", @@ -6442,7 +6442,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "LocalAminGroup", "PSCmdL": "$res = Get-WmiObject -Class Win32_GroupUser -Filter \"GroupComponent=\"\"Win32_Group.Domain=\u0027AX-EX19-01\u0027,Name=\u0027Administrators\u0027\"\"\" -ComputerName AX-EX19-01 |% {if ($_.PartComponent -match \u0027cimv2:(.+).Domain=\"(.+)\",Name=\"(.+)\"\u0027){$members=@();$members+=$Matches[1]+\";\"+$Matches[2]+\"\\\"+$Matches[3];$members}};@{\"List\"=$res;\"srv\"=\"AX-EX19-01\"}", "Name": "", @@ -6456,7 +6456,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "LocalAminGroup", "PSCmdL": "$res = Get-WmiObject -Class Win32_GroupUser -Filter \"GroupComponent=\"\"Win32_Group.Domain=\u0027AX-EX19-01\u0027,Name=\u0027Administrators\u0027\"\"\" -ComputerName AX-EX19-01 |% {if ($_.PartComponent -match \u0027cimv2:(.+).Domain=\"(.+)\",Name=\"(.+)\"\u0027){$members=@();$members+=$Matches[1]+\";\"+$Matches[2]+\"\\\"+$Matches[3];$members}};@{\"List\"=$res;\"srv\"=\"AX-EX19-01\"}", "Name": "", @@ -6470,7 +6470,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "LocalAminGroup", "PSCmdL": "$res = Get-WmiObject -Class Win32_GroupUser -Filter \"GroupComponent=\"\"Win32_Group.Domain=\u0027AX-EX19-01\u0027,Name=\u0027Administrators\u0027\"\"\" -ComputerName AX-EX19-01 |% {if ($_.PartComponent -match \u0027cimv2:(.+).Domain=\"(.+)\",Name=\"(.+)\"\u0027){$members=@();$members+=$Matches[1]+\";\"+$Matches[2]+\"\\\"+$Matches[3];$members}};@{\"List\"=$res;\"srv\"=\"AX-EX19-01\"}", "Name": "", @@ -6484,7 +6484,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "LocalAminGroup", "PSCmdL": "$res = Get-WmiObject -Class Win32_GroupUser -Filter \"GroupComponent=\"\"Win32_Group.Domain=\u0027AX-EX19-01\u0027,Name=\u0027Administrators\u0027\"\"\" -ComputerName AX-EX19-01 |% {if ($_.PartComponent -match \u0027cimv2:(.+).Domain=\"(.+)\",Name=\"(.+)\"\u0027){$members=@();$members+=$Matches[1]+\";\"+$Matches[2]+\"\\\"+$Matches[3];$members}};@{\"List\"=$res;\"srv\"=\"AX-EX19-01\"}", "Name": "", @@ -6498,7 +6498,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "LocalAminGroup", "PSCmdL": "$res = Get-WmiObject -Class Win32_GroupUser -Filter \"GroupComponent=\"\"Win32_Group.Domain=\u0027AX-EX19-01\u0027,Name=\u0027Administrators\u0027\"\"\" -ComputerName AX-EX19-01 |% {if ($_.PartComponent -match \u0027cimv2:(.+).Domain=\"(.+)\",Name=\"(.+)\"\u0027){$members=@();$members+=$Matches[1]+\";\"+$Matches[2]+\"\\\"+$Matches[3];$members}};@{\"List\"=$res;\"srv\"=\"AX-EX19-01\"}", "Name": "", @@ -6512,7 +6512,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "LocalAminGroup", "PSCmdL": "$res = Get-WmiObject -Class Win32_GroupUser -Filter \"GroupComponent=\"\"Win32_Group.Domain=\u0027AX-EX19-01\u0027,Name=\u0027Administrators\u0027\"\"\" -ComputerName AX-EX19-01 |% {if ($_.PartComponent -match \u0027cimv2:(.+).Domain=\"(.+)\",Name=\"(.+)\"\u0027){$members=@();$members+=$Matches[1]+\";\"+$Matches[2]+\"\\\"+$Matches[3];$members}};@{\"List\"=$res;\"srv\"=\"AX-EX19-01\"}", "Name": "", @@ -6526,7 +6526,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "LocalAminGroup", "PSCmdL": "$res = Get-WmiObject -Class Win32_GroupUser -Filter \"GroupComponent=\"\"Win32_Group.Domain=\u0027AX-EX19-01\u0027,Name=\u0027Administrators\u0027\"\"\" -ComputerName AX-EX19-01 |% {if ($_.PartComponent -match \u0027cimv2:(.+).Domain=\"(.+)\",Name=\"(.+)\"\u0027){$members=@();$members+=$Matches[1]+\";\"+$Matches[2]+\"\\\"+$Matches[3];$members}};@{\"List\"=$res;\"srv\"=\"AX-EX19-01\"}", "Name": "", @@ -6540,7 +6540,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "LocalAminGroup", "PSCmdL": "$res = Get-WmiObject -Class Win32_GroupUser -Filter \"GroupComponent=\"\"Win32_Group.Domain=\u0027AX-EX19-01\u0027,Name=\u0027Administrators\u0027\"\"\" -ComputerName AX-EX19-01 |% {if ($_.PartComponent -match \u0027cimv2:(.+).Domain=\"(.+)\",Name=\"(.+)\"\u0027){$members=@();$members+=$Matches[1]+\";\"+$Matches[2]+\"\\\"+$Matches[3];$members}};@{\"List\"=$res;\"srv\"=\"AX-EX19-01\"}", "Name": "", @@ -6554,7 +6554,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "LocalAminGroup", "PSCmdL": "$res = Get-WmiObject -Class Win32_GroupUser -Filter \"GroupComponent=\"\"Win32_Group.Domain=\u0027AX-EX19-01\u0027,Name=\u0027Administrators\u0027\"\"\" -ComputerName AX-EX19-01 |% {if ($_.PartComponent -match \u0027cimv2:(.+).Domain=\"(.+)\",Name=\"(.+)\"\u0027){$members=@();$members+=$Matches[1]+\";\"+$Matches[2]+\"\\\"+$Matches[3];$members}};@{\"List\"=$res;\"srv\"=\"AX-EX19-01\"}", "Name": "", @@ -6568,7 +6568,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "LocalAminGroup", "PSCmdL": "$res = Get-WmiObject -Class Win32_GroupUser -Filter \"GroupComponent=\"\"Win32_Group.Domain=\u0027AX-EX19-01\u0027,Name=\u0027Administrators\u0027\"\"\" -ComputerName AX-EX19-01 |% {if ($_.PartComponent -match \u0027cimv2:(.+).Domain=\"(.+)\",Name=\"(.+)\"\u0027){$members=@();$members+=$Matches[1]+\";\"+$Matches[2]+\"\\\"+$Matches[3];$members}};@{\"List\"=$res;\"srv\"=\"AX-EX19-01\"}", "Name": "", @@ -6582,7 +6582,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "LocalAminGroup", "PSCmdL": "$res = Get-WmiObject -Class Win32_GroupUser -Filter \"GroupComponent=\"\"Win32_Group.Domain=\u0027AX-EX19-01\u0027,Name=\u0027Administrators\u0027\"\"\" -ComputerName AX-EX19-01 |% {if ($_.PartComponent -match \u0027cimv2:(.+).Domain=\"(.+)\",Name=\"(.+)\"\u0027){$members=@();$members+=$Matches[1]+\";\"+$Matches[2]+\"\\\"+$Matches[3];$members}};@{\"List\"=$res;\"srv\"=\"AX-EX19-01\"}", "Name": "", @@ -6596,7 +6596,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "LocalAminGroup", "PSCmdL": "$res = Get-WmiObject -Class Win32_GroupUser -Filter \"GroupComponent=\"\"Win32_Group.Domain=\u0027AX-EX19-01\u0027,Name=\u0027Administrators\u0027\"\"\" -ComputerName AX-EX19-01 |% {if ($_.PartComponent -match \u0027cimv2:(.+).Domain=\"(.+)\",Name=\"(.+)\"\u0027){$members=@();$members+=$Matches[1]+\";\"+$Matches[2]+\"\\\"+$Matches[3];$members}};@{\"List\"=$res;\"srv\"=\"AX-EX19-01\"}", "Name": "", @@ -6610,7 +6610,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "LocalAminGroup", "PSCmdL": "$res = Get-WmiObject -Class Win32_GroupUser -Filter \"GroupComponent=\"\"Win32_Group.Domain=\u0027AX-EX19-01\u0027,Name=\u0027Administrators\u0027\"\"\" -ComputerName AX-EX19-01 |% {if ($_.PartComponent -match \u0027cimv2:(.+).Domain=\"(.+)\",Name=\"(.+)\"\u0027){$members=@();$members+=$Matches[1]+\";\"+$Matches[2]+\"\\\"+$Matches[3];$members}};@{\"List\"=$res;\"srv\"=\"AX-EX19-01\"}", "Name": "", @@ -6624,7 +6624,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -6638,7 +6638,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -6652,7 +6652,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -6666,7 +6666,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -6680,7 +6680,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -6694,7 +6694,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -6708,7 +6708,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -6722,7 +6722,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -6736,7 +6736,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -6750,7 +6750,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -6764,7 +6764,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -6778,7 +6778,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -6792,7 +6792,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -6806,7 +6806,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -6820,7 +6820,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -6834,7 +6834,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -6848,7 +6848,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -6862,7 +6862,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -6876,7 +6876,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -6890,7 +6890,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -6904,7 +6904,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -6918,7 +6918,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -6932,7 +6932,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -6946,7 +6946,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -6960,7 +6960,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -6974,7 +6974,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -6988,7 +6988,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -7002,7 +7002,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -7016,7 +7016,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -7030,7 +7030,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -7044,7 +7044,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -7058,7 +7058,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -7072,7 +7072,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -7086,7 +7086,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -7100,7 +7100,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -7114,7 +7114,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -7128,7 +7128,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -7142,7 +7142,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -7156,7 +7156,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -7170,7 +7170,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -7184,7 +7184,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -7198,7 +7198,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -7212,7 +7212,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -7226,7 +7226,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -7240,7 +7240,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -7254,7 +7254,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -7268,7 +7268,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -7282,7 +7282,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -7296,7 +7296,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -7310,7 +7310,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -7324,7 +7324,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -7338,7 +7338,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -7352,7 +7352,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -7366,7 +7366,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -7380,7 +7380,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -7394,7 +7394,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -7408,7 +7408,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -7422,7 +7422,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -7436,7 +7436,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -7450,7 +7450,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -7464,7 +7464,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -7478,7 +7478,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -7492,7 +7492,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -7506,7 +7506,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -7520,7 +7520,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -7534,7 +7534,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -7548,7 +7548,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -7562,7 +7562,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -7576,7 +7576,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -7590,7 +7590,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -7604,7 +7604,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -7618,7 +7618,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -7632,7 +7632,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -7646,7 +7646,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -7660,7 +7660,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -7674,7 +7674,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -7688,7 +7688,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -7702,7 +7702,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -7716,7 +7716,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -7730,7 +7730,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -7744,7 +7744,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -7758,7 +7758,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -7772,7 +7772,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -7786,7 +7786,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -7800,7 +7800,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -7814,7 +7814,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -7828,7 +7828,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -7842,7 +7842,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -7856,7 +7856,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -7870,7 +7870,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -7884,7 +7884,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -7898,7 +7898,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -7912,7 +7912,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -7926,7 +7926,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -7940,7 +7940,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -7954,7 +7954,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -7968,7 +7968,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -7982,7 +7982,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -7996,7 +7996,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -8010,7 +8010,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -8024,7 +8024,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -8038,7 +8038,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -8052,7 +8052,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -8066,7 +8066,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -8080,7 +8080,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -8094,7 +8094,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -8108,7 +8108,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -8122,7 +8122,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -8136,7 +8136,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -8150,7 +8150,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -8164,7 +8164,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -8178,7 +8178,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -8192,7 +8192,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -8206,7 +8206,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -8220,7 +8220,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -8234,7 +8234,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -8248,7 +8248,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -8262,7 +8262,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -8276,7 +8276,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -8290,7 +8290,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -8304,7 +8304,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -8318,7 +8318,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -8332,7 +8332,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -8346,7 +8346,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -8360,7 +8360,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -8374,7 +8374,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -8388,7 +8388,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -8402,7 +8402,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -8416,7 +8416,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -8430,7 +8430,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -8444,7 +8444,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -8458,7 +8458,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -8472,7 +8472,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -8486,7 +8486,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -8500,7 +8500,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -8514,7 +8514,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -8528,7 +8528,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -8542,7 +8542,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -8556,7 +8556,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -8570,7 +8570,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -8584,7 +8584,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -8598,7 +8598,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -8612,7 +8612,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -8626,7 +8626,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -8640,7 +8640,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -8654,7 +8654,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -8668,7 +8668,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -8682,7 +8682,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -8696,7 +8696,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -8710,7 +8710,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -8724,7 +8724,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -8738,7 +8738,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -8752,7 +8752,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -8766,7 +8766,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -8780,7 +8780,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -8794,7 +8794,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -8808,7 +8808,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -8822,7 +8822,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -8836,7 +8836,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -8850,7 +8850,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -8864,7 +8864,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -8878,7 +8878,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -8892,7 +8892,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -8906,7 +8906,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -8920,7 +8920,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -8934,7 +8934,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -8948,7 +8948,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -8962,7 +8962,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -8976,7 +8976,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -8990,7 +8990,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -9004,7 +9004,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -9018,7 +9018,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -9032,7 +9032,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -9046,7 +9046,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -9060,7 +9060,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -9074,7 +9074,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -9088,7 +9088,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -9102,7 +9102,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -9116,7 +9116,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -9130,7 +9130,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -9144,7 +9144,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -9158,7 +9158,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -9172,7 +9172,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -9186,7 +9186,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -9200,7 +9200,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -9214,7 +9214,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -9228,7 +9228,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -9242,7 +9242,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -9256,7 +9256,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -9270,7 +9270,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -9284,7 +9284,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -9298,7 +9298,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -9312,7 +9312,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -9326,7 +9326,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -9340,7 +9340,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -9354,7 +9354,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -9368,7 +9368,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -9382,7 +9382,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -9396,7 +9396,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -9410,7 +9410,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -9424,7 +9424,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -9438,7 +9438,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -9452,7 +9452,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -9466,7 +9466,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -9480,7 +9480,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -9494,7 +9494,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -9508,7 +9508,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -9522,7 +9522,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -9536,7 +9536,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -9550,7 +9550,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -9564,7 +9564,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -9578,7 +9578,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -9592,7 +9592,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -9606,7 +9606,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -9620,7 +9620,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -9634,7 +9634,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -9648,7 +9648,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -9662,7 +9662,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -9676,7 +9676,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -9690,7 +9690,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -9704,7 +9704,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -9718,7 +9718,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -9732,7 +9732,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -9746,7 +9746,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -9760,7 +9760,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -9774,7 +9774,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -9788,7 +9788,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -9802,7 +9802,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -9816,7 +9816,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -9830,7 +9830,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -9844,7 +9844,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -9858,7 +9858,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -9872,7 +9872,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -9886,7 +9886,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -9900,7 +9900,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -9914,7 +9914,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -9928,7 +9928,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -9942,7 +9942,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -9956,7 +9956,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -9970,7 +9970,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -9984,7 +9984,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -9998,7 +9998,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -10012,7 +10012,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -10026,7 +10026,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -10040,7 +10040,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -10054,7 +10054,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -10068,7 +10068,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -10082,7 +10082,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -10096,7 +10096,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -10110,7 +10110,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -10124,7 +10124,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -10138,7 +10138,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -10152,7 +10152,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -10166,7 +10166,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -10180,7 +10180,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -10194,7 +10194,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -10208,7 +10208,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -10222,7 +10222,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -10236,7 +10236,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -10250,7 +10250,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -10264,7 +10264,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -10278,7 +10278,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -10292,7 +10292,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -10306,7 +10306,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -10320,7 +10320,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -10334,7 +10334,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -10348,7 +10348,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -10362,7 +10362,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -10376,7 +10376,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -10390,7 +10390,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -10404,7 +10404,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -10418,7 +10418,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -10432,7 +10432,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -10446,7 +10446,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -10460,7 +10460,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -10474,7 +10474,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -10488,7 +10488,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -10502,7 +10502,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -10516,7 +10516,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -10530,7 +10530,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -10544,7 +10544,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -10558,7 +10558,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -10572,7 +10572,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -10586,7 +10586,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -10600,7 +10600,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -10614,7 +10614,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -10628,7 +10628,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -10642,7 +10642,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -10656,7 +10656,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -10670,7 +10670,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -10684,7 +10684,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -10698,7 +10698,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -10712,7 +10712,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -10726,7 +10726,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -10740,7 +10740,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -10754,7 +10754,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -10768,7 +10768,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -10782,7 +10782,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -10796,7 +10796,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -10810,7 +10810,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -10824,7 +10824,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -10838,7 +10838,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -10852,7 +10852,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -10866,7 +10866,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -10880,7 +10880,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -10894,7 +10894,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -10908,7 +10908,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -10922,7 +10922,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -10936,7 +10936,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -10950,7 +10950,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -10964,7 +10964,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -10978,7 +10978,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -10992,7 +10992,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -11006,7 +11006,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -11020,7 +11020,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -11034,7 +11034,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -11048,7 +11048,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -11062,7 +11062,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -11076,7 +11076,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -11090,7 +11090,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -11104,7 +11104,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -11118,7 +11118,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -11132,7 +11132,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -11146,7 +11146,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -11160,7 +11160,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -11174,7 +11174,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -11188,7 +11188,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -11202,7 +11202,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -11216,7 +11216,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -11230,7 +11230,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -11244,7 +11244,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -11258,7 +11258,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -11272,7 +11272,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -11286,7 +11286,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -11300,7 +11300,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -11314,7 +11314,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -11328,7 +11328,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -11342,7 +11342,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -11356,7 +11356,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -11370,7 +11370,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -11384,7 +11384,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -11398,7 +11398,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -11412,7 +11412,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -11426,7 +11426,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -11440,7 +11440,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -11454,7 +11454,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -11468,7 +11468,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -11482,7 +11482,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -11496,7 +11496,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -11510,7 +11510,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -11524,7 +11524,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -11538,7 +11538,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -11552,7 +11552,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -11566,7 +11566,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -11580,7 +11580,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -11594,7 +11594,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -11608,7 +11608,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -11622,7 +11622,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -11636,7 +11636,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -11650,7 +11650,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -11664,7 +11664,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -11678,7 +11678,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -11692,7 +11692,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -11706,7 +11706,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -11720,7 +11720,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -11734,7 +11734,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -11748,7 +11748,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -11762,7 +11762,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -11776,7 +11776,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -11790,7 +11790,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -11804,7 +11804,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -11818,7 +11818,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -11832,7 +11832,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -11846,7 +11846,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -11860,7 +11860,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -11874,7 +11874,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -11888,7 +11888,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -11902,7 +11902,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -11916,7 +11916,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -11930,7 +11930,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -11944,7 +11944,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -11958,7 +11958,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -11972,7 +11972,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -11986,7 +11986,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -12000,7 +12000,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -12014,7 +12014,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -12028,7 +12028,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -12042,7 +12042,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -12056,7 +12056,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -12070,7 +12070,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -12084,7 +12084,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -12098,7 +12098,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -12112,7 +12112,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -12126,7 +12126,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -12140,7 +12140,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -12154,7 +12154,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -12168,7 +12168,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -12182,7 +12182,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -12196,7 +12196,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -12210,7 +12210,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -12224,7 +12224,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -12238,7 +12238,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -12252,7 +12252,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -12266,7 +12266,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -12280,7 +12280,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -12294,7 +12294,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -12308,7 +12308,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -12322,7 +12322,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -12336,7 +12336,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -12350,7 +12350,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -12364,7 +12364,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -12378,7 +12378,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -12392,7 +12392,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -12406,7 +12406,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -12420,7 +12420,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -12434,7 +12434,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -12448,7 +12448,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -12462,7 +12462,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -12476,7 +12476,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -12490,7 +12490,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -12504,7 +12504,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -12518,7 +12518,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -12532,7 +12532,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -12546,7 +12546,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -12560,7 +12560,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -12574,7 +12574,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -12588,7 +12588,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -12602,7 +12602,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -12616,7 +12616,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -12630,7 +12630,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -12644,7 +12644,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -12658,7 +12658,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -12672,7 +12672,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -12686,7 +12686,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -12700,7 +12700,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -12714,7 +12714,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -12728,7 +12728,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -12742,7 +12742,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -12756,7 +12756,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -12770,7 +12770,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -12784,7 +12784,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -12798,7 +12798,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -12812,7 +12812,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -12826,7 +12826,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -12840,7 +12840,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -12854,7 +12854,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -12868,7 +12868,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -12882,7 +12882,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -12896,7 +12896,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -12910,7 +12910,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -12924,7 +12924,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -12938,7 +12938,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -12952,7 +12952,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -12966,7 +12966,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -12980,7 +12980,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -12994,7 +12994,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -13008,7 +13008,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -13022,7 +13022,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -13036,7 +13036,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -13050,7 +13050,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -13064,7 +13064,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -13078,7 +13078,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -13092,7 +13092,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -13106,7 +13106,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -13120,7 +13120,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -13134,7 +13134,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -13148,7 +13148,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -13162,7 +13162,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -13176,7 +13176,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -13190,7 +13190,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -13204,7 +13204,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -13218,7 +13218,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -13232,7 +13232,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -13246,7 +13246,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -13260,7 +13260,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -13274,7 +13274,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -13288,7 +13288,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -13302,7 +13302,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -13316,7 +13316,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -13330,7 +13330,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -13344,7 +13344,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -13358,7 +13358,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -13372,7 +13372,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -13386,7 +13386,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -13400,7 +13400,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -13414,7 +13414,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -13428,7 +13428,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -13442,7 +13442,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -13456,7 +13456,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -13470,7 +13470,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -13484,7 +13484,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -13498,7 +13498,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -13512,7 +13512,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -13526,7 +13526,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -13540,7 +13540,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -13554,7 +13554,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -13568,7 +13568,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -13582,7 +13582,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -13596,7 +13596,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -13610,7 +13610,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -13624,7 +13624,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -13638,7 +13638,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -13652,7 +13652,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -13666,7 +13666,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -13680,7 +13680,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -13694,7 +13694,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -13708,7 +13708,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -13722,7 +13722,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -13736,7 +13736,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -13750,7 +13750,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -13764,7 +13764,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -13778,7 +13778,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -13792,7 +13792,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -13806,7 +13806,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -13820,7 +13820,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -13834,7 +13834,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -13848,7 +13848,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -13862,7 +13862,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -13876,7 +13876,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -13890,7 +13890,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -13904,7 +13904,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -13918,7 +13918,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -13932,7 +13932,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -13946,7 +13946,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -13960,7 +13960,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -13974,7 +13974,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -13988,7 +13988,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -14002,7 +14002,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -14016,7 +14016,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -14030,7 +14030,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -14044,7 +14044,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -14058,7 +14058,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -14072,7 +14072,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -14086,7 +14086,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -14100,7 +14100,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -14114,7 +14114,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -14128,7 +14128,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -14142,7 +14142,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -14156,7 +14156,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -14170,7 +14170,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -14184,7 +14184,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -14198,7 +14198,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -14212,7 +14212,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -14226,7 +14226,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -14240,7 +14240,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -14254,7 +14254,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -14268,7 +14268,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -14282,7 +14282,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -14296,7 +14296,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -14310,7 +14310,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -14324,7 +14324,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -14338,7 +14338,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -14352,7 +14352,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -14366,7 +14366,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -14380,7 +14380,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -14394,7 +14394,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -14408,7 +14408,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -14422,7 +14422,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -14436,7 +14436,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -14450,7 +14450,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -14464,7 +14464,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -14478,7 +14478,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -14492,7 +14492,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -14506,7 +14506,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -14520,7 +14520,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -14534,7 +14534,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -14548,7 +14548,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -14562,7 +14562,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -14576,7 +14576,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -14590,7 +14590,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -14604,7 +14604,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -14618,7 +14618,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -14632,7 +14632,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -14646,7 +14646,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -14660,7 +14660,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -14674,7 +14674,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -14688,7 +14688,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -14702,7 +14702,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -14716,7 +14716,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -14730,7 +14730,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -14744,7 +14744,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -14758,7 +14758,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -14772,7 +14772,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -14786,7 +14786,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -14800,7 +14800,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -14814,7 +14814,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -14828,7 +14828,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -14842,7 +14842,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -14856,7 +14856,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -14870,7 +14870,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -14884,7 +14884,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -14898,7 +14898,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -14912,7 +14912,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -14926,7 +14926,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -14940,7 +14940,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -14954,7 +14954,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -14968,7 +14968,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -14982,7 +14982,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -14996,7 +14996,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -15010,7 +15010,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -15024,7 +15024,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -15038,7 +15038,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -15052,7 +15052,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -15066,7 +15066,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -15080,7 +15080,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -15094,7 +15094,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -15108,7 +15108,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -15122,7 +15122,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -15136,7 +15136,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -15150,7 +15150,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -15164,7 +15164,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -15178,7 +15178,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -15192,7 +15192,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -15206,7 +15206,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -15220,7 +15220,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -15234,7 +15234,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -15248,7 +15248,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -15262,7 +15262,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -15276,7 +15276,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -15290,7 +15290,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -15304,7 +15304,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -15318,7 +15318,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -15332,7 +15332,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -15346,7 +15346,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -15360,7 +15360,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -15374,7 +15374,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -15388,7 +15388,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -15402,7 +15402,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -15416,7 +15416,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -15430,7 +15430,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -15444,7 +15444,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -15458,7 +15458,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -15472,7 +15472,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -15486,7 +15486,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -15500,7 +15500,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -15514,7 +15514,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -15528,7 +15528,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -15542,7 +15542,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -15556,7 +15556,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -15570,7 +15570,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -15584,7 +15584,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -15598,7 +15598,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -15612,7 +15612,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -15626,7 +15626,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -15640,7 +15640,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -15654,7 +15654,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -15668,7 +15668,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -15682,7 +15682,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -15696,7 +15696,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -15710,7 +15710,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -15724,7 +15724,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -15738,7 +15738,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -15752,7 +15752,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -15766,7 +15766,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -15780,7 +15780,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -15794,7 +15794,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -15808,7 +15808,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -15822,7 +15822,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -15836,7 +15836,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -15850,7 +15850,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -15864,7 +15864,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -15878,7 +15878,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -15892,7 +15892,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -15906,7 +15906,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -15920,7 +15920,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -15934,7 +15934,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -15948,7 +15948,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -15962,7 +15962,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -15976,7 +15976,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -15990,7 +15990,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -16004,7 +16004,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -16018,7 +16018,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -16032,7 +16032,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -16046,7 +16046,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -16060,7 +16060,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -16074,7 +16074,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -16088,7 +16088,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -16102,7 +16102,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -16116,7 +16116,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -16130,7 +16130,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -16144,7 +16144,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -16158,7 +16158,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -16172,7 +16172,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -16186,7 +16186,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -16200,7 +16200,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -16214,7 +16214,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -16228,7 +16228,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -16242,7 +16242,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -16256,7 +16256,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -16270,7 +16270,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -16284,7 +16284,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -16298,7 +16298,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -16312,7 +16312,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -16326,7 +16326,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -16340,7 +16340,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -16354,7 +16354,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -16368,7 +16368,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -16382,7 +16382,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -16396,7 +16396,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -16410,7 +16410,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -16424,7 +16424,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -16438,7 +16438,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -16452,7 +16452,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -16466,7 +16466,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -16480,7 +16480,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -16494,7 +16494,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -16508,7 +16508,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -16522,7 +16522,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -16536,7 +16536,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -16550,7 +16550,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -16564,7 +16564,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -16578,7 +16578,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -16592,7 +16592,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -16606,7 +16606,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -16620,7 +16620,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -16634,7 +16634,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -16648,7 +16648,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -16662,7 +16662,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -16676,7 +16676,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -16690,7 +16690,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -16704,7 +16704,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -16718,7 +16718,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -16732,7 +16732,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -16746,7 +16746,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -16760,7 +16760,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -16774,7 +16774,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -16788,7 +16788,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -16802,7 +16802,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -16816,7 +16816,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -16830,7 +16830,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -16844,7 +16844,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -16858,7 +16858,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -16872,7 +16872,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -16886,7 +16886,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -16900,7 +16900,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -16914,7 +16914,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -16928,7 +16928,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -16942,7 +16942,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -16956,7 +16956,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -16970,7 +16970,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -16984,7 +16984,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -16998,7 +16998,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -17012,7 +17012,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -17026,7 +17026,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -17040,7 +17040,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -17054,7 +17054,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -17068,7 +17068,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -17082,7 +17082,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -17096,7 +17096,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -17110,7 +17110,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -17124,7 +17124,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -17138,7 +17138,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -17152,7 +17152,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -17166,7 +17166,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -17180,7 +17180,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -17194,7 +17194,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -17208,7 +17208,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -17222,7 +17222,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -17236,7 +17236,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -17250,7 +17250,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -17264,7 +17264,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -17278,7 +17278,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -17292,7 +17292,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -17306,7 +17306,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -17320,7 +17320,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -17334,7 +17334,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -17348,7 +17348,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -17362,7 +17362,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -17376,7 +17376,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -17390,7 +17390,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -17404,7 +17404,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -17418,7 +17418,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -17432,7 +17432,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -17446,7 +17446,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -17460,7 +17460,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -17474,7 +17474,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -17488,7 +17488,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -17502,7 +17502,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -17516,7 +17516,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -17530,7 +17530,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -17544,7 +17544,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -17558,7 +17558,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -17572,7 +17572,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -17586,7 +17586,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -17600,7 +17600,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -17614,7 +17614,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -17628,7 +17628,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -17642,7 +17642,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -17656,7 +17656,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -17670,7 +17670,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -17684,7 +17684,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -17698,7 +17698,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -17712,7 +17712,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -17726,7 +17726,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -17740,7 +17740,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -17754,7 +17754,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -17768,7 +17768,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -17782,7 +17782,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -17796,7 +17796,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -17810,7 +17810,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -17824,7 +17824,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -17838,7 +17838,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -17852,7 +17852,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -17866,7 +17866,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -17880,7 +17880,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -17894,7 +17894,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -17908,7 +17908,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -17922,7 +17922,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -17936,7 +17936,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -17950,7 +17950,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -17964,7 +17964,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -17978,7 +17978,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -17992,7 +17992,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -18006,7 +18006,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -18020,7 +18020,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -18034,7 +18034,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -18048,7 +18048,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -18062,7 +18062,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -18076,7 +18076,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -18090,7 +18090,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -18104,7 +18104,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -18118,7 +18118,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -18132,7 +18132,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -18146,7 +18146,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -18160,7 +18160,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -18174,7 +18174,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -18188,7 +18188,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -18202,7 +18202,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -18216,7 +18216,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -18230,7 +18230,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -18244,7 +18244,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -18258,7 +18258,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -18272,7 +18272,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -18286,7 +18286,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -18300,7 +18300,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -18314,7 +18314,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -18328,7 +18328,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -18342,7 +18342,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -18356,7 +18356,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -18370,7 +18370,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -18384,7 +18384,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -18398,7 +18398,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -18412,7 +18412,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -18426,7 +18426,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -18440,7 +18440,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -18454,7 +18454,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -18468,7 +18468,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -18482,7 +18482,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -18496,7 +18496,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -18510,7 +18510,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -18524,7 +18524,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -18538,7 +18538,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -18552,7 +18552,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -18566,7 +18566,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -18580,7 +18580,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -18594,7 +18594,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -18608,7 +18608,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -18622,7 +18622,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -18636,7 +18636,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -18650,7 +18650,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -18664,7 +18664,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -18678,7 +18678,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -18692,7 +18692,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -18706,7 +18706,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -18720,7 +18720,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -18734,7 +18734,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -18748,7 +18748,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -18762,7 +18762,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -18776,7 +18776,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -18790,7 +18790,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -18804,7 +18804,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -18818,7 +18818,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -18832,7 +18832,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -18846,7 +18846,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -18860,7 +18860,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -18874,7 +18874,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -18888,7 +18888,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -18902,7 +18902,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -18916,7 +18916,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -18930,7 +18930,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -18944,7 +18944,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -18958,7 +18958,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -18972,7 +18972,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -18986,7 +18986,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -19000,7 +19000,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -19014,7 +19014,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -19028,7 +19028,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -19042,7 +19042,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -19056,7 +19056,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -19070,7 +19070,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -19084,7 +19084,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -19098,7 +19098,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -19112,7 +19112,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -19126,7 +19126,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -19140,7 +19140,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -19154,7 +19154,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -19168,7 +19168,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -19182,7 +19182,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -19196,7 +19196,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -19210,7 +19210,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -19224,7 +19224,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -19238,7 +19238,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -19252,7 +19252,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -19266,7 +19266,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -19280,7 +19280,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -19294,7 +19294,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -19308,7 +19308,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -19322,7 +19322,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -19336,7 +19336,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -19350,7 +19350,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -19364,7 +19364,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -19378,7 +19378,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -19392,7 +19392,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -19406,7 +19406,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -19420,7 +19420,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -19434,7 +19434,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -19448,7 +19448,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -19462,7 +19462,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -19476,7 +19476,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -19490,7 +19490,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -19504,7 +19504,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -19518,7 +19518,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -19532,7 +19532,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -19546,7 +19546,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -19560,7 +19560,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -19574,7 +19574,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -19588,7 +19588,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -19602,7 +19602,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -19616,7 +19616,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -19630,7 +19630,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -19644,7 +19644,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -19658,7 +19658,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -19672,7 +19672,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -19686,7 +19686,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -19700,7 +19700,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -19714,7 +19714,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -19728,7 +19728,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -19742,7 +19742,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -19756,7 +19756,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -19770,7 +19770,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -19784,7 +19784,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -19798,7 +19798,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -19812,7 +19812,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -19826,7 +19826,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -19840,7 +19840,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -19854,7 +19854,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -19868,7 +19868,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -19882,7 +19882,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -19896,7 +19896,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -19910,7 +19910,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -19924,7 +19924,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -19938,7 +19938,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -19952,7 +19952,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -19966,7 +19966,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -19980,7 +19980,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -19994,7 +19994,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -20008,7 +20008,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -20022,7 +20022,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -20036,7 +20036,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -20050,7 +20050,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -20064,7 +20064,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -20078,7 +20078,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -20092,7 +20092,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -20106,7 +20106,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -20120,7 +20120,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -20134,7 +20134,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -20148,7 +20148,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -20162,7 +20162,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -20176,7 +20176,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -20190,7 +20190,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -20204,7 +20204,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -20218,7 +20218,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -20232,7 +20232,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -20246,7 +20246,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "LocalAminGroup", "PSCmdL": "$res = Get-WmiObject -Class Win32_GroupUser -Filter \"GroupComponent=\"\"Win32_Group.Domain=\u0027AX-EX19-02\u0027,Name=\u0027Administrators\u0027\"\"\" -ComputerName AX-EX19-02 |% {if ($_.PartComponent -match \u0027cimv2:(.+).Domain=\"(.+)\",Name=\"(.+)\"\u0027){$members=@();$members+=$Matches[1]+\";\"+$Matches[2]+\"\\\"+$Matches[3];$members}};@{\"List\"=$res;\"srv\"=\"AX-EX19-02\"}", "Name": "", @@ -20260,7 +20260,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "LocalAminGroup", "PSCmdL": "$res = Get-WmiObject -Class Win32_GroupUser -Filter \"GroupComponent=\"\"Win32_Group.Domain=\u0027AX-EX19-02\u0027,Name=\u0027Administrators\u0027\"\"\" -ComputerName AX-EX19-02 |% {if ($_.PartComponent -match \u0027cimv2:(.+).Domain=\"(.+)\",Name=\"(.+)\"\u0027){$members=@();$members+=$Matches[1]+\";\"+$Matches[2]+\"\\\"+$Matches[3];$members}};@{\"List\"=$res;\"srv\"=\"AX-EX19-02\"}", "Name": "", @@ -20274,7 +20274,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "LocalAminGroup", "PSCmdL": "$res = Get-WmiObject -Class Win32_GroupUser -Filter \"GroupComponent=\"\"Win32_Group.Domain=\u0027AX-EX19-02\u0027,Name=\u0027Administrators\u0027\"\"\" -ComputerName AX-EX19-02 |% {if ($_.PartComponent -match \u0027cimv2:(.+).Domain=\"(.+)\",Name=\"(.+)\"\u0027){$members=@();$members+=$Matches[1]+\";\"+$Matches[2]+\"\\\"+$Matches[3];$members}};@{\"List\"=$res;\"srv\"=\"AX-EX19-02\"}", "Name": "", @@ -20288,7 +20288,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "LocalAminGroup", "PSCmdL": "$res = Get-WmiObject -Class Win32_GroupUser -Filter \"GroupComponent=\"\"Win32_Group.Domain=\u0027AX-EX19-02\u0027,Name=\u0027Administrators\u0027\"\"\" -ComputerName AX-EX19-02 |% {if ($_.PartComponent -match \u0027cimv2:(.+).Domain=\"(.+)\",Name=\"(.+)\"\u0027){$members=@();$members+=$Matches[1]+\";\"+$Matches[2]+\"\\\"+$Matches[3];$members}};@{\"List\"=$res;\"srv\"=\"AX-EX19-02\"}", "Name": "", @@ -20302,7 +20302,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "LocalAminGroup", "PSCmdL": "$res = Get-WmiObject -Class Win32_GroupUser -Filter \"GroupComponent=\"\"Win32_Group.Domain=\u0027AX-EX19-02\u0027,Name=\u0027Administrators\u0027\"\"\" -ComputerName AX-EX19-02 |% {if ($_.PartComponent -match \u0027cimv2:(.+).Domain=\"(.+)\",Name=\"(.+)\"\u0027){$members=@();$members+=$Matches[1]+\";\"+$Matches[2]+\"\\\"+$Matches[3];$members}};@{\"List\"=$res;\"srv\"=\"AX-EX19-02\"}", "Name": "", @@ -20316,7 +20316,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "LocalAminGroup", "PSCmdL": "$res = Get-WmiObject -Class Win32_GroupUser -Filter \"GroupComponent=\"\"Win32_Group.Domain=\u0027AX-EX19-02\u0027,Name=\u0027Administrators\u0027\"\"\" -ComputerName AX-EX19-02 |% {if ($_.PartComponent -match \u0027cimv2:(.+).Domain=\"(.+)\",Name=\"(.+)\"\u0027){$members=@();$members+=$Matches[1]+\";\"+$Matches[2]+\"\\\"+$Matches[3];$members}};@{\"List\"=$res;\"srv\"=\"AX-EX19-02\"}", "Name": "", @@ -20330,7 +20330,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "LocalAminGroup", "PSCmdL": "$res = Get-WmiObject -Class Win32_GroupUser -Filter \"GroupComponent=\"\"Win32_Group.Domain=\u0027AX-EX19-02\u0027,Name=\u0027Administrators\u0027\"\"\" -ComputerName AX-EX19-02 |% {if ($_.PartComponent -match \u0027cimv2:(.+).Domain=\"(.+)\",Name=\"(.+)\"\u0027){$members=@();$members+=$Matches[1]+\";\"+$Matches[2]+\"\\\"+$Matches[3];$members}};@{\"List\"=$res;\"srv\"=\"AX-EX19-02\"}", "Name": "", @@ -20344,7 +20344,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "LocalAminGroup", "PSCmdL": "$res = Get-WmiObject -Class Win32_GroupUser -Filter \"GroupComponent=\"\"Win32_Group.Domain=\u0027AX-EX19-02\u0027,Name=\u0027Administrators\u0027\"\"\" -ComputerName AX-EX19-02 |% {if ($_.PartComponent -match \u0027cimv2:(.+).Domain=\"(.+)\",Name=\"(.+)\"\u0027){$members=@();$members+=$Matches[1]+\";\"+$Matches[2]+\"\\\"+$Matches[3];$members}};@{\"List\"=$res;\"srv\"=\"AX-EX19-02\"}", "Name": "", @@ -20358,7 +20358,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "LocalAminGroup", "PSCmdL": "$res = Get-WmiObject -Class Win32_GroupUser -Filter \"GroupComponent=\"\"Win32_Group.Domain=\u0027AX-EX19-02\u0027,Name=\u0027Administrators\u0027\"\"\" -ComputerName AX-EX19-02 |% {if ($_.PartComponent -match \u0027cimv2:(.+).Domain=\"(.+)\",Name=\"(.+)\"\u0027){$members=@();$members+=$Matches[1]+\";\"+$Matches[2]+\"\\\"+$Matches[3];$members}};@{\"List\"=$res;\"srv\"=\"AX-EX19-02\"}", "Name": "", @@ -20372,7 +20372,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "LocalAminGroup", "PSCmdL": "$res = Get-WmiObject -Class Win32_GroupUser -Filter \"GroupComponent=\"\"Win32_Group.Domain=\u0027AX-EX19-02\u0027,Name=\u0027Administrators\u0027\"\"\" -ComputerName AX-EX19-02 |% {if ($_.PartComponent -match \u0027cimv2:(.+).Domain=\"(.+)\",Name=\"(.+)\"\u0027){$members=@();$members+=$Matches[1]+\";\"+$Matches[2]+\"\\\"+$Matches[3];$members}};@{\"List\"=$res;\"srv\"=\"AX-EX19-02\"}", "Name": "", @@ -20386,7 +20386,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "LocalAminGroup", "PSCmdL": "$res = Get-WmiObject -Class Win32_GroupUser -Filter \"GroupComponent=\"\"Win32_Group.Domain=\u0027AX-EX19-02\u0027,Name=\u0027Administrators\u0027\"\"\" -ComputerName AX-EX19-02 |% {if ($_.PartComponent -match \u0027cimv2:(.+).Domain=\"(.+)\",Name=\"(.+)\"\u0027){$members=@();$members+=$Matches[1]+\";\"+$Matches[2]+\"\\\"+$Matches[3];$members}};@{\"List\"=$res;\"srv\"=\"AX-EX19-02\"}", "Name": "", @@ -20400,7 +20400,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "LocalAminGroup", "PSCmdL": "$res = Get-WmiObject -Class Win32_GroupUser -Filter \"GroupComponent=\"\"Win32_Group.Domain=\u0027AX-EX19-02\u0027,Name=\u0027Administrators\u0027\"\"\" -ComputerName AX-EX19-02 |% {if ($_.PartComponent -match \u0027cimv2:(.+).Domain=\"(.+)\",Name=\"(.+)\"\u0027){$members=@();$members+=$Matches[1]+\";\"+$Matches[2]+\"\\\"+$Matches[3];$members}};@{\"List\"=$res;\"srv\"=\"AX-EX19-02\"}", "Name": "", @@ -20414,7 +20414,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "LocalAminGroup", "PSCmdL": "$res = Get-WmiObject -Class Win32_GroupUser -Filter \"GroupComponent=\"\"Win32_Group.Domain=\u0027AX-EX19-02\u0027,Name=\u0027Administrators\u0027\"\"\" -ComputerName AX-EX19-02 |% {if ($_.PartComponent -match \u0027cimv2:(.+).Domain=\"(.+)\",Name=\"(.+)\"\u0027){$members=@();$members+=$Matches[1]+\";\"+$Matches[2]+\"\\\"+$Matches[3];$members}};@{\"List\"=$res;\"srv\"=\"AX-EX19-02\"}", "Name": "", @@ -20428,7 +20428,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "LocalAminGroup", "PSCmdL": "$res = Get-WmiObject -Class Win32_GroupUser -Filter \"GroupComponent=\"\"Win32_Group.Domain=\u0027AX-EX19-02\u0027,Name=\u0027Administrators\u0027\"\"\" -ComputerName AX-EX19-02 |% {if ($_.PartComponent -match \u0027cimv2:(.+).Domain=\"(.+)\",Name=\"(.+)\"\u0027){$members=@();$members+=$Matches[1]+\";\"+$Matches[2]+\"\\\"+$Matches[3];$members}};@{\"List\"=$res;\"srv\"=\"AX-EX19-02\"}", "Name": "", @@ -20442,7 +20442,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "LocalAminGroup", "PSCmdL": "$res = Get-WmiObject -Class Win32_GroupUser -Filter \"GroupComponent=\"\"Win32_Group.Domain=\u0027AX-EX19-02\u0027,Name=\u0027Administrators\u0027\"\"\" -ComputerName AX-EX19-02 |% {if ($_.PartComponent -match \u0027cimv2:(.+).Domain=\"(.+)\",Name=\"(.+)\"\u0027){$members=@();$members+=$Matches[1]+\";\"+$Matches[2]+\"\\\"+$Matches[3];$members}};@{\"List\"=$res;\"srv\"=\"AX-EX19-02\"}", "Name": "", @@ -20456,7 +20456,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "LocalAminGroup", "PSCmdL": "$res = Get-WmiObject -Class Win32_GroupUser -Filter \"GroupComponent=\"\"Win32_Group.Domain=\u0027AX-EX19-02\u0027,Name=\u0027Administrators\u0027\"\"\" -ComputerName AX-EX19-02 |% {if ($_.PartComponent -match \u0027cimv2:(.+).Domain=\"(.+)\",Name=\"(.+)\"\u0027){$members=@();$members+=$Matches[1]+\";\"+$Matches[2]+\"\\\"+$Matches[3];$members}};@{\"List\"=$res;\"srv\"=\"AX-EX19-02\"}", "Name": "", @@ -20470,7 +20470,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "LocalAminGroup", "PSCmdL": "$res = Get-WmiObject -Class Win32_GroupUser -Filter \"GroupComponent=\"\"Win32_Group.Domain=\u0027AX-EX19-02\u0027,Name=\u0027Administrators\u0027\"\"\" -ComputerName AX-EX19-02 |% {if ($_.PartComponent -match \u0027cimv2:(.+).Domain=\"(.+)\",Name=\"(.+)\"\u0027){$members=@();$members+=$Matches[1]+\";\"+$Matches[2]+\"\\\"+$Matches[3];$members}};@{\"List\"=$res;\"srv\"=\"AX-EX19-02\"}", "Name": "", @@ -20484,7 +20484,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "LocalAminGroup", "PSCmdL": "$res = Get-WmiObject -Class Win32_GroupUser -Filter \"GroupComponent=\"\"Win32_Group.Domain=\u0027AX-EX19-02\u0027,Name=\u0027Administrators\u0027\"\"\" -ComputerName AX-EX19-02 |% {if ($_.PartComponent -match \u0027cimv2:(.+).Domain=\"(.+)\",Name=\"(.+)\"\u0027){$members=@();$members+=$Matches[1]+\";\"+$Matches[2]+\"\\\"+$Matches[3];$members}};@{\"List\"=$res;\"srv\"=\"AX-EX19-02\"}", "Name": "", @@ -20498,7 +20498,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "LocalAminGroup", "PSCmdL": "$res = Get-WmiObject -Class Win32_GroupUser -Filter \"GroupComponent=\"\"Win32_Group.Domain=\u0027AX-EX19-02\u0027,Name=\u0027Administrators\u0027\"\"\" -ComputerName AX-EX19-02 |% {if ($_.PartComponent -match \u0027cimv2:(.+).Domain=\"(.+)\",Name=\"(.+)\"\u0027){$members=@();$members+=$Matches[1]+\";\"+$Matches[2]+\"\\\"+$Matches[3];$members}};@{\"List\"=$res;\"srv\"=\"AX-EX19-02\"}", "Name": "", @@ -20512,7 +20512,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "LocalAminGroup", "PSCmdL": "$res = Get-WmiObject -Class Win32_GroupUser -Filter \"GroupComponent=\"\"Win32_Group.Domain=\u0027AX-EX19-02\u0027,Name=\u0027Administrators\u0027\"\"\" -ComputerName AX-EX19-02 |% {if ($_.PartComponent -match \u0027cimv2:(.+).Domain=\"(.+)\",Name=\"(.+)\"\u0027){$members=@();$members+=$Matches[1]+\";\"+$Matches[2]+\"\\\"+$Matches[3];$members}};@{\"List\"=$res;\"srv\"=\"AX-EX19-02\"}", "Name": "", @@ -20526,7 +20526,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "LocalAminGroup", "PSCmdL": "$res = Get-WmiObject -Class Win32_GroupUser -Filter \"GroupComponent=\"\"Win32_Group.Domain=\u0027AX-EX19-02\u0027,Name=\u0027Administrators\u0027\"\"\" -ComputerName AX-EX19-02 |% {if ($_.PartComponent -match \u0027cimv2:(.+).Domain=\"(.+)\",Name=\"(.+)\"\u0027){$members=@();$members+=$Matches[1]+\";\"+$Matches[2]+\"\\\"+$Matches[3];$members}};@{\"List\"=$res;\"srv\"=\"AX-EX19-02\"}", "Name": "", @@ -20540,7 +20540,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "LocalAminGroup", "PSCmdL": "$res = Get-WmiObject -Class Win32_GroupUser -Filter \"GroupComponent=\"\"Win32_Group.Domain=\u0027AX-EX19-02\u0027,Name=\u0027Administrators\u0027\"\"\" -ComputerName AX-EX19-02 |% {if ($_.PartComponent -match \u0027cimv2:(.+).Domain=\"(.+)\",Name=\"(.+)\"\u0027){$members=@();$members+=$Matches[1]+\";\"+$Matches[2]+\"\\\"+$Matches[3];$members}};@{\"List\"=$res;\"srv\"=\"AX-EX19-02\"}", "Name": "", @@ -20554,7 +20554,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "LocalAminGroup", "PSCmdL": "$res = Get-WmiObject -Class Win32_GroupUser -Filter \"GroupComponent=\"\"Win32_Group.Domain=\u0027AX-EX19-02\u0027,Name=\u0027Administrators\u0027\"\"\" -ComputerName AX-EX19-02 |% {if ($_.PartComponent -match \u0027cimv2:(.+).Domain=\"(.+)\",Name=\"(.+)\"\u0027){$members=@();$members+=$Matches[1]+\";\"+$Matches[2]+\"\\\"+$Matches[3];$members}};@{\"List\"=$res;\"srv\"=\"AX-EX19-02\"}", "Name": "", @@ -20568,7 +20568,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "LocalAminGroup", "PSCmdL": "$res = Get-WmiObject -Class Win32_GroupUser -Filter \"GroupComponent=\"\"Win32_Group.Domain=\u0027AX-EX19-02\u0027,Name=\u0027Administrators\u0027\"\"\" -ComputerName AX-EX19-02 |% {if ($_.PartComponent -match \u0027cimv2:(.+).Domain=\"(.+)\",Name=\"(.+)\"\u0027){$members=@();$members+=$Matches[1]+\";\"+$Matches[2]+\"\\\"+$Matches[3];$members}};@{\"List\"=$res;\"srv\"=\"AX-EX19-02\"}", "Name": "", @@ -20582,7 +20582,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "LocalAminGroup", "PSCmdL": "$res = Get-WmiObject -Class Win32_GroupUser -Filter \"GroupComponent=\"\"Win32_Group.Domain=\u0027AX-EX19-02\u0027,Name=\u0027Administrators\u0027\"\"\" -ComputerName AX-EX19-02 |% {if ($_.PartComponent -match \u0027cimv2:(.+).Domain=\"(.+)\",Name=\"(.+)\"\u0027){$members=@();$members+=$Matches[1]+\";\"+$Matches[2]+\"\\\"+$Matches[3];$members}};@{\"List\"=$res;\"srv\"=\"AX-EX19-02\"}", "Name": "", @@ -20596,7 +20596,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "LocalAminGroup", "PSCmdL": "$res = Get-WmiObject -Class Win32_GroupUser -Filter \"GroupComponent=\"\"Win32_Group.Domain=\u0027AX-EX19-02\u0027,Name=\u0027Administrators\u0027\"\"\" -ComputerName AX-EX19-02 |% {if ($_.PartComponent -match \u0027cimv2:(.+).Domain=\"(.+)\",Name=\"(.+)\"\u0027){$members=@();$members+=$Matches[1]+\";\"+$Matches[2]+\"\\\"+$Matches[3];$members}};@{\"List\"=$res;\"srv\"=\"AX-EX19-02\"}", "Name": "", @@ -20610,7 +20610,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "LocalAminGroup", "PSCmdL": "$res = Get-WmiObject -Class Win32_GroupUser -Filter \"GroupComponent=\"\"Win32_Group.Domain=\u0027AX-EX19-02\u0027,Name=\u0027Administrators\u0027\"\"\" -ComputerName AX-EX19-02 |% {if ($_.PartComponent -match \u0027cimv2:(.+).Domain=\"(.+)\",Name=\"(.+)\"\u0027){$members=@();$members+=$Matches[1]+\";\"+$Matches[2]+\"\\\"+$Matches[3];$members}};@{\"List\"=$res;\"srv\"=\"AX-EX19-02\"}", "Name": "", @@ -20624,7 +20624,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "LocalAminGroup", "PSCmdL": "$res = Get-WmiObject -Class Win32_GroupUser -Filter \"GroupComponent=\"\"Win32_Group.Domain=\u0027AX-EX19-02\u0027,Name=\u0027Administrators\u0027\"\"\" -ComputerName AX-EX19-02 |% {if ($_.PartComponent -match \u0027cimv2:(.+).Domain=\"(.+)\",Name=\"(.+)\"\u0027){$members=@();$members+=$Matches[1]+\";\"+$Matches[2]+\"\\\"+$Matches[3];$members}};@{\"List\"=$res;\"srv\"=\"AX-EX19-02\"}", "Name": "", @@ -20638,7 +20638,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "LocalAminGroup", "PSCmdL": "$res = Get-WmiObject -Class Win32_GroupUser -Filter \"GroupComponent=\"\"Win32_Group.Domain=\u0027AX-EX19-02\u0027,Name=\u0027Administrators\u0027\"\"\" -ComputerName AX-EX19-02 |% {if ($_.PartComponent -match \u0027cimv2:(.+).Domain=\"(.+)\",Name=\"(.+)\"\u0027){$members=@();$members+=$Matches[1]+\";\"+$Matches[2]+\"\\\"+$Matches[3];$members}};@{\"List\"=$res;\"srv\"=\"AX-EX19-02\"}", "Name": "", @@ -20652,7 +20652,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "LocalAminGroup", "PSCmdL": "$res = Get-WmiObject -Class Win32_GroupUser -Filter \"GroupComponent=\"\"Win32_Group.Domain=\u0027AX-EX19-02\u0027,Name=\u0027Administrators\u0027\"\"\" -ComputerName AX-EX19-02 |% {if ($_.PartComponent -match \u0027cimv2:(.+).Domain=\"(.+)\",Name=\"(.+)\"\u0027){$members=@();$members+=$Matches[1]+\";\"+$Matches[2]+\"\\\"+$Matches[3];$members}};@{\"List\"=$res;\"srv\"=\"AX-EX19-02\"}", "Name": "", @@ -20666,7 +20666,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "LocalAminGroup", "PSCmdL": "$res = Get-WmiObject -Class Win32_GroupUser -Filter \"GroupComponent=\"\"Win32_Group.Domain=\u0027AX-EX19-02\u0027,Name=\u0027Administrators\u0027\"\"\" -ComputerName AX-EX19-02 |% {if ($_.PartComponent -match \u0027cimv2:(.+).Domain=\"(.+)\",Name=\"(.+)\"\u0027){$members=@();$members+=$Matches[1]+\";\"+$Matches[2]+\"\\\"+$Matches[3];$members}};@{\"List\"=$res;\"srv\"=\"AX-EX19-02\"}", "Name": "", @@ -20680,7 +20680,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "LocalAminGroup", "PSCmdL": "$res = Get-WmiObject -Class Win32_GroupUser -Filter \"GroupComponent=\"\"Win32_Group.Domain=\u0027AX-EX19-02\u0027,Name=\u0027Administrators\u0027\"\"\" -ComputerName AX-EX19-02 |% {if ($_.PartComponent -match \u0027cimv2:(.+).Domain=\"(.+)\",Name=\"(.+)\"\u0027){$members=@();$members+=$Matches[1]+\";\"+$Matches[2]+\"\\\"+$Matches[3];$members}};@{\"List\"=$res;\"srv\"=\"AX-EX19-02\"}", "Name": "", @@ -20694,7 +20694,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "LocalAminGroup", "PSCmdL": "$res = Get-WmiObject -Class Win32_GroupUser -Filter \"GroupComponent=\"\"Win32_Group.Domain=\u0027AX-EX19-02\u0027,Name=\u0027Administrators\u0027\"\"\" -ComputerName AX-EX19-02 |% {if ($_.PartComponent -match \u0027cimv2:(.+).Domain=\"(.+)\",Name=\"(.+)\"\u0027){$members=@();$members+=$Matches[1]+\";\"+$Matches[2]+\"\\\"+$Matches[3];$members}};@{\"List\"=$res;\"srv\"=\"AX-EX19-02\"}", "Name": "", @@ -20708,7 +20708,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "LocalAminGroup", "PSCmdL": "$res = Get-WmiObject -Class Win32_GroupUser -Filter \"GroupComponent=\"\"Win32_Group.Domain=\u0027AX-EX19-02\u0027,Name=\u0027Administrators\u0027\"\"\" -ComputerName AX-EX19-02 |% {if ($_.PartComponent -match \u0027cimv2:(.+).Domain=\"(.+)\",Name=\"(.+)\"\u0027){$members=@();$members+=$Matches[1]+\";\"+$Matches[2]+\"\\\"+$Matches[3];$members}};@{\"List\"=$res;\"srv\"=\"AX-EX19-02\"}", "Name": "", @@ -20722,7 +20722,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "LocalAminGroup", "PSCmdL": "$res = Get-WmiObject -Class Win32_GroupUser -Filter \"GroupComponent=\"\"Win32_Group.Domain=\u0027AX-EX19-02\u0027,Name=\u0027Administrators\u0027\"\"\" -ComputerName AX-EX19-02 |% {if ($_.PartComponent -match \u0027cimv2:(.+).Domain=\"(.+)\",Name=\"(.+)\"\u0027){$members=@();$members+=$Matches[1]+\";\"+$Matches[2]+\"\\\"+$Matches[3];$members}};@{\"List\"=$res;\"srv\"=\"AX-EX19-02\"}", "Name": "", @@ -20736,7 +20736,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "LocalAminGroup", "PSCmdL": "$res = Get-WmiObject -Class Win32_GroupUser -Filter \"GroupComponent=\"\"Win32_Group.Domain=\u0027AX-EX19-02\u0027,Name=\u0027Administrators\u0027\"\"\" -ComputerName AX-EX19-02 |% {if ($_.PartComponent -match \u0027cimv2:(.+).Domain=\"(.+)\",Name=\"(.+)\"\u0027){$members=@();$members+=$Matches[1]+\";\"+$Matches[2]+\"\\\"+$Matches[3];$members}};@{\"List\"=$res;\"srv\"=\"AX-EX19-02\"}", "Name": "", @@ -20750,7 +20750,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "LocalAminGroup", "PSCmdL": "$res = Get-WmiObject -Class Win32_GroupUser -Filter \"GroupComponent=\"\"Win32_Group.Domain=\u0027AX-EX19-02\u0027,Name=\u0027Administrators\u0027\"\"\" -ComputerName AX-EX19-02 |% {if ($_.PartComponent -match \u0027cimv2:(.+).Domain=\"(.+)\",Name=\"(.+)\"\u0027){$members=@();$members+=$Matches[1]+\";\"+$Matches[2]+\"\\\"+$Matches[3];$members}};@{\"List\"=$res;\"srv\"=\"AX-EX19-02\"}", "Name": "", @@ -20764,7 +20764,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "LocalAminGroup", "PSCmdL": "$res = Get-WmiObject -Class Win32_GroupUser -Filter \"GroupComponent=\"\"Win32_Group.Domain=\u0027AX-EX19-02\u0027,Name=\u0027Administrators\u0027\"\"\" -ComputerName AX-EX19-02 |% {if ($_.PartComponent -match \u0027cimv2:(.+).Domain=\"(.+)\",Name=\"(.+)\"\u0027){$members=@();$members+=$Matches[1]+\";\"+$Matches[2]+\"\\\"+$Matches[3];$members}};@{\"List\"=$res;\"srv\"=\"AX-EX19-02\"}", "Name": "", @@ -20778,7 +20778,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "LocalAminGroup", "PSCmdL": "$res = Get-WmiObject -Class Win32_GroupUser -Filter \"GroupComponent=\"\"Win32_Group.Domain=\u0027AX-EX19-02\u0027,Name=\u0027Administrators\u0027\"\"\" -ComputerName AX-EX19-02 |% {if ($_.PartComponent -match \u0027cimv2:(.+).Domain=\"(.+)\",Name=\"(.+)\"\u0027){$members=@();$members+=$Matches[1]+\";\"+$Matches[2]+\"\\\"+$Matches[3];$members}};@{\"List\"=$res;\"srv\"=\"AX-EX19-02\"}", "Name": "", @@ -20792,7 +20792,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "LocalAminGroup", "PSCmdL": "$res = Get-WmiObject -Class Win32_GroupUser -Filter \"GroupComponent=\"\"Win32_Group.Domain=\u0027AX-EX19-02\u0027,Name=\u0027Administrators\u0027\"\"\" -ComputerName AX-EX19-02 |% {if ($_.PartComponent -match \u0027cimv2:(.+).Domain=\"(.+)\",Name=\"(.+)\"\u0027){$members=@();$members+=$Matches[1]+\";\"+$Matches[2]+\"\\\"+$Matches[3];$members}};@{\"List\"=$res;\"srv\"=\"AX-EX19-02\"}", "Name": "", @@ -20806,7 +20806,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "LocalAminGroup", "PSCmdL": "$res = Get-WmiObject -Class Win32_GroupUser -Filter \"GroupComponent=\"\"Win32_Group.Domain=\u0027AX-EX19-02\u0027,Name=\u0027Administrators\u0027\"\"\" -ComputerName AX-EX19-02 |% {if ($_.PartComponent -match \u0027cimv2:(.+).Domain=\"(.+)\",Name=\"(.+)\"\u0027){$members=@();$members+=$Matches[1]+\";\"+$Matches[2]+\"\\\"+$Matches[3];$members}};@{\"List\"=$res;\"srv\"=\"AX-EX19-02\"}", "Name": "", @@ -20820,7 +20820,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "LocalAminGroup", "PSCmdL": "$res = Get-WmiObject -Class Win32_GroupUser -Filter \"GroupComponent=\"\"Win32_Group.Domain=\u0027AX-EX19-03\u0027,Name=\u0027Administrators\u0027\"\"\" -ComputerName AX-EX19-03 |% {if ($_.PartComponent -match \u0027cimv2:(.+).Domain=\"(.+)\",Name=\"(.+)\"\u0027){$members=@();$members+=$Matches[1]+\";\"+$Matches[2]+\"\\\"+$Matches[3];$members}};@{\"List\"=$res;\"srv\"=\"AX-EX19-03\"}", "Name": "", @@ -20834,7 +20834,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "LocalAminGroup", "PSCmdL": "$res = Get-WmiObject -Class Win32_GroupUser -Filter \"GroupComponent=\"\"Win32_Group.Domain=\u0027AX-EX19-03\u0027,Name=\u0027Administrators\u0027\"\"\" -ComputerName AX-EX19-03 |% {if ($_.PartComponent -match \u0027cimv2:(.+).Domain=\"(.+)\",Name=\"(.+)\"\u0027){$members=@();$members+=$Matches[1]+\";\"+$Matches[2]+\"\\\"+$Matches[3];$members}};@{\"List\"=$res;\"srv\"=\"AX-EX19-03\"}", "Name": "", @@ -20848,7 +20848,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "LocalAminGroup", "PSCmdL": "$res = Get-WmiObject -Class Win32_GroupUser -Filter \"GroupComponent=\"\"Win32_Group.Domain=\u0027AX-EX19-03\u0027,Name=\u0027Administrators\u0027\"\"\" -ComputerName AX-EX19-03 |% {if ($_.PartComponent -match \u0027cimv2:(.+).Domain=\"(.+)\",Name=\"(.+)\"\u0027){$members=@();$members+=$Matches[1]+\";\"+$Matches[2]+\"\\\"+$Matches[3];$members}};@{\"List\"=$res;\"srv\"=\"AX-EX19-03\"}", "Name": "", @@ -20862,7 +20862,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "LocalAminGroup", "PSCmdL": "$res = Get-WmiObject -Class Win32_GroupUser -Filter \"GroupComponent=\"\"Win32_Group.Domain=\u0027AX-EX19-03\u0027,Name=\u0027Administrators\u0027\"\"\" -ComputerName AX-EX19-03 |% {if ($_.PartComponent -match \u0027cimv2:(.+).Domain=\"(.+)\",Name=\"(.+)\"\u0027){$members=@();$members+=$Matches[1]+\";\"+$Matches[2]+\"\\\"+$Matches[3];$members}};@{\"List\"=$res;\"srv\"=\"AX-EX19-03\"}", "Name": "", @@ -20876,7 +20876,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "LocalAminGroup", "PSCmdL": "$res = Get-WmiObject -Class Win32_GroupUser -Filter \"GroupComponent=\"\"Win32_Group.Domain=\u0027AX-EX19-03\u0027,Name=\u0027Administrators\u0027\"\"\" -ComputerName AX-EX19-03 |% {if ($_.PartComponent -match \u0027cimv2:(.+).Domain=\"(.+)\",Name=\"(.+)\"\u0027){$members=@();$members+=$Matches[1]+\";\"+$Matches[2]+\"\\\"+$Matches[3];$members}};@{\"List\"=$res;\"srv\"=\"AX-EX19-03\"}", "Name": "", @@ -20890,7 +20890,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "LocalAminGroup", "PSCmdL": "$res = Get-WmiObject -Class Win32_GroupUser -Filter \"GroupComponent=\"\"Win32_Group.Domain=\u0027AX-EX19-03\u0027,Name=\u0027Administrators\u0027\"\"\" -ComputerName AX-EX19-03 |% {if ($_.PartComponent -match \u0027cimv2:(.+).Domain=\"(.+)\",Name=\"(.+)\"\u0027){$members=@();$members+=$Matches[1]+\";\"+$Matches[2]+\"\\\"+$Matches[3];$members}};@{\"List\"=$res;\"srv\"=\"AX-EX19-03\"}", "Name": "", @@ -20904,7 +20904,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "LocalAminGroup", "PSCmdL": "$res = Get-WmiObject -Class Win32_GroupUser -Filter \"GroupComponent=\"\"Win32_Group.Domain=\u0027AX-EX19-03\u0027,Name=\u0027Administrators\u0027\"\"\" -ComputerName AX-EX19-03 |% {if ($_.PartComponent -match \u0027cimv2:(.+).Domain=\"(.+)\",Name=\"(.+)\"\u0027){$members=@();$members+=$Matches[1]+\";\"+$Matches[2]+\"\\\"+$Matches[3];$members}};@{\"List\"=$res;\"srv\"=\"AX-EX19-03\"}", "Name": "", @@ -20918,7 +20918,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "LocalAminGroup", "PSCmdL": "$res = Get-WmiObject -Class Win32_GroupUser -Filter \"GroupComponent=\"\"Win32_Group.Domain=\u0027AX-EX19-03\u0027,Name=\u0027Administrators\u0027\"\"\" -ComputerName AX-EX19-03 |% {if ($_.PartComponent -match \u0027cimv2:(.+).Domain=\"(.+)\",Name=\"(.+)\"\u0027){$members=@();$members+=$Matches[1]+\";\"+$Matches[2]+\"\\\"+$Matches[3];$members}};@{\"List\"=$res;\"srv\"=\"AX-EX19-03\"}", "Name": "", @@ -20932,7 +20932,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "LocalAminGroup", "PSCmdL": "$res = Get-WmiObject -Class Win32_GroupUser -Filter \"GroupComponent=\"\"Win32_Group.Domain=\u0027AX-EX19-03\u0027,Name=\u0027Administrators\u0027\"\"\" -ComputerName AX-EX19-03 |% {if ($_.PartComponent -match \u0027cimv2:(.+).Domain=\"(.+)\",Name=\"(.+)\"\u0027){$members=@();$members+=$Matches[1]+\";\"+$Matches[2]+\"\\\"+$Matches[3];$members}};@{\"List\"=$res;\"srv\"=\"AX-EX19-03\"}", "Name": "", @@ -20946,7 +20946,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "LocalAminGroup", "PSCmdL": "$res = Get-WmiObject -Class Win32_GroupUser -Filter \"GroupComponent=\"\"Win32_Group.Domain=\u0027AX-EX19-03\u0027,Name=\u0027Administrators\u0027\"\"\" -ComputerName AX-EX19-03 |% {if ($_.PartComponent -match \u0027cimv2:(.+).Domain=\"(.+)\",Name=\"(.+)\"\u0027){$members=@();$members+=$Matches[1]+\";\"+$Matches[2]+\"\\\"+$Matches[3];$members}};@{\"List\"=$res;\"srv\"=\"AX-EX19-03\"}", "Name": "", @@ -20960,7 +20960,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "LocalAminGroup", "PSCmdL": "$res = Get-WmiObject -Class Win32_GroupUser -Filter \"GroupComponent=\"\"Win32_Group.Domain=\u0027AX-EX19-03\u0027,Name=\u0027Administrators\u0027\"\"\" -ComputerName AX-EX19-03 |% {if ($_.PartComponent -match \u0027cimv2:(.+).Domain=\"(.+)\",Name=\"(.+)\"\u0027){$members=@();$members+=$Matches[1]+\";\"+$Matches[2]+\"\\\"+$Matches[3];$members}};@{\"List\"=$res;\"srv\"=\"AX-EX19-03\"}", "Name": "", @@ -20974,7 +20974,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "LocalAminGroup", "PSCmdL": "$res = Get-WmiObject -Class Win32_GroupUser -Filter \"GroupComponent=\"\"Win32_Group.Domain=\u0027AX-EX19-03\u0027,Name=\u0027Administrators\u0027\"\"\" -ComputerName AX-EX19-03 |% {if ($_.PartComponent -match \u0027cimv2:(.+).Domain=\"(.+)\",Name=\"(.+)\"\u0027){$members=@();$members+=$Matches[1]+\";\"+$Matches[2]+\"\\\"+$Matches[3];$members}};@{\"List\"=$res;\"srv\"=\"AX-EX19-03\"}", "Name": "", @@ -20988,7 +20988,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "LocalAminGroup", "PSCmdL": "$res = Get-WmiObject -Class Win32_GroupUser -Filter \"GroupComponent=\"\"Win32_Group.Domain=\u0027AX-EX19-03\u0027,Name=\u0027Administrators\u0027\"\"\" -ComputerName AX-EX19-03 |% {if ($_.PartComponent -match \u0027cimv2:(.+).Domain=\"(.+)\",Name=\"(.+)\"\u0027){$members=@();$members+=$Matches[1]+\";\"+$Matches[2]+\"\\\"+$Matches[3];$members}};@{\"List\"=$res;\"srv\"=\"AX-EX19-03\"}", "Name": "", @@ -21002,7 +21002,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "LocalAminGroup", "PSCmdL": "$res = Get-WmiObject -Class Win32_GroupUser -Filter \"GroupComponent=\"\"Win32_Group.Domain=\u0027AX-EX19-03\u0027,Name=\u0027Administrators\u0027\"\"\" -ComputerName AX-EX19-03 |% {if ($_.PartComponent -match \u0027cimv2:(.+).Domain=\"(.+)\",Name=\"(.+)\"\u0027){$members=@();$members+=$Matches[1]+\";\"+$Matches[2]+\"\\\"+$Matches[3];$members}};@{\"List\"=$res;\"srv\"=\"AX-EX19-03\"}", "Name": "", @@ -21016,7 +21016,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "LocalAminGroup", "PSCmdL": "$res = Get-WmiObject -Class Win32_GroupUser -Filter \"GroupComponent=\"\"Win32_Group.Domain=\u0027AX-EX19-03\u0027,Name=\u0027Administrators\u0027\"\"\" -ComputerName AX-EX19-03 |% {if ($_.PartComponent -match \u0027cimv2:(.+).Domain=\"(.+)\",Name=\"(.+)\"\u0027){$members=@();$members+=$Matches[1]+\";\"+$Matches[2]+\"\\\"+$Matches[3];$members}};@{\"List\"=$res;\"srv\"=\"AX-EX19-03\"}", "Name": "", @@ -21030,7 +21030,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "LocalAminGroup", "PSCmdL": "$res = Get-WmiObject -Class Win32_GroupUser -Filter \"GroupComponent=\"\"Win32_Group.Domain=\u0027AX-EX19-03\u0027,Name=\u0027Administrators\u0027\"\"\" -ComputerName AX-EX19-03 |% {if ($_.PartComponent -match \u0027cimv2:(.+).Domain=\"(.+)\",Name=\"(.+)\"\u0027){$members=@();$members+=$Matches[1]+\";\"+$Matches[2]+\"\\\"+$Matches[3];$members}};@{\"List\"=$res;\"srv\"=\"AX-EX19-03\"}", "Name": "", @@ -21044,7 +21044,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "LocalAminGroup", "PSCmdL": "$res = Get-WmiObject -Class Win32_GroupUser -Filter \"GroupComponent=\"\"Win32_Group.Domain=\u0027AX-EX19-03\u0027,Name=\u0027Administrators\u0027\"\"\" -ComputerName AX-EX19-03 |% {if ($_.PartComponent -match \u0027cimv2:(.+).Domain=\"(.+)\",Name=\"(.+)\"\u0027){$members=@();$members+=$Matches[1]+\";\"+$Matches[2]+\"\\\"+$Matches[3];$members}};@{\"List\"=$res;\"srv\"=\"AX-EX19-03\"}", "Name": "", @@ -21058,7 +21058,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "LocalAminGroup", "PSCmdL": "$res = Get-WmiObject -Class Win32_GroupUser -Filter \"GroupComponent=\"\"Win32_Group.Domain=\u0027AX-EX19-03\u0027,Name=\u0027Administrators\u0027\"\"\" -ComputerName AX-EX19-03 |% {if ($_.PartComponent -match \u0027cimv2:(.+).Domain=\"(.+)\",Name=\"(.+)\"\u0027){$members=@();$members+=$Matches[1]+\";\"+$Matches[2]+\"\\\"+$Matches[3];$members}};@{\"List\"=$res;\"srv\"=\"AX-EX19-03\"}", "Name": "", @@ -21072,7 +21072,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "LocalAminGroup", "PSCmdL": "$res = Get-WmiObject -Class Win32_GroupUser -Filter \"GroupComponent=\"\"Win32_Group.Domain=\u0027AX-EX19-03\u0027,Name=\u0027Administrators\u0027\"\"\" -ComputerName AX-EX19-03 |% {if ($_.PartComponent -match \u0027cimv2:(.+).Domain=\"(.+)\",Name=\"(.+)\"\u0027){$members=@();$members+=$Matches[1]+\";\"+$Matches[2]+\"\\\"+$Matches[3];$members}};@{\"List\"=$res;\"srv\"=\"AX-EX19-03\"}", "Name": "", @@ -21086,7 +21086,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "LocalAminGroup", "PSCmdL": "$res = Get-WmiObject -Class Win32_GroupUser -Filter \"GroupComponent=\"\"Win32_Group.Domain=\u0027AX-EX19-03\u0027,Name=\u0027Administrators\u0027\"\"\" -ComputerName AX-EX19-03 |% {if ($_.PartComponent -match \u0027cimv2:(.+).Domain=\"(.+)\",Name=\"(.+)\"\u0027){$members=@();$members+=$Matches[1]+\";\"+$Matches[2]+\"\\\"+$Matches[3];$members}};@{\"List\"=$res;\"srv\"=\"AX-EX19-03\"}", "Name": "", @@ -21100,7 +21100,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "LocalAminGroup", "PSCmdL": "$res = Get-WmiObject -Class Win32_GroupUser -Filter \"GroupComponent=\"\"Win32_Group.Domain=\u0027AX-EX19-03\u0027,Name=\u0027Administrators\u0027\"\"\" -ComputerName AX-EX19-03 |% {if ($_.PartComponent -match \u0027cimv2:(.+).Domain=\"(.+)\",Name=\"(.+)\"\u0027){$members=@();$members+=$Matches[1]+\";\"+$Matches[2]+\"\\\"+$Matches[3];$members}};@{\"List\"=$res;\"srv\"=\"AX-EX19-03\"}", "Name": "", @@ -21114,7 +21114,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "LocalAminGroup", "PSCmdL": "$res = Get-WmiObject -Class Win32_GroupUser -Filter \"GroupComponent=\"\"Win32_Group.Domain=\u0027AX-EX19-03\u0027,Name=\u0027Administrators\u0027\"\"\" -ComputerName AX-EX19-03 |% {if ($_.PartComponent -match \u0027cimv2:(.+).Domain=\"(.+)\",Name=\"(.+)\"\u0027){$members=@();$members+=$Matches[1]+\";\"+$Matches[2]+\"\\\"+$Matches[3];$members}};@{\"List\"=$res;\"srv\"=\"AX-EX19-03\"}", "Name": "", @@ -21128,7 +21128,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "LocalAminGroup", "PSCmdL": "$res = Get-WmiObject -Class Win32_GroupUser -Filter \"GroupComponent=\"\"Win32_Group.Domain=\u0027AX-EX19-03\u0027,Name=\u0027Administrators\u0027\"\"\" -ComputerName AX-EX19-03 |% {if ($_.PartComponent -match \u0027cimv2:(.+).Domain=\"(.+)\",Name=\"(.+)\"\u0027){$members=@();$members+=$Matches[1]+\";\"+$Matches[2]+\"\\\"+$Matches[3];$members}};@{\"List\"=$res;\"srv\"=\"AX-EX19-03\"}", "Name": "", @@ -21142,7 +21142,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "LocalAminGroup", "PSCmdL": "$res = Get-WmiObject -Class Win32_GroupUser -Filter \"GroupComponent=\"\"Win32_Group.Domain=\u0027AX-EX19-03\u0027,Name=\u0027Administrators\u0027\"\"\" -ComputerName AX-EX19-03 |% {if ($_.PartComponent -match \u0027cimv2:(.+).Domain=\"(.+)\",Name=\"(.+)\"\u0027){$members=@();$members+=$Matches[1]+\";\"+$Matches[2]+\"\\\"+$Matches[3];$members}};@{\"List\"=$res;\"srv\"=\"AX-EX19-03\"}", "Name": "", @@ -21156,7 +21156,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "LocalAminGroup", "PSCmdL": "$res = Get-WmiObject -Class Win32_GroupUser -Filter \"GroupComponent=\"\"Win32_Group.Domain=\u0027AX-EX19-03\u0027,Name=\u0027Administrators\u0027\"\"\" -ComputerName AX-EX19-03 |% {if ($_.PartComponent -match \u0027cimv2:(.+).Domain=\"(.+)\",Name=\"(.+)\"\u0027){$members=@();$members+=$Matches[1]+\";\"+$Matches[2]+\"\\\"+$Matches[3];$members}};@{\"List\"=$res;\"srv\"=\"AX-EX19-03\"}", "Name": "", @@ -21170,7 +21170,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "LocalAminGroup", "PSCmdL": "$res = Get-WmiObject -Class Win32_GroupUser -Filter \"GroupComponent=\"\"Win32_Group.Domain=\u0027AX-EX19-03\u0027,Name=\u0027Administrators\u0027\"\"\" -ComputerName AX-EX19-03 |% {if ($_.PartComponent -match \u0027cimv2:(.+).Domain=\"(.+)\",Name=\"(.+)\"\u0027){$members=@();$members+=$Matches[1]+\";\"+$Matches[2]+\"\\\"+$Matches[3];$members}};@{\"List\"=$res;\"srv\"=\"AX-EX19-03\"}", "Name": "", @@ -21184,7 +21184,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "LocalAminGroup", "PSCmdL": "$res = Get-WmiObject -Class Win32_GroupUser -Filter \"GroupComponent=\"\"Win32_Group.Domain=\u0027AX-EX19-03\u0027,Name=\u0027Administrators\u0027\"\"\" -ComputerName AX-EX19-03 |% {if ($_.PartComponent -match \u0027cimv2:(.+).Domain=\"(.+)\",Name=\"(.+)\"\u0027){$members=@();$members+=$Matches[1]+\";\"+$Matches[2]+\"\\\"+$Matches[3];$members}};@{\"List\"=$res;\"srv\"=\"AX-EX19-03\"}", "Name": "", @@ -21198,7 +21198,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "LocalAminGroup", "PSCmdL": "$res = Get-WmiObject -Class Win32_GroupUser -Filter \"GroupComponent=\"\"Win32_Group.Domain=\u0027AX-EX19-03\u0027,Name=\u0027Administrators\u0027\"\"\" -ComputerName AX-EX19-03 |% {if ($_.PartComponent -match \u0027cimv2:(.+).Domain=\"(.+)\",Name=\"(.+)\"\u0027){$members=@();$members+=$Matches[1]+\";\"+$Matches[2]+\"\\\"+$Matches[3];$members}};@{\"List\"=$res;\"srv\"=\"AX-EX19-03\"}", "Name": "", @@ -21212,7 +21212,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "LocalAminGroup", "PSCmdL": "$res = Get-WmiObject -Class Win32_GroupUser -Filter \"GroupComponent=\"\"Win32_Group.Domain=\u0027AX-EX19-03\u0027,Name=\u0027Administrators\u0027\"\"\" -ComputerName AX-EX19-03 |% {if ($_.PartComponent -match \u0027cimv2:(.+).Domain=\"(.+)\",Name=\"(.+)\"\u0027){$members=@();$members+=$Matches[1]+\";\"+$Matches[2]+\"\\\"+$Matches[3];$members}};@{\"List\"=$res;\"srv\"=\"AX-EX19-03\"}", "Name": "", @@ -21226,7 +21226,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "LocalAminGroup", "PSCmdL": "$res = Get-WmiObject -Class Win32_GroupUser -Filter \"GroupComponent=\"\"Win32_Group.Domain=\u0027AX-EX19-03\u0027,Name=\u0027Administrators\u0027\"\"\" -ComputerName AX-EX19-03 |% {if ($_.PartComponent -match \u0027cimv2:(.+).Domain=\"(.+)\",Name=\"(.+)\"\u0027){$members=@();$members+=$Matches[1]+\";\"+$Matches[2]+\"\\\"+$Matches[3];$members}};@{\"List\"=$res;\"srv\"=\"AX-EX19-03\"}", "Name": "", @@ -21240,7 +21240,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "LocalAminGroup", "PSCmdL": "$res = Get-WmiObject -Class Win32_GroupUser -Filter \"GroupComponent=\"\"Win32_Group.Domain=\u0027AX-EX19-04\u0027,Name=\u0027Administrators\u0027\"\"\" -ComputerName AX-EX19-04 |% {if ($_.PartComponent -match \u0027cimv2:(.+).Domain=\"(.+)\",Name=\"(.+)\"\u0027){$members=@();$members+=$Matches[1]+\";\"+$Matches[2]+\"\\\"+$Matches[3];$members}};@{\"List\"=$res;\"srv\"=\"AX-EX19-04\"}", "Name": "", @@ -21254,7 +21254,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "LocalAminGroup", "PSCmdL": "$res = Get-WmiObject -Class Win32_GroupUser -Filter \"GroupComponent=\"\"Win32_Group.Domain=\u0027AX-EX19-04\u0027,Name=\u0027Administrators\u0027\"\"\" -ComputerName AX-EX19-04 |% {if ($_.PartComponent -match \u0027cimv2:(.+).Domain=\"(.+)\",Name=\"(.+)\"\u0027){$members=@();$members+=$Matches[1]+\";\"+$Matches[2]+\"\\\"+$Matches[3];$members}};@{\"List\"=$res;\"srv\"=\"AX-EX19-04\"}", "Name": "", @@ -21268,7 +21268,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "LocalAminGroup", "PSCmdL": "$res = Get-WmiObject -Class Win32_GroupUser -Filter \"GroupComponent=\"\"Win32_Group.Domain=\u0027AX-EX19-04\u0027,Name=\u0027Administrators\u0027\"\"\" -ComputerName AX-EX19-04 |% {if ($_.PartComponent -match \u0027cimv2:(.+).Domain=\"(.+)\",Name=\"(.+)\"\u0027){$members=@();$members+=$Matches[1]+\";\"+$Matches[2]+\"\\\"+$Matches[3];$members}};@{\"List\"=$res;\"srv\"=\"AX-EX19-04\"}", "Name": "", @@ -21282,7 +21282,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "LocalAminGroup", "PSCmdL": "$res = Get-WmiObject -Class Win32_GroupUser -Filter \"GroupComponent=\"\"Win32_Group.Domain=\u0027AX-EX19-04\u0027,Name=\u0027Administrators\u0027\"\"\" -ComputerName AX-EX19-04 |% {if ($_.PartComponent -match \u0027cimv2:(.+).Domain=\"(.+)\",Name=\"(.+)\"\u0027){$members=@();$members+=$Matches[1]+\";\"+$Matches[2]+\"\\\"+$Matches[3];$members}};@{\"List\"=$res;\"srv\"=\"AX-EX19-04\"}", "Name": "", @@ -21296,7 +21296,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "LocalAminGroup", "PSCmdL": "$res = Get-WmiObject -Class Win32_GroupUser -Filter \"GroupComponent=\"\"Win32_Group.Domain=\u0027AX-EX19-04\u0027,Name=\u0027Administrators\u0027\"\"\" -ComputerName AX-EX19-04 |% {if ($_.PartComponent -match \u0027cimv2:(.+).Domain=\"(.+)\",Name=\"(.+)\"\u0027){$members=@();$members+=$Matches[1]+\";\"+$Matches[2]+\"\\\"+$Matches[3];$members}};@{\"List\"=$res;\"srv\"=\"AX-EX19-04\"}", "Name": "", @@ -21310,7 +21310,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "LocalAminGroup", "PSCmdL": "$res = Get-WmiObject -Class Win32_GroupUser -Filter \"GroupComponent=\"\"Win32_Group.Domain=\u0027AX-EX19-04\u0027,Name=\u0027Administrators\u0027\"\"\" -ComputerName AX-EX19-04 |% {if ($_.PartComponent -match \u0027cimv2:(.+).Domain=\"(.+)\",Name=\"(.+)\"\u0027){$members=@();$members+=$Matches[1]+\";\"+$Matches[2]+\"\\\"+$Matches[3];$members}};@{\"List\"=$res;\"srv\"=\"AX-EX19-04\"}", "Name": "", @@ -21324,7 +21324,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "LocalAminGroup", "PSCmdL": "$res = Get-WmiObject -Class Win32_GroupUser -Filter \"GroupComponent=\"\"Win32_Group.Domain=\u0027AX-EX19-04\u0027,Name=\u0027Administrators\u0027\"\"\" -ComputerName AX-EX19-04 |% {if ($_.PartComponent -match \u0027cimv2:(.+).Domain=\"(.+)\",Name=\"(.+)\"\u0027){$members=@();$members+=$Matches[1]+\";\"+$Matches[2]+\"\\\"+$Matches[3];$members}};@{\"List\"=$res;\"srv\"=\"AX-EX19-04\"}", "Name": "", @@ -21338,7 +21338,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "LocalAminGroup", "PSCmdL": "$res = Get-WmiObject -Class Win32_GroupUser -Filter \"GroupComponent=\"\"Win32_Group.Domain=\u0027AX-EX19-04\u0027,Name=\u0027Administrators\u0027\"\"\" -ComputerName AX-EX19-04 |% {if ($_.PartComponent -match \u0027cimv2:(.+).Domain=\"(.+)\",Name=\"(.+)\"\u0027){$members=@();$members+=$Matches[1]+\";\"+$Matches[2]+\"\\\"+$Matches[3];$members}};@{\"List\"=$res;\"srv\"=\"AX-EX19-04\"}", "Name": "", @@ -21352,7 +21352,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "LocalAminGroup", "PSCmdL": "$res = Get-WmiObject -Class Win32_GroupUser -Filter \"GroupComponent=\"\"Win32_Group.Domain=\u0027AX-EX19-04\u0027,Name=\u0027Administrators\u0027\"\"\" -ComputerName AX-EX19-04 |% {if ($_.PartComponent -match \u0027cimv2:(.+).Domain=\"(.+)\",Name=\"(.+)\"\u0027){$members=@();$members+=$Matches[1]+\";\"+$Matches[2]+\"\\\"+$Matches[3];$members}};@{\"List\"=$res;\"srv\"=\"AX-EX19-04\"}", "Name": "", @@ -21366,7 +21366,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "LocalAminGroup", "PSCmdL": "$res = Get-WmiObject -Class Win32_GroupUser -Filter \"GroupComponent=\"\"Win32_Group.Domain=\u0027AX-EX19-04\u0027,Name=\u0027Administrators\u0027\"\"\" -ComputerName AX-EX19-04 |% {if ($_.PartComponent -match \u0027cimv2:(.+).Domain=\"(.+)\",Name=\"(.+)\"\u0027){$members=@();$members+=$Matches[1]+\";\"+$Matches[2]+\"\\\"+$Matches[3];$members}};@{\"List\"=$res;\"srv\"=\"AX-EX19-04\"}", "Name": "", @@ -21380,7 +21380,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "LocalAminGroup", "PSCmdL": "$res = Get-WmiObject -Class Win32_GroupUser -Filter \"GroupComponent=\"\"Win32_Group.Domain=\u0027AX-EX19-04\u0027,Name=\u0027Administrators\u0027\"\"\" -ComputerName AX-EX19-04 |% {if ($_.PartComponent -match \u0027cimv2:(.+).Domain=\"(.+)\",Name=\"(.+)\"\u0027){$members=@();$members+=$Matches[1]+\";\"+$Matches[2]+\"\\\"+$Matches[3];$members}};@{\"List\"=$res;\"srv\"=\"AX-EX19-04\"}", "Name": "", @@ -21394,7 +21394,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "LocalAminGroup", "PSCmdL": "$res = Get-WmiObject -Class Win32_GroupUser -Filter \"GroupComponent=\"\"Win32_Group.Domain=\u0027AX-EX19-04\u0027,Name=\u0027Administrators\u0027\"\"\" -ComputerName AX-EX19-04 |% {if ($_.PartComponent -match \u0027cimv2:(.+).Domain=\"(.+)\",Name=\"(.+)\"\u0027){$members=@();$members+=$Matches[1]+\";\"+$Matches[2]+\"\\\"+$Matches[3];$members}};@{\"List\"=$res;\"srv\"=\"AX-EX19-04\"}", "Name": "", @@ -21408,7 +21408,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "LocalAminGroup", "PSCmdL": "$res = Get-WmiObject -Class Win32_GroupUser -Filter \"GroupComponent=\"\"Win32_Group.Domain=\u0027AX-EX19-04\u0027,Name=\u0027Administrators\u0027\"\"\" -ComputerName AX-EX19-04 |% {if ($_.PartComponent -match \u0027cimv2:(.+).Domain=\"(.+)\",Name=\"(.+)\"\u0027){$members=@();$members+=$Matches[1]+\";\"+$Matches[2]+\"\\\"+$Matches[3];$members}};@{\"List\"=$res;\"srv\"=\"AX-EX19-04\"}", "Name": "", @@ -21422,7 +21422,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "LocalAminGroup", "PSCmdL": "$res = Get-WmiObject -Class Win32_GroupUser -Filter \"GroupComponent=\"\"Win32_Group.Domain=\u0027AX-EX19-04\u0027,Name=\u0027Administrators\u0027\"\"\" -ComputerName AX-EX19-04 |% {if ($_.PartComponent -match \u0027cimv2:(.+).Domain=\"(.+)\",Name=\"(.+)\"\u0027){$members=@();$members+=$Matches[1]+\";\"+$Matches[2]+\"\\\"+$Matches[3];$members}};@{\"List\"=$res;\"srv\"=\"AX-EX19-04\"}", "Name": "", @@ -21436,7 +21436,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "LocalAminGroup", "PSCmdL": "$res = Get-WmiObject -Class Win32_GroupUser -Filter \"GroupComponent=\"\"Win32_Group.Domain=\u0027AX-EX19-04\u0027,Name=\u0027Administrators\u0027\"\"\" -ComputerName AX-EX19-04 |% {if ($_.PartComponent -match \u0027cimv2:(.+).Domain=\"(.+)\",Name=\"(.+)\"\u0027){$members=@();$members+=$Matches[1]+\";\"+$Matches[2]+\"\\\"+$Matches[3];$members}};@{\"List\"=$res;\"srv\"=\"AX-EX19-04\"}", "Name": "", @@ -21450,7 +21450,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "LocalAminGroup", "PSCmdL": "$res = Get-WmiObject -Class Win32_GroupUser -Filter \"GroupComponent=\"\"Win32_Group.Domain=\u0027AX-EX19-04\u0027,Name=\u0027Administrators\u0027\"\"\" -ComputerName AX-EX19-04 |% {if ($_.PartComponent -match \u0027cimv2:(.+).Domain=\"(.+)\",Name=\"(.+)\"\u0027){$members=@();$members+=$Matches[1]+\";\"+$Matches[2]+\"\\\"+$Matches[3];$members}};@{\"List\"=$res;\"srv\"=\"AX-EX19-04\"}", "Name": "", @@ -21464,7 +21464,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "LocalAminGroup", "PSCmdL": "$res = Get-WmiObject -Class Win32_GroupUser -Filter \"GroupComponent=\"\"Win32_Group.Domain=\u0027AX-EX19-04\u0027,Name=\u0027Administrators\u0027\"\"\" -ComputerName AX-EX19-04 |% {if ($_.PartComponent -match \u0027cimv2:(.+).Domain=\"(.+)\",Name=\"(.+)\"\u0027){$members=@();$members+=$Matches[1]+\";\"+$Matches[2]+\"\\\"+$Matches[3];$members}};@{\"List\"=$res;\"srv\"=\"AX-EX19-04\"}", "Name": "", @@ -21478,7 +21478,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "LocalAminGroup", "PSCmdL": "$res = Get-WmiObject -Class Win32_GroupUser -Filter \"GroupComponent=\"\"Win32_Group.Domain=\u0027AX-EX19-04\u0027,Name=\u0027Administrators\u0027\"\"\" -ComputerName AX-EX19-04 |% {if ($_.PartComponent -match \u0027cimv2:(.+).Domain=\"(.+)\",Name=\"(.+)\"\u0027){$members=@();$members+=$Matches[1]+\";\"+$Matches[2]+\"\\\"+$Matches[3];$members}};@{\"List\"=$res;\"srv\"=\"AX-EX19-04\"}", "Name": "", @@ -21492,7 +21492,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "LocalAminGroup", "PSCmdL": "$res = Get-WmiObject -Class Win32_GroupUser -Filter \"GroupComponent=\"\"Win32_Group.Domain=\u0027AX-EX19-04\u0027,Name=\u0027Administrators\u0027\"\"\" -ComputerName AX-EX19-04 |% {if ($_.PartComponent -match \u0027cimv2:(.+).Domain=\"(.+)\",Name=\"(.+)\"\u0027){$members=@();$members+=$Matches[1]+\";\"+$Matches[2]+\"\\\"+$Matches[3];$members}};@{\"List\"=$res;\"srv\"=\"AX-EX19-04\"}", "Name": "", @@ -21506,7 +21506,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "LocalAminGroup", "PSCmdL": "$res = Get-WmiObject -Class Win32_GroupUser -Filter \"GroupComponent=\"\"Win32_Group.Domain=\u0027AX-EX19-04\u0027,Name=\u0027Administrators\u0027\"\"\" -ComputerName AX-EX19-04 |% {if ($_.PartComponent -match \u0027cimv2:(.+).Domain=\"(.+)\",Name=\"(.+)\"\u0027){$members=@();$members+=$Matches[1]+\";\"+$Matches[2]+\"\\\"+$Matches[3];$members}};@{\"List\"=$res;\"srv\"=\"AX-EX19-04\"}", "Name": "", @@ -21520,7 +21520,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "LocalAminGroup", "PSCmdL": "$res = Get-WmiObject -Class Win32_GroupUser -Filter \"GroupComponent=\"\"Win32_Group.Domain=\u0027AX-EX19-04\u0027,Name=\u0027Administrators\u0027\"\"\" -ComputerName AX-EX19-04 |% {if ($_.PartComponent -match \u0027cimv2:(.+).Domain=\"(.+)\",Name=\"(.+)\"\u0027){$members=@();$members+=$Matches[1]+\";\"+$Matches[2]+\"\\\"+$Matches[3];$members}};@{\"List\"=$res;\"srv\"=\"AX-EX19-04\"}", "Name": "", @@ -21534,7 +21534,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "LocalAminGroup", "PSCmdL": "$res = Get-WmiObject -Class Win32_GroupUser -Filter \"GroupComponent=\"\"Win32_Group.Domain=\u0027AX-EX19-04\u0027,Name=\u0027Administrators\u0027\"\"\" -ComputerName AX-EX19-04 |% {if ($_.PartComponent -match \u0027cimv2:(.+).Domain=\"(.+)\",Name=\"(.+)\"\u0027){$members=@();$members+=$Matches[1]+\";\"+$Matches[2]+\"\\\"+$Matches[3];$members}};@{\"List\"=$res;\"srv\"=\"AX-EX19-04\"}", "Name": "", @@ -21548,7 +21548,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "LocalAminGroup", "PSCmdL": "$res = Get-WmiObject -Class Win32_GroupUser -Filter \"GroupComponent=\"\"Win32_Group.Domain=\u0027AX-EX19-04\u0027,Name=\u0027Administrators\u0027\"\"\" -ComputerName AX-EX19-04 |% {if ($_.PartComponent -match \u0027cimv2:(.+).Domain=\"(.+)\",Name=\"(.+)\"\u0027){$members=@();$members+=$Matches[1]+\";\"+$Matches[2]+\"\\\"+$Matches[3];$members}};@{\"List\"=$res;\"srv\"=\"AX-EX19-04\"}", "Name": "", @@ -21562,7 +21562,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "LocalAminGroup", "PSCmdL": "$res = Get-WmiObject -Class Win32_GroupUser -Filter \"GroupComponent=\"\"Win32_Group.Domain=\u0027AX-EX19-04\u0027,Name=\u0027Administrators\u0027\"\"\" -ComputerName AX-EX19-04 |% {if ($_.PartComponent -match \u0027cimv2:(.+).Domain=\"(.+)\",Name=\"(.+)\"\u0027){$members=@();$members+=$Matches[1]+\";\"+$Matches[2]+\"\\\"+$Matches[3];$members}};@{\"List\"=$res;\"srv\"=\"AX-EX19-04\"}", "Name": "", @@ -21576,7 +21576,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "LocalAminGroup", "PSCmdL": "$res = Get-WmiObject -Class Win32_GroupUser -Filter \"GroupComponent=\"\"Win32_Group.Domain=\u0027AX-EX19-04\u0027,Name=\u0027Administrators\u0027\"\"\" -ComputerName AX-EX19-04 |% {if ($_.PartComponent -match \u0027cimv2:(.+).Domain=\"(.+)\",Name=\"(.+)\"\u0027){$members=@();$members+=$Matches[1]+\";\"+$Matches[2]+\"\\\"+$Matches[3];$members}};@{\"List\"=$res;\"srv\"=\"AX-EX19-04\"}", "Name": "", @@ -21590,7 +21590,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "LocalAminGroup", "PSCmdL": "$res = Get-WmiObject -Class Win32_GroupUser -Filter \"GroupComponent=\"\"Win32_Group.Domain=\u0027AX-EX19-04\u0027,Name=\u0027Administrators\u0027\"\"\" -ComputerName AX-EX19-04 |% {if ($_.PartComponent -match \u0027cimv2:(.+).Domain=\"(.+)\",Name=\"(.+)\"\u0027){$members=@();$members+=$Matches[1]+\";\"+$Matches[2]+\"\\\"+$Matches[3];$members}};@{\"List\"=$res;\"srv\"=\"AX-EX19-04\"}", "Name": "", @@ -21604,7 +21604,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "LocalAminGroup", "PSCmdL": "$res = Get-WmiObject -Class Win32_GroupUser -Filter \"GroupComponent=\"\"Win32_Group.Domain=\u0027AX-EX19-04\u0027,Name=\u0027Administrators\u0027\"\"\" -ComputerName AX-EX19-04 |% {if ($_.PartComponent -match \u0027cimv2:(.+).Domain=\"(.+)\",Name=\"(.+)\"\u0027){$members=@();$members+=$Matches[1]+\";\"+$Matches[2]+\"\\\"+$Matches[3];$members}};@{\"List\"=$res;\"srv\"=\"AX-EX19-04\"}", "Name": "", @@ -21618,7 +21618,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "LocalAminGroup", "PSCmdL": "$res = Get-WmiObject -Class Win32_GroupUser -Filter \"GroupComponent=\"\"Win32_Group.Domain=\u0027AX-EX19-04\u0027,Name=\u0027Administrators\u0027\"\"\" -ComputerName AX-EX19-04 |% {if ($_.PartComponent -match \u0027cimv2:(.+).Domain=\"(.+)\",Name=\"(.+)\"\u0027){$members=@();$members+=$Matches[1]+\";\"+$Matches[2]+\"\\\"+$Matches[3];$members}};@{\"List\"=$res;\"srv\"=\"AX-EX19-04\"}", "Name": "", @@ -21632,7 +21632,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "LocalAminGroup", "PSCmdL": "$res = Get-WmiObject -Class Win32_GroupUser -Filter \"GroupComponent=\"\"Win32_Group.Domain=\u0027AX-EX19-04\u0027,Name=\u0027Administrators\u0027\"\"\" -ComputerName AX-EX19-04 |% {if ($_.PartComponent -match \u0027cimv2:(.+).Domain=\"(.+)\",Name=\"(.+)\"\u0027){$members=@();$members+=$Matches[1]+\";\"+$Matches[2]+\"\\\"+$Matches[3];$members}};@{\"List\"=$res;\"srv\"=\"AX-EX19-04\"}", "Name": "", @@ -21646,7 +21646,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "LocalAminGroup", "PSCmdL": "$res = Get-WmiObject -Class Win32_GroupUser -Filter \"GroupComponent=\"\"Win32_Group.Domain=\u0027AX-EX19-04\u0027,Name=\u0027Administrators\u0027\"\"\" -ComputerName AX-EX19-04 |% {if ($_.PartComponent -match \u0027cimv2:(.+).Domain=\"(.+)\",Name=\"(.+)\"\u0027){$members=@();$members+=$Matches[1]+\";\"+$Matches[2]+\"\\\"+$Matches[3];$members}};@{\"List\"=$res;\"srv\"=\"AX-EX19-04\"}", "Name": "", @@ -21660,7 +21660,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "LocalAminGroup", "PSCmdL": "$res = Get-WmiObject -Class Win32_GroupUser -Filter \"GroupComponent=\"\"Win32_Group.Domain=\u0027AX-EX19-04\u0027,Name=\u0027Administrators\u0027\"\"\" -ComputerName AX-EX19-04 |% {if ($_.PartComponent -match \u0027cimv2:(.+).Domain=\"(.+)\",Name=\"(.+)\"\u0027){$members=@();$members+=$Matches[1]+\";\"+$Matches[2]+\"\\\"+$Matches[3];$members}};@{\"List\"=$res;\"srv\"=\"AX-EX19-04\"}", "Name": "", @@ -21674,7 +21674,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "LocalAminGroup", "PSCmdL": "$res = Get-WmiObject -Class Win32_GroupUser -Filter \"GroupComponent=\"\"Win32_Group.Domain=\u0027AX-EX19-04\u0027,Name=\u0027Administrators\u0027\"\"\" -ComputerName AX-EX19-04 |% {if ($_.PartComponent -match \u0027cimv2:(.+).Domain=\"(.+)\",Name=\"(.+)\"\u0027){$members=@();$members+=$Matches[1]+\";\"+$Matches[2]+\"\\\"+$Matches[3];$members}};@{\"List\"=$res;\"srv\"=\"AX-EX19-04\"}", "Name": "", @@ -21688,7 +21688,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "LocalAminGroup", "PSCmdL": "$res = Get-WmiObject -Class Win32_GroupUser -Filter \"GroupComponent=\"\"Win32_Group.Domain=\u0027AX-EX19-04\u0027,Name=\u0027Administrators\u0027\"\"\" -ComputerName AX-EX19-04 |% {if ($_.PartComponent -match \u0027cimv2:(.+).Domain=\"(.+)\",Name=\"(.+)\"\u0027){$members=@();$members+=$Matches[1]+\";\"+$Matches[2]+\"\\\"+$Matches[3];$members}};@{\"List\"=$res;\"srv\"=\"AX-EX19-04\"}", "Name": "", @@ -21702,7 +21702,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "LocalAminGroup", "PSCmdL": "$res = Get-WmiObject -Class Win32_GroupUser -Filter \"GroupComponent=\"\"Win32_Group.Domain=\u0027AX-EX19-04\u0027,Name=\u0027Administrators\u0027\"\"\" -ComputerName AX-EX19-04 |% {if ($_.PartComponent -match \u0027cimv2:(.+).Domain=\"(.+)\",Name=\"(.+)\"\u0027){$members=@();$members+=$Matches[1]+\";\"+$Matches[2]+\"\\\"+$Matches[3];$members}};@{\"List\"=$res;\"srv\"=\"AX-EX19-04\"}", "Name": "", @@ -21716,7 +21716,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "LocalAminGroup", "PSCmdL": "$res = Get-WmiObject -Class Win32_GroupUser -Filter \"GroupComponent=\"\"Win32_Group.Domain=\u0027AX-EX19-04\u0027,Name=\u0027Administrators\u0027\"\"\" -ComputerName AX-EX19-04 |% {if ($_.PartComponent -match \u0027cimv2:(.+).Domain=\"(.+)\",Name=\"(.+)\"\u0027){$members=@();$members+=$Matches[1]+\";\"+$Matches[2]+\"\\\"+$Matches[3];$members}};@{\"List\"=$res;\"srv\"=\"AX-EX19-04\"}", "Name": "", @@ -21730,7 +21730,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "LocalAminGroup", "PSCmdL": "$res = Get-WmiObject -Class Win32_GroupUser -Filter \"GroupComponent=\"\"Win32_Group.Domain=\u0027AX-EX19-04\u0027,Name=\u0027Administrators\u0027\"\"\" -ComputerName AX-EX19-04 |% {if ($_.PartComponent -match \u0027cimv2:(.+).Domain=\"(.+)\",Name=\"(.+)\"\u0027){$members=@();$members+=$Matches[1]+\";\"+$Matches[2]+\"\\\"+$Matches[3];$members}};@{\"List\"=$res;\"srv\"=\"AX-EX19-04\"}", "Name": "", @@ -21744,7 +21744,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "LocalAminGroup", "PSCmdL": "$res = Get-WmiObject -Class Win32_GroupUser -Filter \"GroupComponent=\"\"Win32_Group.Domain=\u0027AX-EX19-04\u0027,Name=\u0027Administrators\u0027\"\"\" -ComputerName AX-EX19-04 |% {if ($_.PartComponent -match \u0027cimv2:(.+).Domain=\"(.+)\",Name=\"(.+)\"\u0027){$members=@();$members+=$Matches[1]+\";\"+$Matches[2]+\"\\\"+$Matches[3];$members}};@{\"List\"=$res;\"srv\"=\"AX-EX19-04\"}", "Name": "", @@ -21758,7 +21758,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "LocalAminGroup", "PSCmdL": "$res = Get-WmiObject -Class Win32_GroupUser -Filter \"GroupComponent=\"\"Win32_Group.Domain=\u0027AX-EX19-04\u0027,Name=\u0027Administrators\u0027\"\"\" -ComputerName AX-EX19-04 |% {if ($_.PartComponent -match \u0027cimv2:(.+).Domain=\"(.+)\",Name=\"(.+)\"\u0027){$members=@();$members+=$Matches[1]+\";\"+$Matches[2]+\"\\\"+$Matches[3];$members}};@{\"List\"=$res;\"srv\"=\"AX-EX19-04\"}", "Name": "", @@ -21772,7 +21772,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "LocalAminGroup", "PSCmdL": "$res = Get-WmiObject -Class Win32_GroupUser -Filter \"GroupComponent=\"\"Win32_Group.Domain=\u0027AX-EX19-04\u0027,Name=\u0027Administrators\u0027\"\"\" -ComputerName AX-EX19-04 |% {if ($_.PartComponent -match \u0027cimv2:(.+).Domain=\"(.+)\",Name=\"(.+)\"\u0027){$members=@();$members+=$Matches[1]+\";\"+$Matches[2]+\"\\\"+$Matches[3];$members}};@{\"List\"=$res;\"srv\"=\"AX-EX19-04\"}", "Name": "", @@ -21786,7 +21786,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "LocalAminGroup", "PSCmdL": "$res = Get-WmiObject -Class Win32_GroupUser -Filter \"GroupComponent=\"\"Win32_Group.Domain=\u0027AX-EX19-04\u0027,Name=\u0027Administrators\u0027\"\"\" -ComputerName AX-EX19-04 |% {if ($_.PartComponent -match \u0027cimv2:(.+).Domain=\"(.+)\",Name=\"(.+)\"\u0027){$members=@();$members+=$Matches[1]+\";\"+$Matches[2]+\"\\\"+$Matches[3];$members}};@{\"List\"=$res;\"srv\"=\"AX-EX19-04\"}", "Name": "", @@ -21800,7 +21800,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "LocalAminGroup", "PSCmdL": "$res = Get-WmiObject -Class Win32_GroupUser -Filter \"GroupComponent=\"\"Win32_Group.Domain=\u0027AX-EX19-04\u0027,Name=\u0027Administrators\u0027\"\"\" -ComputerName AX-EX19-04 |% {if ($_.PartComponent -match \u0027cimv2:(.+).Domain=\"(.+)\",Name=\"(.+)\"\u0027){$members=@();$members+=$Matches[1]+\";\"+$Matches[2]+\"\\\"+$Matches[3];$members}};@{\"List\"=$res;\"srv\"=\"AX-EX19-04\"}", "Name": "", @@ -21814,7 +21814,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "ReceiveConnector", "PSCmdL": "Get-ReceiveConnector", "Name": "Outbound Proxy Frontend AX-EX19-01", @@ -21828,7 +21828,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "ReceiveConnector", "PSCmdL": "Get-ReceiveConnector", "Name": "Client Frontend AX-EX19-01", @@ -21842,7 +21842,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "ReceiveConnector", "PSCmdL": "Get-ReceiveConnector", "Name": "RC-OR", @@ -21856,7 +21856,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "ReceiveConnector", "PSCmdL": "Get-ReceiveConnector", "Name": "Default AX-EX19-01", @@ -21870,7 +21870,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "ReceiveConnector", "PSCmdL": "Get-ReceiveConnector", "Name": "Client Proxy AX-EX19-01", @@ -21884,7 +21884,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "ReceiveConnector", "PSCmdL": "Get-ReceiveConnector", "Name": "Default Frontend AX-EX19-01", @@ -21898,7 +21898,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "ReceiveConnector", "PSCmdL": "Get-ReceiveConnector", "Name": "Client Frontend AX-EX19-02", @@ -21912,7 +21912,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "ReceiveConnector", "PSCmdL": "Get-ReceiveConnector", "Name": "O365 RC", @@ -21926,7 +21926,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "ReceiveConnector", "PSCmdL": "Get-ReceiveConnector", "Name": "Outbound Proxy Frontend AX-EX19-02", @@ -21940,7 +21940,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "ReceiveConnector", "PSCmdL": "Get-ReceiveConnector", "Name": "Default AX-EX19-02", @@ -21954,7 +21954,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "ReceiveConnector", "PSCmdL": "Get-ReceiveConnector", "Name": "Client Proxy AX-EX19-02", @@ -21968,7 +21968,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "ReceiveConnector", "PSCmdL": "Get-ReceiveConnector", "Name": "Default Frontend AX-EX19-02", @@ -21982,7 +21982,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "ReceiveConnector", "PSCmdL": "Get-ReceiveConnector", "Name": "Client Frontend AX-EX19-03", @@ -21996,7 +21996,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "ReceiveConnector", "PSCmdL": "Get-ReceiveConnector", "Name": "RC-OR", @@ -22010,7 +22010,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "ReceiveConnector", "PSCmdL": "Get-ReceiveConnector", "Name": "Client Proxy AX-EX19-03", @@ -22024,7 +22024,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "ReceiveConnector", "PSCmdL": "Get-ReceiveConnector", "Name": "Default Frontend AX-EX19-03", @@ -22038,7 +22038,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "ReceiveConnector", "PSCmdL": "Get-ReceiveConnector", "Name": "Default AX-EX19-03", @@ -22052,7 +22052,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "ReceiveConnector", "PSCmdL": "Get-ReceiveConnector", "Name": "Outbound Proxy Frontend AX-EX19-03", @@ -22066,7 +22066,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "ReceiveConnector", "PSCmdL": "Get-ReceiveConnector", "Name": "Application Receive Connector", @@ -22080,7 +22080,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "ReceiveConnector", "PSCmdL": "Get-ReceiveConnector", "Name": "Client Frontend AX-EX19-04", @@ -22094,7 +22094,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "ReceiveConnector", "PSCmdL": "Get-ReceiveConnector", "Name": "Client Proxy AX-EX19-04", @@ -22108,7 +22108,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "ReceiveConnector", "PSCmdL": "Get-ReceiveConnector", "Name": "Default AX-EX19-04", @@ -22122,7 +22122,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "ReceiveConnector", "PSCmdL": "Get-ReceiveConnector", "Name": "Outbound Proxy Frontend AX-EX19-04", @@ -22136,7 +22136,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "ReceiveConnector", "PSCmdL": "Get-ReceiveConnector", "Name": "Default Frontend AX-EX19-04", @@ -22150,7 +22150,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "TransportRule", "PSCmdL": "Get-TransportRule", "Name": "", @@ -22164,7 +22164,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "JournalRule", "PSCmdL": "Get-JournalRule", "Name": "", @@ -22178,7 +22178,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "TransportConfig", "PSCmdL": "Get-TransportConfig", "Name": "", @@ -22192,7 +22192,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "SendConnector", "PSCmdL": "Get-Sendconnector", "Name": "fabrikam.net", @@ -22206,7 +22206,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "SendConnector", "PSCmdL": "Get-Sendconnector", "Name": "EdgeSync - Default-First-Site-Name to Internet", @@ -22220,7 +22220,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "SendConnector", "PSCmdL": "Get-Sendconnector", "Name": "EdgeSync - Inbound to Default-First-Site-Name", @@ -22234,7 +22234,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "SendConnector", "PSCmdL": "Get-Sendconnector", "Name": "Internet contosolife to Office 365", @@ -22248,7 +22248,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "SendConnector", "PSCmdL": "Get-Sendconnector", "Name": "Outbound to Office 365 - 584b63c9-db0e-41c2-a087-09a0ed9124f0", @@ -22262,7 +22262,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "SendConnector", "PSCmdL": "Get-Sendconnector", "Name": "To Internet", @@ -22276,7 +22276,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "TransportPipeline", "PSCmdL": "Get-Transportservice", "Name": "", @@ -22290,7 +22290,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "TransportPipeline", "PSCmdL": "Get-Transportservice", "Name": "", @@ -22304,7 +22304,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "TransportPipeline", "PSCmdL": "Get-Transportservice", "Name": "", @@ -22318,7 +22318,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "TransportPipeline", "PSCmdL": "Get-Transportservice", "Name": "", @@ -22332,7 +22332,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "TransportPipeline", "PSCmdL": "Get-Transportservice", "Name": "", @@ -22346,7 +22346,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "RCAnonymous", "PSCmdL": "Get-ReceiveConnector | Get-ADPermission | ? {$_.ExtendedRights -like \"ms-Exch-SMTP-Accept-Any-Recipient\" -and $_.User -like \"*NT AUTHORITY\\ANONYMOUS LOGON*\"}", "Name": "", @@ -22360,7 +22360,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "RCAnonymous", "PSCmdL": "Get-ReceiveConnector | Get-ADPermission | ? {$_.ExtendedRights -like \"ms-Exch-SMTP-Accept-Any-Recipient\" -and $_.User -like \"*NT AUTHORITY\\ANONYMOUS LOGON*\"}", "Name": "", diff --git a/Sample Data/Custom/ESI-HttpProxyLogs-CSV.txt b/Sample Data/Custom/ESI-HttpProxyLogs-CSV.txt index 83e01461b26..29f55a5e6c8 100644 --- a/Sample Data/Custom/ESI-HttpProxyLogs-CSV.txt +++ b/Sample Data/Custom/ESI-HttpProxyLogs-CSV.txt @@ -1,73 +1,73 @@ DateTime,RequestId,MajorVersion,MinorVersion,BuildVersion,RevisionVersion,ClientRequestId,Protocol,UrlHost,UrlStem,ProtocolAction,AuthenticationType,IsAuthenticated,AuthenticatedUser,Organization,AnchorMailbox,UserAgent,ClientIpAddress,ServerHostName,HttpStatus,BackEndStatus,ErrorCode,Method,ProxyAction,TargetServer,TargetServerVersion,RoutingType,RoutingHint,BackEndCookie,ServerLocatorHost,ServerLocatorLatency,RequestBytes,ResponseBytes,TargetOutstandingRequests,AuthModulePerfContext,HttpPipelineLatency,CalculateTargetBackEndLatency,GlsLatencyBreakup,TotalGlsLatency,AccountForestLatencyBreakup,TotalAccountForestLatency,ResourceForestLatencyBreakup,TotalResourceForestLatency,ADLatency,SharedCacheLatencyBreakup,TotalSharedCacheLatency,ActivityContextLifeTime,ModuleToHandlerSwitchingLatency,ClientReqStreamLatency,BackendReqInitLatency,BackendReqStreamLatency,BackendProcessingLatency,BackendRespInitLatency,BackendRespStreamLatency,ClientRespStreamLatency,KerberosAuthHeaderLatency,HandlerCompletionLatency,RequestHandlerLatency,HandlerToModuleSwitchingLatency,ProxyTime,CoreLatency,RoutingLatency,HttpProxyOverhead,TotalRequestTime,RouteRefresherLatency,UrlQuery,BackEndGenericInfo,GenericInfo,GenericErrors,EdgeTraceId,DatabaseGuid,UserADObjectGuid,PartitionEndpointLookupLatency,RoutingStatus -2023-02-08T00:00:03.324Z,26dd3d37-651e-43e9-a928-fad7f55eec30,15,2,1118,20,,Autodiscover,localhost,/AutoDiscover/,,Negotiate,true,RES\HealthMailbox501a219,,Sid~S-1-5-21-434387928-2799628836-4171586136-1619,AMProbe/Local/ClientAccess,::1,TS-EX19-04,200,,,GET,Proxy,TS-EX19-04.res.contoso.com,15.02.1118.000,IntraForest,WindowsIdentity,,,,0,,,,1,0,,0,,0,,0,0,,0,2,0,,,,,,,,,0,0,0,,0,,1,1,,,,BeginRequest=2023-02-08T00:00:03.323Z;CorrelationID=;ProxyState-Run=None;FEAuth=BEVersion-1942127710;ProxyState-Complete=PrepareServerRequest;SharedCacheGuard=0;EndRequest=2023-02-08T00:00:03.324Z;,,,|RoutingDB:ea58efbd-ca6c-4d7d-b738-383065284040,,,CafeV1 -2023-02-08T00:01:04.313Z,2a5d89d4-d393-4bab-8a42-c634dde3f7d1,15,2,1118,20,,Autodiscover,localhost,/AutoDiscover/,,Negotiate,true,RES\HealthMailbox866bb29,,Sid~S-1-5-21-434387928-2799628836-4171586136-1129,AMProbe/Local/ClientAccess,127.0.0.1,TS-EX19-04,200,,,GET,Proxy,TS-EX19-02.res.contoso.com,15.02.1118.000,IntraForest,WindowsIdentity,,,,0,,,,1,0,,0,,0,,0,0,,0,2,0,,,,,,,,,0,0,0,,0,,1,1,,,,BeginRequest=2023-02-08T00:01:04.311Z;CorrelationID=;ProxyState-Run=None;FEAuth=BEVersion-1942127710;ProxyState-Complete=PrepareServerRequest;SharedCacheGuard=0;EndRequest=2023-02-08T00:01:04.313Z;,,,|RoutingDB:ee8ad99c-fbcb-45c2-939e-81869b5ee059,,,CafeV1 -2023-02-08T00:02:01.046Z,caf00545-8fcd-4a89-ad02-3815f2051fc6,15,2,1118,20,,Autodiscover,localhost,/AutoDiscover/,,Negotiate,true,RES\HealthMailbox501a219,,Sid~S-1-5-21-434387928-2799628836-4171586136-1619,AMProbe/Local/ClientAccess,::1,TS-EX19-04,200,,,GET,Proxy,TS-EX19-04.res.contoso.com,15.02.1118.000,IntraForest,WindowsIdentity,,,,0,,,,1,0,,0,,0,,0,0,,0,4,0,,,,,,,,,0,0,0,,0,,1,1,,,,BeginRequest=2023-02-08T00:02:01.045Z;CorrelationID=;ProxyState-Run=None;FEAuth=BEVersion-1942127710;ProxyState-Complete=PrepareServerRequest;SharedCacheGuard=0;EndRequest=2023-02-08T00:02:01.046Z;,,,|RoutingDB:ea58efbd-ca6c-4d7d-b738-383065284040,,,CafeV1 -2023-02-08T00:03:01.052Z,dfc399e6-b77c-4b82-9f55-bd6c22d3400b,15,2,1118,20,,Autodiscover,localhost,/AutoDiscover/,,Negotiate,true,RES\HealthMailbox96881f2,,Sid~S-1-5-21-434387928-2799628836-4171586136-1618,AMProbe/Local/ClientAccess,127.0.0.1,TS-EX19-04,200,,,GET,Proxy,TS-EX19-03.res.contoso.com,15.02.1118.000,IntraForest,WindowsIdentity,,,,0,,,,0,0,,0,,0,,0,0,,0,3,0,,,,,,,,,0,0,2,,2,,2,2,,,,BeginRequest=2023-02-08T00:03:01.049Z;CorrelationID=;ProxyState-Run=None;FEAuth=BEVersion-1942127710;ProxyState-Complete=PrepareServerRequest;SharedCacheGuard=0;EndRequest=2023-02-08T00:03:01.052Z;,,,|RoutingDB:7b922fbc-5b8f-496b-be13-ccc0a9fd6a7a,,,CafeV1 -2023-02-08T00:04:01.176Z,1c86edef-7196-49cb-829b-f6af9346ea81,15,2,1118,20,,Autodiscover,localhost,/AutoDiscover/,,Negotiate,true,RES\HealthMailbox356d248,,Sid~S-1-5-21-434387928-2799628836-4171586136-1617,AMProbe/Local/ClientAccess,::1,TS-EX19-04,200,,,GET,Proxy,TS-EX19-01.res.contoso.com,15.02.1118.000,IntraForest,WindowsIdentity,,,,0,,,,1,0,,0,,0,,0,0,,0,5,0,,,,,,,,,0,1,1,,2,,3,3,,,,BeginRequest=2023-02-08T00:04:01.173Z;CorrelationID=;ProxyState-Run=None;FEAuth=BEVersion-1942127710;ProxyState-Complete=PrepareServerRequest;SharedCacheGuard=0;EndRequest=2023-02-08T00:04:01.176Z;,,,|RoutingDB:399bc9b2-7312-46e0-8181-fee7a0ffeaf8,,,CafeV1 +2023-08-27T00:00:03.324Z,26dd3d37-651e-43e9-a928-fad7f55eec30,15,2,1118,20,,Autodiscover,localhost,/AutoDiscover/,,Negotiate,true,RES\HealthMailbox501a219,,Sid~S-1-5-21-434387928-2799628836-4171586136-1619,AMProbe/Local/ClientAccess,::1,TS-EX19-04,200,,,GET,Proxy,TS-EX19-04.res.contoso.com,15.02.1118.000,IntraForest,WindowsIdentity,,,,0,,,,1,0,,0,,0,,0,0,,0,2,0,,,,,,,,,0,0,0,,0,,1,1,,,,BeginRequest=2023-08-27T00:00:03.323Z;CorrelationID=;ProxyState-Run=None;FEAuth=BEVersion-1942127710;ProxyState-Complete=PrepareServerRequest;SharedCacheGuard=0;EndRequest=2023-08-27T00:00:03.324Z;,,,|RoutingDB:ea58efbd-ca6c-4d7d-b738-383065284040,,,CafeV1 +2023-08-27T00:01:04.313Z,2a5d89d4-d393-4bab-8a42-c634dde3f7d1,15,2,1118,20,,Autodiscover,localhost,/AutoDiscover/,,Negotiate,true,RES\HealthMailbox866bb29,,Sid~S-1-5-21-434387928-2799628836-4171586136-1129,AMProbe/Local/ClientAccess,127.0.0.1,TS-EX19-04,200,,,GET,Proxy,TS-EX19-02.res.contoso.com,15.02.1118.000,IntraForest,WindowsIdentity,,,,0,,,,1,0,,0,,0,,0,0,,0,2,0,,,,,,,,,0,0,0,,0,,1,1,,,,BeginRequest=2023-08-27T00:01:04.311Z;CorrelationID=;ProxyState-Run=None;FEAuth=BEVersion-1942127710;ProxyState-Complete=PrepareServerRequest;SharedCacheGuard=0;EndRequest=2023-08-27T00:01:04.313Z;,,,|RoutingDB:ee8ad99c-fbcb-45c2-939e-81869b5ee059,,,CafeV1 +2023-08-27T00:02:01.046Z,caf00545-8fcd-4a89-ad02-3815f2051fc6,15,2,1118,20,,Autodiscover,localhost,/AutoDiscover/,,Negotiate,true,RES\HealthMailbox501a219,,Sid~S-1-5-21-434387928-2799628836-4171586136-1619,AMProbe/Local/ClientAccess,::1,TS-EX19-04,200,,,GET,Proxy,TS-EX19-04.res.contoso.com,15.02.1118.000,IntraForest,WindowsIdentity,,,,0,,,,1,0,,0,,0,,0,0,,0,4,0,,,,,,,,,0,0,0,,0,,1,1,,,,BeginRequest=2023-08-27T00:02:01.045Z;CorrelationID=;ProxyState-Run=None;FEAuth=BEVersion-1942127710;ProxyState-Complete=PrepareServerRequest;SharedCacheGuard=0;EndRequest=2023-08-27T00:02:01.046Z;,,,|RoutingDB:ea58efbd-ca6c-4d7d-b738-383065284040,,,CafeV1 +2023-08-27T00:03:01.052Z,dfc399e6-b77c-4b82-9f55-bd6c22d3400b,15,2,1118,20,,Autodiscover,localhost,/AutoDiscover/,,Negotiate,true,RES\HealthMailbox96881f2,,Sid~S-1-5-21-434387928-2799628836-4171586136-1618,AMProbe/Local/ClientAccess,127.0.0.1,TS-EX19-04,200,,,GET,Proxy,TS-EX19-03.res.contoso.com,15.02.1118.000,IntraForest,WindowsIdentity,,,,0,,,,0,0,,0,,0,,0,0,,0,3,0,,,,,,,,,0,0,2,,2,,2,2,,,,BeginRequest=2023-08-27T00:03:01.049Z;CorrelationID=;ProxyState-Run=None;FEAuth=BEVersion-1942127710;ProxyState-Complete=PrepareServerRequest;SharedCacheGuard=0;EndRequest=2023-08-27T00:03:01.052Z;,,,|RoutingDB:7b922fbc-5b8f-496b-be13-ccc0a9fd6a7a,,,CafeV1 +2023-08-27T00:04:01.176Z,1c86edef-7196-49cb-829b-f6af9346ea81,15,2,1118,20,,Autodiscover,localhost,/AutoDiscover/,,Negotiate,true,RES\HealthMailbox356d248,,Sid~S-1-5-21-434387928-2799628836-4171586136-1617,AMProbe/Local/ClientAccess,::1,TS-EX19-04,200,,,GET,Proxy,TS-EX19-01.res.contoso.com,15.02.1118.000,IntraForest,WindowsIdentity,,,,0,,,,1,0,,0,,0,,0,0,,0,5,0,,,,,,,,,0,1,1,,2,,3,3,,,,BeginRequest=2023-08-27T00:04:01.173Z;CorrelationID=;ProxyState-Run=None;FEAuth=BEVersion-1942127710;ProxyState-Complete=PrepareServerRequest;SharedCacheGuard=0;EndRequest=2023-08-27T00:04:01.176Z;,,,|RoutingDB:399bc9b2-7312-46e0-8181-fee7a0ffeaf8,,,CafeV1 ,bc51cc91-49b9-4da6-ac2d-70263338196a,15,2,1118,20,,,,,,,,,,,,,TS-EX19-04,,,,,,,,,,,,,,,,,,,,,,,,,,,,600011,,,,,,,,,,,,,,,,,,,,,S:ActivityStandardMetadata.Action=GlobalActivity,,,,,, -2023-02-08T00:05:01.204Z,d91edba7-e75c-4cf8-b371-d11938acea46,15,2,1118,20,,Autodiscover,localhost,/AutoDiscover/,,Negotiate,true,RES\HealthMailbox866bb29,,Sid~S-1-5-21-434387928-2799628836-4171586136-1129,AMProbe/Local/ClientAccess,::1,TS-EX19-04,200,,,GET,Proxy,TS-EX19-02.res.contoso.com,15.02.1118.000,IntraForest,WindowsIdentity,,,,0,,,,1,0,,0,,0,,0,0,,0,2,0,,,,,,,,,0,0,0,,0,,1,1,,,,BeginRequest=2023-02-08T00:05:01.202Z;CorrelationID=;ProxyState-Run=None;FEAuth=BEVersion-1942127710;ProxyState-Complete=PrepareServerRequest;SharedCacheGuard=0;EndRequest=2023-02-08T00:05:01.204Z;,,,|RoutingDB:ee8ad99c-fbcb-45c2-939e-81869b5ee059,,,CafeV1 -2023-02-08T00:06:01.186Z,7904232f-acc3-4765-83c8-d21e464ad802,15,2,1118,20,,Autodiscover,localhost,/AutoDiscover/,,Negotiate,true,RES\HealthMailbox356d248,,Sid~S-1-5-21-434387928-2799628836-4171586136-1617,AMProbe/Local/ClientAccess,::1,TS-EX19-04,200,,,GET,Proxy,TS-EX19-01.res.contoso.com,15.02.1118.000,IntraForest,WindowsIdentity,,,,0,,,,1,0,,0,,0,,0,0,,0,4,0,,,,,,,,,0,0,2,,2,,3,3,,,,BeginRequest=2023-02-08T00:06:01.183Z;CorrelationID=;ProxyState-Run=None;FEAuth=BEVersion-1942127710;ProxyState-Complete=PrepareServerRequest;SharedCacheGuard=0;EndRequest=2023-02-08T00:06:01.186Z;,,,|RoutingDB:399bc9b2-7312-46e0-8181-fee7a0ffeaf8,,,CafeV1 -2023-02-08T00:07:01.222Z,f8049135-10a6-4d6d-b62b-a1eff1e1dfc7,15,2,1118,20,,Autodiscover,localhost,/AutoDiscover/,,Negotiate,true,RES\HealthMailbox866bb29,,Sid~S-1-5-21-434387928-2799628836-4171586136-1129,AMProbe/Local/ClientAccess,127.0.0.1,TS-EX19-04,200,,,GET,Proxy,TS-EX19-02.res.contoso.com,15.02.1118.000,IntraForest,WindowsIdentity,,,,0,,,,1,0,,0,,0,,0,0,,0,7,0,,,,,,,,,0,0,0,,0,,1,1,,,,BeginRequest=2023-02-08T00:07:01.220Z;CorrelationID=;ProxyState-Run=None;FEAuth=BEVersion-1942127710;ProxyState-Complete=PrepareServerRequest;SharedCacheGuard=0;EndRequest=2023-02-08T00:07:01.222Z;,,,|RoutingDB:ee8ad99c-fbcb-45c2-939e-81869b5ee059,,,CafeV1 -2023-02-08T00:08:01.372Z,7fc0bf66-8944-4072-93b5-2ec4f2288670,15,2,1118,20,,Autodiscover,localhost,/AutoDiscover/,,Negotiate,true,RES\HealthMailbox501a219,,Sid~S-1-5-21-434387928-2799628836-4171586136-1619,AMProbe/Local/ClientAccess,::1,TS-EX19-04,200,,,GET,Proxy,TS-EX19-04.res.contoso.com,15.02.1118.000,IntraForest,WindowsIdentity,,,,0,,,,1,0,,0,,0,,0,0,,0,2,0,,,,,,,,,0,0,0,,0,,1,1,,,,BeginRequest=2023-02-08T00:08:01.371Z;CorrelationID=;ProxyState-Run=None;FEAuth=BEVersion-1942127710;ProxyState-Complete=PrepareServerRequest;SharedCacheGuard=0;EndRequest=2023-02-08T00:08:01.372Z;,,,|RoutingDB:ea58efbd-ca6c-4d7d-b738-383065284040,,,CafeV1 -2023-02-08T00:09:01.470Z,93456641-1baa-4963-a654-09211f129a56,15,2,1118,20,,Autodiscover,localhost,/AutoDiscover/,,Negotiate,true,RES\HealthMailbox356d248,,Sid~S-1-5-21-434387928-2799628836-4171586136-1617,AMProbe/Local/ClientAccess,127.0.0.1,TS-EX19-04,200,,,GET,Proxy,TS-EX19-01.res.contoso.com,15.02.1118.000,IntraForest,WindowsIdentity,,,,0,,,,0,0,,0,,0,,0,0,,0,14,0,,,,,,,,,0,1,4,,5,,5,5,,,,BeginRequest=2023-02-08T00:09:01.465Z;CorrelationID=;ProxyState-Run=None;ServerLocatorRefresh=399bc9b2-7312-46e0-8181-fee7a0ffeaf8;RefreshingCacheEntry=CacheEntry(BackEndServer TS-EX19-01.RES.contoso.com~1942127710|ResourceForest contoso.com|FailoverSequenceNumber 638113239236337077|LastRefreshTime 2/7/2023 11:38:59 PM);FEAuth=BEVersion-1942127710;ProxyState-Complete=PrepareServerRequest;SharedCacheGuard=0;EndRequest=2023-02-08T00:09:01.470Z;,,,|RoutingDB:399bc9b2-7312-46e0-8181-fee7a0ffeaf8,,,CafeV1 +2023-08-27T00:05:01.204Z,d91edba7-e75c-4cf8-b371-d11938acea46,15,2,1118,20,,Autodiscover,localhost,/AutoDiscover/,,Negotiate,true,RES\HealthMailbox866bb29,,Sid~S-1-5-21-434387928-2799628836-4171586136-1129,AMProbe/Local/ClientAccess,::1,TS-EX19-04,200,,,GET,Proxy,TS-EX19-02.res.contoso.com,15.02.1118.000,IntraForest,WindowsIdentity,,,,0,,,,1,0,,0,,0,,0,0,,0,2,0,,,,,,,,,0,0,0,,0,,1,1,,,,BeginRequest=2023-08-27T00:05:01.202Z;CorrelationID=;ProxyState-Run=None;FEAuth=BEVersion-1942127710;ProxyState-Complete=PrepareServerRequest;SharedCacheGuard=0;EndRequest=2023-08-27T00:05:01.204Z;,,,|RoutingDB:ee8ad99c-fbcb-45c2-939e-81869b5ee059,,,CafeV1 +2023-08-27T00:06:01.186Z,7904232f-acc3-4765-83c8-d21e464ad802,15,2,1118,20,,Autodiscover,localhost,/AutoDiscover/,,Negotiate,true,RES\HealthMailbox356d248,,Sid~S-1-5-21-434387928-2799628836-4171586136-1617,AMProbe/Local/ClientAccess,::1,TS-EX19-04,200,,,GET,Proxy,TS-EX19-01.res.contoso.com,15.02.1118.000,IntraForest,WindowsIdentity,,,,0,,,,1,0,,0,,0,,0,0,,0,4,0,,,,,,,,,0,0,2,,2,,3,3,,,,BeginRequest=2023-08-27T00:06:01.183Z;CorrelationID=;ProxyState-Run=None;FEAuth=BEVersion-1942127710;ProxyState-Complete=PrepareServerRequest;SharedCacheGuard=0;EndRequest=2023-08-27T00:06:01.186Z;,,,|RoutingDB:399bc9b2-7312-46e0-8181-fee7a0ffeaf8,,,CafeV1 +2023-08-27T00:07:01.222Z,f8049135-10a6-4d6d-b62b-a1eff1e1dfc7,15,2,1118,20,,Autodiscover,localhost,/AutoDiscover/,,Negotiate,true,RES\HealthMailbox866bb29,,Sid~S-1-5-21-434387928-2799628836-4171586136-1129,AMProbe/Local/ClientAccess,127.0.0.1,TS-EX19-04,200,,,GET,Proxy,TS-EX19-02.res.contoso.com,15.02.1118.000,IntraForest,WindowsIdentity,,,,0,,,,1,0,,0,,0,,0,0,,0,7,0,,,,,,,,,0,0,0,,0,,1,1,,,,BeginRequest=2023-08-27T00:07:01.220Z;CorrelationID=;ProxyState-Run=None;FEAuth=BEVersion-1942127710;ProxyState-Complete=PrepareServerRequest;SharedCacheGuard=0;EndRequest=2023-08-27T00:07:01.222Z;,,,|RoutingDB:ee8ad99c-fbcb-45c2-939e-81869b5ee059,,,CafeV1 +2023-08-27T00:08:01.372Z,7fc0bf66-8944-4072-93b5-2ec4f2288670,15,2,1118,20,,Autodiscover,localhost,/AutoDiscover/,,Negotiate,true,RES\HealthMailbox501a219,,Sid~S-1-5-21-434387928-2799628836-4171586136-1619,AMProbe/Local/ClientAccess,::1,TS-EX19-04,200,,,GET,Proxy,TS-EX19-04.res.contoso.com,15.02.1118.000,IntraForest,WindowsIdentity,,,,0,,,,1,0,,0,,0,,0,0,,0,2,0,,,,,,,,,0,0,0,,0,,1,1,,,,BeginRequest=2023-08-27T00:08:01.371Z;CorrelationID=;ProxyState-Run=None;FEAuth=BEVersion-1942127710;ProxyState-Complete=PrepareServerRequest;SharedCacheGuard=0;EndRequest=2023-08-27T00:08:01.372Z;,,,|RoutingDB:ea58efbd-ca6c-4d7d-b738-383065284040,,,CafeV1 +2023-08-27T00:09:01.470Z,93456641-1baa-4963-a654-09211f129a56,15,2,1118,20,,Autodiscover,localhost,/AutoDiscover/,,Negotiate,true,RES\HealthMailbox356d248,,Sid~S-1-5-21-434387928-2799628836-4171586136-1617,AMProbe/Local/ClientAccess,127.0.0.1,TS-EX19-04,200,,,GET,Proxy,TS-EX19-01.res.contoso.com,15.02.1118.000,IntraForest,WindowsIdentity,,,,0,,,,0,0,,0,,0,,0,0,,0,14,0,,,,,,,,,0,1,4,,5,,5,5,,,,BeginRequest=2023-08-27T00:09:01.465Z;CorrelationID=;ProxyState-Run=None;ServerLocatorRefresh=399bc9b2-7312-46e0-8181-fee7a0ffeaf8;RefreshingCacheEntry=CacheEntry(BackEndServer TS-EX19-01.RES.contoso.com~1942127710|ResourceForest contoso.com|FailoverSequenceNumber 638113239236337077|LastRefreshTime 2/7/2023 11:38:59 PM);FEAuth=BEVersion-1942127710;ProxyState-Complete=PrepareServerRequest;SharedCacheGuard=0;EndRequest=2023-08-27T00:09:01.470Z;,,,|RoutingDB:399bc9b2-7312-46e0-8181-fee7a0ffeaf8,,,CafeV1 ,2bedfd2a-7af0-4338-85ad-f7db0d726d99,15,2,1118,20,,,,,,,,,,,,,TS-EX19-04,,,,,,,,,,,,,,,,,,,,,,,,,,,,600014,,,,,,,,,,,,,,,,,,,,,S:ActivityStandardMetadata.Action=GlobalActivity,,,,,, -2023-02-08T00:10:01.631Z,7cc9b8d0-21ce-40cc-973f-bb65ec17507c,15,2,1118,20,,Autodiscover,localhost,/AutoDiscover/,,Negotiate,true,RES\HealthMailbox96881f2,,Sid~S-1-5-21-434387928-2799628836-4171586136-1618,AMProbe/Local/ClientAccess,127.0.0.1,TS-EX19-04,200,,,GET,Proxy,TS-EX19-03.res.contoso.com,15.02.1118.000,IntraForest,WindowsIdentity,,,,0,,,,1,0,,0,,0,,0,0,,0,3,0,,,,,,,,,0,0,0,,0,,1,1,,,,BeginRequest=2023-02-08T00:10:01.629Z;CorrelationID=;ProxyState-Run=None;FEAuth=BEVersion-1942127710;ProxyState-Complete=PrepareServerRequest;SharedCacheGuard=0;EndRequest=2023-02-08T00:10:01.631Z;,,,|RoutingDB:7b922fbc-5b8f-496b-be13-ccc0a9fd6a7a,,,CafeV1 -2023-02-08T00:11:01.525Z,b32ced2d-ca79-4294-a075-b13999c3f268,15,2,1118,20,,Autodiscover,localhost,/AutoDiscover/,,Negotiate,true,RES\HealthMailbox866bb29,,Sid~S-1-5-21-434387928-2799628836-4171586136-1129,AMProbe/Local/ClientAccess,127.0.0.1,TS-EX19-04,200,,,GET,Proxy,TS-EX19-02.res.contoso.com,15.02.1118.000,IntraForest,WindowsIdentity,,,,0,,,,1,0,,0,,0,,0,0,,0,3,0,,,,,,,,,0,0,1,,1,,2,2,,,,BeginRequest=2023-02-08T00:11:01.523Z;CorrelationID=;ProxyState-Run=None;FEAuth=BEVersion-1942127710;ProxyState-Complete=PrepareServerRequest;SharedCacheGuard=0;EndRequest=2023-02-08T00:11:01.525Z;,,,|RoutingDB:ee8ad99c-fbcb-45c2-939e-81869b5ee059,,,CafeV1 -2023-02-08T00:12:01.673Z,3c3d928d-4774-4857-89a4-343e84abb108,15,2,1118,20,,Autodiscover,localhost,/AutoDiscover/,,Negotiate,true,RES\HealthMailbox356d248,,Sid~S-1-5-21-434387928-2799628836-4171586136-1617,AMProbe/Local/ClientAccess,::1,TS-EX19-04,200,,,GET,Proxy,TS-EX19-01.res.contoso.com,15.02.1118.000,IntraForest,WindowsIdentity,,,,0,,,,1,0,,0,,0,,0,0,,0,4,0,,,,,,,,,0,0,0,,0,,1,1,,,,BeginRequest=2023-02-08T00:12:01.672Z;CorrelationID=;ProxyState-Run=None;FEAuth=BEVersion-1942127710;ProxyState-Complete=PrepareServerRequest;SharedCacheGuard=0;EndRequest=2023-02-08T00:12:01.673Z;,,,|RoutingDB:399bc9b2-7312-46e0-8181-fee7a0ffeaf8,,,CafeV1 -2023-02-08T00:13:01.807Z,32c63760-6e2d-4465-b980-9a3dcfd60b29,15,2,1118,20,,Autodiscover,localhost,/AutoDiscover/,,Negotiate,true,RES\HealthMailbox96881f2,,Sid~S-1-5-21-434387928-2799628836-4171586136-1618,AMProbe/Local/ClientAccess,127.0.0.1,TS-EX19-04,200,,,GET,Proxy,TS-EX19-03.res.contoso.com,15.02.1118.000,IntraForest,WindowsIdentity,,,,0,,,,3,0,,0,,0,,0,0,,0,5,0,,,,,,,,,0,0,0,,0,,3,3,,,,BeginRequest=2023-02-08T00:13:01.804Z;CorrelationID=;ProxyState-Run=None;FEAuth=BEVersion-1942127710;ProxyState-Complete=PrepareServerRequest;SharedCacheGuard=0;EndRequest=2023-02-08T00:13:01.807Z;,,,|RoutingDB:7b922fbc-5b8f-496b-be13-ccc0a9fd6a7a,,,CafeV1 -2023-02-08T00:14:01.820Z,463cee32-6387-4a39-b42f-be767939435a,15,2,1118,20,,Autodiscover,localhost,/AutoDiscover/,,Negotiate,true,RES\HealthMailbox96881f2,,Sid~S-1-5-21-434387928-2799628836-4171586136-1618,AMProbe/Local/ClientAccess,::1,TS-EX19-04,200,,,GET,Proxy,TS-EX19-03.res.contoso.com,15.02.1118.000,IntraForest,WindowsIdentity,,,,0,,,,1,0,,0,,0,,0,0,,0,5,0,,,,,,,,,0,0,0,,0,,1,1,,,,BeginRequest=2023-02-08T00:14:01.819Z;CorrelationID=;ProxyState-Run=None;FEAuth=BEVersion-1942127710;ProxyState-Complete=PrepareServerRequest;SharedCacheGuard=0;EndRequest=2023-02-08T00:14:01.820Z;,,,|RoutingDB:7b922fbc-5b8f-496b-be13-ccc0a9fd6a7a,,,CafeV1 +2023-08-27T00:10:01.631Z,7cc9b8d0-21ce-40cc-973f-bb65ec17507c,15,2,1118,20,,Autodiscover,localhost,/AutoDiscover/,,Negotiate,true,RES\HealthMailbox96881f2,,Sid~S-1-5-21-434387928-2799628836-4171586136-1618,AMProbe/Local/ClientAccess,127.0.0.1,TS-EX19-04,200,,,GET,Proxy,TS-EX19-03.res.contoso.com,15.02.1118.000,IntraForest,WindowsIdentity,,,,0,,,,1,0,,0,,0,,0,0,,0,3,0,,,,,,,,,0,0,0,,0,,1,1,,,,BeginRequest=2023-08-27T00:10:01.629Z;CorrelationID=;ProxyState-Run=None;FEAuth=BEVersion-1942127710;ProxyState-Complete=PrepareServerRequest;SharedCacheGuard=0;EndRequest=2023-08-27T00:10:01.631Z;,,,|RoutingDB:7b922fbc-5b8f-496b-be13-ccc0a9fd6a7a,,,CafeV1 +2023-08-27T00:11:01.525Z,b32ced2d-ca79-4294-a075-b13999c3f268,15,2,1118,20,,Autodiscover,localhost,/AutoDiscover/,,Negotiate,true,RES\HealthMailbox866bb29,,Sid~S-1-5-21-434387928-2799628836-4171586136-1129,AMProbe/Local/ClientAccess,127.0.0.1,TS-EX19-04,200,,,GET,Proxy,TS-EX19-02.res.contoso.com,15.02.1118.000,IntraForest,WindowsIdentity,,,,0,,,,1,0,,0,,0,,0,0,,0,3,0,,,,,,,,,0,0,1,,1,,2,2,,,,BeginRequest=2023-08-27T00:11:01.523Z;CorrelationID=;ProxyState-Run=None;FEAuth=BEVersion-1942127710;ProxyState-Complete=PrepareServerRequest;SharedCacheGuard=0;EndRequest=2023-08-27T00:11:01.525Z;,,,|RoutingDB:ee8ad99c-fbcb-45c2-939e-81869b5ee059,,,CafeV1 +2023-08-27T00:12:01.673Z,3c3d928d-4774-4857-89a4-343e84abb108,15,2,1118,20,,Autodiscover,localhost,/AutoDiscover/,,Negotiate,true,RES\HealthMailbox356d248,,Sid~S-1-5-21-434387928-2799628836-4171586136-1617,AMProbe/Local/ClientAccess,::1,TS-EX19-04,200,,,GET,Proxy,TS-EX19-01.res.contoso.com,15.02.1118.000,IntraForest,WindowsIdentity,,,,0,,,,1,0,,0,,0,,0,0,,0,4,0,,,,,,,,,0,0,0,,0,,1,1,,,,BeginRequest=2023-08-27T00:12:01.672Z;CorrelationID=;ProxyState-Run=None;FEAuth=BEVersion-1942127710;ProxyState-Complete=PrepareServerRequest;SharedCacheGuard=0;EndRequest=2023-08-27T00:12:01.673Z;,,,|RoutingDB:399bc9b2-7312-46e0-8181-fee7a0ffeaf8,,,CafeV1 +2023-08-27T00:13:01.807Z,32c63760-6e2d-4465-b980-9a3dcfd60b29,15,2,1118,20,,Autodiscover,localhost,/AutoDiscover/,,Negotiate,true,RES\HealthMailbox96881f2,,Sid~S-1-5-21-434387928-2799628836-4171586136-1618,AMProbe/Local/ClientAccess,127.0.0.1,TS-EX19-04,200,,,GET,Proxy,TS-EX19-03.res.contoso.com,15.02.1118.000,IntraForest,WindowsIdentity,,,,0,,,,3,0,,0,,0,,0,0,,0,5,0,,,,,,,,,0,0,0,,0,,3,3,,,,BeginRequest=2023-08-27T00:13:01.804Z;CorrelationID=;ProxyState-Run=None;FEAuth=BEVersion-1942127710;ProxyState-Complete=PrepareServerRequest;SharedCacheGuard=0;EndRequest=2023-08-27T00:13:01.807Z;,,,|RoutingDB:7b922fbc-5b8f-496b-be13-ccc0a9fd6a7a,,,CafeV1 +2023-08-27T00:14:01.820Z,463cee32-6387-4a39-b42f-be767939435a,15,2,1118,20,,Autodiscover,localhost,/AutoDiscover/,,Negotiate,true,RES\HealthMailbox96881f2,,Sid~S-1-5-21-434387928-2799628836-4171586136-1618,AMProbe/Local/ClientAccess,::1,TS-EX19-04,200,,,GET,Proxy,TS-EX19-03.res.contoso.com,15.02.1118.000,IntraForest,WindowsIdentity,,,,0,,,,1,0,,0,,0,,0,0,,0,5,0,,,,,,,,,0,0,0,,0,,1,1,,,,BeginRequest=2023-08-27T00:14:01.819Z;CorrelationID=;ProxyState-Run=None;FEAuth=BEVersion-1942127710;ProxyState-Complete=PrepareServerRequest;SharedCacheGuard=0;EndRequest=2023-08-27T00:14:01.820Z;,,,|RoutingDB:7b922fbc-5b8f-496b-be13-ccc0a9fd6a7a,,,CafeV1 ,92b961db-dc08-4dc4-a64b-cee2be82f30f,15,2,1118,20,,,,,,,,,,,,,TS-EX19-04,,,,,,,,,,,,,,,,,,,,,,,,,,,,600015,,,,,,,,,,,,,,,,,,,,,S:ActivityStandardMetadata.Action=GlobalActivity;I32:ATE.C[MISSED]=3;F:ATE.AL[MISSED]=0;I32:ADR.C[MISSED]=2;F:ADR.AL[MISSED]=1.8464;I32:ADS.C[MISSED]=1;F:ADS.AL[MISSED]=1.5753,,,,,, -2023-02-08T00:15:01.888Z,e757ef0e-6e63-4cb0-b94c-e4e353321c76,15,2,1118,20,,Autodiscover,localhost,/AutoDiscover/,,Negotiate,true,RES\HealthMailbox501a219,,Sid~S-1-5-21-434387928-2799628836-4171586136-1619,AMProbe/Local/ClientAccess,::1,TS-EX19-04,200,,,GET,Proxy,TS-EX19-04.res.contoso.com,15.02.1118.000,IntraForest,WindowsIdentity,,,,0,,,,1,0,,0,,0,,0,0,,0,5,0,,,,,,,,,0,0,0,,0,,1,1,,,,BeginRequest=2023-02-08T00:15:01.887Z;CorrelationID=;ProxyState-Run=None;FEAuth=BEVersion-1942127710;ProxyState-Complete=PrepareServerRequest;SharedCacheGuard=0;EndRequest=2023-02-08T00:15:01.888Z;,,,|RoutingDB:ea58efbd-ca6c-4d7d-b738-383065284040,,,CafeV1 -2023-02-08T00:16:02.012Z,ff3b24c2-bf07-4df9-ac83-4ba00c1479a3,15,2,1118,20,,Autodiscover,localhost,/AutoDiscover/,,Negotiate,true,RES\HealthMailbox866bb29,,Sid~S-1-5-21-434387928-2799628836-4171586136-1129,AMProbe/Local/ClientAccess,::1,TS-EX19-04,200,,,GET,Proxy,TS-EX19-02.res.contoso.com,15.02.1118.000,IntraForest,WindowsIdentity,,,,0,,,,1,0,,0,,0,,0,0,,0,4,0,,,,,,,,,0,0,2,,2,,3,3,,,,BeginRequest=2023-02-08T00:16:02.009Z;CorrelationID=;ProxyState-Run=None;FEAuth=BEVersion-1942127710;ProxyState-Complete=PrepareServerRequest;SharedCacheGuard=0;EndRequest=2023-02-08T00:16:02.012Z;,,,|RoutingDB:ee8ad99c-fbcb-45c2-939e-81869b5ee059,,,CafeV1 -2023-02-08T00:17:02.034Z,2b3ab478-4a94-42a1-92f3-41d1215f3343,15,2,1118,20,,Autodiscover,localhost,/AutoDiscover/,,Negotiate,true,RES\HealthMailbox96881f2,,Sid~S-1-5-21-434387928-2799628836-4171586136-1618,AMProbe/Local/ClientAccess,127.0.0.1,TS-EX19-04,200,,,GET,Proxy,TS-EX19-03.res.contoso.com,15.02.1118.000,IntraForest,WindowsIdentity,,,,0,,,,1,0,,0,,0,,0,0,,0,5,0,,,,,,,,,0,0,0,,0,,1,1,,,,BeginRequest=2023-02-08T00:17:02.033Z;CorrelationID=;ProxyState-Run=None;FEAuth=BEVersion-1942127710;ProxyState-Complete=PrepareServerRequest;SharedCacheGuard=0;EndRequest=2023-02-08T00:17:02.034Z;,,,|RoutingDB:7b922fbc-5b8f-496b-be13-ccc0a9fd6a7a,,,CafeV1 -2023-02-08T00:18:02.145Z,7fa07211-6c84-4947-92f8-148276067fc8,15,2,1118,20,,Autodiscover,localhost,/AutoDiscover/,,Negotiate,true,RES\HealthMailbox866bb29,,Sid~S-1-5-21-434387928-2799628836-4171586136-1129,AMProbe/Local/ClientAccess,127.0.0.1,TS-EX19-04,200,,,GET,Proxy,TS-EX19-02.res.contoso.com,15.02.1118.000,IntraForest,WindowsIdentity,,,,0,,,,1,0,,0,,0,,0,0,,0,5,0,,,,,,,,,0,0,0,,0,,1,1,,,,BeginRequest=2023-02-08T00:18:02.143Z;CorrelationID=;ProxyState-Run=None;FEAuth=BEVersion-1942127710;ProxyState-Complete=PrepareServerRequest;SharedCacheGuard=0;EndRequest=2023-02-08T00:18:02.145Z;,,,|RoutingDB:ee8ad99c-fbcb-45c2-939e-81869b5ee059,,,CafeV1 -2023-02-08T00:19:02.210Z,0ad151e5-4bcd-4010-a7ed-ba832690d50e,15,2,1118,20,,Autodiscover,localhost,/AutoDiscover/,,Negotiate,true,RES\HealthMailbox356d248,,Sid~S-1-5-21-434387928-2799628836-4171586136-1617,AMProbe/Local/ClientAccess,127.0.0.1,TS-EX19-04,200,,,GET,Proxy,TS-EX19-01.res.contoso.com,15.02.1118.000,IntraForest,WindowsIdentity,,,,0,,,,0,0,,0,,0,,0,0,,0,3,0,,,,,,,,,0,1,0,,1,,1,1,,,,BeginRequest=2023-02-08T00:19:02.209Z;CorrelationID=;ProxyState-Run=None;FEAuth=BEVersion-1942127710;ProxyState-Complete=PrepareServerRequest;SharedCacheGuard=0;EndRequest=2023-02-08T00:19:02.210Z;,,,|RoutingDB:399bc9b2-7312-46e0-8181-fee7a0ffeaf8,,,CafeV1 +2023-08-27T00:15:01.888Z,e757ef0e-6e63-4cb0-b94c-e4e353321c76,15,2,1118,20,,Autodiscover,localhost,/AutoDiscover/,,Negotiate,true,RES\HealthMailbox501a219,,Sid~S-1-5-21-434387928-2799628836-4171586136-1619,AMProbe/Local/ClientAccess,::1,TS-EX19-04,200,,,GET,Proxy,TS-EX19-04.res.contoso.com,15.02.1118.000,IntraForest,WindowsIdentity,,,,0,,,,1,0,,0,,0,,0,0,,0,5,0,,,,,,,,,0,0,0,,0,,1,1,,,,BeginRequest=2023-08-27T00:15:01.887Z;CorrelationID=;ProxyState-Run=None;FEAuth=BEVersion-1942127710;ProxyState-Complete=PrepareServerRequest;SharedCacheGuard=0;EndRequest=2023-08-27T00:15:01.888Z;,,,|RoutingDB:ea58efbd-ca6c-4d7d-b738-383065284040,,,CafeV1 +2023-08-27T00:16:02.012Z,ff3b24c2-bf07-4df9-ac83-4ba00c1479a3,15,2,1118,20,,Autodiscover,localhost,/AutoDiscover/,,Negotiate,true,RES\HealthMailbox866bb29,,Sid~S-1-5-21-434387928-2799628836-4171586136-1129,AMProbe/Local/ClientAccess,::1,TS-EX19-04,200,,,GET,Proxy,TS-EX19-02.res.contoso.com,15.02.1118.000,IntraForest,WindowsIdentity,,,,0,,,,1,0,,0,,0,,0,0,,0,4,0,,,,,,,,,0,0,2,,2,,3,3,,,,BeginRequest=2023-08-27T00:16:02.009Z;CorrelationID=;ProxyState-Run=None;FEAuth=BEVersion-1942127710;ProxyState-Complete=PrepareServerRequest;SharedCacheGuard=0;EndRequest=2023-08-27T00:16:02.012Z;,,,|RoutingDB:ee8ad99c-fbcb-45c2-939e-81869b5ee059,,,CafeV1 +2023-08-27T00:17:02.034Z,2b3ab478-4a94-42a1-92f3-41d1215f3343,15,2,1118,20,,Autodiscover,localhost,/AutoDiscover/,,Negotiate,true,RES\HealthMailbox96881f2,,Sid~S-1-5-21-434387928-2799628836-4171586136-1618,AMProbe/Local/ClientAccess,127.0.0.1,TS-EX19-04,200,,,GET,Proxy,TS-EX19-03.res.contoso.com,15.02.1118.000,IntraForest,WindowsIdentity,,,,0,,,,1,0,,0,,0,,0,0,,0,5,0,,,,,,,,,0,0,0,,0,,1,1,,,,BeginRequest=2023-08-27T00:17:02.033Z;CorrelationID=;ProxyState-Run=None;FEAuth=BEVersion-1942127710;ProxyState-Complete=PrepareServerRequest;SharedCacheGuard=0;EndRequest=2023-08-27T00:17:02.034Z;,,,|RoutingDB:7b922fbc-5b8f-496b-be13-ccc0a9fd6a7a,,,CafeV1 +2023-08-27T00:18:02.145Z,7fa07211-6c84-4947-92f8-148276067fc8,15,2,1118,20,,Autodiscover,localhost,/AutoDiscover/,,Negotiate,true,RES\HealthMailbox866bb29,,Sid~S-1-5-21-434387928-2799628836-4171586136-1129,AMProbe/Local/ClientAccess,127.0.0.1,TS-EX19-04,200,,,GET,Proxy,TS-EX19-02.res.contoso.com,15.02.1118.000,IntraForest,WindowsIdentity,,,,0,,,,1,0,,0,,0,,0,0,,0,5,0,,,,,,,,,0,0,0,,0,,1,1,,,,BeginRequest=2023-08-27T00:18:02.143Z;CorrelationID=;ProxyState-Run=None;FEAuth=BEVersion-1942127710;ProxyState-Complete=PrepareServerRequest;SharedCacheGuard=0;EndRequest=2023-08-27T00:18:02.145Z;,,,|RoutingDB:ee8ad99c-fbcb-45c2-939e-81869b5ee059,,,CafeV1 +2023-08-27T00:19:02.210Z,0ad151e5-4bcd-4010-a7ed-ba832690d50e,15,2,1118,20,,Autodiscover,localhost,/AutoDiscover/,,Negotiate,true,RES\HealthMailbox356d248,,Sid~S-1-5-21-434387928-2799628836-4171586136-1617,AMProbe/Local/ClientAccess,127.0.0.1,TS-EX19-04,200,,,GET,Proxy,TS-EX19-01.res.contoso.com,15.02.1118.000,IntraForest,WindowsIdentity,,,,0,,,,0,0,,0,,0,,0,0,,0,3,0,,,,,,,,,0,1,0,,1,,1,1,,,,BeginRequest=2023-08-27T00:19:02.209Z;CorrelationID=;ProxyState-Run=None;FEAuth=BEVersion-1942127710;ProxyState-Complete=PrepareServerRequest;SharedCacheGuard=0;EndRequest=2023-08-27T00:19:02.210Z;,,,|RoutingDB:399bc9b2-7312-46e0-8181-fee7a0ffeaf8,,,CafeV1 ,10a17226-099c-47cc-860c-b2238c057efb,15,2,1118,20,,,,,,,,,,,,,TS-EX19-04,,,,,,,,,,,,,,,,,,,,,,,,,,,,600004,,,,,,,,,,,,,,,,,,,,,S:ActivityStandardMetadata.Action=GlobalActivity,,,,,, -2023-02-08T00:20:02.342Z,23dd4b4c-8eeb-4d09-9561-110735a0f520,15,2,1118,20,,Autodiscover,localhost,/AutoDiscover/,,Negotiate,true,RES\HealthMailbox866bb29,,Sid~S-1-5-21-434387928-2799628836-4171586136-1129,AMProbe/Local/ClientAccess,127.0.0.1,TS-EX19-04,200,,,GET,Proxy,TS-EX19-02.res.contoso.com,15.02.1118.000,IntraForest,WindowsIdentity,,,,0,,,,1,0,,0,,0,,0,0,,0,5,0,,,,,,,,,0,0,3,,3,,4,4,,,,BeginRequest=2023-02-08T00:20:02.338Z;CorrelationID=;ProxyState-Run=None;FEAuth=BEVersion-1942127710;ProxyState-Complete=PrepareServerRequest;SharedCacheGuard=0;EndRequest=2023-02-08T00:20:02.342Z;,,,|RoutingDB:ee8ad99c-fbcb-45c2-939e-81869b5ee059,,,CafeV1 -2023-02-08T00:21:02.492Z,fbf93ace-a18a-4964-9f4b-f7dc57c55cff,15,2,1118,20,,Autodiscover,localhost,/AutoDiscover/,,Negotiate,true,RES\HealthMailbox96881f2,,Sid~S-1-5-21-434387928-2799628836-4171586136-1618,AMProbe/Local/ClientAccess,127.0.0.1,TS-EX19-04,200,,,GET,Proxy,TS-EX19-03.res.contoso.com,15.02.1118.000,IntraForest,WindowsIdentity,,,,0,,,,1,0,,0,,0,,0,0,,0,11,0,,,,,,,,,0,0,4,,4,,5,5,,,,BeginRequest=2023-02-08T00:21:02.487Z;CorrelationID=;ProxyState-Run=None;FEAuth=BEVersion-1942127710;ProxyState-Complete=PrepareServerRequest;SharedCacheGuard=0;EndRequest=2023-02-08T00:21:02.492Z;,,,|RoutingDB:7b922fbc-5b8f-496b-be13-ccc0a9fd6a7a,,,CafeV1 -2023-02-08T00:22:02.569Z,2dd48b8e-b46f-4a97-84c5-f829bdaddf20,15,2,1118,20,,Autodiscover,localhost,/AutoDiscover/,,Negotiate,true,RES\HealthMailbox356d248,,Sid~S-1-5-21-434387928-2799628836-4171586136-1617,AMProbe/Local/ClientAccess,::1,TS-EX19-04,200,,,GET,Proxy,TS-EX19-01.res.contoso.com,15.02.1118.000,IntraForest,WindowsIdentity,,,,0,,,,1,0,,0,,0,,0,0,,0,7,0,,,,,,,,,0,0,0,,0,,1,1,,,,BeginRequest=2023-02-08T00:22:02.568Z;CorrelationID=;ProxyState-Run=None;FEAuth=BEVersion-1942127710;ProxyState-Complete=PrepareServerRequest;SharedCacheGuard=0;EndRequest=2023-02-08T00:22:02.569Z;,,,|RoutingDB:399bc9b2-7312-46e0-8181-fee7a0ffeaf8,,,CafeV1 -2023-02-08T00:23:02.575Z,aaf9cc0f-2628-4cd9-af2e-db2c85467d55,15,2,1118,20,,Autodiscover,localhost,/AutoDiscover/,,Negotiate,true,RES\HealthMailbox866bb29,,Sid~S-1-5-21-434387928-2799628836-4171586136-1129,AMProbe/Local/ClientAccess,::1,TS-EX19-04,200,,,GET,Proxy,TS-EX19-02.res.contoso.com,15.02.1118.000,IntraForest,WindowsIdentity,,,,0,,,,1,0,,0,,0,,0,0,,0,15,0,,,,,,,,,0,0,11,,11,,12,12,,,,BeginRequest=2023-02-08T00:23:02.563Z;CorrelationID=;ProxyState-Run=None;FEAuth=BEVersion-1942127710;ProxyState-Complete=PrepareServerRequest;SharedCacheGuard=0;EndRequest=2023-02-08T00:23:02.575Z;,,,|RoutingDB:ee8ad99c-fbcb-45c2-939e-81869b5ee059,,,CafeV1 -2023-02-08T00:24:02.680Z,7c900c10-ab63-43f4-b53d-9a3274447f44,15,2,1118,20,,Autodiscover,localhost,/AutoDiscover/,,Negotiate,true,RES\HealthMailbox356d248,,Sid~S-1-5-21-434387928-2799628836-4171586136-1617,AMProbe/Local/ClientAccess,127.0.0.1,TS-EX19-04,200,,,GET,Proxy,TS-EX19-01.res.contoso.com,15.02.1118.000,IntraForest,WindowsIdentity,,,,0,,,,0,1,,0,,0,,0,0,,0,2,0,,,,,,,,,0,1,0,,1,,1,1,,,,BeginRequest=2023-02-08T00:24:02.679Z;CorrelationID=;ProxyState-Run=None;FEAuth=BEVersion-1942127710;ProxyState-Complete=PrepareServerRequest;SharedCacheGuard=0;EndRequest=2023-02-08T00:24:02.680Z;,,,|RoutingDB:399bc9b2-7312-46e0-8181-fee7a0ffeaf8,,,CafeV1 +2023-08-27T00:20:02.342Z,23dd4b4c-8eeb-4d09-9561-110735a0f520,15,2,1118,20,,Autodiscover,localhost,/AutoDiscover/,,Negotiate,true,RES\HealthMailbox866bb29,,Sid~S-1-5-21-434387928-2799628836-4171586136-1129,AMProbe/Local/ClientAccess,127.0.0.1,TS-EX19-04,200,,,GET,Proxy,TS-EX19-02.res.contoso.com,15.02.1118.000,IntraForest,WindowsIdentity,,,,0,,,,1,0,,0,,0,,0,0,,0,5,0,,,,,,,,,0,0,3,,3,,4,4,,,,BeginRequest=2023-08-27T00:20:02.338Z;CorrelationID=;ProxyState-Run=None;FEAuth=BEVersion-1942127710;ProxyState-Complete=PrepareServerRequest;SharedCacheGuard=0;EndRequest=2023-08-27T00:20:02.342Z;,,,|RoutingDB:ee8ad99c-fbcb-45c2-939e-81869b5ee059,,,CafeV1 +2023-08-27T00:21:02.492Z,fbf93ace-a18a-4964-9f4b-f7dc57c55cff,15,2,1118,20,,Autodiscover,localhost,/AutoDiscover/,,Negotiate,true,RES\HealthMailbox96881f2,,Sid~S-1-5-21-434387928-2799628836-4171586136-1618,AMProbe/Local/ClientAccess,127.0.0.1,TS-EX19-04,200,,,GET,Proxy,TS-EX19-03.res.contoso.com,15.02.1118.000,IntraForest,WindowsIdentity,,,,0,,,,1,0,,0,,0,,0,0,,0,11,0,,,,,,,,,0,0,4,,4,,5,5,,,,BeginRequest=2023-08-27T00:21:02.487Z;CorrelationID=;ProxyState-Run=None;FEAuth=BEVersion-1942127710;ProxyState-Complete=PrepareServerRequest;SharedCacheGuard=0;EndRequest=2023-08-27T00:21:02.492Z;,,,|RoutingDB:7b922fbc-5b8f-496b-be13-ccc0a9fd6a7a,,,CafeV1 +2023-08-27T00:22:02.569Z,2dd48b8e-b46f-4a97-84c5-f829bdaddf20,15,2,1118,20,,Autodiscover,localhost,/AutoDiscover/,,Negotiate,true,RES\HealthMailbox356d248,,Sid~S-1-5-21-434387928-2799628836-4171586136-1617,AMProbe/Local/ClientAccess,::1,TS-EX19-04,200,,,GET,Proxy,TS-EX19-01.res.contoso.com,15.02.1118.000,IntraForest,WindowsIdentity,,,,0,,,,1,0,,0,,0,,0,0,,0,7,0,,,,,,,,,0,0,0,,0,,1,1,,,,BeginRequest=2023-08-27T00:22:02.568Z;CorrelationID=;ProxyState-Run=None;FEAuth=BEVersion-1942127710;ProxyState-Complete=PrepareServerRequest;SharedCacheGuard=0;EndRequest=2023-08-27T00:22:02.569Z;,,,|RoutingDB:399bc9b2-7312-46e0-8181-fee7a0ffeaf8,,,CafeV1 +2023-08-27T00:23:02.575Z,aaf9cc0f-2628-4cd9-af2e-db2c85467d55,15,2,1118,20,,Autodiscover,localhost,/AutoDiscover/,,Negotiate,true,RES\HealthMailbox866bb29,,Sid~S-1-5-21-434387928-2799628836-4171586136-1129,AMProbe/Local/ClientAccess,::1,TS-EX19-04,200,,,GET,Proxy,TS-EX19-02.res.contoso.com,15.02.1118.000,IntraForest,WindowsIdentity,,,,0,,,,1,0,,0,,0,,0,0,,0,15,0,,,,,,,,,0,0,11,,11,,12,12,,,,BeginRequest=2023-08-27T00:23:02.563Z;CorrelationID=;ProxyState-Run=None;FEAuth=BEVersion-1942127710;ProxyState-Complete=PrepareServerRequest;SharedCacheGuard=0;EndRequest=2023-08-27T00:23:02.575Z;,,,|RoutingDB:ee8ad99c-fbcb-45c2-939e-81869b5ee059,,,CafeV1 +2023-08-27T00:24:02.680Z,7c900c10-ab63-43f4-b53d-9a3274447f44,15,2,1118,20,,Autodiscover,localhost,/AutoDiscover/,,Negotiate,true,RES\HealthMailbox356d248,,Sid~S-1-5-21-434387928-2799628836-4171586136-1617,AMProbe/Local/ClientAccess,127.0.0.1,TS-EX19-04,200,,,GET,Proxy,TS-EX19-01.res.contoso.com,15.02.1118.000,IntraForest,WindowsIdentity,,,,0,,,,0,1,,0,,0,,0,0,,0,2,0,,,,,,,,,0,1,0,,1,,1,1,,,,BeginRequest=2023-08-27T00:24:02.679Z;CorrelationID=;ProxyState-Run=None;FEAuth=BEVersion-1942127710;ProxyState-Complete=PrepareServerRequest;SharedCacheGuard=0;EndRequest=2023-08-27T00:24:02.680Z;,,,|RoutingDB:399bc9b2-7312-46e0-8181-fee7a0ffeaf8,,,CafeV1 ,518864e1-3bf4-421f-af20-0c81cb5a6f62,15,2,1118,20,,,,,,,,,,,,,TS-EX19-04,,,,,,,,,,,,,,,,,,,,,,,,,,,,600018,,,,,,,,,,,,,,,,,,,,,S:ActivityStandardMetadata.Action=GlobalActivity,,,,,, -2023-02-08T00:25:02.793Z,30b16933-fcd7-4e01-815a-bb21cd0a133f,15,2,1118,20,,Autodiscover,localhost,/AutoDiscover/,,Negotiate,true,RES\HealthMailbox866bb29,,Sid~S-1-5-21-434387928-2799628836-4171586136-1129,AMProbe/Local/ClientAccess,::1,TS-EX19-04,200,,,GET,Proxy,TS-EX19-02.res.contoso.com,15.02.1118.000,IntraForest,WindowsIdentity,,,,0,,,,1,0,,0,,0,,0,0,,0,8,0,,,,,,,,,0,0,5,,5,,6,6,,,,BeginRequest=2023-02-08T00:25:02.787Z;CorrelationID=;ProxyState-Run=None;FEAuth=BEVersion-1942127710;ProxyState-Complete=PrepareServerRequest;SharedCacheGuard=0;EndRequest=2023-02-08T00:25:02.793Z;,,,|RoutingDB:ee8ad99c-fbcb-45c2-939e-81869b5ee059,,,CafeV1 -2023-02-08T00:26:02.796Z,d2b47954-c3ea-49cb-90ef-2984dab2b466,15,2,1118,20,,Autodiscover,localhost,/AutoDiscover/,,Negotiate,true,RES\HealthMailbox356d248,,Sid~S-1-5-21-434387928-2799628836-4171586136-1617,AMProbe/Local/ClientAccess,::1,TS-EX19-04,200,,,GET,Proxy,TS-EX19-01.res.contoso.com,15.02.1118.000,IntraForest,WindowsIdentity,,,,0,,,,1,0,,0,,0,,0,0,,0,3,0,,,,,,,,,0,0,0,,0,,1,1,,,,BeginRequest=2023-02-08T00:26:02.794Z;CorrelationID=;ProxyState-Run=None;FEAuth=BEVersion-1942127710;ProxyState-Complete=PrepareServerRequest;SharedCacheGuard=0;EndRequest=2023-02-08T00:26:02.796Z;,,,|RoutingDB:399bc9b2-7312-46e0-8181-fee7a0ffeaf8,,,CafeV1 -2023-02-08T00:27:02.832Z,33516636-4baa-4b6c-b51a-ec52de98e21e,15,2,1118,20,,Autodiscover,localhost,/AutoDiscover/,,Negotiate,true,RES\HealthMailbox866bb29,,Sid~S-1-5-21-434387928-2799628836-4171586136-1129,AMProbe/Local/ClientAccess,::1,TS-EX19-04,200,,,GET,Proxy,TS-EX19-02.res.contoso.com,15.02.1118.000,IntraForest,WindowsIdentity,,,,0,,,,0,0,,0,,0,,0,0,,0,2,0,,,,,,,,,0,1,0,,1,,1,1,,,,BeginRequest=2023-02-08T00:27:02.831Z;CorrelationID=;ProxyState-Run=None;FEAuth=BEVersion-1942127710;ProxyState-Complete=PrepareServerRequest;SharedCacheGuard=0;EndRequest=2023-02-08T00:27:02.832Z;,,,|RoutingDB:ee8ad99c-fbcb-45c2-939e-81869b5ee059,,,CafeV1 -2023-02-08T00:28:02.834Z,4dbca35d-091a-4d8d-8108-0dce06091ab0,15,2,1118,20,,Autodiscover,localhost,/AutoDiscover/,,Negotiate,true,RES\HealthMailbox356d248,,Sid~S-1-5-21-434387928-2799628836-4171586136-1617,AMProbe/Local/ClientAccess,127.0.0.1,TS-EX19-04,200,,,GET,Proxy,TS-EX19-01.res.contoso.com,15.02.1118.000,IntraForest,WindowsIdentity,,,,0,,,,1,0,,0,,0,,0,0,,0,5,0,,,,,,,,,0,0,0,,0,,1,1,,,,BeginRequest=2023-02-08T00:28:02.832Z;CorrelationID=;ProxyState-Run=None;FEAuth=BEVersion-1942127710;ProxyState-Complete=PrepareServerRequest;SharedCacheGuard=0;EndRequest=2023-02-08T00:28:02.834Z;,,,|RoutingDB:399bc9b2-7312-46e0-8181-fee7a0ffeaf8,,,CafeV1 -2023-02-08T00:29:02.936Z,d9d432b8-0dcd-44fb-a618-e5bcb954f4f0,15,2,1118,20,,Autodiscover,localhost,/AutoDiscover/,,Negotiate,true,RES\HealthMailbox96881f2,,Sid~S-1-5-21-434387928-2799628836-4171586136-1618,AMProbe/Local/ClientAccess,::1,TS-EX19-04,200,,,GET,Proxy,TS-EX19-03.res.contoso.com,15.02.1118.000,IntraForest,WindowsIdentity,,,,0,,,,0,0,,0,,0,,0,0,,0,2,0,,,,,,,,,0,0,0,,1,,1,1,,,,BeginRequest=2023-02-08T00:29:02.934Z;CorrelationID=;ProxyState-Run=None;FEAuth=BEVersion-1942127710;ProxyState-Complete=PrepareServerRequest;SharedCacheGuard=0;EndRequest=2023-02-08T00:29:02.936Z;,,,|RoutingDB:7b922fbc-5b8f-496b-be13-ccc0a9fd6a7a,,,CafeV1 +2023-08-27T00:25:02.793Z,30b16933-fcd7-4e01-815a-bb21cd0a133f,15,2,1118,20,,Autodiscover,localhost,/AutoDiscover/,,Negotiate,true,RES\HealthMailbox866bb29,,Sid~S-1-5-21-434387928-2799628836-4171586136-1129,AMProbe/Local/ClientAccess,::1,TS-EX19-04,200,,,GET,Proxy,TS-EX19-02.res.contoso.com,15.02.1118.000,IntraForest,WindowsIdentity,,,,0,,,,1,0,,0,,0,,0,0,,0,8,0,,,,,,,,,0,0,5,,5,,6,6,,,,BeginRequest=2023-08-27T00:25:02.787Z;CorrelationID=;ProxyState-Run=None;FEAuth=BEVersion-1942127710;ProxyState-Complete=PrepareServerRequest;SharedCacheGuard=0;EndRequest=2023-08-27T00:25:02.793Z;,,,|RoutingDB:ee8ad99c-fbcb-45c2-939e-81869b5ee059,,,CafeV1 +2023-08-27T00:26:02.796Z,d2b47954-c3ea-49cb-90ef-2984dab2b466,15,2,1118,20,,Autodiscover,localhost,/AutoDiscover/,,Negotiate,true,RES\HealthMailbox356d248,,Sid~S-1-5-21-434387928-2799628836-4171586136-1617,AMProbe/Local/ClientAccess,::1,TS-EX19-04,200,,,GET,Proxy,TS-EX19-01.res.contoso.com,15.02.1118.000,IntraForest,WindowsIdentity,,,,0,,,,1,0,,0,,0,,0,0,,0,3,0,,,,,,,,,0,0,0,,0,,1,1,,,,BeginRequest=2023-08-27T00:26:02.794Z;CorrelationID=;ProxyState-Run=None;FEAuth=BEVersion-1942127710;ProxyState-Complete=PrepareServerRequest;SharedCacheGuard=0;EndRequest=2023-08-27T00:26:02.796Z;,,,|RoutingDB:399bc9b2-7312-46e0-8181-fee7a0ffeaf8,,,CafeV1 +2023-08-27T00:27:02.832Z,33516636-4baa-4b6c-b51a-ec52de98e21e,15,2,1118,20,,Autodiscover,localhost,/AutoDiscover/,,Negotiate,true,RES\HealthMailbox866bb29,,Sid~S-1-5-21-434387928-2799628836-4171586136-1129,AMProbe/Local/ClientAccess,::1,TS-EX19-04,200,,,GET,Proxy,TS-EX19-02.res.contoso.com,15.02.1118.000,IntraForest,WindowsIdentity,,,,0,,,,0,0,,0,,0,,0,0,,0,2,0,,,,,,,,,0,1,0,,1,,1,1,,,,BeginRequest=2023-08-27T00:27:02.831Z;CorrelationID=;ProxyState-Run=None;FEAuth=BEVersion-1942127710;ProxyState-Complete=PrepareServerRequest;SharedCacheGuard=0;EndRequest=2023-08-27T00:27:02.832Z;,,,|RoutingDB:ee8ad99c-fbcb-45c2-939e-81869b5ee059,,,CafeV1 +2023-08-27T00:28:02.834Z,4dbca35d-091a-4d8d-8108-0dce06091ab0,15,2,1118,20,,Autodiscover,localhost,/AutoDiscover/,,Negotiate,true,RES\HealthMailbox356d248,,Sid~S-1-5-21-434387928-2799628836-4171586136-1617,AMProbe/Local/ClientAccess,127.0.0.1,TS-EX19-04,200,,,GET,Proxy,TS-EX19-01.res.contoso.com,15.02.1118.000,IntraForest,WindowsIdentity,,,,0,,,,1,0,,0,,0,,0,0,,0,5,0,,,,,,,,,0,0,0,,0,,1,1,,,,BeginRequest=2023-08-27T00:28:02.832Z;CorrelationID=;ProxyState-Run=None;FEAuth=BEVersion-1942127710;ProxyState-Complete=PrepareServerRequest;SharedCacheGuard=0;EndRequest=2023-08-27T00:28:02.834Z;,,,|RoutingDB:399bc9b2-7312-46e0-8181-fee7a0ffeaf8,,,CafeV1 +2023-08-27T00:29:02.936Z,d9d432b8-0dcd-44fb-a618-e5bcb954f4f0,15,2,1118,20,,Autodiscover,localhost,/AutoDiscover/,,Negotiate,true,RES\HealthMailbox96881f2,,Sid~S-1-5-21-434387928-2799628836-4171586136-1618,AMProbe/Local/ClientAccess,::1,TS-EX19-04,200,,,GET,Proxy,TS-EX19-03.res.contoso.com,15.02.1118.000,IntraForest,WindowsIdentity,,,,0,,,,0,0,,0,,0,,0,0,,0,2,0,,,,,,,,,0,0,0,,1,,1,1,,,,BeginRequest=2023-08-27T00:29:02.934Z;CorrelationID=;ProxyState-Run=None;FEAuth=BEVersion-1942127710;ProxyState-Complete=PrepareServerRequest;SharedCacheGuard=0;EndRequest=2023-08-27T00:29:02.936Z;,,,|RoutingDB:7b922fbc-5b8f-496b-be13-ccc0a9fd6a7a,,,CafeV1 ,65a6c42d-ba8a-4268-9040-065943db0052,15,2,1118,20,,,,,,,,,,,,,TS-EX19-04,,,,,,,,,,,,,,,,,,,,,,,,,,,,600029,,,,,,,,,,,,,,,,,,,,,S:ActivityStandardMetadata.Action=GlobalActivity,,,,,, -2023-02-08T00:30:03.045Z,04202d92-0581-4a40-891e-6480e4964b05,15,2,1118,20,,Autodiscover,localhost,/AutoDiscover/,,Negotiate,true,RES\HealthMailbox866bb29,,Sid~S-1-5-21-434387928-2799628836-4171586136-1129,AMProbe/Local/ClientAccess,127.0.0.1,TS-EX19-04,200,,,GET,Proxy,TS-EX19-02.res.contoso.com,15.02.1118.000,IntraForest,WindowsIdentity,,,,0,,,,1,0,,0,,0,,0,0,,0,26,0,,,,,,,,,0,0,23,,23,,24,24,,,,BeginRequest=2023-02-08T00:30:03.019Z;CorrelationID=;ProxyState-Run=None;FEAuth=BEVersion-1942127710;ProxyState-Complete=PrepareServerRequest;SharedCacheGuard=0;EndRequest=2023-02-08T00:30:03.045Z;,,,|RoutingDB:ee8ad99c-fbcb-45c2-939e-81869b5ee059,,,CafeV1 -2023-02-08T00:31:03.033Z,ffea0894-d7ea-459a-89bc-760929d955cf,15,2,1118,20,,Autodiscover,localhost,/AutoDiscover/,,Negotiate,true,RES\HealthMailbox501a219,,Sid~S-1-5-21-434387928-2799628836-4171586136-1619,AMProbe/Local/ClientAccess,::1,TS-EX19-04,200,,,GET,Proxy,TS-EX19-04.res.contoso.com,15.02.1118.000,IntraForest,WindowsIdentity,,,,0,,,,1,0,,0,,0,,0,0,,0,3,0,,,,,,,,,0,0,1,,1,,2,2,,,,BeginRequest=2023-02-08T00:31:03.031Z;CorrelationID=;ProxyState-Run=None;FEAuth=BEVersion-1942127710;ProxyState-Complete=PrepareServerRequest;SharedCacheGuard=0;EndRequest=2023-02-08T00:31:03.033Z;,,,|RoutingDB:ea58efbd-ca6c-4d7d-b738-383065284040,,,CafeV1 -2023-02-08T00:32:06.250Z,6e3a889e-ff21-4e2d-a293-cfafb96816a1,15,2,1118,20,,Autodiscover,localhost,/AutoDiscover/,,Negotiate,true,RES\HealthMailbox356d248,,Sid~S-1-5-21-434387928-2799628836-4171586136-1617,AMProbe/Local/ClientAccess,127.0.0.1,TS-EX19-04,200,,,GET,Proxy,TS-EX19-01.res.contoso.com,15.02.1118.000,IntraForest,WindowsIdentity,,,,0,,,,66,0,,0,,0,,0,0,,0,121,0,,,,,,,,,0,1,50,,51,,117,117,,,,BeginRequest=2023-02-08T00:32:06.132Z;CorrelationID=;ProxyState-Run=None;FEAuth=BEVersion-1942127710;ProxyState-Complete=PrepareServerRequest;SharedCacheGuard=0;EndRequest=2023-02-08T00:32:06.250Z;I32:ADS.C[BR-DC-02]=2;F:ADS.AL[BR-DC-02]=29.1567;I32:ATE.C[BR-DC-02.RES.contoso.com]=4;F:ATE.AL[BR-DC-02.RES.contoso.com]=0;I32:ADR.C[BR-DC-02]=2;F:ADR.AL[BR-DC-02]=1.57895,,,|RoutingDB:399bc9b2-7312-46e0-8181-fee7a0ffeaf8,,,CafeV1 -2023-02-08T00:33:06.956Z,c06fb72f-5a7d-4003-b2b8-b58ad07a88bb,15,2,1118,20,,Autodiscover,localhost,/AutoDiscover/,,Negotiate,true,RES\HealthMailbox96881f2,,Sid~S-1-5-21-434387928-2799628836-4171586136-1618,AMProbe/Local/ClientAccess,::1,TS-EX19-04,200,,,GET,Proxy,TS-EX19-03.res.contoso.com,15.02.1118.000,IntraForest,WindowsIdentity,,,,0,,,,1,0,,0,,0,,0,0,,0,4,0,,,,,,,,,0,0,0,,0,,1,1,,,,BeginRequest=2023-02-08T00:33:06.954Z;CorrelationID=;ProxyState-Run=None;FEAuth=BEVersion-1942127710;ProxyState-Complete=PrepareServerRequest;SharedCacheGuard=0;EndRequest=2023-02-08T00:33:06.956Z;,,,|RoutingDB:7b922fbc-5b8f-496b-be13-ccc0a9fd6a7a,,,CafeV1 -2023-02-08T00:34:03.313Z,097f004b-a78e-4c02-bd3f-b552acbdfd01,15,2,1118,20,,Autodiscover,localhost,/AutoDiscover/,,Negotiate,true,RES\HealthMailbox866bb29,,Sid~S-1-5-21-434387928-2799628836-4171586136-1129,AMProbe/Local/ClientAccess,::1,TS-EX19-04,200,,,GET,Proxy,TS-EX19-02.res.contoso.com,15.02.1118.000,IntraForest,WindowsIdentity,,,,0,,,,0,0,,0,,0,,0,0,,0,2,1,,,,,,,,,0,0,0,,1,,1,1,,,,BeginRequest=2023-02-08T00:34:03.312Z;CorrelationID=;ProxyState-Run=None;FEAuth=BEVersion-1942127710;ProxyState-Complete=PrepareServerRequest;SharedCacheGuard=0;EndRequest=2023-02-08T00:34:03.313Z;,,,|RoutingDB:ee8ad99c-fbcb-45c2-939e-81869b5ee059,,,CafeV1 +2023-08-27T00:30:03.045Z,04202d92-0581-4a40-891e-6480e4964b05,15,2,1118,20,,Autodiscover,localhost,/AutoDiscover/,,Negotiate,true,RES\HealthMailbox866bb29,,Sid~S-1-5-21-434387928-2799628836-4171586136-1129,AMProbe/Local/ClientAccess,127.0.0.1,TS-EX19-04,200,,,GET,Proxy,TS-EX19-02.res.contoso.com,15.02.1118.000,IntraForest,WindowsIdentity,,,,0,,,,1,0,,0,,0,,0,0,,0,26,0,,,,,,,,,0,0,23,,23,,24,24,,,,BeginRequest=2023-08-27T00:30:03.019Z;CorrelationID=;ProxyState-Run=None;FEAuth=BEVersion-1942127710;ProxyState-Complete=PrepareServerRequest;SharedCacheGuard=0;EndRequest=2023-08-27T00:30:03.045Z;,,,|RoutingDB:ee8ad99c-fbcb-45c2-939e-81869b5ee059,,,CafeV1 +2023-08-27T00:31:03.033Z,ffea0894-d7ea-459a-89bc-760929d955cf,15,2,1118,20,,Autodiscover,localhost,/AutoDiscover/,,Negotiate,true,RES\HealthMailbox501a219,,Sid~S-1-5-21-434387928-2799628836-4171586136-1619,AMProbe/Local/ClientAccess,::1,TS-EX19-04,200,,,GET,Proxy,TS-EX19-04.res.contoso.com,15.02.1118.000,IntraForest,WindowsIdentity,,,,0,,,,1,0,,0,,0,,0,0,,0,3,0,,,,,,,,,0,0,1,,1,,2,2,,,,BeginRequest=2023-08-27T00:31:03.031Z;CorrelationID=;ProxyState-Run=None;FEAuth=BEVersion-1942127710;ProxyState-Complete=PrepareServerRequest;SharedCacheGuard=0;EndRequest=2023-08-27T00:31:03.033Z;,,,|RoutingDB:ea58efbd-ca6c-4d7d-b738-383065284040,,,CafeV1 +2023-08-27T00:32:06.250Z,6e3a889e-ff21-4e2d-a293-cfafb96816a1,15,2,1118,20,,Autodiscover,localhost,/AutoDiscover/,,Negotiate,true,RES\HealthMailbox356d248,,Sid~S-1-5-21-434387928-2799628836-4171586136-1617,AMProbe/Local/ClientAccess,127.0.0.1,TS-EX19-04,200,,,GET,Proxy,TS-EX19-01.res.contoso.com,15.02.1118.000,IntraForest,WindowsIdentity,,,,0,,,,66,0,,0,,0,,0,0,,0,121,0,,,,,,,,,0,1,50,,51,,117,117,,,,BeginRequest=2023-08-27T00:32:06.132Z;CorrelationID=;ProxyState-Run=None;FEAuth=BEVersion-1942127710;ProxyState-Complete=PrepareServerRequest;SharedCacheGuard=0;EndRequest=2023-08-27T00:32:06.250Z;I32:ADS.C[BR-DC-02]=2;F:ADS.AL[BR-DC-02]=29.1567;I32:ATE.C[BR-DC-02.RES.contoso.com]=4;F:ATE.AL[BR-DC-02.RES.contoso.com]=0;I32:ADR.C[BR-DC-02]=2;F:ADR.AL[BR-DC-02]=1.57895,,,|RoutingDB:399bc9b2-7312-46e0-8181-fee7a0ffeaf8,,,CafeV1 +2023-08-27T00:33:06.956Z,c06fb72f-5a7d-4003-b2b8-b58ad07a88bb,15,2,1118,20,,Autodiscover,localhost,/AutoDiscover/,,Negotiate,true,RES\HealthMailbox96881f2,,Sid~S-1-5-21-434387928-2799628836-4171586136-1618,AMProbe/Local/ClientAccess,::1,TS-EX19-04,200,,,GET,Proxy,TS-EX19-03.res.contoso.com,15.02.1118.000,IntraForest,WindowsIdentity,,,,0,,,,1,0,,0,,0,,0,0,,0,4,0,,,,,,,,,0,0,0,,0,,1,1,,,,BeginRequest=2023-08-27T00:33:06.954Z;CorrelationID=;ProxyState-Run=None;FEAuth=BEVersion-1942127710;ProxyState-Complete=PrepareServerRequest;SharedCacheGuard=0;EndRequest=2023-08-27T00:33:06.956Z;,,,|RoutingDB:7b922fbc-5b8f-496b-be13-ccc0a9fd6a7a,,,CafeV1 +2023-08-27T00:34:03.313Z,097f004b-a78e-4c02-bd3f-b552acbdfd01,15,2,1118,20,,Autodiscover,localhost,/AutoDiscover/,,Negotiate,true,RES\HealthMailbox866bb29,,Sid~S-1-5-21-434387928-2799628836-4171586136-1129,AMProbe/Local/ClientAccess,::1,TS-EX19-04,200,,,GET,Proxy,TS-EX19-02.res.contoso.com,15.02.1118.000,IntraForest,WindowsIdentity,,,,0,,,,0,0,,0,,0,,0,0,,0,2,1,,,,,,,,,0,0,0,,1,,1,1,,,,BeginRequest=2023-08-27T00:34:03.312Z;CorrelationID=;ProxyState-Run=None;FEAuth=BEVersion-1942127710;ProxyState-Complete=PrepareServerRequest;SharedCacheGuard=0;EndRequest=2023-08-27T00:34:03.313Z;,,,|RoutingDB:ee8ad99c-fbcb-45c2-939e-81869b5ee059,,,CafeV1 ,7930a14a-a763-4bbe-95ef-4e80fef3d84a,15,2,1118,20,,,,,,,,,,,,,TS-EX19-04,,,,,,,,,,,,,,,,,,,,,,,,,,,,600027,,,,,,,,,,,,,,,,,,,,,S:ActivityStandardMetadata.Action=GlobalActivity,,,,,, -2023-02-08T00:35:03.429Z,c1dd2aea-2c60-4d03-a38c-e7d0666a5436,15,2,1118,20,,Autodiscover,localhost,/AutoDiscover/,,Negotiate,true,RES\HealthMailbox501a219,,Sid~S-1-5-21-434387928-2799628836-4171586136-1619,AMProbe/Local/ClientAccess,::1,TS-EX19-04,200,,,GET,Proxy,TS-EX19-04.res.contoso.com,15.02.1118.000,IntraForest,WindowsIdentity,,,,0,,,,1,0,,0,,0,,0,0,,0,3,0,,,,,,,,,0,0,1,,1,,2,2,,,,BeginRequest=2023-02-08T00:35:03.427Z;CorrelationID=;ProxyState-Run=None;FEAuth=BEVersion-1942127710;ProxyState-Complete=PrepareServerRequest;SharedCacheGuard=0;EndRequest=2023-02-08T00:35:03.429Z;,,,|RoutingDB:ea58efbd-ca6c-4d7d-b738-383065284040,,,CafeV1 -2023-02-08T00:36:08.784Z,ad9a9e62-2dc7-41e1-a5e6-068dccdf19bd,15,2,1118,20,,Autodiscover,localhost,/AutoDiscover/,,Negotiate,true,RES\HealthMailbox356d248,,Sid~S-1-5-21-434387928-2799628836-4171586136-1617,AMProbe/Local/ClientAccess,::1,TS-EX19-04,200,,,GET,Proxy,TS-EX19-01.res.contoso.com,15.02.1118.000,IntraForest,WindowsIdentity,,,,0,,,,1,0,,0,,0,,0,0,,0,7,0,,,,,,,,,0,0,0,,0,,1,1,,,,BeginRequest=2023-02-08T00:36:08.782Z;CorrelationID=;ProxyState-Run=None;FEAuth=BEVersion-1942127710;ProxyState-Complete=PrepareServerRequest;SharedCacheGuard=0;EndRequest=2023-02-08T00:36:08.784Z;,,,|RoutingDB:399bc9b2-7312-46e0-8181-fee7a0ffeaf8,,,CafeV1 -2023-02-08T00:37:03.673Z,55314d35-66fe-4a8c-995c-4073fe06b772,15,2,1118,20,,Autodiscover,localhost,/AutoDiscover/,,Negotiate,true,RES\HealthMailbox501a219,,Sid~S-1-5-21-434387928-2799628836-4171586136-1619,AMProbe/Local/ClientAccess,::1,TS-EX19-04,200,,,GET,Proxy,TS-EX19-04.res.contoso.com,15.02.1118.000,IntraForest,WindowsIdentity,,,,0,,,,0,1,,0,,0,,0,0,,0,5,0,,,,,,,,,0,1,3,,4,,4,4,,,,BeginRequest=2023-02-08T00:37:03.669Z;CorrelationID=;ProxyState-Run=None;FEAuth=BEVersion-1942127710;ProxyState-Complete=PrepareServerRequest;SharedCacheGuard=0;EndRequest=2023-02-08T00:37:03.673Z;,,,|RoutingDB:ea58efbd-ca6c-4d7d-b738-383065284040,,,CafeV1 -2023-02-08T00:38:03.820Z,3a134800-ebc8-45e9-aa51-30536b3b2dd8,15,2,1118,20,,Autodiscover,localhost,/AutoDiscover/,,Negotiate,true,RES\HealthMailbox866bb29,,Sid~S-1-5-21-434387928-2799628836-4171586136-1129,AMProbe/Local/ClientAccess,::1,TS-EX19-04,200,,,GET,Proxy,TS-EX19-02.res.contoso.com,15.02.1118.000,IntraForest,WindowsIdentity,,,,0,,,,1,0,,0,,0,,0,0,,0,5,0,,,,,,,,,0,0,3,,3,,4,4,,,,BeginRequest=2023-02-08T00:38:03.815Z;CorrelationID=;ProxyState-Run=None;FEAuth=BEVersion-1942127710;ProxyState-Complete=PrepareServerRequest;SharedCacheGuard=0;EndRequest=2023-02-08T00:38:03.820Z;,,,|RoutingDB:ee8ad99c-fbcb-45c2-939e-81869b5ee059,,,CafeV1 -2023-02-08T00:39:04.039Z,097a4925-5435-45be-949d-a129db4ea981,15,2,1118,20,,Autodiscover,localhost,/AutoDiscover/,,Negotiate,true,RES\HealthMailbox356d248,,Sid~S-1-5-21-434387928-2799628836-4171586136-1617,AMProbe/Local/ClientAccess,127.0.0.1,TS-EX19-04,200,,,GET,Proxy,TS-EX19-01.res.contoso.com,15.02.1118.000,IntraForest,WindowsIdentity,,,,0,,,,0,1,,0,,0,,0,0,,0,11,0,,,,,,,,,0,1,0,,1,,1,1,,,,BeginRequest=2023-02-08T00:39:04.037Z;CorrelationID=;ProxyState-Run=None;ServerLocatorRefresh=399bc9b2-7312-46e0-8181-fee7a0ffeaf8;RefreshingCacheEntry=CacheEntry(BackEndServer TS-EX19-01.RES.contoso.com~1942127710|ResourceForest contoso.com|FailoverSequenceNumber 638113239236337077|LastRefreshTime 2/8/2023 12:09:01 AM);FEAuth=BEVersion-1942127710;ProxyState-Complete=PrepareServerRequest;SharedCacheGuard=0;EndRequest=2023-02-08T00:39:04.039Z;,,,|RoutingDB:399bc9b2-7312-46e0-8181-fee7a0ffeaf8,,,CafeV1 +2023-08-27T00:35:03.429Z,c1dd2aea-2c60-4d03-a38c-e7d0666a5436,15,2,1118,20,,Autodiscover,localhost,/AutoDiscover/,,Negotiate,true,RES\HealthMailbox501a219,,Sid~S-1-5-21-434387928-2799628836-4171586136-1619,AMProbe/Local/ClientAccess,::1,TS-EX19-04,200,,,GET,Proxy,TS-EX19-04.res.contoso.com,15.02.1118.000,IntraForest,WindowsIdentity,,,,0,,,,1,0,,0,,0,,0,0,,0,3,0,,,,,,,,,0,0,1,,1,,2,2,,,,BeginRequest=2023-08-27T00:35:03.427Z;CorrelationID=;ProxyState-Run=None;FEAuth=BEVersion-1942127710;ProxyState-Complete=PrepareServerRequest;SharedCacheGuard=0;EndRequest=2023-08-27T00:35:03.429Z;,,,|RoutingDB:ea58efbd-ca6c-4d7d-b738-383065284040,,,CafeV1 +2023-08-27T00:36:08.784Z,ad9a9e62-2dc7-41e1-a5e6-068dccdf19bd,15,2,1118,20,,Autodiscover,localhost,/AutoDiscover/,,Negotiate,true,RES\HealthMailbox356d248,,Sid~S-1-5-21-434387928-2799628836-4171586136-1617,AMProbe/Local/ClientAccess,::1,TS-EX19-04,200,,,GET,Proxy,TS-EX19-01.res.contoso.com,15.02.1118.000,IntraForest,WindowsIdentity,,,,0,,,,1,0,,0,,0,,0,0,,0,7,0,,,,,,,,,0,0,0,,0,,1,1,,,,BeginRequest=2023-08-27T00:36:08.782Z;CorrelationID=;ProxyState-Run=None;FEAuth=BEVersion-1942127710;ProxyState-Complete=PrepareServerRequest;SharedCacheGuard=0;EndRequest=2023-08-27T00:36:08.784Z;,,,|RoutingDB:399bc9b2-7312-46e0-8181-fee7a0ffeaf8,,,CafeV1 +2023-08-27T00:37:03.673Z,55314d35-66fe-4a8c-995c-4073fe06b772,15,2,1118,20,,Autodiscover,localhost,/AutoDiscover/,,Negotiate,true,RES\HealthMailbox501a219,,Sid~S-1-5-21-434387928-2799628836-4171586136-1619,AMProbe/Local/ClientAccess,::1,TS-EX19-04,200,,,GET,Proxy,TS-EX19-04.res.contoso.com,15.02.1118.000,IntraForest,WindowsIdentity,,,,0,,,,0,1,,0,,0,,0,0,,0,5,0,,,,,,,,,0,1,3,,4,,4,4,,,,BeginRequest=2023-08-27T00:37:03.669Z;CorrelationID=;ProxyState-Run=None;FEAuth=BEVersion-1942127710;ProxyState-Complete=PrepareServerRequest;SharedCacheGuard=0;EndRequest=2023-08-27T00:37:03.673Z;,,,|RoutingDB:ea58efbd-ca6c-4d7d-b738-383065284040,,,CafeV1 +2023-08-27T00:38:03.820Z,3a134800-ebc8-45e9-aa51-30536b3b2dd8,15,2,1118,20,,Autodiscover,localhost,/AutoDiscover/,,Negotiate,true,RES\HealthMailbox866bb29,,Sid~S-1-5-21-434387928-2799628836-4171586136-1129,AMProbe/Local/ClientAccess,::1,TS-EX19-04,200,,,GET,Proxy,TS-EX19-02.res.contoso.com,15.02.1118.000,IntraForest,WindowsIdentity,,,,0,,,,1,0,,0,,0,,0,0,,0,5,0,,,,,,,,,0,0,3,,3,,4,4,,,,BeginRequest=2023-08-27T00:38:03.815Z;CorrelationID=;ProxyState-Run=None;FEAuth=BEVersion-1942127710;ProxyState-Complete=PrepareServerRequest;SharedCacheGuard=0;EndRequest=2023-08-27T00:38:03.820Z;,,,|RoutingDB:ee8ad99c-fbcb-45c2-939e-81869b5ee059,,,CafeV1 +2023-08-27T00:39:04.039Z,097a4925-5435-45be-949d-a129db4ea981,15,2,1118,20,,Autodiscover,localhost,/AutoDiscover/,,Negotiate,true,RES\HealthMailbox356d248,,Sid~S-1-5-21-434387928-2799628836-4171586136-1617,AMProbe/Local/ClientAccess,127.0.0.1,TS-EX19-04,200,,,GET,Proxy,TS-EX19-01.res.contoso.com,15.02.1118.000,IntraForest,WindowsIdentity,,,,0,,,,0,1,,0,,0,,0,0,,0,11,0,,,,,,,,,0,1,0,,1,,1,1,,,,BeginRequest=2023-08-27T00:39:04.037Z;CorrelationID=;ProxyState-Run=None;ServerLocatorRefresh=399bc9b2-7312-46e0-8181-fee7a0ffeaf8;RefreshingCacheEntry=CacheEntry(BackEndServer TS-EX19-01.RES.contoso.com~1942127710|ResourceForest contoso.com|FailoverSequenceNumber 638113239236337077|LastRefreshTime 2/8/2023 12:09:01 AM);FEAuth=BEVersion-1942127710;ProxyState-Complete=PrepareServerRequest;SharedCacheGuard=0;EndRequest=2023-08-27T00:39:04.039Z;,,,|RoutingDB:399bc9b2-7312-46e0-8181-fee7a0ffeaf8,,,CafeV1 ,5d43735e-cdf0-42a7-b8a3-8e20507dfb56,15,2,1118,20,,,,,,,,,,,,,TS-EX19-04,,,,,,,,,,,,,,,,,,,,,,,,,,,,600014,,,,,,,,,,,,,,,,,,,,,S:ActivityStandardMetadata.Action=GlobalActivity,,,,,, -2023-02-08T00:40:04.089Z,2170c32d-d255-47e5-a81d-e8e0d8972f14,15,2,1118,20,,Autodiscover,localhost,/AutoDiscover/,,Negotiate,true,RES\HealthMailbox356d248,,Sid~S-1-5-21-434387928-2799628836-4171586136-1617,AMProbe/Local/ClientAccess,127.0.0.1,TS-EX19-04,200,,,GET,Proxy,TS-EX19-01.res.contoso.com,15.02.1118.000,IntraForest,WindowsIdentity,,,,0,,,,1,0,,0,,0,,0,0,,0,2,0,,,,,,,,,0,0,0,,0,,1,1,,,,BeginRequest=2023-02-08T00:40:04.087Z;CorrelationID=;ProxyState-Run=None;FEAuth=BEVersion-1942127710;ProxyState-Complete=PrepareServerRequest;SharedCacheGuard=0;EndRequest=2023-02-08T00:40:04.089Z;,,,|RoutingDB:399bc9b2-7312-46e0-8181-fee7a0ffeaf8,,,CafeV1 -2023-02-08T00:41:04.232Z,18cd7599-91d2-45ba-b8e2-7eec5f351902,15,2,1118,20,,Autodiscover,localhost,/AutoDiscover/,,Negotiate,true,RES\HealthMailbox356d248,,Sid~S-1-5-21-434387928-2799628836-4171586136-1617,AMProbe/Local/ClientAccess,127.0.0.1,TS-EX19-04,200,,,GET,Proxy,TS-EX19-01.res.contoso.com,15.02.1118.000,IntraForest,WindowsIdentity,,,,0,,,,0,0,,0,,0,,0,0,,0,7,0,,,,,,,,,0,0,4,,5,,5,5,,,,BeginRequest=2023-02-08T00:41:04.226Z;CorrelationID=;ProxyState-Run=None;FEAuth=BEVersion-1942127710;ProxyState-Complete=PrepareServerRequest;SharedCacheGuard=0;EndRequest=2023-02-08T00:41:04.232Z;,,,|RoutingDB:399bc9b2-7312-46e0-8181-fee7a0ffeaf8,,,CafeV1 -2023-02-08T00:42:04.297Z,4604aaed-c132-4b23-9064-5fc013ce2360,15,2,1118,20,,Autodiscover,localhost,/AutoDiscover/,,Negotiate,true,RES\HealthMailbox501a219,,Sid~S-1-5-21-434387928-2799628836-4171586136-1619,AMProbe/Local/ClientAccess,::1,TS-EX19-04,200,,,GET,Proxy,TS-EX19-04.res.contoso.com,15.02.1118.000,IntraForest,WindowsIdentity,,,,0,,,,1,0,,0,,0,,0,0,,0,11,0,,,,,,,,,0,0,0,,0,,1,1,,,,BeginRequest=2023-02-08T00:42:04.296Z;CorrelationID=;ProxyState-Run=None;FEAuth=BEVersion-1942127710;ProxyState-Complete=PrepareServerRequest;SharedCacheGuard=0;EndRequest=2023-02-08T00:42:04.297Z;,,,|RoutingDB:ea58efbd-ca6c-4d7d-b738-383065284040,,,CafeV1 -2023-02-08T00:43:04.417Z,ae2ea565-895b-44ba-ab66-f8e1b9d48315,15,2,1118,20,,Autodiscover,localhost,/AutoDiscover/,,Negotiate,true,RES\HealthMailbox356d248,,Sid~S-1-5-21-434387928-2799628836-4171586136-1617,AMProbe/Local/ClientAccess,127.0.0.1,TS-EX19-04,200,,,GET,Proxy,TS-EX19-01.res.contoso.com,15.02.1118.000,IntraForest,WindowsIdentity,,,,0,,,,1,0,,0,,0,,0,0,,0,14,0,,,,,,,,,0,0,10,,10,,11,11,,,,BeginRequest=2023-02-08T00:43:04.405Z;CorrelationID=;ProxyState-Run=None;FEAuth=BEVersion-1942127710;ProxyState-Complete=PrepareServerRequest;SharedCacheGuard=0;EndRequest=2023-02-08T00:43:04.417Z;,,,|RoutingDB:399bc9b2-7312-46e0-8181-fee7a0ffeaf8,,,CafeV1 -2023-02-08T00:44:04.467Z,cef0b519-76b7-4553-a410-127ea6e7dde8,15,2,1118,20,,Autodiscover,localhost,/AutoDiscover/,,Negotiate,true,RES\HealthMailbox866bb29,,Sid~S-1-5-21-434387928-2799628836-4171586136-1129,AMProbe/Local/ClientAccess,::1,TS-EX19-04,200,,,GET,Proxy,TS-EX19-02.res.contoso.com,15.02.1118.000,IntraForest,WindowsIdentity,,,,0,,,,1,0,,0,,0,,0,0,,0,4,0,,,,,,,,,0,0,0,,0,,1,1,,,,BeginRequest=2023-02-08T00:44:04.466Z;CorrelationID=;ProxyState-Run=None;FEAuth=BEVersion-1942127710;ProxyState-Complete=PrepareServerRequest;SharedCacheGuard=0;EndRequest=2023-02-08T00:44:04.467Z;,,,|RoutingDB:ee8ad99c-fbcb-45c2-939e-81869b5ee059,,,CafeV1 +2023-08-27T00:40:04.089Z,2170c32d-d255-47e5-a81d-e8e0d8972f14,15,2,1118,20,,Autodiscover,localhost,/AutoDiscover/,,Negotiate,true,RES\HealthMailbox356d248,,Sid~S-1-5-21-434387928-2799628836-4171586136-1617,AMProbe/Local/ClientAccess,127.0.0.1,TS-EX19-04,200,,,GET,Proxy,TS-EX19-01.res.contoso.com,15.02.1118.000,IntraForest,WindowsIdentity,,,,0,,,,1,0,,0,,0,,0,0,,0,2,0,,,,,,,,,0,0,0,,0,,1,1,,,,BeginRequest=2023-08-27T00:40:04.087Z;CorrelationID=;ProxyState-Run=None;FEAuth=BEVersion-1942127710;ProxyState-Complete=PrepareServerRequest;SharedCacheGuard=0;EndRequest=2023-08-27T00:40:04.089Z;,,,|RoutingDB:399bc9b2-7312-46e0-8181-fee7a0ffeaf8,,,CafeV1 +2023-08-27T00:41:04.232Z,18cd7599-91d2-45ba-b8e2-7eec5f351902,15,2,1118,20,,Autodiscover,localhost,/AutoDiscover/,,Negotiate,true,RES\HealthMailbox356d248,,Sid~S-1-5-21-434387928-2799628836-4171586136-1617,AMProbe/Local/ClientAccess,127.0.0.1,TS-EX19-04,200,,,GET,Proxy,TS-EX19-01.res.contoso.com,15.02.1118.000,IntraForest,WindowsIdentity,,,,0,,,,0,0,,0,,0,,0,0,,0,7,0,,,,,,,,,0,0,4,,5,,5,5,,,,BeginRequest=2023-08-27T00:41:04.226Z;CorrelationID=;ProxyState-Run=None;FEAuth=BEVersion-1942127710;ProxyState-Complete=PrepareServerRequest;SharedCacheGuard=0;EndRequest=2023-08-27T00:41:04.232Z;,,,|RoutingDB:399bc9b2-7312-46e0-8181-fee7a0ffeaf8,,,CafeV1 +2023-08-27T00:42:04.297Z,4604aaed-c132-4b23-9064-5fc013ce2360,15,2,1118,20,,Autodiscover,localhost,/AutoDiscover/,,Negotiate,true,RES\HealthMailbox501a219,,Sid~S-1-5-21-434387928-2799628836-4171586136-1619,AMProbe/Local/ClientAccess,::1,TS-EX19-04,200,,,GET,Proxy,TS-EX19-04.res.contoso.com,15.02.1118.000,IntraForest,WindowsIdentity,,,,0,,,,1,0,,0,,0,,0,0,,0,11,0,,,,,,,,,0,0,0,,0,,1,1,,,,BeginRequest=2023-08-27T00:42:04.296Z;CorrelationID=;ProxyState-Run=None;FEAuth=BEVersion-1942127710;ProxyState-Complete=PrepareServerRequest;SharedCacheGuard=0;EndRequest=2023-08-27T00:42:04.297Z;,,,|RoutingDB:ea58efbd-ca6c-4d7d-b738-383065284040,,,CafeV1 +2023-08-27T00:43:04.417Z,ae2ea565-895b-44ba-ab66-f8e1b9d48315,15,2,1118,20,,Autodiscover,localhost,/AutoDiscover/,,Negotiate,true,RES\HealthMailbox356d248,,Sid~S-1-5-21-434387928-2799628836-4171586136-1617,AMProbe/Local/ClientAccess,127.0.0.1,TS-EX19-04,200,,,GET,Proxy,TS-EX19-01.res.contoso.com,15.02.1118.000,IntraForest,WindowsIdentity,,,,0,,,,1,0,,0,,0,,0,0,,0,14,0,,,,,,,,,0,0,10,,10,,11,11,,,,BeginRequest=2023-08-27T00:43:04.405Z;CorrelationID=;ProxyState-Run=None;FEAuth=BEVersion-1942127710;ProxyState-Complete=PrepareServerRequest;SharedCacheGuard=0;EndRequest=2023-08-27T00:43:04.417Z;,,,|RoutingDB:399bc9b2-7312-46e0-8181-fee7a0ffeaf8,,,CafeV1 +2023-08-27T00:44:04.467Z,cef0b519-76b7-4553-a410-127ea6e7dde8,15,2,1118,20,,Autodiscover,localhost,/AutoDiscover/,,Negotiate,true,RES\HealthMailbox866bb29,,Sid~S-1-5-21-434387928-2799628836-4171586136-1129,AMProbe/Local/ClientAccess,::1,TS-EX19-04,200,,,GET,Proxy,TS-EX19-02.res.contoso.com,15.02.1118.000,IntraForest,WindowsIdentity,,,,0,,,,1,0,,0,,0,,0,0,,0,4,0,,,,,,,,,0,0,0,,0,,1,1,,,,BeginRequest=2023-08-27T00:44:04.466Z;CorrelationID=;ProxyState-Run=None;FEAuth=BEVersion-1942127710;ProxyState-Complete=PrepareServerRequest;SharedCacheGuard=0;EndRequest=2023-08-27T00:44:04.467Z;,,,|RoutingDB:ee8ad99c-fbcb-45c2-939e-81869b5ee059,,,CafeV1 ,31775000-b4b7-4568-9e5e-e99787284538,15,2,1118,20,,,,,,,,,,,,,TS-EX19-04,,,,,,,,,,,,,,,,,,,,,,,,,,,,600013,,,,,,,,,,,,,,,,,,,,,S:ActivityStandardMetadata.Action=GlobalActivity;I32:ATE.C[MISSED]=3;F:ATE.AL[MISSED]=0;I32:ADR.C[MISSED]=2;F:ADR.AL[MISSED]=1.83505;I32:ADS.C[MISSED]=1;F:ADS.AL[MISSED]=1.7742,,,,,, -2023-02-08T00:45:06.687Z,b239c01b-9204-4d3b-a978-04a0162bab02,15,2,1118,20,,Autodiscover,localhost,/AutoDiscover/,,Negotiate,true,RES\HealthMailbox501a219,,Sid~S-1-5-21-434387928-2799628836-4171586136-1619,AMProbe/Local/ClientAccess,::1,TS-EX19-04,200,,,GET,Proxy,TS-EX19-04.res.contoso.com,15.02.1118.000,IntraForest,WindowsIdentity,,,,0,,,,33,0,,0,,0,,0,0,,0,290,0,,,,,,,,,0,0,195,,195,,228,228,,,,BeginRequest=2023-02-08T00:45:06.458Z;CorrelationID=;ProxyState-Run=None;FEAuth=BEVersion-1942127710;ProxyState-Complete=PrepareServerRequest;SharedCacheGuard=0;EndRequest=2023-02-08T00:45:06.687Z;,,,|RoutingDB:ea58efbd-ca6c-4d7d-b738-383065284040,,,CafeV1 -2023-02-08T00:46:04.982Z,9c3576a5-79a8-4a79-b24b-8a8e10668e4e,15,2,1118,20,,Autodiscover,localhost,/AutoDiscover/,,Negotiate,true,RES\HealthMailbox96881f2,,Sid~S-1-5-21-434387928-2799628836-4171586136-1618,AMProbe/Local/ClientAccess,127.0.0.1,TS-EX19-04,200,,,GET,Proxy,TS-EX19-03.res.contoso.com,15.02.1118.000,IntraForest,WindowsIdentity,,,,0,,,,0,0,,0,,0,,0,0,,0,3,0,,,,,,,,,0,1,0,,1,,1,1,,,,BeginRequest=2023-02-08T00:46:04.980Z;CorrelationID=;ProxyState-Run=None;FEAuth=BEVersion-1942127710;ProxyState-Complete=PrepareServerRequest;SharedCacheGuard=0;EndRequest=2023-02-08T00:46:04.982Z;,,,|RoutingDB:7b922fbc-5b8f-496b-be13-ccc0a9fd6a7a,,,CafeV1 -2023-02-08T00:47:05.063Z,e48a1f91-8ed1-438a-8adc-6ef8e9a18481,15,2,1118,20,,Autodiscover,localhost,/AutoDiscover/,,Negotiate,true,RES\HealthMailbox501a219,,Sid~S-1-5-21-434387928-2799628836-4171586136-1619,AMProbe/Local/ClientAccess,127.0.0.1,TS-EX19-04,200,,,GET,Proxy,TS-EX19-04.res.contoso.com,15.02.1118.000,IntraForest,WindowsIdentity,,,,0,,,,0,0,,0,,0,,0,0,,0,6,0,,,,,,,,,0,1,3,,4,,4,4,,,,BeginRequest=2023-02-08T00:47:05.059Z;CorrelationID=;ProxyState-Run=None;FEAuth=BEVersion-1942127710;ProxyState-Complete=PrepareServerRequest;SharedCacheGuard=0;EndRequest=2023-02-08T00:47:05.063Z;,,,|RoutingDB:ea58efbd-ca6c-4d7d-b738-383065284040,,,CafeV1 -2023-02-08T00:48:05.258Z,fe01b58c-8365-48fb-8518-57f9736dca46,15,2,1118,20,,Autodiscover,localhost,/AutoDiscover/,,Negotiate,true,RES\HealthMailbox501a219,,Sid~S-1-5-21-434387928-2799628836-4171586136-1619,AMProbe/Local/ClientAccess,127.0.0.1,TS-EX19-04,200,,,GET,Proxy,TS-EX19-04.res.contoso.com,15.02.1118.000,IntraForest,WindowsIdentity,,,,0,,,,0,0,,0,,0,,0,0,,0,7,0,,,,,,,,,0,0,0,,1,,1,1,,,,BeginRequest=2023-02-08T00:48:05.257Z;CorrelationID=;ProxyState-Run=None;FEAuth=BEVersion-1942127710;ProxyState-Complete=PrepareServerRequest;SharedCacheGuard=0;EndRequest=2023-02-08T00:48:05.258Z;,,,|RoutingDB:ea58efbd-ca6c-4d7d-b738-383065284040,,,CafeV1 -2023-02-08T00:49:05.363Z,12f49f0c-cdda-41e9-bcae-5f700894b6fe,15,2,1118,20,,Autodiscover,localhost,/AutoDiscover/,,Negotiate,true,RES\HealthMailbox501a219,,Sid~S-1-5-21-434387928-2799628836-4171586136-1619,AMProbe/Local/ClientAccess,::1,TS-EX19-04,200,,,GET,Proxy,TS-EX19-04.res.contoso.com,15.02.1118.000,IntraForest,WindowsIdentity,,,,0,,,,27,0,,0,,0,,0,0,,0,30,0,,,,,,,,,0,0,2,,2,,29,29,,,,BeginRequest=2023-02-08T00:49:05.334Z;CorrelationID=;ProxyState-Run=None;FEAuth=BEVersion-1942127710;ProxyState-Complete=PrepareServerRequest;SharedCacheGuard=0;EndRequest=2023-02-08T00:49:05.363Z;I32:ADS.C[BR-DC-02]=2;F:ADS.AL[BR-DC-02]=10.2332;I32:ATE.C[BR-DC-02.RES.contoso.com]=4;F:ATE.AL[BR-DC-02.RES.contoso.com]=0;I32:ADR.C[BR-DC-02]=2;F:ADR.AL[BR-DC-02]=1.4776,,,|RoutingDB:ea58efbd-ca6c-4d7d-b738-383065284040,,,CafeV1 +2023-08-27T00:45:06.687Z,b239c01b-9204-4d3b-a978-04a0162bab02,15,2,1118,20,,Autodiscover,localhost,/AutoDiscover/,,Negotiate,true,RES\HealthMailbox501a219,,Sid~S-1-5-21-434387928-2799628836-4171586136-1619,AMProbe/Local/ClientAccess,::1,TS-EX19-04,200,,,GET,Proxy,TS-EX19-04.res.contoso.com,15.02.1118.000,IntraForest,WindowsIdentity,,,,0,,,,33,0,,0,,0,,0,0,,0,290,0,,,,,,,,,0,0,195,,195,,228,228,,,,BeginRequest=2023-08-27T00:45:06.458Z;CorrelationID=;ProxyState-Run=None;FEAuth=BEVersion-1942127710;ProxyState-Complete=PrepareServerRequest;SharedCacheGuard=0;EndRequest=2023-08-27T00:45:06.687Z;,,,|RoutingDB:ea58efbd-ca6c-4d7d-b738-383065284040,,,CafeV1 +2023-08-27T00:46:04.982Z,9c3576a5-79a8-4a79-b24b-8a8e10668e4e,15,2,1118,20,,Autodiscover,localhost,/AutoDiscover/,,Negotiate,true,RES\HealthMailbox96881f2,,Sid~S-1-5-21-434387928-2799628836-4171586136-1618,AMProbe/Local/ClientAccess,127.0.0.1,TS-EX19-04,200,,,GET,Proxy,TS-EX19-03.res.contoso.com,15.02.1118.000,IntraForest,WindowsIdentity,,,,0,,,,0,0,,0,,0,,0,0,,0,3,0,,,,,,,,,0,1,0,,1,,1,1,,,,BeginRequest=2023-08-27T00:46:04.980Z;CorrelationID=;ProxyState-Run=None;FEAuth=BEVersion-1942127710;ProxyState-Complete=PrepareServerRequest;SharedCacheGuard=0;EndRequest=2023-08-27T00:46:04.982Z;,,,|RoutingDB:7b922fbc-5b8f-496b-be13-ccc0a9fd6a7a,,,CafeV1 +2023-08-27T00:47:05.063Z,e48a1f91-8ed1-438a-8adc-6ef8e9a18481,15,2,1118,20,,Autodiscover,localhost,/AutoDiscover/,,Negotiate,true,RES\HealthMailbox501a219,,Sid~S-1-5-21-434387928-2799628836-4171586136-1619,AMProbe/Local/ClientAccess,127.0.0.1,TS-EX19-04,200,,,GET,Proxy,TS-EX19-04.res.contoso.com,15.02.1118.000,IntraForest,WindowsIdentity,,,,0,,,,0,0,,0,,0,,0,0,,0,6,0,,,,,,,,,0,1,3,,4,,4,4,,,,BeginRequest=2023-08-27T00:47:05.059Z;CorrelationID=;ProxyState-Run=None;FEAuth=BEVersion-1942127710;ProxyState-Complete=PrepareServerRequest;SharedCacheGuard=0;EndRequest=2023-08-27T00:47:05.063Z;,,,|RoutingDB:ea58efbd-ca6c-4d7d-b738-383065284040,,,CafeV1 +2023-08-27T00:48:05.258Z,fe01b58c-8365-48fb-8518-57f9736dca46,15,2,1118,20,,Autodiscover,localhost,/AutoDiscover/,,Negotiate,true,RES\HealthMailbox501a219,,Sid~S-1-5-21-434387928-2799628836-4171586136-1619,AMProbe/Local/ClientAccess,127.0.0.1,TS-EX19-04,200,,,GET,Proxy,TS-EX19-04.res.contoso.com,15.02.1118.000,IntraForest,WindowsIdentity,,,,0,,,,0,0,,0,,0,,0,0,,0,7,0,,,,,,,,,0,0,0,,1,,1,1,,,,BeginRequest=2023-08-27T00:48:05.257Z;CorrelationID=;ProxyState-Run=None;FEAuth=BEVersion-1942127710;ProxyState-Complete=PrepareServerRequest;SharedCacheGuard=0;EndRequest=2023-08-27T00:48:05.258Z;,,,|RoutingDB:ea58efbd-ca6c-4d7d-b738-383065284040,,,CafeV1 +2023-08-27T00:49:05.363Z,12f49f0c-cdda-41e9-bcae-5f700894b6fe,15,2,1118,20,,Autodiscover,localhost,/AutoDiscover/,,Negotiate,true,RES\HealthMailbox501a219,,Sid~S-1-5-21-434387928-2799628836-4171586136-1619,AMProbe/Local/ClientAccess,::1,TS-EX19-04,200,,,GET,Proxy,TS-EX19-04.res.contoso.com,15.02.1118.000,IntraForest,WindowsIdentity,,,,0,,,,27,0,,0,,0,,0,0,,0,30,0,,,,,,,,,0,0,2,,2,,29,29,,,,BeginRequest=2023-08-27T00:49:05.334Z;CorrelationID=;ProxyState-Run=None;FEAuth=BEVersion-1942127710;ProxyState-Complete=PrepareServerRequest;SharedCacheGuard=0;EndRequest=2023-08-27T00:49:05.363Z;I32:ADS.C[BR-DC-02]=2;F:ADS.AL[BR-DC-02]=10.2332;I32:ATE.C[BR-DC-02.RES.contoso.com]=4;F:ATE.AL[BR-DC-02.RES.contoso.com]=0;I32:ADR.C[BR-DC-02]=2;F:ADR.AL[BR-DC-02]=1.4776,,,|RoutingDB:ea58efbd-ca6c-4d7d-b738-383065284040,,,CafeV1 ,cc9a4f2f-a620-499f-ac30-37c5cce7b14b,15,2,1118,20,,,,,,,,,,,,,TS-EX19-04,,,,,,,,,,,,,,,,,,,,,,,,,,,,600017,,,,,,,,,,,,,,,,,,,,,S:ActivityStandardMetadata.Action=GlobalActivity,,,,,, -2023-02-08T00:50:05.358Z,1fc176f4-aee6-4060-9f85-d4f5cbe6063b,15,2,1118,20,,Autodiscover,localhost,/AutoDiscover/,,Negotiate,true,RES\HealthMailbox96881f2,,Sid~S-1-5-21-434387928-2799628836-4171586136-1618,AMProbe/Local/ClientAccess,127.0.0.1,TS-EX19-04,200,,,GET,Proxy,TS-EX19-03.res.contoso.com,15.02.1118.000,IntraForest,WindowsIdentity,,,,0,,,,1,0,,0,,0,,0,0,,0,5,0,,,,,,,,,0,0,0,,0,,1,1,,,,BeginRequest=2023-02-08T00:50:05.356Z;CorrelationID=;ProxyState-Run=None;FEAuth=BEVersion-1942127710;ProxyState-Complete=PrepareServerRequest;SharedCacheGuard=0;EndRequest=2023-02-08T00:50:05.358Z;,,,|RoutingDB:7b922fbc-5b8f-496b-be13-ccc0a9fd6a7a,,,CafeV1 -2023-02-08T00:51:05.601Z,89d77b02-676e-43cf-a8e5-bf3c05861e1d,15,2,1118,20,,Autodiscover,localhost,/AutoDiscover/,,Negotiate,true,RES\HealthMailbox866bb29,,Sid~S-1-5-21-434387928-2799628836-4171586136-1129,AMProbe/Local/ClientAccess,127.0.0.1,TS-EX19-04,200,,,GET,Proxy,TS-EX19-02.res.contoso.com,15.02.1118.000,IntraForest,WindowsIdentity,,,,0,,,,12,0,,0,,0,,0,0,,0,14,0,,,,,,,,,0,0,2,,2,,14,14,,,,BeginRequest=2023-02-08T00:51:05.587Z;CorrelationID=;ProxyState-Run=None;FEAuth=BEVersion-1942127710;ProxyState-Complete=PrepareServerRequest;SharedCacheGuard=0;EndRequest=2023-02-08T00:51:05.601Z;I32:ADS.C[BR-DC-02]=2;F:ADS.AL[BR-DC-02]=2.35695;I32:ATE.C[BR-DC-02.RES.contoso.com]=4;F:ATE.AL[BR-DC-02.RES.contoso.com]=0.25;I32:ADR.C[BR-DC-02]=2;F:ADR.AL[BR-DC-02]=1.64625,,,|RoutingDB:ee8ad99c-fbcb-45c2-939e-81869b5ee059,,,CafeV1 -2023-02-08T00:52:05.615Z,77dbe4aa-898f-413b-9795-79979bee1004,15,2,1118,20,,Autodiscover,localhost,/AutoDiscover/,,Negotiate,true,RES\HealthMailbox96881f2,,Sid~S-1-5-21-434387928-2799628836-4171586136-1618,AMProbe/Local/ClientAccess,::1,TS-EX19-04,200,,,GET,Proxy,TS-EX19-03.res.contoso.com,15.02.1118.000,IntraForest,WindowsIdentity,,,,0,,,,0,0,,0,,0,,0,0,,0,2,0,,,,,,,,,0,0,2,,2,,2,2,,,,BeginRequest=2023-02-08T00:52:05.613Z;CorrelationID=;ProxyState-Run=None;FEAuth=BEVersion-1942127710;ProxyState-Complete=PrepareServerRequest;SharedCacheGuard=0;EndRequest=2023-02-08T00:52:05.615Z;,,,|RoutingDB:7b922fbc-5b8f-496b-be13-ccc0a9fd6a7a,,,CafeV1 -2023-02-08T00:53:05.707Z,27656f4a-cc74-4961-bfc9-0fa69d85c7ec,15,2,1118,20,,Autodiscover,localhost,/AutoDiscover/,,Negotiate,true,RES\HealthMailbox96881f2,,Sid~S-1-5-21-434387928-2799628836-4171586136-1618,AMProbe/Local/ClientAccess,::1,TS-EX19-04,200,,,GET,Proxy,TS-EX19-03.res.contoso.com,15.02.1118.000,IntraForest,WindowsIdentity,,,,0,,,,2,0,,0,,0,,0,0,,0,17,0,,,,,,,,,1,1,10,,11,,13,13,,,,BeginRequest=2023-02-08T00:53:05.693Z;CorrelationID=;ProxyState-Run=None;FEAuth=BEVersion-1942127710;ProxyState-Complete=PrepareServerRequest;SharedCacheGuard=0;EndRequest=2023-02-08T00:53:05.707Z;,,,|RoutingDB:7b922fbc-5b8f-496b-be13-ccc0a9fd6a7a,,,CafeV1 -2023-02-08T00:54:05.742Z,da8e552e-018b-44a9-8a30-279fd0a009ef,15,2,1118,20,,Autodiscover,localhost,/AutoDiscover/,,Negotiate,true,RES\HealthMailbox356d248,,Sid~S-1-5-21-434387928-2799628836-4171586136-1617,AMProbe/Local/ClientAccess,127.0.0.1,TS-EX19-04,200,,,GET,Proxy,TS-EX19-01.res.contoso.com,15.02.1118.000,IntraForest,WindowsIdentity,,,,0,,,,1,0,,0,,0,,0,0,,0,5,0,,,,,,,,,0,0,4,,4,,5,5,,,,BeginRequest=2023-02-08T00:54:05.737Z;CorrelationID=;ProxyState-Run=None;FEAuth=BEVersion-1942127710;ProxyState-Complete=PrepareServerRequest;SharedCacheGuard=0;EndRequest=2023-02-08T00:54:05.742Z;,,,|RoutingDB:399bc9b2-7312-46e0-8181-fee7a0ffeaf8,,,CafeV1 +2023-08-27T00:50:05.358Z,1fc176f4-aee6-4060-9f85-d4f5cbe6063b,15,2,1118,20,,Autodiscover,localhost,/AutoDiscover/,,Negotiate,true,RES\HealthMailbox96881f2,,Sid~S-1-5-21-434387928-2799628836-4171586136-1618,AMProbe/Local/ClientAccess,127.0.0.1,TS-EX19-04,200,,,GET,Proxy,TS-EX19-03.res.contoso.com,15.02.1118.000,IntraForest,WindowsIdentity,,,,0,,,,1,0,,0,,0,,0,0,,0,5,0,,,,,,,,,0,0,0,,0,,1,1,,,,BeginRequest=2023-08-27T00:50:05.356Z;CorrelationID=;ProxyState-Run=None;FEAuth=BEVersion-1942127710;ProxyState-Complete=PrepareServerRequest;SharedCacheGuard=0;EndRequest=2023-08-27T00:50:05.358Z;,,,|RoutingDB:7b922fbc-5b8f-496b-be13-ccc0a9fd6a7a,,,CafeV1 +2023-08-27T00:51:05.601Z,89d77b02-676e-43cf-a8e5-bf3c05861e1d,15,2,1118,20,,Autodiscover,localhost,/AutoDiscover/,,Negotiate,true,RES\HealthMailbox866bb29,,Sid~S-1-5-21-434387928-2799628836-4171586136-1129,AMProbe/Local/ClientAccess,127.0.0.1,TS-EX19-04,200,,,GET,Proxy,TS-EX19-02.res.contoso.com,15.02.1118.000,IntraForest,WindowsIdentity,,,,0,,,,12,0,,0,,0,,0,0,,0,14,0,,,,,,,,,0,0,2,,2,,14,14,,,,BeginRequest=2023-08-27T00:51:05.587Z;CorrelationID=;ProxyState-Run=None;FEAuth=BEVersion-1942127710;ProxyState-Complete=PrepareServerRequest;SharedCacheGuard=0;EndRequest=2023-08-27T00:51:05.601Z;I32:ADS.C[BR-DC-02]=2;F:ADS.AL[BR-DC-02]=2.35695;I32:ATE.C[BR-DC-02.RES.contoso.com]=4;F:ATE.AL[BR-DC-02.RES.contoso.com]=0.25;I32:ADR.C[BR-DC-02]=2;F:ADR.AL[BR-DC-02]=1.64625,,,|RoutingDB:ee8ad99c-fbcb-45c2-939e-81869b5ee059,,,CafeV1 +2023-08-27T00:52:05.615Z,77dbe4aa-898f-413b-9795-79979bee1004,15,2,1118,20,,Autodiscover,localhost,/AutoDiscover/,,Negotiate,true,RES\HealthMailbox96881f2,,Sid~S-1-5-21-434387928-2799628836-4171586136-1618,AMProbe/Local/ClientAccess,::1,TS-EX19-04,200,,,GET,Proxy,TS-EX19-03.res.contoso.com,15.02.1118.000,IntraForest,WindowsIdentity,,,,0,,,,0,0,,0,,0,,0,0,,0,2,0,,,,,,,,,0,0,2,,2,,2,2,,,,BeginRequest=2023-08-27T00:52:05.613Z;CorrelationID=;ProxyState-Run=None;FEAuth=BEVersion-1942127710;ProxyState-Complete=PrepareServerRequest;SharedCacheGuard=0;EndRequest=2023-08-27T00:52:05.615Z;,,,|RoutingDB:7b922fbc-5b8f-496b-be13-ccc0a9fd6a7a,,,CafeV1 +2023-08-27T00:53:05.707Z,27656f4a-cc74-4961-bfc9-0fa69d85c7ec,15,2,1118,20,,Autodiscover,localhost,/AutoDiscover/,,Negotiate,true,RES\HealthMailbox96881f2,,Sid~S-1-5-21-434387928-2799628836-4171586136-1618,AMProbe/Local/ClientAccess,::1,TS-EX19-04,200,,,GET,Proxy,TS-EX19-03.res.contoso.com,15.02.1118.000,IntraForest,WindowsIdentity,,,,0,,,,2,0,,0,,0,,0,0,,0,17,0,,,,,,,,,1,1,10,,11,,13,13,,,,BeginRequest=2023-08-27T00:53:05.693Z;CorrelationID=;ProxyState-Run=None;FEAuth=BEVersion-1942127710;ProxyState-Complete=PrepareServerRequest;SharedCacheGuard=0;EndRequest=2023-08-27T00:53:05.707Z;,,,|RoutingDB:7b922fbc-5b8f-496b-be13-ccc0a9fd6a7a,,,CafeV1 +2023-08-27T00:54:05.742Z,da8e552e-018b-44a9-8a30-279fd0a009ef,15,2,1118,20,,Autodiscover,localhost,/AutoDiscover/,,Negotiate,true,RES\HealthMailbox356d248,,Sid~S-1-5-21-434387928-2799628836-4171586136-1617,AMProbe/Local/ClientAccess,127.0.0.1,TS-EX19-04,200,,,GET,Proxy,TS-EX19-01.res.contoso.com,15.02.1118.000,IntraForest,WindowsIdentity,,,,0,,,,1,0,,0,,0,,0,0,,0,5,0,,,,,,,,,0,0,4,,4,,5,5,,,,BeginRequest=2023-08-27T00:54:05.737Z;CorrelationID=;ProxyState-Run=None;FEAuth=BEVersion-1942127710;ProxyState-Complete=PrepareServerRequest;SharedCacheGuard=0;EndRequest=2023-08-27T00:54:05.742Z;,,,|RoutingDB:399bc9b2-7312-46e0-8181-fee7a0ffeaf8,,,CafeV1 ,0b45e021-fa38-4184-8c0d-fa0e993b7067,15,2,1118,20,,,,,,,,,,,,,TS-EX19-04,,,,,,,,,,,,,,,,,,,,,,,,,,,,600021,,,,,,,,,,,,,,,,,,,,,S:ActivityStandardMetadata.Action=GlobalActivity,,,,,, -2023-02-08T00:55:05.741Z,1cfd7927-5849-4742-a5ba-d52552accec4,15,2,1118,20,,Autodiscover,localhost,/AutoDiscover/,,Negotiate,true,RES\HealthMailbox356d248,,Sid~S-1-5-21-434387928-2799628836-4171586136-1617,AMProbe/Local/ClientAccess,127.0.0.1,TS-EX19-04,200,,,GET,Proxy,TS-EX19-01.res.contoso.com,15.02.1118.000,IntraForest,WindowsIdentity,,,,0,,,,2,0,,0,,0,,0,0,,0,3,0,,,,,,,,,0,0,0,,0,,2,2,,,,BeginRequest=2023-02-08T00:55:05.739Z;CorrelationID=;ProxyState-Run=None;FEAuth=BEVersion-1942127710;ProxyState-Complete=PrepareServerRequest;SharedCacheGuard=0;EndRequest=2023-02-08T00:55:05.741Z;,,,|RoutingDB:399bc9b2-7312-46e0-8181-fee7a0ffeaf8,,,CafeV1 -2023-02-08T00:56:08.212Z,22e7e005-57db-4ce8-aa72-ff272602fcc8,15,2,1118,20,,Autodiscover,localhost,/AutoDiscover/,,Negotiate,true,RES\HealthMailbox866bb29,,Sid~S-1-5-21-434387928-2799628836-4171586136-1129,AMProbe/Local/ClientAccess,127.0.0.1,TS-EX19-04,200,,,GET,Proxy,TS-EX19-02.res.contoso.com,15.02.1118.000,IntraForest,WindowsIdentity,,,,0,,,,2,0,,0,,0,,0,0,,0,5,0,,,,,,,,,0,0,1,,1,,3,3,,,,BeginRequest=2023-02-08T00:56:08.209Z;CorrelationID=;ProxyState-Run=None;FEAuth=BEVersion-1942127710;ProxyState-Complete=PrepareServerRequest;SharedCacheGuard=0;EndRequest=2023-02-08T00:56:08.212Z;,,,|RoutingDB:ee8ad99c-fbcb-45c2-939e-81869b5ee059,,,CafeV1 -2023-02-08T00:57:05.890Z,d624163b-ed94-45b1-9166-39f7ffeaf86d,15,2,1118,20,,Autodiscover,localhost,/AutoDiscover/,,Negotiate,true,RES\HealthMailbox501a219,,Sid~S-1-5-21-434387928-2799628836-4171586136-1619,AMProbe/Local/ClientAccess,::1,TS-EX19-04,200,,,GET,Proxy,TS-EX19-04.res.contoso.com,15.02.1118.000,IntraForest,WindowsIdentity,,,,0,,,,1,0,,0,,0,,0,0,,0,6,0,,,,,,,,,0,0,4,,4,,5,5,,,,BeginRequest=2023-02-08T00:57:05.885Z;CorrelationID=;ProxyState-Run=None;FEAuth=BEVersion-1942127710;ProxyState-Complete=PrepareServerRequest;SharedCacheGuard=0;EndRequest=2023-02-08T00:57:05.890Z;,,,|RoutingDB:ea58efbd-ca6c-4d7d-b738-383065284040,,,CafeV1 -2023-02-08T00:58:07.835Z,581c859d-a6d4-42ef-ac0d-24ed56450308,15,2,1118,20,,Autodiscover,localhost,/AutoDiscover/,,Negotiate,true,RES\HealthMailbox356d248,,Sid~S-1-5-21-434387928-2799628836-4171586136-1617,AMProbe/Local/ClientAccess,127.0.0.1,TS-EX19-04,200,,,GET,Proxy,TS-EX19-01.res.contoso.com,15.02.1118.000,IntraForest,WindowsIdentity,,,,0,,,,1,0,,0,,0,,0,0,,0,7,0,,,,,,,,,0,0,0,,0,,1,1,,,,BeginRequest=2023-02-08T00:58:07.833Z;CorrelationID=;ProxyState-Run=None;FEAuth=BEVersion-1942127710;ProxyState-Complete=PrepareServerRequest;SharedCacheGuard=0;EndRequest=2023-02-08T00:58:07.835Z;,,,|RoutingDB:399bc9b2-7312-46e0-8181-fee7a0ffeaf8,,,CafeV1 -2023-02-08T00:59:06.021Z,a9a2ca55-125e-4a67-a81d-2fad7ab464a2,15,2,1118,20,,Autodiscover,localhost,/AutoDiscover/,,Negotiate,true,RES\HealthMailbox356d248,,Sid~S-1-5-21-434387928-2799628836-4171586136-1617,AMProbe/Local/ClientAccess,::1,TS-EX19-04,200,,,GET,Proxy,TS-EX19-01.res.contoso.com,15.02.1118.000,IntraForest,WindowsIdentity,,,,0,,,,0,1,,0,,0,,0,0,,0,4,0,,,,,,,,,0,1,0,,1,,1,1,,,,BeginRequest=2023-02-08T00:59:06.020Z;CorrelationID=;ProxyState-Run=None;FEAuth=BEVersion-1942127710;ProxyState-Complete=PrepareServerRequest;SharedCacheGuard=0;EndRequest=2023-02-08T00:59:06.021Z;,,,|RoutingDB:399bc9b2-7312-46e0-8181-fee7a0ffeaf8,,,CafeV1 +2023-08-27T00:55:05.741Z,1cfd7927-5849-4742-a5ba-d52552accec4,15,2,1118,20,,Autodiscover,localhost,/AutoDiscover/,,Negotiate,true,RES\HealthMailbox356d248,,Sid~S-1-5-21-434387928-2799628836-4171586136-1617,AMProbe/Local/ClientAccess,127.0.0.1,TS-EX19-04,200,,,GET,Proxy,TS-EX19-01.res.contoso.com,15.02.1118.000,IntraForest,WindowsIdentity,,,,0,,,,2,0,,0,,0,,0,0,,0,3,0,,,,,,,,,0,0,0,,0,,2,2,,,,BeginRequest=2023-08-27T00:55:05.739Z;CorrelationID=;ProxyState-Run=None;FEAuth=BEVersion-1942127710;ProxyState-Complete=PrepareServerRequest;SharedCacheGuard=0;EndRequest=2023-08-27T00:55:05.741Z;,,,|RoutingDB:399bc9b2-7312-46e0-8181-fee7a0ffeaf8,,,CafeV1 +2023-08-27T00:56:08.212Z,22e7e005-57db-4ce8-aa72-ff272602fcc8,15,2,1118,20,,Autodiscover,localhost,/AutoDiscover/,,Negotiate,true,RES\HealthMailbox866bb29,,Sid~S-1-5-21-434387928-2799628836-4171586136-1129,AMProbe/Local/ClientAccess,127.0.0.1,TS-EX19-04,200,,,GET,Proxy,TS-EX19-02.res.contoso.com,15.02.1118.000,IntraForest,WindowsIdentity,,,,0,,,,2,0,,0,,0,,0,0,,0,5,0,,,,,,,,,0,0,1,,1,,3,3,,,,BeginRequest=2023-08-27T00:56:08.209Z;CorrelationID=;ProxyState-Run=None;FEAuth=BEVersion-1942127710;ProxyState-Complete=PrepareServerRequest;SharedCacheGuard=0;EndRequest=2023-08-27T00:56:08.212Z;,,,|RoutingDB:ee8ad99c-fbcb-45c2-939e-81869b5ee059,,,CafeV1 +2023-08-27T00:57:05.890Z,d624163b-ed94-45b1-9166-39f7ffeaf86d,15,2,1118,20,,Autodiscover,localhost,/AutoDiscover/,,Negotiate,true,RES\HealthMailbox501a219,,Sid~S-1-5-21-434387928-2799628836-4171586136-1619,AMProbe/Local/ClientAccess,::1,TS-EX19-04,200,,,GET,Proxy,TS-EX19-04.res.contoso.com,15.02.1118.000,IntraForest,WindowsIdentity,,,,0,,,,1,0,,0,,0,,0,0,,0,6,0,,,,,,,,,0,0,4,,4,,5,5,,,,BeginRequest=2023-08-27T00:57:05.885Z;CorrelationID=;ProxyState-Run=None;FEAuth=BEVersion-1942127710;ProxyState-Complete=PrepareServerRequest;SharedCacheGuard=0;EndRequest=2023-08-27T00:57:05.890Z;,,,|RoutingDB:ea58efbd-ca6c-4d7d-b738-383065284040,,,CafeV1 +2023-08-27T00:58:07.835Z,581c859d-a6d4-42ef-ac0d-24ed56450308,15,2,1118,20,,Autodiscover,localhost,/AutoDiscover/,,Negotiate,true,RES\HealthMailbox356d248,,Sid~S-1-5-21-434387928-2799628836-4171586136-1617,AMProbe/Local/ClientAccess,127.0.0.1,TS-EX19-04,200,,,GET,Proxy,TS-EX19-01.res.contoso.com,15.02.1118.000,IntraForest,WindowsIdentity,,,,0,,,,1,0,,0,,0,,0,0,,0,7,0,,,,,,,,,0,0,0,,0,,1,1,,,,BeginRequest=2023-08-27T00:58:07.833Z;CorrelationID=;ProxyState-Run=None;FEAuth=BEVersion-1942127710;ProxyState-Complete=PrepareServerRequest;SharedCacheGuard=0;EndRequest=2023-08-27T00:58:07.835Z;,,,|RoutingDB:399bc9b2-7312-46e0-8181-fee7a0ffeaf8,,,CafeV1 +2023-08-27T00:59:06.021Z,a9a2ca55-125e-4a67-a81d-2fad7ab464a2,15,2,1118,20,,Autodiscover,localhost,/AutoDiscover/,,Negotiate,true,RES\HealthMailbox356d248,,Sid~S-1-5-21-434387928-2799628836-4171586136-1617,AMProbe/Local/ClientAccess,::1,TS-EX19-04,200,,,GET,Proxy,TS-EX19-01.res.contoso.com,15.02.1118.000,IntraForest,WindowsIdentity,,,,0,,,,0,1,,0,,0,,0,0,,0,4,0,,,,,,,,,0,1,0,,1,,1,1,,,,BeginRequest=2023-08-27T00:59:06.020Z;CorrelationID=;ProxyState-Run=None;FEAuth=BEVersion-1942127710;ProxyState-Complete=PrepareServerRequest;SharedCacheGuard=0;EndRequest=2023-08-27T00:59:06.021Z;,,,|RoutingDB:399bc9b2-7312-46e0-8181-fee7a0ffeaf8,,,CafeV1 ,1beb289b-b8a7-4a14-8b29-9a5fd6d4f1cb,15,2,1118,20,,,,,,,,,,,,,TS-EX19-04,,,,,,,,,,,,,,,,,,,,,,,,,,,,600016,,,,,,,,,,,,,,,,,,,,,S:ActivityStandardMetadata.Action=GlobalActivity;Dbl:ADB.T[UNINSTR]=5;I32:ADS.C[UNINSTR]=1;F:ADS.AL[UNINSTR]=1.2815,,,,,, diff --git a/Sample Data/Custom/ESI-HttpProxyLogs.json b/Sample Data/Custom/ESI-HttpProxyLogs.json index b7eb3ab9ed5..f412a1e4334 100644 --- a/Sample Data/Custom/ESI-HttpProxyLogs.json +++ b/Sample Data/Custom/ESI-HttpProxyLogs.json @@ -1,6 +1,6 @@ [ { - "DateTime": "2023-02-08T00:00:03.324Z", + "DateTime": "2023-08-27T00:00:03.324Z", "RequestId": "26dd3d37-651e-43e9-a928-fad7f55eec30", "MajorVersion": "15", "MinorVersion": "2", @@ -67,7 +67,7 @@ "RouteRefresherLatency": "", "UrlQuery": "", "BackEndGenericInfo": "", - "GenericInfo": "BeginRequest=2023-02-08T00:00:03.323Z;CorrelationID=;ProxyState-Run=None;FEAuth=BEVersion-1942127710;ProxyState-Complete=PrepareServerRequest;SharedCacheGuard=0;EndRequest=2023-02-08T00:00:03.324Z;", + "GenericInfo": "BeginRequest=2023-08-27T00:00:03.323Z;CorrelationID=;ProxyState-Run=None;FEAuth=BEVersion-1942127710;ProxyState-Complete=PrepareServerRequest;SharedCacheGuard=0;EndRequest=2023-08-27T00:00:03.324Z;", "GenericErrors": "", "EdgeTraceId": "", "DatabaseGuid": "|RoutingDB:ea58efbd-ca6c-4d7d-b738-383065284040", @@ -76,7 +76,7 @@ "RoutingStatus": "CafeV1" }, { - "DateTime": "2023-02-08T00:01:04.313Z", + "DateTime": "2023-08-27T00:01:04.313Z", "RequestId": "2a5d89d4-d393-4bab-8a42-c634dde3f7d1", "MajorVersion": "15", "MinorVersion": "2", @@ -143,7 +143,7 @@ "RouteRefresherLatency": "", "UrlQuery": "", "BackEndGenericInfo": "", - "GenericInfo": "BeginRequest=2023-02-08T00:01:04.311Z;CorrelationID=;ProxyState-Run=None;FEAuth=BEVersion-1942127710;ProxyState-Complete=PrepareServerRequest;SharedCacheGuard=0;EndRequest=2023-02-08T00:01:04.313Z;", + "GenericInfo": "BeginRequest=2023-08-27T00:01:04.311Z;CorrelationID=;ProxyState-Run=None;FEAuth=BEVersion-1942127710;ProxyState-Complete=PrepareServerRequest;SharedCacheGuard=0;EndRequest=2023-08-27T00:01:04.313Z;", "GenericErrors": "", "EdgeTraceId": "", "DatabaseGuid": "|RoutingDB:ee8ad99c-fbcb-45c2-939e-81869b5ee059", @@ -152,7 +152,7 @@ "RoutingStatus": "CafeV1" }, { - "DateTime": "2023-02-08T00:02:01.046Z", + "DateTime": "2023-08-27T00:02:01.046Z", "RequestId": "caf00545-8fcd-4a89-ad02-3815f2051fc6", "MajorVersion": "15", "MinorVersion": "2", @@ -219,7 +219,7 @@ "RouteRefresherLatency": "", "UrlQuery": "", "BackEndGenericInfo": "", - "GenericInfo": "BeginRequest=2023-02-08T00:02:01.045Z;CorrelationID=;ProxyState-Run=None;FEAuth=BEVersion-1942127710;ProxyState-Complete=PrepareServerRequest;SharedCacheGuard=0;EndRequest=2023-02-08T00:02:01.046Z;", + "GenericInfo": "BeginRequest=2023-08-27T00:02:01.045Z;CorrelationID=;ProxyState-Run=None;FEAuth=BEVersion-1942127710;ProxyState-Complete=PrepareServerRequest;SharedCacheGuard=0;EndRequest=2023-08-27T00:02:01.046Z;", "GenericErrors": "", "EdgeTraceId": "", "DatabaseGuid": "|RoutingDB:ea58efbd-ca6c-4d7d-b738-383065284040", @@ -228,7 +228,7 @@ "RoutingStatus": "CafeV1" }, { - "DateTime": "2023-02-08T00:03:01.052Z", + "DateTime": "2023-08-27T00:03:01.052Z", "RequestId": "dfc399e6-b77c-4b82-9f55-bd6c22d3400b", "MajorVersion": "15", "MinorVersion": "2", @@ -295,7 +295,7 @@ "RouteRefresherLatency": "", "UrlQuery": "", "BackEndGenericInfo": "", - "GenericInfo": "BeginRequest=2023-02-08T00:03:01.049Z;CorrelationID=;ProxyState-Run=None;FEAuth=BEVersion-1942127710;ProxyState-Complete=PrepareServerRequest;SharedCacheGuard=0;EndRequest=2023-02-08T00:03:01.052Z;", + "GenericInfo": "BeginRequest=2023-08-27T00:03:01.049Z;CorrelationID=;ProxyState-Run=None;FEAuth=BEVersion-1942127710;ProxyState-Complete=PrepareServerRequest;SharedCacheGuard=0;EndRequest=2023-08-27T00:03:01.052Z;", "GenericErrors": "", "EdgeTraceId": "", "DatabaseGuid": "|RoutingDB:7b922fbc-5b8f-496b-be13-ccc0a9fd6a7a", @@ -304,7 +304,7 @@ "RoutingStatus": "CafeV1" }, { - "DateTime": "2023-02-08T00:04:01.176Z", + "DateTime": "2023-08-27T00:04:01.176Z", "RequestId": "1c86edef-7196-49cb-829b-f6af9346ea81", "MajorVersion": "15", "MinorVersion": "2", @@ -371,7 +371,7 @@ "RouteRefresherLatency": "", "UrlQuery": "", "BackEndGenericInfo": "", - "GenericInfo": "BeginRequest=2023-02-08T00:04:01.173Z;CorrelationID=;ProxyState-Run=None;FEAuth=BEVersion-1942127710;ProxyState-Complete=PrepareServerRequest;SharedCacheGuard=0;EndRequest=2023-02-08T00:04:01.176Z;", + "GenericInfo": "BeginRequest=2023-08-27T00:04:01.173Z;CorrelationID=;ProxyState-Run=None;FEAuth=BEVersion-1942127710;ProxyState-Complete=PrepareServerRequest;SharedCacheGuard=0;EndRequest=2023-08-27T00:04:01.176Z;", "GenericErrors": "", "EdgeTraceId": "", "DatabaseGuid": "|RoutingDB:399bc9b2-7312-46e0-8181-fee7a0ffeaf8", @@ -456,7 +456,7 @@ "RoutingStatus": "" }, { - "DateTime": "2023-02-08T00:05:01.204Z", + "DateTime": "2023-08-27T00:05:01.204Z", "RequestId": "d91edba7-e75c-4cf8-b371-d11938acea46", "MajorVersion": "15", "MinorVersion": "2", @@ -523,7 +523,7 @@ "RouteRefresherLatency": "", "UrlQuery": "", "BackEndGenericInfo": "", - "GenericInfo": "BeginRequest=2023-02-08T00:05:01.202Z;CorrelationID=;ProxyState-Run=None;FEAuth=BEVersion-1942127710;ProxyState-Complete=PrepareServerRequest;SharedCacheGuard=0;EndRequest=2023-02-08T00:05:01.204Z;", + "GenericInfo": "BeginRequest=2023-08-27T00:05:01.202Z;CorrelationID=;ProxyState-Run=None;FEAuth=BEVersion-1942127710;ProxyState-Complete=PrepareServerRequest;SharedCacheGuard=0;EndRequest=2023-08-27T00:05:01.204Z;", "GenericErrors": "", "EdgeTraceId": "", "DatabaseGuid": "|RoutingDB:ee8ad99c-fbcb-45c2-939e-81869b5ee059", @@ -532,7 +532,7 @@ "RoutingStatus": "CafeV1" }, { - "DateTime": "2023-02-08T00:06:01.186Z", + "DateTime": "2023-08-27T00:06:01.186Z", "RequestId": "7904232f-acc3-4765-83c8-d21e464ad802", "MajorVersion": "15", "MinorVersion": "2", @@ -599,7 +599,7 @@ "RouteRefresherLatency": "", "UrlQuery": "", "BackEndGenericInfo": "", - "GenericInfo": "BeginRequest=2023-02-08T00:06:01.183Z;CorrelationID=;ProxyState-Run=None;FEAuth=BEVersion-1942127710;ProxyState-Complete=PrepareServerRequest;SharedCacheGuard=0;EndRequest=2023-02-08T00:06:01.186Z;", + "GenericInfo": "BeginRequest=2023-08-27T00:06:01.183Z;CorrelationID=;ProxyState-Run=None;FEAuth=BEVersion-1942127710;ProxyState-Complete=PrepareServerRequest;SharedCacheGuard=0;EndRequest=2023-08-27T00:06:01.186Z;", "GenericErrors": "", "EdgeTraceId": "", "DatabaseGuid": "|RoutingDB:399bc9b2-7312-46e0-8181-fee7a0ffeaf8", @@ -608,7 +608,7 @@ "RoutingStatus": "CafeV1" }, { - "DateTime": "2023-02-08T00:07:01.222Z", + "DateTime": "2023-08-27T00:07:01.222Z", "RequestId": "f8049135-10a6-4d6d-b62b-a1eff1e1dfc7", "MajorVersion": "15", "MinorVersion": "2", @@ -675,7 +675,7 @@ "RouteRefresherLatency": "", "UrlQuery": "", "BackEndGenericInfo": "", - "GenericInfo": "BeginRequest=2023-02-08T00:07:01.220Z;CorrelationID=;ProxyState-Run=None;FEAuth=BEVersion-1942127710;ProxyState-Complete=PrepareServerRequest;SharedCacheGuard=0;EndRequest=2023-02-08T00:07:01.222Z;", + "GenericInfo": "BeginRequest=2023-08-27T00:07:01.220Z;CorrelationID=;ProxyState-Run=None;FEAuth=BEVersion-1942127710;ProxyState-Complete=PrepareServerRequest;SharedCacheGuard=0;EndRequest=2023-08-27T00:07:01.222Z;", "GenericErrors": "", "EdgeTraceId": "", "DatabaseGuid": "|RoutingDB:ee8ad99c-fbcb-45c2-939e-81869b5ee059", @@ -684,7 +684,7 @@ "RoutingStatus": "CafeV1" }, { - "DateTime": "2023-02-08T00:08:01.372Z", + "DateTime": "2023-08-27T00:08:01.372Z", "RequestId": "7fc0bf66-8944-4072-93b5-2ec4f2288670", "MajorVersion": "15", "MinorVersion": "2", @@ -751,7 +751,7 @@ "RouteRefresherLatency": "", "UrlQuery": "", "BackEndGenericInfo": "", - "GenericInfo": "BeginRequest=2023-02-08T00:08:01.371Z;CorrelationID=;ProxyState-Run=None;FEAuth=BEVersion-1942127710;ProxyState-Complete=PrepareServerRequest;SharedCacheGuard=0;EndRequest=2023-02-08T00:08:01.372Z;", + "GenericInfo": "BeginRequest=2023-08-27T00:08:01.371Z;CorrelationID=;ProxyState-Run=None;FEAuth=BEVersion-1942127710;ProxyState-Complete=PrepareServerRequest;SharedCacheGuard=0;EndRequest=2023-08-27T00:08:01.372Z;", "GenericErrors": "", "EdgeTraceId": "", "DatabaseGuid": "|RoutingDB:ea58efbd-ca6c-4d7d-b738-383065284040", @@ -760,7 +760,7 @@ "RoutingStatus": "CafeV1" }, { - "DateTime": "2023-02-08T00:09:01.470Z", + "DateTime": "2023-08-27T00:09:01.470Z", "RequestId": "93456641-1baa-4963-a654-09211f129a56", "MajorVersion": "15", "MinorVersion": "2", @@ -827,7 +827,7 @@ "RouteRefresherLatency": "", "UrlQuery": "", "BackEndGenericInfo": "", - "GenericInfo": "BeginRequest=2023-02-08T00:09:01.465Z;CorrelationID=;ProxyState-Run=None;ServerLocatorRefresh=399bc9b2-7312-46e0-8181-fee7a0ffeaf8;RefreshingCacheEntry=CacheEntry(BackEndServer TS-EX19-01.RES.contoso.com~1942127710|ResourceForest contoso.com|FailoverSequenceNumber 638113239236337077|LastRefreshTime 2/7/2023 11:38:59 PM);FEAuth=BEVersion-1942127710;ProxyState-Complete=PrepareServerRequest;SharedCacheGuard=0;EndRequest=2023-02-08T00:09:01.470Z;", + "GenericInfo": "BeginRequest=2023-08-27T00:09:01.465Z;CorrelationID=;ProxyState-Run=None;ServerLocatorRefresh=399bc9b2-7312-46e0-8181-fee7a0ffeaf8;RefreshingCacheEntry=CacheEntry(BackEndServer TS-EX19-01.RES.contoso.com~1942127710|ResourceForest contoso.com|FailoverSequenceNumber 638113239236337077|LastRefreshTime 2/7/2023 11:38:59 PM);FEAuth=BEVersion-1942127710;ProxyState-Complete=PrepareServerRequest;SharedCacheGuard=0;EndRequest=2023-08-27T00:09:01.470Z;", "GenericErrors": "", "EdgeTraceId": "", "DatabaseGuid": "|RoutingDB:399bc9b2-7312-46e0-8181-fee7a0ffeaf8", @@ -912,7 +912,7 @@ "RoutingStatus": "" }, { - "DateTime": "2023-02-08T00:10:01.631Z", + "DateTime": "2023-08-27T00:10:01.631Z", "RequestId": "7cc9b8d0-21ce-40cc-973f-bb65ec17507c", "MajorVersion": "15", "MinorVersion": "2", @@ -979,7 +979,7 @@ "RouteRefresherLatency": "", "UrlQuery": "", "BackEndGenericInfo": "", - "GenericInfo": "BeginRequest=2023-02-08T00:10:01.629Z;CorrelationID=;ProxyState-Run=None;FEAuth=BEVersion-1942127710;ProxyState-Complete=PrepareServerRequest;SharedCacheGuard=0;EndRequest=2023-02-08T00:10:01.631Z;", + "GenericInfo": "BeginRequest=2023-08-27T00:10:01.629Z;CorrelationID=;ProxyState-Run=None;FEAuth=BEVersion-1942127710;ProxyState-Complete=PrepareServerRequest;SharedCacheGuard=0;EndRequest=2023-08-27T00:10:01.631Z;", "GenericErrors": "", "EdgeTraceId": "", "DatabaseGuid": "|RoutingDB:7b922fbc-5b8f-496b-be13-ccc0a9fd6a7a", @@ -988,7 +988,7 @@ "RoutingStatus": "CafeV1" }, { - "DateTime": "2023-02-08T00:11:01.525Z", + "DateTime": "2023-08-27T00:11:01.525Z", "RequestId": "b32ced2d-ca79-4294-a075-b13999c3f268", "MajorVersion": "15", "MinorVersion": "2", @@ -1055,7 +1055,7 @@ "RouteRefresherLatency": "", "UrlQuery": "", "BackEndGenericInfo": "", - "GenericInfo": "BeginRequest=2023-02-08T00:11:01.523Z;CorrelationID=;ProxyState-Run=None;FEAuth=BEVersion-1942127710;ProxyState-Complete=PrepareServerRequest;SharedCacheGuard=0;EndRequest=2023-02-08T00:11:01.525Z;", + "GenericInfo": "BeginRequest=2023-08-27T00:11:01.523Z;CorrelationID=;ProxyState-Run=None;FEAuth=BEVersion-1942127710;ProxyState-Complete=PrepareServerRequest;SharedCacheGuard=0;EndRequest=2023-08-27T00:11:01.525Z;", "GenericErrors": "", "EdgeTraceId": "", "DatabaseGuid": "|RoutingDB:ee8ad99c-fbcb-45c2-939e-81869b5ee059", @@ -1064,7 +1064,7 @@ "RoutingStatus": "CafeV1" }, { - "DateTime": "2023-02-08T00:12:01.673Z", + "DateTime": "2023-08-27T00:12:01.673Z", "RequestId": "3c3d928d-4774-4857-89a4-343e84abb108", "MajorVersion": "15", "MinorVersion": "2", @@ -1131,7 +1131,7 @@ "RouteRefresherLatency": "", "UrlQuery": "", "BackEndGenericInfo": "", - "GenericInfo": "BeginRequest=2023-02-08T00:12:01.672Z;CorrelationID=;ProxyState-Run=None;FEAuth=BEVersion-1942127710;ProxyState-Complete=PrepareServerRequest;SharedCacheGuard=0;EndRequest=2023-02-08T00:12:01.673Z;", + "GenericInfo": "BeginRequest=2023-08-27T00:12:01.672Z;CorrelationID=;ProxyState-Run=None;FEAuth=BEVersion-1942127710;ProxyState-Complete=PrepareServerRequest;SharedCacheGuard=0;EndRequest=2023-08-27T00:12:01.673Z;", "GenericErrors": "", "EdgeTraceId": "", "DatabaseGuid": "|RoutingDB:399bc9b2-7312-46e0-8181-fee7a0ffeaf8", @@ -1140,7 +1140,7 @@ "RoutingStatus": "CafeV1" }, { - "DateTime": "2023-02-08T00:13:01.807Z", + "DateTime": "2023-08-27T00:13:01.807Z", "RequestId": "32c63760-6e2d-4465-b980-9a3dcfd60b29", "MajorVersion": "15", "MinorVersion": "2", @@ -1207,7 +1207,7 @@ "RouteRefresherLatency": "", "UrlQuery": "", "BackEndGenericInfo": "", - "GenericInfo": "BeginRequest=2023-02-08T00:13:01.804Z;CorrelationID=;ProxyState-Run=None;FEAuth=BEVersion-1942127710;ProxyState-Complete=PrepareServerRequest;SharedCacheGuard=0;EndRequest=2023-02-08T00:13:01.807Z;", + "GenericInfo": "BeginRequest=2023-08-27T00:13:01.804Z;CorrelationID=;ProxyState-Run=None;FEAuth=BEVersion-1942127710;ProxyState-Complete=PrepareServerRequest;SharedCacheGuard=0;EndRequest=2023-08-27T00:13:01.807Z;", "GenericErrors": "", "EdgeTraceId": "", "DatabaseGuid": "|RoutingDB:7b922fbc-5b8f-496b-be13-ccc0a9fd6a7a", @@ -1216,7 +1216,7 @@ "RoutingStatus": "CafeV1" }, { - "DateTime": "2023-02-08T00:14:01.820Z", + "DateTime": "2023-08-27T00:14:01.820Z", "RequestId": "463cee32-6387-4a39-b42f-be767939435a", "MajorVersion": "15", "MinorVersion": "2", @@ -1283,7 +1283,7 @@ "RouteRefresherLatency": "", "UrlQuery": "", "BackEndGenericInfo": "", - "GenericInfo": "BeginRequest=2023-02-08T00:14:01.819Z;CorrelationID=;ProxyState-Run=None;FEAuth=BEVersion-1942127710;ProxyState-Complete=PrepareServerRequest;SharedCacheGuard=0;EndRequest=2023-02-08T00:14:01.820Z;", + "GenericInfo": "BeginRequest=2023-08-27T00:14:01.819Z;CorrelationID=;ProxyState-Run=None;FEAuth=BEVersion-1942127710;ProxyState-Complete=PrepareServerRequest;SharedCacheGuard=0;EndRequest=2023-08-27T00:14:01.820Z;", "GenericErrors": "", "EdgeTraceId": "", "DatabaseGuid": "|RoutingDB:7b922fbc-5b8f-496b-be13-ccc0a9fd6a7a", @@ -1368,7 +1368,7 @@ "RoutingStatus": "" }, { - "DateTime": "2023-02-08T00:15:01.888Z", + "DateTime": "2023-08-27T00:15:01.888Z", "RequestId": "e757ef0e-6e63-4cb0-b94c-e4e353321c76", "MajorVersion": "15", "MinorVersion": "2", @@ -1435,7 +1435,7 @@ "RouteRefresherLatency": "", "UrlQuery": "", "BackEndGenericInfo": "", - "GenericInfo": "BeginRequest=2023-02-08T00:15:01.887Z;CorrelationID=;ProxyState-Run=None;FEAuth=BEVersion-1942127710;ProxyState-Complete=PrepareServerRequest;SharedCacheGuard=0;EndRequest=2023-02-08T00:15:01.888Z;", + "GenericInfo": "BeginRequest=2023-08-27T00:15:01.887Z;CorrelationID=;ProxyState-Run=None;FEAuth=BEVersion-1942127710;ProxyState-Complete=PrepareServerRequest;SharedCacheGuard=0;EndRequest=2023-08-27T00:15:01.888Z;", "GenericErrors": "", "EdgeTraceId": "", "DatabaseGuid": "|RoutingDB:ea58efbd-ca6c-4d7d-b738-383065284040", @@ -1444,7 +1444,7 @@ "RoutingStatus": "CafeV1" }, { - "DateTime": "2023-02-08T00:16:02.012Z", + "DateTime": "2023-08-27T00:16:02.012Z", "RequestId": "ff3b24c2-bf07-4df9-ac83-4ba00c1479a3", "MajorVersion": "15", "MinorVersion": "2", @@ -1511,7 +1511,7 @@ "RouteRefresherLatency": "", "UrlQuery": "", "BackEndGenericInfo": "", - "GenericInfo": "BeginRequest=2023-02-08T00:16:02.009Z;CorrelationID=;ProxyState-Run=None;FEAuth=BEVersion-1942127710;ProxyState-Complete=PrepareServerRequest;SharedCacheGuard=0;EndRequest=2023-02-08T00:16:02.012Z;", + "GenericInfo": "BeginRequest=2023-08-27T00:16:02.009Z;CorrelationID=;ProxyState-Run=None;FEAuth=BEVersion-1942127710;ProxyState-Complete=PrepareServerRequest;SharedCacheGuard=0;EndRequest=2023-08-27T00:16:02.012Z;", "GenericErrors": "", "EdgeTraceId": "", "DatabaseGuid": "|RoutingDB:ee8ad99c-fbcb-45c2-939e-81869b5ee059", @@ -1520,7 +1520,7 @@ "RoutingStatus": "CafeV1" }, { - "DateTime": "2023-02-08T00:17:02.034Z", + "DateTime": "2023-08-27T00:17:02.034Z", "RequestId": "2b3ab478-4a94-42a1-92f3-41d1215f3343", "MajorVersion": "15", "MinorVersion": "2", @@ -1587,7 +1587,7 @@ "RouteRefresherLatency": "", "UrlQuery": "", "BackEndGenericInfo": "", - "GenericInfo": "BeginRequest=2023-02-08T00:17:02.033Z;CorrelationID=;ProxyState-Run=None;FEAuth=BEVersion-1942127710;ProxyState-Complete=PrepareServerRequest;SharedCacheGuard=0;EndRequest=2023-02-08T00:17:02.034Z;", + "GenericInfo": "BeginRequest=2023-08-27T00:17:02.033Z;CorrelationID=;ProxyState-Run=None;FEAuth=BEVersion-1942127710;ProxyState-Complete=PrepareServerRequest;SharedCacheGuard=0;EndRequest=2023-08-27T00:17:02.034Z;", "GenericErrors": "", "EdgeTraceId": "", "DatabaseGuid": "|RoutingDB:7b922fbc-5b8f-496b-be13-ccc0a9fd6a7a", @@ -1596,7 +1596,7 @@ "RoutingStatus": "CafeV1" }, { - "DateTime": "2023-02-08T00:18:02.145Z", + "DateTime": "2023-08-27T00:18:02.145Z", "RequestId": "7fa07211-6c84-4947-92f8-148276067fc8", "MajorVersion": "15", "MinorVersion": "2", @@ -1663,7 +1663,7 @@ "RouteRefresherLatency": "", "UrlQuery": "", "BackEndGenericInfo": "", - "GenericInfo": "BeginRequest=2023-02-08T00:18:02.143Z;CorrelationID=;ProxyState-Run=None;FEAuth=BEVersion-1942127710;ProxyState-Complete=PrepareServerRequest;SharedCacheGuard=0;EndRequest=2023-02-08T00:18:02.145Z;", + "GenericInfo": "BeginRequest=2023-08-27T00:18:02.143Z;CorrelationID=;ProxyState-Run=None;FEAuth=BEVersion-1942127710;ProxyState-Complete=PrepareServerRequest;SharedCacheGuard=0;EndRequest=2023-08-27T00:18:02.145Z;", "GenericErrors": "", "EdgeTraceId": "", "DatabaseGuid": "|RoutingDB:ee8ad99c-fbcb-45c2-939e-81869b5ee059", @@ -1672,7 +1672,7 @@ "RoutingStatus": "CafeV1" }, { - "DateTime": "2023-02-08T00:19:02.210Z", + "DateTime": "2023-08-27T00:19:02.210Z", "RequestId": "0ad151e5-4bcd-4010-a7ed-ba832690d50e", "MajorVersion": "15", "MinorVersion": "2", @@ -1739,7 +1739,7 @@ "RouteRefresherLatency": "", "UrlQuery": "", "BackEndGenericInfo": "", - "GenericInfo": "BeginRequest=2023-02-08T00:19:02.209Z;CorrelationID=;ProxyState-Run=None;FEAuth=BEVersion-1942127710;ProxyState-Complete=PrepareServerRequest;SharedCacheGuard=0;EndRequest=2023-02-08T00:19:02.210Z;", + "GenericInfo": "BeginRequest=2023-08-27T00:19:02.209Z;CorrelationID=;ProxyState-Run=None;FEAuth=BEVersion-1942127710;ProxyState-Complete=PrepareServerRequest;SharedCacheGuard=0;EndRequest=2023-08-27T00:19:02.210Z;", "GenericErrors": "", "EdgeTraceId": "", "DatabaseGuid": "|RoutingDB:399bc9b2-7312-46e0-8181-fee7a0ffeaf8", @@ -1824,7 +1824,7 @@ "RoutingStatus": "" }, { - "DateTime": "2023-02-08T00:20:02.342Z", + "DateTime": "2023-08-27T00:20:02.342Z", "RequestId": "23dd4b4c-8eeb-4d09-9561-110735a0f520", "MajorVersion": "15", "MinorVersion": "2", @@ -1891,7 +1891,7 @@ "RouteRefresherLatency": "", "UrlQuery": "", "BackEndGenericInfo": "", - "GenericInfo": "BeginRequest=2023-02-08T00:20:02.338Z;CorrelationID=;ProxyState-Run=None;FEAuth=BEVersion-1942127710;ProxyState-Complete=PrepareServerRequest;SharedCacheGuard=0;EndRequest=2023-02-08T00:20:02.342Z;", + "GenericInfo": "BeginRequest=2023-08-27T00:20:02.338Z;CorrelationID=;ProxyState-Run=None;FEAuth=BEVersion-1942127710;ProxyState-Complete=PrepareServerRequest;SharedCacheGuard=0;EndRequest=2023-08-27T00:20:02.342Z;", "GenericErrors": "", "EdgeTraceId": "", "DatabaseGuid": "|RoutingDB:ee8ad99c-fbcb-45c2-939e-81869b5ee059", @@ -1900,7 +1900,7 @@ "RoutingStatus": "CafeV1" }, { - "DateTime": "2023-02-08T00:21:02.492Z", + "DateTime": "2023-08-27T00:21:02.492Z", "RequestId": "fbf93ace-a18a-4964-9f4b-f7dc57c55cff", "MajorVersion": "15", "MinorVersion": "2", @@ -1967,7 +1967,7 @@ "RouteRefresherLatency": "", "UrlQuery": "", "BackEndGenericInfo": "", - "GenericInfo": "BeginRequest=2023-02-08T00:21:02.487Z;CorrelationID=;ProxyState-Run=None;FEAuth=BEVersion-1942127710;ProxyState-Complete=PrepareServerRequest;SharedCacheGuard=0;EndRequest=2023-02-08T00:21:02.492Z;", + "GenericInfo": "BeginRequest=2023-08-27T00:21:02.487Z;CorrelationID=;ProxyState-Run=None;FEAuth=BEVersion-1942127710;ProxyState-Complete=PrepareServerRequest;SharedCacheGuard=0;EndRequest=2023-08-27T00:21:02.492Z;", "GenericErrors": "", "EdgeTraceId": "", "DatabaseGuid": "|RoutingDB:7b922fbc-5b8f-496b-be13-ccc0a9fd6a7a", @@ -1976,7 +1976,7 @@ "RoutingStatus": "CafeV1" }, { - "DateTime": "2023-02-08T00:22:02.569Z", + "DateTime": "2023-08-27T00:22:02.569Z", "RequestId": "2dd48b8e-b46f-4a97-84c5-f829bdaddf20", "MajorVersion": "15", "MinorVersion": "2", @@ -2043,7 +2043,7 @@ "RouteRefresherLatency": "", "UrlQuery": "", "BackEndGenericInfo": "", - "GenericInfo": "BeginRequest=2023-02-08T00:22:02.568Z;CorrelationID=;ProxyState-Run=None;FEAuth=BEVersion-1942127710;ProxyState-Complete=PrepareServerRequest;SharedCacheGuard=0;EndRequest=2023-02-08T00:22:02.569Z;", + "GenericInfo": "BeginRequest=2023-08-27T00:22:02.568Z;CorrelationID=;ProxyState-Run=None;FEAuth=BEVersion-1942127710;ProxyState-Complete=PrepareServerRequest;SharedCacheGuard=0;EndRequest=2023-08-27T00:22:02.569Z;", "GenericErrors": "", "EdgeTraceId": "", "DatabaseGuid": "|RoutingDB:399bc9b2-7312-46e0-8181-fee7a0ffeaf8", @@ -2052,7 +2052,7 @@ "RoutingStatus": "CafeV1" }, { - "DateTime": "2023-02-08T00:23:02.575Z", + "DateTime": "2023-08-27T00:23:02.575Z", "RequestId": "aaf9cc0f-2628-4cd9-af2e-db2c85467d55", "MajorVersion": "15", "MinorVersion": "2", @@ -2119,7 +2119,7 @@ "RouteRefresherLatency": "", "UrlQuery": "", "BackEndGenericInfo": "", - "GenericInfo": "BeginRequest=2023-02-08T00:23:02.563Z;CorrelationID=;ProxyState-Run=None;FEAuth=BEVersion-1942127710;ProxyState-Complete=PrepareServerRequest;SharedCacheGuard=0;EndRequest=2023-02-08T00:23:02.575Z;", + "GenericInfo": "BeginRequest=2023-08-27T00:23:02.563Z;CorrelationID=;ProxyState-Run=None;FEAuth=BEVersion-1942127710;ProxyState-Complete=PrepareServerRequest;SharedCacheGuard=0;EndRequest=2023-08-27T00:23:02.575Z;", "GenericErrors": "", "EdgeTraceId": "", "DatabaseGuid": "|RoutingDB:ee8ad99c-fbcb-45c2-939e-81869b5ee059", @@ -2128,7 +2128,7 @@ "RoutingStatus": "CafeV1" }, { - "DateTime": "2023-02-08T00:24:02.680Z", + "DateTime": "2023-08-27T00:24:02.680Z", "RequestId": "7c900c10-ab63-43f4-b53d-9a3274447f44", "MajorVersion": "15", "MinorVersion": "2", @@ -2195,7 +2195,7 @@ "RouteRefresherLatency": "", "UrlQuery": "", "BackEndGenericInfo": "", - "GenericInfo": "BeginRequest=2023-02-08T00:24:02.679Z;CorrelationID=;ProxyState-Run=None;FEAuth=BEVersion-1942127710;ProxyState-Complete=PrepareServerRequest;SharedCacheGuard=0;EndRequest=2023-02-08T00:24:02.680Z;", + "GenericInfo": "BeginRequest=2023-08-27T00:24:02.679Z;CorrelationID=;ProxyState-Run=None;FEAuth=BEVersion-1942127710;ProxyState-Complete=PrepareServerRequest;SharedCacheGuard=0;EndRequest=2023-08-27T00:24:02.680Z;", "GenericErrors": "", "EdgeTraceId": "", "DatabaseGuid": "|RoutingDB:399bc9b2-7312-46e0-8181-fee7a0ffeaf8", @@ -2280,7 +2280,7 @@ "RoutingStatus": "" }, { - "DateTime": "2023-02-08T00:25:02.793Z", + "DateTime": "2023-08-27T00:25:02.793Z", "RequestId": "30b16933-fcd7-4e01-815a-bb21cd0a133f", "MajorVersion": "15", "MinorVersion": "2", @@ -2347,7 +2347,7 @@ "RouteRefresherLatency": "", "UrlQuery": "", "BackEndGenericInfo": "", - "GenericInfo": "BeginRequest=2023-02-08T00:25:02.787Z;CorrelationID=;ProxyState-Run=None;FEAuth=BEVersion-1942127710;ProxyState-Complete=PrepareServerRequest;SharedCacheGuard=0;EndRequest=2023-02-08T00:25:02.793Z;", + "GenericInfo": "BeginRequest=2023-08-27T00:25:02.787Z;CorrelationID=;ProxyState-Run=None;FEAuth=BEVersion-1942127710;ProxyState-Complete=PrepareServerRequest;SharedCacheGuard=0;EndRequest=2023-08-27T00:25:02.793Z;", "GenericErrors": "", "EdgeTraceId": "", "DatabaseGuid": "|RoutingDB:ee8ad99c-fbcb-45c2-939e-81869b5ee059", @@ -2356,7 +2356,7 @@ "RoutingStatus": "CafeV1" }, { - "DateTime": "2023-02-08T00:26:02.796Z", + "DateTime": "2023-08-27T00:26:02.796Z", "RequestId": "d2b47954-c3ea-49cb-90ef-2984dab2b466", "MajorVersion": "15", "MinorVersion": "2", @@ -2423,7 +2423,7 @@ "RouteRefresherLatency": "", "UrlQuery": "", "BackEndGenericInfo": "", - "GenericInfo": "BeginRequest=2023-02-08T00:26:02.794Z;CorrelationID=;ProxyState-Run=None;FEAuth=BEVersion-1942127710;ProxyState-Complete=PrepareServerRequest;SharedCacheGuard=0;EndRequest=2023-02-08T00:26:02.796Z;", + "GenericInfo": "BeginRequest=2023-08-27T00:26:02.794Z;CorrelationID=;ProxyState-Run=None;FEAuth=BEVersion-1942127710;ProxyState-Complete=PrepareServerRequest;SharedCacheGuard=0;EndRequest=2023-08-27T00:26:02.796Z;", "GenericErrors": "", "EdgeTraceId": "", "DatabaseGuid": "|RoutingDB:399bc9b2-7312-46e0-8181-fee7a0ffeaf8", @@ -2432,7 +2432,7 @@ "RoutingStatus": "CafeV1" }, { - "DateTime": "2023-02-08T00:27:02.832Z", + "DateTime": "2023-08-27T00:27:02.832Z", "RequestId": "33516636-4baa-4b6c-b51a-ec52de98e21e", "MajorVersion": "15", "MinorVersion": "2", @@ -2499,7 +2499,7 @@ "RouteRefresherLatency": "", "UrlQuery": "", "BackEndGenericInfo": "", - "GenericInfo": "BeginRequest=2023-02-08T00:27:02.831Z;CorrelationID=;ProxyState-Run=None;FEAuth=BEVersion-1942127710;ProxyState-Complete=PrepareServerRequest;SharedCacheGuard=0;EndRequest=2023-02-08T00:27:02.832Z;", + "GenericInfo": "BeginRequest=2023-08-27T00:27:02.831Z;CorrelationID=;ProxyState-Run=None;FEAuth=BEVersion-1942127710;ProxyState-Complete=PrepareServerRequest;SharedCacheGuard=0;EndRequest=2023-08-27T00:27:02.832Z;", "GenericErrors": "", "EdgeTraceId": "", "DatabaseGuid": "|RoutingDB:ee8ad99c-fbcb-45c2-939e-81869b5ee059", @@ -2508,7 +2508,7 @@ "RoutingStatus": "CafeV1" }, { - "DateTime": "2023-02-08T00:28:02.834Z", + "DateTime": "2023-08-27T00:28:02.834Z", "RequestId": "4dbca35d-091a-4d8d-8108-0dce06091ab0", "MajorVersion": "15", "MinorVersion": "2", @@ -2575,7 +2575,7 @@ "RouteRefresherLatency": "", "UrlQuery": "", "BackEndGenericInfo": "", - "GenericInfo": "BeginRequest=2023-02-08T00:28:02.832Z;CorrelationID=;ProxyState-Run=None;FEAuth=BEVersion-1942127710;ProxyState-Complete=PrepareServerRequest;SharedCacheGuard=0;EndRequest=2023-02-08T00:28:02.834Z;", + "GenericInfo": "BeginRequest=2023-08-27T00:28:02.832Z;CorrelationID=;ProxyState-Run=None;FEAuth=BEVersion-1942127710;ProxyState-Complete=PrepareServerRequest;SharedCacheGuard=0;EndRequest=2023-08-27T00:28:02.834Z;", "GenericErrors": "", "EdgeTraceId": "", "DatabaseGuid": "|RoutingDB:399bc9b2-7312-46e0-8181-fee7a0ffeaf8", @@ -2584,7 +2584,7 @@ "RoutingStatus": "CafeV1" }, { - "DateTime": "2023-02-08T00:29:02.936Z", + "DateTime": "2023-08-27T00:29:02.936Z", "RequestId": "d9d432b8-0dcd-44fb-a618-e5bcb954f4f0", "MajorVersion": "15", "MinorVersion": "2", @@ -2651,7 +2651,7 @@ "RouteRefresherLatency": "", "UrlQuery": "", "BackEndGenericInfo": "", - "GenericInfo": "BeginRequest=2023-02-08T00:29:02.934Z;CorrelationID=;ProxyState-Run=None;FEAuth=BEVersion-1942127710;ProxyState-Complete=PrepareServerRequest;SharedCacheGuard=0;EndRequest=2023-02-08T00:29:02.936Z;", + "GenericInfo": "BeginRequest=2023-08-27T00:29:02.934Z;CorrelationID=;ProxyState-Run=None;FEAuth=BEVersion-1942127710;ProxyState-Complete=PrepareServerRequest;SharedCacheGuard=0;EndRequest=2023-08-27T00:29:02.936Z;", "GenericErrors": "", "EdgeTraceId": "", "DatabaseGuid": "|RoutingDB:7b922fbc-5b8f-496b-be13-ccc0a9fd6a7a", @@ -2736,7 +2736,7 @@ "RoutingStatus": "" }, { - "DateTime": "2023-02-08T00:30:03.045Z", + "DateTime": "2023-08-27T00:30:03.045Z", "RequestId": "04202d92-0581-4a40-891e-6480e4964b05", "MajorVersion": "15", "MinorVersion": "2", @@ -2803,7 +2803,7 @@ "RouteRefresherLatency": "", "UrlQuery": "", "BackEndGenericInfo": "", - "GenericInfo": "BeginRequest=2023-02-08T00:30:03.019Z;CorrelationID=;ProxyState-Run=None;FEAuth=BEVersion-1942127710;ProxyState-Complete=PrepareServerRequest;SharedCacheGuard=0;EndRequest=2023-02-08T00:30:03.045Z;", + "GenericInfo": "BeginRequest=2023-08-27T00:30:03.019Z;CorrelationID=;ProxyState-Run=None;FEAuth=BEVersion-1942127710;ProxyState-Complete=PrepareServerRequest;SharedCacheGuard=0;EndRequest=2023-08-27T00:30:03.045Z;", "GenericErrors": "", "EdgeTraceId": "", "DatabaseGuid": "|RoutingDB:ee8ad99c-fbcb-45c2-939e-81869b5ee059", @@ -2812,7 +2812,7 @@ "RoutingStatus": "CafeV1" }, { - "DateTime": "2023-02-08T00:31:03.033Z", + "DateTime": "2023-08-27T00:31:03.033Z", "RequestId": "ffea0894-d7ea-459a-89bc-760929d955cf", "MajorVersion": "15", "MinorVersion": "2", @@ -2879,7 +2879,7 @@ "RouteRefresherLatency": "", "UrlQuery": "", "BackEndGenericInfo": "", - "GenericInfo": "BeginRequest=2023-02-08T00:31:03.031Z;CorrelationID=;ProxyState-Run=None;FEAuth=BEVersion-1942127710;ProxyState-Complete=PrepareServerRequest;SharedCacheGuard=0;EndRequest=2023-02-08T00:31:03.033Z;", + "GenericInfo": "BeginRequest=2023-08-27T00:31:03.031Z;CorrelationID=;ProxyState-Run=None;FEAuth=BEVersion-1942127710;ProxyState-Complete=PrepareServerRequest;SharedCacheGuard=0;EndRequest=2023-08-27T00:31:03.033Z;", "GenericErrors": "", "EdgeTraceId": "", "DatabaseGuid": "|RoutingDB:ea58efbd-ca6c-4d7d-b738-383065284040", @@ -2888,7 +2888,7 @@ "RoutingStatus": "CafeV1" }, { - "DateTime": "2023-02-08T00:32:06.250Z", + "DateTime": "2023-08-27T00:32:06.250Z", "RequestId": "6e3a889e-ff21-4e2d-a293-cfafb96816a1", "MajorVersion": "15", "MinorVersion": "2", @@ -2955,7 +2955,7 @@ "RouteRefresherLatency": "", "UrlQuery": "", "BackEndGenericInfo": "", - "GenericInfo": "BeginRequest=2023-02-08T00:32:06.132Z;CorrelationID=;ProxyState-Run=None;FEAuth=BEVersion-1942127710;ProxyState-Complete=PrepareServerRequest;SharedCacheGuard=0;EndRequest=2023-02-08T00:32:06.250Z;I32:ADS.C[BR-DC-02]=2;F:ADS.AL[BR-DC-02]=29.1567;I32:ATE.C[BR-DC-02.RES.contoso.com]=4;F:ATE.AL[BR-DC-02.RES.contoso.com]=0;I32:ADR.C[BR-DC-02]=2;F:ADR.AL[BR-DC-02]=1.57895", + "GenericInfo": "BeginRequest=2023-08-27T00:32:06.132Z;CorrelationID=;ProxyState-Run=None;FEAuth=BEVersion-1942127710;ProxyState-Complete=PrepareServerRequest;SharedCacheGuard=0;EndRequest=2023-08-27T00:32:06.250Z;I32:ADS.C[BR-DC-02]=2;F:ADS.AL[BR-DC-02]=29.1567;I32:ATE.C[BR-DC-02.RES.contoso.com]=4;F:ATE.AL[BR-DC-02.RES.contoso.com]=0;I32:ADR.C[BR-DC-02]=2;F:ADR.AL[BR-DC-02]=1.57895", "GenericErrors": "", "EdgeTraceId": "", "DatabaseGuid": "|RoutingDB:399bc9b2-7312-46e0-8181-fee7a0ffeaf8", @@ -2964,7 +2964,7 @@ "RoutingStatus": "CafeV1" }, { - "DateTime": "2023-02-08T00:33:06.956Z", + "DateTime": "2023-08-27T00:33:06.956Z", "RequestId": "c06fb72f-5a7d-4003-b2b8-b58ad07a88bb", "MajorVersion": "15", "MinorVersion": "2", @@ -3031,7 +3031,7 @@ "RouteRefresherLatency": "", "UrlQuery": "", "BackEndGenericInfo": "", - "GenericInfo": "BeginRequest=2023-02-08T00:33:06.954Z;CorrelationID=;ProxyState-Run=None;FEAuth=BEVersion-1942127710;ProxyState-Complete=PrepareServerRequest;SharedCacheGuard=0;EndRequest=2023-02-08T00:33:06.956Z;", + "GenericInfo": "BeginRequest=2023-08-27T00:33:06.954Z;CorrelationID=;ProxyState-Run=None;FEAuth=BEVersion-1942127710;ProxyState-Complete=PrepareServerRequest;SharedCacheGuard=0;EndRequest=2023-08-27T00:33:06.956Z;", "GenericErrors": "", "EdgeTraceId": "", "DatabaseGuid": "|RoutingDB:7b922fbc-5b8f-496b-be13-ccc0a9fd6a7a", @@ -3040,7 +3040,7 @@ "RoutingStatus": "CafeV1" }, { - "DateTime": "2023-02-08T00:34:03.313Z", + "DateTime": "2023-08-27T00:34:03.313Z", "RequestId": "097f004b-a78e-4c02-bd3f-b552acbdfd01", "MajorVersion": "15", "MinorVersion": "2", @@ -3107,7 +3107,7 @@ "RouteRefresherLatency": "", "UrlQuery": "", "BackEndGenericInfo": "", - "GenericInfo": "BeginRequest=2023-02-08T00:34:03.312Z;CorrelationID=;ProxyState-Run=None;FEAuth=BEVersion-1942127710;ProxyState-Complete=PrepareServerRequest;SharedCacheGuard=0;EndRequest=2023-02-08T00:34:03.313Z;", + "GenericInfo": "BeginRequest=2023-08-27T00:34:03.312Z;CorrelationID=;ProxyState-Run=None;FEAuth=BEVersion-1942127710;ProxyState-Complete=PrepareServerRequest;SharedCacheGuard=0;EndRequest=2023-08-27T00:34:03.313Z;", "GenericErrors": "", "EdgeTraceId": "", "DatabaseGuid": "|RoutingDB:ee8ad99c-fbcb-45c2-939e-81869b5ee059", @@ -3192,7 +3192,7 @@ "RoutingStatus": "" }, { - "DateTime": "2023-02-08T00:35:03.429Z", + "DateTime": "2023-08-27T00:35:03.429Z", "RequestId": "c1dd2aea-2c60-4d03-a38c-e7d0666a5436", "MajorVersion": "15", "MinorVersion": "2", @@ -3259,7 +3259,7 @@ "RouteRefresherLatency": "", "UrlQuery": "", "BackEndGenericInfo": "", - "GenericInfo": "BeginRequest=2023-02-08T00:35:03.427Z;CorrelationID=;ProxyState-Run=None;FEAuth=BEVersion-1942127710;ProxyState-Complete=PrepareServerRequest;SharedCacheGuard=0;EndRequest=2023-02-08T00:35:03.429Z;", + "GenericInfo": "BeginRequest=2023-08-27T00:35:03.427Z;CorrelationID=;ProxyState-Run=None;FEAuth=BEVersion-1942127710;ProxyState-Complete=PrepareServerRequest;SharedCacheGuard=0;EndRequest=2023-08-27T00:35:03.429Z;", "GenericErrors": "", "EdgeTraceId": "", "DatabaseGuid": "|RoutingDB:ea58efbd-ca6c-4d7d-b738-383065284040", @@ -3268,7 +3268,7 @@ "RoutingStatus": "CafeV1" }, { - "DateTime": "2023-02-08T00:36:08.784Z", + "DateTime": "2023-08-27T00:36:08.784Z", "RequestId": "ad9a9e62-2dc7-41e1-a5e6-068dccdf19bd", "MajorVersion": "15", "MinorVersion": "2", @@ -3335,7 +3335,7 @@ "RouteRefresherLatency": "", "UrlQuery": "", "BackEndGenericInfo": "", - "GenericInfo": "BeginRequest=2023-02-08T00:36:08.782Z;CorrelationID=;ProxyState-Run=None;FEAuth=BEVersion-1942127710;ProxyState-Complete=PrepareServerRequest;SharedCacheGuard=0;EndRequest=2023-02-08T00:36:08.784Z;", + "GenericInfo": "BeginRequest=2023-08-27T00:36:08.782Z;CorrelationID=;ProxyState-Run=None;FEAuth=BEVersion-1942127710;ProxyState-Complete=PrepareServerRequest;SharedCacheGuard=0;EndRequest=2023-08-27T00:36:08.784Z;", "GenericErrors": "", "EdgeTraceId": "", "DatabaseGuid": "|RoutingDB:399bc9b2-7312-46e0-8181-fee7a0ffeaf8", @@ -3344,7 +3344,7 @@ "RoutingStatus": "CafeV1" }, { - "DateTime": "2023-02-08T00:37:03.673Z", + "DateTime": "2023-08-27T00:37:03.673Z", "RequestId": "55314d35-66fe-4a8c-995c-4073fe06b772", "MajorVersion": "15", "MinorVersion": "2", @@ -3411,7 +3411,7 @@ "RouteRefresherLatency": "", "UrlQuery": "", "BackEndGenericInfo": "", - "GenericInfo": "BeginRequest=2023-02-08T00:37:03.669Z;CorrelationID=;ProxyState-Run=None;FEAuth=BEVersion-1942127710;ProxyState-Complete=PrepareServerRequest;SharedCacheGuard=0;EndRequest=2023-02-08T00:37:03.673Z;", + "GenericInfo": "BeginRequest=2023-08-27T00:37:03.669Z;CorrelationID=;ProxyState-Run=None;FEAuth=BEVersion-1942127710;ProxyState-Complete=PrepareServerRequest;SharedCacheGuard=0;EndRequest=2023-08-27T00:37:03.673Z;", "GenericErrors": "", "EdgeTraceId": "", "DatabaseGuid": "|RoutingDB:ea58efbd-ca6c-4d7d-b738-383065284040", @@ -3420,7 +3420,7 @@ "RoutingStatus": "CafeV1" }, { - "DateTime": "2023-02-08T00:38:03.820Z", + "DateTime": "2023-08-27T00:38:03.820Z", "RequestId": "3a134800-ebc8-45e9-aa51-30536b3b2dd8", "MajorVersion": "15", "MinorVersion": "2", @@ -3487,7 +3487,7 @@ "RouteRefresherLatency": "", "UrlQuery": "", "BackEndGenericInfo": "", - "GenericInfo": "BeginRequest=2023-02-08T00:38:03.815Z;CorrelationID=;ProxyState-Run=None;FEAuth=BEVersion-1942127710;ProxyState-Complete=PrepareServerRequest;SharedCacheGuard=0;EndRequest=2023-02-08T00:38:03.820Z;", + "GenericInfo": "BeginRequest=2023-08-27T00:38:03.815Z;CorrelationID=;ProxyState-Run=None;FEAuth=BEVersion-1942127710;ProxyState-Complete=PrepareServerRequest;SharedCacheGuard=0;EndRequest=2023-08-27T00:38:03.820Z;", "GenericErrors": "", "EdgeTraceId": "", "DatabaseGuid": "|RoutingDB:ee8ad99c-fbcb-45c2-939e-81869b5ee059", @@ -3496,7 +3496,7 @@ "RoutingStatus": "CafeV1" }, { - "DateTime": "2023-02-08T00:39:04.039Z", + "DateTime": "2023-08-27T00:39:04.039Z", "RequestId": "097a4925-5435-45be-949d-a129db4ea981", "MajorVersion": "15", "MinorVersion": "2", @@ -3563,7 +3563,7 @@ "RouteRefresherLatency": "", "UrlQuery": "", "BackEndGenericInfo": "", - "GenericInfo": "BeginRequest=2023-02-08T00:39:04.037Z;CorrelationID=;ProxyState-Run=None;ServerLocatorRefresh=399bc9b2-7312-46e0-8181-fee7a0ffeaf8;RefreshingCacheEntry=CacheEntry(BackEndServer TS-EX19-01.RES.contoso.com~1942127710|ResourceForest contoso.com|FailoverSequenceNumber 638113239236337077|LastRefreshTime 2/8/2023 12:09:01 AM);FEAuth=BEVersion-1942127710;ProxyState-Complete=PrepareServerRequest;SharedCacheGuard=0;EndRequest=2023-02-08T00:39:04.039Z;", + "GenericInfo": "BeginRequest=2023-08-27T00:39:04.037Z;CorrelationID=;ProxyState-Run=None;ServerLocatorRefresh=399bc9b2-7312-46e0-8181-fee7a0ffeaf8;RefreshingCacheEntry=CacheEntry(BackEndServer TS-EX19-01.RES.contoso.com~1942127710|ResourceForest contoso.com|FailoverSequenceNumber 638113239236337077|LastRefreshTime 2/8/2023 12:09:01 AM);FEAuth=BEVersion-1942127710;ProxyState-Complete=PrepareServerRequest;SharedCacheGuard=0;EndRequest=2023-08-27T00:39:04.039Z;", "GenericErrors": "", "EdgeTraceId": "", "DatabaseGuid": "|RoutingDB:399bc9b2-7312-46e0-8181-fee7a0ffeaf8", @@ -3648,7 +3648,7 @@ "RoutingStatus": "" }, { - "DateTime": "2023-02-08T00:40:04.089Z", + "DateTime": "2023-08-27T00:40:04.089Z", "RequestId": "2170c32d-d255-47e5-a81d-e8e0d8972f14", "MajorVersion": "15", "MinorVersion": "2", @@ -3715,7 +3715,7 @@ "RouteRefresherLatency": "", "UrlQuery": "", "BackEndGenericInfo": "", - "GenericInfo": "BeginRequest=2023-02-08T00:40:04.087Z;CorrelationID=;ProxyState-Run=None;FEAuth=BEVersion-1942127710;ProxyState-Complete=PrepareServerRequest;SharedCacheGuard=0;EndRequest=2023-02-08T00:40:04.089Z;", + "GenericInfo": "BeginRequest=2023-08-27T00:40:04.087Z;CorrelationID=;ProxyState-Run=None;FEAuth=BEVersion-1942127710;ProxyState-Complete=PrepareServerRequest;SharedCacheGuard=0;EndRequest=2023-08-27T00:40:04.089Z;", "GenericErrors": "", "EdgeTraceId": "", "DatabaseGuid": "|RoutingDB:399bc9b2-7312-46e0-8181-fee7a0ffeaf8", @@ -3724,7 +3724,7 @@ "RoutingStatus": "CafeV1" }, { - "DateTime": "2023-02-08T00:41:04.232Z", + "DateTime": "2023-08-27T00:41:04.232Z", "RequestId": "18cd7599-91d2-45ba-b8e2-7eec5f351902", "MajorVersion": "15", "MinorVersion": "2", @@ -3791,7 +3791,7 @@ "RouteRefresherLatency": "", "UrlQuery": "", "BackEndGenericInfo": "", - "GenericInfo": "BeginRequest=2023-02-08T00:41:04.226Z;CorrelationID=;ProxyState-Run=None;FEAuth=BEVersion-1942127710;ProxyState-Complete=PrepareServerRequest;SharedCacheGuard=0;EndRequest=2023-02-08T00:41:04.232Z;", + "GenericInfo": "BeginRequest=2023-08-27T00:41:04.226Z;CorrelationID=;ProxyState-Run=None;FEAuth=BEVersion-1942127710;ProxyState-Complete=PrepareServerRequest;SharedCacheGuard=0;EndRequest=2023-08-27T00:41:04.232Z;", "GenericErrors": "", "EdgeTraceId": "", "DatabaseGuid": "|RoutingDB:399bc9b2-7312-46e0-8181-fee7a0ffeaf8", @@ -3800,7 +3800,7 @@ "RoutingStatus": "CafeV1" }, { - "DateTime": "2023-02-08T00:42:04.297Z", + "DateTime": "2023-08-27T00:42:04.297Z", "RequestId": "4604aaed-c132-4b23-9064-5fc013ce2360", "MajorVersion": "15", "MinorVersion": "2", @@ -3867,7 +3867,7 @@ "RouteRefresherLatency": "", "UrlQuery": "", "BackEndGenericInfo": "", - "GenericInfo": "BeginRequest=2023-02-08T00:42:04.296Z;CorrelationID=;ProxyState-Run=None;FEAuth=BEVersion-1942127710;ProxyState-Complete=PrepareServerRequest;SharedCacheGuard=0;EndRequest=2023-02-08T00:42:04.297Z;", + "GenericInfo": "BeginRequest=2023-08-27T00:42:04.296Z;CorrelationID=;ProxyState-Run=None;FEAuth=BEVersion-1942127710;ProxyState-Complete=PrepareServerRequest;SharedCacheGuard=0;EndRequest=2023-08-27T00:42:04.297Z;", "GenericErrors": "", "EdgeTraceId": "", "DatabaseGuid": "|RoutingDB:ea58efbd-ca6c-4d7d-b738-383065284040", @@ -3876,7 +3876,7 @@ "RoutingStatus": "CafeV1" }, { - "DateTime": "2023-02-08T00:43:04.417Z", + "DateTime": "2023-08-27T00:43:04.417Z", "RequestId": "ae2ea565-895b-44ba-ab66-f8e1b9d48315", "MajorVersion": "15", "MinorVersion": "2", @@ -3943,7 +3943,7 @@ "RouteRefresherLatency": "", "UrlQuery": "", "BackEndGenericInfo": "", - "GenericInfo": "BeginRequest=2023-02-08T00:43:04.405Z;CorrelationID=;ProxyState-Run=None;FEAuth=BEVersion-1942127710;ProxyState-Complete=PrepareServerRequest;SharedCacheGuard=0;EndRequest=2023-02-08T00:43:04.417Z;", + "GenericInfo": "BeginRequest=2023-08-27T00:43:04.405Z;CorrelationID=;ProxyState-Run=None;FEAuth=BEVersion-1942127710;ProxyState-Complete=PrepareServerRequest;SharedCacheGuard=0;EndRequest=2023-08-27T00:43:04.417Z;", "GenericErrors": "", "EdgeTraceId": "", "DatabaseGuid": "|RoutingDB:399bc9b2-7312-46e0-8181-fee7a0ffeaf8", @@ -3952,7 +3952,7 @@ "RoutingStatus": "CafeV1" }, { - "DateTime": "2023-02-08T00:44:04.467Z", + "DateTime": "2023-08-27T00:44:04.467Z", "RequestId": "cef0b519-76b7-4553-a410-127ea6e7dde8", "MajorVersion": "15", "MinorVersion": "2", @@ -4019,7 +4019,7 @@ "RouteRefresherLatency": "", "UrlQuery": "", "BackEndGenericInfo": "", - "GenericInfo": "BeginRequest=2023-02-08T00:44:04.466Z;CorrelationID=;ProxyState-Run=None;FEAuth=BEVersion-1942127710;ProxyState-Complete=PrepareServerRequest;SharedCacheGuard=0;EndRequest=2023-02-08T00:44:04.467Z;", + "GenericInfo": "BeginRequest=2023-08-27T00:44:04.466Z;CorrelationID=;ProxyState-Run=None;FEAuth=BEVersion-1942127710;ProxyState-Complete=PrepareServerRequest;SharedCacheGuard=0;EndRequest=2023-08-27T00:44:04.467Z;", "GenericErrors": "", "EdgeTraceId": "", "DatabaseGuid": "|RoutingDB:ee8ad99c-fbcb-45c2-939e-81869b5ee059", @@ -4104,7 +4104,7 @@ "RoutingStatus": "" }, { - "DateTime": "2023-02-08T00:45:06.687Z", + "DateTime": "2023-08-27T00:45:06.687Z", "RequestId": "b239c01b-9204-4d3b-a978-04a0162bab02", "MajorVersion": "15", "MinorVersion": "2", @@ -4171,7 +4171,7 @@ "RouteRefresherLatency": "", "UrlQuery": "", "BackEndGenericInfo": "", - "GenericInfo": "BeginRequest=2023-02-08T00:45:06.458Z;CorrelationID=;ProxyState-Run=None;FEAuth=BEVersion-1942127710;ProxyState-Complete=PrepareServerRequest;SharedCacheGuard=0;EndRequest=2023-02-08T00:45:06.687Z;", + "GenericInfo": "BeginRequest=2023-08-27T00:45:06.458Z;CorrelationID=;ProxyState-Run=None;FEAuth=BEVersion-1942127710;ProxyState-Complete=PrepareServerRequest;SharedCacheGuard=0;EndRequest=2023-08-27T00:45:06.687Z;", "GenericErrors": "", "EdgeTraceId": "", "DatabaseGuid": "|RoutingDB:ea58efbd-ca6c-4d7d-b738-383065284040", @@ -4180,7 +4180,7 @@ "RoutingStatus": "CafeV1" }, { - "DateTime": "2023-02-08T00:46:04.982Z", + "DateTime": "2023-08-27T00:46:04.982Z", "RequestId": "9c3576a5-79a8-4a79-b24b-8a8e10668e4e", "MajorVersion": "15", "MinorVersion": "2", @@ -4247,7 +4247,7 @@ "RouteRefresherLatency": "", "UrlQuery": "", "BackEndGenericInfo": "", - "GenericInfo": "BeginRequest=2023-02-08T00:46:04.980Z;CorrelationID=;ProxyState-Run=None;FEAuth=BEVersion-1942127710;ProxyState-Complete=PrepareServerRequest;SharedCacheGuard=0;EndRequest=2023-02-08T00:46:04.982Z;", + "GenericInfo": "BeginRequest=2023-08-27T00:46:04.980Z;CorrelationID=;ProxyState-Run=None;FEAuth=BEVersion-1942127710;ProxyState-Complete=PrepareServerRequest;SharedCacheGuard=0;EndRequest=2023-08-27T00:46:04.982Z;", "GenericErrors": "", "EdgeTraceId": "", "DatabaseGuid": "|RoutingDB:7b922fbc-5b8f-496b-be13-ccc0a9fd6a7a", @@ -4256,7 +4256,7 @@ "RoutingStatus": "CafeV1" }, { - "DateTime": "2023-02-08T00:47:05.063Z", + "DateTime": "2023-08-27T00:47:05.063Z", "RequestId": "e48a1f91-8ed1-438a-8adc-6ef8e9a18481", "MajorVersion": "15", "MinorVersion": "2", @@ -4323,7 +4323,7 @@ "RouteRefresherLatency": "", "UrlQuery": "", "BackEndGenericInfo": "", - "GenericInfo": "BeginRequest=2023-02-08T00:47:05.059Z;CorrelationID=;ProxyState-Run=None;FEAuth=BEVersion-1942127710;ProxyState-Complete=PrepareServerRequest;SharedCacheGuard=0;EndRequest=2023-02-08T00:47:05.063Z;", + "GenericInfo": "BeginRequest=2023-08-27T00:47:05.059Z;CorrelationID=;ProxyState-Run=None;FEAuth=BEVersion-1942127710;ProxyState-Complete=PrepareServerRequest;SharedCacheGuard=0;EndRequest=2023-08-27T00:47:05.063Z;", "GenericErrors": "", "EdgeTraceId": "", "DatabaseGuid": "|RoutingDB:ea58efbd-ca6c-4d7d-b738-383065284040", @@ -4332,7 +4332,7 @@ "RoutingStatus": "CafeV1" }, { - "DateTime": "2023-02-08T00:48:05.258Z", + "DateTime": "2023-08-27T00:48:05.258Z", "RequestId": "fe01b58c-8365-48fb-8518-57f9736dca46", "MajorVersion": "15", "MinorVersion": "2", @@ -4399,7 +4399,7 @@ "RouteRefresherLatency": "", "UrlQuery": "", "BackEndGenericInfo": "", - "GenericInfo": "BeginRequest=2023-02-08T00:48:05.257Z;CorrelationID=;ProxyState-Run=None;FEAuth=BEVersion-1942127710;ProxyState-Complete=PrepareServerRequest;SharedCacheGuard=0;EndRequest=2023-02-08T00:48:05.258Z;", + "GenericInfo": "BeginRequest=2023-08-27T00:48:05.257Z;CorrelationID=;ProxyState-Run=None;FEAuth=BEVersion-1942127710;ProxyState-Complete=PrepareServerRequest;SharedCacheGuard=0;EndRequest=2023-08-27T00:48:05.258Z;", "GenericErrors": "", "EdgeTraceId": "", "DatabaseGuid": "|RoutingDB:ea58efbd-ca6c-4d7d-b738-383065284040", @@ -4408,7 +4408,7 @@ "RoutingStatus": "CafeV1" }, { - "DateTime": "2023-02-08T00:49:05.363Z", + "DateTime": "2023-08-27T00:49:05.363Z", "RequestId": "12f49f0c-cdda-41e9-bcae-5f700894b6fe", "MajorVersion": "15", "MinorVersion": "2", @@ -4475,7 +4475,7 @@ "RouteRefresherLatency": "", "UrlQuery": "", "BackEndGenericInfo": "", - "GenericInfo": "BeginRequest=2023-02-08T00:49:05.334Z;CorrelationID=;ProxyState-Run=None;FEAuth=BEVersion-1942127710;ProxyState-Complete=PrepareServerRequest;SharedCacheGuard=0;EndRequest=2023-02-08T00:49:05.363Z;I32:ADS.C[BR-DC-02]=2;F:ADS.AL[BR-DC-02]=10.2332;I32:ATE.C[BR-DC-02.RES.contoso.com]=4;F:ATE.AL[BR-DC-02.RES.contoso.com]=0;I32:ADR.C[BR-DC-02]=2;F:ADR.AL[BR-DC-02]=1.4776", + "GenericInfo": "BeginRequest=2023-08-27T00:49:05.334Z;CorrelationID=;ProxyState-Run=None;FEAuth=BEVersion-1942127710;ProxyState-Complete=PrepareServerRequest;SharedCacheGuard=0;EndRequest=2023-08-27T00:49:05.363Z;I32:ADS.C[BR-DC-02]=2;F:ADS.AL[BR-DC-02]=10.2332;I32:ATE.C[BR-DC-02.RES.contoso.com]=4;F:ATE.AL[BR-DC-02.RES.contoso.com]=0;I32:ADR.C[BR-DC-02]=2;F:ADR.AL[BR-DC-02]=1.4776", "GenericErrors": "", "EdgeTraceId": "", "DatabaseGuid": "|RoutingDB:ea58efbd-ca6c-4d7d-b738-383065284040", @@ -4560,7 +4560,7 @@ "RoutingStatus": "" }, { - "DateTime": "2023-02-08T00:50:05.358Z", + "DateTime": "2023-08-27T00:50:05.358Z", "RequestId": "1fc176f4-aee6-4060-9f85-d4f5cbe6063b", "MajorVersion": "15", "MinorVersion": "2", @@ -4627,7 +4627,7 @@ "RouteRefresherLatency": "", "UrlQuery": "", "BackEndGenericInfo": "", - "GenericInfo": "BeginRequest=2023-02-08T00:50:05.356Z;CorrelationID=;ProxyState-Run=None;FEAuth=BEVersion-1942127710;ProxyState-Complete=PrepareServerRequest;SharedCacheGuard=0;EndRequest=2023-02-08T00:50:05.358Z;", + "GenericInfo": "BeginRequest=2023-08-27T00:50:05.356Z;CorrelationID=;ProxyState-Run=None;FEAuth=BEVersion-1942127710;ProxyState-Complete=PrepareServerRequest;SharedCacheGuard=0;EndRequest=2023-08-27T00:50:05.358Z;", "GenericErrors": "", "EdgeTraceId": "", "DatabaseGuid": "|RoutingDB:7b922fbc-5b8f-496b-be13-ccc0a9fd6a7a", @@ -4636,7 +4636,7 @@ "RoutingStatus": "CafeV1" }, { - "DateTime": "2023-02-08T00:51:05.601Z", + "DateTime": "2023-08-27T00:51:05.601Z", "RequestId": "89d77b02-676e-43cf-a8e5-bf3c05861e1d", "MajorVersion": "15", "MinorVersion": "2", @@ -4703,7 +4703,7 @@ "RouteRefresherLatency": "", "UrlQuery": "", "BackEndGenericInfo": "", - "GenericInfo": "BeginRequest=2023-02-08T00:51:05.587Z;CorrelationID=;ProxyState-Run=None;FEAuth=BEVersion-1942127710;ProxyState-Complete=PrepareServerRequest;SharedCacheGuard=0;EndRequest=2023-02-08T00:51:05.601Z;I32:ADS.C[BR-DC-02]=2;F:ADS.AL[BR-DC-02]=2.35695;I32:ATE.C[BR-DC-02.RES.contoso.com]=4;F:ATE.AL[BR-DC-02.RES.contoso.com]=0.25;I32:ADR.C[BR-DC-02]=2;F:ADR.AL[BR-DC-02]=1.64625", + "GenericInfo": "BeginRequest=2023-08-27T00:51:05.587Z;CorrelationID=;ProxyState-Run=None;FEAuth=BEVersion-1942127710;ProxyState-Complete=PrepareServerRequest;SharedCacheGuard=0;EndRequest=2023-08-27T00:51:05.601Z;I32:ADS.C[BR-DC-02]=2;F:ADS.AL[BR-DC-02]=2.35695;I32:ATE.C[BR-DC-02.RES.contoso.com]=4;F:ATE.AL[BR-DC-02.RES.contoso.com]=0.25;I32:ADR.C[BR-DC-02]=2;F:ADR.AL[BR-DC-02]=1.64625", "GenericErrors": "", "EdgeTraceId": "", "DatabaseGuid": "|RoutingDB:ee8ad99c-fbcb-45c2-939e-81869b5ee059", @@ -4712,7 +4712,7 @@ "RoutingStatus": "CafeV1" }, { - "DateTime": "2023-02-08T00:52:05.615Z", + "DateTime": "2023-08-27T00:52:05.615Z", "RequestId": "77dbe4aa-898f-413b-9795-79979bee1004", "MajorVersion": "15", "MinorVersion": "2", @@ -4779,7 +4779,7 @@ "RouteRefresherLatency": "", "UrlQuery": "", "BackEndGenericInfo": "", - "GenericInfo": "BeginRequest=2023-02-08T00:52:05.613Z;CorrelationID=;ProxyState-Run=None;FEAuth=BEVersion-1942127710;ProxyState-Complete=PrepareServerRequest;SharedCacheGuard=0;EndRequest=2023-02-08T00:52:05.615Z;", + "GenericInfo": "BeginRequest=2023-08-27T00:52:05.613Z;CorrelationID=;ProxyState-Run=None;FEAuth=BEVersion-1942127710;ProxyState-Complete=PrepareServerRequest;SharedCacheGuard=0;EndRequest=2023-08-27T00:52:05.615Z;", "GenericErrors": "", "EdgeTraceId": "", "DatabaseGuid": "|RoutingDB:7b922fbc-5b8f-496b-be13-ccc0a9fd6a7a", @@ -4788,7 +4788,7 @@ "RoutingStatus": "CafeV1" }, { - "DateTime": "2023-02-08T00:53:05.707Z", + "DateTime": "2023-08-27T00:53:05.707Z", "RequestId": "27656f4a-cc74-4961-bfc9-0fa69d85c7ec", "MajorVersion": "15", "MinorVersion": "2", @@ -4855,7 +4855,7 @@ "RouteRefresherLatency": "", "UrlQuery": "", "BackEndGenericInfo": "", - "GenericInfo": "BeginRequest=2023-02-08T00:53:05.693Z;CorrelationID=;ProxyState-Run=None;FEAuth=BEVersion-1942127710;ProxyState-Complete=PrepareServerRequest;SharedCacheGuard=0;EndRequest=2023-02-08T00:53:05.707Z;", + "GenericInfo": "BeginRequest=2023-08-27T00:53:05.693Z;CorrelationID=;ProxyState-Run=None;FEAuth=BEVersion-1942127710;ProxyState-Complete=PrepareServerRequest;SharedCacheGuard=0;EndRequest=2023-08-27T00:53:05.707Z;", "GenericErrors": "", "EdgeTraceId": "", "DatabaseGuid": "|RoutingDB:7b922fbc-5b8f-496b-be13-ccc0a9fd6a7a", @@ -4864,7 +4864,7 @@ "RoutingStatus": "CafeV1" }, { - "DateTime": "2023-02-08T00:54:05.742Z", + "DateTime": "2023-08-27T00:54:05.742Z", "RequestId": "da8e552e-018b-44a9-8a30-279fd0a009ef", "MajorVersion": "15", "MinorVersion": "2", @@ -4931,7 +4931,7 @@ "RouteRefresherLatency": "", "UrlQuery": "", "BackEndGenericInfo": "", - "GenericInfo": "BeginRequest=2023-02-08T00:54:05.737Z;CorrelationID=;ProxyState-Run=None;FEAuth=BEVersion-1942127710;ProxyState-Complete=PrepareServerRequest;SharedCacheGuard=0;EndRequest=2023-02-08T00:54:05.742Z;", + "GenericInfo": "BeginRequest=2023-08-27T00:54:05.737Z;CorrelationID=;ProxyState-Run=None;FEAuth=BEVersion-1942127710;ProxyState-Complete=PrepareServerRequest;SharedCacheGuard=0;EndRequest=2023-08-27T00:54:05.742Z;", "GenericErrors": "", "EdgeTraceId": "", "DatabaseGuid": "|RoutingDB:399bc9b2-7312-46e0-8181-fee7a0ffeaf8", @@ -5016,7 +5016,7 @@ "RoutingStatus": "" }, { - "DateTime": "2023-02-08T00:55:05.741Z", + "DateTime": "2023-08-27T00:55:05.741Z", "RequestId": "1cfd7927-5849-4742-a5ba-d52552accec4", "MajorVersion": "15", "MinorVersion": "2", @@ -5083,7 +5083,7 @@ "RouteRefresherLatency": "", "UrlQuery": "", "BackEndGenericInfo": "", - "GenericInfo": "BeginRequest=2023-02-08T00:55:05.739Z;CorrelationID=;ProxyState-Run=None;FEAuth=BEVersion-1942127710;ProxyState-Complete=PrepareServerRequest;SharedCacheGuard=0;EndRequest=2023-02-08T00:55:05.741Z;", + "GenericInfo": "BeginRequest=2023-08-27T00:55:05.739Z;CorrelationID=;ProxyState-Run=None;FEAuth=BEVersion-1942127710;ProxyState-Complete=PrepareServerRequest;SharedCacheGuard=0;EndRequest=2023-08-27T00:55:05.741Z;", "GenericErrors": "", "EdgeTraceId": "", "DatabaseGuid": "|RoutingDB:399bc9b2-7312-46e0-8181-fee7a0ffeaf8", @@ -5092,7 +5092,7 @@ "RoutingStatus": "CafeV1" }, { - "DateTime": "2023-02-08T00:56:08.212Z", + "DateTime": "2023-08-27T00:56:08.212Z", "RequestId": "22e7e005-57db-4ce8-aa72-ff272602fcc8", "MajorVersion": "15", "MinorVersion": "2", @@ -5159,7 +5159,7 @@ "RouteRefresherLatency": "", "UrlQuery": "", "BackEndGenericInfo": "", - "GenericInfo": "BeginRequest=2023-02-08T00:56:08.209Z;CorrelationID=;ProxyState-Run=None;FEAuth=BEVersion-1942127710;ProxyState-Complete=PrepareServerRequest;SharedCacheGuard=0;EndRequest=2023-02-08T00:56:08.212Z;", + "GenericInfo": "BeginRequest=2023-08-27T00:56:08.209Z;CorrelationID=;ProxyState-Run=None;FEAuth=BEVersion-1942127710;ProxyState-Complete=PrepareServerRequest;SharedCacheGuard=0;EndRequest=2023-08-27T00:56:08.212Z;", "GenericErrors": "", "EdgeTraceId": "", "DatabaseGuid": "|RoutingDB:ee8ad99c-fbcb-45c2-939e-81869b5ee059", @@ -5168,7 +5168,7 @@ "RoutingStatus": "CafeV1" }, { - "DateTime": "2023-02-08T00:57:05.890Z", + "DateTime": "2023-08-27T00:57:05.890Z", "RequestId": "d624163b-ed94-45b1-9166-39f7ffeaf86d", "MajorVersion": "15", "MinorVersion": "2", @@ -5235,7 +5235,7 @@ "RouteRefresherLatency": "", "UrlQuery": "", "BackEndGenericInfo": "", - "GenericInfo": "BeginRequest=2023-02-08T00:57:05.885Z;CorrelationID=;ProxyState-Run=None;FEAuth=BEVersion-1942127710;ProxyState-Complete=PrepareServerRequest;SharedCacheGuard=0;EndRequest=2023-02-08T00:57:05.890Z;", + "GenericInfo": "BeginRequest=2023-08-27T00:57:05.885Z;CorrelationID=;ProxyState-Run=None;FEAuth=BEVersion-1942127710;ProxyState-Complete=PrepareServerRequest;SharedCacheGuard=0;EndRequest=2023-08-27T00:57:05.890Z;", "GenericErrors": "", "EdgeTraceId": "", "DatabaseGuid": "|RoutingDB:ea58efbd-ca6c-4d7d-b738-383065284040", @@ -5244,7 +5244,7 @@ "RoutingStatus": "CafeV1" }, { - "DateTime": "2023-02-08T00:58:07.835Z", + "DateTime": "2023-08-27T00:58:07.835Z", "RequestId": "581c859d-a6d4-42ef-ac0d-24ed56450308", "MajorVersion": "15", "MinorVersion": "2", @@ -5311,7 +5311,7 @@ "RouteRefresherLatency": "", "UrlQuery": "", "BackEndGenericInfo": "", - "GenericInfo": "BeginRequest=2023-02-08T00:58:07.833Z;CorrelationID=;ProxyState-Run=None;FEAuth=BEVersion-1942127710;ProxyState-Complete=PrepareServerRequest;SharedCacheGuard=0;EndRequest=2023-02-08T00:58:07.835Z;", + "GenericInfo": "BeginRequest=2023-08-27T00:58:07.833Z;CorrelationID=;ProxyState-Run=None;FEAuth=BEVersion-1942127710;ProxyState-Complete=PrepareServerRequest;SharedCacheGuard=0;EndRequest=2023-08-27T00:58:07.835Z;", "GenericErrors": "", "EdgeTraceId": "", "DatabaseGuid": "|RoutingDB:399bc9b2-7312-46e0-8181-fee7a0ffeaf8", @@ -5320,7 +5320,7 @@ "RoutingStatus": "CafeV1" }, { - "DateTime": "2023-02-08T00:59:06.021Z", + "DateTime": "2023-08-27T00:59:06.021Z", "RequestId": "a9a2ca55-125e-4a67-a81d-2fad7ab464a2", "MajorVersion": "15", "MinorVersion": "2", @@ -5387,7 +5387,7 @@ "RouteRefresherLatency": "", "UrlQuery": "", "BackEndGenericInfo": "", - "GenericInfo": "BeginRequest=2023-02-08T00:59:06.020Z;CorrelationID=;ProxyState-Run=None;FEAuth=BEVersion-1942127710;ProxyState-Complete=PrepareServerRequest;SharedCacheGuard=0;EndRequest=2023-02-08T00:59:06.021Z;", + "GenericInfo": "BeginRequest=2023-08-27T00:59:06.020Z;CorrelationID=;ProxyState-Run=None;FEAuth=BEVersion-1942127710;ProxyState-Complete=PrepareServerRequest;SharedCacheGuard=0;EndRequest=2023-08-27T00:59:06.021Z;", "GenericErrors": "", "EdgeTraceId": "", "DatabaseGuid": "|RoutingDB:399bc9b2-7312-46e0-8181-fee7a0ffeaf8", diff --git a/Sample Data/Custom/ESI-MessageTrackingLogs.json b/Sample Data/Custom/ESI-MessageTrackingLogs.json index 9a42169dace..520174eae78 100644 --- a/Sample Data/Custom/ESI-MessageTrackingLogs.json +++ b/Sample Data/Custom/ESI-MessageTrackingLogs.json @@ -1,6 +1,6 @@ [ { - "date-time": "2023-02-26T02:40:03.005Z", + "date-time": "2023-08-27T02:40:03.005Z", "client-ip": "", "client-hostname": "", "server-ip": "", @@ -32,12 +32,12 @@ "schema-version": "15.02.1118.021" }, { - "date-time": "2023-02-26T02:40:03.008Z", + "date-time": "2023-08-27T02:40:03.008Z", "client-ip": "10.1.2.24", "client-hostname": "TS-EX19-04.RES.contoso.com", "server-ip": "10.1.2.24", "server-hostname": "TS-EX19-04", - "source-context": "08DB0F5DBC3D2C80;2023-02-26T02:40:02.669Z;0", + "source-context": "08DB0F5DBC3D2C80;2023-08-27T02:40:02.669Z;0", "connector-id": "TS-EX19-04\\Default TS-EX19-04", "source": "SMTP", "event-id": "RECEIVE", @@ -64,7 +64,7 @@ "schema-version": "15.02.1118.021" }, { - "date-time": "2023-02-26T02:40:03.817Z", + "date-time": "2023-08-27T02:40:03.817Z", "client-ip": "", "client-hostname": "", "server-ip": "", @@ -96,7 +96,7 @@ "schema-version": "15.02.1118.021" }, { - "date-time": "2023-02-26T02:40:03.841Z", + "date-time": "2023-08-27T02:40:03.841Z", "client-ip": "", "client-hostname": "TS-EX19-04", "server-ip": "", @@ -128,7 +128,7 @@ "schema-version": "15.02.1118.021" }, { - "date-time": "2023-02-26T02:40:03.844Z", + "date-time": "2023-08-27T02:40:03.844Z", "client-ip": "", "client-hostname": "TS-EX19-04", "server-ip": "", @@ -160,7 +160,7 @@ "schema-version": "15.02.1118.021" }, { - "date-time": "2023-02-26T02:40:03.845Z", + "date-time": "2023-08-27T02:40:03.845Z", "client-ip": "", "client-hostname": "", "server-ip": "", @@ -192,7 +192,7 @@ "schema-version": "15.02.1118.021" }, { - "date-time": "2023-02-26T02:40:04.681Z", + "date-time": "2023-08-27T02:40:04.681Z", "client-ip": "", "client-hostname": "TS-EX19-04", "server-ip": "", @@ -224,7 +224,7 @@ "schema-version": "15.02.1118.021" }, { - "date-time": "2023-02-26T02:40:06.426Z", + "date-time": "2023-08-27T02:40:06.426Z", "client-ip": "10.1.2.24", "client-hostname": "TS-EX19-04", "server-ip": "10.1.2.24", @@ -245,7 +245,7 @@ "message-subject": "[hz-fw-01.contoso1.com][INFO-721] Weekly Executive Report", "sender-address": "sanitized@sanitized.com", "return-path": "sanitized@sanitized.com", - "message-info": "2023-02-26T02:40:02.316Z;LSRV=TS-EX19-04.RES.contoso.com:TOTAL-HUB=3.694|SMR=0.275(SMRDE=0.121|SMRC=0.152(SMRCL=0.136|X-SMRCR=0.150))|UNK=0.014|PSC=0.006|UNK=0.003|CAT=0.812(CATMS=0.043|CATOS=0.668(CATSM=0.666(CATSM-Interceptor Routing Agent=0.003|CATSM-Malware Agent=0.637|CATSM-Text Messaging Routing Agent=0.003|CATSM-RMS Encryption Agent=0.014|CATSM-Journal Agent=0.006))|CATRESL=0.079|CATORES-INC=0.016(CATRS=0.016(CATRS-Transport Rule Agent=0.015(X-ETRLD=0.002|X-ETREX=0.008))))|UNK=0.002|CAT=0.838(CATRESL=0.004|CATORES=0.012(CATRS-INC=0.012(CATRS-Transport Rule Agent=0.008(X-ETREX=0.008)|CATRS-DLP Policy Agent-INC=0.003))|CATRS-Retention Policy Agent=0.003|CATRS-Supervisory Review Agent=0.002|CATRS-Index Routing Agent=0.447|CATROUT=0.001|CATORT=0.347(CATRT=0.347(CATRT-RMS Encryption Agent=0.011|CATRT-Journal Agent=0.334))|CATFIN=0.003(OMDSN=0.001))|UNK=0.002|QDM=0.041|SMSC=0.158(X-SMSDR=0.039)|SMS=1.536(SMSMBXD=1.458)|UNK=0.002", + "message-info": "2023-08-27T02:40:02.316Z;LSRV=TS-EX19-04.RES.contoso.com:TOTAL-HUB=3.694|SMR=0.275(SMRDE=0.121|SMRC=0.152(SMRCL=0.136|X-SMRCR=0.150))|UNK=0.014|PSC=0.006|UNK=0.003|CAT=0.812(CATMS=0.043|CATOS=0.668(CATSM=0.666(CATSM-Interceptor Routing Agent=0.003|CATSM-Malware Agent=0.637|CATSM-Text Messaging Routing Agent=0.003|CATSM-RMS Encryption Agent=0.014|CATSM-Journal Agent=0.006))|CATRESL=0.079|CATORES-INC=0.016(CATRS=0.016(CATRS-Transport Rule Agent=0.015(X-ETRLD=0.002|X-ETREX=0.008))))|UNK=0.002|CAT=0.838(CATRESL=0.004|CATORES=0.012(CATRS-INC=0.012(CATRS-Transport Rule Agent=0.008(X-ETREX=0.008)|CATRS-DLP Policy Agent-INC=0.003))|CATRS-Retention Policy Agent=0.003|CATRS-Supervisory Review Agent=0.002|CATRS-Index Routing Agent=0.447|CATROUT=0.001|CATORT=0.347(CATRT=0.347(CATRT-RMS Encryption Agent=0.011|CATRT-Journal Agent=0.334))|CATFIN=0.003(OMDSN=0.001))|UNK=0.002|QDM=0.041|SMSC=0.158(X-SMSDR=0.039)|SMS=1.536(SMSMBXD=1.458)|UNK=0.002", "directionality": "Incoming", "tenant-id": "", "original-client-ip": "", @@ -256,7 +256,7 @@ "schema-version": "15.02.1118.021" }, { - "date-time": "2023-02-26T02:40:07.103Z", + "date-time": "2023-08-27T02:40:07.103Z", "client-ip": "10.1.2.24", "client-hostname": "TS-EX19-04", "server-ip": "104.47.22.138", @@ -277,7 +277,7 @@ "message-subject": "[hz-fw-01.contoso1.com][INFO-721] Weekly Executive Report", "sender-address": "sanitized@sanitized.com", "return-path": "sanitized@sanitized.com", - "message-info": "2023-02-26T02:40:02.316Z;SRV=TS-EX19-04.RES.contoso.com:TOTAL-FE=0.416|SMR=0.125(SMRRC=0.002|SMREH=0.001|SMRPI=0.054(SMRPI-FrontendProxyAgent=0.053))|SMS=0.289;SRV=TS-EX19-04.RES.contoso.com:TOTAL-HUB=4.371|SMR=0.275(SMRDE=0.121|SMRC=0.152(SMRCL=0.136|X-SMRCR=0.150))|UNK=0.014|PSC=0.006|UNK=0.003|CAT=0.812(CATMS=0.043|CATOS=0.668(CATSM=0.666(CATSM-Interceptor Routing Agent=0.003|CATSM-Malware Agent=0.637|CATSM-Text Messaging Routing Agent=0.003|CATSM-RMS Encryption Agent=0.014|CATSM-Journal Agent=0.006))|CATRESL=0.079|CATORES-INC=0.016(CATRS=0.016(CATRS-Transport Rule Agent=0.015(X-ETRLD=0.002|X-ETREX=0.008))))|UNK=0.002|CAT=0.838(CATRESL=0.004|CATORES=0.012(CATRS-INC=0.012(CATRS-Transport Rule Agent=0.008(X-ETREX=0.008)|CATRS-DLP Policy Agent-INC=0.003))|CATRS-Retention Policy Agent=0.003|CATRS-Supervisory Review Agent=0.002|CATRS-Index Routing Agent=0.447|CATROUT=0.001|CATORT=0.347(CATRT=0.347(CATRT-RMS Encryption Agent=0.011|CATRT-Journal Agent=0.334))|CATFIN=0.003(OMDSN=0.001))|UNK=0.001|QDE=0.610|SMSC=1.138(X-SMSDR=0.609)|SMS=0.667", + "message-info": "2023-08-27T02:40:02.316Z;SRV=TS-EX19-04.RES.contoso.com:TOTAL-FE=0.416|SMR=0.125(SMRRC=0.002|SMREH=0.001|SMRPI=0.054(SMRPI-FrontendProxyAgent=0.053))|SMS=0.289;SRV=TS-EX19-04.RES.contoso.com:TOTAL-HUB=4.371|SMR=0.275(SMRDE=0.121|SMRC=0.152(SMRCL=0.136|X-SMRCR=0.150))|UNK=0.014|PSC=0.006|UNK=0.003|CAT=0.812(CATMS=0.043|CATOS=0.668(CATSM=0.666(CATSM-Interceptor Routing Agent=0.003|CATSM-Malware Agent=0.637|CATSM-Text Messaging Routing Agent=0.003|CATSM-RMS Encryption Agent=0.014|CATSM-Journal Agent=0.006))|CATRESL=0.079|CATORES-INC=0.016(CATRS=0.016(CATRS-Transport Rule Agent=0.015(X-ETRLD=0.002|X-ETREX=0.008))))|UNK=0.002|CAT=0.838(CATRESL=0.004|CATORES=0.012(CATRS-INC=0.012(CATRS-Transport Rule Agent=0.008(X-ETREX=0.008)|CATRS-DLP Policy Agent-INC=0.003))|CATRS-Retention Policy Agent=0.003|CATRS-Supervisory Review Agent=0.002|CATRS-Index Routing Agent=0.447|CATROUT=0.001|CATORT=0.347(CATRT=0.347(CATRT-RMS Encryption Agent=0.011|CATRT-Journal Agent=0.334))|CATFIN=0.003(OMDSN=0.001))|UNK=0.001|QDE=0.610|SMSC=1.138(X-SMSDR=0.609)|SMS=0.667", "directionality": "Incoming", "tenant-id": "", "original-client-ip": "", diff --git a/Solutions/Microsoft Exchange Security - Exchange On-Premises/Package/3.0.0.zip b/Solutions/Microsoft Exchange Security - Exchange On-Premises/Package/3.0.0.zip index 02a94bb9986662a65d1d6904e2eb8a3dc3f1fddc..cdee0352b32fb111fc6e46c50d31d6f4a51ed91e 100644 GIT binary patch literal 67525 zcmZshQ**TQhx?Z2XjTtheV@}ELUN!hZLc`jcHZRek+96IvpL(j^7fg zm-?SRT2=EXnouCrJjqB(>Ik?FvP=_9DY@vwm>7{>ZfaI}pQpCL;=_~klWUf$ z9TQ63rHo_=@oMOs5MQiVE)+MgL3nJwFwg2@r<-mE@ygh3MQdVh+UQHjKUJ@fR&?gL z#_QvqUO+aV|4oGNZhsv8`P!5*#t_z^KGLxCq+Gv5PCFa^Z;KAx*zDfru8G)kcqtKGb>sW#+~Z ziaj}#xuzW)Y9QLuowLWZ7CkFyBf3k!iqr+!1yg2~eDzjdR5`_ZBI+jGXgb(F zl(JTC+02GTGUVG`@^SX03Dq%>2l~a4*pv)M4q98|fa)mQ)Jo7@#F^gF-2(h7B%6ep z*gC`HHneyXR^^&qD@uAhly@s(NG5&p4c@M}e@Vs#V ze*Ri|rhbr47Cg|4&~13%N``Q)eP$mh%t z`C_}Rx<#WbIN-Z?lgazbe%U|Jc54DFsdHedT8&@hwJux(=WZe;J6AQ$Eo_mJS{Xma zkzib#QOyELFoT)fKRFrUrO;2Yrm%Kr_j${rnz?`qQ2Qay6^EkZ9~h`QvMb3f{3)Nb zo|^o)u3VQ1Lg&6MUla^h=OqL$+)$+~A=VKeEANW6FcFDnHrFNocrV<`#XHM+cyfyM z!bFa36veWh$)8j9(fC@N(}pyO$v*I!BRV(gJ4lE;3aF?KQEpeG%)%%RdUCK$a-{6X z$epj?k+E?lb^Jl#^r2Fopj$Uyv4Sn0$>T1!n>QC<!z5jWU0j2HAg)VVJ!O?RNd~+GrV|y=e zew{EOLlQ7dC2I8I#%>CyeXKp4=T5lzCXC-}dd7h^0OKty zt!WVu$kXXqV#-bWl}X3##M>8Qp@%$H!xew6z6jFdH3;c;(^zB>-~EC6hMvU#$Mqe> zMEMR$p=Z^?Oo#5vYp#$kSK2ZU;Xt)jczz|Et@fdDCc1G33&Q_YviRNhqH0m-B7yu0 zAY|Xa1Xy*5T1%50$`&MD(!5F~u_RQ*+rnO&;p2^V6T1~bbX2_w!3`* zLN*6llzI)pN%|~M)X;8WH(x8K*!Rm;5A2m3z<;vc3k1ayAw9)PzR;`2^b3$3>}sYsKZN;y0{eo4x7l z!*1AfsSfVO3D4dghKGStCt03$MTLQ`r7 zp{Fw$#D(C6X9FNg^@noGl5rP95E?daC5%El%sA#jFg_fL=T%d9ns=@H19 z-x!B8B)|PS^zTgLkgHz*WPW^NH&6Bhf7VPO01YH|=$ zQOlZ%eI^vAiX%h)bl~uf#?!is?9LKs;(%UI29?|4{&?e~^|<=AqaXL(0b^y(pL!#Z zbODF5Uo4P`q3#py(CGoI9<;vo~7%FU= zA@O{BD^>$aLe*@@v^aVB5M1)7kHe5(QCDLCM-!+-lcB6(U?>oS#C#owWd#~uGfZ$6 zQaL+x2+;C{qdpXW2-m2RI~WJ9^28N=OHtN88acvFyh4UI^$^aHaV~BEt#KYypKrr* zrDl5m-fPHG-;}vehaAIW$~j@dRlxp!=n^Sn2sRMAQK`LOSq;_=BoK9Ai{n&#Pxhc?iq9vteNxsW)iI4LGxj-g4x||cd;3; zor92knj2$4SV*TFY+ZWuF?@WB_QLV}iF4jN%L=v-r=eRB+0)0=!#arxAaGob(1iUQ zCf&yd@a$_??plZ!`m!#cfv z5csT4aL8Y8I`O=eBHPO_vdMF5V0pzk1mZE>7QJ>CA5H>SyiIQjDf6)V=6~=p8j88% zY`z@RiDLLUFib?=Lgi!3s&rZI3C#qFg+l|IsRc#rCM7D#o;y02z?`rgSRT~^_X zXk1Jjr9VyBXuO`{>bHlFV0I~(SR9G9&I5bsBYm~i>2Caz6oeK=Tff1S{;#}(Y9Z7> zV<5)LeFFi}u7w6c{U@*NjI8Wc&Fma(|B0;s5muModd>%94aCpaFyG-Fyzc2qX$9iS z`P~}MtvctK^9uf_P3&wv^XI4VXcDlcKLemafGas{NWHJqNTWTxmzqNBsDAgw{*#zPZ!l>e(HiH~$@3^CoKMScR{syEmlgr8JiD z!tl}?wd-#vRN;m9nqqHj^f%S^tfeWRTL|_CB2gciH|o|qsJib}9JtUU6>7b7TgL1s z@jEix8v^RSuqGFqILVND`j-o;hy^(sOkyNa0`|(}?19do&cef_xF3Od0w69=m(><} z5H81I?3==Cz0T|>Zie6$%y5YFS)VrX2?jKd z-ONQT!Ad_}WXF5A|Mr(U*vFSs%ztP&`Cr5VBJt3|p{@yBcwj$pD!vk~iFX$c(;f zl;Sy0n@jcF*xLD06L}ktL6S|Lw8)5ksXa^a3#W{a(|w2Wzg(V)9ma`e$l@x=yD^H4 z>BcKKdWqpO9EXbGynU7SgcfAW7mAo0{K9*E0>hrnRetrok!(HOiaselN>Yy{2auB_ z7#$JINbzW1Q8Sej1Rw~w8&c2yh{Nlz@>vH((%=*3WWC2fJVe5{O()pcwhk{*Pj!Es z0lp~mael;WHe6r!HA|^f)N0mwbgFRH4JL7D9Gb?I6>K%-i;nsd3q+$gzn-=;?F)1-j2G}L zMmOBcd*2@F=5c>t+dVpJr-05x*-Cex;{5gbd*h72s`fE2L1;G=nl73s$0@tQz7~?% z1;MG}$e2uIZdM7s^g36Qd^UHQ_^Yuvqxi*50lWokW6_xfn$P+Oo=>l+Hv1fsK1Z)e zBryjlOkO9-yisruHLGsI7CIrVB93kaXE1Yy9U3f#_AD`T+L4)JsK z=C7wz)5=+iYDfpb5XHc`4-TQHEQH1TCcVua)~rwI<7yC^hal~sc71V2eNbpUh~c|L z9)NZjhbA^W(UZY0!TvM)!%*+vxX2;S{il9!!x)uhX9=lL8TGvt80ecA zE;Wa}u1&KUr&@OoBwCwIHJ=vwZ+kmZQ@%pPY{#BPYP5C;-}||@j3KH;(q``aa064d z9B2vB0aU(ab;!Y`iwi@cdZd!eqFpAE+{f0U?BWN&5=eUNj{Yd4u$$N$vf3LTC8 znWF{_GEo4;8oLl54(&7<0hnhGA@`j0Nv%fZU6?G=nL|e?%2L&;`)Ck)c#(K%KXtRt z7d+De>SMS+FN9g5a=?z^HEJ9lLoVVRAc1R^auI0iigv{fZ7y=bZ=@|-pJfqmu^Cjq zH|0)VD2f%4@{G`L{Ml0SFwbiZDlY>Ou}dY2BhTE0tm$!k;n*7nj7T*l`4`ZX=!v1k zh!-dOsEK_zm?eL)pHVm5S<8+VB)RZM(x|KOE`$XZN|w8jUzPBi+Zpo+AU0-Im9leT zu~iyjPCv3v8L0~n*ZR)J`UqVAzOzpBRn682PxW~EIhB#sm8GwY$RXqDsu`(~y@szi zSV`GQHXSqE)u9on@dD?`fwRB#>HClK&d|63Qe35x`sZCLQp}jlX-nc*0=gBV_ zH;w*Cc8{i+ZcTd9J_vzq-4WU(Kpyp8Ikoh$y&|}ZuRi#yF z-@CtjoDm%!KPVJWJJ_H!2RCU)OwxV*+oEPST?Bm~f%L4Wy{K1-V5 zV;L{B&Sj;SvKv;-?fN3d&zeChOz-rh%Exjj4wo-l=;VdppGjiE!@>VY4cNSMM?)3K z&$DtjG0)H7INlxhB&O@gW*jjJ&Lv4 zpv(HyM}_1-PK=nW-`B?7GR1J&6jm*1Dx0Oxp7sc?k80KA{R8@ZzK`JB$G$9?imM{X z_#o$!Nx$01L1!KU5 z@AdHYC1&7zpJ{CE83r3|DG$|~cbOG9@A#8itWb7lmI+5+@BUzU88Q&~@Bp4EBc94> zg#B=Gemh*tO!nm~ZT|ea@+8~}bAHc8f=o&fQ|H$YbgdDTekX>@NKj4m(y%hv&fqeeL0o5K};-{J8`cS*3A* z3IGKzlhgM|>N%zIJs^%IFO%hEa>KYPd~)S)YfSPx5yp9@3%S_eL;_{;Pf!sD$+u4K zlYYNF(1c`kO=c!c5&cTn!bYR8zupS|isE3b5mtRtEP9Bjd9x=f8mH|X1n&tSIt?#@ zId5&J=(?6*auA3En$+hGA-3cx+g@>=2HEzik*?-CR>&8tdo=7L1#@0;_riEbHn?HL z!H2XUbeNcq)g%ui4Gb}_2WOQW1doNBmbwS~6gB6TW)DRDZD!T*P&Qs4{cE$5mciw+ z=}PbATYb)&M{oQ3tZlvOb1LR$h^}Hn5f0N`P8KQa#&wUpbOlffx0u)kvD75hcAO!k z*L8z1D!x0gk`+bu&eVawHK)uCiM}LpSjJ#AMf17PUDlO}x8@!k^DzbLaCPX=v3OjP zv8;t*z%!okDt`TC$Ekvy+dy0`^TUlk z++zYKgW}O!cW>cqmb%7>k2t>kP-2mCYZAtI=TY5u7=*8n_LHQ1X8&E{b&RtUKtOAY z>|m1DC~MaIyKzs{w*CQDxlc62F4FAp#NT(HW0@lVe3c=9W!Fr+EUjhaGdTpStj1_W0)+WUwsF3j5Ah@&*jv5tbb2Msd z4>q{N5#3{uz1I3`umHP)RmDdmnwB~J1HmkCihL03eHd1Egg!n}stT!X17$z1kc0Ri zZO`{Qs2~$58-Y^hf~u`jU!)7d#D~b)3wW>$gZepK;R@2nafjd9YcdHpKl`eG4bjY`^+k%9!N}YVIaz4E`Lyo)(scD;`=#N zBjQxlq;hl#v;Fdt71(QMxX+r$uHU@@ul90w-5NOvyuyboiEq`Dk=Ff@D|(GmTedxEm? zL2T@H0$i8qN>v;o4@k*nSz^^T@A-k0YoQj95l2NS!E&DrKI6(%Y@i8C*76TpPfFtD zwz?gvr#3zpe@QTZ6xD|+YYP-4{MuTB!Qi|DgMkOzj%iw3kE-e*Vm8BMab5A6)kIUXX>kWuHNcz+)saRT)eXILiWKS6Tf#G+29f4pA0r zv};?;ur(A#Mb7eVEV?qSpH2xx6u%G;Y5c~UerP(BL7nSrz7P82woWt8O^2~RK_9_j{ zmfB50=39DiuEi7k-9tSTsf*pXuuYYaG|eO9h6#+fun&}I=$ftH@NlO2K+o!_-tgzc z)^m%Y(P528>E!$RcF%Lq-($}9b!Gd)Vc=d!9{dRV8^vpmeI89K#QD0Bzr~BCMIGN7 z-PR|$tXI$?U%C&%99tzr=SB$<`SXgqQpN3X#J)L>Mv~}>dJFpky<@qA7d>LLye_9h zf=1RIjLMkh(~9?jcT5t;T1-0c)QIeWPb&7(W$RFzLYk-wpBC+4HB2L|D{l6qV|joV z&4R&l9>osl;ud~=i{YE2D4=lD*{o*kyo#y39Iy6h+skYP;JSRrkr~el3H%Q1>RD0- zsN#aEECtOVw%!kzc1S>%GNB7TZ4XViIj&gz^om$fd(w)Og#`Pzb}EkZ_cj`=;`+Fb zqPnyu@e+S@cfUSWU)dFEd4b?!&e8mfy;6G8C6Y2&PxYp7{n9usW!?cGkrLLf zF=8HHK|kDruN)9naTK_sYVs>e@OcN5QuH{rg07VQ3Du4=!SSc23gBevpvLf;BT+Yu zUmq~wftoIJZYZwt*EMh%c$lSQ$sws?qfB>B(}Z90I6^3dVJo2iyG>y@*477na0!{- zlT048@T=oF=_#azwT&$kEs&Pc3+>vn&nHD7B*5$3Viwf(w;2VudkYs7#g7FTfozgU z7GoONKY#S@s-ZlB#l@CKy>E?u%LssL+hH?MWoVgPzTSA4Syd$~ETEyRS8d&P>hYS9 zqdd$u2z^MXRoKUq#J9nWZ4lCxn!|5pr--9bM1Q?BdK2pli!Hb*1XnbgP=_ z$Rr83%2NP&*jlRSuBvA9a_wf)sfs15E{=aOy(F8cKiX{ox>oC`!~R+@z{t1Joz z7%|fp^g@L*>W*2hYL)(InalMn1d}@A-wKXMxYw7)KQ3^(t=;A)cQmC`C+Jk$AR$^HB!KTX!bLRJYcS|g#a&uVG z$!br3Oa(m@)Qd|KBFZPSBfg8muSdtIF%SIijq0?&HOhI|bG{TQzr|1_{Bwh9>qOA~ z9sW|ZpIVmj)B8X`QgHHim$@ZMB?XjBp(}70*AYgiqdSUwMhgt#SlA9=z$h67b1L>n zeT32IqS_(A4loIrum>EVgbARs?3%1dplQ1lj3X)CFi=8{;Ao(yE9BM%*TX!z@8#0) zqraxb3B`WQhD36UUEs4j3TufnuLR_oe<-Ka-|$SG4#zNZvOJGje6jXf8$1;0^6;dfBxC~LTRYNcW$2qOgC{CG~uq0m$!$B3-@;%yOY$QTBB(aQLY5|ow8ZIndD zQY>6t;k_#EU<)IqFXv>zf#uLxYNKy&83FG37;0&^j+mKgb27^A1xqxlE~A3Yk?RdC z7^Y@!xIi5kOXrjBOhOpX%>3{J`CGtvcgfeq96=NC^0A!R|GF55GovMYRnjQ5hr0I~ zR2z>lG5RWaP4GbaHz&oqX+{(La+iXyBvwQ6{{67=MXtO! zTr}E(Y9inu&i(5)PuQIl&7p(emK}?Y;iP^29yQ$@{->@w^%+x&NC6;cpP}3;|D76c zm%(Dw1BYyO)WjcDV5Wa*(b%ij7dlia>}rVw7loCw?Qmp-{Sw-!F61Nok1jR&N$*pM zAsq#nI~!D5bag=l-2%q};Vb+K$5_@_A8q7VqT7iELZvILDPXDQFRHrXi?N?jed%UqwsOP-7R4Gd1kDrFaOG@A7r2V5El3 znzmRKOB?TC1#pG#y|I|H^W3VTawrKr)mUdKM@0=9o6CUB;d!B5%hY)w-ok!ZOZ)s6 zr9pJ}UO}trecH8~b#m**VfBOq-9VL0E~e!ZTvOhpCqplfs@d zjSAu{#p?JP?P;ad4Ar>UpvNTbgQo0MJMbf20-MHJtBT&D^g|h84LZalJeR;+PaSys z!tLYs%?mw=w4Fba9#Wi2AeqYULe{NoBwD|;U)9FGU*D#B4ILeLBZ%_B&y1XhS0jAe zzO2d}Zfi2s!r2C>WJPow$5ptr{a(s#M^&tSzX0O~&s5c|0rjrx?Q=O$dx(xOnBDU- zSrthGr92b=SZRn@*X-8rtg5ianM`uoL3iOYAT8AV%TqT@&^)slu+M>me9Au@{Zn1h z(UC36Wz@u&ub{;K*g{gPTfinXH9URcDLlQRanVCQQntBd+s;`D@~h6B0k52 zx93Uh{7#~Lno&MY+b0-U*fj*4W@MmEU1m*-s=$#oYr`~B2hPwg`FaACfBz9s&NTxD zsan{Td?KHlkjBm?sjg!&Z2d$J)e0olw3e6G#g$jqrF{to`doeQj}Kdi+0Z|8Bw7!E z|9i+d(EAqz-%Zv#{g-o(Y~*Zw$Gc=RbeFKhk6w8g5zFJutX3i?Co-u2OC`fO%`Zu| zd5RGy#g!m8U;ZfWb`MsHOo|+}LTs2~<^vn#V!bH`se`^b;+AjSQX)D?Yx#dYfb^3q z(U6tt2w3G10~Bm22g({GrIT>$_Y#Wa^phcmPd~>?vdc}iEN0NHUjN$Rew{De9w-}u zry0n!n!lOh>{)j)&@m$ZoR5H+4%<;GZaN`O0ydXTOent^Y8gaZN2;JP30Pcr>OYD@ zQ<%EPyK9nu(+|nkleTDmk0&vYvz~Z|IGb#}wg_wuD!y1g7cKDxE#|*2#k&N#jvZ&t zK9byk_rhat6=96mu17-`CUH;nJY3I3c4tWHXv29y7aL98jLhHE4T@e+_D-?`OfByk zVzytgs;1v#tzT5~hv+D5t4UU{b#slDwe@J<&x<)7JB;_6R5Q;VknH<$5aOn42UP}~ zC z_V(xN@Ykg0a(TF+Ds566j3S`t<2(7_8Xr5qn{=NeTuq(qWcyCXDI>Z;5AFl(PB4i% z^YEZ9sh-*CUl*F&RrLb*i^|UEu<6-~b_~DG19r@J#6x?QTE$hf5#uI)h zlDK)!KKx<~cV?&Q`F3690TO^Vste!e;F?2du6IY432goQZrAYu=D)JsT)zk9`o0PK z;A^VL73*1m1I|EE2<$K>A*rRo>2uq0 zymP0+l!@71ipZ}hJ>J6yP6QIlYP~`M#7QzfU7s7t4?h9Q4Z~q@+=aB6=K$$C*>LLo zeTedqNZ*t9Xa`)ID}KmwC!tqjrheSKbp%3})6nxYG9LTS=%b))mX-2)r}Lg(a_svB z5!ZA+rPlpFz=Wbx4GrYJcHBJP0x?4 z8_>_)%{`7oz@+QGOw8F@RUPkTX=r6s#elsW3iH~Im-mlI@CLFrG1X+nY8?NnR*)~O z=3S=GVS3PkIc4=*O1}m;erb&$f-Qpt#3wHj|B?zXc2OS1B1Xb2=J2DJkKYoeztNi|K><47bbIGqOm zU19iIB=o%EyFLv3`=$C-HRT%@+b^{as><5GO85EJuvQ~JQU7THS;^7-P@P^hW#^d3 zN_C$gcDUAcX?o^1DqB->9u3hIJ#*H0aS`3u3ww#vPoV7KTTSimn|uEG{+|Bz_4JgQ z(&8>?6JQc#J|3uV0C*{AMY@*G;6c!aTxQ#*$|V^eUDT)|-J$NPU$^@WE#O1Su)l(R ztfp)Z&9sC#+Ds88VNo%oBx7wyAAD?7Ze`-ZZuihzh6MFjD zr97~LYaH9ZjH6!NtufqX%xlKl^KKi;QTLqxSbt@f@DwkSqcSvLcW zvxWI5U|oC<2{4YAa%ewZzi!Na%?%?p2gq7`bU)jwdUMkLAEmBdC#)*mjdAv`Hy0xZ zZXsO&&-FF%!^728L|E3(&(cS!e4@Mz(`8Y-U9A8vO?weNT@oELed5!w+_JUlq>wg6 zJ7jbrL1=#=FTCQ{#)FcpOmI*Azk&Z>>fABiT6Efi3CQt;OSRZ#-gxB)=YS2tqw~o7UC-LAfUyirF zcC%YjpdTxQ0!W+Qf9rSiHdL4yFGr2q;J@>r(pz14)pjMwP1OXtvg7YG5Cnz(EHy#f zC(Ek<lMTR%R*eS3eqWSu6bFE(GO9z$BE}fYpT+-Y zSV$OpQE#*Qz(c%0CjN0UjIT!ZfECV4YY!I35z)E*2GanVw#9^daf1}La-G-wr}da$Y-vtB>G*T)WyGxshp8}|VAoNBgP?2iG#{VCdYo0`0}F}6i9-I<+Qn7nb+&^g6$(wE^6)tm9R3H;mH#l#}1DcJzxH7eH zE&}#iF2`rf%~9f6rs~k9I|#sy;Wn@EiWOdH_YH5ZFqK+`cSFWmLh7G_xWX+XtNwG!t>*0(F$;0> zB3PNNu;ujBZrWTVlBbT9t>EiEU(;l2(s!NJz}HjJC9N?ho#DW2^5uTAMLW(}Z7+&l znc`R;#!J%Xxq7Qm%Z9PACfTW?-?plN{BI*jE8o{!SJXYOEQX((VrC`rAnnAm3ZQyK z;YV>f-nNs%#DNXNOjzV=hGWR`Q6`#W)ekbMiq#YN(b!iGOCt?m&CbgF&s>?I6jL^Y zw}(hMHdGc`*2dA+zLLxAO=-k)L(6zz5svcXe%&^y_;(soWG?G4SxOBU6gXK5fz?s| z66DyJ#8Cas#XYNy!f24c4Rd?1YN{>fmp3vS7L ztj{-kv<4g$d7;k*9OJN@6Q{BK&2V3t`w3J}IL%4XuVCog}fB=Z_m$Y)@f?=iM7u+a26 z`_1G193Jsl2`@&bypkPGWnaq+<$cx^KZxg@rBCDM9u4xRo}_2POBnP0l z@P;>-1@zT;kcHJNc0OaH){7Z3h*G|cZ|=Rc;JtsM4pFp~#E$JzD6|)W6HfS^{}~rb zmKODrN3&=XWcnAoza3+*u*O&a=v_OE~gC z#4&&s=(d}fiM)K3*c-u)0>d+t9Fk@PD3Of%LUJ1m__mpT1q~wT>V-&Nc3<p1Bg z{13??7}9Nzb;dznT8a=I(>dRBGpBpR_xU_)mi1KRB>N;N?5*u)>zYueM-DHXuO=LO z$5T;AT`rK;5&bf8b5xelXXK(^&)azrhz5T>;<&6G?msh(;j^+ln>F`nWpbLJ8%Ak9 z$unS2^|5pmbnxU|5t4eQ=J))%=9rv}LjUNv%OA*3@C93QQ#8n(e7VcNCGBo7KPeI} zPtTWP)Whxlv+eire16n;Wp|x#7@~nhN!sYJz%=a5qq;hjl(NDC8c!#O0K4s!D zRz=`mK$g~+HO68t6AGmV-6stK70ny&7%VVwC^LFCH}irfzyI0oP6DeTbxbHcl6|oL z)d3+qpU#viYq&-R%lI<8bN6tGk!`~i_I^`L?T{d8=ALnnS+s&MiBZdj-26 zTvkMw9zYZ=?!nsM<4q4%zGz7D+z%K%`yaYCdgI`^M|Bw*3D(PFAS{m*(A)y(;~f(c zPfISflEdLxta6L8ESXfbIKrDxq7apwN)WeZK#43Gn6xXN(5P{CJ(z&sIhT$t(q7Y(KqPGVL=GjSXCk5+cUQy6;R^=M3eywh!is))G z%5b7C%P^|{=Tp!glk1T>@PO*PFAV46F+4d|!hD*h6_@RbvHZbxUV zy2+NVwB%=kXzUY8LP?TGBzyjC~eq}4Hrt_${eI>kAuBj-+y6C#oRKWzfDm$S$`Nt~DoT5oydX)5qLc@7R z(;mZ@ex;M(JE$GL)i`&FBW|{}%;2P;r+w#-wn5|Dx2Nu%iDO!wdxq4ur5t9*pweBB zi{s3V=OTT)XLq-FH>l3w?kEkG)GeLl9X7rTpdJ<)KyXODl2N1aazLb{o{sRdg5u4w zTwI%;qgg~3O{(*8Pz}({)iX-17AWsgK0x0^@0?RPkO_naR&E&&o`|BK|Y-sBkgHn{Ci@L4a1z$c+FoWa%+)0+`oXnrnP4 zZy~{wrR1qdW|dI2EJcpu(LpRRK2&;2qAI<3KO`a3%tircEY2QMZ8CS2E)fizeR$TJ zIpAbCtV?_2ZK_!^^fE>xem_h|74>O!L`=)$lmz-CWsd{6-23mg>iuL@IR+j`72?mQ zC4T%>3seQpWocqy)>X69U_K3<-$YsYNy#;TV zKh9LSa7{7sj0VMgVHt-kNZooLmloayZcF&OpgBFD}To#&`+oAR%{aoV7DG@SwG63C>vj~>cV zK`iM}+AKx|0(W*l&5#&xV|$|xsoVlH4AgUqPTv%riwDXzhX&@OA4CtXmTC9q{P-Oa z@w99!!N02hYY!UF&$al^x%3^{iFID7N_Vu(if@hq=h}~02kj>&a<%I!x%Y#j$G&nQ zf8l4(VcwdRE^Dq-D&U(gC;DmI(kZ+w{bBrP;?R*$+^fPn(aM#HN$|6Y$)vw+RRzL* z1AVs823PgUgN{1lYE9eHZ?3cvUS>vFo542rbE0VTcB`F|B%%@}bDb@m$jR0_fv9DF z`wF_$vW|UX@_P?i{7hEA_;Z4a((Vz1mR+LiGif3gw}Uwv7YvtsAwc4jk^7_KiOX66 zAL&E9f8nt=dxnW@3m%|len+sSl;A@Z(yNT8EY3m2-9yFxu|mCJ9?7Pj?EKpD`jYTF zZYawKSeZ8vKM6F&UXe@DwEc3x8^bRFZ~8_wRFo+LRT) zD5*yzBEv8V4{s5NC}a;s`I*LL<}s;pr=d2R3XGHus-<)%??&>B@B0n@Es+)#59`NL z-#@aE?;mkaup4WYai0T@zVkn5BbO;v>-^?42kxmaO~f;RQJ;b*%p**))A<~_>%JIT zwNrvmPM2YRdgT=-J{czSXRnEy`Wo4W`+27vDsgh-pim1Qg|k-7=fn{9mx(x4#yvms z2a9CC5eT8*i8*EI%|&wJzdsQqvi7^*3KARS_JifSJ&cUihD|~9s?1sJmAf@^>6Bn? zA+igq)=14O#5R332(7&1>Y`;bVr2n7m`!x$%Ta!dWz%q;n^h=<_l3%~2bs zMo=^Qyrm)j;^<4e>i_J)gl6}0Yj{XrvXr^(Uw%Iar~N37M;1Ixb|`bPCx65Q9QE2J zD`?W}UfV8=CyYPo=Xez<3tHz1RVG_0&q>ASC?+Q^-JffC-9*v{ z?TC1-w^+sNL{botbEDdCEfSv^IaO=8pIpLE3v<~*ci|wKQLB2zFL{g8wy+nz%eVvQ zUB5MaIj5#oNRf4Cpv(c2IhRy5cTxR=Uj0yXFR?(of!`e4uo)>e^9yh1o#d&_3DCGm zt5!LE<7m~mC?ji=9lfw|eEDqZY2|c6b0o z>GN)@EAzr$qHI)~!YCgCe10x!Tf(=l7Fog5mq(mCCTmTTDK@{bET>Pb{#bB6?zxaq zOsS*q^zQn7^pSIzZcJg_2r$6DKOHXd(R*!}E;`YA%p#zCirhVFj7C%{Y^ue_LeBf_*K{~dLF zD#q70aopqz} zRe8z+J|eq8i#>4N-ov4w&&Jwe_h@LTPO!V`vSV`JK{~7IrO~=6|1a9!A-uEb-|~*_ zRBYQeE4FRhNyWC4itVIg+sQAsZQD-ge{bJ@x(Dy@ot(iw)BWu8-RrZ~I)5TFrfpa> zW2IxdYa5BSq>9N^>sZYKT4^WY94!|FQXZYNs$~hQ;crt?&}wxZ!&8xEX}#1f7`-zq z$&I=pZ6{h{UQ@0FWs8p#tl{goZmcST*^kyU=wmXf3Qy}rZ7$<}-Crh_zek{a4s@Me znBc(6{SFGb4LWvFvj-yUrhUF^h@nt@UG`5mKlFJTQ2iga!1~{8p+n4Ot{7DOzuCe+ zQii&Of_~CsVUYjL7I4hmS_vgUEq~ZTo;n|T>3^{WQ+Y#KxBtTyVt&{{YcyU=^#8Dh z;Hbp^umuK_8OH>d|6vQ0BJ74+bV!^(Y$4Ot=^%b=+K2Q%Y+-5Vzt}>I?rZkb1@kb% z&}Ij64@P(dy#~NPv{A8vj}Yae9%8JNQ;6EIeXH$@IBR%~Qy#cNgOlKZOe38ovo8pt zOJNg%2vFsBtKh&goWrUnx2c>ACZfk(Mvvu)sM4cYk1%hMI4GI9TPo0Flz|vG$lvkQ z%w?_X{&n3cyA{Qlo1LZ-;oWk#BEO9u3xcQ4Z%zuk2v8p9;5(a z=;9*F_z_}5ll-k*t%ML0y!)we7%x+_{9kk+*Zr|}e|$bn z4G|(MfO!nUAg~p_2tgwRQjB_On4L_E2!9POo>`C{21Zb92>rikAtn32(Zb*2|8KM) z2m1e_ggUcGLfb7COrCXZl=luSNfZ7FOTXXy5)DEd={T@J!(( zx8>B$wkW~&Bt~@Uo#vztxsfPEUlP!06qjdPcO}c%S>OL6OK`^`7C$mImf~R3i)2>i zz`LjCE}gEfVF39iuQdmA7uy_ zZrwLHqPKuo>G7C04J9Rz*RPB8Cb=0lYiY!LxQS@=&^At0w~WzM>|t{oN55EFv5ndM z&qLSp;tmle>nNwp!lsMeQjKN-AdO1%Y8`2=R-=Pu=bBg*tnfEf0r-{LLVfLBWrF0l zvy-lzK-v`j4&4)P9ljfsGf#M963j+s91c(tkHD$17{iyw{a%mnr_S@9@rlURTM1Xi z5AZ9Mal37oYy{_k{kS|mWYC8G3Y;oMYF zVc-WWi2VmF&`S806F+t~nhUKp5T;AHDha@}@_3;i+)g`cX_szF`7e))=6r9w=blJRrwK7EAcHy#Vr{%02T`YKc^msF*V z(IljoW)acBevC8yOr(@wCZp=%`&QIa>vi+nq4`2s-^agnjGL1!DgVDdSNP8sbbrMr zmu8hTiCd21Ts8{%7H;YA&IB>A@AH}fTseE3VG9NVAR(Bm>RuW9j5*U!xZ?8*?1aEW z%i5>3XvEtT~4O0i;~SK!m8N9;0OQmbS<;XFkMBNY#KuFDYPZ10Ef=OHgzP?Y~*He zb=LX>^0&?mCl%ZtmSJ(A?!11ut9%mv05VVMr^a3Gm7(_^bv*sHZuPa*q0Ptn>VZd_fK>w~_C*9m z1UkAvBwyT?;;Hnq_v&a09F%Iqu#~P-!Yt9^k1I}Xclf+mG;T*w{(t2stGK4M=PC;J zBoV{y(}#%gp}(Ev0IlUXJ4pLa%E&OLj7C+ptBRc3^-}fuB0_K3H&v-B@;KM!E<$5n z4{Z%tgMMxmi52r?V&2@^+8$QQLJ8aFYJ^~h480o-ZK*oB7c;r^wbRa!KtoA*&Z7`N zGjnLmGli@18f`4!;F>2%H=fTWrk z37chQEO9EIuG_eecmyL-I<2oF4r3~5OzMSBrVrg#mX%8a=jyeH`Dhc0|4x7&Xf+X? zR5+T^&qr`e>KO|r!pbXk*ibrzx+jLfjT@SMMizrOKpbsO7#7)?m-@$X>t@@d?DHHJ zak@i9N7T2|{y#C7-pTm9b&WAJpcPK0u2EdhtCwSEk!;>JMYLc0-?YE%axN7siyCx_ z*UHIAX%Z3xGkC}7ng|a3Ga1B`IXa7ljP#tSt=E7Xgl72SCKozu;W_OxkE3puD)E2S zk2(+xW5exIHUkhhvw|<+Yh#XE{PcQV(oMutbk^-bHNec?V&aQvcsBr#>VklUE*d9t z8yPAMOB)1347#wf%xYz(>V(r|BmUm=;a0(ld{2guz7^NG+l zfBgL5LZ6NyL$I&gfJA6f!JfglvxZ3D_Rv7o2XqZ3$(I0?0Kw>BbQCbh}&&l4S+z0fjc!*$2e9yXG}D zTsF0^^1rhlCFJ&KBC4pniuPqQ)A_?98W9(81Eh6II6Yzak-mNH*+>E~?{wQB1oJXi7;MpfgvV~0j3aRm@!(jf~ zs<6U|`+kqTNG67%Y9`ufXdI+9QUP8IO(9+!iIA-X&eCI6Jx#bRUuQM^lkYGj&(1v= zP~t6chRD%3796GUuaLVK3$`J~*d5D$0c4PjGA=~?ZnQY|pz)s-CUEH9KUnTW5^9H|YABBYqfHtmE zm0(7Oqsk+J{aTQdID9)0pH$x=smy`bUS0UI^Ln3L|Cc)5+%k%mlOgr094rrWY4g!) z4WvTRTIleSlpC)(@+{~=b$06P`y(AYGu?3s6{X|nv&+nbhe1|}Vq+~y1_mEm!jNMJ z1PtE>4u%?db-XMD)g?SG4bT+~i4V?CHX^XjpP*eZSGXlurJNP@vR2|}QZAvn8X?_I z<;aVaWyjFKmM<6#wkGcckquL2%Ta5D_&7Ac@j#5`F{R0KD#-~sc3SoZ9Nnoiyy>I^ zr|i^mZzkVpV!4hPQLvR-<<&bT% zKg4B|-Y^UPmmTBPZ)29SG`E=5zrXJnBJ@i+Rro5x(RyNR( z$5gHoL0O++)qxeh{$`-<2o*iGlqDDvE;Fe0wm-014rjB`+vVd34-9!$1Ll1|FeXnd zMkbst%Uc(;kh1QcVGc0ronh8TjlS0}y%EQ&v)ev!k zq^{As8gwEE(x^b8RN{jLGN;@As&LMu%h=UXDufj7Hs3;AIGRkk3BAB?%O!Fa;p^M7 z$dBNre%%J-zvEieCw0Wkp5x)+cP(kA4;~0T$ zfsLlUQ>G=XfaNnF3%sI|YIJs_XDff_E4M+w*k!*cyD%raB^Li2>GoH=`MWQt+Nj>$ z%21kH@i!OL`Qh^kBc~JTbK$Ueym=NcysyG{ER6A-`NObSQS6x{H)#IQWQe^*5A3R?{%+e+~oU097yrpagfh!3a z9eqsooNR>9XO8?@ZsH$v&(U~Hj(8gXb$D?T#h~AB@m{zu7+w4;V?b+{nt>R)@cNU- zn!eGMt{dL6SNLaek(ZAfX|fD8)g0{P5iBVUycVW2PT!0Ou;17N!l9xWVtjnmrc7+~ zDl~P>Y2_4Vjq`S{SBC&|PzAJ+T5$b)CotCUC4#>)x)X$yDyYrs zjJ|MkCLumvJ&E6o_Rs~bMxZ@N;~ww*BIQBDhnz)fr)f3#8%>0?mUpt22?QDG5pDXJ zF-;iv9ax)?y7|Ux91cTvUYEQ!7?NZ%Pl~eEhG){KTT(IwlqX@B%dRajs3uj;yvuDbK!j`7*aLDk_%zAwwB+vc7M1O7K+# zGF>w5>$Kt`@_Z{=`%Qsry@LIsUHwcW-_PDZgo{{)PE5zd1BJ2xt6$6)-QDd*^7ZcawJH^a!28fO$k zenhUMwB)YN`fw5DZ-{r!B+_Jv2?VL?yk>g!{G$11v^j90hB~zgJ?x{2ngdN~&M{E3 zPCQXb4*7Rq9=^<3spuo-LM#>)cf+P71j$n)1T$GicSTA~#jbkkrgT&Jm-0Qx$&aO= zS5DwVrB}UPPENST2>6zNXtlm+f}e@~|MnAnBTYlF0MCn)rKlpJ^vavA84gIAZPO+= z(!X~aAZI9T%r~)!Fq%v+gDR-+j+VqZ%20Q7E^90;dvZ++2&=-4d03R6LdSi~%Wdbt z*L6BkHep#s#cnOxkR-1_&@@1wt%F2>13I5lt6mqE-$c#1ti4t<^qNx`dO}lkF?AEf zDh4~Dg=&0BZLwUlla=AkjKNhM9%%Ld#Ei#gRGpM*6q6X8JF!+CNNBjJZ|y*7To&p# z#d)LQUAf&Ml9`IDUn9*ed%u*0o9tVKMc?VNABIInBB1_Nw7*0^_9>HFOAHFtOyr;I z>n{~h&=CE*SE&3dUJ@B6MWzchBwk337s1@Vh@Is!DkqN8g@*5A<#JHIS02w@Dl`_y z{ukepnrAHeF~Ov_(h5X6miq7HA;DR=(q^G#T%R|Yc>GwW^{JrlEHVjdRMmsTth!G! zrR)lbt8R{+X1hkSc+gm!t;%J=)odP&rjVItRbuhn!HGP0Xr#1Uk4B2Xo-z@`GopJV zg+NT{oJ!>j)HFB#re>lr4PQY+thjSZ(eyrk->Z|jy_$nXi=CN6$+%6yd@8@Na*j_u zg1Bjp1w0y;{h_#_T2FBG*@$!q*<)R7J8il98G)r{OChZ^O5Rt(-zJ`ldQ$KM7@c#8 zF$|u_`YYJ6BwVWUF5gCRag>EW3n5iwvmr3z!u2x4(lI22WFPu&lzj^yb*D<6$%R?8 zrs5na#Zq{-GY1l4w!7VtkCz08Cqr-eZIqELf47Nn)EVU0HHgWKJ}fYN?k}C+La%+j z2A(7BUQ*`z5B6XC9hp9G?-0Erx-ME=LO9GRZtHW$ktsDhvl@YfhFMJXX%(N+e+)Zl-1dZq76L7=QgOAvXdbuz2`~7h_*qOKwZ;huL{) zV>ybQfJlR0iIiD;eaq(pLImDC($n*Vq_u*i_43gKRYlf&YkNoK`_r^o00ZZ*tC4J( z)Z;Y_>@qqnSl$u@+vL6O7DTtAOeaBPbT3(W{{(M^Jis|nXpv4RQCbI__&HVzqn{v~p4@Fu5DlmA3wp%l0bsueawWHMOJ;f( zET@0Mly2qRRafkzd^-Wy_5MC?;2>DVKtuHbF~yia!I zj?+qe3AVBOgr`-YWVlA6c`BU{Gmdj;`QrpK-U^a8l+F_hacq7VGB*VKA1f3fP0M^r~Sc;gTzAlns_* zo_!AgCGLo5(~Fkp++RefZx0k?TRiMOs#I@aV$4&NY1M4t_HIxbAqhfKNm5dl1mO_d zuAx9KM4RPM^4KzSGu>%KjcX&6LO$r+J(ssH`4z{{Dnyi4AY#tqo1gIkZf(GQJDMy< z><1i7Xp(fZtig(>UxPC{gwCCrsH*JH+UrP$AK579twa($rXBS zpFekTZ`r!`UFjFt&6Rru76xFKe1|uAVoOmR5Tu){Dq|2RgGx|C^Ou?^j|<4Etw{Yt zGmz%*JderklF#wG*6jTU69#vk9o9NF7!{q&Pz50Ed)Fo%Wh4bvq~}@)D5?21VWUm~ zf^inrr-G;t)$VP0ady@|uHwysK4fP$BuTO~ ziBP2N3d7R7r#{C2@)kC?=<)9#&a`E*=jA8DQO2xF2m6s*8K3qBmR*0e>OQJ1==}Le z_b5F4F<0p!y1skM!Jmx7)d2VgFRph+)GV##aY~4j6R)vxO8OQ2?wyshELDSCA=-9d zVgOUw7RDdDxkdP|4<-8%9f9<A}(gLiGG z*tDsrF82b*QNCY^`zd@f6+mj8D+N!h%9=8_#ZUN=G3L@)hJTA`mAkvb3TF9!k!2A2 z0RL7)raio->#+{pPpwW7nn%+6w^CpKm1wJmkvx8TpdOCD04vRk0DTZv5>4b!rkP(o z-V^b!$Mx3lZ}r8}(02QaHiqB%p1tlzRn*UF3%xIVIB3Z;+Z9I*+#YCb))AQ-n>^!sva zDwa|XYQ9+o1N~wct;8Wz#y6mZ{**=t_K63T{$khPKw$1XcWcKxZT#X~dhe%!bzEmp z&qD-dudH~rY{y>D=*t-MMtE&%U%p^gU}UDUN&bsU(G!5hbVa;JLOp=+NnSiMD&_R! zHHzS3GtdV+(YNO{|E9x-xL+r=z^(gKNv!pb`zxrz8)(Ox1m2E14ZJpm@Tbn96yZTu zZ>3h#M?3(vpK>;iJ)&fFXxBnn_yWi8er9#gF1r(g@vEGt?@gnt$Ey*Rj+nquw6>77 zab1ZeLOl$c7g|pQd$*}vxl_m)l@?{@)s9p1<7pif7Q5Co;Jh=5X2EcR0rtJ)7~_n4 z>hfy*#cs;>aAt4neh?znyA+k|5@6cpAeAuL%A)dEdzAP5QU&>hT&VPBZ|mEf2vxSq zPlRWXiZE4saVFX=TNtSR&P63}WcH;1#d^TWP$7`$Wzf097NOpZ_&{auInp|Ipjt99 z{*U~l*e%Is3}Eo%vJdhFuh`kR)_uTjxEg5_VILYIX&7R4I#!m_fn)-aTi^3$33%&l zKhZNTf=kT952pA#k9~SKD~h(t+zt2(&cP9NH2@B!%a)_ETpL^)`IijgHD6~U{CFEw zPE7_t9}$5tJsvDyfc5G;4jQ@Jq=YI)iFwQgyKBJuDDZ~q^vb%hVT5GbNSA*t z7d};5r>+({CAW~9Y6Jd`dA2AwAD~n=eF2EGK(U8-;={ht2{&>?q{Pk{gD;JLf_V^(ueqTOyga)AG@4E(mGxH-Y51!wbW13D2HWCSkJBa{m@1k2FLxZ$;7t<)d6o_GjST)mlje4%7l|0pKdaWC zOo48?eU9dg9jJxzp+ypQ5DxiB%Dz8^XkT!x@nkN0t|bLs_fEAt)N;1`AEn1D_IyF6 zcLT#=7Tu?Ye&19>WJB}m@vGWlwkpti;|V)myKGeTPY+@udbY-??992@Z}ry)y`hx9 zi>WpZ?JI-(roU^bpK9+aPe9~qt=su=T6wkA&CkzlbhE4eHMqJqS5GZ1uC{Y)s~>Y5 zoPC_>X4!h4a3tfmPm}`KFdy$qmZnhKg0~GvA7-9Nwu?dmwX%plcMmhWkvgolo@L4W zlMqJLSq%chfhUZ`$0He};byl+Rb#rD6;`&IUvH?Q%D6VcO6&3!T1Riv|6DR3vZ^Oo z!e;0JPYVc%SJkQ>txF^JWZv=6%f@ai<%of$Ev~Cw#;0<%YRnR&)x%Kblf#s%(%V|> z!#9fcOrhIS?86SPHgNZAl4>b239vmsuQ!#;J^wzd)ildo4!VcmGVV*XpZsNp3jjK?^;V#U5>T+1HfsBO^j6`zF==+55> z`xB+W@RBfdtJ)c8ZT`YgH^G4QG16-tL|}WfKMp2P+mUeXXC;vGs`6=HrE7qQxkob>G=a-TG%mj=cWt{>En+24F``5`5r$V3+ zGQ!S~!+9o^kr4q*D)FQ6n0lv)oVE$b>`jGR<5bQCM*wXY<=ta(@XX2uT%R39VF-`u zwqDOrP3}6Wi+LJEL_1W&;ZGL|qxM)GXxM$Hh!7MewD6OnCj+n^bj*@`9BKT(fz)>n z?+fh3(=cSXiyUre3ervthT*|cKmg+X$X9)7zPyvw1%W??8Z8tX@ z#7ztjs1x{wX6k30ZQh@_qs!(Mx?CN73J!xCXX#6JWu9(7|IIZvJ=rm(1J1itR*?Mz z@&nX<2*PAlLrhe`3uV^_N8R|`s;j7*cT_ca7upZc+Vl}ilg9|C+w_BqNGmQQ7 znC*_+$~AHELcaFpFipJP$|rHubB`Td&7gtX*&74De@CR21E0>G&`{;^%49=xZZr z*q|6)s7eA2d0)H)RM6emqq;g4QMV)~_>cdRF8O_wP_>_B%?$jcpstWfZrVnI;(83) zD zTB|E>m92;VUJBSPz74rG>|7ZErSgzbtftk4clMrgc!N@2y*3L&|6UbO1<*7G&fUbr z>gP}IQhZzhDOzjl?x5sp>3jGBL3^6S#UY+pSl~U!i7n;u@z#p% z-{u_3Jh^8Vj&2EkJM;uVzma55DYGAwMMsq#_pe>-D@0CC_Uwv|Y}MQ%f6R*uAZ8MM zh+j1vtUuo%$^kiTZY#{{uwY93dEHO<{9v#l>HE5<2*bTBXlJBYcBHtolq0bBepR=` zD5=QbqgKrP{pkzn;Q}Gp6S)1n&Kk_4NqawRSP9@3=IIub!?_?pbkme{UY@-s*pbBK zlX=xyBl(UU#%WT$%^RjGi{IX5Ch<^a7UyUR5u3)g_uqnVOQ$db$hZ9yYGs+rNir`p z#idu@z(aOR-$PzZ?-1et<`T6J^&jLV>hfFrb9==@zoe7a_D+m|5601a{Dsb=U~|kc zlan9JA_P*ow2!36E1}X}2@(k&4LJX?8LP#VidTETMlE)PcMBlo%cT5 zm*lNtAQMN^B1x||tpEW~&pc5D*g!`}2Z_bYp+_eCtHJf!wn~E^0DPiPlm~l=u1eK# z?S8zg*|>6*5e*&om$SDCuDq)P%_lj|y!f$Caj_JjOKviy$|ZD~EM%Z4w9nAB?qk*k zdfkyN?NLAjR#^m7zXTkDF-YKHmLycuARi*55dE?t7{h!@E8+`)3lbKZAj852_V>SL zu;CG(D!VoZx?Nprk2O%eK#aF>2-c_iq{Q)^n+;n(*t+R{e?X-@de~1lKZT)MU0z;a z_7OX>);)<2)cH6F;(4{U2oDaOiTfJNN&Ese3niqk_e_745~RZ0<1cm*eeYNb$H&$3 zN+Mb3c8h&q+OqIw69CE!a=e3zH_`N|~{cEaeY zRx$de0!7g)Ww`w;lIg|BJIvXipqpqfDk}yP`H19K2Y%gD=&A?Q67Vo6s4K240rTgR z6D8=k-`O;Q)ha8NiA@?4y6P<-+OM&2e_{9#2rNEAc5(W?VDn$iyULNvwl|w(Po!kR z_Gr{{5wgg5NaAcp`d`lA2))ueWvz$FDR#&;UBzNTVx$@y{LB*G!tJi{N|>7&{ZPd4 zcd@7_cfN_#Bljdu$D#C$`N_^9An!VKTp@L{guwU54uiIHqM*x2#43w681~n7eQ?qsRz}6W+MA z;Lf~_hBbeq>N2*mwmxpDB6vukcp;6qmqnStFPxC4HtWtA9)w7(=ms(qfrD>?Z%|nO z7BB#k(&AZo)<5qiI@>Le+cH3c!f3P5&i^3b=qZ@pI z_D1xeg}UuIgO^gR!HkB4S@M+4_|Mac&h@*<1L{{HMd(x#ZWaWsmHh9fxmCIan| zUs3Y*RLP)J2l(yNgT4&$jMkU+70_Ch;~A@K|7t#y?_VInC|J30{G4kuFqk?QQp-U6 z->DN28njqcBz8?iCdVtQg&j}5*mzewOIx!B1W&qN3*5Xbd@I)k7uQ$pFhqc8p`i>s z0CEzO2;+!;kC)sWL7*73Rjxy~?_eCKek9tj83O``ZaKgH*9^ZwtgobJEb~oNZcx*g z1RpM3K%P-FbZVPJTUyUH+$RuqWyc1Mjz(1vmT>ztrpRZ`_FJ*LdtywO6KOFGuk*cp z9GUMoX#2vew=I*oSaS~lwMFOX4ekBdsGLeKLFUDKaCEwZ}~ z>lFClVC$(=(sdADGnjG^xQ^BE6nO5lUWol^cFe0xkGjH+`zUUu80X+}&aBonHky=0 zR8`K#iz+h=osV;zSq)OJmX2^=a3dvRWSY-8W#73l^AHnw#8~u5V|MmaC;Yq*gU|p*wx0Z>Rx+3Lp|m;_ZBaWAWk;@9 z@AE?wUNOxyLDPRi-=o{Ld;$=^KU47NkqH4tW=K;t)u@}1_*kumJuPwZe&)?S?F}>n z^`$hY$E_R_*GIqb>eKBYe4GWGai9nhK%-|M{o$h^xi+%>rp`awj;9Sm2cu7*9-JX6 zNRSkc!8Vmi1@Ku8*2e>zrOa=aV(8EQH z`Vf`)>35BS^FGWM{<7cP!QTr9Lji1|lp8uqfR_WTWH;r1<#fy^e5Yqkulxjx>%h;z z1(xO6#i`wCQPG0+F*|W#DFW+lWy(qlJx?=e;8!OD+>*_${>}T_64t;U&|!^`_)SP` zdH7w2$GXK;ee!W103a^+jRDxRyI&6WPOa+#*p8zA9ulF58WTEe7LhwWb7`J~c2HEh zCi8rg_^p$+Zq3$?ujW#nDv!kBih+1tYs)e>jY<2%KKHu@zVdA^SMz|LhQmax8+m|M zuh;hrKMMzfzUt-`p6*S*&XIykp$MuS3VLi*9BN`s4!i1ubxR zE#qzyGTsqTzm&gUAHR1!9FIS}s4poYk63iuzRxW;KZvyw89V==d2R%jOWE&{6KTvi z&bEupHiX#&#m);tvq#fbR?MXAIO2>9F@WR1)K3CJud599>)mV?7yUP`;@J=|jz}2; z)&`gaxDYWKK}N6N-cDBUPp9V|WZCV~m^?mDx^)9)u?6@`@E~~$q3Mk1)~|ntTc)zN zo$FnfmKb*2iA|`Sb%eMbAV+`wf{I#e2arsbcM*k#J-Y@ShUk#?Iu8T)ufV=G`fyBU z{Nl^L^uM0JBY06~rTsaEw>#H3!6Z2 znv&)A)s#Jl{);>DS22(eD^72p`Ar-dxZ2_!;;7c{POMy<*q6`GkUHKLe#bNy~d+i6fq;5QdWin%rx9tXBa^-E2h< z2G_m#>n;nVkguSNh*6%qt(!DP#y7%k#>~46&HW&7P z(o;MhAsD_5$RCN~yJ`#<-LM9D- z?Sv~?Gh#(obqQ_PiS6%4u<Q z$wWV+mWeOfW#qg5`wy8A+BDQlwfBsd+9r;WSWi9pR4^z|YSqhsoi>9;Jm-Nv1W~VY zb9zc`aWpo$Sy!y#EhM6!zn*LinJ}x2$onZRRp5wZ$3Q4OzAKlAp2=8H7`q^yQ~pHp z^o1zA55v@a)bW`j6iG3*zf5Q1bu$PCkC^G&?W@xk@->=9(iWe&uc|{Wio_~by37vU zhHg>GLwkWX4l{H{JYOV$`0G2e#HYcc&$Q}XMQYWo!>MNH73sak)>2{P;~vN-Y!T;> zd@Zm_j-A}D*o3fBXHX*m7}be86={{Y%wMOresS=4CB|DfNd4}=dlSQJ2S1L#d*C2YjscZ*1vV`poJ3?_bgc1vJpmP9?$cUuddNNG z)cR8*c_DFlq02#=N5J42*b5{eo5V%eKco9n5miHG*BdqufuKgfxkEr2#TD$F!0nn$ zAWztu5EU^ehPK32;m|68ADcZo- zbiJK=>{lz1!>QLG$i4mfC(H@K6?fs+ZO)>=7U0?s|G8>*cc+&d^BVtx;F16iVelCG zEJA|ZM3EfMR${LmUUFgf?)+Dx$LlNPX{t7Xvgo~43v#%U&KNP$9~IxBZm~~9irVi= z%YeER0%_bg4T?*z1&U@%oqe|Vv!@VvoE~8$$1e8D*+I*#P`0(&VFKpLS+uvRe^f-P zDxuu0WGZ}Xb;Akp_kSV*k)%+7PwuRLlw8|4q>2c>cM`s9vd;T@$3yJ+ut}_JC~1dA zNn+%&jp3~j7La}y_2a`J+@KFgobZKm62Sn0O-(ZK*Cfo5i{86b_5^1gD}fO%ResLu zjJk5S_;yXJ2r8nYobyRAqCaIFBTjR%9_C^XCV-{<=||4i9C!QQ>esTkVBQXRbU@1=hpwX*I}R)|@<0$rVufz&B_+){mFC{oJ5cw1RW?(VJUl{<~*JkMnb?(E=(qzE!X zc9yoDL;705-c3`2nB^yx5K=jJMz5xZc_0|^d)iDN9pRa5;>tSl4aqNHJCprw>W{WB z>-~+Y?HSa`7wD6U1#VLE>d=)T8KjCExExmfbb>#~RW~323{3L=13Q!#7=;R?GT7)U zzP{<(iJ4+nk>kkUS~YReq$KJ$g9gyAG9j1cd=vQrf}uc}z9U%6q-WB5I_86L^2YK)vGO)*E%|UwmWq*I8lz#=XID5r4|Ls8=`~;*^o9wp z_xCel*iwkuv)hg#CD3&%dZu;icseE|cymeGkts=)4kC%}$avnbM&n&_-S6DaL~ zj+B^MXF}j<6DQKJG8b;1o!sBP2<`l$bh#x3-Gn!;AT_B+dM6%|Bd)Wg95T4t_?t4_ zZ7NSgIAp;abyD;eNIZcRCkgg6BrY#yT!H(2irZW(O|eg*UQ1hjH$OMSOXcyBq@cdr zzM}1IK9e5-xBhIQfZf=_M~S;TBs!mdje%tYxxmKp)^QNwl1*xOwr`8RLs4s*uHdt; zcgwYGkpTZ%TfxvEzyw!&|MrT1Wcq8@w~%438ITVTq}E%uEqtZe!d>V)OIzIa7tBy= zTI*bMVA=Xu^It~mBcu$e7fR{=Sbb;fdX-o#c4^~8Czk_xDamO%f>3B3*G=e~|+#{9?@KWpgPG-@d}u=q7wFaI_DE z#53C_pb>lQb@NmhyL}|)h+)c#tb1qV{sh;ZBb{8zGZp>U=X36tX!V6+n)d^RQ$^Cv1gDA^?+$_-2Rm>{+*e8XU!<+e%jH_P z@dOs@P*w9j{*PpuF}R8<*7jI=2!7zRO1+u^97uPV121F+*37f8_PI6MXVnu59=o>=V)UeD3=v7}FMJ zPx3?{TDd*({X5s4N1$S;&%8%bhzzRkEshE^hFsZr`Fw7zPs!v?`r$kh6$sEWX$OLB-FAA-v#7@Fdjh$y-pXBC>=_olddrnJJ?J#cx>r0J zmU3-}O4>YicBlVJ+r<-t!uK!4%56s1-{nT7kp1?WQp4&OPiB{KOAegT zGlM9!Yz9+NHH>-~A)QkH0{VgRR7U8q>0c#OSiIvmMTTQQPH540d(8=m#Ub)@b#t)5 zqqGGnpVMzI?E7B9%*A}JGt<+u;{(c)gLC8P5i)?yI0=toWI*}7hXXD~f3B*I=RN{x zjL1G$%csgDjji}%^LB5q2u}veJXwSl&IsVyeLcptizIi1pvs^Z=M&Uwu_|z@6dne~ zF%|Z`2aa%Wm(jfQijZ^~fieWdZxD==Ic% zO#TE7-b)|eMN(phlmIwNtjuq5?u*woCtcqUoBVV&CiEBR=vkX=INTAAkG#A}0n`tZc_{tMraZ&HpXJ zvf-4xEFy2JH3)>7)yREUQmu-L43~b`y!JskP9Ty%mO*N|(gntS4`RK0*w#+|EhEw4 zu`#QgRj+Km+He52A2Ls<UFyHG+j7E#@lA!>Rn>z%9o7Yipw4VwF1cc(Hr_&oPX%>jFk0UO0oInGO^yrm@P ze93alt4Hr=nQBW)E)~tX%&ixpn0*r5pwWdtXFJhgI@o=2e&=Y~tuP3tLeN?>>zSvu z{L1Nr9eH~GK#o81A8qO1_58Ah&&d0LpYlBoFZW|Fo@Ef%K#_xcqhP@Yq3}cG+U)(S z_gQTE6GxpzioMejyKckqU`8f>MF}?#y5azwc#>Q;pT}W)axbl?BowRLUHr`1sZ@k~ zEiw40IJNqe3*6YC%%ZNCoRXl7ky2NakOZ}&z}B@Dw}wsk_!Dm1d6Xg5c;@1drep!R z1~>j6O=%sPSX@`z`mo=KDeaEA0EV=j-_U{@d_xyQ?>k zHkHEn>Gu)iSjr74l99_PX%_hgRyLLhjQKKp^`iQ6o_`|9q(NUn`9sb?fXJ z#Wax}#T1ojkxeb1AprH+J{ipc$aKWJ##HQwZnRy?3{~KEm9u|}PiS%tB?b)qNfa|y zyr(+00*J zR?!|e@xN_ax#>bAGJ{}DzlF3F_#Qzho)0gF7jJ#vD4>Y#n{|#icb>oW(ob}L1{>Ey z=`;I3KGRn)G7^NqKnx^EqGHTOqD-l_wQ4czg@1Qs&@ZsYFUh(=$O~z086WRMWJXl3x^k8(y<#>SRG z3B>cad`iO4$;a(8eaJw>sFel0g}be0L4|k-$#9MjR-jRWeKsZ?R#jcIM9HP2`ptR3 zK|Z@E!$V$iC>)%Fx+M`KODS||tphbTJE|yEI*!@G1KqX{@a}-Rf6zqw@!k2A0h+Ek z{nb4)?9urF=Bs66k&$P2@{8wbshN@V#Rar=BXTDO)UbmrT&Jmp;iGhCM^`*OS^ft` zWOZjJTwgskAcx$}nC)xz)lz1;9o=RLV_-C3na9JVCsT)IC0WKcBy+n7*K)pZiFTfl+O$WKZ01!)A_3pKZqb(sJ$WN26}2 zQDmFlwlu>0-w@4553oa#v>$tIo+ZC`l9*=18~CIy84EVbx-eFK_@=g(!+6yvNPR|b z#vrj65idc%nZJnElf|lLZ>(Hjw#m>W>Rf=c`Zo<%;HJ1&-$hr8tMJ@uc;@*MK-Bu% z4)3hN8aWZpIWN!;78-0mL7R=r8j!@Pf*4wYDupnM`$)w$87p_< z1S0dXuvQr&CVKiS8Rd;oe&$YJflN_*`4^_^;_GSOL(2J!!qiZW!trhx;|j!n{Om|d zaui+vnH1sHMT6loO4k14it8e#j=+SV-`13&eKcd7$=qo`5;%G#Zi+{{qak1pJE+7? zQe;z_{bJGd*^FlM6mtoK5=^W@%#b~XUw8@K5K0y=eQk4Vrg4h~tgyR(0;qTkez6+{ zw@LrjLv$L8V1PjN{WdgWgNG8Hd`jJAzNvYjY&S8IU`1F-xX#sSAY$-fpU>S=U>Ozw zTuhtP=h2Bj@56r6N)7F5tvSNfPmcifF4YmZUrf@HY#S1YXr+;c-yDqIsEq_xuY|{j zq(lhQ-_eqyAy_|aM77E!*(XZ*(3Wjg&QN}n@#H79RQdPLqB3khSDkoMYW<1@CK8y@ zHP|Nhv;|F2uI}dwS6H_U0O^-x&OozG623lKyiojK0HHu$zjB}{x2|BoA{O&D<$w@t z$@evx1disFg4u(1p-I*y?P|cCG*#M#Cp%+A%@( z9kjCu6iArqrzgns!#GW6>|9E&CR9j9;gU#d#uIpO@cgI%P^gR)v3+H&ezG;NaD4Gk zziy9Dj&;q$+ry{!IkB(6@gq($ElY=gw&laW@<4e4suyE{{)fqEgtWILe3Dk*K9HEG z{(!L~NT~eyJuuxB0crd9$=39Z1qscMOd(PIQ|Yg645RD8JI2Jmn?u}0n;-1tRnj5; zy+K|@@8?1ev~`6q3;Hc2d}<$lf+r~GEATdf|JqtE!<0nd@8q9QSuhVkvtbU-_y&C|@KVu>gC`jS78rn`g!1{b*Bdl*1Pc+dx5;sU+jCC6R;3rgu0od8oaC?&dx>a_U*aN8G zEw$r1$|$+VlsJ33UocM5#O=`>$l)B>_- z+?0lK!H~d-(}OkW?COCW$?~1RmNYLOlu-m|xP)2~%j0<7m64P&zbNdx?46MV2o9Q_ zvsXuGX^^}7b+6WAM`vj&wHc+}_7Ze^4W=OrKCTJ zK!5<=ZPqudj-K7Y%l!b5LJv076=W&oRn!0 zau4sk4l92+i&Zcs*l5GXM&$@8$kC(t_fdF6Sn!}AOh+28D}~j3^_5D^pbj9nspHSx zT}Q{L3B`A$4!ImU_1#^&_1(yvx!S;%Zhu&hTFtf>4(koC1tBi|ey8iTYjuCn9(Me& zMuKx@#BBw*Ie81ExnvH^QGSf$H zv~HtU@KvMTFB-2?YZdjXH){P((TJ^j;gE7R%XjU1uT}J2x7+RT??CyEDmm^W!Ikpm z4MR9ON04^E)$0s`ffo+?eXrFVFa+s_f#-LcgGRUR_v>MO2?Q}r&G=s24u~O zMx!63(MmIP!La17pszuG`Bb8p;Dw@~06{t%DBYkb3gCZz;3V@D2p%}5#zC~gME2$@O0rK2GO9_84kMMFzhnW z8CmoETF9i}IwNAiAgl$Q&aE!uS!Mtzs?ldz+`-cq&xpNEqSr*!_~7zI!A5hQon1^9 zZb1+-hS#bOy(!8 zp~~wBNahbWI6t}3Ai_GsBw*q$lrvvcgab#k$yTd{`SxeXcI8{B$e>Bh=wONUYTcDo z0*X@2!PH^zA@HV|_$Y_VIwo)u*2jic?BOvO+1Q7ZYn0}J4*ni;nnh>+M4H-$2?!DJ zS0LOE(tNd-L#!ag3$JsBF*1AM(9RFXFTq|I!7mQD@u88@=a>SWu7rahdKyX4S$p_< zZ|;PL;RQOh!b~TiOaa3ff9%k-=BH&~c$SRgDHfEM&~ToC5IF)E1`P`J*f9|PQg{rS zD=`JR`&jveLBnu_4eh5HY}$|~5dO|PiV7nI{TTS8YfQ%veNyh(r+WT|(J+Q|b=>85 z@#>VV0D$32YezugPz?3hYb+l7Q~vIIJZZ6d!mS81+`X0h1@Y2O&Vep<7Bxf-mk*n2Vh5fJ<)qEzeciSP8+#7ALKWs%_ zw^Qr1>z#J37A>QqU_$IO#)&GnB*80HwABf_}28;fAoWN^Iw=) z^QA9~Z;H%ZbE>1`MaT~#N=P#-)TUdYXenP{Tf7VBIM-cRcrYLbMHvQqdvv!^+7A}yIv!RYF?{e?|6fL6nbIPZ`WJlpxJJPOJFnYS}`&M zv1155nuW-lM;P{@#{tpDJl5y7Lw$5uI++FR zWDC>Nq9p130wN6bh31hr>u`7Id8Z1<_R69UH~4)6{MMD>AQ^0LfbC{S z;F`}T*YZ4bO)%X2qcPV;>27-$xvKbY3IRIygAafr3zSLcKjl>Mbppu}XKYihnG~JZ zk%BUsDi&kGV$jzuE>}z{Eb(~2he@2$Q~07-W3DR9?=HY=VL~2*v)wcyPqV()ri?tU zWwO`F)E}*6p8j65cp8k;%T3d$+vmCT*#=B$w+CoZa2GAIS-bpDH2J|exnL*6PecWv zUa(LV0QMOD8p9bYKv6pPk!0;REM{|S3jD{Q&m8-FZ`_rr?DJ_>W!-O8RiNre6{DEQ z*&sBySoC`Ww_DT4exC|`z4}TgKO)8gVF6&7nEJsx#uej0xB@xnewt}kTp&hQ=Zq); ze_=pT(*y~+HeXJkj;ULLp#gbv^EI)nsx6wiZ=NAtl`ew^PuCU}$t{c;Gx&}ez>TCZRCo2`0#xTIp~=|-`1i?^jD;xBcn%HEcZHcDut*5zii zaVW7^@HY-68;6pOL&-GSIFxK0N;VE98;6o5c1ESV%V=gcmbg2A5G*I@+bnSiOgTH; z(~TW&V~1O>9S#iy3oUSWXyMveJ~oz*Ra!n;>$7X{urLh_yKP}j`VJ9`2RLCo?8s`K z7FsuM3nVld3n@w>B@ikni*2?5w2_NGBf02yBpBk!=7(|&$^5d~4rUn>rLn>X0oCuC z56&yg0GJQI>5MJF3bQZR?U|4dH1JDnNu;)6To637wt0DMZkTqNxWo5~On0SkXh>Hy zYlxSX1EUDpB`>YXY`!1I3|*yak3HDLIt$p(eYy41c&;>yYALbaL-pq7e3)pxIH=~q z1mprTu+QyncfUdjVS)FPKbt089>OHxPp~<)gG7=rOqYF|r~_R1AL5JI#Rf1F(ZG@W*>Ahv)#!v$&p!lU#045a`N^35< zua{6-9AOt$f-JiCt1I5TxqDy6-Mb^P$9i{N0Zr}_BZ$k~U;XB)0?=Jw;!?W4viJIS zx%RqMdr@ffP$2VHJ{w?8yT?u=PROVavaPgVXNBzWbN11-VZAGGIh6{wMaNMTDE*lp z2kIY%y47+bBY!py&hfpXE7%sCh;Tkyd>|`2k7iEXrD$IzVb_}Uq_lIG226uT)mC!# zBu4cxrbWAOYuHo?J-*5k>YgS3h;u)%R^y+fe~jj;P9nYSyc~@k~2+1 z4kHuUwGNGTZ}jv@GDEg8o&$vg2FV9!Ftaqar%?s`#j+vtOD3qmE^ELY+l>w2xOIK$ zr)UZ=4HQ?&cx$TZ^l3lTh56{9#aKD}kS)<+Sa+UaW>m1My`$D3W@*rT^_BA)GU6#8 zJ!NO=%*PkXqGI ze+1Vb)25S(Ot)6&5#bQzW}a~hwxoFrP<}#TF2b=c{Be9a8<8D%nIWGrNH3B}r1xQn zd!BP2#UmhJJD1_tkb%G&fIv9M)$~+|tLCBUagBgcGSS{`930Mo4qHAKfMxh24Nw$E ziIgJrKZ~kzYRqbeGSiX;A_utRB61QR zZ~dJO588Pzgg_59B+-a8^ymi?$mc0ed>)N1)69@Txl*{f%XK1DT%s~JA^j%A_ee!* zVo|d088y&QEu2ybcs32%D;20G?_-9Q4*kt$gi{_#4X~mifOXTCpasF|@7gd7to0S4 zYu;%QI@|f{^f9NPm&ZZp4N4l}?HNg>$hm*XI1dEe%u~m3B{i9AQ->jU@*W~&#hg@Z+q`nc>XKm$a#qch`0DgcV}Wq-tiRZmZd>ccX?E4T7Q9>bHAd zuTu}b)^OPG4uftGER}$MQzNgu&z5=|JwNDoA}CZ??+v_`-|TpUAZU5vuw4s#!&ax> zZ7*>gvQSrc1}9){lb;LXTw8bqAHl#TWiVE7XkK%yuKvT|l zobrSIdgO=EsUXhTss~Z65p zA@MQ!(t_Yl5!E?w42s82oo$(AOFE9*b1#8#iNDOxjItvj@I~@u_C}jV+@}wmHMF!| z-~INfGn|dd;Syx|D1947;L?z!(OX|jz?_{tcxe!Q2&%YENX}ByW#V@^DntuKG@-$6 zPjqhk{Z=Cy_+HS5`k8}X%j>g`yrAB04g$Z|iRz6dxGp=+7vs^jjqw7W$nO?0-_k+} zVEPfJ*?WXscOp5iACf>kO7SGgh`tGrv)sb=VKjnZ3XGn>58TBs6xyGX&y?E@-O19SW?K-a-^O7Wp|{`D zBzU(J=B`v4&5)xN^!lAfz3#QUUEgap`!#RSYx`bj*!P2aZ`kNHTFW2@au*dj6g=3( zpWSmLt`>h*lmU1pXkU`vt@whh`$?!c6z4Kplnn7f|9z23NqD_QAEID36`=`{BUp@@ zH_3UKq)gl#MO@NG(N^UD^qk#YAxz2MySs{89UII)gM4sPl)Cc5ILr&kl@r5d;=!G4 zuAE&!nJXyBOPimnY{tVKUEv+2hSzl9kHOKJEpj*;ff<72e`hw1K3sD9NObPMk0Del znTQq>cCER399{_kl~UdZ1A#;WP;Rkc`xUd3NXf1tKi$zhyMO+RfBDyc{%f$l#GpTi zB(C886VkM!=nP2(y24{jRs`1?A}=l{@%xy4A5jR;Sd71SdVk&`NU8Dc zK9oRc$q`|HWkShsBY!kKU!ECJYf9e;%|7y1;-_4TjDTP}?O~F&&NSMkk`!R0w{)*6 zq<9g*%|O2;&E|R#hjBcS%?_N+oqo*;{cDxP3jaYy6#x?%_U#}D6g%@Ijz-~gUz5xv zlcpvwbC+5b;FN}(LuWcOIw^<=an~4xoliLfS!PoHLRwM28Dpoar<_rc;oj$*aY0Gw zU!LnbH_Z-gnq1y!w*uBPnk=Z_T$ zAbBJZrl&H0{t+#B!mzdo%;LJI{l$JXq>i5JZ(ebp$YL!gr<2T^qj6#=-J3TH2vpq!{P{KnbceHyXD0xKr_ zCq7kv#R5?>DU2{a%~sSgBd8jzZ>zyDdMV&8y)az8dcO0bu%O8A2bggC~*`=Ur6%P#DEUBz49| zf8rMIM~~Pj>_FW@kCxChp{f1cmCJd28WTR%2dq&agsrI6_B!pr_gaJg!1L?a;4Xw9dE17E&fz4gs+~qQNS;ey4Gfq`b6yNLhdR+FSelu(bO|Lc# z1`tRZd4q;u^M*llIBd22+Mw22;|Xi`!ZP_IfvQ&o{>Y#3q?$0^NA(Hu31^T$c6L6Gi~Jd?%mHMK z<#X(ZKv{I;Nr*Ev*K5|7)(6U0OV)PeV_u4+xffNXmdx-|emi;L6I!|k%?`Nn@^AS` z9z1=Dc;>7ZQd!kyI`c<|6c4p8sz+-^b({oGfqyI|g>=UlO@n?#RkYRSJFec_oZnc@ z>I!J91Mj%{JQ9fcRkF1i^&xU{rA9_fGXY3d3q3x+Wh5lwQMPMS`Y)l_*R}!1xT$)- z-r)NEGKyfk8ni96u|X9#^<^@R(|yW&s{_a4%Gz5D&8`%E{nb~fv(&N@6W-EK3>Kk` z%9L6OlKD&%EGzL2gF9>)eR%pNq08mU+TC3l>kazO)S=^d8bCdpySt@ymnGv`xRRH` z$#XfE0k~ZFy@){(ihLRM0{51Z>S$VLim1?{NK%m(iwCf`x{bCAKRfWV*@K_08WO5j zx6{2hkrXfjS|Bh50YuuYN-RCT00QNYrw2y|S$eH~C%k5p$HDebxJ9@_xIwT#F6_;l z9YxGzLKN#GM72XT>DcxOuXb=kCl5jvl6@nO%&Cmbmu%%I0U7qmZ;zh8Rm-2zMWu{W zsBYWK8s?aSGKOmifC~IG$ zeyY9MfnV7V-C@DzOyO)RZWHj20g!!whWuYb>pca$edm{Gnp95lt+5zGa7PKl*^bk3 z0=XWi*V}r79rL6$>EiqGyK!78ImYKC6o!Fmq0BPK}i;|f1j7B zD7j^>@SpewrE?DjrJbMZS&hFrrTk<@I7O}j;xSGjdj1&%mYosB;kOkc(nd0Sp~?aT5)9uC?9Y(*Br)#x#Z;MewxmP!}tS^|4W;q z;eT-zi#egG75Tq^{`3FDn*VZOA^cIP`d5%DipVbFPwIS2%(;c))qftV2RP|1+O|{>uKPVF&)p6 z$HNVBx}V0{bU%=!PXpl~L_z073%}=H$Ji+wGBBS;7qU?Mtb_i>QwSKeH_L{W; zIED=BUO(z~yjo`%bO-%zc{ z6QxPy1#X4hCo9-G!kcpjc}p_C)nNh(KG5D}dC-kii?4b4Sz}bpsh*M@OV6r8;B;%v z4uZ))y%JI>@*X+Vi5QCKVF9vrs^n9o*)bn`nkn3HQO-7cZAN6?N}X{ug#+P@jS5d)YFk{a_7D|6LP&_&ZeWh69YgyjO_bS#P`CA{O1*PO$n%pao+o)F*H zGt|-aQD#Ug6N7bmNht#d~4JK=_;k#UQ6&yQ>e zldF^?)7!%*4)>VSa4e@OqR*d4SK!En-Gs8p@(sBLF}ibkNeO!mHPGMvPtyP7`{_6f47!vT%N)hc+Vm{*f>b#WOw>PQ?;Za#jlP-Svz0@V*U>Cg zgXDJcRM$=LFRa>-{B9e4;p4no1CU-|q-au#GaW@!KOXTn4KHkEdnG#CrV|8xk-a`q zMxh8lJ>MigU6p66?i1m(I*pcAPD{K?b7RcJ2-(Y&ryAwYQqOq`YXBs1e*GJ#>1;oz zcb|OlaU+Ik0XOEEADqYID7*ijsW$z^xu0H6BB9nL=gMbn+Xl%8wHqJYY)|OG>#0q! z!@YVc;+}1ui<{@-A1I$!#5JHr`j-xx%BB zB%;U%a8;nggTReoMbSe7nHeOjr0$>fZ6Q+FgwjBI_T4)vAUH0SWfBdT)tx_+bRoJI3 zxH)^v7Z)gE9{2ExU?Zg)GP)t78#1~fqd79V@V!CXAst)g>w}&}{LhY%wZC z6etsMH?&9~&-@RJUR?MewzV$0^NvAf&cI)tQ%)yj&B1l^Z5R)S+oV`v*MV+5CjE6` zk{yRTs-LqjQ-Fu=vU2;tStaiq{ycFm`2LISb1)+c9M?rMfjVpKT)RA7r+fP%%_^OH z7KW0st)rI63+FaHpvv+EjyLlHx`dOpQLbjSPQ{)6pxLT7La*2FwY*lt?|QvK+xLP- zv)Af0YW?nDnQU{Pu`_YwHt7H-YH-VTKU$;=&OJT<%D;AgNd#APy+!R?xeKn5VaBDy zJ$~QhsXk%ESz-o`BL&}8AE0Y;CF1r(g3JZP#pDHpjbGS-q-o%}=RzD(2?}Fk^7)gEJA{6}-$TlMuKQV9qgBc};8X z53pmvm!_nhMZXE$o-7Lxq)O(FCz;c~2oV^}rZ(3Lo7}N(wI}S^OY|QVvBH^X$WAET zXg*83C6ZXyuZ4C1H;?o+J<^Q=A!h?h=(u`h}HDG$hft1tus}&?EzeLrYan>`ySMP}*0wO^H?(4NSU4;$DHq zq@EK1WjPc_mHg(^Ln)=0R`}t)kk#B0alDl(kWhR@y(qrIJzWsyTPv(NI1TKj2l#IMg>{L(4q zMg-f4U>gx^X%S4jOe10)09F{c9FkBka{pJ)1TFiHjwFMLM#Cl6^zBoXlC9{EvzV&rrD z!2S3C&N2Q8QTxFo=K+(jtxbqF9f#27r}u3C;4sqdElGx6MWV^p&Kv6x4EE?OnOwsV zVw)bA?LO%rd@=_5Xtu}a1B@s)YVSoxEsyim@*!h2@8giI_#s0QAKXau&_3`l;~%n3 zY1A4GuU3cuT}~pX%x38VSc1F5P!m{Q<~OeF5(q-sneGXkkZ^9fy!VzkS#QgAM(kL* zd}VAsv^Wl%IPBIA`)Aqu2W-V`OTgom!I#@X)&N-OBt~)sEBND&V(9Op>-`dl{3}ds z_9Uj)(*D8kXOrmd2|wb!^gU~!OtFvNykdP2}CxS`>}}FDB?N zZqFieZUd1Mw!%4xj@wCv0>TO7{YBfPki&U5&&xhjZhgUkMI7jD$^jwHlkaQt5FE{) zP0y1_;UaU;7XZcBY&^?L#oIi0Typkdd3Ql=eyMZAM{7I_0{ zH~sVk1%DW)>5QFA$<>4kaVT6;!mEw|7zfXf3IGjw-f7nACtCxHKp_6<*9{)xnu_l2 z;ZysZ*jM2A5hsq8rNckl^5I{3pgaN9i?KleLt;Q|Ys$eVsq*ausnu&oalhcQ;xJW! zwEg>JYx>55gyu)445|L9^j9~A(e>aRV^`nJA#S404|eh@=@9?kAg`kLb0H?$y26(Q z{T32FwGThR6MP3K@HTquVrR~H6 z5G2L>Aa{ret|yx49f=#HFUC3zfAACP3IXiw<+we`e%&g&OYD7A@YLFI9c7fX?$WH#+g3ei-n8{;>NV#*^H(~x7gw}^AR2e1Wn3*JZQ|Tu4LYNG zAV;!%C-5ZA3kGF01R55h`o!{To_AR!P0TL}`!0K1KF_fB$A)AD( z7{wmI6B?U!hE+l>EcT)74-i}=>w1=HbLw&Wt@wsXmB9(?lmIsm>X&F|V1*6+) zHtXG};YEXB=(YOop4aQtL$5U)_PfKN8wAlZrS%LmprJ2U{R7||zA`Wz#p$c)PiOH2 z^x49ab1@rD;}cYKXCMCQEa4V~EgXa08ZZd) z@oY5O&RLnUgfKffw07ISohGB?Dw^27*Misat+Av7Rmr`U9*4Qvu9oy+PpfnK_RhI_Ce08M{5f!1>*orOIvUvvIp-wfIOO8 z2)bK1LxvvG-@-Hj)3zWw&m#f6ifM?3V~Y_1&-sH@HKXM+iKBnX?w=Fn}t3VE)BTR4EQP$o3 z(z0LcppJP8Qjj?wVBu57#GLQItIm5G``B;7Ql$QW`y8D2gQ1i1^{3%+e{ZesK{w6KKXq z`1+dNWW1^_HURWyaE-UvrH_OLDhl_U*NONG+X2L`6PzbW8acnq3UW-77O}B$};yuQ&9EUe~WRyjG{* z_4)%wJ{tbe@Ao?XFsKc&ZxD?}KS-Z8%?}QSrMEqPC$%5)%cqijJfng$klHy)38-{7 zP&yw;eH?yy$)1F-3H8}JjCH}#_)#42O=!v~k5hhWz8?8u#4nplG6zwu5p`rE+HB;dc9uYd)=Ym@mf)@;q`jqz^e}!5$H7iUacOja0${Hz*C6Z zHh=0D!Tm;OH_7F*Xgqt3#O)UInO0Oh%O##AOz0y9LqA_L)&L)Z!hfo zG;-cW*O}H{<9KK*Fc_U;Mv1c5l$Mb6Swgiy>}D3{+76Im>W(&cyPwaRQocR0kFVYpI}1obgC{Q zC3YOZv_W!l5l``^%qhMq4(Jtip?-_6L$$gu)I0DzsN&54j|2?z^zQY!A zIYTks@zXeDJHc8_0DSn18&I~v<5N3<>`PejD+p@20LLW7x^g)Ie@Sqs#Py-gCVHQY z-b15!97I%HE1s|=PT1}7A-OCHChX6%*~p&=(T5?!I0Ej-?nl0?u8K44`4OLu$()AS zY<1L7PZ^qvLt-7!TIDOyCu}=m(*S}!=a{VxUO8~|=GijHuVF$V2>Iwc%TCB={~ssL z_s8NSMv(?SoN(j^=lXyy0L|bTjo9X}?T9|GQOA5P*q@2mZT=a1{49qLHN$)VU4eYb&`+e|Ma%>^a3{fq4PnFJEf{nVQMO?AM)aps zKX`}6JOR}4lokk($mwIe$;xd2^W=ox->yTl7JiK;hV<=*PdRdz=%%^1k z)W5&_%K7aq4&FIHDZq*dM-6~TTtT5;?Q%2&O?=jXlLkVj=~d$3?q!xxvT!02U||sk zpDY+B2YEf2p*i$qHb~Kh*LeiI3@$RJM5f!$BfhvFa*DbB4R_<*$Re5Y%V@%AVTzcN zjSb^c#D(lIH9;{bbsC8!;R(sL`~b^FdczLueawW_2<*Mi!PBQ8*o7Fwr&@qv?n%N< zp1u;}yh3`2kCSV4mqj;8uvEAXQo2F1JumEM?it*6vPElTKezp^6Hi$~CM*EvPJK+j z4vcM*j06eIjm=JD5J5xo!lpIkK$5rm3=bE@eYh#&m@k!sI%DDr_X?PUDsbWEowrUa z6VNo z{X?)Kf}1F<0y>W9a0ZcNhQPd1HaZVLP$%Bqb^h(2{`S9_>r9J>;gE`82Ht*m*Cc5g zO_P)j1wieiuN>o$7q3a*$_nXB3qJ2r3PVf4NFF zFnykz-TLk;H~W|&5c;b4lTckMdZt*0B@jTk;)IL#TOnifdpZF-6-L3L#q?{)v+EoB}wEQyB$SR{`WNTLuy_FfLR0 zkW0T`in?NHG<6-V9;^lb?IKzUWJDP@gHr2`qD8UdP^=gNIA?f~cpMP;twZf%8!&3~ zmoHu-G8{iUcxlZ1NQv)q;nZJ_;7J3Dzk?Ydui(@D8E6u6ksb8cE(qn2<6Wz1L)NZY9gC6e$8Iw;bC%l{W<}&&^Uzu zzKX(_Jxjpfh!69>GaMQ-$^?VpiOUbz5nslUiFk6+z@RRHcpP!T5ogsnpP?HT`h{as z8?P;dSyb`NG9hO7{WWMCZ&3x4Po!la@{m`&mWZ!t5vnV3Bx+0NQz0J62eV4-*!!K~ zmyq?fS2qKTDDPIPBfy?r<6k%24;R3glFd>xO2{qXJ1+e}55Ld!I~u2d!Z#1Y0jBKn z8IOcq3)YQ@y&F+o1zI>pw|?zA=aXoNZhVgL3J;SY-OKDo;0zvdKpu{xD{si2gzQ$O z4{>ylMo&Eko5!^w9$0JBKLQ@N4_#^BJa8q)nWmZZ;M>8-AHRd&ej``=H9}1cFa7mH z|2H{WB{nNgafwr&@5C80i5CS6xQ3ieUd{$gMs_Hg4f56`DFi4BeGD+|>_dEQ`QsUe z>dr1h9B4qNF^&8SX#*$S1=|jG77tIpM=mLJLE=Po#pk-~`$&AGXZ8<-LWh6@t1a!r zj_vS!wgvm>JOQK9zFwbJR)a6mu;5(^(6Zh5B&MyU^LP`I{g0mKz{Jd|C3~* zjKljV!|9*w{B#ajC6IdJU+obJfT+Wlinu)DwMpcWGj`7w!^cz7HZM6}=y9IlEv^cZM z62(QmACKSf=R84OG8J%-MbnK~tVjCfI2?t!BrLNC<<}ly};rjf0W*5X_Rj z;_(u_@JRRqsvpM>nPR!Q8;Q_P9fEa$H+U3&eNA7!O>^G1$}Avc z6hQ#r$-auWrJ7qzP%kBqn6WyUODwyNVob)Xr|~$L@@2SMPd9&|P2h}m$<45)$D(h| zy-+4`s9dzOZJbXE0$+;4C=66@@6{SOqN5T3M{s9%are5tdxt(=+&}XZQoA?pqtu4&Z4Gh`F(5~5!6O>1I6d16-JjfLvZYl@S;bkb4C_JBFz;!o75x3Q5z@XuA??eN2|j!A zY&}9veh7n`--dKzvPx$@KYN(x46K7>4#ub)3}>HC+1b`*ALv4vP}wBeA8aL(e@OTB zko?#AjsQ;)*sidWIYp{7Rw95JOu!Q$Os>Z3Wgz(y^OteNuDZ~-RpS(VH8106O$xdB z8u2AmZ;_^ChqB0Q{gWt_HW{8E4fNhXjib<(j?CGPK7eMG$w7W7yQH(=9BgynMAL__ zqjb8X>A_URmf$X<$e)aL#g>z4wk{LKQm#>p1)7#o?2m)!A%=H*KEUrW_|Mp7wtZGr z)n)FqspKjN{xZ;0vIlPki=e!EIXjBE7Da6bc0J)QT z-%%Iz^I!bSzy9-IXAWe#E#R^6KVYQM+@P5JnAqb{F_YiWi)87Nl zXSNr4jb}04`ZnU8BWQL?xqx1@X4A}_&4~n0ag^X@QB>lO6DPoJ2WuNgMsccp&H;EF z3T?f53h1d)U~j0cOrtB^2@anfJw*Xfe=`umNTD85S-zNnVJr&ehcX%|U6ZI!K*ij4gI} zUfUgIgCXM}Atc?I*T^?eyk<1gpKO~5E5b@?EJi%jx8Rz$4M&wb;hm)(W%vF3^ff9c zH1~ixg~}_cY= zQ4=*eaMRhTJWrJIfJaS`{;{LP!?BO#E}rYx`%QhW|MGu;goI~wL8xQTnVFDYFsz&sdaiUSm#QpK; z+TI==odyv$FF}9uoUbe%nQX1vECmQ*G+cmROAlLsZ)P)R>&*g+m4{#+>Y3x)QBcu5 zayGx>QJJjp`0xZWD5=LyDV64qED<)_ltPP&jU`*}ls*YJ^=&(jQmm*zPTG-|=LFm* z#VZ5AcnXIBo-4v1J(q<(PjSt&BUN3JL zlC@ieHY_mez04zwIHp?trRG|zzbq(>12a+C7K@n*%yVB~bKpR2_g!>tyon8fpvMbt zda9Ez;z|aQ?^HY!aE!~;0}HKR`Us-ZN)6{P)>Ph>wp0TK9fIxdy*4mRD6%lqufB51 zjAijKte2hRnEZBOniC#H0xBV}%!71}R^Wv3O|(aIjRZ!xkdAq1ea6pqZ}XbRVA&pAjDkT{hZk%3IwfDuSsIV{7bT=H3D)SX>ppm8Eh zRLh5{>3?AY-S=8(w{~}NHIRs4ch`CS^n^hXOs?_X3Dw+$CqDsb(4n|qukAUg=zuez zpbN2TqHnn5*_e;Ty3W|sHKkf4GYHcgUB?uVHO_n&v({_}W+^lPfWS(B@^sGvvA(2= z@PC_Jf$OX5eC?-kVB%YxlK1&^iv6fkiSO_b7oV3_$-q;lRUk#5-UxAtL3fy~R)NHE zE+Bme8_xuP5Dg(dScPnSrk(3Ntt)?RB64vw%0h+t!()05`8}@A6RDWVW@ec4P7HYpjE5H4+{{K~2kUi@^0TL{;5 z6VN~cNU5vNmxXOA8e)F=g#Oujvt0+walp zakf`))pz#%^zs9#FzjXzp`if?jMD`bG24Wu3>0Z)#t`RbP_|ncl${zuIR{9Fn^W&) zaw!^{ZMxt?KFEN-CsZ0K<_6wJJRe08ZH6H1p9dyF9hg)B z=Fgnrh`S!SyKKw@xWywgI}4CcQw7Jvd<{#-!HAG@WsR9 zeoj7}w!%=)SDr*1PjREq&k1C}ovwOH-sv2G07u>oa;YlP>J(m?+V<^zn zMiIK`Y}?DY#<)UM#SV5DTpplj`I^2sA#)VQJdsFmZ#qHWMry4c^yXmogZ&zH{Lbfk zwmVd7Prz#Yxk@s@$H<;lYzVtmMK;;rcj^u|j{MiZ%Vfx$`DF1p4L%HMV+y2E91NTN z!(XbxEMkhe5DUwmzbW|+HZsg{Kred*$Y~z!iYH8We8+(8ct+zc`+`&oizr*7QxKj~b&vrqumN)mWhR0h2aJrN!x5 zeE^rx70P4CDF)ltTGIBC*9A&M|LklcvoJn_ID?BhYD2RY_<770JPFRP^(9Rwk=UNP z%k^cXDAZPi)sSPhSzlk93;pydFSpVRza`1jEvq6dr2qpZ8%FL|(6T}M*MxZGCgD$Z zoaYwRY-y36?R_-KY1$B&%Br@wgo+JEz7-vtGe+v5=-5676kR-*^rJiQu6u4S}qFnESf*=4in*Hk#}PQms~4w5fdy9VpL zBfXls#rII3u!$Oggkqyw+o;wSYrZzBHMg2- z&GMjkzHH^%JyU|IGTu$JU@P=^(-34%rb>-_X1OTo)G9^|EBW1&BGKc@lj{I|K!U%? z#siT)bIApsqp*s8$oAx{&AYT7&4q zzgD1v)h1)h2Br%Vka7)+Evq3!KXNTd(RmJ&**FwFgGPyN8!TM=0&X6Z;uaI*z?lU~ zGIo9g(oE`PuWNS6F-t!uoN9e=o^w=uvA4IkBj-6eK0-7A%z#4`$?au>7o!m0yh^g} z6ylHBlOML&D4ZePuqFZ#l-cM%KSHiSh-C)1S0;*1F#q^uhKDq}bRJ$#BKD$<4vt(0 zc3s3g3*;0@*;T~lO66&C>0zoJ%jT-e485+FaNLvH?rCeX=W%3Q3^xHV zSzwAp6C?Y(Ez@=7zz4L+cGGKHb>~zX5iyYm+p!mo5xx!?X@8HKt za2{RwS`X|XNapK&QI}jB&YtC%TBS%zPl8#aWlzc`;5V0t^*YeONHozKng8^ zT-~FEn@WS+l0}0eO(MQ4ej!zfFsLAhC?Dl}9H+!dph!qas#2cM4gP|lQT(*p1Uv4$ z#o0O-i+qg#iNb7|3)iW4v98oRNS9lpb?o_zw0AL<$uA|O>dNUEEqJB3HU~R;?#wk0 zNVGhPA!+g1EKbj(P{Yx3QOZKw$R?CE(-*55?@&cpLc>=a=&B$qt+Yy%Y>CcNq!ZDx zjnncd+Rm^%oNU5yZFULCAeoa6KnQbWu&?&^{iz9ig>V=KaM*kR?E4oFf1y(`y5`MFQ*G-C5K*4-Cj_ z#XIGeU%oqUQ40TJm;L_NoF5T_;f{|=STBP+DdRy3dLH84^Nx0xlZ3n@t zD^mXh)kjd-f?TfNIdX=1UOSl4cfvm1U(kyS%;n?>#VREWeK zoDZ){7|ACDp2h+Q_{}gV!kP|M@@X0~VF}n-wPV(SFoVO?+^%$TZ*yD!);zHM_zn4i z7FlrVvyrB>EBIpWdcC#_bUS0NWq7IO0%tA(sFZ>Zsec^wIFJ>1{CX~_j zC_alpe0tQ#zB^&S0_|q3R({0mT{9pbX1z_Mz zF)wO+nOsGaA(NkU4{|kwYrsS@XmOqG?4Co$JM{!&r7FBjYhpa;k^!U)#l;dzQh|A2 zxoMY@_cB@2$6U#BH8-<^DemF1y7M0FK{c}%7@VXGk6T!X(x&_LF_v=>zn_aRe>SzYTgF`c;|M6tTww5jVik*+^JUe=}x3|aBKI@l5 z+e5g+j*PwuZMo?LhEZaoyg-5xC^D@t;uJMSY|i*ou3&D$a9H#C7YIC+W9(%QMZ7(C zZ60j=;XDN@3x#>epT_xOqpHL8l*NFub`lSen~93?a<`|PuYwF|L(x3m6r8QuvckdI zyLM$)6&>g8hJ766cB<$>jjQeigtv)}u)BHZ+Nnf|n|sApIK@B}-ZK?~Mb}KWy~#Z> z2C-d}^1UsWq}1+bOiQ7`C>_luWHyS$!xrXRUhEF>+0-!ek(Bs2m$Ku-{7$$j9R)W; zgYj90Av`z}_r)oMN%CGyn4IUL`v!YU)dG?K*Wdj7=l|*7{^|exf3eX#LsnilV+{2- z{|}8(Ne0--hpd=w+}xT(2#Qqa)18YlEXdD!k zLkzkAeC@-pFHc@$&2s+kd@OPy<6{<|&v@}5;==y^ zP2Jsf<|=E(s6QxR`Z@BD)OSJQBWN#+rrO$@pZFz|^y1OfsF>i^tC z(ZhGjBV(mU2e1+?j};qC4bQv;u3QH+bgq+`14+%3i9d-&J_JKm;{w8@amaI?3==>L zb^&BIh5(5(;2RYOpaZdKeMApcnImJ&}}3*Ky0EE^RI4zf|PY*Z|Ft773AmSRS_QL&ufjf%yc<27vV zGOf0P+i}?eR;c2cr(IdAdWZbjR<75P$_99F3Wr@qmBSuynTiKQd_}LpRXC*Wxf?}K z8Fxq=-Qo)g0W-F$(<@UR(UEZvpK&Rzk)rz0^A1d!ae}^Fg8zoj171KtEb;HN`Mu}BId0@etjS_34#KJ)~O010% z>u!};8$Y3q5^K%?x1hw*bVzH_UNMA=;`a=R9-grKevmpc1BQdy10XD$y^Z~WpYqeH zsMm_p2sH-TgE{I9MCSw zc@EOuT{CropP$Et+86;Fgy97h4R{|%R|QT)Tq%bMCE1e2U<(x`^Q%V;2K7d>*X_&d z5xvF5BcyUf+0`uc-d;&!v4Z3%$w~-eeHAU3Ut*1jLmO+wPIwiY)a>dyky6V9H6}(i z6?S$%|M}miS(y>m|0;rnj}vweFft7e=G{2C8iTi!PZ~B1WMkirWza791MU%3#Hq5P zKcFR>0@Q4tgaI}f>E{N;aM&bsv9khh&cjf;nAOlT1>i0q&hISZ0c!agF#J&u1z)%t zNTMj$7xMnHWC+$lqS2)86El6XGlDu$4BmLC&f>5$h$hsJeSEPb?mH_%esN+O%wH1o z?~UdUF2r4F{Rpv-_!&#~fkNs1QU%V&fH*f=9&PnKTw8(4(fRdnu-nJ2$CF7i*?P3~ z7(6hk#TJ4hMyQfmBFl)|@oy5wSD36K!-4$B4fjh-Q=x8TL8giT-@iY`;goi- zZKUp%ScXYkU(>m6X!eF?-#*ROlVRQ>**^NZfN0Yf)k$`qG>Zp?NuwF@N+#InayGdX zNo6*KTO-^85#EvrY7V}k-HT}VYk8^`-4?r#P+ST+G}>&FHpG4Pd6z3tNUpcflKqyG zYK`tsTCM~Q|^S$RTB%1?#!n=1+2wpDmjjLC{l3&cV0Q~YS z8owoWg1_R}Z)-X+Jw-!+%PTY}uw^@b9Oky0R7z9zbJW>@4kpvjNR$Npq;l3VsRI?) z%hLx73>g)cQHCEB5!!DiaahD1=9de*3;u9#rQ;2AP?&=@NfCFT{zluXoPmqjOR)v$ zyWt5d!xZ>_Bk0{R}%Ll z<%VhC9E-%~BJX*ilH)ZQ(Vr%PKcad<(zP0!RJE07-s7@99h%p8o_EvE41bO+b8~lY zuz5v3L!cB(@aX1CGEIrWuo4_N^kYwMF-+L_6Bs2*r>P5N6C+2-77z9xxa$(itQI9V zMCq7qzzFpS2at*+0QdP6z}RzitLU>NmFwjDk!pL90t-^%zyJl*Z-?=aEhz$hH^@3{ zOI?{Re{XNk9z#+$GD#L6)(dczmwwEKSACXC)d;zmb6Bi}9FERQPbl)cWX8h}5_VeX zbx;u<&}2LzXD^3QgIJ$HBtWHD1~@^iftnQ*V7K%g%#I-;K5S+HwI9d9H3lK^l@6lm zRm8&(#5$b(JVtU=IqpS522e1hiq+_~Cxsbf&v`PN0ER*rS2tp22QVX599z3`6A(H1 zPOxL7T@Ux11DU?n8O84+=jp-A6SgB_sFdKmKz}S{w{`dg5ZdOJL>CcOGfK|Llsp$D zzKtdXh7z|`5*IMYBR4!hCz;1Y>k4H=56ULu0Q$&A?O6R5|LyvJ?GZjj{K#4Yd20*?%j&Ny#|Uu|{H za5x+ee81(jd%d35ss{~kP;2(R&>s#u^?I$*sRaaYnOU+GkWU0La!%}5Ttsr|>XECe z5?NG*@)M1I=hY*-Wtr{n?(5{zsn^7%Ar6n+DHAU^rMF&tP8yhWVQ2fzl^7*Q3+q^_ zP-Q2SuV4v3<`GTaWMR=s8qx`8PKa|L#>nE1)$}NI=h=8!5YqippcF-+J;fT+zu0$b zddq@>ea{eAUiyGxbISs967s3M28Sz97-?cFJL4EKox~S!*~i;|ymiX|+1?Xd^StJj z5p$*9l=aM2)@1F>5niBg;o*o0HuHy28XBjf4xtAVo(XIc9db5a1u#$%DQgv7rbHbe zvmL2Bvo3Pfgi6Qd8z>5+)@muAyLuC;x_DFjQprqeY`~Xc5hX^fQF!5--(Qm|;BXWN z?;Kt!BFCJBh>GGjdogoO}_JSqiD|#-9)@qG-XKf_anM+e0adGL2S*)As zGf}}1px*~N#<;Ge8K7^OS9lPOqO0OV_h#41u_Crv^{PDM=2YCYSeNEI^QO}nkDM`# zq0}{7mCb;ye)cB`Uvc)AIW2Kp5jwk99T3$0`IxBN^4>(8K+~M1}!`7?3Ad4xwCIA>IncT+=Xs$b; z+9fiZCfHVEVVrTc!+65*okGUbO8O@(xG&`~Sg2UG@ufW%M@i5fRJ`PWb zHh++UylF?z=XX1LUgUbNdY)&e~H^< zgI7(Rafb&zDex=}gHQ^qAoyvZ309??@q8KF8 z5K%pP$~+r#b;3O$x8_A*Q1d}pD7R!X)k07CjcoHp%Qouk{L2ATs+c7z+|*K zVEelDR3-{_h`Y*6p~?)dZ3KAc%z$2624O7PGKk*B$Zo1O&E*~S{44+3DLU?l4+~`! z*WvVN|H6M4y-lO(wt9lP2(z@jBSm*1I$%F1jMAX8&;ZhczfP8yGg1T^+g?yM^CznVtPZihbg>2r~!;H(TUnuJ?DIKJ? zPTBTn&7TjPtjC*A1!6(gv$8}`tTy`!{;}D?Pa8^ako66!tME{#c$x}*kg6>DI;-T1 zl{+xpDj9pGUdw^hjjEPN8RO@F{43`X4?0MvJn$ro;=+m|sNG`UoUsph1rnt(Ru6$B z!xM_zsrPD5=wGMyS!9R~jsOW1jmhxyERZLf>Z3P1Z5q9d6WeMd5$gS@Q|p9%uRCl; zUMp-2J-=CRdA)uk^xNHf)UNqBK&e?I=t7EhCD;vjV*;rp9Nk>hSW>*Y4HJk!gi;YF zD`b;+aX6~i+R?BztOs5z7`D7ttuyrc!$HIAM^UpD2K}Z#2$w*0HRwhm)NE-)z$`j> z^V(BWT*u_G|UQu-|Qatp+>QR&}O;nEMZuMe0aUUH!Zu7q(* z#8;?KXOiIbHZO~H<8F3YJ`X(Ye+hUB&#XI(*sO01xXVc3YZJg%Ab(p7xN~J&J$vd$ zdd(o<`XI}zN((|wXxM2IvfYE~l(x}xW=H4Oj(?VHe^hDlryYFNa!J12FkEw(U*=+X zRBNgLM}A%o7HtR%C}rPGOTK!lK6+O6O8YYGRPi==J<<&8sRvJy` z9Tkm}omCbhvnIEXQnr`O=AjTOKMkydm&E&v)k+1OeM zGdZ?dg-h8Vp5Y7iyYitS7-VKt9*RtdMnW@DfeTLO=-?aL?y+==iFHSP1tJs8QGAg$Q0rZ=+1VcrkLksi1_U+RVyP_wz>;u)F!EEX&> zn(r*98)R5>kCwSe%ZH2q1!&(4Y`6H+Kf6{u%-FkG8xDj=p{F{bcya^)9n6e&rVh(- z=sO21k2|FXR_yW|t{qn@$#yC~*orAAC$V`t$s>?qrhJI~VJ6N}e;@MCUuJKByH6m$ z@|Z^xxe9{r(N%0wiWeFt-?`x~^q)IV*w9b|33UG6Y^wbNUVMizu^A{y|J06OXw`#EvmyFA0(x)pdWK42<3ZOS3V{ zTZ}WJV!1yP=;V>6;z)JRD?tyy;79Rbpt~*438M`s+;GA*aKeU#6W+dh)OPnQw@zH5 z72G)#=?3z5Z;g7{ES zqqvlWu+*F`4nqRc6=Sv*At?k$L3NunoLFA!$UmMf1aGmNFlW5`_l#a_S}n)IUY{IA zQ$HS6u|sYic$)`aMOqiE_JOydlgrS_^-GB5=&cQ|dq#1~(9)cJDCO?}w=7}RQ%10B zgV*K9mk!ibT)V#ow~kW5zEPN+mz>D0=!5a|U;N9z{_|fuuS9h=pI(28@zE2>UkYax zMoF}z51<|#BTC8pEH@gEEe05JAg@f~__gdJBQui3jVBe0c=KiD?}lKiDY zq-2O!aUkd&2Lwxz%X~>s_~iu25BKm)977sgYCjeUrRty{nrg=~mnEDEgTP{rkZU@h zA>^9d`9ZE(Av?eq2`SIy#a*;9N{EhKM6Xa}Bo~#T9AA3LNbGjG7!7Hd5dR+R{Del7 zWVrkYZ!8uXs_c=Csf=J&MX8R8#r0Eiyi*nJA!SQ}Xm70;Z%S*N#DfRpY4Bg! zgy9*TNz&NUR!)pQ!w}*j#0I-oIb^k2QwFU;*YEhD*X-4Ouhk1XUccY$d4pj$81(9m zL95#$tSd8%Jcn;2HgTvMuBp1(h(jB3=(f*fBMz-Y94Z^nik%kgc5Qnv6Z6P1OvxY{ zTn2?n`coG?ia&Q&9@GR6`= zUOJ)6CQr-#$$#+$v{kUEk|doc3P-$X^(%IC zyH^ZIO340LaG$omt~a+T-=S(qS?LOiJg>FYqVJzM7w<(f!T?-g$Iah{x|zj(&OX@|#JVrIm$KIpzKYLg zae5ww&j}uy`kPri|8mGNvi3V_wcB_+24CTdK4o9h^;j+XTd3f|Gg8k6iw!G(JGZT* zTjBXQ;!56p8_ON=m#l>|_Ht=KU|Dv)3Rb=x8#nrv7GD0$G4z&9xOP=BKr~AusIO3t zczndppE5#GKEt3b<6$ieNzkT&;iv0^M&r zQD9CWF|x?n%Gwk(nVXHyULFU2iiC6yW~8f#3>7m5I(o`L6(a~3Ytlfq&Ynm`m+k3V z(*}Ni$7SXZr1XKElIa5-BY&X%#0oM97M`1#L(tBjut?Orz1JqVX^AKrV{U~gYBHxl zlw8h&*93nDXuv6DAXN;^6@olf99HJ|qURk}AcqsVLQJCRY%*qybPOKwaQY&N)w-Ng zmMGzrL)KH%Ys6liX`a7|y+^kDxel=M8`t$N1oAj638A$isIeF2dX(-mFXOR-E2cjT zf7hVUl7b^VVaE~<^&|y(PP@?ehHIG%ozL&a2Oqy&xugB#aXOpulHly_rKJ6nHPjgr zIKId^!waQbQzY&I+i+feeQ=1{`Dg^iL@DQ5^a1q$6K=3l(~s>5C=f$ghxMpmw^RK`jc5YMQ3?n zXgUnA31jxs8bw%7KE%Sbp!LVxaKc!D5M1#rf!AzZ5m_0OeQ@Ce5yAk!U&sy&CP}<7 zk==V)gkIe?q5!aO+Dq|5=AzH?t6{=IuzFC{dhCv`H0NN(@DQXNvWid<_%!013+;UE zedtWsK96WgY*7VS@RgK#67XjUqfgu>5@arB@aHfYjgl+aNkXhgLjB+sO^`Ln-o487 z+>evSSF-xCoo1^VMPNA5C!QdKa2|ow;9dCfXpnqx*&c=7Gx{S7?%ByEKZ?@;PUqSR z8h<$3zWVn1jKLgPzcU`*spXqofSlu4T3Mp2vQ{5Hd~m+C+-heVg1P)LyCmoSjIt$; z*zqf?J{XPY*3)Sbs^I1#nScPK~( zG!#3&U~(LzU7Qb+ex-u`3o#VGH=!Fs}{ssy4vdnO7m%q@wc$w6j!7jYT(RLuGH9%4T}Q zA&)o9(_Qxe!{qWhr|mnCl(2FT-j@);_GJ)Uu%wo8sHm7#Xqh3c8kXuc^KhT7I=j+@IXZWRGvAVoE@DA-3bJs&UW+x3NN$%NgBcRnc}k@Kt$(&lcR6Z(!ay2)m}tC zmAAddCGtTHXD*t3X$V(D4WLelKYIr`7dQD>ad* zp~Ls<^;TB=-RzMO=mgzH&~Jpx zT#+hPhTFU>8ykaVgwF;~@6^UnFKc6X@g4%UqAL(e&1eQ8^`~1xblsQ^)?qp@JU!Q9 zI=H{W=f-rfF&!*=J#0(|8`HtYbg-Vo*_aMCri0JlbZ|$xIp9&S$ZBB^|7n~`jcrAX zL8iQ?FDhwxmC9`p>j9)!>oZ@xp7`Sw&@A(Z3RLM7n^!Vxpr)Tq zCFFjnfI1vTaP%pYSZ$M#x0Zwi_A(jMd&v3s1s)5SY&d_Axta$lF)2A8UDu zaBw6vNRaN=lcdnQUwZD-yO~&?9+!DAPR7?4$xQR@&qA3F(LTj^1^gE{@(O0zae!07 zm7Z5um`s#ZUYNgn6)IlSP(}{#9OmxPYAJUMt&%@v8`QTURlY;$ZfR)Pp_r zPM*Df=^X@M9rg~!*PaY1hek;5v#ne2&8UJ@^}9f-&zHs@%%R3Pg-F?p#SFeAah_i3BG29Ymat)9roIo;!{P__S4T-5jppevk!+d zPIaN%)%}H1UWFVSa|VzrjvQ!GxQ)>T)vcUOQ%JxB{SqZP$)0l*u}wjrq^!23Ia83K z!v)*Bf#EQ8{4(8hzD=&c{l{g0iEm@FK!77p>JN>PwYC2)nIZJSc@(@8S)$6Hgg8Tf zgy-z22N64JKZJud&PXms$4J`imuwZ2lk;dadgT0vZ=$JZ(sao74xb+!WdbYv=#QL_ zzkIuAz~PPJcNLcL=|8AjQaN!I9JDtaC07r#<9g^r@;1*Gi}WUd{C@=3XdgNf=0H}f zK5nEvq16El;>bZ990a!2z`*~%y=!Z3+gQ@?r|SHNIZUc_DS~&)S9zC_e9?(zYb_bu2KJ4-jvgIXB*$#b!|NpCR~+>@vDih~aRO}kHTe_XuREa5mso6Ka@ zG?=R>B9g1RsnEU+#LJIR|2|9o8%Xh;V!a0kod#|1s;6?E55~`| zcJa=ZToTpi`089jul@K@V&e?{iK>cti%0Q}zuV0qsiTPVJV%U7`Jab1FjY+yld%u5Ko$s74N-Itbp~LSJ%K5g7l_F@;!IusCw3FBtaS$itU?CZq7F_zKZDLS0FjC< zkm1Pw027C!rQpgQMtqPEN|bEt8CwRkZeJ4^q<{#JFlT?w}cpl%8v+)W}b<~YGx;9dhW{TSaR zk30qcAVdp3ekKS|6F-@e)f}Yo6D(~I_OuxZ(~;x^j`?+>w=06T{CA62-Vk2N4E|YB z%jUy-_Q8SOwC>w>%j(=a=vci$yJxl9?MCO};9%HnG?##Ywy5PF7PVZX7o%g59cS1a zv_J>#W_xILdV`Mj&^b7;T7!pn^PW9;VBcTnto0%+60-djof%g`fWiHKEKB-UIrb5fLhdwXAj1fv5{no_0gtalCXL zaOtXO=@u+q2Ux1Dsux10bK$VQLZEW?n+{R{8NYK2!e&9()z5@Q=b+-FQR$-`cZHhf zgGRRnjpkuaHJN@5k-k(4wph2*%a2@Q`dWsr)Sbfy`dF}xnF!56tx{^dk=?&?#|~kl z?%18WusXmCR}ml=A=|Tf3vagZGHD$p<3lDCuBwBoyXR-!)B2BYFbnHvP#Ru%S%c3W zwp`tfDzCY9q9lDu`1L{-i2&k|ww+?zpaNS0E`W{Yn}d7Tm_Y-K(#X+pzGUW)lOe4U z?Oy16m_9IeWt+I zE0!XkK;qT&SZFy}B;tUdu6Y2Y)NS{*zgM~vcAK`|))ZCj{*0c)7MI=PvMb;a3zxE6 zTy_C2+w1pQ9lO!A9=1B5h(o7u_1X>FYP5Qddk@KDflWU?eo-hr1YxsRB;s`a<$2c3{qje}^u{F2x88f{n9$-ab1)X(@%R;2@Rm5^qDWy}+>t*W$_s zO2Zk@#>ND`mk(_)Y)4p4%w?bnkxoh=XOR>Y;Nro%2nE5$!j})>Bju`o2ZLsSzUGA= zd#?jnq4cMx+`#yOUQGY{92!d5fAwu^@(rao_)UDz?O$79^)19TJl7ugwQYYEwK)B~ z>|Vc91lO>-6rii^@}qI8ZSva?tR}Yh$Z-~^xs}yHf{6`W8WeRiwR2$@S~j?|QHg}} z{3f`3>B4jq^sitfoLr7U>!~4g{3At)UC$yV4PndkDH^N!ZZQ@~JBRq=EF_nf5?U^( zE!|q_OQ>~D(P~Z28P-T(n#*~STSWuQQu*i~MCsTKBT|_Rm**g{3xCmi0n4O3Q?=>F8QZ|=%*3u4#$pb0|TYdA*H{$Og3k)8essL1K5|Pj4G@+v)wKJdS=4#ynn}0LiDGD}&{^PI&OAHtt|jN6u6*_ppQDf1W%A0O1Ys&)zZ;s^ z<=1u1=L!-C=9=8Je{h$8{%ij%>zw^Ps+sl6GN&(Yl5q>HVBZ{lIDG_ zEs(u#ktSPsw*xlD_-on5BnOEkQlM`(%Yl|%az~!CeET2AZ!X|cEbWXcq_ea;nyQ%R zkctH!X-uYsPpWzAtH8NZQJ&$*m9XP{I)(~a-%_3kUF1{BVlk9i+QBQ~KNfTbW9%q7 z;YXMjUa-Tsh!ZRSrUQ&$Otz`)DdO7z>>{BnB3D#4p}ZGrc0yzE^mU_rOMdC=gd0j8W3Df%`LD_C zV@o@v1s&0?JGv6%TX%G6cXYE{(AZYoku!SQ`+WRetP>mPkml`hNJ~(}M|y77mo;u2 zSc9Ke&^1e!ULR0b&mqDqpl2^5`&0 zBkB68UY@g!-=T`);?+6)vmad3hWY}2+-h!IK)r2AnOf?1^a$D(?!uho79_@7xOtPm z)+={3?X!efKpQyc7oE7}Cck;prD?K`!IXJ5Svpw1mIJ03Mi-DIOe;$+TUbIV7*E!m_Te`tF9+IbYX8t`^TJ~3Azvgjj-PH{2ok{ zA&8^SB&mP#VU1_>FEBR7mFi#rB2phUcT^sU3QQTsBCJ>^11$5)M-VFxxo~$U(xJDG zDzdZp&PW1ycP{w_i0V(L&WD! zRo327J!|b$g$La#FDOWf9!s1IIz)B{{bPgZE6`#P$<%d1;4dRVD4^vR#1{PX?~3&I z&h_B}C4Nj7nm>0v2S?#y_cyR`@6ToT*20gMkA+75kkAv=HiRn%&H%NVK@Dx5kKunE zehDd2MRYSUfkq%XkMG(7zVMpjoB@lGEEFFel!%D;qq~a1UF~}_Jm3R7dCn!juPOqj zt;Z^>aeYeZ0F%3LM`$Z-c)PlkT5ja$WWYN4u@ho@FZn#~@V*eNu13-#vuliEkO|t+w1oLL1 z_n~BjXP|7|^jt#JcqNB1iny+)X0aG6oDTmeo z%NhI*vg7>MQr5ighT#nQrC@6Ynt8}=68ojp1C{RU;~Yj|D8fYQ+ED5jQvrixpgzgr z_U!y5xdeWH^ve8Bs;hMTSei#e)A3_!K7NWbWht)SjFtKy`JP91wjh6zUA}oHyEs>M zF<$@5zkK!)XU{b;Y5III6@6z=!t_sRUsC_7)z<|BcD?@rCamx07&lesN3(g2?2vq( zGOw!kYvnGQs^Y_(dJ7GoUPt!eIjsjYe%mNQoBV30))=WsFf)1-%D`Yy7ShiG=WJR74!Z+ij9k2XCI2E!UuOfGY_@6sP zB?W7xoMqQuRcKT)>n_#*JjRet-T>1&_+8wxyd_q8X>|l|#dtJBQsEB>_8dDh{o8wm zLGi}&P(+v%?U9wa?quI6zgc9*GJ$BaSbE}Bc!NIe^Dng#sKBLz2yD&9d7u0Meiqgd zMrVDhLoa&%^+;1ga;d*bP62A%=2%Hx-DHtwYRr+%Q=N(JNX}rDh??PGzS$O(sT8o(nKhyGnYnm00J`WuD|8bw# zKD%f)PV>v2fd}pnxM1_8v0R832;q7I3cd0T3M+V#6L7+oV+l{prx}-jwzvEKDpDzOzH@x(cLwJ0gO-_@D(2ans2F^5)9WfzJOJCzZ3B#ycodtL5S24Di6I!y zzERu)m$|f3LJ~#Ua{5T1eXpmO)EO1A5a4qANxl26bf^Lq! zvXm~=EY0sStEG{|Ez0l6A5HKE-x9LJlNVI|X2kW<56uSR&SkZvuARd&E>~2!WNw@- zuJB^EncUs5l6851>t^cNkqy&BnGtzcg3A7wLAkc!Q5hbMmd3cS%8!xi%P(4Ytuszq zKBSRe(Kn3_WL|73)0ndHr4ox#5w9&1qBfSy0mllh@g<3EuxT4?DjIBBWEAzUTb#cr z&R@tlq_O^7+prAQvKZ<&@E8@&uxfz&OVuxF)l|(t4(#9B!v1T5{rLp50_^bGaUHil0Pae&`7mensLzim*)1MW zm1* z0=qbFGY>E_VWe9oXh5x2T#7@{96bJYj6Xu>j6oe;{^Pe(j!K8rl>%sk2B|Wm$!>sjsxWH_*|c5@bvJ%B}c^4_bm_=MdBd_!YbIS}2hh zz~QI!#F-SOUOFdaqYB~4<=KSU@ton*$0myRFP!O5_OyTH!Thkhqxb@EYG)54XWwGc zTC$~w;#=CYTI++}jBy@8LC0@WoreRbK-b|1dC%{>WQj%Hho4jz(ocFfCMnM8NUc0J z=PYo?eRskw)}Hwc&i!z5to;~vPbD0aDoxQd*?%D8h*`;_K1MP!v`k~-i8hA0wmg`F zPmdjMYD2RMkuujl8KWD39cXyDm7%ORVCsAR_;NQQwI`k)YNmzqvn5N&mn91pk1;ll zd;BsH#++h$fbk_Lxw+6b!l-|?5yowVadRS!88dBerL4PBm@${|?Qr|U#H20!SuKjN z4T18fptv?S1e)irmXIAb?oTPZHHY=qU@VsG!6K34mHKcSbiB);V{6lbjxD24SuE&i z#;io?xI!+Sn+Q7QzHA$G+y))DK}W6L0eJ+5`$C=5>)cq-F+EQwI7!xM z*mPgu<#a^m_{rqy6HfW~6tkN?dQz9)#1m)q^nyUXk$sH^D5AVukvX(K*tJnuSJ^n! zSPwsp{ZC`Ig}+vw(l^0hF+Y|-;oI&Qa~V)RayJx8s8uoX9L&xRFLDBzu6zVAN)2@r5j|oIc(i+t&F%|kFCr)v%AGa0`%yUklI^G?d`ktb@afTp@ z^YZju$MhFoU5;1_fAuINYy^ zg_c9`BfRG){y`8P$?DOMAit`Xy5sab*0IwlQm)lQamc3Bf%TFNaK_dwG&Tcib0hld zT(||M_MfJ9FFc(1pTJ^WIi3e?Ihuud$vrh9mib5576=!MBUN3zeRh5!x@RX@mg~Nk zRC8HVA(s_e_?QavGD$BeIgttcU+{ zdXwURCCyn6|K+qN#s3EAk2x({LH;|d@V@|h&u>Jb69ke-aV%@4v9R8@lp7O^a5?@I z0*;4n5Khk+Dmv!<+#CRFwyaj-5LqR{=qf4qMRNn=pY;f$O3-TZm}GYJG);J-rKL@@ zOmB+%XWXWBMdlXo*Qb|rGb^xKo6M%XQ~a-gf&cy=P)h*<6aW+e000O8LA4%NchIfA zDh&VtUo-#!7XSbN000000RSKX00000003ihWnpw>RcSY5 hVRU6KYIARHP)h{{000000ssO4ga7~lD+d7p006Mu%oqRw literal 67458 zcmZ6xQ*b6s)UF-dwr$(ClZo@hw(U%8+nLz5Z95a&=AQ5UzkeU>sy^veeb80+>V>|R zk}N0~8W0c=6wtan)-Qum2Vf?6AfPBVARx?tR%0hqLl;wZOEFV3OFK&!OM5#8D`$JV zZ5?lWyjJ9&UZGx4NBVr;1A><9rchOR! z^xNcFF%lKdLqccLumpujceh8MSEDxGv1m=Hdb}&_{+!ou2Lm}%nw+JxTlt#oPh#xv z!ShGN9D!=~6U(ZQ{^p&rF^kGFJFe39VC={lSVKCwkR047^jcOs4-!0=AOb-{R5l5o zoC&RMAo+!!B*ONH0>_CI^sn>j5FPCGI##xk0SO7S8qK#_mJDX=!qt-$H#h?X^M&aL zX}i!sbbKo)S5e-(UP#J0D%Apsd^#j2mtymccXz@GchS!D9QRZfH|O-9**x>Ky2$v( z_DX_YF2&hJ^Vyzdg)Xn>XkV@zSW?Y_Up6Fb>*5t@)JZGH13fpXAos9byu1y=G#Zt7 zt;Xf8H(SOTOtFJnC9KD6&d!$W()0DREaYwIQ{m-I-_25h{_?P9Q!D&mFc1iW`3^+L zylv5Y7Un@Y;Z&Rp)oWaFCB_b0HgU0JoOoqszsrZe>Q$&t2bRx`nTFlZ_SVA1v<BhihVF4;hbdIcmJc1u?n7ODRD+h6k zok{7|$ZCcT(xa1UJu;zXaYOuYl=`DE6Iy0^MEGxsdA%tYH5uu7HTzJ$(MZ->!ubFu zIMiH@Y8TSJ$@VmmDAASfkVLF!8`l=2-!DY-dooSf{dnb#Md`c(bv&F2b-^WR=0pzq zo1)B=M92De_<-QUO81ud?5jbGK9UGHUSDqqr-_l#->b5u3&M6frUU3*V#?en0p|Cz zqm<9CrD=Pq$0FsqzxC=pGF2p_QoA+Z5b%E4U{I$*H|PT99WF( zoyk9ivhOdUN=%_~$ns9Nz#SO6C&NVZ@ssrnM!&~7%&GPIN;xgzYIJ3)iuB6}+Z3}D zMSie7G(4bD=kD;mdC6yeF`fa2y00~0Mb(aM6&eV?x~+(Qg?82#kz1^o;pMYVOe{+t z;z-r6POYQ|A)I8+>>Zhk@t5tP*ic@+_V~S`Rmh!%w^qOw;!1{B_x1_V7(0++<$qI* zUrtEB+fc8`1*GuaP|OPhYj)>>6KQFb7ZPumjg<1hS{{i-uvq95dwJ&XV&$0Q-aETQ zL8hTZGYzL-$`L52eQSLxE9m|{g26HLQ6N4&=rN3wJaAvu5GmiHL6whG?)T#280Sg? zM9x?&!hQYB_BM%D@R z72)Dg(vcl}D*)hI+4C9uXW?O-p1oe)t{?gzdf{?=*MI{z6C0#5L+ zadWOfBP<^^d`QsT>?K7@^G$2iFFjA7a}bB_XjAn?h2dyNq#9CHs7r6RTq{7Nz{2Zv zLOt8v2z$4xKcwTq}Z@PGHE`@G?+p$&5y3O!@Js?Og zd_OND$bI?2mxbF}iglflio`54P+zJ6UHP8z2iTZ%@*qA|D5J-2&NpE+;^t69j_#}R zBpz?%4kR_iNVQ(iZIXKft6eYH4rS3^9iVyngBR=>8HdmKENwxNbK%!0gY@iog3m&x zwJue4ZW>eJRGNZrSj)sN=P#mvEmD`-CO>#&i)se;paq&(U8kjsW4x3<-Q{0J2lYRvYfk#mXe1k@!gj@r#b&11(=NM-TQY zHSFc@fnNU4dg^N%@_Q%nqi+h)7`3vjWc-?l6aPrnO@h#m=S8VS-*aD?;R~>!a9tp1 zujkZQIbdk#wW`qqLJaL0Wc@j1oa4N4ci+_KqemeCt1bwNmaM~?9|2KO>5l_~53|Xx z)org-*lk~1KT87Qu1%uq&fiKrj7d@x!kx%DK!It58~C)%c$Q9q6?7yKRm0Rn@;(d{ zwjn(XAD_t~K-glz!fZ|+r}!^)s;Gxvij-|`J`=6Mas{nC(*vX6Pp7(R@8@S8P}qe; zm|&cph5yFF-1T8NEnaL{A84>P!QG0A`q#t<3=c+v6OsOsDSXE%x&PanK`Qx%QJ{2$ zxMP*ey=^QeVrfnKv=jCNTj6_}VC;KeUER}Ofsc@`8*Apyb^*G0woYe7^`Q@p(knGB zB>4u{-WF7U2cx$DI+HjF9JHJj^E(DH%v5X;T88-KD4$igh6lh&})V8ER zD+0rUUp_kzr;JZ%{2wotutrj-QS>eW=&er4u2qN-&(u0?iJPWcYM zKL~%1Q3fQmYP8VSd~6@amFJ5xygq^dub5!@S9td)sy9!}lTVZSfK z+Q6qrz++3$4v`0Ct36moB{e?XD1MkEuACe!6D#izMuCiZGhW?FyHj`!w)B%YB~DW} zz)qnGhwBqy%fa{eQb&DPueDja$qq#OP()BcrpvJJVO2Ba# z(H+~k4WOoC0*yewM7@P^az(7*-BL%kh6EVn!2P1h3b0C!W6n0E011?71I!g3iBSQj z<~U|(*krS?bR_j-{!5j=h#`P1qo{gswWm=MF>zkVmvcte-?Wp?F@&0u`~WuR~Xu>(O{Ci;aK`~5tD?dl8jxca@TAM?`z zur%XKA>>cII7iwq;-ANGJpyrz@(_pnMbUUj>m!^xs62~e{Vjz=Yzabg+4sfO1*?>r zsEtZ-FYhf~6*Bk%jW&b_Wm&Ek0HttS1J95?9{Oy$f@jYYpCK|)UB3!-&py#3jOoMk zWQgHK!IQcO^7PCJ^pO?^>pj4W>%Cn|fOmWKq;~#}7U2J45+G^P?3L02VkdM-^kq$M6FRn* zs=`x_rod3(mhGdGt13ik$c|s*qf*{?KrO0*TMa=3v~?=p#@s}OSsaG&oyNhjZ%Kgb~9LvRx`_BWzvMmrn;#pIEBHt_qdlxBvDhug)RefvdBXY~cOZ-@f?P6w-Ai71a65xTsGwZ$ zMx)?1e;9&4c6`Lc2jc3*xsiAFlJ-3#)0jSg>o|tB)9>q@q{QC6y%!Sl} z43Jn%NJ?M*MXqBi-wVu;zT?g_GiLNsIcu+%)371?Q+8&seM_%*?jQ(Hk#DxQpD+vz zKGQ*YX(i{_yPV!kyYDw#1v?skT^Bg&)h@1Sz0KLWlrw4=<)to9co!C{zJmXJ!z%sX zCd->0``3evQl#1&5YSHzBoOkyCd<~)(oW6P*1_gqtMy-db=j@wd@$BP^xPGD>;I?H z*`3-FT88Xt-J7j*TV*!d?On9BB;zhdL(%|=N`^}wgb#?S`8eD0b=cmG>v`F5^nE<` zHi_`d`x(*0KZx}L7Ciq}T4ws%aNF5iET4v!mX`J3s=RIedF~}PIUpoGNmaOtF*iBj zh&7*Y%)$RI=4|%;2vaC0e7W2`CcfhCSL=#$gXsJ+wsxQ0xVmX`;eaNn+dUJ) z_KyJhQN-0-2}FHm?)nG~OTc_xQ|xVx`k~xWw6y7Ti^lqdC+s8jCfJ1_*6_XJHbeqH zNY^CGoHY~1`uSb%69(l-RFy?th-6qf31EpUU`2rq8RLSI2DvygKUsOUr)n>r;d|VN z45-QNeyWa&SLhCxz=is7k3F73uoXg=C?Mv6#^XIMLW$cm{A4N$7f1V@>raY2l;HJE zd%io=dfSr6=XSQ1tGI7)IiB6@O}Idn{u|+o81A@nx;pprC>ViOk{y`VNyMJQVZ#G; z$b>+-RaW95{WZB`iQG}h%nc2hH(T5B6FMAi_|QNy zkw!q=tFr&5EN6>ZkocOK=--Ywpg2F}_J@4_6Vu86g1dDnDqL3d2B8D*cYm_F|5NrK z2waq#-8aJC$?~b-D#=|sV%($){#zQCwslWQd#n$z5LV6zGRg7wh;VQ`=>*#NZU-L} zEf2l|gzx1u3f;!_gd1KR9m0yyTpXwIvB>u7m3aS@FJwX_Q>S~HHsV=d?|UR~1u$o6 z(TedIa;S`xMQ8t%!I#F&qOVt9_KqWFK8s zy8}WSW!b0_8_~kiG@vAK)#mrst!zq_&@Cq{NaX)cV!JAFagiAspheegu2W;{mgy{S zIN?_=f+N3PWIJ^?YsCTSh!-Ihj>Quen=r%6uf1X#?#T|!s1){v+nS|a{Gd6EnGG#CkQ6vze zMSbRLA7(vigA{2WM%5<}^++TTCP(^k|GQcu`dfcRYFXy_D4UhQyc~2`NU6bIum;zf}9Gz!x;o1!FsBi>V^$eP)9PH1&# zd>j>{ujiDrQCg{WK^MG>S8jv2(+u|(nH@X3U0@r0^ghR{%035El#ZRR3S-4^HHB}k z($-WaM>j-DxDKFGdHvnc?5ie6zf07RQ&YI2E8lmptwvkkrKFzH-1anY<}n#hoOUFb=e*! z1uvjg_jSYi4z4;0m^0v8i_P|+BfGpS8^@u`gwCodc` zb}dCMJ34cXL7L19Q_a3ApGX799!yBDE$M@0mXANowFuUC=Sk_z@Sg0Q#W+@K_vdvO zwJr7BxnaNL-6T`7Cp}$jA!@Hv?yY!+%J0s0Sl(P}G4igfiSn-1@6Ytf^RAco7rRrA z7Q3wkrW408-Y9R5QMGNzFPgKH!CQ9)w_L+!a@l#DVynB0d`Ee%Z#q)>Pdi5;Ka!v0 z-l3(V{+>P<)htu@b!;8aIPN?^!yDUBX7G@ri05EFev3ytcDhh%a|I=PU|G?d>~CDT z`_n+eIF2`Z&U-jj+3g=$xpA&_jSy&c4=s06QxaY$9UO_ogXC#1$ zTc&$z?<@h_nGV<2SLmiF3LcW{RXWmNQ@!WeRtcVl+mp|#c? z81ux5-sao{);YEGlJ~=^$y{GVSy<9Zgy^0h)p(f?)nM{O3f#Q#`ZI`QvvG2-Di$_w zUXzp5a`7%ath{@&N7)n(@0`EYC4*{k%rRK>8d&_sfTT;&An(23OF+y$%#lR3zEi); zWyMo=7!BB6ddd?VONrx?_IjFm*<|Xh8UkpfPo}W|ttn36dr2p(zTcovmZ#i;dAR3j z<1rQaSU=_oB&Icx?A^K}rMV`SVhPPr-5x6GRs>sOL(h7N3dK`G>C=*^j2$IsptRsA z?4h?C2!ieX{6)8dkk0#S0>Gj{8>&W%6xyY1JPgpLR4(IhZ{&lOvVL719Yl35ettx# z5q}ma;Eca@@q1p;&B)r~#+Kad_z7L2@)-nC?|~YOCLVr0$R8uqRZ~ml(+a7^SL!GN zi@J*Wa)3jj5R<+H5k%QZ2I6-Fw1WnNT^&soarO0s!1k#Q?Pifg?K3CwGF5cpju;ez zz7pn|5*PhmDB^Q6#;Ffx$o?BK^-9iilm=!jV5GN717L%;MV~s5x0tp2u|&wWRbgzv z(n5zV^$AuQYdWhWYN6C!{=HP-VK%bGXdP8gz@T%p%c5}Zuk`0+Ap!16(oGEc2@Xn zKehwugt1qs=uiO7jLa5|QeZKF+>oH;RmpwqYulkr&XHkT!e3?ZyKD|CSfrAB0@OCS z))FlcF0m4+N=chp3s@O8|bWI%1M;>@ZPt!sA5J6`%+90(+K;+M3#zKRR6*SLm&=U|1Us5OJPV; z%R16T+hDAb+>q9iH+jrjqAi6vGh1J2v)aQh4ThhPe-@ z+n+lAz8KGbhLq*RnK0P;VFn5*XjtSH^3*Hqn~SIn+L-SQ%xQ|}LG&*?(pMzJ`-7Sb z0`mk5bnhc1@JNts-539q*JO^^Y`{vsm(&l>i^#eDQU=)ah(s_6!buYto0`c%jrw8< zYDERcDqAG7w=$I9dRHCl_J&Yx-szx-O+ojFFB_zc0PxZhvdJ}8fV-H2T3lCe@uwXW zr^9jE^Sur-&_u{afnq7JTB~F~---~?A!617E;N0Sej?{@1*zlM!yj$cT%yL{Sjj#J z{X)WljuZU|LGU6h4iSz0Kli$@Yg<7AE!vK5i<+hUPF}B=up957M%9E@oauNEB z=G#@}Q4guzS_7aT?qYY5@N1NN4a?#bj<3WLJ%NB8TESa-guS#?<+NMDyx$03A^GH; zufwLh0?>n!qIPGio1vYn%{o3V1M8rIy z!n@=>aM=2{GbZysLwv-0@;+jhV5rK5VxhkHjAzCO-Uu{_+RS;#M2fL>9P)?-WP`)Q z`GG-0`ubX0rzLA!T2bBV1lPN%Eu;;THQ%MRUHw*kvIQDm9a?0fxnp)p8dPcchkUk` z3{8&)kD)KfB4*;J4eZMq`C3i&Rk2~OP!LFsWVUmI5rCeqfIbAF>HvDF)SO{TzBRHk z!$kFDpjR(rS`IggAet5NP8CdhtV*F$^o++{2N5xR>;)jvju^t;)hv=1WNkC`lJ+mFh!xXpS% zUpfTRwElqj_e;;7GeL`mNvt(tS+$>fg3aE~z(*@wg;WA!l4<{!HkBs>I-pp?TDz}8 zl0?SzV4+0BV8#|nOied@1VhI1DL_QR)tFRiZ3vc#4$6bH<*rUUh{KDh6>yNmdx~=r zgN>!+Z<8V3j6k)uyTN>MzXNe56-~wTXHFd?$I(!=zP`rnw_zbd80ra?A7?;+^i3N- za=$TFRABy+qZ(&X^&!0hw%1_^{9v+ZKR8%4UKnLzs2uhyTZAOUts;~Os|}n52vlmU z!uZ58Fr0uVH#^+Mi}86Z(6w%C>dDnO199IX7cY@rTS&Y-yy|nYHO!nG-w!HcuURE( zK1NvJLrjYcDs4vm(q|O37Q5)t{8bREpI#o9uyA^beut|nkrM`RB=6oBC$>*71Q;ai z7%nPfn0REZ5HXZvv>g|j|6U^!CuYlK^z~s`1BTg?ISn;?cv#8&B{_M)3wh_c(kW+) zj!b>Q8aMS9X{hMtvEk`~7Cz7ILS$&7ig&nXqG3-j)LA+Rqz_W(ELv~^@2rAb$9ECXJQV+g}L{~#?N)u=Hanyb7*REDykO)*5YB>o^yw1=@!Z#^WR@N+eJD3 z*MM55mn4RD=$UKXNM@ngs+LQuES~ta%|7w+0Zh`!EK^-+nH-(B1(`;&66CY`rX>#P z^*&*J%MnsJ;-Y1pANf6284dueekKzxBlUy2(Olgw%mI&{jQo{LIeaU{RL7E~?E+;9 z#CeL8zq)s-(WaccGucMa(I|9xsMBmpyIW;rPqCR@SE~0#iB|8E`sk{Ozywh727Y#+-0PAzD(3-(Rv!8pvG%Vgb8>2SsF0F*IdbvITD=J* zPs?Fw>GBwU3|r^Gj~7+;H=hGJx&hrPicTeysue=a)GqPY#F9lB!OnAmkn477i~GxS zvf~UN5?QWdl<=*&I{3He7N(V!)=;xEU<);&vMq?S?1pfq-}w}WTJr*4IXq_4XHaQ= zQd$8~>>k%a5VX=S%qbdtImr^LG2+zkL;k-qp|sS_YqA^IB%5-CD9BCayK|KDI)mC* z#hkG3JsP18#C2)PgOT;FIKfwv6KU-V*s!a5p`v*1hPY9djaa*IyyR z$_X{^B{D%ozFe=$E}(5q9n4wCLDcyk$+qU>->AHyfS;CTdtlF{CS@FMY<7XkG3T-P zvyi2kjHsbEH}&qSAv}V`M3+asZ&7{!;FqlJgv~(wLCN6s^~OcdtSVh$1`cJpYU{Su zh|`Q1q9`U!aAO0f*W9XLw|ldO%S&@5uo4+mxGz==z4x(6Jr7cUSrR$E7Pc! zUDZrOM2^2znX(s!wx@{ds%kPT*J=Jw@@{q+8TcjI1pVP|1L(C{M;*4;`~e2ujrMeW zq``EB_8`O&?ooIAYBlS$M~j?R@5arsi|36DJV2K`?o& zwUGi}mK+i5XC$wCk7Q^Lk{uU;WhXjDilx{;P5L}tT9C$J_%XSdb`L+R98aFqg7uRH zc;L+t$HHo{NT&PPu3GMj8D>zUsFRDEPH|-mO-!~R9$|h_FMOgfq{Z6^_`i5X{h@Wl zS@`#I6K{Nc*F^Z|@C~osjOW1*`m}≧_C0#q@ z@%ur%5g(>iW=?w^@s0*f{o8M7lTtZ(v2|FVN;r>TdG(&ImD_H;GZ-XjK$h)2UDre*TV*9E==G%?LqGn=+&^^6AY0 zuc`;dExoHiOwepd1efRq9-E_-mI%{IKyK-$3L53Dp4p?31ZEbNHyV>aHlVrIbDjYJ z*9!Or%A<{-hpS*o)7eEQ3kN|2(f8u)Ei$7*M}-n8rs0peNvtZlDy0Y_Aei>MTF znGnUq3K;L;@RBp!cSOLh?6cG535*?3NL#C+EqP0F>u{T7$u`V$M4=Hj7hH&v<8FppqePkMfBVTfKlVHoG4znLdy z)uH*g#xXDtDj9+begpkDLIPYiIVcgEZpl4+l^R#vq$8EsASUf!00-iGkZdC@|FI;g z3}nxJKrxBsdCk?2=an5;UN-!w56J*i0Jm8#%0^@&=P(`t&MF)og=AE+icI0`PTC0^aIS`a^iIx;JGu#8TK*9Bu5c*vU~2kHgUuBmA!7NR3-KQ6cB9h2$P z7~;a$_wQxGRVHZHp3TOtuB$61>5-@6{YhRcJkGA5=xck+3~o%Do+imM_TzJ=9bZt1 zb9&Rhgoo@VPil2(UF7k!&goLewUbYGEpG&?)(3r(DPA4d(FZ-zhd-O7w1>~o-;h;l zQ=3qmbRL&yX_0w9Pk3;ApJUo-nBZGMakiuWF(nwD(8ZvgT&M0u1APWY-Z3%~}w$rLAZs15>4o;s7|O%!7IS zo|?f#obN2mRh=eRb3v#q7rk3yR@W4Sz(^^ zB%P;KSj@MFs=85ju>^S+U`fp=t!18;nzCVqEi1nqUBa=I$#kJ&j(y(Kp+dfJ!LO2J zS`wyqVq5x!cy3HmJ)5|+jzPaAjT@>JOrnV+FR!94ucBi05?tbS^|L=dY!!w}_Y9w4 zH3%wgDds@upC5b|Rqv#t{TOp(EobdJ-X)u^yM*(5_?4TQzC6~{a7B7zA)SgE_HXcT zcJoW3O>SHSVSXjh&9^_2yX}MJEQ2C^tspD9sM){-nP_kFLCTWz-09slh%#(WtRIQ)nDdm!K%GSA-XqDysS#tpTIT(FMlh|P>?P^&j+*zLpiqaf z&Ig+=aOk_|Ua+r|O!CI=eMh8%BDwCqqsP;7lH?&PD|`cBi+l$AH|?NZ3D$>5?_FXhP&)^UIcCVjZL zO}^bSZdYi$F{yV6ab3CNxzJ>6{<{*QmBu5h6v3`kE9Ql-Y~PSlL+tw&{@xEsBCw%w z_-j)Kvim}8C2d6uSNvD7$UiaF|B0#npP0uLU*x2h?HS*0Bv)6jq|~_eugR@$8)(%q ze!+sR9(;m=_P3WL#ci@9aoD8-+=mcs15+oLqh8C{8whP$$Kc-%;2l*h$BW5en=8Hxz0X(qV!Lu zr)hb%UF8Ad_HC3GzTd$$hmefljsg?d`uE+g;{i+`vRs_SgK~X81bwhIRpg2h%q0WP zDI#E45{!bQOQTsEZf*HeqIQ&M{(xi(?AhmWvpZGKYyrL}xBF`hK>tq66>-Vrz|1{Rck|wwFt^p35=UE|-=@7rt*T@-< z+<`PonQcPe_Zj+Pv`1)vqqTol<4W_7dp`IrA>c~>3~@j9z$I9E>a%HZ;X-b#YedY~t@a@(S`=R}$ zbCOK-*;-W{&t+L?Wn{&Gog5O=+OC&3VgzUdX`858l43Qre^o2cH%9Xwx8lEYAd~6$(aT7%a*k8SY`y?nykhky+}JN4 zY!mpVcVzF1RmAdxX{0gd)nUX9BiE;?hPOeVE7dL?R=qU6){I(D=&WH+2%Di?OV@e) z^B&g10evk~s^N#Z-ns)FeL{b&bmtPQK85X)0*GY6G2#8V60F;-CuqE>4&|Vj%cSK zjjv@(DPF0nU`HZ(sBT38nBgwZv;}WVS^!o$a%=)y<=Ag>JVB!;mf^_>{aUoB?=Vdp)jEKTVSQkTsls zdp&|Fg0#+gsK&R-Za~d)x63mAJ#?+K2~IXYT7y>8mp)k~RL(ltWm6G+hfv%tRJ>Xp z+johT5$`0xH-*mcm+$W+aCRczG7i7d^bBYx^bE|sdV9W0di{NU$xE*E`f&Er^R>M4 zS64UrPpgA@QOpp6HH4p{U!+f@?(ZJaE5|rt>}}j|&x8^4q@p}*;T~wLjWw4Ha0k_4 z-#4)IaR;r9|5;^?)BRshnr=hp2Ue~~rgcKeJhg@@zA^S2rg7P?%eW)bWY#1^ZJ639 z2CbT2Dl&dWn_X7qK(OQ-_17-n29wo^W~>`l?}K$+THQXTW1MhwJj8G)B0<#$mqW=QxLA>|CPmW^N~DJq47b{0zFieEwn1R zBW$QJT|N+Z^P`^%u6HQ~+h!8Bs*@L^ofjjMw&7qsP$io~PKWegRQBblkcLtCSEJ;` z@O%pW_br}JE-2U}@JH=LZ3(5rvS`an30$`5Oj@QgLPqAwuWqSHXXT{8Dp?|AbRkhN zu|WWFIlpRFl>NWp`EQfCuc@tqKRHm9lw88BtnyzLqqxYenIKMn^87Pm8e!Akv%f5; zOX#mn=)Yg`q~F%nL?%v4(uC_L8`B{0oy=ezRZ&3~f|$D8{0CzU{eu+$-$^HyRQtzx z)DE7EGH2heGwN7QY55mYrSJsb_OdL5q&M9>YpbjYXtMlQFWRgW@k3mowizhJG*=0a zMsmOT=-cdK|LyiYrZC*p%6zngCw4mtT}CGmjcO)%zA}|w0ES2Nxu*Fn_C#x4wf)W? zN5N_7F0}y;9HZcVc5ICz*9tQ@+9P1YM_px$Q5IMA0JKf1QEXRv744@azPlD4wHNAx*zXdcMW zS{jHqW(eOheVFE1na_O}CW~@flv)2uq5lTIkmRxXd=_mtl+w%h6nqEHouwG%QaI4C^KcGNj`EY zof)auE%i~YB=@i)cE1J|_p}bkAM9FavO$J&&6=O8P>X9DIpN5aITOA!^z%Fe{myh% z&N9-otl06myYd<8;+Z-=`O#i**}f~ZP=IZ(vIu$R>wzE8233o)K~>=3o8q6~8{5wu zl#});ul1$8Yr2^l*qaHimToE%qmqn=ue2tsI zVAT@g&T@A+O;!}d`)ilX9(|x7RB`_l`V3{D^c09Q@OaELimv!#z3Bb|uKo()FS)D6yE zayil2?SML4in8eU41^yC=QffF^}XH?ha<7aF=;<%{)5k|;$r2UgeP%n32H*a=Br0< z@N1A!vGbRe>Q|YW*_j#;{GLyP{i!0k5BbHXk(vE4$i8n_qv-{wieYBv{$!9_3SU_( zvWS1VK}o>$Z!K#x!zUu(Pqh+!4qe2hwy)b#O)_SRftG|%R+mycz{OcmpiZb=iyMNq zy)uxzYqkwdy7GN4O7l_8DZIvgihe(*E=;Edr&rYAT+0tRE9J4wiu^M&E^30{1cWtS z33+9)S?8S3E5vlz@RM*!#+;_hV~bg1{s5k4Cia}qn_@Nd@llUeMs06b84s=IOl9g_ z#gX@&sSf>UXoZ6`PC3RyDHwkl`^U=lTopT}(yAr*GN466De+4yVAI)8pth(BFJfSJ zhuRtaP*c3!E3gnC*+Kagtg8sY$ z(c1l~u@^NWJ<%qN*k2&kl7d7+ytKs`)@Gt-JZ34MA?#U`CX-m45&B}9^wIt-evMj{ zPvndmz{Di7o}lq9trrljE2hiafe-E$zAJ<&ZA{W+t_Y~uqu#%fPcWsr`{Z@0+OG4& z#1HSI@Du2gD>KB|rh*cv_b34fp^UfY?x{?XnUk(O>VrhTyX#}UraR?k^k&WFZhtT0 zamC_vJ$UAUJFqg9HT~4wev{;iA*=lMaxdk&8VLc>YVSCrX8S^fVIP6x`U!I*yLER$grn|pjGo_5Le*4YTo!s$7Q-{AY#jgNHcDq|VGEqgg;z*veQah+>0T%ov zvPNjJb`m?kiX(H~lkpGU^~?bfn*0AGcW4(ek>{F17W~MK5~mjtg8DS0<=)Tj9wk$H z$MKS~CGAEOtR`4C4v;8uXDXHf?mqvGp5k%`HeWrM(OlX72jjxeTrdRdaCBnIn9Uol zKDPn+VaEn`R1)8IELf-kj2w8RMVweMRrC;)moZtfN{cCJWvZN#oYZsO$a>{NutuEa!}6La7Nd#|4hA1bt}+NE zrNEf7rZ8DbHTCh;G4EMtKq|XA?|e1MTbd*^cmFlio8W=A~5dj8*Gp~N}< z`|rdFWBM69@>s}W;QyD(ktw2ROLUjxP`~r85rcl$vL8W0x!r!F$Z6~veh6RW-XQ#- zMH?{%RGX0Av}4p2f%~S{PEqgoiR|-(Jgmnm`MPpbei3C2)c13?kH|5gMwu?x5>LMn zD9XgHm52ib3r8;ZizB;q?KB(sdkJ4LAa5tF*9@Y97Yl-UEiJI+$~;;bohE39kz!7A z4cJorEF1-HJ$P1nfPnvITZVC27)#AyCdE7B4txKG^iHQbjwEu_Ug#QP_B~M(&sPfmG|b%6Vw zXKlimIb5TFVYHvsxp%n4z`9`qeZM8DevF?ubI7A&;ghe+V&`@SR48)w*4FwHBG?@4+y#nzPc~}e#@6eQuj`jNts|f07Kf6cU1m_Rv zbdb<6D2XvKru?b310?ammec=$+8aWW3Tn#vBvkFLTcZ=t?L%`c|a_1H=8k^0naMv8OXWHq=ZqGG+XonNH^~hLVv257UBO$PwxIQ-y@n=Xw8bjL zgP}3gyu{88$6!(2TO`ZvukktkE3d#EoJtWO#O^Mm5rP1?9iJ>0obw`7o!7k%iOT$- zXrRHFh3%)ijUy8?Q5_8DKg+}$#R@ny%(QVuxeb+y@s zzFZQ|D_Pw={-uDX=r*sItSdZlt?@K66eYawEKd+L_ZM1QVx-TUn4SS|J!5@bQJPv} z8BI|JTDfj16TG^ku!w7EDkqNHdZpr-rAL%ig2r-uXw- zTDt$NhW%fPcC0R^{<4DhGBx96nHEZxh3L3gF}h6G=@4&unJL+eBkiYRm4G2DY8#)t zG|%wm@W1G68Gx#P&IHRCg?CcnXjVQ_UV`I515k@;skh8bMp=SM(1zCGu{S>5+!ce- zA_$)YrBc*|o}d>uD>u|I^s`@Clc~h$S7&iIk!t%1?CMz(*`jG1K+|+GltYyrd(8pv z#%xJgYD|O?5!J?AUXq_M&ftiG7Z$Q+Ns=xfLXn;3C6aTKE21UT_6h7eR9=)GV^tHw z(ANAo00Y7S|4FVb->=9;=v59hUBA=un!?*bu2K18fk ziBd_A*d0zEQ&p?bK+-xVU6ON1Oyu30)^qT2ui8aXkGt&(Uo7%+o*(wpBXXr~BEb-c zx3QL&k>{`f>@?cgMNX=rYzpn)9ty##@Mvoci6MU=eu}iqsNd$@bib_;a9jqGWPR#a6@wAW`ACNbAe5IvXbO{426-F_)T4X#XF*+I|O)& zCi5T|aiY4b=!p0RC~H*BC-%=@^A0Pm6WN=l2oO&?Z+`#eg5xj=AS;$h>2fh7*(Vem zuHVWrETG#%Jmy)uY6{#nt!F)(=|^=N`x9x1?0pRxx~mbbuBA2L>i7q`@__E_y#@G9 zNZqtDRf}l?5k-QR(qO|&`4d%o^D`rntMCc+&cQ5Krjhx6xuK~!o^a$H%c}+E0Fe$K zXW7F8oXt+xKs9<1X)VU~BUwA@(@~Yuje)+|h`Zsx)@s!TGq5TWL&sJv6uGpOe{O@} zd%f;#eTzM$o!Dm^%Xdu4Zv+?^a4(}IxT@bV6Rq4e$iJkOz4qAB`H4QdjPO^j^;@$x zk{0|JHlbZq{&6O9%rotbHXUIcFWz;M8Z-fGo3|j>50}m{>USLy9(NrKOOr-B=;V& zC>bn%ap(9IW!)sYLac`yj|3sUh1^#7QdUFm)fPCRkWuBFjE#8? zf|>A0CImufGW4CEb)H=x)PzhX`ko&*AG*1`PXzsm1y#t62KR$-Ji2!;9uSqgLA#jY zRdbyI`&kff0y*^$B`mUE_&Lf21Zyl*h;!tXWTQy4a~AFjUje`T9s{geEq+H-l6Sn} z2p%}15VNkkPt8PniG3*ercr~KIJv!!KJU9QMAaK)U=8|5pJJ)zn*T!^Xm}8N2kv&I zPVYSe*xXkMCrpXB2Ip$U^5-1cIM)~V4H(hQfF|^4j%lkl+QyO?Acnm}wv;eYTedNX zI_tq|#fB23iWMX)A_K@PZL8+eT{eC5P(C}2aHTgT>iWB>b|U!z$3`YdbH*&y0l`9O zD+k(f2IV*>Pm2E!Y$#~^_ZA z6;%$ZSw1T&?h7J2W_0%7z8Qc*S2^axV|?$7VOYZYP=V=PJAN043&Df&Z0?N*g95*t z8|86p;n38`>2kw;?R23p?SAdetjl>07L}xxUn0`W-0G`Yqt)o{B~xS=ODN zA{#{JTtdyvWoZ+&`o8d9e1T?#+X`2`9W^ey=y(eP`KjH>z`Sg^VkLbysbNN;lFoWl zH@Vq%#!fLcje>Kgzs5MW6=FxMpU(5nM&zTj4flbc!`86 z)&7*on0G~1Cb*~0N8ZwoF#{7g2@B_CJN74WA-+OWyHQ95!z}E-r^P*aLcY#Nh$`4u zO}Yd8L3HhNxR|c~z+TJGj4n#%Vw#9&FyT01D4-Bj^m!ebPYsDTwFc><<)%nN)ZOH) zOODq(#V04D2cAJM3+Tk;e`7bU2UIAwv9a$jnx=5e7SCSSE}CO1=E=((<&LOXU8XdY z#MH6v=qIQB=S^mV)_;Ik-o~tDOVk_Ho76DIH2nS-NyuoXZu9FeI5{fZ%hsb*H`*Iu z-JcGZ`l!D;<%rKVp0e}Goul@TD`x94=5XLQcw#W|kAC!hd>-f|qr9<8{11*0Uw4Q3 z|8WHR6<{goE#e=JNKNjgxnD2UA_e`O#^JSR-LQZDs|LPRU_4dikGANaKp*@jYs;6+ zo^6kuJhiWC!o0zvl9EG+A6>LI)P)DK$$;~8C_GYaBgqZy3MG+g17tUKH<9xL57B$jd8Ewbe(?R=l66f zd7Z9jL>jUjt+%=bqfcfPg;6&oApM&ASi23B?SHNE|DFrVGSg1;*?h$s&0l)h!R0SW zrXBhWk6fxbfz8Tk`I^GM42wEOzniS-JNUfCv?D#g9}I!!8;9|}s&mG_HR@w`NMKrm zD_Fd{g&rHpY$Zaj-DMZ*We3!w&$aoGoJml}}U=jfn%#!FbWdA3R zOS!-3%~P1wcmZ8CwmoHw_X+5Grl~=;J;O|^FHEe*-=0mU0&B~1P`dM(H@pvpJ5P~H zLvZtchwob1d4x1{v8;W|bfj{7q zj|^cnZWlpGj=#C&qkbFYMSC%*=K*s84N62tvyTw+jOK<&8`@3UUx3R!lq@nv` zJ@{hOe@D9plUXrc2|2RX>!+~E0miL2*V1(XZNH8wt5g4tEq%-Tz;N-Bx-z1Vahz9% zQwQp1Sq6NB=#=ncObyXVLaHtgLn5S89Vf0#pYG9*9}=Txh!`MvA*CEojpt~;2CZt` zL+7Zinc7i=(pk{`^L1(_;1U)Is!^=RJIK0^enWY|y6dhCu7*Hw4&=o9gqI35Of!M` zdvZsk)%C(h(3c4o)Wl?>yM>SwEBOQSR~(400mgSqyYh@vRG!YMbH5$h4M-w=>aMaQ z9r~0q7j1I85%n+R3hoBu)HGpWY7D4kEVMgc;?m5QwaNaW&hdGXUJBS34ndKIvx!k8wK=0%5hs>tbcHZQpY)p5t)=RVO#gg=MCv6LE zqLIzF#sJOKg-&L%iIa9_DOF_W1Qb^T6|PEq`K@wFWcyjV`y7|Ao3Af21V=s}c`ImC zO)dISO)X28zW(?8PEU7t()J_#o%c56P47(h>hTt( zc8D9u!QN4PnHR25G}OWF=J}_&{?~bJ>{bQ1x9vqu>{fIA&)MSo2>~hxEsuhN=EwCC z%|b;&2HUE`TIw9l9w*z@N2z~k!b>>9@P~jrUF&NVmUy(OF*UAF1MZH1meu<~uT|p7 z3&v%68V7rRJ0RJskEVF+u9vvuA^*>}wyU9$+3?OsIcHUS`<|Kfi+$Hj3s^ghmyLx9 z{eQ|-`^#EA6S=nf%9>49JN@j29xiaFZ=*a|li*xxFSnm76AgJ`_?E!2lQ&*~MxvqO zxW)She%PNQsdAC*u`s0L-dqSlAc3&9h91fyV+Ju6(PEJcyaDKiLONf##5z&4ayw*K zsyrmR__)1`|2zMWR>;u2Lr!u7|FoMN+ zF^Nh+ot)bLXRd)Z@bary{R6)y-n%N^Th)$Pu6R!o7rtTb2FEJk(J{Wc_`g@977gs- z@<(EvcNLgWr!7)q3s*W&FIObx4Z^|)!^5hLqVq=k=2zY2kdyN*I zWCy6%72<*$^ofbZz&Yu|^`yHW%TB{agSs1Fy$RQrFZ|c`qwPLkYH;tin zd+G2w{?q%WTvLWpvxZ_zs10_jb}cYlL>_X;rhDLA6PD(p&mlF5#y2crVls}#7C`8(z07!~3fNgM90~Nc7r@w5@dkA@hNg}F{Zs_O&gg1anI0snb^iW(h-D^3i>Hln zki0J@S`tU2qQyl4Hz!)Rv!_uc9-A;TJKi~d<0pI8)A%S9T)Z10K*p5POU0eywdjW8 zzm9NWcg4$?P=N2Y-XCvD5t*vq0t|@ev>hC+=fTqI@Lsmt`Fq<*UQI)ja}n^8s)@Is zc*9`6*eACI6rSFc8=*)QoM;g`71zI(q&5$)3p0N$ZvWZjweF!%46A%qJhL^$_}ZwF zrkYL9w7;;n-mj7g6ZN6j0zwSs4Sbw4)phu0BGG3O=bO_3M3r$7BExPF1;o_ZB~Xpq zXy&+2yu6J2bK`$`J}tM<3v)k`Fs_Lavv8@IvabEU+2! zi&FPEph%vyD+e=W#t;6-r>kIx#Qm3tlSxR*Qi5rHN}|kM#WaKe-dp; z)6RdaN>dX$MWtb^?xOm}aOzotj{T=BYQ zGNXb7&XR+gh{{c2d+ta0aeF9VyT&Pvr3ewdAlpnt(jHPDN`$e&EFbiTBfO zN%ThQ4e(YeVIjR9$;*7teSfb6-FN+{yuGlP3HT;dQ$gP141Alhkp$CQ|28xN?Gaj6 zu{?_lWio1d)l4Q%>_2JC3}Stp2RCRC^2kLl2_KaWN&}0~I^Btgn9ALbFv6k(` z>`bdAgmI}eUHnH{Rqzkb!q0HIzg4s$KoKzTXC6UFpgw%;H$un1VEf6PFphuMpTn>F&FeDB zj8qC@6YJsXy(UT}!7s~kV}m*G2nt;L@Uyuw@6PUV83*GTMr1G<4 z3EklX&%xZ$=>6|dnPFcEBIw2Vyr*j=y3Ogu`6(k<7f2VwEZcW)^8QGY4scs0)bYyo zijp$UlIbO^BiY!e<$5u)H*CMPiZ#7Nc(i9M2b$q@1?h@!(KAmmXQ!lxJsP7PwHHXi zk*uxVTShcBI;s)>frv>@f$^y$<1}560QlT=qe4?Ga#uc_wNp-n0Ub{i6f4GTscBH(Kkci zlco!C8t`04h6elWQdKEIPlVDCPHgGbAnUotCI4E@)J;A@%xH!IjXl)cBkAo+$ zb48W#F{>5ewJRL@!Wa?A?9ab!8G)&}N?bF@zRo&L$(zo8;^C#BKx~<)co(J*9`$aI zBS!vL8Z?=BUPfRax^5pW8H>3i1!#2~;*nbZpki}l>QZl4yvyJi8c_o!e5XPv#@+__ z^1u>0bztZ;P1!MNNqIipEfS^s|djPkzlzyUvqVJCd!&K0Z01M2Egg4^tZ@HuD#%(WuakpZu!1UUgwacL%kP&FiWk4|1+%GWjxL{-d14nD zfzCq5fO~-u4!>n6Jv}qNaC<(6Ut@b(>pjFxmDqyfpdZzZnGebRwMY3@$9e~oPy}<_ zP~H*2E+Qc;tta<(QJ=D)*6?+TU^L~9SEoIX`j|0I6}V!C`lSw+*n7u1Gz=vwxTxOQ zJ7NIicnN6}Shm_jii?Ws{3Q&IHpyP$le^S@?sffStQOI#l&gSn1ir-~EC> z%f;J3XP%F|DZJ(fiZI$*`h8_FkGi1%3J0@re1e z0BF2wBFS^fN%-MGsySMoa=DJ}rbYN#Ju$>q^d6f)k?uc^0mg~(nWPaUevrsYnQx@#E`&0cF%BlNMd@ld~O|BLH$w&=g z8+uS>Ph!YP$d*@_IyB}OuOz2|edWz1)`I%Kn8D03_6&%4TaD_dPU`ts=kBsR9|I6o z89|`N9R&(otJ_3eEqje|n{*m$2m_*ZVxh~!5SD;G%fD?Tq}F(&d| zBH}~zndc&6rs0tlWi3wO5&VmkwnIV#yi$Z`273#HRJ4WCuXE-5q$)=e#q;z5cZEvL zaiZ8;R&?_1hoz*k+bHq;&D?jY_o|Y~3q(s2nKbdNYWSw(?~+bGZQnq2i9Z#`cZjZ{ z}3q>^ge%{F;87ZHh(L#bXxrNGJFM%Q4-D= zMKcEkeXmXu_NfjQEtX~uH4{Ds3u*kqD%rjbFcPLY7Vzj?_Dd3msXZa|fKi!P^2hqP zcG@!czl4^W&4skED0#1mfBx`PG!TIw!fc*Oj$`sfHJrnaC*x6DcKTJt#}$>`m%(ah z7s9f|g&bzYq(Mjs(!BJXD+ZOn8ZQ*zQAx0AR>axSO8=o)&znk&8SeM}bGjigJ{P^j z=cI&TUePVWUapt@uU=3(xQm4bZq3l4Pf}fwNLnj;=N{n z24g=hzi%p#oSmxe!A$>gw6j$`LoGo!vsIxcp9JySACt;>-b_vmn@{=b$JvqhUbtDK z>zNa*x0c@5Wca{?Zc0+xw!DgxP{08^1HYTg$-I*6*MEYVgEwD<_{YcLa)3XXvnNYm z^f1KdBXGE9z22E8Fw|Uyt83TRTxMc40#qZ_0DCoLN^ZBX6f(R`>}$()bWeq%?O$71K%W0<(=m{}%MikFDJ(cb3`*I8S~U^>HjeCImPY)uId?~;l{lm}1u zG4DjweFc|L(bU!n@O9`F%m=t*d-i6C*>^Vx3Aut6S7<>~qF34**~b5~9VEbQDoZ;Q zXjKK4Nluh9_u3s<+05~jB{NP2%hx$;&Ru)#Weh7+u0WLo&RKN*eReS=@dP}i+9SC2 zO7;b=Qtc%r1}wN=Av8*HOI4+>FC8ObmAHr6(Dukt6(sz5hft3yV1k0<9g#WtL!NY@ zBhhtkGO=?BhzOjS^?28bxw%Oawzp@oluD-I^~PV@+JngG&!^HsK#zR5FF@;u@%Wp~ zbOWHU#rwj-c|I(UP5T{6Xbc?s_jCN~vkiy^tjD^;KimdKy@h%0J2S5LFxa0~aF^Sn zpZq?6{N14i*m}RG*iYS(+Ow;lKM}X4A0fUAJ0aN*ab~$JnGWl2BcPq#Fx=!F18M4lfCWfi7kEJ`86QRY-bXVD?n~)=?v9y! zj{xE18_3RoftS89!isd zfg-?##w!;EpTQ{s`t2uC6jJH<3-4S@SI(~Nx^_P6LjC&%vdu(7r&X}NNtZ7yBeE0x zO{Ra#75hxWlT}N;@FvUAQM2h9{;Ko}(0ygB6@?mCz zqZJZDy`o{|RFRaI#Q_oc=#Y2KWe^yc?$Jz3;dq7ea=I4?*lzW!x75|&`QD&o-%XLU zI8`l7x~$_Dx1qUUY$D{BFY^b5^%Ombui+pV5I*2>SzsKmiCov#hGGF9n{|a%W_ty zChOL4c?DTtLib9e1KAR#?PznQj@IH3NU__poCKE9vrHXa5lF8Y*4N#-n5NOhd%T_; zWx?@yDR8+?bBWC4GG02o$vpGM#I5&L!4jjtGnTOrxXPe*lAbVz5bID;VG#-Wg}J4* zv_T7TO6@bgK}(;GS#r1uh*2}xQKIeWDd=r1+fHlqYgmE@4wQBumlarFA9l`ggGPU6 zQi&T|6vWxF>(kC1e>UU5l8T$SZL2_9ptus4YuzV-9dnG%5my7U-j11jxv8Kn0a|(^ ziH>8xCIm7x$flUUVD@``0xAnsA`M80ZlmXCZpJzUxGGRkKyNQMqhe#DtAPPN zR>VqR;Qt(G=<2tdN%?#Rdsg)d#s&xq5%ppLjlMLUbAI4*y|GayJ2BDCuqht5+V9rc z_uT8#A^LayqGQ9Fns+v@JZ{nNl~KPat-U^<$E{|Fr@gH$<$jN1h}RJm;CrMF=}Xed z1gJoXbIcJQAPIkQe=c!`7<3=^hzkm;+0u^bpAmK99Y=*^+oaP3~y_oIouKh-Z80@4TYHp{Vr;<=}3?^A@C5?%%fDw3rQ7fSQ zCFL*bNPb*X@5tY7q(=kM->HnvJrYAbKX??AB&^1JZssY@JJY{FG0B>&Io)I*G$rC5 z-BA*S(<@22jRi1%{JNT>Z;Aj7K^~A_owbw6Wb0J8#0MuZ)!__n$>X8)s6M4wm8m27 z(YbtW*dx*^_G8f1Br4P>4lvKKT*&6?m+?rqbTA~t%CxYJ;31+Ev7a3BWHWl|vjHL( zqHQSf_l>|RjRwikX*tC!FLu^#Y)lgs8@+|Odx`L~l-AZFeKI8=ulZb9y5}}!Ne--` zoW4~2i`;KL-fb~jd>Br7W*!Y4KE^uqG6=QhzGW^ewz6sm8?G-QKT}sjn1<`1_moKt ztg?(waf@_YeYuDoM+xOX<<}`VRvShy&DP|4feI^UCtVQ%Se07ZO%DB)N0Bdmd?|01*zBUD6W$T6(w&$;z zcT*Vkq~Uo5QR$?4NCbi`DqMkl2AuFNS1H?U&MHIflkIY~ceLx0U#ZG$aCYovz}!ou znU=!~AlTrNluGc<;B$XET`~c-3p6o-m?h9Jh4IK~ydqO{z$)VKD%_VLMc8b&_!C6C zk#F}&)zXB8E<+18P*_@wJWr&5k2CXq<8h&>Wg;2F(d2d?iWi{Cfh4=E|2cwTmtRU3 z^zw-1(6_a!0^>fN{PHO?j(=_^ZJnt@91#DYUhd}^l*djc8fwxfG`>yJ#Vpgi(|<{# z1E#zXh;pEIbptmMe3nbIE|`GaeY3<=lBz_y5@2Jjnv2nH<~>`atz9U}os87F&FD$B zoX_Z>^LWKsDBAD=V?1!H{&>^h{;a52bR78ixxLfyQ3JEfE$5X@(Iua3mj}IGDpjg3 z13FrwIq%B9tKMj8n@zq!%dmLkp*cSRLrzO6({A#1nJP8UmGFJ8UyS2Z?Kjcf<8)c8 z^Zsk)YyAHi-c{bI^Lyf$TRkmnX6cUuuhB*~o<<-3${bod?ATS44*_rFT*(EZgx~ZB z&`wj%?BmgoJvL15r_7hGVN8BHK1qxo;F&$(X(sYc^XgTpHBTu2tl$ZKO9JyS+gLfw z>BFjp$Tdo>y&hKKac;`Ai>G#%i%9$uU)c$VU)AZA5wRQs%aamAjhPi6)74IdW?2Jj z6Gfv=b>&;!Y5Pq7m3R>NjJHU+gj{BdrQC#KjkYXG@xnLX8P9lzr9FlnW_7yxnQ@gpm>6WO>rg`S z(efw0uP?xXIP(z`5=f4o?YO6S2*ag0+=@Oay#UN};_s+tiQJ`od=BwvW?=TB2@pq> zIEZAdmXR0iW@g$Ri32Cd2)e*dlvOWe$4v%enI5Ho+PBqmdMECW&^wj`xM+_k z5FUy{W(WPEd%q|O+c*pfb$W&rayH2B9JGZMF%9i9eo#sZ%r>`EryO@`C}2{d!EVv( z(%xVBb8lyfXikGUvOz!2y2<*DOdz6pY{%Pq!GMz=MNqm`S6${uKhSaFr>R0gfb5wI zn5rmP`Q@fnbI0I)_Soi-9HL)|rpcJxDSmd{)5{G7+%e0(oJ9TzB`ObuPe0l+m$~eA zz3L_TlnsirY$({7w%;~O0g)(k_zK^_WZi9xwdFq@d)|)iANL2d&IHs2EsB zy7_fJ2@LXwCtQ5!;y^82K<*c}lJ|(SMI{jVD2zqU1P3;Ew5AFJtc9 z!EN#(L{Cb@Z*D}RZT0Xzpzhle!I}g)Z@yY$NYfdRz za|o=fmPpb@Tyl}*9pX8x>l)eh3 zi|8eFAyuw{qaNRykAj9Mh$-Td&=e>2RoK$_g7K`zw~G6g0a)cdG=us!Ab;ih z59CB)m}!*}%GyJDhy=b~Y`Do^{gjh)0M*vVpxcWs?(b&pD5*<(@NrKhANe9>Bcz=} z#=n`+i>W9%ykxa79;axc%&a15~wF^I`S;yJs$EIv-AXIAM4&S47@>EnJJ z0!@cA{O!DY`RFO3;W{rcz6b()kRTCS6MsR{el|xqAxz5Bu4G}s+G8M%50-MXq#IoP zd4>6|n*unR-cL8ZI9$^?M{&>YTZOmVLf;NOq0n!n*^|udC*(2FWhedX7YB;tQ&T;A zqNCfjx5yt05(0>s#2*q@jfWf0H;D2;PFp*Qb2=M~$n2?ZQ0W;_|o` zgotjMV@@k`*Mz%LXace?I_rhIaTK`Crnh;+bY%%Ud(5OBD$EibjiKT*IQ9YC@NF5C zMk5Msl|rp74LQl?Wu`jx>YMn;t{MBtOBo#^{NG%{_F(~oyu@8Ul5>w|d`xTl$xYux zFvNb`jb}d@JgR^1m=-gN{TW2WzX6U=3rNA;_==@tPf zC+tup(gE0xKvls+tr-Dkxg!yb4T2=LD@LGMvSlan!IN-A$w<+7rW8aRpzRnQN3Xfc z^SKX58-)?k0*hm<%%@+s9_~Jz|Aw!wx|=1kf82DP{x)-b&#TyRPw{ahpv%ko$>j=h_#0B7QBp!zqk8uJjIvdat% zI)-mX=B`N5Ht#s^?7Y*haK?-Hqc zf_k_w19j`EPjJ|Pf~S|RM8$p=g8$y&7kNw|cD|92^S+b?<160@#@5w6R9@WNkjt-* zdOpF(Ns2`XS8jy#WZvOo@N$|xLEAv^Zm8C1{nIV%cQT^azG(lfcqEyp1l*bezV8)7 zeIM1jF_t^?%*`;DNuR&WPbU5i-U}At;@e#x9z@*~j{9F9oPSq)A^MSCYKo3>-7l_P z(58)@uH`6Ndne85afc#mX_%TzHLCzMSiua#?wpV>QaB{tO>0rehWsS;0AzqoN_@Bh zz5y?zVz$R!0-)uGReAYdFnF3BEg2&=9*C(glisb&QZPD06Vi9#zSD~UjeD8y-Gc=iN=+$E=1-EK96~3ea|zL$;@BuXbu*5VsHWZm&z~z35J~}zK`6PjWTePe=rY`oVXeU+BsVH@yU(IZY{VGMQ-W@Fs`peWQ7pB}7+3(I zTHDYV_s_$ydyj!?T1FfU)?9$;9~WI-b1bsRyz8-PR)-VRzXk}B8d6Unc6v6afH23w zo)N?BGT_Mqlu3Ue&N0l+S$UtD-6k<@VyL>DVhV zhHn@x;NWQ8Go0R&@2m}=XmV2HK{}3*3xW=BmlXny!U5lvbsn6Hfo|(~t#HT=$oJ3S z&#kTB#D^hFWg3mioJQPcP!O*G_Zg|DgK0_e%f`u-_!q-tnff3QoQuNAm9-gW{d+`~ z0skoesVZ;b(mXf;5)*a^bYt1J$7Y-NJYaf^lhXOtIsK< zAKnyFYTdoIN+&N`-*>{<;^`CXXfBq!#|KY|1GzBs40U<80+6t^m&~!ncX#*`iMw9-U`|tYF<$MeU9O;)wi4j(>6SXMt>-yz3jd1U$waI~2#Y zPq*T?@7x~B#$l*jpG5{=-b1Jigwi`a+K?9vXZ8y3D&__~H&f%x@3R@inji*BYYGfB z19q56@NZ%CKbm*m!)Y6M~;Lzdj^%)nL{g zR;dS9kHto0%2Lmp$%}uphN^avptI}t_fr(kZkobYF%Qh#eBpR8neN><)rC&QP~ER* zA!j}&*cz8aAbUejx}XZ({ZWud6L7iB<*4H_6~JjCC|mYgETK-x54wBX3qPq{Wk8j| zY~E41WH>X~YiCj83G(EnXd-AZc9Xx^IpEKb{%`@YL&H8Nw)qPRRM<{k_A%)FU= zk{Q%CwQR#!e_Rq?Q9d1Ky2v(iBl4=5lZq~HN3EL^jq2_k7h-a-rMRb-S4&5V+uRQZaj2ZBTrKHBv4yn zQ}Az!jAi!+GyeL4MT5gHXmm@=_fxa92s`TTbJBaUUxF=yTkdjR?U~6}cBvB`5ZwSP z%!CqpdN%Cy@*$L1wforVE&kRnnuh`o>Vw%h8{#6a99 z?{}zIce4$1o(>oz?}ik=IPZadJNY@{On})e$1_V~AkaQzFO)CPYMoEQz}DJH!F29> zADWruWJH``k3k+c2(hbvopwB~LEuI!W2=AY34{iRVjZP@|N9>usE_A;p*rBaQB|{&`5}QVQ)d^@0zuDohh~p%Q953kp;G~AACU{jX559};wQ*pB z=Z?Lmz@HamX_x8UIDeWr7deeMDG9xV_Q^f z-Yo}qf`fV<#$%5;KRw5tT0F0=?-Yvo+063uyHz9OUm-pZhj)AyB1<&MGn6Csb0(m(V6)oKo7*<%IxcE$v6-qXm>AV7T6U$Ed#4`FFan3N%&o z;iC2CICD0McYr2*c3~G}8i#?1evl*YC8$WX81t%wRonh-0H>SpPe1uzP-C1i z0|lkNHC~7KtcJEq_bU+dmBw#w7aervk1eeEgSIyr=(DpxR=pL=eO9^b!0I#3shnnd ziJM50n3D`nh(;Y10wtB0+h~IU(mIlE<%l0o4th8*rXgb|FeWK4$?iOxm|(p<#+0Gb zAab!EN*z&%clSzjH@fkh{P1|bL=O7~r*h_Fzy!j^G^KeBw}&E) zsWu>BcJi+v3`V7;eVxT#=^(2h!d+&tXN@N=pTn28EqrY7F9~9+w{GWNb}gEAb_g9V z)hp9d7TT!{)O5s>4|zx*{$DmZe)62RCVt+ z8ra=*hixwGJu^~09w8XM4JaO(S1l~nEubq~CrTr?5L3Z@bwIQ`Nl}2dteJzT@Gsmy=<0Sb;h&z;P%doEq_XN|gy*}-ul#?!WBcmu4Eqsk?IX}&Uw ze1}-%(wMq<_NUo*DRmrz)*tJ9fG8Kd%T=bm1$5?)j7^*>A1pGi+WzuaqujxV5l&`E&c1tBfUQ-BnV#; zp_dC13%{#+=f+v&P$X!~uS*PpKRxD9!605N|880$hh6b1>iW<*g7Rm%?i#!Xf_@1# zgotorma9k%-GT+-wuMju%KB*}&=H=q^AF;}Q#$}~)m@-3Cl(ee*7goQJ{~?EtsGeY z91p4rVE|>qYO49J7BmMh&bWV!U>B zrR;kT>?s$Xj&b?UI8=lXVB#D9Hux{ry3iVSMxlP0UOjC1FPObNm7PSS5(&iOzObBLV) zHkp=9IUU_7S&SmGDWVm^BE0u@)zp|c8^jALOWcu?r2ioIvMROkLkiBs&EQoga}=Du zneZ@+h7eDEYE_j-a*MusFa>FT^3g0PfqzlgjLTA@)0xz(!5A=mVuh!}(B4u|`AmTT z!hcoXTT5&9z4}XAT&$-5@9*xMMcjvjYVY`-9BeO(HdTWM>EXB{-VQ`TiEV3*Fk`68LMH?m;Fszc9)}Fw{z=%2PTMDmd>up&s0OXsxRYIlf zgqZoxmoadSO-)fE8deWPTeL*IPJUWs_xxey>aO;7ka;OL+}%vn&(GE?N?lgV{&P%Z zE;e7|Or!&8bNs!V5i8B8XVXdXs9bY&FA0oyZEMYA1ZenxqosR;bK4PaRYGe11{21B+3orE3 z32i(?Y9MHQhT&e@sZmnSfooqM0H5I4mTQ}iks>Kk8N>{}uOCidC&+|{#_NjfFbIy! zy$#)@@NdKK0(fMa)QPLHlm?vi>;|7Gz*`?rZ?v`%_$A#=^jgzMDvI5y*1bA|c^+bJ zB$G)%Q5Q3vaLnvz3h&k+_tz2CEm)NcO7e%_=cBr132WQz?(Of3kVC;vXhvd$9K;mA zoO~}MHgalQTjbnm?{4Q7wR_76J>~4mrzi8fn9fw^WL|YZd|eQux8%ecN{gj8@hvu{ zrEH2cE04K;tC`lAahhWEMT_OGwMj3g?ccUtUpXlP>>AbzlO8ff00GeaqSwIrs9mR8o0ldA?W=dEI z-`%FDFk47^wX>jfHYv*AD@u_uz~KWGUXG3w7osfa%;PYkrdyxPRp|$fa}=SmM3df^ zmu9GG&Me;#CK8ej3hhCW{EJJpcwvqBoA%Cm_7U0Yl@|RGJg^qkql@)fm{LYKKboS; zaDVmg)a-4lxPf7tiuf>2%}Hor5Ls0s-bWide?Vdi*#$zv_t{{DdmZ;m(;IRC)Y_#< zfi5!+5n=@Lz|a3V0k~{wqCq8k8C#?>dH$Bp1kQENFJnIr$uv4T{+F9YtrBw_!js!t z?7Wv9@+Bg~Q;kgZ*Nw+c5DX|R*}eeUpDw4I=JrT!|6b7sN=I&bx{2tHEu6zLN9l>G)-AYJ*LjWXlp@#p zRc^}*#0*x7N;S%er90bP^j48S#Y?&s%`3K#ugm_O`Ck&#<4{6NJ;RM>B{RuRzTYAT z7{~liv2;;+g;P35A>lhM1d22+c7*dy5h65a>(?-^N2Sj!oPGw3fzu2Gcc6lWe{G>y zccBeubPp09=?cWVcLY9^L?FslX2p;x9ZS|6*w+tt5&LjP5{f4V+@^obrc4^ODBnbH zj+E4;IY?8i7h!sHeaXc!P=D@3`lGl^n6*134kFd-n8oX3=a90B)X~Pg5<@OlRb(9v zFL9Vgaz|_PR*)E+P*+j+x`xu}-pluapBqv~x>uw6`)W81KFIic#=C7Yx)6oGpJ~7& zecM&I0nUV?zQM<^H%K>f&^lG+E`H~z4bqS1R*j})cO+w<|6XLNEPPC43{I8y5EO>w zG-=&o-p#<6$PXCPtqO|VErsU%zt0p7#|gyFB>YKAxuIubL`(-kuXbIGQ4QWs?ZY&v z_qMkE;H_KmxEjqgTrn;N6xs?VLD20$G$20o6hfp_OY2H@Jn8))R{IdW?(FYqJl4^n zpu&A~ReZxRN5Lnjl-9SG6TNQp4iGVzlGdJv=peZL&+tQ3eZJGI^JKqmgwgct5MOh? zHm^$~ZiiorO)#oPeNZ!YW|Rg|W0)^8he_#7{+>teOt?u*+X_2ueV<@5-43{4z8qA5n#MAn_Ho_v*;0ERfN9D%-o^fbve>7vk z_Q+ZP3a%PW585j3&-%S~2tGJ%+~OYaR_bB!8CL#F8l8s^$&V!r3OuN745X-)SG8I^ zzWbPwT)%D=k9W?9v^%R8CD zaWh@}`aL5c^3=IUDij07b#Vx-xB1LhGyR@}K|>xusnfJuE$33J%5Am1ZZF8W81D{W$1ef* zd~B~)xo*so`1!}z?ue2b*YA~e;XrwW_xx$zne-s z-aM_!pWSGlUB77kuSUeL&9ucRUV?p-E->?`xOv$Aaz#@)&H9Q1*B&w_tySdFJGbXHs z|JR1%8fqOrMa%vcwX~d#Iki{)Ld(n^4vwgy^Tq-=FEylpFn5FCZ)RYfSEqZ?M{&?w zq%03-WA0{~(k&0uJu|c^uh^h2YUZb@XU(i24Ne^I#q_V@RbhGTddQoe>VF&R--iV- zD~zYKsLtxV%ksvjP3W(i;+99EkkU29r5UM~a_`YDSB2Z)-rHc;*S@v;C}%LBK?5&A zUg7>%UXtUN&kZ$t#7EfY&0t`?~r06*Ww}Jd1g}DY|pYcU?Ki=qdN5oI(d*CR$Um zMy>4#_)Eb|L(RS(spD7tp09w|I8`3A6zXg}SOw40RfS4nE#Qzku zuT!Nu72p&#V>QVkB$ul?exzVsT;BrT*Z=S&lJKFr!BF0G2IHu(FA`R zW^y1`(OCbQ=S)P-5sZk0qasZvY8PeUlYB2?$}m}noRTcbX3E@Z_FWJ6Ot5*fK8Iw@ zt@E39e0F%g8I6%8qc@?f#swE`^~Q4-@SDDMp4uV~Sy0N+0r%kuI}JkGYfT8;%Q_Q@ zBJ#i6$UHfBHV!;&wp)ZP)MK%5131o}FXIStp1K6tk(vaHua+&X%i-nCtD~KUOKS>s z$mfC5Ofj$>(0L!c8+{PjaDX@4iN%%`ic7dkH;X&Dv@li0Hd|ncBMs1W?%x3%(VQ}R zH@*gj#OFE7j_c|?LB2m6Nb8n4QlAeK%W|JnV9u00kEksuXcVBOo{?B{?h*?WGCcOT zTzqM6v>@`J(wAgZ=jIpQE;C!pe|a@?U0b*7U9=W(=RT?39C=3!HZgCY4!?R0ZbL(_ zzNttJXT4J{Fr%*^YkrzZxeXho1RxuIC>6E+_&qDl5bX6*!~uVy2m%*EL28*FQgkKn=Kx3z=TVQghV;F ziJ2mv1{091X8sL0x}A6OQW;sHPCMjar`3A8-yotOtYkEY(7GzxVrhZ>5(mJEwNcNTW5#sJFw+=aTJok zAi1Ns)LX@)V7Q`>1v@-Pysh(KcGeM^jJ#v6rL>NmBm=Upt7;zJ$j|@AvcfbmNy4^m8BSH87@4w%n-;-pK6n2%^te zUwW>seR=Rr)EI>}kA1d?;Ai-PixarWXt9?;%ex8xiwXQg@)kj{8(SrXr&2YL{kM#z(pN1{(IgLL7t1z0op$8``)5obG){NA~P4TO32hhIVU{Bm5+ zpX;+6S>Vdu%{#Gcy0*r?)cDBXV9(8|1X_3_u6S;+PUl>yU%z5)$gcZ~fBa#sg9T2mpW`%jl z^HTx)5{}8Qd1UoiI1Nlr}jNU_nVW%1=r7KLC9|g1>vUUwP=@lVeW4%vOf5 zJV6-mBZ%oM#((nFg_Mg+4S{6tS6nh0(C2?8(?U)1VLt8YxbC7-7bq&Z37tA^B?OMH zc*VZ&WamTKqI3)h`GM{d`xen_7l?v#m41T=wVM`bAe^M5S=lma^lo0w9xVr&cIrw7 zEMqb6G64v&mSSIz62-+WnBso;nO96$z~TIg)W2!!d7QvzH%kd za2h_T(vAzN@1dPTpg_V*KLbggA0}Bg6kkFb4?%qRR=1NP`wyS^gm2TBc#0* z;ZwBw=7GdS^#`0CK|pxDQ}P35i8z1nnA7Q zym#dH4aZF6(4Y*3-D(&s@c?V_$%Sy`0V9doecY^@AT#@daS#*TC&b{_9rN zRpOVOl6%vR?`fkHE>3dq>3qRBWrs`K+_(A6%I-+^-N-5JK%QwT^5IG1nO`5sO z9@G-DXq}XXb-<9o$=!oFn5^l68p-iaVoO#O1*%;74O~Kvh~pwW@5m_1Sez90UG>bU z0VKD~&iD-@b~GrQ{d!RA@vU<-Rho-R_jxnBG3G2Oxos<)PPHhsY|lHMLIOp~Qu*ve zwbD|ZFc20%1%Nq-PvLe9H)eG~hh+Qw1>Vy`qkitsfAJ5P>-a+gr%z?LbluG9EJ^L* zEDNEm;gkcJfrgk0G|ooT1U`6?d`PDV%xnx)7nB0t`;Uwx%hGpP9| z?C1D%ch@s9YC^FbnMdx0UVV4hZE3f%WUe=erQ09YS*zI&;$giJv>=?N-|uvTcC8)` z+QUv5cS2GNSNVzp{dIEAUI8NFV*z=~cgL_eLN!oZ4YUSrMiOSjWKnNPlZE}J)ohf! z$;}*v(YlRZ$*V@YUp8K+)+*~&Z`AsovJqSL(jnE?9PiroUaRa~x7+QAcc5rT^_%dA z5DNI}Mj#wrAV|C4>U9RuAczP3e$Z+TID&NJCKhLUB8&~s!Ja~%eB5T<#-c*~xYw)=YPF!>9=3wkFm4CEXgJ`1Mh(_!4%=~U zK$a^u8hx(}REALth9%zwa}Mg|Q-xlV7s}!R1nF#`b*Co0fi(*lNGyniz10ePO*Rag z-R_VdkZvpBfA)e_r&sR`IuUCNpYHX*Zm}3BfiM~o<8jS{zdSg2x^NN$HmG%mgKjX4 zyBu^*)`GAWb1AsaiC8pSji~IGU)$28aLD=d9-Kf@z;^DB-?yeID)lCPgGCJmVLb>BzK%4er zJWe7k`8I-&#l;QwPc1Zvu--6@xVQ_Y%NG^gz!6=t)p}vR`7h+F@-0+fFr;R5ro`H` z{#vU3u*`5K_4s`VJZB~$%HgVJ3G9UPvSAc(K1U<4DF9r~>Ov=~D1r++kQIFrol5sc{_r6D-wnJR{WE1`fE^DzYu3*%274;dAU{E#y zgdiV-Fi9ZNBZ*OT*QBaG=mu@|I?e#g9(l(ubi9C)O9B`drsXr&rjomM(RAbhk+!jy zVTLoYyS>b};gQ@>ZEJAyDlwe!DA(r#+YGxbx<1m81c(TKqC0SBg&9`eX>D8-U<(67 zeU7vsk|t{bQ>(KY|zV@V&4oscg5 z_EwbQl(`T3Sj7#=kES+!9wnf|r>%B*FIf3P&%nzU(mAz>dTr0ro)>-9F%fHD^0osO zg)?AAg!npINUFCiil7pz!pfmjTqG$YKR6N#GFRVxs*qmj#RL-Muo$PNvjs68j*ol< z9Mk1f01UPu^iJ{KI06LCU8F@b;rybr=VU!Aqf_4U94FP%(Ub}ooLY_DF z1LBDa3YnxAae6rhi1xfA?JqoZ$ygeQG-oa?lH5}qGK=)?^iTFqQlmJox; z=Vp=G3@g-%1Loh6hDX1O*Xx5;6n29~#A-pSUhf2hK8u668Mf=Kc+hOO;uWx&R;?VF zf!J|`9?fFp%_9u)Fk^n`v54!r>98IX7WHEF_#PAEthgIfU$`VLQ!{>HpUyIQlul+5 z-`Ubsv?xh>zkp~0bD~A$%{$y3dfur5vc0xQ!wr641HVmWI7kNDTZQPbEt~DoO;BBp zk!cCW`pM!ecqYu2^x{+T6s`HN$@omXJyOwn@%uiB!vLjmBmKobeGM~YW=5jPzeSkx zWR*A)cw(4Oyh15=T_Bf0XipY{VnOnE|E&Otd6Th#vR~S~+CUUv?5&TJ@pXuN4QxN( z0^hzq`Ht(EZ-e0%FO7vZT6fpI$k)YxTL>_*AAA5bS)fYl{;8mfuTw~jIOB_Q#ii(? zjue#9RGk=$6NA2PacN>wVadw_UQCjVuEOW#8gpG?es{rK3zP3yob9^FcbfIRHf7)O z9Upt0PQ%e!zSG}pmVX9g@(Q16)ZO2?2>Aj`X|)GvQScW{vRS+MSoZOQaeB^oNbHCX zK)qz5Isp7K`Zb0wE&)a5JV%PPU$bz{jVbUSgFbT{ina0AqOvchR8=*;byb0`AJvRv zGCzaV;9`OA37l?2ANyS<_4WEKo&1P63xo-PWnvme?>SdYBIyd`orPJhS@D4wU7m5G z1pI{qMNLyA=*IU7`gBaw3JeX%lV7ZVy{y`zS$Ojd>8f%WJa~F*A&|ntXh2i+Ttr`= z+p)fVGfD^HsDLX36SiFnM?Z7T590)fvECqvJIz7Ridy}kU#qo(PP^S6v^%wSJzT|m z30HS>RlZ+WiJKAm(W_F|E{SvvB-_I958=nokEmWshs8H?cs`wrKcOk(hZ)Liip3`p{jaXHrgnujk+y2 zn~g(>!-BtYDA_oaY#d6aY~xU}aVXh1lx!SIR#+LG@~)zp*;wN4{6esrr0=rCAu!eK za8EaOxQ!j|cI|LzAXsRDyF&}t#`3YTe5}**(Yigmh6oEYz;N3ZZb{!EWAOkdtcx94 z&9hSL#!Z2QCSxf@DWn8K<>j%>4uCdt(PtzV-HZf7JlTGz#!$>Juj62sEYTWkd=OCm zuKD1+5)6R(@SDllBCIC+f}frV`9K4|be2DATgC;+Gi#fh$L53?he*`Gm%F zMDvDtSOqYekX`Z6+RWy=al+A6srLAVP0q7~{oI#RKTYOJv#6Gm^F7p0Zo!9%=8Jx+f*OmJp7oP&(2Tyfy5Lz zq}?~hZsRz<@}l_R~LZp`Vd#r^;JFB zH_NqeTeZhxmxltGzlzxa3)(%t8%at=eUNRH{W>pNhtK(=E6aLU;&Q4KY>T#|EKvG0 z-44`0N_DGaM@Hdn9G&5P#Z<5@*b(V`w0J|-v>(laxJ%K#TEebd(v#B4VHz+49$i~0 z)RP$1!2ER4M&3efwda{B>j70ra7IaqIO3f!~~nKtjfB2c$A(R z8gdw!$gXo}w0oncPnsLDt?@i45->rMU>lIuFOm#cV`&+*O8r!XZ6RC(P`_ z5%;X%K8jmFzIHyxuOSD4HvoZfj;rY#DX!X^X2vxFMyW)5H?eW}1$5X7g#fI=A8CNH zI7+0XS#cXS`@V4B7x40%X1yW-qEqYD7GB^>m6M|wDFbowlbc#{#=lK1xfN>3HEy+* zoCA|rDI~W^Za-c_a{JGsf}9?+nxo9LV(~av@7t;y=PoSaEmgLsbc{9DjVt{|wy7Ie zguVo*P2D&bYuMC{s|wVnZXEsF)Q!{oEhKV!AF*5Ots7@E2if=9b>o}`Z{+C9*NrQ{ zxkTN#Lf<9$rtI}))QxLy>c-t%-8i8jqT9jMA4I{prggHsFQH&uaZ=cK)x)9&xZ{Fx z3LkI$P7RmWdAEVc3@aoth_vzO^AV}5D1P{ijV`j>XhC^VglWt77%C}IahsAZ6JmLk z(lm7_RQIfUXQ%?ssI)u(4B93&s3#v1j+Gw$&A$k{JW|?TO&b97rk9}cz^d-XFdVGg zD>&D@(}HuZ{Ws}jK^d>MgZ3K~GSah?DFw(`c)>Xj1lP<{y$FRgnPxMOBX{}%qG9DX zr&OBgHOr>Kt_aAT1_v>1lJKs`eY9NKX3H?Y-sDluZog5lccUQgH(Ei9Mcp85Ho8Hb z_2M?`4;%gZD#@di6A?bnYnoY(yJAY4ns|3z6Hi(k=6qDoqSS3QoAoYh1Z)rugI2%Y z3woV;9JGeRes>skqiCgM^P75j)%~;d?dXM3zr&y?VZAp9T4A#j45FwN#KU$i?hRX= zdbhp8cBrCU`5v5rX-z$s#JRR`3w{D)n*913c*K98z80Mt(ZNyBH2L;N{sT4uw%{i) z)xE(nC_O&?@kl-X9n0jezIsSt&uh!~wu? zz2i)5^w*;>W^W{M&SyPfwMNu!wu4T+T?<-+4&%JK$Ip6Wz;ErW+itP;8fT5-6Z4Mv znFa~@%6q1pfgFo)aO9lr9hd48nA@^#4J(&dp!^So zH;{ZxezPFBQ}lGf^MYcpGjCgE)KX63?mSB%T;ebDv!Luq2tt`CncvZ-O!)7CV}_B! z>$iXM)Emymq24BQvejJ*quWXt)^gGUC@hiDlW3B_3|x<~x3K!s?ch$b}H z&56$Ku-|I1K^R1RsFgYBwSqo>6h!rQa}b5S4y!j-;JSP}UyMgrF2)OZqTVfHzLkX% z!1N4$@$-|e-7Zllv~_FH`8I)fE9O&wd;*6B(CaBsZtTj<@^ z9ul2gaVJB5$LjE_R1nr%T<8V8bvUetK{#l2hb`8Khr?CwAQUL_1gUe~+DQ@frEMKB zEp)9o!CAi1MBh}zRBmDWn2jKC0wX2xfxq~MLhDoUnsT#YI(h2Tdp{EQ4TDy*Uke7kb{KSq{V=NchK*jMwF+_|chQkU!-Gw% z**!<%6~lSZS6^mLk{)jCBa3EJ8HT_-$zt>z zN#4seM9E3@LfQzf*7un4DRIL zD%b_IZ$%|JXp5h!n%!{6RCu$@@{o?gF*sH8Ne*WtFhh|1@6E>S9}p zdXMsrGFw&IEb4I{zGneh6|5vHod28ajK&tZ)FAPX(@Wkio3ab99=kT0J|T0)NK3_j zxe;RP>+JxsVnkiYY39)A8oTbRm=a4wdmZcX&qR4%1CIaBAYzjCP$ zl1B<5c{=kKk7&XZjs62HC@*amKB zzhxv3{PL8I-wndaJH&-|WL$>UFNA`xfuC3`GA%FvtO2a0v`YmwQmd+E@T;#1S#6QR z{VtuMQR^aspdAlXrP4Ggz3-eVXtaO=^%l-}vV&ot`uYlTgn@b(2T`W2A^(rEKth%# zFp9Yo6`iQ6;xd#+bi)wKbf(OmJ{rA5@cX1y)S{ zPd?Rt#bQt@0h96K@BW)+cO(U(KKRYoM{nMwpI)ujYjm4&JqT;{X3&azouJPe{I`Ce zwd>t>*lQCVtMnD8qmX^zZpu$+b8EPVw}!jE0NB1+me40^-pNG7MHiJYmPT&f#JudsK-;CQ)GpG%t z0R)n=V9*F_!7yqLhpkpv8`N4WoHkl-Hr5( z9z1=Dc;?+Mq^g3;bQX>dDIRKHR*E)^>i7}d1@Tx(3fYb|ngRWqDrW1=cYL$A{e5dT z>noP654_`>-%&u!uZV4Y(Hx>6R~lr*HWPqUwb0}9TTVh!5oLR8O8*rU`^GZB7}r(r z*Be5=Uqun@R)e;sHa1$uO?{QD;&h&h-s-@ygtGPqL$jBPzW(Yf)L9xChzW1$CkBg9 z_GC(}1j&4+DVC6UkHH60WA=if&e0I)+Lr6p96sk$J2wOgFL;~z87Edk0;UgkGMp*LbyP%K0d6? z+Z|2J<3begBSp1CJ?Yr?iKuLFLOTya7Lt7{kIWktnXlN&Q3^8blRr6n{!TA-MhBHL zPNBMOFK<|23fdUHB>-yh^A)93X8Yc|Z#0Q`drQuVx7gY-QsIEL{2eyRi?AI$6Xi`{ z?{{`Q@d=rZ4b!`>Cb~k;<0BMpoLlBzJKC2C<3}xG@8tS%ECkmFU$9)ehMau8wYTNh zc7CkA-GN{E57S}6!H&JthIH}W`29G&90w?1C^&X3QF^tz!VF0ipc2Z2&`Y8gil8KmxZf9L zDoSoyDDo%YpmZLfptSR2J+J3Cr);0f2&c(4Ks?4NM9)8iz_L@KIO4QIMA}GYFVxuq zsj2jSCxT8Y_0!q}oaN#|7KeZs%V5~jD+PeKT?X!B{D)r>B_p<80c0?nKY_jDXoBvxcUjn7DRY$I=S72b9p_#tzyb~q9|r7hUBQ1F5FF3*E*rCNL~O3hlMVovpp>{w=26#}PQ zYjzM!@$^zkrO12KP$zOIk%tAy)*CIKB7Gh6v1hr$4JYMoqt_-Q^H%1K*%UTJG`2=S z&siXuzNHuh5Jg55;2k0_JuD=pf(PrU(rLcAC#pL->DhX7pnS%+pcSqtk8piIIlGu+0Ghyg};97Q$8!y&xqQI zbGt$mNDo4cAd#Zbdl&p^UN;r!ZAooDPGevtc85$wq|lkXSlzl)RU2NCp{qc=!Ck zS1`TI1TwuleBud@DFep}nj(7soLzz=7j~1%BF7tY4dQg?;(`+PT56!b|L>&#DfYD$ zM*sX@OIt2d*(kg!PT6-rtr&DAFP1rqn_JVf%nMQ#KyXq2kl%O0i;R6U!E394q^P4= zs0Jyl;u}*pAznDOA;s0U`oiO)S_6E5RHYqMq6W zJKU?QBCgryy12P6{(BiurCnF|j4cRcMO!r3#cq@@CiNSAkrM8y=-|e!z|-V6>~C_$v_Hx)lmJ|7%p|O_O7ko#Ytwr?Bp-`q@+>z9!TX+ zVRHm*(%ioh&o`{?51h5Z7l2NH%VrCHG<@a3Y2)Gn#eD30QJAr9ojJk)_~HNg&;Q&1 z?jSj!fiv5;Wc$DW%K{ZDwrZ)tMmit6!vKe zuFu|z#RbZk$346vxJc=SjBd#2hKz2=Xn~9_yl>EQD92WH`=D!)`1AS{_ZlR#$^}Bu zL?VV{>$oLPNK!XDb@Ex0w zru>!@PNFmPqtnWO<##3Fa!lT5a4iD&JUjIBGMtRjPuEzjALywVVJZe#3riDYN}%R3 z1F# z$c`r*)zA3L4B(-&terk^Rw??1KTo}LvHo)TJj{p!+jX8!pw1fK*RDv{>EFCavrgxp zg`s48>8K_0!nsWksIq*C`dIaNje~i8l1A-pBz$#;GRKv8D4q6B!Vlu-k|oa+5tDnFz3?o zo;Yu6SD$d=tS|$|QG)NfH_&%E6)XzBa38SRt?_Q)mKN^8qbHny-X_zA&BhE#npJ8k z*8SC2UcVM_+HTmkT#k3Gs(MxFnx9eaRLsu{U?$+y2YVvDD@2)7E+Ggfz=C6{cAGZb zA7I6RFHK21i+&ThJb4x%NR=!cPjaV!86q&4OW~F zqxr1tmPle*zZSaz++5Oc>5^_02+{K)*dj2l+qR~Kq2;WyyVUXv+F@ftx46stk}tK> z)KM>Df*W}V+g+iONx!s`iGd{MvcLx_6*S2~5ztaq6ZaKNDU|m0Wz(XSWdoaTk+@f) zF{u{>KvfRK(6-X$)qFxqX;lEiB=36VTMv|jR0hslb zBxzJG@iDg~iHZCLcuOj=(c%R#nRB@OBDz_%N{+(G`*lvEP^o00&#<)*RxJ@B02O|8!B!T*jKj2MCD^wwIf0pt!Sx`?hO^)Q{tAm2VbL2pn)~=g45^Y*+qcu{ z#mh& zeH*cF6|t|tAT-g>=?kY^jJ|#S`lUx*pjolU&6QKwNRgkn6uA)?3)WKm7)qh>cDyms zGwzM)wut_dB4HpbBGBH~oPR(Dbg>8-UxQ@KM!_?Adh={%BmirfcHxV^%%U@P9%5%% z9Fz)!Vl_}T%)^5V&R`=X1HrMN0>KZQ3V@$y_HZyt2M^CfPWLAdX-Fgy@N$p*C_i!X zIey^(`+w(I|D>q>;F0%$OW4jPM4OIdX!GL-zJ9P7+4hzqL$8=@vbFQpIRuBDou-p3 z7(y=71H0WP^T8);pr7paczu8o)k5vP$f@OVky<|FtmZ=!^BF(nND_h@X%X57;YIR& zz9@}aqY>2V@V|=*gUW1h|k+A4t{l<(=D#0drGmM?m5$(;?hd~d|J zRmfM?(nE{mxQWAV?eKq&rGLO@%$Ec_UO9Y)732+og-#MAM=*mw{z(q~TXwZy0g-=& ziOrrQbX(d#`2B3c-kpdo-pfAl2HGd~(VJJ!4}yGR76WFBDgxu+<%FFlklH|T)^u_j zjzvUAhRF|9rm|-zsug9pKv9d~O%6SRA;q+sgzgV49Cai8&c^>5iTn#(!ayfu{(j7$ zTpfM*jEycb02E!{y%1{H%DmOS$1=F{g`?4xta*o}AOMJm=>(qTH8klq$4A8lk!voC z{)M9~h0j0^P1B26&uHqGCz^nH(@T|h&US|0`xQA zXN&tG75tSabMx*4oJ0xozMuB=qu?T9{8V$qa??R|7)$6MX*Y^}-^tF0vPJ0_aASh* z^7Jes=PnQhVJrOx(Q!Aa&_FohyuWOjG;%oa4=a4s$ zcGJ&5Qt*dKmd*ISRGdw$5r@(#rK0KxfN}8rs07eR;c&Jc#o|-}nVv0)`IFVCm*AVSm%ulPUg}I;=UO7*low0wh!w9T&7jtDUQ6=ph+`&lXs}PfZncb+cmP79 zybBaI5y1^)6SE^x{_Mrrq}LCAM7RiJ(l$5_RDZ4zPB?QqrBQ5J_A!(EQ26Hf((gQV; z`rKG-Wg^Ib+7nC)gK@@Px*B@kyTE;gCh@Ppffsd=L~A3=);d$2J=PLUVfVfL5JVF zQAEYqVwo}Bx~r2iKwi~nV<6yD00R>?PQq~pfLK$P??DX5Jda|5CQ0@_+bgQXirc(c zqf>zuw_L1PjR3YFNTLC{XvC)nKe86uUI_EiLpTPYaUoAILCYBuX# z)(F@j8V0R?yBG92^*Cq^hyCs_>P8V;rHr0s^0Rc~x-S5{5iO`dpu3h< zoAcRdnw+3YJAe3Rvs73Qwr~u7YQXp-5-s>|Os@&K;uc(@PAU2*Xr~_?6v}Lx!ZiZ_ zFM+p;IRGF8FKF47eeQ@2Lq3%^A}sxrzgC+V;)vMQu-6;3SgX!=wZV6_J{Si5M%)V; z-Kf{>v}<8&&|6_w`N3c>hKKsuF4#)&E(eDm5@A%?UDLJYok2OsAWw>5NZpfUjn|j_bB%BR+}v z4#t*Ip3kW`<4ERT&>=DYFj4Ydwqtp<6u$+Q_`;WLFBfh1_C2!My_30EuK2&;*|Q*yT^=09ppe8Ve^Bt?G1|gR!4LqSr6o9#nS%E{Kpw*d1YIk< zAx978TjAOi?^gE%7|UvVqW4_Fk7aE;NTcSvh;9{XY`0^Jw)*#F@vpZ5%WcBVZG`0d;jbIc=Mb;NShh4FdZ*_@R$b4M(WQP2q_# z`g(E2{i&7F#qMr6`N=+J7vY0deCd4Qe3&yE^d}|HxNXT5A@{Q-I z{B7YUTuqgqkZg@!jT)sc^iAyQS*Z-MvO|7RTNe&$ z*a8Gu!@0z9TAWgG(#UWbcOd%4i(V?_@ywDU$s1XU{Kb>V$QR(8Gc@t-Q zpJY6$J~jaK=5UR-_@QS~1I6M!?{zBw!gc_$??q>6nlbNpdGU>Dnx2jrcw`0;IO1W6axFDv4&R-s=s+VbBe0jiA-(cZ2?b zlaEF?4Ew!KIE-pT>>IJs=zHbAX863puynV_cS`%AUOrXi;~5o~fi%u6BcQU`Kjb_?MT$BVdma%qSvZkKhi^jMuLb=^n{(Z$83kdl*$r4TVo}`c^#_f3jT3pT z6uyflpjs}R0vj}Xy)Q9 zwe|+bLtBBx=rl75%WqRg^3i80)%|drS-i9G1M@E7O2v8nG~|+S>|L>tl5%_7S$d8a zmP|{oU9VA#ojvf1EI^4P4jAJicsdq_6A&J}aXK|#Ml%2wSnCr^-knYLNo2&1Blv8T zo}VXEyeM9V929;Nh1)3DSVFW5dEp1nTS9WxrX^Nr_P}@eBrawsrh8$Q z#C#=qs|kP)e+dK1Hh6a$JCMJG8NY%6mUD1I(yS{N6Yz}$*GZfo+HBZ|bo2olCF6)u zA+2P>r#RuKCxk?@D46g+PiLcWB1IpL3}Xh|k)MxZ30)m$`1K<>9g{f?GuN7^q3<#@ zmz%^pptUO0pilX7!lD5Ld)_gh8{BeW>+QYekYB+Er63fdpDf>@kpF+2dfy$(oft6# zeArka0Ou|y z46o?gLV*wOqP(F;4<@ zJf#T&B~anEsefyNK=*KF1m6^|xG$3nRqEkYRR;E6@8IcE5bR=%*V8S)@a;*;cb;C!ab6)k z#LLN*zRI$jB3L?H2N|6p)m{|wv)2qxJK3TQvR_z!-%F;vAr}?^bEhGuS_j59Nk@`| z7RKhgF<{V;Jg#XD1(4LKKE=&NaUV{K+~x~yqfWWFBD@0Tpb8wgdHZeB$`mwDQ@9xN zUD3PZoca1#_{+b|#@TGb%z}q%-(Mq*gOVZClkA_dH=fC5<}=D*Hkjob&cUcCH5*>? znSsh0#K5)47lG;nJpwOta7~)ZO%eBUwF$m=#0IldeFYvPm>D_r>zfzmkv;?~BDjsx zI-p}ln=@dF83Oal_~;_oK>zUWuJ=Fx`S1RVJ0|#&7tXN5q^!`w$}mlM2Tq zTfk=eqWFRj>oj^DPwkAo2tmntqS}iq7 zyt2V_MV#ar6oQ}LBg8(ci}prfi_*(d3nj-PnaU}sJ_{g!`81G-fpM8ag?#$`Le>z= z*wpuo+OH1$cZ+BhkP&6r97>}*iWcRHLpfsz)|}x%5-~sEqYib7UBKwgU%q&W$Z-7Z z;HCBDM_MeG54-+y1XmhR{2j~yA*Yf?YhwE!xpqm%(bTH`8<7A6`$TUH&4Krlvy{YM zM_BeURm0-t7L-lcmC9B;4A!KqIKyuG;KCl>;> zuJTdNq0|QDO@O6L`5s>iB2?U~9H3V-sDEsK@oRn~j}Oy}tJf)*g~l=b_Z5p1ek}oi zBQebX%5iASDH9BWJFXt^Ext&Yjd*I(z@RRGcpM4A5x;71K1(+&^$W+OHomoRWm&N^ z&w7}j_t&6pyg?OAF=>{C$U{-xS|PrsMOa>mqflEppGxsSU6^%Z$M5ePzoe{h+`2hf zM0vL|69M+z8vnZGez*X}jBJ*MQ9><&SaIbKdiY(g-!VA-6R~(04lw1H&txR!TCi>~ zes4r|6=>l&-THOtolV#f-S|A|6&|NiwwK$Dz!{tgKpu|SWiaGdLVl{Uhd6pbqh|q! zEfCs}0Iapy9|4cshpx140l1Rmm!`S%;Jd*n9KVO(exqjlH9}1cFZ=bw@HYioB^N8n zaEeor+r%4ki5CS6IEI2uUd#quM)oLj4RX|^83ZFseGD+|{2|`9!to5la%UGY4m6|d=x&?HT!!)p+mrd^_KDB+jjUJUxIyf zo&Zt_9@pNs2%iBs9+5Mk&lgMmdXoQ&8~%K7Fd7+;4!?UoP!FDkf0|CTaYP?&IP=NQ zk7s~Y5~(NQ%OSmg2z30R3N*@ z2-Bu7BA)I=*$4RETOj(|L{JdH#dAM79j6oa1eAuLbezPPcx)&4s?e6pKm5)=`OeRm z#h1(B<1+Ya`o5aB@TYwEP#z z@C5bAR3JPSZ8u^$ALWzd2^1ERu*w)zOm&8$-4PK|(P@ts4o2QXFe~;-#w+x~EfEt~ zemlO;JuB|jR+MkVoUC&Kt3{8(NQ8F!5WEB2!CCzE6}^0y6})Y=uYizI1_8WNeKl`O zJ&%~AURusDYj!GcSbiMkn4DKnlW{Z^)9{U+e(^xtz*+NBi{VU#MQ`o3&_3c(X=rcT z+Mf&rz6^y?7^vRft2J;$PbUDLp{`5=xJya_x-dH(!M|;?aPq~K6~-(c7&SZ5EeJT z3F*XUmEL@Q_OQqqcn8HCtWgCR-ahTJw{6Nk(1o&|@{iQdjf9H$Vod6}?VQpnBMh_9e}V}_C) zN+9$3PgtgGG9noo=)Hj&v)Gk-%-d!kL9@!`pfFZlvRQNnwz+TE^xYjH19*0s}ukQkSs+8Cp zYHQQzDtCgzXGc#_05tCmgfL2|hqRS1CSVw2v3jVYk+NG7^$95T;QFFI4e0B$^YdA0 zbsY{4p7JHyUQVbtjw#7T_eiW)VxF1DO(3YGD*J|VK$EviI>@o*3eRi1qb)FG7bJwF zGxHkx28!35MuwAZ8)0QwDUHR6XZ8+U^R{8D3Ol^B(xvRa@1HqGZHMM=u%J*yMU`uF zWn%*5$-&c;$2b-I)BE|K{@ObdEYA171(&o}N%lT(@$*0amG@YBiY&mqgHwijnE7`q zXP2tuX0w49*xADGRUBy1I5i)k`d%Fk23>`IDe*+ht@5=L3 z8xMHY1nD2&O57axNdDq){d&J?e(OK|A0Q#&-e7v-^wJZOd@>Z?bBjKz5BHCMHK*zP zCCe#RRrE21qD7;YY`SRRH`X&u3F^q#-WD>vtsSr8=d5}y&Ovd^EgycmPU#^EzteXm zUqH2k`yEk@UEESh4n&Z(?cO6>aNJFX?%^Vez^|2uEx|XtnYZX&wceU-PJ3R(O1P z0vVL_?WUAUb4OMPn=eYKMa9LEooCAYh%ohSd!AO9s6k(yi(BiiROor$uVRBCEE` zJi>@$>Xlw}zHcp*$rb@D}A%OL8W zihBZ%ak+Y6q4mogK~`0%;rGiml{cj=HGn~fV7Gg(3k(~IJk0c~ue>T_IXn#ORljje ze!K9Q6A?uMDj~4UgLIBo;FR-Cv_}h#1V*@#(n$F;i=>tmW`ybv^stlO-;%3B%@(jB zM4+>jj?7~=g=4kn9b^bdk|~YIKqYO!2qd8#R$)^<`7Cnk&W|zBI2k5tB zI?R&D#qUb!2dHpF~uE2#E~bPl#E&kmoZauWc3IyvAfbOL} z*cv@h`xOh(MO#MC&`+1mWXhs5PIoM;$tW32!pYUcFzolc^Z zd?Xcy+w37VGys9MyPzWGi_lboBCXsQ;$08Qb}NUnQzIzn0LgK48oW#|B!hJuWsU)F zA%s{NV{!ygp^qXv^GH%CKEWKT)PWQCF8Rj#ycYz)_96i4i7u14Z-2OQV( z0r-P(CY(?kZpHXrZh^rG52qojYow4%}%54Za{`AjbM(%6HR zMOO_^^VL{V`_E4dkO#3<8AX}h!}ZeD==!?g(nYCAB8lp`yto=ifu=Ev)J5mZUd1)W zm!c|maKqq>06oWRdT~PLD2#a`k>1^Og1(K^+SusL#+n=ZHR|}i&vkEisIH!b)%tUt zWI~LQU#s{KZmWuFvcK=uJz*UA&wroGkOlL};&B>c7}Ca+NTWCyHv7lF(uG;X6ni2L zmOXz_iXB{JSm1zM9W|czZf75l2u&S+$}6l0&ZQgA6kViImFqi4DSVxJ>yw~IcEhhB z2h2ErJdVY1Mwk2xb;lPZX4;>T&kNsrTnbiUcx=1q19`9FN%a-R_}Vml`ka2Q{K69W z5>VfO!Y^*R{JiNej(Z-8jH`<^eN*M5#%Yi(bwAQI7N~u|qzy`G@#a>209Vizs%GPT`Z7`!8neO5 z#|dAoudnQhe)?3DTj>jbLXxLnRYh1y0R~DojND&B%LeUV6XI3-h`6%jcWzM4mX+z* zKCnqa(}ut-t!hgusMv7i8_}_OW26q6j_q?$v9+4_Ma9-?u3f_>v=>svhI_wA$CgBA zs4l`>QAO>VcYBI8bOOb&{*jr6@8*tuSjPGxksW(sy2NEK6|~| zb%5+O+KuJaYIMN>aX^m0o2OS3$hC@g4F=EgDL-ru{hAKP-6`0_)X#kx*<@Ya7+tV$Ih^wdOCUT60|J zy)Rq2cF&Yxx{P-nE!Y}8-V6kpld00+o_Q`x+O;L4hPC`|T9N4S(jPaIjYl$l=AQR8 zWGKcOVf?}cwSJ%>mY+)^?*LS5RP6^yOtc%?xFvrWg2 z18I+#Vsbrfjx_~WbEPuWVzJI zZ`b^gW0rnFIQ9DABIl@lvA4IkqrP);e1vEKm;swAliRBXFGexmd9`HS8N?s+D?co; zRX9VrVNE0=XkVlM`~bNIA(k23Ub!eb!TjTs8E(?-!h3izVf;qR4vu^eR$azCOXQSE z*>%JfO66&K5n!qv$KvYB470A5wzG6d)b_%d`e(GQ-81Io&g00r7%l=}vcwdHCRX-$ zSElQw1Lx&05bWLzVsCdaID!eZWFpi3v>s|h`Wn0&_Xv+^WUVcz7IN7C@S)=r8oXGqXQ9Q*O)R7|y zv=$qToRnXC;w%2eB-)1Roe#8|0jKj|r_)wh=I90nB_88*jmc{7;KxaH#?C{d2X>Go z^L4SPOQDTm&uUDgQY57(!K~4$CuI}xo}?qt%UdmQ9whC-cY(9!JrAD0c>cR*FTOkR zp1%0z#q<2d^T)4$c=77D-pS)v-ya`p5zr^UJ9+*1nFcin^(q}R^)325XKQ+~D{V?| z^%!`Vb2jx{juL`w%hf$I4!LC z{Zr0wKUo@4ka`{C0v#d!VV~Iadd3l8^B} zEY7F7aGqut=S+ixY_%ym$DTh)cNc4#;!r}Wu7aM?fmdd0d$6PD-dyv5Ld&BBk`|xN zlI)Dd298#XQkL3A{y|kUeX*MH4poE|G<@ZOt{Sq^OqYq0t&gB)AMrDy)QKh`*B7I_J;W49(9-lG9;3uKxPqii8FCd2L z2&>c>Rm?)c??7%m0m5(1-+;*%Nw7~v%d=yn6ZmE1{Xh+?t~ z!*l8cI%~OmEGO4Jdv$QD;+&w5kQ!pHao3cr@Fp=wCVQ2R*g=LxU&&1O3lgfny*f=e zOSUd2ILH#CdM`Y&pFBFq(xbep|^vLmvleDnuH7X)U^?!x+3*I(0v58 zB`DGSYoay~nMGNFvFN6Bdd;?tu> z{_cbW3$&ZFTJ^d~#?*q8$+p)#n_?HEN7e$1%Yb}lB6?7<>6e5l_!un+F?zI9GwC zg~FnAx18iX=TfkoxSd~RgxaX^#koqPf^cUkq4f7crGdYX*ivsgW|XL^Xa*;Gl`A3(e~0U|zs0ZY3%wZ(@b0UV&^ za$m6fIEQybU$$Yz#^gMjFW_@&-CCk|L-jVRH7_?xQ;qWM>YIb7r8rR5zoq)0u+ebY zuXpKt@YC8~Y_#lfJ#8|eteqqSM7xb~<(RpvKFt1cbNAg>buh7uxAWNtk=(Qh4P+m7X&lfNrs^Kr5w>OVSm1hZ}|mk=i8^=cbr4N969~DDC6U`?vUR&F|r^3K)IEy zB8&A`x2A$x-X3OZKdzs(b&*2jR#$p z;n$ZZud!yixOYC5xsdTPi`Qp7co1>nzJChu=bZBBaB+Z2J)$P1CY>eJHO@ud-Sy@w zYsR{=$+2MQvyS>D7#i1$FVmiP3`1n894AAKHNMw%I>rrt8AVRP!CCgfT1`q(1`4t< zCJUXwHAP(9UxTkYUfnYpZ%_C9lJ(cqaKvfu5uSe-bRS^glX(av1Rm7?xsIYotW-e8 z%78XtEm|HYHrN`Tc?n#F4ru6Ir85tbnx~U+lE{1rma4`FgvpXvGH+>N;p)^0}FAwV$ zg0^phzTinpX&RDqNeOad`{qt{JG6;FChsWj{kAnc)qMAsRR6HtCb+7~W}{+RP64t} zv0U@&xKXiGxY|1KW}{-+s9122jf!QXV!2xti_ox?Gt!NU<;~rwSo}F&!}coEY?p95 zt~$UPRXp>wE4QlNAwRaY>vfc}0WO@3+t_6Un{q$_H^5bg3^X@hj_47_(~Xqa=;XoF<``5K~IQ4q<~Cn@!tJJk=-w!)d+=!aI< z4`qwIx2x!fsyoo%VTiy+iM5Q1X`{rt=H+~&#Hye?aNx~GiM3H;;UF6&)<%hSw@R#y zpU_5$HD`buP+}Q6q+8KmafD;Z2aZG!PxyI1$UKz+!^7+W5SGpF#^E5$#BMFA*J2q% zjX{24&SU~WIj)CU01f@Y?ydj~3dxj1w3T`30FJXeG34&9KBh`#7?Cyyv`gwc2ifkf zow^__e#eK}7!ei#65+@>|l*5FQe9CgLg^H5-)guOjdZXFv_Eq(W-s0jB zN;#sfY94y;t|YNoL2{JlC4{iPiV@7OutvtAjg4X_qKZvsclAA{)iObiiB(O7@7>RT z@ef&EW`y^@WRUQ2!p{LlroqO%AE%dN@OBDG!-j!u{M}du?UFy>9#KX7R9^H4v}99& zntvzdfDK0GzCke@{*k%Zxdd*`!%#Yy%b{lmz@0;!-zgITYQ-8b;!+O<@}n9DDXo)@xB`;933G!PM#b@h-22P>*T0V@yh6k zS`hp+0gXO#TjKw^GgTbo-z1E$Fb7sTcpB8?fJsORMN@9riIJYeDC=S$>spB@ctbXf>#rK>zfs@)QhJ8LP@|+DrcRLI#6@HeDh#| zA!CVYRN)6@g!Y?B5|?p@`Q^gyf3G8&H0EG@q>MXIf2-}XoI!}#E3pOWyWt6I zW}KY>wLHqCq}o5(yZTRhl*;H)bs^IDX`5M^Sv z1tZiW96&0P2;Ap00AtTHt)kD;OwCiQM`o-=1}sR20|OLLza1w-J|zbFZjg2OlKLuL z{@&i6JBFlgWs)r4tQX)aul$%TulhWfsuglEXR~+tIQA zK$G!=oV`3w4HEMMG65>ZGQbXE4b;4#06(Sg;p-R@62f9eQ2TKlU11QCnCXB`FPR8K zkn`}0-?5Ubs&UU#GJt|1RnEq&Jt@r?d)|}T1TYl3_@)sv-+&pZ;`rRPlYq!6R)TLM zt$MuY9jNrJ-Y9v`yr%~*Pxy++p)!K=9R0Dh)i&XiKp2Z#5nW_h%_u!3Q}SGt_?Arw z3@vV}A}(N%M`3uePb!az(G|*wCV7ER@G=-cs1uwa>B|_%>ZP)_8a-5>d0nimMlI$i z3lb#j#7?}M8TFwnpS9iHJ@0r3Y&9{`Azx`ntYC^4)5g%BSX83p?c~&OM2Yhnkmx7` zDT8vq4I-h)TqQ;P`RDqqQGKt2(~$OW-qa}mjvt4FS@N@Q6T z%1<=^Yg`4d+*J6|$Ev#dyLzVAP zv4SQ1m`5~4lZ8bmX-F@gc`<$iF-8@4TuzTdXP%Fj2O-@r1xi^I+Ec7C{fm9CX0|LT z*!K)^XWy%FH4z8tp)fpETY7S4GJ%P^ZU1?3OF1k(R)u+ ziYPEADWanI&2P+tpWztn;{^~I98yXiOX&}uSN@ud2i7($aKi#OEbwz>fgAqz2hQL4 z{}0oPE2)uJ4Gwa`ukj~c<@5X=xR4PG#vmTXT(cl@LLROI(1{Tg=9k=N;WaTBKwj_!frNSiZ!6KB|Ylow<%Mb`uXBO{ahm;)_z2UNR6 zWzz)PY9fs@-gcZ!IKFc!Bb`w2GNI36doF}Ci~Tq3NdN zLAgNf2ZWAKQ*Sor!(emrj3K`)`Z#pKd4V-`!Vi3$e?)g~fv>OuekBC#%M{9LAm@c& z#R}8+r2b3z;&|uiq$up(%I9WJoS6G$AAZRuLaVGce2o_mL+#w-h?Hpa z2Pw&$cJzFHx1;A}uIIYvdA>`&w&^~uzpt&MuU5p*C*=#!{G;bK&RR&B>AB4Q?tgfA z)buazh@dA8o|R#cN?{#@FpCVqs*;nu_d1>OgY%qYi(;C1Mk(dEa>(NRZZwO*eRa%` znBq4{RJza3@AK5oZQrRaw*A+IRQG8KclnlkctqS#p$gJc^b zmXDsY_l8`Za1F?PqGB(}TchD4JR+e{^=q^PE?B~TSiB>2WD4Ahl;*85ur}WG?V%uU0L*XUdb0L zcVM_xIu2~TmItXDbuE!L#?Sxs*WM!$bdXI&;7K0Eg%w3myT#v}@&}>5)R?w<-hCzQgXas%6nzcCUH^V`^0;=mlHyWYlQzHWA(8=rP z0t0kF6qzI!`9)ao?K!*uVa4?Lx@sOlGq$#0s}F|#ZaZi-_^!5kok7rR#4H#NYjKC~ zd9yzltg^LIBV}zaJooY!`cAHKTfCnfYg&uvtfeQUA86rRQMq5v?ds1NTfECRod0tU z!Wm`xD4p|agK&OWK1lt_7{ob1w>bxjMuh?DwcZ>Mnw3WAcgsh}BZ6tHxkK^gm@}Px zsCtdYQl~~gB8_1;?9`jXpx15ngH|i*2ZP>#1-(|Q-)Rj(E_C%)I3h2FPyeIO-IK9ck;#|1v9hT1nPy1g2p29Wj<GJ8w2ht68NnN;A@b-9R}RFvaOjt^(VT` zAmHX8tE);&LQQDcX&Up@gX)y7(FtZx|B8>@SyNk*Hk+j(1yt> zTnooQ>iGO2)iLGpc-zY&@NW=-L6qHbl{2*3`^k`hLp>yb-Y7B*YNF@tgVHwP8_i#B0s*Xai}W7(9??_RCMkJ!jJuVw>AbC? zaq_*&Lu78r?W2R6#Jao4b_nzmr;z#q~$ouA%JQ_>I zu%ibtA77 z24GGvQ|~-Qvj#f-LZP)HfKXdYRa}R>jv*Fs5;H2!mxFJp?+6gG$ez}jmkrr>Cj4OCM$5k?i?L_L(4t(j$e}7ns@m8g)j1e@v+#& zR3>1R`H8_1#o4$Mue2S-^ridrPSWb$q60u+)vx>r@s_AxxV|hTt$KP3h9e3 z+?5Z|56L)&MagTgWotY_n=@jc5m-!m?V@2PxSe7dmqXn-F$VVncLk#5c!tajN?5El z0O9fL6D~U@v1CpAqH+&L@}@{DwwKczx#BSIhvLW#T%Ip=Lkp&jsuasmvOJCT^DX1W^MLH=Wkl{cb4*@p#~E2j2UdzU8Hv5?->+n;7dUj&ct4#Atxc72w7d;_L%giW8hEI5o9I%s0YW1Qu-m!jRvF(&{4kqb{1+-(!*}K8~ijEpzi=jLiN^Cxwx786u zG`zFqb?#W=HJ{}5-O6c0K~{S)ioZtyID1_39(r(u9oHeRxx23-uvLpc*tZ0d;-NyM z2HMV6gOL!v<0*g69q3L{v zP-yPv2Zd&(>;P{hq&!mxchSOVAv$gmeTgC?g{TZ|`?3p8Vz;ZsXeh&k{P$qzM>L|O z!_`N4>#)#JWsiJJZ3Me2%JQgKUO%P4J9W_>Qnr+c_Rfm&wzMWlJa{n9#`i*o_SbLn zu$|?Xw{sMCr7%vzUug0WMP15G2}%Tz>5xGNu*7|Fu1Np}ig}}Af-dkwY8@{oJrGoe zusox4Ng8{)%8Ai43?UvuY_RW?L)M!$WzZUQ!%i3n&0akWTD`av^!v?TFc@~DL9gBz zw7M0+28?~r@FS504 zlCZqlBw<;G#Fr&uX;uxvdZ8=k#m!S*806nvFrI?b7HVeUM)Bf1oc%KisICByW|L$p zI3dYDBD_lFt|TEvOI=C#71U?b?F<+^zpZE~Ei*9)DL43qZjuaUQ-;M?GVdy#>E%~2 z`6M>vgBVHXjYzLAE3IW?ZT{Lyw0ivbc(uzP@b%R#GO!}O_N{{mu+vvRT)W0cA{8jM~`rg<^?UL)0uG0sw%DLi?jHILZQ z%^oozDKY1V2zM)RfC>@Iap8BhQ4;%?u6b!%xcKqULsM}fW=d6=!LcIHebE$eA;jQ>| zmSkrveopYvr@xsc^ACp_BX7T>SG!HdWAGJT(x>c8Iv(pqe+Ly@xJUZlV6kECZ||m+ zbZgunPaetZFJrY0{*twD)>^JC2&~G^*TKqHW8+re%EHT^dzRjk3)j9b2FPX^gZc{9 zh{sRZ`BP3Ps%IEn9{I<)^A4ur~I~CIhdRG2G_l}ih5G>s{JBOf~KVgxmd24Tc;JPKEXpFfPqNvH7 z0#Rx@3vLtQ9$)~cm4VbTuuur{jpnd2#}~cmumU-p$Q5G3rnAYIGtx15z{Bp#Bv!ZO zl(IqzrvkFRvAssz)tTn`tGIjQt6%5tH>g$6;)XuXJ6ceSKYwRQF|0lv=rKca;lTaXrh)U<2IM}*( zRDp;2O@jB`b4@_y>jSV)lMig17p~I3KbG+&98~s^MKgjl;lg8>z0bjdDgEgzo1(Kk zFf1CVN%2k z6WM)GMd z_d{>O*Lg%!;*%=Lg0H2_Q-D89Ieii~ktlaDgFlDqXp~;UN)lo{lIn+`>;rj&{NAg5 zUifj+_*zy!zS4YFBL;>O^TQKl5Z)t@8iMmM84c2pK3}6act(HZ!96?q$B&XMg59}t zf+jA`u2_|f~;ajLy-2<8gM{E(c5Gs>1Y z;@hvy`d~DoQ%}1^sDg`&WCB7kGD!}ABpMwJ`x=}XJH;Zs$vXitmDtF)lK&3@#Qd3@ z6%%xjcF;g8NPw#H6&66$J|}{T2FyDr1Z8nfXCVD25djYOr8a2*BSK?a?0djgW5#9F zB5q6EbACsDhVM_3#tE0hM_2j@m1$DMDbW{(er_UeMt2)=lk@EpDnY96KIR-v&Owe1 z$5Y*pc71_5t7}rPXKG!-(po_aUcno0v6|%`MK6e}srBxsiSZuDN$6rSgw3$YQ*i)<;VFABeP$k`cYpd z1I3Qdxg5u7m*9h>Uny-(ciuN|ih9ZU5hU7Gd`|4ht=+0Op&oju$89hl5yt^+IkWf> z-lDiHB%}~468Ob;<*r!p30J_!hIwt6*Kz~gI`b+en^bhZgmzX+sj=w9Y^dx_Q`uZ^ zI27?_MY_xXf0$le6|{W^iV`jzg!d&xuzeW>7c8k&94eN~DzwUwP7TZQHS=(t?`@3H z9FkT-F4suu^r(zsbI@L9yfx1YY+v)UexRM!g{mOsjYBml*J1lyP}f3 z-{@zmG#cZaFI+-y>-t)xg0gMlATb+Z)yWAy^OxI-P2|)42|D=#BA<-Y)oiw!ogP0} ztW)cAmegnjgBFW}D305;LAM+CTQ?o^RPmgxcw9E&QH~Kl8%+H?!lO*{Z5|r635oiH z35ohLgzP(YEd9buX)jg>*)n`J&5PleTJ`R6Ek(;0;m@tM?53P+Kbs=Y*YT;XP=z}s znvYMjqEDvke5v^5v|q6e?b16S?3@~y?k z*Y)8QgUof}6>a8t@p`s>fvSWTR>!wBw?dsQ)4ScJDR6PFdjGzZ0lz`-Q`@KWR&0V$ zFI%C+QZA(5S{_n-Bzc?RBJ?zTPd-kQbY$f6&fOuy@m21YDJ+fF#mKlt=pJ4Lucrgy zmHGm)4LlIhKUHK-Cuc{Gp*w*D)Z1nsq3|;ApJoh>&lIoi03tdEoE&|Nmi`@4t@fOS zRNnRqrzi%soVn;5mLu%EX$e={V=M(dkq)`w37Vn{8^0Lo-idhaN~L!g-P~|&HLAit z+@?G8tP=6E#nQLyHIXzry+Pb;cYn{KQOcd5Jm(yR=9*6!C^jeZdKSQxZwQ6u2Tq8>C_jZV~UMEyp* z$`M({%5am1Wn*J-jPTju>7Cjb>Q!wFFFruP7P|zY)Q)D5Qh&B3Mc0k#;5JMLmZ#^f zm=5l*@VPM^Y)l7>ZVwyN!Nzp3F&*5_=4?y{8`Ht(Z#uZ6+#GNzSY)+uhyOI*D2?rs z7K2=QPcN3z@Twc+5?Wr6JP(d6*;XmHL97RmUfrJg;`JmPXMkq8KUAbkr`UWcvj%GV z`KP4Z4;4^{Lk3%)af#LS5%Shjkic4|W4aGHZvpk&3ix`(A_jr^Twovby@tGfCF^l3 zHxU7jf(8lF{koErdiN{OeY!Uj%QNFL560>E>O7qpzWsS9(;?cYIIn>J0!LoMS9Uz$ zRB)u{)fFZaC6yNzw_c5k*9??V!+VE?bF^N{U5re+NEk<_32EN&HZy|Pg z2AKL*o`g3}!v2nC{*GuKZ+m49s3%7<-zIOg4e;%efXd?wrGXN;l+F)~m#Do6Df7i|2Bfo|(E;ZhuY{X7d` z4TFlU|W? zmkUsQSNqxeieO%d9bcSIhL1AQKt`AgA60~cXx{b@9ruA zl>@2$8q!=mjqH)vjXs}ji3x%JThxOrfZ?Tho0YCT#_{#|ZDWd86+_!kKVLC&?jdI% z0cDbzLbq@F3uU4TIXLDFAXgkY&}48L**Vp%oJ})Gzy$qLEjh`acf|Ojpifd>+tU70 zl%vBrU%P?jFm(Jf+w;CnFTwrC=YPq!30WY(ktYj>*2u=(f0xb>`sj>B?`4*#>N_F# zP;B8D-|7M5TOG!*vDO}`$(R^PYyFbXVsdiEMx#gGfB1$?1DmEpws&}baFh$I{LvqI zKmGFEo&`rRO5QIqjZgnUUy`L0SHVUH!%=$qFyF3+AtY}LLOID`0?7YIaE$h$BVi6? zwd&(Sx)WL*z#yI)#KS>gSuG62+*aBYP8cCvCU8OHkvfIJh0pgPUspvoz-f+1uwj9l zu+wmYsGIi=IeP-(C!!{BEjJKyj~K|^yNKC{mEE+n*f4Al|Nr)`t+{PnNxz?}^B-_L zQ)SB~>K^B6?`rH^d?rr3u`^RsGpQ6sQ8rH~QA4x)ht_a!^uX$M_ePfOwpx}mu)D3j`|a+)b~x8% z-V(P%OwKfqtiD?;v$OOLdQgRtACrs4oAd@#!96*kSM2rhZ`OT!^HcF&vy|f$Z!!~A zvtX{Ih)AyNrc(Ph5HCMO{rfERZz#lfg7qHk^;)#OtG-r$O5F+5?mcXG+y`B2uVuHb zp519%cDFaM?zLLO-riov-rL(-LS-UdC0$M_h9_O z)h^lDVkA+2hOagfdKDy(QX6ORPh6EHTRh5l{OxWA$s9#ofnFN#(bk>mVkrNr00}n5a^gVF7w}Z(}ifrx6ZmMI};EFAAiW!9sE? z(9oUwphoXS`OMc$?k7!P%*$NER3}-`pKgt3ae@&}pRL1J`|(q1s{9u{eV2YF7*4Kb z!puPdhPqhgyP57V>cHrBqwleCjidwj+4q!6xS>u~hFP<%LIr6s_z(W%3m2+NCEu0p z2CS>V1q8cK#|6@qS`GRi{u6`C6>E>+^Qia_7YN>9^haj?`BH?=w5x;Ttl2zZ?T#U5 zT9zE{ifQ+%6yB>2`n0vEkEmbh^0c+p;t&|QRr`1chOTO=n20TRJ0vGQF}|1&;xaS> z=+|c<8R=o_(K3u$na0{3c|aT0u& zJn{_ugAgtF__-iJgZ->WRt-quCs^7b>}hi(OhuAYIOf-h-mVDV^1mCr@|y5U&fuRF zwQN7UXYcLVZR@^mcdXvMy`D7~b_Z6c+imq84);dwR(lBuXoFgQv#8}7y%-gX?75@% zumd`1x4R>&HyHM;hwk2<)fqmt+xP6@1N;6mXRV8{NX*6@defPth&IY(lX7qrpLR89 z=2s6=-Y)c*!SgoI<5z=7l{0rMqD?D-O}C6SE#3))gpC`4ZVYoOoXpCDQY&Fn%R^GP zj!3NqkTT&>oThSKM8Q$;d{9ggjB4b*M{Bw0;sjZ{R{OR6j-VP=``bPrh#;5*#^+~0 zmZ#o&CxIdk-dkz<%g`fWiHOx#B-UOtb3&B0TJ0;4V0<7-QL2ocT&Sq&vRS1skC(0k zE?pHZ-GHU*085osbs=QB5Ds%B0%h25I?MoM{GA&RHV?wCekLqF2bCO+${yvoE!5Nu z8r>8$YQmfvBK;a7eVG(&iEd|?A4X#8T86IFUBCwVSg?$lGQ~lyQ);}i?Ob{jmoQOp z;>|o*9pHtl2#~Xg+p}Z~Z@%#&X&oiwLnb7ys)DLJXQ%y>=1*QYkD8}Y8eVwOfKLru zF7HMa*W9{slD;(jdM=8@0C7ayPO)uJfm;Gz02|A14jx=#1`RMuV^_iX(wRSwN3=$? z2T|Z-77=kfat^H?xQ>lE@`zYKmB74Br@q7!hk+|F-1(HoL)sYCnMZvO;twVlbhTS*kX@>0B54ZwqOrk_l5Bn<*?wR(nhz%KEY)i2GYP(4 zaw+l?NPP7?VM{i=)*y({Hj$FqYbX&I7>I_=<9(0|7^Wgpxidclp{<-&vZs6Cl@N06- z-Ufx;ps=M;*t@&ouW-iNfUma-zOoF_4Y;)dx7G!28S#q^p7q;x;91M|$c=zp3C8wj z?z_S-iiC&2Z0;4YBwc@XpsUXqq7ex7&~8J%U(KG)Z07@dfy7usjUD`lt zGzZ$)m@x3o&<2O?2&+lB3>6{LNeSdEmZAh)e0Ue3AlO*=@*#R8UDY38&k#e42 zhZiqAm~KMn5=O%D#RRmT8nVDYl9agXS*D~WYfQhg#@O#Tok#LG_Wj{kN-iGj=U%)mCJB>1`<0Diq;EQCgYjPJqC&S zTTDbLsHaqh$fEi=t6LPC&J@>EJqd;dY7?s`7R?SMLwd`c7a5P1*pF0QOwvJydlE}} zmv`7P)F-5DFYT;l9S)rbR1UWK?z`{U-$51_JUWp9sLUiHo{Pu%Nn|l7w!537&-3P> zfs_Fdd4C>1=5*hiFa>~p2VU6L6tIFR(* zA7V5ubkQ3Su}CE~3}`3#DA5dqZWtPKhYi^fX3t?RS7;n%uO1@Gb%USN>VmIs1EDGw+w>PG4Ln;}%#!#~s45sj`Eqv>_pq<$bL! z5WQ}ZCR=#712#tcYt_c22Z%e@-koV+oH z<>Zzt{tI|fRzbc2~EV~s7CpQ{L)t`HToh`O2 zr)}Kr%yWfc>1RQR#pSxCvIBKIV!OL}Lc6=Pb(^O+!Cihl_k`FbKO}DJeE)mwM!lZT zd=LWpDa4>mHZsGF`~lA34!_Q2FmZgy_=wO7n92A?e~~Q4p>+22Mhw`hu2O@g+$lc_>inY3h>s4P zG}5lG?Bxa9_+6^V&R?FvKb`Q3Hq@8!<5qLyLh5Zx$kdX*qesxSa2MtRw;(m%qPsWw zE4^|{(>|9F7tkG?^UF@$Vw2yZ=~6dYCt%8=np`?qzhMAVG@}bh5~h_WmoF@!shQZK zZP-m2Gs{cwlECB5Y4}ZE0JwN(UgqVsT3x@naaBJ5X6Ez1{^$Sx_dl0nHAUvX|6>^% zwPhV8*)Y1k^)9(c_0`d)WgM$gK|-E{4hDpr6qCuCr+xU{HRV7%$?P9mZ5|oR?Lkdj zuq5Y{+z(Y(pV>Cvy@}=)bGS(1e7$pwY2lfl7gDzQj!jVs9paEZVtAKql7lhjerovV zuR!aBH0Z8Y6CYTJ$4Tg1M4i+?P4dDNWhf@nj)^?|%um7+$0cib;@ZcPY;F7l%eg*3 z=Q`kVxU$njxfvi?{AH{J-=VonWF`R~;u8CI(uKuZahFzt)JGvl)ORL~isc(W=UfE$Iu_}m>&eXxATL&3!aTJ8GQ zi4?yyyOPoyiX9Lm-$%|REJvxLoD45Oz2*a&17i}+esZGQIu>1M{R~}*fJW3D_`v`s z$_T{Kv)J|e*Fky#UU5%Y{xqE z#+603YwxrqfOq#I2(OTY6wy|;+?VtZUowRL$d;%15GlrjYP?QV{W!1cO)w1~VPzji zP0$@1qe*#gx9q9+QzDd3tJASsZTxS_!#-+jZtcw~7l2GNQ*4$HN|x-A4adBl<09F^FX5xe@S}lOPmO@(W@M{`n6{ z`bYO_zd(r}(}m{GJm1ApxZnRBEZqAu(Y=l6&PHGS4UQ zzY4!Zl&B)UnV3K$ketu&+5*1tnqtF%#Yh&44-ZPj#GUxAVsKX-e~t%yfG6L*;P0!m zkkeLUmGz`PrF4MFoq1!l6*jzGUP>)C^7CZCD*1^UVS6w5fgX?_-fV9V$KC`yAK(>_ zcwlk_eqdc7PO?kr^eX22hysd@PEeI+$Ob}H>Ltu6NJ=~hSUAJ%BnB}lW^qx+SjlgS1uzga z%|!1b!3dv$@^!Ow2~p!KSz{w}+#8r8Ksm<|{aS$;k)NfIo5Nr{#tWLS4BUXJ56hH8 zYk=i6eh1lc{@0S$yy->J9QvhXYlez>FgA(%rPKpk{Z~f@MqwzzMC#d4>Q`L>jbk7` z>EZVD>^Qvyet-B<|4ynab^J(}M@`f5qia5X$}?q2u3k^1`X2_qPjf3aP@ekS`k zSM@Po|1!9E`VnW(bup>?`JG1LvOi`0M)j*wUljt_aOVR|PCqU%WU|apdQ%$P9PvD3 zN@eX=(lyjo#fOG^g+@-TBYNwMe1C=CF3zjElFLj$vhI%y=ASL$p2e-sdcs(tXH7Ki z7SvC}U^sUcF_ave!5Te3*HBDen0>q**XZ~aP`6tbSI7V@Ss|z?2Stm$b~ZoXRev4&kjBd*<*{^cI1gBUhw)doS@O zzKJ|yG5$pRVMSg$(KpgZX8Ey9fSD+kon$4ppic4pm&O=W;KD_;wPE8NPjfzh7Bvwv z=laxyUi5>jv7(0LK7W@s_j24CtfZ=LqDVV4=E&yB&ct@4XREE4n&z2Qo+$4flz|I! z`qB4Yej-*g@?ttg!z#A1`Ib_B9l)R;!Eu$?;f8J+!YhWFGRqFvm_SvmfP{rRU+oFs z50R{cx!&U%-~9|S#w9PVMA=Wrr^$v`-0%@Z5~5FEfP*_(aK)J%@b~yJ{IRS}`&Ap- z)k|g)QeO(n?@i~vZCu>(-4ZD55$3(p6(O(_32S|#D2YA5f*+RqIO6d_)twqUVD?3@ z(`}7wNulHDEKWqQzt1R28$Wy-x#8;&H#}i%`rq01FJQFPy4be3mbO8}?X%E@|DQO- z_UU=Ibz&}i3f^`w*3;L|L|6=W^ox>)b4st@C!PqlLZsvxg6i&)V%?Sw39asd-{grx+2bsv^AhxtzVY zB{OQm$aDQ+(W~%dT>LR~q4A|7fhCAno`&Ao4zEN=(!>DOcfgYxPox3n@mvo38MM!^ z{4=Sg_TA;=_acZ4NY3>L4^LN+Aj-?@Fc?qqF5p|2RiE!&yh(ALc^cnFDZPwl8R?a0 zi@)Oe{BCl$gpQTt?c3F}isCx7VeVPefXx4xE4K-Sico00G{%LMIUcGmzi8dH&X{QR z@I`h--_|;irZ`frF;!zp6&9l`SzD$=tu1K)$4ag71&K{yX%ko~8(1nbit5)5&R-Vi zFJ&CESijLWEQ7TaL;V^aj*V3Im93Yb=n6wFm>?4m6t|+>9SN{1GL##lxr~ zMIJoCZ@xXBU?VBtFN>fNyt+4$U&X8Fhjxp>$ePbE%da@pwAB+EGoFC?L;RaA7|cp`3HhV(Kk*eyb9fs1Vn_ zkQ<6y^ZXQ*Gm1-{#=0uXN)$|fr4_h_j*4U;Tgq47ihl&4B{+8WL0y1fwj-{9Vx|BN zf4WGVX;G@B4Ivv@2u~@`r<@(%9nAu4B76Vbo&9XjoJ$|(hn;Q77kE?KHH@5nk3}2l zmhQ9fX@6?N0lk^vJc5Ew-XuE@2TqBu!w>Rq?!0t~qVB^_rVHsOwHwnE7j&dj9-DI- zdK1T+@)j%40*=zXJw8%?jQS@6U&@rG=$Yt0ka5hc;87hTIT>2IG4Vth!@RaQgo96y zTz_Umvr3WD*FK)08-N|CdAXINtTtd4_`&32Cjkis_WCAOV+Z?+X`x(f=@Q~)>4N2B zjBV|HzFdUSP)rRlz5pfH7urM^)z2ovxQQ_SStE?ON#R<)O(K1l3 zgEt{i{M=1h;rlAe%H#~+y6nFGu-+Ps#WhBbt8`=j$4$_2twG1mT?;yPv_56IpranM zVwK|xMmpCKbTqzf6Lj1J9XCNorCy=VsdcU`=$IX^O9vfS#c@{)NamVRF(8?%U(w>p zn%5YRl!3E^%_{N8WkV9?u-nH)TDZuZS5W4Rj;&_(x2E%f??snxc$6lqHEgOc@M1P5 zbNpm_@Pwy#Jitt*kDfHeH}=FGADk1&H@2_v07aZ*D>jGr2fHzjnlkf-9P81CN$_dH zZQ*ZQ2lS2cub2yqq3~^Qf_V!l_qZ1^DbzZf`YvW-hZnh_NKHP5w~u)CuV@CIHB@Xo zX##ssn$v^dCeQ>-(4LncAy7OmT`F^d&`l=!Wi$kSclGX%lgoPGV_*c6v`}bDyv%p` zolHW>nM{epqf{9AiyAS%Qsi$j)q;P8l1LQc9I>AOUIGeAHYMp4rNNk%Q}REvKj6hs zEIuB6B~q-jQGm%pNzw|{Ix!UmV>d}>uO6*tF3fXoC_CPp==z?byGb@6iu3a6xrwPR z{H7SO7XIo}NZ9r*7@?pspcSY5DJcX3moA;cp?(P|trErH)C{8H&9T zkWAn+G)usz4ex*-eD46|onv2@9FCgA|5_q$*aY)50V{@U3QI(TEs*Ch_!L<#A)D}? zpZO1rP)e>IP7L|gl{6hEXNiuT#F28P9*RRWr3tK8Y=Aql=8?7;NSimpk!QdyFtz_Q zvj@@sH24G->(cdoXv^U|!VB%G5sAz{dNxD2m>tUM?9J1&bJjmS&a>PM{Ir^jni6SN zj7+D_WT8_#gh^F>*i9bFL&56fUh-H@>HOjkm3}hhOxBA8B~2Iz;3W!{-&Sf5g857t znbOZArTsUvK}?a1t>Q3nbmXP!Q~G|9_p)gEF*_QPiEP0VK1S)P4xjR#c;gEeg^nVY z(Eilmt}}v`f{@vZ7AdD*1{Xop%xC}kZR?XaoLvI_`}d}w;Vmv&jri+9N#D`znVQzJ z3##asf(1*!wJrUsFZojI3jGqVXlYk|Ntb$=VF_2XbSql2t-e%Cak(hb$l?Se3lfXu zkuH56i+Zk{S&LKYlMV|`2pd)aDH_6gZKt~sKgGb^bv4JZ)u}>rI;%8?&rFrtF{LU? z_6M)Lj*eKJ^J=0`aem7(?=H`IcNNaf`Lh=Ap39O_O=B{7L{`$7_3&R!Z!-L^q&e&1 zznb=B_`d`CqffzBlK7HSU!Pvio4Ez6wds7ucZ&b@FYw?015ir=0u%rg000080NG6#S6|0)0Wb{!0E;vL z02crN000000096X000000001Ea%Ew3WmRcJWoBt^X>@6CZZ2wbZ*EXa0Rj{N6aWAK z2mpIE8CUa4P>NLf009542LKTO0000000031AOHXWWeorTZDDC{RAp^&Y+-a|E^2dc aZcs}F1^@s600IC40E7Sl0O$q*0000Jan+ds diff --git a/Solutions/Microsoft Exchange Security - Exchange On-Premises/Package/createUiDefinition.json b/Solutions/Microsoft Exchange Security - Exchange On-Premises/Package/createUiDefinition.json index bc03e9a0edb..e6f179b843e 100644 --- a/Solutions/Microsoft Exchange Security - Exchange On-Premises/Package/createUiDefinition.json +++ b/Solutions/Microsoft Exchange Security - Exchange On-Premises/Package/createUiDefinition.json @@ -65,14 +65,14 @@ }, { "name": "dataconnectors2-text", - "type": "Microsoft.Common.Section", +"type": "Microsoft.Common.Section", "label": "1. Exchange Security Insights On-Premises Collector", "elements": [ { "name": "dataconnectors3-text", "type": "Microsoft.Common.TextBlock", "options": { - "text": "This data connector collects security configuration, RBAC information and audit information from your on-premises Exchange environment(s). It uses a scheduled script that needs to be manually deployed in your environment. This connects directly (via proxy if needed) to Log Analytics/Microsoft Sentinel to ingest data." + "text": "This data connector collects security configuration, RBAC information and audit information from your on-premises Exchange environment(s). It uses a scheduled script that needs to be manually deployed in your environment. This connects directly (via proxy if needed) to Log Analytics/Microsoft Sentinel to ingest data." } } ] @@ -98,7 +98,7 @@ "text": "After installing the solution, configure and enable the data connector that’s most relevant to your Exchange environment by following guidance in Manage solution view." } }, - { +{ "name": "dataconnectors-parser", "type": "Microsoft.Common.Section", "label": "Parsers", @@ -107,9 +107,9 @@ "name": "dataconnectors-parser-text", "type": "Microsoft.Common.TextBlock", "options": { - "text": "The solution installs three (3) parsers that transform ingested data. The transformed logs can be accessed using the ExchangeConfiguration, ExchangeAdminAuditLogs and ExchangeEnvironmentList Kusto Function aliases." + "text": "The solution installs three (3) parsers that transform ingested data. The transformed logs can be accessed using the ExchangeConfiguration, ExchangeAdminAuditLogs and ExchangeEnvironmentList Kusto Function aliases." } - } +} ] }, { diff --git a/Solutions/Microsoft Exchange Security - Exchange On-Premises/Package/mainTemplate.json b/Solutions/Microsoft Exchange Security - Exchange On-Premises/Package/mainTemplate.json index a09ea026bff..3f673286451 100644 --- a/Solutions/Microsoft Exchange Security - Exchange On-Premises/Package/mainTemplate.json +++ b/Solutions/Microsoft Exchange Security - Exchange On-Premises/Package/mainTemplate.json @@ -2060,16 +2060,16 @@ "location": "[parameters('workspace-location')]", "properties": { "eTag": "*", - "displayName": "ExchangeAdminAuditLogs", - "category": "Samples", + "displayName": "Parser for ExchangeAdminAuditLogs", + "category": "Microsoft Sentinel Parser", "functionAlias": "ExchangeAdminAuditLogs", - "query": "\nlet cVIPs = _GetWatchlist('ExchangeVIP') | project tostring(canonicalName) ;\r\nlet sVIPs = _GetWatchlist('ExchangeVIP') | project tostring(sAMAccountName) ;\r\nlet CmdletCheck = externaldata (Cmdlet:string, UserOriented:string, RestrictToParameter:string, Parameters:string)[h\"https://raw.githubusercontent.com/nlepagnez/ESI-PublicContent/main/Operations/Watchlists/CmdletWatchlist.csv\"]with(format=\"csv\",ignoreFirstRecord=true);\r\nlet SensitiveCmdlets = externaldata (Cmdlet:string, UserOriented:string, RestrictToParameter:string, Parameters:string)[h\"https://raw.githubusercontent.com/nlepagnez/ESI-PublicContent/main/Operations/Watchlists/CmdletWatchlist.csv\"]with(format=\"csv\",ignoreFirstRecord=true) | project tostring(Cmdlet) ;\r\nlet Env = ExchangeConfiguration(SpecificSectionList=\"ESIEnvironment\")\r\n| extend DomainFQDN_ = tostring(CmdletResultValue.DomainFQDN)\r\n| project DomainFQDN_, ESIEnvironment;\r\nlet MSExchange_Management = (){\r\n Event\r\n | where EventLog == 'MSExchange Management'\r\n | where EventID in (1,6) // 1 = Success, 6 = Failure\r\n | parse ParameterXml with '' CmdletName '' CmdletParameters '' Caller '' *\r\n | extend TargetObject = iif( CmdletParameters has \"-Identity \", split(split(CmdletParameters,'-Identity ')[1],'\"')[1], iif( CmdletParameters has \"-Name \", split(split(CmdletParameters,'-Name ')[1],'\"')[1], \"\"))\r\n | extend Status = case( EventID == 1, 'Success', 'Failure')\r\n | extend IsVIP = iif(TargetObject in (cVIPs) or TargetObject in (sVIPs), true, false)\r\n | extend CmdletNameJoin = tolower(CmdletName)\r\n | join kind=leftouter ( \r\n CmdletCheck\r\n | extend CmdletNameJoin = tolower(Cmdlet)\r\n ) on CmdletNameJoin\r\n | extend DomainEnv = replace_string(Computer,strcat(tostring(split(Computer,'.',0)[0]),'.'),'')\r\n | join kind=leftouter ( \r\n Env\r\n ) on $left.DomainEnv == $right.DomainFQDN_\r\n | extend ESIEnvironment = iif (isnotempty(ESIEnvironment), ESIEnvironment, strcat(\"Unknown-\",DomainEnv))\r\n | extend IsSenstiveCmdlet = iif( isnotempty(CmdletNameJoin1) , true, false) \r\n | extend IsRestrictedCmdLet = iif(IsSenstiveCmdlet == true, iif( RestrictToParameter == \"Yes\", true, false), dynamic(null))\r\n | extend RestrictedParameters = iif(IsSenstiveCmdlet == true, split(tolower(Parameters),';'), dynamic(null))\r\n | extend ExtractedParameters = iif(IsSenstiveCmdlet == true,extract_all(@\"\\B(-\\w+)\", tolower(CmdletParameters)), dynamic(null))\r\n | extend IsSenstiveCmdletParameters = iif(IsSenstiveCmdlet == true,iif( array_length(set_difference(ExtractedParameters,RestrictedParameters)) == array_length(ExtractedParameters), false, true ) , false)\r\n | extend IsSensitive = iif( ( IsSenstiveCmdlet == true and IsRestrictedCmdLet == false ) or (IsSenstiveCmdlet == true and IsRestrictedCmdLet == true and IsSenstiveCmdletParameters == true ), true, false )\r\n //| project TimeGenerated,Computer,Status,Caller,TargetObject,IsVIP,CmdletName,CmdletParameters,IsSenstiveCmdlet,IsRestrictedCmdLet,ExtractedParameters,RestrictedParameters,IsSenstiveCmdletParameters\r\n | project TimeGenerated,Computer,Status,Caller,TargetObject,IsVIP,CmdletName,CmdletParameters,IsSenstiveCmdlet,IsRestrictedCmdLet,ExtractedParameters,RestrictedParameters,IsSenstiveCmdletParameters,IsSensitive,UserOriented, ESIEnvironment\r\n};\r\nMSExchange_Management\r\n", + "query": "let cVIPs = _GetWatchlist('ExchangeVIP') | project tostring(canonicalName) ;\nlet sVIPs = _GetWatchlist('ExchangeVIP') | project tostring(sAMAccountName) ;\nlet CmdletCheck = externaldata (Cmdlet:string, UserOriented:string, RestrictToParameter:string, Parameters:string)[h\"https://raw.githubusercontent.com/nlepagnez/ESI-PublicContent/main/Operations/Watchlists/CmdletWatchlist.csv\"]with(format=\"csv\",ignoreFirstRecord=true);\nlet SensitiveCmdlets = externaldata (Cmdlet:string, UserOriented:string, RestrictToParameter:string, Parameters:string)[h\"https://raw.githubusercontent.com/nlepagnez/ESI-PublicContent/main/Operations/Watchlists/CmdletWatchlist.csv\"]with(format=\"csv\",ignoreFirstRecord=true) | project tostring(Cmdlet) ;\nlet Env = ExchangeConfiguration(SpecificSectionList=\"ESIEnvironment\")\n| extend DomainFQDN_ = tostring(CmdletResultValue.DomainFQDN)\n| project DomainFQDN_, ESIEnvironment;\nlet MSExchange_Management = (){\n Event\n | where EventLog == 'MSExchange Management'\n | where EventID in (1,6) // 1 = Success, 6 = Failure\n | parse ParameterXml with '' CmdletName '' CmdletParameters '' Caller '' *\n | extend TargetObject = iif( CmdletParameters has \"-Identity \", split(split(CmdletParameters,'-Identity ')[1],'\"')[1], iif( CmdletParameters has \"-Name \", split(split(CmdletParameters,'-Name ')[1],'\"')[1], \"\"))\n | extend Status = case( EventID == 1, 'Success', 'Failure')\n | extend IsVIP = iif(TargetObject in (cVIPs) or TargetObject in (sVIPs), true, false)\n | extend CmdletNameJoin = tolower(CmdletName)\n | join kind=leftouter ( \n CmdletCheck\n | extend CmdletNameJoin = tolower(Cmdlet)\n ) on CmdletNameJoin\n | extend DomainEnv = replace_string(Computer,strcat(tostring(split(Computer,'.',0)[0]),'.'),'')\n | join kind=leftouter ( \n Env\n ) on $left.DomainEnv == $right.DomainFQDN_\n | extend ESIEnvironment = iif (isnotempty(ESIEnvironment), ESIEnvironment, strcat(\"Unknown-\",DomainEnv))\n | extend IsSenstiveCmdlet = iif( isnotempty(CmdletNameJoin1) , true, false) \n | extend IsRestrictedCmdLet = iif(IsSenstiveCmdlet == true, iif( RestrictToParameter == \"Yes\", true, false), dynamic(null))\n | extend RestrictedParameters = iif(IsSenstiveCmdlet == true, split(tolower(Parameters),';'), dynamic(null))\n | extend ExtractedParameters = iif(IsSenstiveCmdlet == true,extract_all(@\"\\B(-\\w+)\", tolower(CmdletParameters)), dynamic(null))\n | extend IsSenstiveCmdletParameters = iif(IsSenstiveCmdlet == true,iif( array_length(set_difference(ExtractedParameters,RestrictedParameters)) == array_length(ExtractedParameters), false, true ) , false)\n | extend IsSensitive = iif( ( IsSenstiveCmdlet == true and IsRestrictedCmdLet == false ) or (IsSenstiveCmdlet == true and IsRestrictedCmdLet == true and IsSenstiveCmdletParameters == true ), true, false )\n //| project TimeGenerated,Computer,Status,Caller,TargetObject,IsVIP,CmdletName,CmdletParameters,IsSenstiveCmdlet,IsRestrictedCmdLet,ExtractedParameters,RestrictedParameters,IsSenstiveCmdletParameters\n | project TimeGenerated,Computer,Status,Caller,TargetObject,IsVIP,CmdletName,CmdletParameters,IsSenstiveCmdlet,IsRestrictedCmdLet,ExtractedParameters,RestrictedParameters,IsSenstiveCmdletParameters,IsSensitive,UserOriented, ESIEnvironment\n};\nMSExchange_Management\n", "functionParameters": "", - "version": 1, + "version": 2, "tags": [ { "name": "description", - "value": "ExchangeAdminAuditLogs" + "value": "" } ] } @@ -2111,7 +2111,7 @@ "contentSchemaVersion": "3.0.0", "contentId": "[variables('_parserContentId1')]", "contentKind": "Parser", - "displayName": "ExchangeAdminAuditLogs", + "displayName": "Parser for ExchangeAdminAuditLogs", "contentProductId": "[variables('_parsercontentProductId1')]", "id": "[variables('_parsercontentProductId1')]", "version": "[variables('parserVersion1')]" @@ -2124,16 +2124,16 @@ "location": "[parameters('workspace-location')]", "properties": { "eTag": "*", - "displayName": "ExchangeAdminAuditLogs", - "category": "Samples", + "displayName": "Parser for ExchangeAdminAuditLogs", + "category": "Microsoft Sentinel Parser", "functionAlias": "ExchangeAdminAuditLogs", - "query": "\nlet cVIPs = _GetWatchlist('ExchangeVIP') | project tostring(canonicalName) ;\r\nlet sVIPs = _GetWatchlist('ExchangeVIP') | project tostring(sAMAccountName) ;\r\nlet CmdletCheck = externaldata (Cmdlet:string, UserOriented:string, RestrictToParameter:string, Parameters:string)[h\"https://raw.githubusercontent.com/nlepagnez/ESI-PublicContent/main/Operations/Watchlists/CmdletWatchlist.csv\"]with(format=\"csv\",ignoreFirstRecord=true);\r\nlet SensitiveCmdlets = externaldata (Cmdlet:string, UserOriented:string, RestrictToParameter:string, Parameters:string)[h\"https://raw.githubusercontent.com/nlepagnez/ESI-PublicContent/main/Operations/Watchlists/CmdletWatchlist.csv\"]with(format=\"csv\",ignoreFirstRecord=true) | project tostring(Cmdlet) ;\r\nlet Env = ExchangeConfiguration(SpecificSectionList=\"ESIEnvironment\")\r\n| extend DomainFQDN_ = tostring(CmdletResultValue.DomainFQDN)\r\n| project DomainFQDN_, ESIEnvironment;\r\nlet MSExchange_Management = (){\r\n Event\r\n | where EventLog == 'MSExchange Management'\r\n | where EventID in (1,6) // 1 = Success, 6 = Failure\r\n | parse ParameterXml with '' CmdletName '' CmdletParameters '' Caller '' *\r\n | extend TargetObject = iif( CmdletParameters has \"-Identity \", split(split(CmdletParameters,'-Identity ')[1],'\"')[1], iif( CmdletParameters has \"-Name \", split(split(CmdletParameters,'-Name ')[1],'\"')[1], \"\"))\r\n | extend Status = case( EventID == 1, 'Success', 'Failure')\r\n | extend IsVIP = iif(TargetObject in (cVIPs) or TargetObject in (sVIPs), true, false)\r\n | extend CmdletNameJoin = tolower(CmdletName)\r\n | join kind=leftouter ( \r\n CmdletCheck\r\n | extend CmdletNameJoin = tolower(Cmdlet)\r\n ) on CmdletNameJoin\r\n | extend DomainEnv = replace_string(Computer,strcat(tostring(split(Computer,'.',0)[0]),'.'),'')\r\n | join kind=leftouter ( \r\n Env\r\n ) on $left.DomainEnv == $right.DomainFQDN_\r\n | extend ESIEnvironment = iif (isnotempty(ESIEnvironment), ESIEnvironment, strcat(\"Unknown-\",DomainEnv))\r\n | extend IsSenstiveCmdlet = iif( isnotempty(CmdletNameJoin1) , true, false) \r\n | extend IsRestrictedCmdLet = iif(IsSenstiveCmdlet == true, iif( RestrictToParameter == \"Yes\", true, false), dynamic(null))\r\n | extend RestrictedParameters = iif(IsSenstiveCmdlet == true, split(tolower(Parameters),';'), dynamic(null))\r\n | extend ExtractedParameters = iif(IsSenstiveCmdlet == true,extract_all(@\"\\B(-\\w+)\", tolower(CmdletParameters)), dynamic(null))\r\n | extend IsSenstiveCmdletParameters = iif(IsSenstiveCmdlet == true,iif( array_length(set_difference(ExtractedParameters,RestrictedParameters)) == array_length(ExtractedParameters), false, true ) , false)\r\n | extend IsSensitive = iif( ( IsSenstiveCmdlet == true and IsRestrictedCmdLet == false ) or (IsSenstiveCmdlet == true and IsRestrictedCmdLet == true and IsSenstiveCmdletParameters == true ), true, false )\r\n //| project TimeGenerated,Computer,Status,Caller,TargetObject,IsVIP,CmdletName,CmdletParameters,IsSenstiveCmdlet,IsRestrictedCmdLet,ExtractedParameters,RestrictedParameters,IsSenstiveCmdletParameters\r\n | project TimeGenerated,Computer,Status,Caller,TargetObject,IsVIP,CmdletName,CmdletParameters,IsSenstiveCmdlet,IsRestrictedCmdLet,ExtractedParameters,RestrictedParameters,IsSenstiveCmdletParameters,IsSensitive,UserOriented, ESIEnvironment\r\n};\r\nMSExchange_Management\r\n", + "query": "let cVIPs = _GetWatchlist('ExchangeVIP') | project tostring(canonicalName) ;\nlet sVIPs = _GetWatchlist('ExchangeVIP') | project tostring(sAMAccountName) ;\nlet CmdletCheck = externaldata (Cmdlet:string, UserOriented:string, RestrictToParameter:string, Parameters:string)[h\"https://raw.githubusercontent.com/nlepagnez/ESI-PublicContent/main/Operations/Watchlists/CmdletWatchlist.csv\"]with(format=\"csv\",ignoreFirstRecord=true);\nlet SensitiveCmdlets = externaldata (Cmdlet:string, UserOriented:string, RestrictToParameter:string, Parameters:string)[h\"https://raw.githubusercontent.com/nlepagnez/ESI-PublicContent/main/Operations/Watchlists/CmdletWatchlist.csv\"]with(format=\"csv\",ignoreFirstRecord=true) | project tostring(Cmdlet) ;\nlet Env = ExchangeConfiguration(SpecificSectionList=\"ESIEnvironment\")\n| extend DomainFQDN_ = tostring(CmdletResultValue.DomainFQDN)\n| project DomainFQDN_, ESIEnvironment;\nlet MSExchange_Management = (){\n Event\n | where EventLog == 'MSExchange Management'\n | where EventID in (1,6) // 1 = Success, 6 = Failure\n | parse ParameterXml with '' CmdletName '' CmdletParameters '' Caller '' *\n | extend TargetObject = iif( CmdletParameters has \"-Identity \", split(split(CmdletParameters,'-Identity ')[1],'\"')[1], iif( CmdletParameters has \"-Name \", split(split(CmdletParameters,'-Name ')[1],'\"')[1], \"\"))\n | extend Status = case( EventID == 1, 'Success', 'Failure')\n | extend IsVIP = iif(TargetObject in (cVIPs) or TargetObject in (sVIPs), true, false)\n | extend CmdletNameJoin = tolower(CmdletName)\n | join kind=leftouter ( \n CmdletCheck\n | extend CmdletNameJoin = tolower(Cmdlet)\n ) on CmdletNameJoin\n | extend DomainEnv = replace_string(Computer,strcat(tostring(split(Computer,'.',0)[0]),'.'),'')\n | join kind=leftouter ( \n Env\n ) on $left.DomainEnv == $right.DomainFQDN_\n | extend ESIEnvironment = iif (isnotempty(ESIEnvironment), ESIEnvironment, strcat(\"Unknown-\",DomainEnv))\n | extend IsSenstiveCmdlet = iif( isnotempty(CmdletNameJoin1) , true, false) \n | extend IsRestrictedCmdLet = iif(IsSenstiveCmdlet == true, iif( RestrictToParameter == \"Yes\", true, false), dynamic(null))\n | extend RestrictedParameters = iif(IsSenstiveCmdlet == true, split(tolower(Parameters),';'), dynamic(null))\n | extend ExtractedParameters = iif(IsSenstiveCmdlet == true,extract_all(@\"\\B(-\\w+)\", tolower(CmdletParameters)), dynamic(null))\n | extend IsSenstiveCmdletParameters = iif(IsSenstiveCmdlet == true,iif( array_length(set_difference(ExtractedParameters,RestrictedParameters)) == array_length(ExtractedParameters), false, true ) , false)\n | extend IsSensitive = iif( ( IsSenstiveCmdlet == true and IsRestrictedCmdLet == false ) or (IsSenstiveCmdlet == true and IsRestrictedCmdLet == true and IsSenstiveCmdletParameters == true ), true, false )\n //| project TimeGenerated,Computer,Status,Caller,TargetObject,IsVIP,CmdletName,CmdletParameters,IsSenstiveCmdlet,IsRestrictedCmdLet,ExtractedParameters,RestrictedParameters,IsSenstiveCmdletParameters\n | project TimeGenerated,Computer,Status,Caller,TargetObject,IsVIP,CmdletName,CmdletParameters,IsSenstiveCmdlet,IsRestrictedCmdLet,ExtractedParameters,RestrictedParameters,IsSenstiveCmdletParameters,IsSensitive,UserOriented, ESIEnvironment\n};\nMSExchange_Management\n", "functionParameters": "", - "version": 1, + "version": 2, "tags": [ { "name": "description", - "value": "ExchangeAdminAuditLogs" + "value": "" } ] } @@ -2190,16 +2190,16 @@ "location": "[parameters('workspace-location')]", "properties": { "eTag": "*", - "displayName": "ExchangeConfiguration", - "category": "Samples", + "displayName": "Parser for ExchangeConfiguration", + "category": "Microsoft Sentinel Parser", "functionAlias": "ExchangeConfiguration", + "query": "let _SpecificSectionList = split(SpecificSectionList,',');\nlet _configurationDate = iff(isnull(SpecificConfigurationDate) or isempty(SpecificConfigurationDate),\"lastdate\",tostring(SpecificConfigurationDate));\nlet _configurationEnv = split(iff(isnull(SpecificConfigurationEnv) or isempty(SpecificConfigurationEnv) or tolower(SpecificConfigurationEnv) == \"all\",\"All\",tostring(SpecificConfigurationEnv)),',');\nlet _target = iff(isnull(Target) or isempty(Target),\"On-Premises\",Target);\n// Building Base Request\nlet _targetDate = iff(_configurationDate == \"lastdate\", ago(7d), iif(_configurationDate == \"alllife\",ago(1080d),todatetime(_configurationDate)));\nlet baseRequest = materialize (union isfuzzy=true withsource=TableName ESIAPIExchange*,ESIExchange* \n | where TimeGenerated > _targetDate\n | extend Source = iff (TableName contains \"Online\", \"Online\", \"On-Premises\")\n | where _target == 'All' or Source == _target\n | extend ScopedEnvironment = iff(_configurationEnv contains \"All\", \"All\",ESIEnvironment_s) \n | where ScopedEnvironment in (_configurationEnv)\n | extend EntryDate = todatetime(EntryDate_s)\n | project-away EntryDate_s);\n// Find Config Id (can be multiple id in all)\nlet findConfigDate = baseRequest\n | extend Env =strcat(Source, \"_\",ESIEnvironment_s)\n | summarize count() by GenerationInstanceID_g,Env,EntryDate\n | extend distance = iff(_configurationDate == \"lastdate\" or _configurationDate == \"alllife\", now() - EntryDate, (EntryDate - todatetime(_configurationDate)))\n | top-nested of Env by Ignore0=max(1), \n top-nested 1 of distance by Ignore1 = min(distance) asc nulls last, \n top-nested of GenerationInstanceID_g by Ignore2=max(2) \n | project GenerationInstanceID_g;\n// Parse Result\nlet ParseExchangeConfig = () { baseRequest \n | join kind=leftsemi (findConfigDate) on $left.GenerationInstanceID_g == $right.GenerationInstanceID_g\n | where isempty(_SpecificSectionList[0]) or Section_s in (_SpecificSectionList)\n | extend TimeGenerated = EntryDate\n | extend Identity = IdentityString_s\n | extend CmdletResultValue = parse_json(rawData_s)\n | project-rename ConfigurationInstanceID = GenerationInstanceID_g, ESIEnvironment = ESIEnvironment_s, Section = Section_s, PSCmdlet = PSCmdL_s, CmdletResultType = ExecutionResult_s, WhenChanged = WhenChanged_t, WhenCreated = WhenCreated_t, Name = Name_s\n | project-away TenantId,SourceSystem,Type,EntryDate\n};\nParseExchangeConfig\n", "functionParameters": "SpecificSectionList:string = \"\", SpecificConfigurationDate:string = \"lastdate\", Target:string = \"On-Premises\", SpecificConfigurationEnv:string = \"All\"", - "query": "\nlet _SpecificSectionList = split(SpecificSectionList,',');\r\nlet _configurationDate = iff(isnull(SpecificConfigurationDate) or isempty(SpecificConfigurationDate),\"lastdate\",tostring(SpecificConfigurationDate));\r\nlet _configurationEnv = split(iff(isnull(SpecificConfigurationEnv) or isempty(SpecificConfigurationEnv) or tolower(SpecificConfigurationEnv) == \"all\",\"All\",tostring(SpecificConfigurationEnv)),',');\r\nlet _target = iff(isnull(Target) or isempty(Target),\"On-Premises\",Target);\r\nlet _targetDate = iff(_configurationDate == \"lastdate\", ago(7d), iif(_configurationDate == \"alllife\",ago(1080d),todatetime(_configurationDate)));\r\nlet baseRequest = materialize (union isfuzzy=true withsource=TableName ESIAPIExchange*,ESIExchange* \r\n | where TimeGenerated > _targetDate\r\n | extend Source = iff (TableName contains \"Online\", \"Online\", \"On-Premises\")\r\n | where _target == 'All' or Source == _target\r\n | extend ScopedEnvironment = iff(_configurationEnv contains \"All\", \"All\",ESIEnvironment_s) \r\n | where ScopedEnvironment in (_configurationEnv)\r\n | extend EntryDate = todatetime(EntryDate_s)\r\n | project-away EntryDate_s);\r\nlet findConfigDate = baseRequest\r\n | extend Env =strcat(Source, \"_\",ESIEnvironment_s)\r\n | summarize count() by GenerationInstanceID_g,Env,EntryDate\r\n | extend distance = iff(_configurationDate == \"lastdate\" or _configurationDate == \"alllife\", now() - EntryDate, (EntryDate - todatetime(_configurationDate)))\r\n | top-nested of Env by Ignore0=max(1), \r\n top-nested 1 of distance by Ignore1 = min(distance) asc nulls last, \r\n top-nested of GenerationInstanceID_g by Ignore2=max(2) \r\n | project GenerationInstanceID_g;\r\nlet ParseExchangeConfig = () { baseRequest \r\n | join kind=leftsemi (findConfigDate) on $left.GenerationInstanceID_g == $right.GenerationInstanceID_g\r\n | where isempty(_SpecificSectionList[0]) or Section_s in (_SpecificSectionList)\r\n | extend TimeGenerated = EntryDate\r\n | extend Identity = IdentityString_s\r\n | extend CmdletResultValue = parse_json(rawData_s)\r\n | project-rename ConfigurationInstanceID = GenerationInstanceID_g, ESIEnvironment = ESIEnvironment_s, Section = Section_s, PSCmdlet = PSCmdL_s, CmdletResultType = ExecutionResult_s, WhenChanged = WhenChanged_t, WhenCreated = WhenCreated_t, Name = Name_s\r\n | project-away TenantId,SourceSystem,Type,EntryDate\r\n};\r\nParseExchangeConfig", - "version": 1, + "version": 2, "tags": [ { "name": "description", - "value": "ExchangeConfiguration" + "value": "" } ] } @@ -2241,7 +2241,7 @@ "contentSchemaVersion": "3.0.0", "contentId": "[variables('_parserContentId2')]", "contentKind": "Parser", - "displayName": "ExchangeConfiguration", + "displayName": "Parser for ExchangeConfiguration", "contentProductId": "[variables('_parsercontentProductId2')]", "id": "[variables('_parsercontentProductId2')]", "version": "[variables('parserVersion2')]" @@ -2254,16 +2254,16 @@ "location": "[parameters('workspace-location')]", "properties": { "eTag": "*", - "displayName": "ExchangeConfiguration", - "category": "Samples", + "displayName": "Parser for ExchangeConfiguration", + "category": "Microsoft Sentinel Parser", "functionAlias": "ExchangeConfiguration", - "functionParameters": "SpecificSectionList:string = \"\", SpecificConfigurationDate:string = \"lastdate\", Target:string = \"On-Premises\", SpecificConfigurationEnv:string = \"All\"", - "query": "\nlet _SpecificSectionList = split(SpecificSectionList,',');\r\nlet _configurationDate = iff(isnull(SpecificConfigurationDate) or isempty(SpecificConfigurationDate),\"lastdate\",tostring(SpecificConfigurationDate));\r\nlet _configurationEnv = split(iff(isnull(SpecificConfigurationEnv) or isempty(SpecificConfigurationEnv) or tolower(SpecificConfigurationEnv) == \"all\",\"All\",tostring(SpecificConfigurationEnv)),',');\r\nlet _target = iff(isnull(Target) or isempty(Target),\"On-Premises\",Target);\r\nlet _targetDate = iff(_configurationDate == \"lastdate\", ago(7d), iif(_configurationDate == \"alllife\",ago(1080d),todatetime(_configurationDate)));\r\nlet baseRequest = materialize (union isfuzzy=true withsource=TableName ESIAPIExchange*,ESIExchange* \r\n | where TimeGenerated > _targetDate\r\n | extend Source = iff (TableName contains \"Online\", \"Online\", \"On-Premises\")\r\n | where _target == 'All' or Source == _target\r\n | extend ScopedEnvironment = iff(_configurationEnv contains \"All\", \"All\",ESIEnvironment_s) \r\n | where ScopedEnvironment in (_configurationEnv)\r\n | extend EntryDate = todatetime(EntryDate_s)\r\n | project-away EntryDate_s);\r\nlet findConfigDate = baseRequest\r\n | extend Env =strcat(Source, \"_\",ESIEnvironment_s)\r\n | summarize count() by GenerationInstanceID_g,Env,EntryDate\r\n | extend distance = iff(_configurationDate == \"lastdate\" or _configurationDate == \"alllife\", now() - EntryDate, (EntryDate - todatetime(_configurationDate)))\r\n | top-nested of Env by Ignore0=max(1), \r\n top-nested 1 of distance by Ignore1 = min(distance) asc nulls last, \r\n top-nested of GenerationInstanceID_g by Ignore2=max(2) \r\n | project GenerationInstanceID_g;\r\nlet ParseExchangeConfig = () { baseRequest \r\n | join kind=leftsemi (findConfigDate) on $left.GenerationInstanceID_g == $right.GenerationInstanceID_g\r\n | where isempty(_SpecificSectionList[0]) or Section_s in (_SpecificSectionList)\r\n | extend TimeGenerated = EntryDate\r\n | extend Identity = IdentityString_s\r\n | extend CmdletResultValue = parse_json(rawData_s)\r\n | project-rename ConfigurationInstanceID = GenerationInstanceID_g, ESIEnvironment = ESIEnvironment_s, Section = Section_s, PSCmdlet = PSCmdL_s, CmdletResultType = ExecutionResult_s, WhenChanged = WhenChanged_t, WhenCreated = WhenCreated_t, Name = Name_s\r\n | project-away TenantId,SourceSystem,Type,EntryDate\r\n};\r\nParseExchangeConfig", - "version": 1, + "query": "let _SpecificSectionList = split(SpecificSectionList,',');\nlet _configurationDate = iff(isnull(SpecificConfigurationDate) or isempty(SpecificConfigurationDate),\"lastdate\",tostring(SpecificConfigurationDate));\nlet _configurationEnv = split(iff(isnull(SpecificConfigurationEnv) or isempty(SpecificConfigurationEnv) or tolower(SpecificConfigurationEnv) == \"all\",\"All\",tostring(SpecificConfigurationEnv)),',');\nlet _target = iff(isnull(Target) or isempty(Target),\"On-Premises\",Target);\n// Building Base Request\nlet _targetDate = iff(_configurationDate == \"lastdate\", ago(7d), iif(_configurationDate == \"alllife\",ago(1080d),todatetime(_configurationDate)));\nlet baseRequest = materialize (union isfuzzy=true withsource=TableName ESIAPIExchange*,ESIExchange* \n | where TimeGenerated > _targetDate\n | extend Source = iff (TableName contains \"Online\", \"Online\", \"On-Premises\")\n | where _target == 'All' or Source == _target\n | extend ScopedEnvironment = iff(_configurationEnv contains \"All\", \"All\",ESIEnvironment_s) \n | where ScopedEnvironment in (_configurationEnv)\n | extend EntryDate = todatetime(EntryDate_s)\n | project-away EntryDate_s);\n// Find Config Id (can be multiple id in all)\nlet findConfigDate = baseRequest\n | extend Env =strcat(Source, \"_\",ESIEnvironment_s)\n | summarize count() by GenerationInstanceID_g,Env,EntryDate\n | extend distance = iff(_configurationDate == \"lastdate\" or _configurationDate == \"alllife\", now() - EntryDate, (EntryDate - todatetime(_configurationDate)))\n | top-nested of Env by Ignore0=max(1), \n top-nested 1 of distance by Ignore1 = min(distance) asc nulls last, \n top-nested of GenerationInstanceID_g by Ignore2=max(2) \n | project GenerationInstanceID_g;\n// Parse Result\nlet ParseExchangeConfig = () { baseRequest \n | join kind=leftsemi (findConfigDate) on $left.GenerationInstanceID_g == $right.GenerationInstanceID_g\n | where isempty(_SpecificSectionList[0]) or Section_s in (_SpecificSectionList)\n | extend TimeGenerated = EntryDate\n | extend Identity = IdentityString_s\n | extend CmdletResultValue = parse_json(rawData_s)\n | project-rename ConfigurationInstanceID = GenerationInstanceID_g, ESIEnvironment = ESIEnvironment_s, Section = Section_s, PSCmdlet = PSCmdL_s, CmdletResultType = ExecutionResult_s, WhenChanged = WhenChanged_t, WhenCreated = WhenCreated_t, Name = Name_s\n | project-away TenantId,SourceSystem,Type,EntryDate\n};\nParseExchangeConfig\n", + "functionParameters": "SpecificSectionList:string = \"\", SpecificConfigurationDate:string = \"lastdate\", Target:string = \"On-Premises\", SpecificConfigurationEnv:string = \"All\"", + "version": 2, "tags": [ { "name": "description", - "value": "ExchangeConfiguration" + "value": "" } ] } @@ -2320,16 +2320,16 @@ "location": "[parameters('workspace-location')]", "properties": { "eTag": "*", - "displayName": "ExchangeEnvironmentList", - "category": "Samples", + "displayName": "Parser for ExchangeEnvironmentList", + "category": "Microsoft Sentinel Parser", "functionAlias": "ExchangeEnvironmentList", + "query": "let _target = iff(isnull(Target) or isempty(Target),\"On-Premises\",Target);\nlet ScalarbaseRequest = union isfuzzy=true withsource=TableName ESIAPIExchange*,ESIExchange*\n | extend Source = iff (TableName contains \"Online\", \"Online\", \"On-Premises\")\n | where _target == 'All' or Source == _target;\n// Base Request\nScalarbaseRequest | summarize by ESIEnvironment_s | project-rename ESIEnvironment = ESIEnvironment_s\n", "functionParameters": "Target:string = \"On-Premises\"", - "query": "\nlet _target = iff(isnull(Target) or isempty(Target),\"On-Premises\",Target);\r\nlet ScalarbaseRequest = union isfuzzy=true withsource=TableName ESIAPIExchange*,ESIExchange*\r\n | extend Source = iff (TableName contains \"Online\", \"Online\", \"On-Premises\")\r\n | where _target == 'All' or Source == _target;\r\nScalarbaseRequest | summarize by ESIEnvironment_s | project-rename ESIEnvironment = ESIEnvironment_s", - "version": 1, + "version": 2, "tags": [ { "name": "description", - "value": "ExchangeEnvironmentList" + "value": "" } ] } @@ -2371,7 +2371,7 @@ "contentSchemaVersion": "3.0.0", "contentId": "[variables('_parserContentId3')]", "contentKind": "Parser", - "displayName": "ExchangeEnvironmentList", + "displayName": "Parser for ExchangeEnvironmentList", "contentProductId": "[variables('_parsercontentProductId3')]", "id": "[variables('_parsercontentProductId3')]", "version": "[variables('parserVersion3')]" @@ -2384,16 +2384,16 @@ "location": "[parameters('workspace-location')]", "properties": { "eTag": "*", - "displayName": "ExchangeEnvironmentList", - "category": "Samples", + "displayName": "Parser for ExchangeEnvironmentList", + "category": "Microsoft Sentinel Parser", "functionAlias": "ExchangeEnvironmentList", + "query": "let _target = iff(isnull(Target) or isempty(Target),\"On-Premises\",Target);\nlet ScalarbaseRequest = union isfuzzy=true withsource=TableName ESIAPIExchange*,ESIExchange*\n | extend Source = iff (TableName contains \"Online\", \"Online\", \"On-Premises\")\n | where _target == 'All' or Source == _target;\n// Base Request\nScalarbaseRequest | summarize by ESIEnvironment_s | project-rename ESIEnvironment = ESIEnvironment_s\n", "functionParameters": "Target:string = \"On-Premises\"", - "query": "\nlet _target = iff(isnull(Target) or isempty(Target),\"On-Premises\",Target);\r\nlet ScalarbaseRequest = union isfuzzy=true withsource=TableName ESIAPIExchange*,ESIExchange*\r\n | extend Source = iff (TableName contains \"Online\", \"Online\", \"On-Premises\")\r\n | where _target == 'All' or Source == _target;\r\nScalarbaseRequest | summarize by ESIEnvironment_s | project-rename ESIEnvironment = ESIEnvironment_s", - "version": 1, + "version": 2, "tags": [ { "name": "description", - "value": "ExchangeEnvironmentList" + "value": "" } ] } @@ -2498,7 +2498,7 @@ { "contentId": "ESI-ExchangeAdminAuditLogEvents", "kind": "DataConnector" - } + } ] } } @@ -2589,7 +2589,7 @@ { "contentId": "ESI-ExchangeAdminAuditLogEvents", "kind": "DataConnector" - } + } ] } } @@ -2680,7 +2680,7 @@ { "contentId": "ESI-ExchangeAdminAuditLogEvents", "kind": "DataConnector" - } + } ] } } @@ -2771,7 +2771,7 @@ { "contentId": "ESI-ExchangeAdminAuditLogEvents", "kind": "DataConnector" - } + } ] } } @@ -2828,10 +2828,10 @@ "status": "Available", "requiredDataConnectors": [ { - "connectorId": "ESI-ExchangeAdminAuditLogEvents", "dataTypes": [ "Event" - ] + ], + "connectorId": "ESI-ExchangeAdminAuditLogEvents" } ], "tactics": [ @@ -2846,48 +2846,48 @@ ], "entityMappings": [ { - "entityType": "Mailbox", "fieldMappings": [ { - "identifier": "MailboxPrimaryAddress", - "columnName": "TargetObject" + "columnName": "TargetObject", + "identifier": "MailboxPrimaryAddress" } - ] + ], + "entityType": "Mailbox" }, { - "entityType": "Host", "fieldMappings": [ { - "identifier": "FullName", - "columnName": "Computer" + "columnName": "Computer", + "identifier": "FullName" } - ] + ], + "entityType": "Host" }, { - "entityType": "Account", "fieldMappings": [ { - "identifier": "Sid", - "columnName": "TargetObject" + "columnName": "TargetObject", + "identifier": "Sid" }, { - "identifier": "ObjectGuid", - "columnName": "TargetObject" + "columnName": "TargetObject", + "identifier": "ObjectGuid" }, { - "identifier": "FullName", - "columnName": "TargetObject" + "columnName": "TargetObject", + "identifier": "FullName" } - ] + ], + "entityType": "Account" }, { - "entityType": "Account", "fieldMappings": [ { - "identifier": "Name", - "columnName": "Caller" + "columnName": "Caller", + "identifier": "Name" } - ] + ], + "entityType": "Account" } ] } @@ -2970,10 +2970,10 @@ "status": "Available", "requiredDataConnectors": [ { - "connectorId": "ESI-ExchangeAdminAuditLogEvents", "dataTypes": [ "Event" - ] + ], + "connectorId": "ESI-ExchangeAdminAuditLogEvents" } ], "tactics": [ @@ -2988,48 +2988,48 @@ ], "entityMappings": [ { - "entityType": "Mailbox", "fieldMappings": [ { - "identifier": "MailboxPrimaryAddress", - "columnName": "userPrincipalName" + "columnName": "userPrincipalName", + "identifier": "MailboxPrimaryAddress" }, { - "identifier": "Upn", - "columnName": "userPrincipalName" + "columnName": "userPrincipalName", + "identifier": "Upn" } - ] + ], + "entityType": "Mailbox" }, { - "entityType": "Host", "fieldMappings": [ { - "identifier": "FullName", - "columnName": "Computer" + "columnName": "Computer", + "identifier": "FullName" } - ] + ], + "entityType": "Host" }, { - "entityType": "Host", "fieldMappings": [ { - "identifier": "HostName", - "columnName": "ServerCmdletTargetObject" + "columnName": "ServerCmdletTargetObject", + "identifier": "HostName" } - ] + ], + "entityType": "Host" }, { - "entityType": "Account", "fieldMappings": [ { - "identifier": "Name", - "columnName": "Caller" + "columnName": "Caller", + "identifier": "Name" }, { - "identifier": "ObjectGuid", - "columnName": "TargetObject" + "columnName": "TargetObject", + "identifier": "ObjectGuid" } - ] + ], + "entityType": "Account" } ] } diff --git a/Solutions/Microsoft Exchange Security - Exchange Online/Package/3.0.0.zip b/Solutions/Microsoft Exchange Security - Exchange Online/Package/3.0.0.zip index aaa3009f523db506e1163f603d1b8a77ad0d6561..daddbcda6fda08e0bbc5286f24fbb2a837005da2 100644 GIT binary patch literal 25244 zcmV)PK()V6O9KQH000080Qa>XS2B)kh|>rF0Jt3h02crN0Aq4xVRU6xX+&jaX>MtB zX>V>WYIARH%~@@48@UnwUZDSh*cPy4NGr!c(IRN>;Iq?fP^V`&zRL&O2&mnW#F|U) zkz6TC>i^yua=9;BIkA(=q4^Ma$>Gd!W}bPWKK}6!j3s}z*$N7tJZH(uxzawL&B97r zaK)EUfO0ASP#H)wUDSJac9cF#kEf-9wSdj+)Btzz^Q$vh2qm1*Dt%o^Cw?i?|5&a5 zluW#=6<4_gL$Y3r%xJ3@Er z$I(}6$(&|xB`kYW6HZtufm>h(7GT0Q6ew_^QMORlaVha&`i_)Cjo8cg8M<}}>fawL%p)H%UBndEl(6Y4~g<{tiA+|eC^r$Er zlz8k_WvPvuNmz0@tKl%ERq0{Mz&EFnb3(n5CI0h+w35mICJUpC|t@iT;C?{I_1 zTxa8C(#buxns<{=CoSP7GSHRD;37o2PkYy03f4`kKSg)i*G(3mHIlnhA3Dfoja56_ zpb2fsGqAHVN}qXfT~-o4#jVG}d*Ktrm?A~yDHjMTn{)|p+mHLM$)wKsUUOk-;1o-{ z8&rivjzFaB{!ft;b|aGs+W=bv;>3kSLlDQP3`xpiv0#lUdfMIhE|si>6>|x(;yj>w zbm)&pSLHx|PKo8^dx2#L+mV8;&POR++wxqU&h($pCwKfb)` zM<(_cZsjGSd<>6K7n~?a(1uI@zL?o^yqKXqh|-G@ILQ0D(&;) z=8+CO)di;5^vvk;3_E}xwd8Y7N{K5gE%VT{z489RO89{2ohZmrVon{(Mo7sd z`CTj735iZb*e8aBbq3oPX9qs@z=8Z1F45)Qfdwx|As|Nq9;1Uk01n3Kn#d=trW>;t z-%$rb9g-b6eNM%v-b2riCoHb*jlVGxjD&;2^C_tyjp`^m_;?d+ev>@ENe(8A$o#1Z zJGe{QFoCJ)N0SyOlSN7GJm z?h(x;&*4fqugyNn1VTGAsBpW9e7{D|1|{Y}NMO6_6U**_N8RHqwZvBKy?eZ>S4jN> z7OK0!5nYCwJ}7j=j$}kQHvMef!ds6wQj0ZuVMl9N-F{JNgxHqrx-D;-!Eg{kyF~!( z>7ZJar|e{b!0Aj5Ua)P(jo9mh@0&q!jMOla>?nujr0uwumB_iueE%Gpoc4y)7^g|! z92o5P{gvD9C&A@$uA6#9o5%a^vtd^EtOJ6t3$a?y-#O4=Uz}|;8y$~BDl~N?fC*e# z47Z}5Dj@gnP8soNHlZH;GOlP=;u#iEoYQbvi*Xbu$J4>Y791F`*MR_oqus+&R^D2LQuEmYgUiNsQbttd38ka+@hIT8hWBv%#)f|y z-QnrLlEJQ}q zYoTpycCa%Em65t*`YB+~&m{iM63YSJr1_P^2zyumDnWm4>E{xsv8oQ5Ui$a6z->R; z&Mf@VJS$*-Syuh0n)dN(+IhlFt{1{sH~PXC8@%7>D_(6T@N0z`BcAZjE>ZlZmAv!3 z;5{8d3P9%<-26PztP)uHnyCN-nz#pL3D%VPWgBexGC@cDT%_b zmO9kHFbY$6_cMUwU982pA0;E_8`FQXWXzVwH2ltiPHIV_n@ zCQ+RJ-B>+Cgai<3W{fB#SnDJTrYSVWQi%{7MKQ}@J^wJgbi)hIPWW&d`{@lp*Uw&u zfgkcE1p857IB{bau!Ig6I0n(sO+|;~BY2qJOgJKtq_H1fDBQ4^6%qlI$2rms#e~auu24zu##cyPb5xDucDMq6Yh1`V4AX! zbB}v0jo8FZ66VHZCr#f2eUg;@(+k;%b8;C?1J8k~&bQq8!HvCP1l9hj%h)fR`C*cB z*F&f*z2xkluA}&UGI598QE2`XyT0^?m&{L?$7BBrnjFQ^n2NvHXS%|Y!uzB6@==Xq z8Du;976~~sx!wYsLW3*IZ}YUz>FNZ0yzu&r;vrm0UzSG$Ve3#LYZ z!<+DQI;ri-Ad24i90Wbz5L%||3+@8H9s^_f0f*n$etOB?e7k=D^H)yW#wpj1Hm?*# zkaJaU8oS$HY&9+y9khNqf3+)mZW7XNr)*L9I3LJU(PUD2uU`N7ZvU!nHRl zV4D5R-k6=8`Ug=s@-L3O9#(jMa^$EEiT)f!0g4k?3UwQWI%XrrE3*~k19%YIO$pVjb$iC7%R`fj;c*;!)1hW5iErw@=Q%{oDb(5C zK+Kmr%ieIAzA({&6VU+)qp~_xJv4CoHZ6PE6RTVC#%b zh0@I&kVD<5y-?NB7ouYIO7?J$sbrCU)e^akSc&+Hn1Yjd?kOmGRGxcf%uAClPu9xW);G!d zJiPMbC`2>yg`cFh`POg8PZjg6Z=G-bPc`5A_W9PYns5E)`PPy?_c-7Bb@Q#?IN$0R zq-n-g5Yj}gamM8c`e0^UziGx5sjjStYB{G$7rDa>6KFOMMJ*b-lR?Ksg-A?Ye4ZY8Ip0LT(@)D)TwPH-W7wS}V3&x9B zldcDI&yZgv8s#}+BUovc6emLcJh8~9QY(GyJW)I)Tm#kfqi*q;d4BX;&5wIoBW9c* zMR{c@(KtWy;=GDo=Mm`l!>%@=UgXCjnN)+tUe3|UB$&IC%Aa5EWT`B(y_LO_ox{FK zhn9BfLVwlq9YAeQ>33sZJE=Ng^K?Z|LY*iem%a7*j0rzqRG;7SKg|izv^>-=E+)&gaPS!jlqPS_+1RvB zUR~uDQY7!0w7{Nsf@=Wp{g6cY_dMjWKm6&)Ql@Ik=mMJYf07PpdpRiSmmK5gcBgfr zUh1a-5wScO6$RB))DCR6GEHECVf#2m*mu*Aw&jx5iY6x0LEtBsJiqH)QP>a`FWvaP z7hTg3=&_=WSK4fyCYL2?p>ZFY?w!IGwccx^?YP9Z3_qcA5xbMizn{YB*`|>CScd~Y zxKjiJuXbBbqtp$AIE(p^;|8w1U8;)~n&6-3Cr8D71nk=R!Hb&e12^G_`Aq`^JAjY2 z$M5V!N?eeC{1#LytPVfpZro*b%|I02u!Gz%!nk28jDPTxl;KYDC1)wJdkrc6+)M`c z&n%ga$1rt%Ez09qn*oPtc7 zi;hZw&&4l+o22NpeAu9&in_x}=r!=|v^@MRUq}atR~p{m5@_#WW_XfGQ?{ zviATr7xQ9a9rpHwix4+28ctEph@~B%1l)~7HjbdUJBX&K0RkbvTT!+e)J(d$P?&Wx z*2G_D9ECn8itA{W0XFawRH@Xt27NrbPQHo;DcFWirpEi81CzjkHdg22>_%eV15>+0 zsXxujf%X@6v5ZUSG)bdz&0<;4x=L5c*!CAbSWjSLCMIvylBu9KzNr>wz*_}N1s@H8 zlcAuipR)bQ1jFy<;?+U}t(kSCYODkEEml4#B4>@eQy4Vr!+Q4B9S);unBFPj_jPM* zUo@8+0Y4Rf9hbeChUhY#e;7&)Wg|g_3q!#}XPT%1$*2=u@ffv*x-qGkF}BAQiUkJ! z##0*plax>9QauZU@y*)WtJkN`pRKL2(@TsL&U??K^AVSKmx)bBhNhw?p8SZjI-3vh z9i=35(c+qr&evt%ML_`884gE+NRzS|x5Y8YpZ%w{4=hV_j(EEIb2jPfnj7gNE$L-X|>c z46d!!=>Nvp*GkdaDbDQi^Oc3QuSX75hAUh7<&uX?xOM6rv}(JcqdSbtyP7&fHwbPd zSngH$gA9b)&w%XH&`JDc9qo15VRRh^5y&WHN7?a_AJl8j8d70?odOKnbx5`EIT{h< zz5rUu*xmF)YtFj`bI;ODJ%d+DKJ}?ymDFdZq3U645hkS$%SfoWJlW^&9llNkM!B>}{EC`Crf@(Gb2mzVE zx)-3LSFgS5vtasdb=ey}p>0^vkp#M7ta2r~mKK(I2wG?oS_4^vlYCQdcIBCExn|-o z6Dga?R$rjPZzDeSB+ooy1;I{du4)jgM5)S&RDs6aiqg>BUr5SoD{3{O2!7RrAom@X z#fC%>fGV40i=`{~7nmQy`?7fHinhmSrQ;E(X^=uu=6aq_nz`IAfHfHw9K>Q6C20b3 z@{+?$LB@DnLUa=QLtMlsVD%cy0BvUGbzfO>-Q!>o2Z^cwt`fh?7gh7{)?*;Gr#@&; z2bWQl05xAd&knVXNYli=q}P$Dt3(r_OJ?WD4{CtUyM%Kp#4ChS47>40abpggNX0 z1zk8k=xNfs3c~lHDXJjGf?s?(dDW;7W?q#euR-)xxii#f38=w?oTmoHtQKfXd3XS7 z15)}0HBci5YruUf`bs7R9$grD4Zgou>fZM%v$pn{zLSM0WRQyPVJ|7vBxWo7Z(go4 z6-FWi(@%5^7?%c~UPc~CV=10NG?=1rbPE~P#iqbQ5{ehXSz9}l0#$l$Kqv|o4)tIECd7LgpL3U-7)4P9;4eC zmXYZ|lYMQi15Y%SN%4SQpxj+sQ>U@l*03j_FFyypDwbV0=e&TDJpo1)k4}Y%Mc*$z zSO&Q3FgULPM66v_poa0lOO~;bZ$PWWKnAf!;le$LJ}{aIg!>UFyD=x*0ZRZnT)O4M}jYAr*xylsQ_4#-k!w071jUXkuh}DBz@$TFcvaii+Bx;pgb{+!;BnbOX zX)6NoaTKR+&;d>4%D5_Oj3Z-oL)=j|t$0_CxI%s7D z^rA4~Y2IG=Xut|3Oit<&_rVO_GNA8!SGWuBX*u0mG(t&s8lP80DFcm~z3bI>huLi>dptW(Agvatr+}V#vY6(e->t`WqN=!Kn1O>Pv z%S8uaz#B<7!BHTRnr+TT#+r$nzwP3PmBhkJ9lpt4f=wOpj$w6ukKtUf+)l9z=&Qs| zc2F`2lYy3sRatQ^?;y;C*J4a98y;wobz~9?Af0RmXlHOD6bD`-24@!_y?A^h86cs9 zYLZ{_Q6X8Uq3oEz3htGwrJsuRBx^yupr*IF%J!1Mm+*SK+XG1O^$p;S(LBo4Neq_< zb~MIGoB4s>@Clc*hy=UZ4$kDhz!3KUj9_FMn{Iw+mOJGVI9SOtp-_59;|JC;%%>E+ zB{aG?9n?g)c7YVRP(W+Dv={;L#gBoo2`6zhTp-RAspSgLT&DCo%VJTe-WVy4vYyFG!%BRQn-$SN z1*Wj{hf|zng1`)O4DBzx{u{%Vy{PP^eVlU=xzpUFz0(MFe)1g9{wOJuC6IoIQMh6Pk@lXe72_c(;4xu`7t4y1G-ydXP|JP|tZ2#d?PN!H$Y8l?UtFvAfaoXanB&54mR;(hUyhA@npMAyAI z4z+b?a7R1z2vjj0r~&1tiH9Ovyf1AJ*eynbPWK+9^eu*nNQO-k9+L zWAesG`^J-0h0@8~#Drz)`v~U|tuW=Ks-s$4TT>{((Kl@a>FOZXk$+{DILfOdwC+nvvdm*$58v|*uiZw9AiL$Cy5?y zsZbNz1u;)L+*x{Rb`IkPJPa!;glHoL)PVSMK%QZ3;4Qm@bw9yS`3wveM*j^kco)OL zyZg{qR9<`bkB_h@=q|KyHkG|^rZ_D3_e}(Ah>*|Y`MqoViNRK^z*Zf0K@%7hvM4w5 zs)+UxYt2mpdPBidN`l(zdumTB>n$QgKoB{Y zdi0{zF2xt1LfRfz9Iv#eGR_qdX$407>2NsQ+HrWlH*mHFyBp46XOla-!yWg@aL{|| z^+#26W9cf(>X1uWS}LeACggH6RF)Roesy}52B>nE)M$Xl>1j(668mcu>T(gxPJ50m4Req?h?S7hbo`dC(mw_Pxvx>D(YO(k!4e%)PVKR;RG7RcXV*Uayho z%sO(upHLz&1K)DqvD-=p1>naf!La1zPobCR;H}a(DLnF72`l?kEM4lBB|X(_0A`hc zs;cBx#hiLBE_St_VU>T-t9x~N!g^5Fgn;v=P^-=)_~oe-w-*?VD#XlF$E<5t85&fD zMW_g~s|LCC$F2%AsQ~Sl{#;`fOMTN4-?X&feo5C$b)^(skT7b+x4AjqKHcMOBz1m@ z8ZhUUO*Ls9tL4^Ep-`2^@eb24wo1SF0Maftq+2YT>vN=6T$(Sf;+*Le^NMnT-qor8 z$~`rlQ|)p7>{I&Hkxx#jrqq4aKAz@OeRV1N=Ahw&NX_@IJ%tq77*Pn+ErHmHuzmw10QOd=2USnml&J?Z3M8eKr;=SxxQJ_05wl?sH4i z*KVFFB4&*k2{*E@ZPW41Ls&~BYx3Rox#uT)8jp+#VdcR<9}KW#e&n{J;bzkx1`WQ)7w47w05_o z&)uf4`*dmRDk9*l@o#n#&K!JKYO?4!DKs;)0x>lGs*maB>e9{4OzX$Aat}AH+}$c_ zZPJ>xNEc_1mSwY~hii~SO$p0v)$f`vjcMMR$7oRTemYjWyv}nK6bZECE z_)KZf=AZdu20x}dYmx5kmIHeGv}U&*<%Q)r`n{(!yCo;gown@3Fu>`AZe#X}oSZPIr~A>oHB&U8d=}<)Gg#9oJ(TuFo$G*F#jT%%6p0K$e^aQ+d9# za46n@a~Jstq^m(~Qk&;o=gCW8bV!7uCD@|Uy~LC5 zSnq}y`-I|Mvfkh5?Fx2T&w?6MBi%nGQTSC}1gmTY6)9Z=H&tdSD(K6FFn$fk@=oza ztJr=UpPviV%FL~6l_pZ(>1_aIEJbIY$rv2!osh)0?V!y)!8CxzTwVOsy&wh1wxkwQ z&8R5xD07JA_}2;p(Bl`8ILT=_6E0v{YpQVG{Xm@YwNDyrReg3e;3+#t@#T;Fp;VhO z{1jAOktxOUuCv@(Uj5@)NOf~tx#+Zln*M0C;wRxW2z2#>VzE^QRPqyX%DK8!=Zwy4 z<05*t)Jda+TwgU6?1()NuXK-^u!FMA$f-hU6yUZEHTpV6D|0 zjZ-(i;Ax()r}Qj`sC)#?ybhh?n1go96KGC82Wac-?Axgyc&K-L>n0f01)Pwixps^} zw2dxy#~2dkUPLQTJy#sL^cm|M`1tIhHPEm%DDhT=<=;La7taXeN)98u8DWT5Z_kLr5vABl))c~}FN(|N4Mr*<3E~0fBqn+h zv_`s|+o+;yX6Ne3bXcj&QUDM-x<7@cVF{svt!EtaL-RCaVRQ{RIT;;0EF(HRZ<>4x z%`}=gAyABy+XM*({XDt|qnK~(VWx&2Onp%pKSuE$R?ywkwR$*-{cuISSp~yr$WW#w zl%cBv8o;tsH-p?KeEJ#Vsss@Bih`?XeZ}ZjU?agd^d!HO0?I(l-*Tb|8u@4TrwCXM zGvDk5e3XJ5_Ss6F?^e-J`~$x2R^SgK_lFo&pNaz1kV*_9B)x6Le!KCGRs;FyJQ4HL zQgW3bO8(2syFF&|sV<}q>^=Qe>_MF;X0d~@2Lu$fq#Y?JPx|9Is>Ca?dyNXbm_*rh zk2#s;xiv8BKY(bL`vY+=OxBJf2E5Z`>9FGyfhatsuP^YSi95#lA-E4<{a_{W6ieZ$ z#sgvuq?PgOJe4oy-qN1=3t!UGut)z$qUFS$*qA-?Izs%M+yK*$JBWxWIX(im3teKi*jKbV( z%&}bIAkpvZOxR-a^6`ykvv6YOTb#!MlQ(Uv-7z`;O0FX_XJ8h!4_c>QuCY8T5+^pe zF=XYWKG||9r^f6l5;d%riJR5%l}PrOY+03iOt#Fwh-AwRLZFysxhw;2VXY_i`;q83%az1)FAHAH9 zUd~4^=cAYN(aZVh<$UyVenDQ&&)&OP;nlQyGYhtR8}DU>*U~VXwb8sd6KA%YU@EVCdk1-gJF&Gac2BSDh7ZQU}qv_2X zg;Bz@breRaW^37{>MYI=aCcD{i?Z_<9)(fM3$q#-a~T(pM#UFkRNUT}c-->%g0?*D z*1>FB9yuA`#v%CNbpBf`^S9jcD8YN&@_5|xxc4m&Yz~v?J!ZnVt4$Bf#C*X)G~;D9 zS3cg`F7`a$e7k=DGgT%8`bCb*7quUvn5|;dm)+NnNO>ma7>hD87nPHS`JA?ASMKw5DTs%oP}z?$%QL*kK;`FhROVrCwN97|+zt1TR?~ zO#OgThtcg$E=zp8e4U|S!dSU53LT7<^4!=H69BK0z92G)TSvo+OPl1CUwWFjbjv7a zd56X>@PZFMVIE$w08qru1_o@AOjD=Ba)U%=tD+RfbUkTS8gtYQgDJ%$Qx+-_>lg4V zu&`8~a>~lc{P7@G>Ek1ruGFAOn=5vk9j670vBXYDke(BkJti7LqJopXL%{}1znv+i z2=W@cs&jN%Ou%I46B@H1-ZvsxQ zQg@KhBV2S9P~W3>e0z7aF?u?3M&8D@v&Dxy&hBV?*Wp{wU(!8H^zL99qe3cp?@*7pKzKSZpkRqY0a#)2_Hg~W2w)N=sV-2U z0itoX^s$rmy#Hil`$=zS$9d`wM$Xo5Z_{yi`%j&njVBwsyZlM-2_G!9=QJlMC!D3b z;x)c)M0}fbKH$9#XTYC4b+$%3uCwdy_MEN3@X7G$#&DDOo-7b?J>`Gk!Nh_&$dfp= zBmM3pJjHpTA11KkZp!XRw%)Dd>L33cXzMx0-Ps(>^YgCDH~Tx@6K8i9Sb1x>wdL%1 zz|UL#p$ja%ySuTwLjYQ}qH!X?L8@YF#cwb;d}bO!uv#~ zI~HR>I0#fvBY1=&D7lQT55>hc@MHwSoPSivor<1sz;E*cAi{a9SN|x}F#WQIndf$Q zXJ@d*w|WjA^kJIzV6N`=y&b3jbhxwmWP8Ki8q71G7{B^@bYKRc76w)3GsKkz$!7{QM@kDmRlI$dOWyC+5z4;Gyv#%Cgs7QgG`MdfPhT+vy4b`}~wJ;6eP zNaqJH#QR$vFEQ}R{jeM}k&VrG%p{MZF@}3gWO_c=2OKKSoq!c{10Uz*OUDCaL_y4a zg*l*jwjg_;ORF;mxw6<(9VbmBIFT|LULp&r+S&O5HUcJzrohIGt+48$x!s|k`x+Jd zSt>mHwY%Zn%h(NW47lPo9mOa<%tlb1Sio~^YPdRCapNl zdie8IRdJ0p-S2dxpLZlGXf0Go>-&|=JMM57bfisZx3@EJw%pAp&R{s)a=g*@hPN}? zdeVEkJ%?o0YDOlCPoQ6!`k~a}jYcW_8&n8IoMnxurxk6yiqyBpCTvBu)~8C-=FUg_E)aN^ zeZ}`51&Lu|k%j$1>SUgr%`cJD`rEtx4f+(hYv<#;j;ROIO_rJJvM3%jxCMpD8x)9n zrLu=hbfs3QtS!prt2vM?N{tU#-6{GUBt25uBdNw0EDxKtRzv{ZHv(n6(?{AtrimQm z=GYiL_GIdVDb7F89Z+~+PF^HvmRGkUqx>ou?Oh>6#NShS-`Dk}4`wzP@zaER`hqyo zr0WBAY!YzXGZS~liM-{gv`c7+x5NlvM8YW%iFEQ4yj5z*zW37~ri1K`Ba)#xY=-g< za0#0|V_&=MGUg*vS_=vNdE#HY>F^RSWWd)f&Gg&zLEwUwA^G~7nwnp)yWf~79LenH z1J0&&pMZyQR$SHNjx((DHVs}CQD8otA7Ie*KNasG@#z{1b$#aS%*fgRwRReBMUN&o zcWKOdyWSSxaQn{S>9*%=?ew>u-O(0zo<7-lvfTsae}nhtSYgo07CFRuNv+ST@UWP^ ze6tVhIqD=a2qg64u@&?L$qn4qx0fd0#_n}jY-LQdxDN91h5?_r(BiLjO9frRHk3}x zb@U~#Yqxu{{)^(=WLQnd^+{|ogXLZ8$OI;kM{Fd zO)Y5bzUSu%pL(Jde_MVCTc!tU4iKW|Do+PesoyMi)-zh^K33NTm2t0Rq{t`+sYV;d zZC<%79X9P!)WP4NVk$;+m0XDBawb=Zqn@HEoD2AGNwqIRDCn;yJi-A_x=RzRzI7TD z1q}~G`ysSfEFmS@L(l|=qwU@8-I43KJDZ!%)?m~$KCC7;sXxRu*>qPeW^wGGA?bVhbzdwNhH*8F zg6TMXiK`947Xv{mB|^~UB|hT!YYI=0AcvBq2MYgrcQ2dOg>aKz8^+o7$G?#CIY>Rj+zL> z-20Xi|IB~|DqeAP{Q`IEs2TWROMW2Qm8^z5`|XWn19TJo$c5HZvMrWm>DRF*5Epy7 zw+5h9H{yEXJLyQJv8=9s8_C*;|HlG^c8-gCaLYXZFbUkymBR_I_=gFqZ&Xr|ekP|3 zh1w)?^Fv0TBy{gAg~LRlj^Q!Gcf2U%P&$Ts!3}v3(bE?*d0AV|3wOvtQ3&t?K;r^b z-vMdyYMSRT7{bwYq%bK&sJ(EzA=$%6?Ma4|ymS8?r~5xxX#39K_?p6lb-y}{uKBQ}n(yBtJ+ z;)3~7iLoA)F(y}gpT|9SHDNY&3cyaL$;2Phef0(|W~tlr6>c65IC`EX>nr$H|Kmm} zzC=WXmEue8Y~EW15W$(l4_gbYh0}Slj@RM#)(#(R>^j?9d{YEnxVyWaGvJ%sn_Hu& z8@-*uoDQ8w$Lp7Af-m0W#pg5w$nI@X*){e_z%0Jn0`d)9e^K^H(GZ?vZPWkGo{+V|xLddR9In|%hx>zdxCda(f*mZ@127^>yi#Cxk!iY;<7@rg?L6H0_&EiR zokk#>DX8>-$V+%nA_nRHEOTEg%y3fGh89YcOCk3gnT&ig6RFx_aMz^gi|{}VyJjxXHM z|5db+t%=w{>?x4$J!f)#W=CTR9epliT4Vh}B$udeu;{)lmTdM-&ft}t00p=>$e>S| z-l4B@OT7WshxtU(?Povn2Y%qEH)nElNLom*RPEeRKFJhnw)n~OKf_4kX|0Y5Dkou7 zI8RwGHf9h&_aRh{3gbpvQ_hoUlPI4A8?gl?`Kc1MN@1s2)oes`scAwAbE2?r2Hy^kAU0M8JgpIp+oASZN z>i$06dA)_W^Je4qL)zQSo8`&p!Tl%hSnj_P50?EhIq%M_JT5`kvvwYZqJfKt7+*ve zQE0VC_1hDIZmD~GjpkWpW%1ftTlydBk*{!49KNcrcKE6oaVAXSW}8@%w7n@jjDkp< z=)Z_Lmul9%n8yo_zL`Y_x)&AkzU)q~%9b$g2zW3B&Lfj7XL1@g*|W@op~JxePMyND zV>d})5IrU&pqIT?tj7h<&uVwv*O9e)HX#tV(2L+!-o_AA z<0tTEXVc}*R)2T*>F(2~Tm8+gN7eXIHJ({HxUFh@XWK2a>LHK1_HEkeJS1KF`3KEW z4}St3Qz~4s0Jc=Et3bV=Omu&<2TRF}%uhAX>sg-46qQ&L``X$@!6J;8lyUFa1*N1G zL{{$60H`+r%u#7?1bl%CztrUJMW=jNntox!Kq&rt+u)(<|CDX}Xo$Opl7rUP*fX{-cQb{=VSzivL@7EiiDEWy zO1ppfNR0(0r(+`=s?s)9{)EHYTHk1&4XLSI>vDVY(oNM0S>E}|L)-+2Zz%6I0Z@CT z1c*SNN)niHMs9U;xt4N~27}f4Hw?VhQUSm0RXv7N4ahpwyEURX~N2y4vxsvB)$_4oceBIS8?Xf@5 zaonz8n1ZFCFfy?(jOZQD135yboBl4@s`S)dWp znKLMF)OcuJW2=iwdX4IjS5Kz#1nG(P4Jp7B`a(ym>3zT8d2Niz8@nH}+R&eWCkoao zsdEb7Heyza&%B32j;_VI(I}O*pH1*EF-(DZvp4nptJEo>KA8%FTjJ0>2ODkIF>#^T z1K{Jz*w6y1vxJp4S1t1N=BAyeH|I04=Hy<~70?<)olmO{=il>G?-Q&n=ilp`)L0g! zG`=D(%Femu=K^az4Ort0U{>ZgFd|^2!Ga1@=$V2}v*OZC&Qa%FG5e6)%1|2o9+Mi1 zjJPhI@VQDdrR#Pr(&kCR<=zP^v}d+ew|=q}g9@uE+`PC(;Y6N6H+rJRJ zS*g}CxTOCINNuaP5#fSf1(kUtC$lm1VGKqdI<7=#S3-6oCIfExwi`|xAd}Zw%ryeAWq7XYx-P>ta7J{9;~=Y5)FM?4`p#N;xJ!D zBCgeLZX-aXve&M7+;HoWzg+V0Am%Pz>q0-|{%&C*s0bjazn){~ z$(FvHIAe+=9>9gJE=2wX1iBlYTkhK8K2qd^p`U)W!N< zlSXE#wSdq=3GJkP(tzqj2RRL0fGj7uEvx5#7~<|ljeb(Y z&a@cy{!xV8hX{L+-OedPBrHnO0zVBBBXg{|Dhk7hr$MdTcs0wnOD-(C`{cg8N4dP!@ZX%L_Hsei zI5;`DMehj(FP7XqMZd?!qhMT+g!rNa<3lnM)5qL;Ey3n0lt#r$2g`Vr%N4OJ_t=6_ zp^$At<@94^z^4tj(NvIq?(1kem9E6w`3ydX9)6x0gLV6=SGj$4w}Ii=f-er$i~Ysi z;x8sg!fv_Z>tj_a@7nM(N_eRDa>kjFN17p>U{FoVGZ}u&j3cjQjR9Jd&=7pCa_B?0n=| z+LxHO-49j_ZmW^KE=rB8sg6;|&{RINT^5_B(rLSYo7ZSsXc+etsADdNITQ`Fq*NWn z(fE{)fxAu8AU`xBTsLmD0DNDhwk3k(jbcggx7hz9FpXpP6~0wj$bzU&J9>mx8`xYYUUzhZ@t zlE+KW*b<0gYZ1XRM;?}Wdj%9lg)v!K*4&}g_#+2;Lb0i_y$2JiY*n(eat`j zSOD}}u{^CY2vHNN`#NLdqcRh(!@RumfhUu7U>nzSQ@4!mk~{H#&WO_A==YtC9{x9p z>1?y53bG7Q2bdMQx{|Gk29=gqJImRac2DF9UXAB+N7i0eBkL@87;b_|!C4?ZmN@cy z1a^59J{Hn1L63nXsm~L@uS7v8;PGS_`*c1Ed+>L^DbPRio4wh1`j3>g;5%O|3w!&& zPGf$4B1gNMTwVN;8LjP+L7=*d`L;b|aXfS!W$CE}Wb+z4%7HzY`T=E@mT9>YA0{Pd zbo5;KmK~jC0Wr+w=|%@*SZV?!y&I}S%nB_uJfdrM6HT$PiwNNG30N;zbeEvCFHFZ} z=qZaOl$pMT!9j<%xjVcxN_XTjWM3Y-4tavz59mmxI(aTEKYu)kr2xQ&0iW2UNf#&! z%#2b!IphXbiSkqK4H{PKuB{kRRQR zKQgi+GuFunP0YhI_XtCcM#o`_gHkD7-*ET~WX8NR^T8s?_eYjY2Ld7NkC^=#ypLUz z{cVD4LUCGl*{3I9h0GIbZ@KQds(heIRKh@44OUnD*d)SjC`w^g*@lqacJW}Ka1sU6 zDl!=&&@xs^(!tOaCS3)rss-mfkvNEjrd+qUWDqoWnqEe6W&cWuS0DwesvndvqNg(; zlT0V5s5N4PJM2@u2ebkkkmzxnazN$xSk9tekbD+@9d(^mP#v(h?s0c_myJttE$*^$ zcZ$2ayE_yqwqfHA#odZa3!CDlIK|x#|8wu1xewU#hJV5@RUfxK(D$n_^}uZqllhS8ZJ)otS9|Xdp2v=8MLF;;ggZ*KEW45o7@uW z%E15-I11{a2^(7c4CukVo@^<0hg(D@E%ABxJAJT0;Ff55=e5{egX?XOuY5JogcIK> zWlMiw<`M`@;0+2`{uGFraGJtfs+08yVLxrN%{)gPGWi({!qYa?4%7!W015KF z_T&pw=`FUqTddXOB3g#DGkY5FodyX101}z40ir(0c zXB(Sq4AQso0*)R%Ni7w2t5{8?5HgcMDmIo=_N>;j=^#cFo~I4h)+a$lR`|5}pt=b8 zL!oN!6U2B-DU2Ly0p&L@8|X=3J0enA0=6bnVaL56rZV zAttQWF;OZ+H)pH%UPyWw2Z*lLx62=+KVF zd|!#rqdiJ!RXs+XbLVGt9%VCuDF%W!bU7pF)#>+8eVfHqUuA~@@?F*(`gyH0szn4R zW?StT_DIOb`(f`a_ZXu@?AnfeCo=_kd@=nNY0W)2kf5y z!|*An+xeB<^2h01=mQpX|2_Nn&-wJr z$4A|Vg1LqvT z(3=F6mQ95a59|BU(wEljo%n;{AwK%wmP6Kw=HG*HR3pqltsb56F~C76a<#?$_zpWf z=@pUo-mJ?vXRO1S_Mk`O^ZTrtI`3>@p#|wSkh8GWPM$IY21VwxD31>pzE~%vpR=f% zj(%`i`#QlF2uGXNn%4A~Yf4-GievYa_|s z@vm_r`4`D0*HH(Q29^&vkjj^l7X4-`gRaZS;v9G;am}F~h^Iu$#-x3d@{yXrE&B3U zUHx6wfF4`JjE)(ct{r>PO}J8Fwdoeqt@dEH1UWlHD`4}vj{8J}(Lv_Y+Pia>*j{u~ zfHu|*3b~2<5G`Dq4$cDh)+j>RXG@|GfdALn$)5}*m ziQP3o%-fxF$S?_Qn`W%LJK_TV+)bX$W$_@JPz{h8u0@md0^I80jjSBinW&HfdhKp5 z%Ez_gws6~eUgA-R(hi%k0un%ZRZ zY+RP|$nJ$wV&Ly?CeZMqT4rzcMj^S~*Kx72*-I{{{3p8w@o#=!hL8`m{_Cdo@i~YS zCUH&#|4T(2oDSGD4+hb~u@ zAK!NYVdNoim<^DAo7VB+JIvdSEzlb+$3IE~VS9_M5bnU{KWEON7Cq?UzTX8s*9&JV zF}BFAN;=wFgbxEyN8YsZ7p!juQ~KE#sfc#N65+RJS0IO9WLHsF!=I zr47j8CA_ypH|I@hy4(w$S54~dxKg2PMvh29(PDYmFwq6^jQ2)=!UVeeisLtn3mB2* z&a(z|7gZ9jdEUvStD-Hdr%Tu``e)7gEigkq;*!J^5hlGy@M8J zP!EgPfUv0Z_XMszLTtl9fGb`rGN~LFC?I(LZR<=FNtgN_;*m`kwR9KZ|7(navvMH9!xPbygfyRDQYP!ut$ogl8aryw~NrBL#r_R{Hw(`#n9wUHk^{| zFXD--YH|=KB*7cENTy9j#73zSY0soFq+0gI&&|IbBA?ZOhGJ#BoA^5+qYPx(m1%@- zZr#wz*xZh2l7ok4Bm2BQTe^p&1Hlnh>O8TZurW*N5a6(!&nLl9#jqBdW5OIPv};_SQ9quZ zTE!rQC%gy3wS9B$Bv3&z=MQY5s`1xMD>9R08hezErg6!jKuZ5iGnYdu{8`v_1r#Eg z#LzYgY;pNo7?39{@t9`=%3q4mFPk1cVMs;c8d=p6Y2IHcA~A&bB95XI!VV%C+M#RG z1$~_fgxFl^5jdJ#;{XO)8b7K=u?QO?*&{Ex01J-3PD!u7``>cjO-^kz&}A){&8w~) z9Awh6GwckS(_nG~Ztz)h`8%u5mZFrx1>1O3U3o(n6wBhm;)rQkqO-zHTc)aF%c_zv zYOyJhY&oSDjz?}K4haNu$^9PXW8#)y+%3{z;-rqNk2cx7rExE}NPj7M_}I?;7;@yr zqX#YMR|O!4j$Uh=aQq-!Z@*n{bC%V$Yng-5+0e)oPdOy`M^Ig_5QD4P0|Enss{&Hx zRVUHqZ*V5)b-^yyOxhyqc7)nablT=slg7m{_Jv(a%B`?Qyt}QygdfE04vJRb7sAgD zD)wntIs_B$31C40zIaRYL|;`6kqcdit#~1zuMaHt8WQ1rSH7{s0d)etTiL_YP=vkDo&IAg@PjFxG<=i}rBQBK)ro=AJW{7BU ziqB6ty&D)gJ-E2v7$Uf%WirXro1@AT%@P|xSj;Kf(ewFC6dHi`2R6OEO$nY(!6esw zs+)@~{`KoY*1=u_ z-FOIOQ}C+JSc+1G982@ga06)U)>svy0D~k&+$<)6>a|%)W!e32^h;T-f5NQXzM#*W zGYd^+tBj61)_6JUFKU>!MQ&Yn&qUsZG4aF`4vaGAMftrOV!{iU7y}Kp(FXkD!VhG+ za(3>8lL)6f8|kL9A^~sY_=JBi)-l5UP+VwnKeyv=hry9_L-UGyi$DB1dJuN+4JW$h zc**2bXz^hTWmRO=W4bw+Num5neYqay7>Izo{kf>Sgyq*&>oPwZ*rzw8lODVLbPE-F z!&%DHX(pASa}rLL=ZRz}@hB0V4fvLsmD@d(z?wLxZFC&pPS0uxvFA~lsJWj~;Qywb zX|(_+mCtz`^%*9pB24a=P;J!11A~&-8c12nOqgh@=;-@Dq!HXi4FzTOykK~6I<5?n z_hM$4*9QGTg{+`WCIx6HO(j{+bKl*>(+w$PXMns9u}obi>CYYKv^ga!Z}cY|JjqRS z4op+;Zovm|9;e?R+s0$UB^i8>PP(36;a^?^>^;g6>n>y2XOXKBdr1l(dKJYxb^sIh zMZe;^<=1HxS#v|y-%Ujd(95JQY+3ywtY- zgcTZW`^G2fVR25N%_WGZpE7z%SxG6eX)rW_HoaZ<|r%OcZShFGpz_t~wuYC-Nj4S15TTV^F?u+S_QNqRF&P?Cu-d}RwAH?53u0+aretc%*KaB=}w{Pzp z!20DE=9Vu}Y?Zz|ZXW_~w*?3V%XqzIc`%QMBmrAd{GQ@{26xq`xeYr%^5?s_?60k{ z0YK|zjGx$o&AC*s;XiXH+BYKaLQ6`v_iMZKSgghwE75ElN|}q4M6=DmGKS+Ujf}mr zb-T0PD{0@Dy~V?dFn#GS+c-XIJ(2hNm6-)LQ~dc`qjRGt9=$8IRVY#g4pwMkK?vnK z&2@x;GNS~|`}r@&`_8z$fL)ceExE*qiCmASAWt*Z2goOum^@CI~=8b9PVcr@_lIT;b*j{pKaK%xZHIJ@*y$85B>HF6fw&N~p40IHsq* zwLJISlQ4zUtRWH5IT26_ z%6r++JNQDJ`Q>A{i}yCGf7>=ruR8bmckb)CiZiNN7=m13eMrMtwB9wLv-O8GUh)|D zoMf@o2sJals*5SAIhl7Et`(l20DlNN@>TI=gC&vq2{;l;Cbv1G)_TDGVHtXw}My+}D)Rbg(yBXTP z?z1MHj4f&$UEgbWFH87=Gc)Br$ua~(JQ*91+6v**PNA-YUE=G-D*k2!6uG!7#LZ=7 z0D?P^NWWqy^zS30$SVF+CjWj_LjBNg6oySc!#{XP?-c@UiBX10q1{%WSX=&iD2A0( zD@UM6qN;r-=kMk_DX-&*_PWqHxC${nBPgI%zrc&wFMKFQwy6m|xXtENHeuzwmWRZt^Kw7HFy?|l zM&*7}m!A-0EIW=r2M(rLadGkqi{585h?^ZmqO#g?=G3uV_QhJer^p;uaV))p3Rb~K zu}V;8dcN~|XBe^lO5^5u@tdtjBCEcH|3lV#jC21FgaqswUX!1o5|Z&_OL3e6f!}3E z>!;l%7VsTy&A>$IK4m|5d5l7>1yqDAn5F9PQn9RM>aU zLCY&RJ>Z2~Q*Kbx134>xisY#e)* zHnJhMbi&u?kRcGXu%7mbCBubTBpjLh@BzuX6b}_|m(5d9XQX!Cxz5g#fX%wc&lehX ztzA9de1U>Vsi0J$S>?oDb8lF#MvzLxJx+b1KP8BGmrIUL(yj8jC>*O%zo&X2St#!J*gE+-Q*Q}jWY{gt?buGeGO#w2lQr%P^sY;8^=+w{%#M|SAX{umcfTa9TY?D zx~p6d{-8L833lJ+Z)9N?rP8(N!_IYD;pBATTZx;zbMMs#^!1coJHdzKV++y_t}5#; zH5x@nfA-C+^uc;7Na1x2E_kg&sk)Lp!&vYM7OQRz8~OJ7%0(2Ox3(N}QX2k*Wan$( z>Gg!nkS|mj(3Sj$>kM(lwgdnc_#P#I82QxL>}y7r|Hn(OsLZ zAaaVDZpbmRsqSs?E#p9GaTXt-1$5=@^oHJ_97L9)v$}SY`5n4-HYaVRJY-U1bdBTX z;?)QEqCt^1^Q+0gR=X{JzND2SnYmSa-;wu64~r5n_B=rExFf$@-_SSCA-(Glf=z%7 zNY40r>KAW*t4ILUsPR$3=#-Fjuy<7hMJ9N1FV6P(`{DEv9mU?h}`gU4+Uj3Yv(up-}?o7FNRwv{v{*N&Oy%C}M@lxd8M2woUfe3MZKI^Rt& z-rqC)H^x&=;5|6kCf*MtZcbBBH=rYtkH9J4s%vCE5h0M=^kqBZAwDK&0AG&K91j&` zxy}+Neg6J;rV(2`GFvSSv&Dj8Xcp-$9>7DgA>lR&0>m5v*v2d)$QuWFnWkxR{T z*ljC&8De7^ks|BpREH*C{&~oY0N{=Shc|8~<$ZN^qi0gjtX6zHTvOZ!=Znc%_$~t{ zLqP)JP??~ zXT>pEH%Z{HpaPT2t8@}S)u_=8*s3}vtly3-Jw_uJ&?GD}w@Gw{;)&3Ds#s%2mo~u) zx2xP^`Yi5eI{#Ko=o`jb*qEhjS=}-UJn8=$1V)3m4_hp;blBuYl)Y;G&=7z z2_pWj*OgL{AaZ!+_J9F|@HE3~W}!~WQ)j+BxX4tL)%xKZv@-05VH+M zRd8XZZR}cWI$$z@st?gjI_ZDmSKj0#>=G1szZIW>xAHP+lWIb>B|nv@A}{oF?_(8; z>Z7~9zb82;=PhUMuIFBlEgj~}+hd|sgGsfOD;j~(no31X7OP5wk3yDrIlO469mU_h zj&j&7Zs|*G%ihZ1 zZBZe~RDmoyQyvj1QA2}SvMWb1sO=@aKKz_QwDupoa=+{58gl6)61Xp*1IN543m?R7 zq>o%~o@Zq--}7Vt+-EaSh)a{35hPAb)BHteW^3@yZs9s(ZlCvM_pv&&=53yJkNL-M zqG0y0lm&Biw6D{kW|jjK(Ui9nUa7&9ILUedyl8JEVM^F%dR- zqum&NDWp_q9ol?rC^jhiHUa#{pi3BHCCd^}j#|yWNdI%aOddgF0R{4^r-)dC+eITm zVS#hRrk;i--Hb61$KKXHr{5!muMp$&YJUhR9L!UUoivsy3ywwBdo}u}o0cI9exRd9 zd2#??NYBUNg0bMC<2JJ&?0`Y{@*2??KQ!)Wx_pD9P9Vcl8cA2- zRki^yv)mlghRe^9Gr+KvS%{>N^&Y!dmt2RJ?yu z^J*=v+;OBbJnWXrGQ1=Gfj*7)2Bm|}1bx-QkqIHbP3^poq*6cq%^!iQieVwR1b8Li zrw*|2@Q-?Xg<#E7(7}>ZEpb%kHoO#EW>VgN1K8;giSfn1Z(viPDE3b`GA zR;2Vw`lY zv)+1Vnqw8mcr=Z(>op69#+n5yP)DUJYj~y>6q?|~Jh`UaS=a1yV|iPlAsmaD4gzf6iMtWJuxjQ>N?sEO7mD zY?v6qjF_2Y`7fs3T<&juzTc_(Sq90W5J}NsS3xC)7&@Rbn^b_4BTPS(I(gJ^H!6~^ zvP{ppbYw5Byr-tfy<(693v&p-w+QYcx=Smc{G^ZvFasn)sS&P)B8I)I5c_P`3$Sj_ ze%P?Zn#A=due%zJ@0iF*{UTG-e_x;qrY$_qSb>%s@DxS4nx;Mh{DI_V^J^$dPQpiDrR^*H@eAo+t6$h>hHxsx9`Sv;@5;9X5^%v(&IdWF>CrSVo5$ z$hvBg^oiYTgnzrZPs8j?7;EJv2MNMv6RrBW^ zcJR-5=>5vuy=CxCIx@bC`>g_2tuo?;J?Kd?=snl()zn6D#fVlpl9NBo zd*Ui#_VE6!6-<=-n>?b9^Lz{8+Wy-6U%X|4W}aHX zY}`6+cy>aXe@gR}iV;;Rm~JsBhC|-P)s>)O@Sy(p8W11$$57BvRR0Md?SH8V@&6z4 jKN%?hXY2nt1PS?nuv1o7f=Bqz5}1!3`JZUMtB zX>V>WYIARH%~@@4+c*;be!%?)LU%yyz?Rbhhdl(>U1XEoUUBJdkYu+XlAxfavCIoa zYDvnj+wFh98A{ZPq%@pZvscQ}`B+d2Nx0m+@38n;A#Y$wZyPa^I7v zNyEbEl}NpI#NYZI9AnMdxH91{Dg`4qbl@iT*fk_erIE7$%g~)E8o4?Y+N06Y@q2vD zSqcRp7nN)nt>VEKT1vh4M(l8!c!1RLX(3Z_!k^~q&XxZA0Lb02RDz-aL^r*-i zlz8lwMWKzGNyxaI)o_^7s`N1Ba*Cmbt{*e>kwfVy!<*ZHML3cqo~9n3T;fv()*le* zGzJ8(UnJT(dqj5NF}pb_twW=G^S4`8g0oZZIQmygNF1`bJiEGP#}}{KLtq#gwRH$k z)6!PQtNu@OjVVK$8A+I>$a9(mo>N|k9~__CmxW#<)R!RTxbkN$Tq#dz2^}vcY=8fP z8-%5QKBVV2+T72zzOPnj@69=>#d3;fKG&t|1Vn)508L)i0I4zioejAJ{0yPk+uYzW z)yX)TbaIa^=iTJfNlW+=8R*g^a8X6NPkT3A3f4`kKL>Z(*G(3mHIlnhAKJ)eja55a zqX})n6R@))NS}FdU6v9)#jVG}d*Ktrm?A~uDHjMT8+8fq+J}!_lS!TMo#w*Qz$uot zUr-eiDFTtQ`@cj=*bPi3Yz-^}#EGjC4M7~EvPx18iv?>;(bMi@?@-Z7STUCnD$WC{ z2Z#P-bXg4a=ag8^-U&pTqJrj3*<}>I)?WhSwx%_q(JgKYD<+*A&v<_Pra4MiE4L}2 zU!R+>j*m@#TnNORGg|g{X)Uh>og(t7b0H*EW;Wln7Q;Nfff;Fxm`iB)YKV7Kb>9o zBNO`zxAYQGK8DAr3r-Xy(#c*24NnEo517!Vb!YSP@Zj)Zdhqw@!HYdqc$aq@m3Db? z{X_?z=p0jQd}?%YiXA|YTJkwaBHtYig~XMmmTA?rU3vdtC44~iRurTtF{KV=Eu>_U z{H~SkghVGI>@!2cI)m+tvjd-c;6VB-m*{fuz?>JODj-J{JVtwc0PKz96_HO^O*dvQ zzo!m_IwU)C`kabS{SG}pp0KdCGycX%FcJ=O&!?b*G^(R$@560n^V{g?HrksoBJ;Z@ zZ0|Oj+(urL-ETkcA?v%XIHlMY2GU`U=vu5zNnN5k(C$L^z)rPzGG0;n@Vc)_+AJ3`M7zJCVAF=DIHWJ@_LD{beUl_KRT@qKjF?6fDO204!U z=J>d6ovnqt?qk2QKh336k9hNRpFSFXbx%7W__ENe_52nASg~w^5O&4jTC>sNxJs9% zZWb`fD~q9+*OLdNJ``d`JerqK4~Gd?G*9sa3oXuaIM9U{3)AJvV5$sn&eTd6t;n3` zRH*(<0nYwes-z;70w-eo?PCdHa)0=hy%Uj;-EM1Ra4_!FN|K2^JgY)D2vW}lhjro+ z#v+`2?ABOV4TNDvn$^swejE&(A2D|CvGdS4;qi8AFrxGuq~UAq3eRhbej9?*Ikq5} znL_7!(j+$u$Oq=3sKC*?zwcD5?y%9T>itr>Tf^t(h(@z-kry5-OhK8E9n&ojj{gPK z8J1yV*537CAL#F>nDd8qW)n&mCIPAngQE0kDZ*vrIte5w@>xaZX~1s{@8S5B4gWmI z|1qF;C8jjNWw`N~Qp?~W{ybs4H240O{!aSq#s1;{N93(6ljo z+0saK{S4|e>p;%_;z9N^mRi&usDrXbq5w1>Vz}& zE_9;a$-={^N77!s5zP*1;U>}B6#wDh{{T=+0|XQR000O8YEBqewFts6kXQf!WJv-5 z5dZ)HZDDC{RAp^&Y+-a|E^2dcZtcC>a^%L6Ao$*9{SR@dGsDX!lFTGoMV3T$Q>>E2 zQC-+YO6p_9GBy&3BykD}67(!@uWX- zBlnz7c$D?sUuFsKd+|iROV@`RgI#B1%h?#L`+OS4S6J?ZPo|-p@&2FFIQn9#M-6y! zl)<~7c#;NjgzXIa8~8u@e!?@?cQeG`S9}1E+*x)JCs_1F;3aVyk2B`5bT*yFN%r>> z^$ZabK&Y7sqL5;(<2amU&=|`kLTnr-EQj^%gLmOZ=bRmLZ=;#ufBP}TW{JKwvB@5NBGK-lbF5P2`99MXmK5F}#g~t26ssV+(YH*< zxykhg*c2LES$@sWiF0Bm_?o4Pnbg>%%mHTP$Q8(0*gu6VJPx^s-bb2`mw#66u?P^QDe^o%XZw*GUS)xo!dUWz8`I_(<`+zj5QjJA*=*X_ zl~EkO8#oAhu_3ff*XP^?emw%l3PKLQFN5rYz5ZtZ0OqfpwyjgH8*N@HiXi8z-n4di zc(dKr(&;sSAMndh)JgnD3c~kp61by~n{p6VgCL|HHj3vnUG9yBva(DMmsj8B#nfzj zDG1p}ma5RMfH78`&3w&)5~{$VkMA_jsbq0nO=b}^B9=Z!J$F<+ha+5jqXMSc&-{(q z*;#N9N8{l9&>vuhXUB(*>X7KqK^&qufu&HlQL1A$V!Se2K|X*N5dk_7i}5@yHq;S2sO?xvUFX`%yhZOOo^*sfXMAJ z1B&7v4WfV*f-yQ(*LjlTb_%tTrims>e>$FW4=2FDT$yTm*IQn1=-hIzt+wNP&TJkevSCY_kDGr`t5nM$SGIiP^L zQG2b30Q98t+K{puxh6|oBOZ(<5glZB_C=uvgG|v-@e5$lEw9XU7Q^GY+KR=olpSkD9u+#jwlQm+_`B9cvmJ+S= zqbSbn*mV(semCrD6Y6DtER#t!SnlNlolL`pJE{En)lOE*GTU3(JJ~txn{;StmoD_@ zjp%dLb=O&2nnZ}XnP5CLLY zV7f46mkX}Zx!jHn2ZecRRD@evZ#}&iqs*Uo{t|3K= zo=FSrMJKoh@Ggi*lz+z~o&?^Hhn6yRQ$`oijQ^u_K-ny#fNDGa-XS#PvThw~5jke>`z%u-V%6Z~WFaBW$qi35!>SG-a{NPRz47}QH zIf*kj6yhx59>)z_d%IK@Ei}PD&yEkv`v};zvxDai)kkj15%a4S2zCG;ZI9pDiIln^ z|M)eiR9YQ=!ri!w_>zGrzG4T3VT5tRRv7;fq#47VZUhVP)3fs)dj{=aJq2NZmckDJm-{r%(i@;9GRFzXw1w!X1o%Sy z61r)IPW#uAGdu8(S>L4JNigAT4~Flbr~XA zhdK+TkartkGeMtD1$`cJ4YR(amGkLEE%=+}l=buiM$-R*UtNo7OjZF^OaNu?0BRxT z#lkx5%`q1tZhq{|P|k>@9iW8VO(Hglp}0GWXPE&4A-`Qwwi?t-`-M=Lbu!k(UuP0W z0Vs;=XqEvs@Dfz1%((=8Jibi7h({UNhEA@=2fhQ7z=1Ya7vk(zV%`B$yPnja7Ue+u z3%gjxrE`{M@uXp~Y-U}htK@9^Gas#|Ffmh;w;IV*(i>mb3p3!YlBI%=Jm6#~=<26z ze>%nRyM=hQ)Ieuu9jhAazagAbuLBGk2hW|L@ z(}h&e(qMeOw)XPX$+IVGYwY9#BZZ6JGwFQ9<=tgs(~+U6=!+*m;H=K)1AIp*$y~I! zrlj-r*|%{Rf^~+&ks{J0@VV<3@nx@f=rnkf{x9gqibu{NQ||$e8AjyZhrzx zmNeHLGo-FiNp8_NqDQO5jYb2dt>>;yly|I4jhsfOfbH?gvm?-u9ohSo<(|Q{wFdp) z82d&k+Bn6TJ$}Bnu=e%Hp~`V(D?eZGhzYk&lY>@m7xZ+8ad}r$$8*E*N`mEnjX%gh zsQV1aKP{caPu|f%pFNE)qc8>;h3qIhJ`TcWtyx1V&94)HLAwr__C3dAf;<#JYZ<$r zedx@2*I@2>nrUY6TFIwA^{bNl%r#WQK06R{Lk?1{gkWmXTx0|fBeo1Ca=MH%ErgXL z!4bRy+s)!3TuxaSp99Hd*nSUW>GX=mTe|ku@Z;d4=))*~1^BKhxY=jN?)zJ&-$597 z?{K-m_$fU9k^yg@M(imcqXQOck;^1pI^6V~SYPnf1t<%G;DL1={%(mPx@t28|?PO~% zP~*1|pJtNhp0JW&r!!X#h}EK0=R~SOV_`+fGxrzLs@jTLjVOX&^&rT7hh?!L5r&}3 zruky&%KZfvMDV^UUizZ#30moR1Zoy$P?Wj8ACP7)w+moRh6M+)@ZvN}K~7$9m?_8@ zZz_mRlfc78dNQ*CD(lp26330`tK_7yL?eM53fB2QhOSL_H=L&$0<>`QhTo4QIo6}n`8j!e!GIf6KO@QItIu@|`Lsw|UfZ4K2oV1mOJN3UL= z?7uugPWXn8(UcHCsbPS!3`=JHK2t%oF6T(}*aZqQ1fZ>ccKDQV%O4yi!Ng6j*bn@Q zt$1$4M%a&OV4m&MWLWK?IKAY+W$-V)Dq{sQ!Ug)!ku!|`$Y8MhAR^3R2Po*m2|!Pi z-c=C3_f1g+F&6$D(8;S-eK7Z`9QrMyug;yJK1)Ci9u_<`FlLQFJIccYP#ciae1 zIoJU1Q_)v4De&lxk=Nk+JEiVjuQF?Eujo5jh(ZRb=pOchLQN93vj6(UDpO%3LNNVE z$AEEZ;Mqm&lQfp%8AO9A3dh%wQGIL*EF__LA)K|fr&6Fw&kYDgq2hsL0x8rdtM@c} z^M^OG;E60)u{Z>hSxhUBfU(-mEYV>G4%HQaR!<`^5RT~xu+SY7KIRF!onaZ7jWpTU z)_U+nQ<)SG=mpB%wKa7bdufB^}@zE#?a0DKfD znH%;%6L}w;Q=73xRjqhvr&P^|y!!&3u%Qr&abO|SB#r5LeuhQ z{@w7~{D*8ZUG0-RQFG{jVEew0QbNdMmh`bbJx6obRb( zl5T>dKqR%>oUM#C7dL;?#}TWDg%>(}lf3|&I^;dW>iQ1DxnQ}SVHeO>iJk1BWD+I= zEfuS>;zHg*m-u{Bo;tA*$mLm;6x}6yhaSp&Ov(d>zZ9cF z@=in934s;dD_6@P6YELdf_OnqZ}pY!C4(>F^>%*%kl^cUz#F4^l&g~%t_bXKf|EA) z1HI-`E@u%5cC{Ux%YA_%?g1FV$TT+n;?OMjswHr+(q%%S@{Yz2tYer@8G1`-ba6VU ziE!xxDGH&0)^=$z0^*AwBViLxli1@axyK{^Ayd6rTf1w{KPY*$)sESLa1kxYwgr$? z2RAOkS}jAbMWv85UdO=dKBIuGC#${Q!i46)kI^r|RB(&*rj7$?%KwMsS1-j= zW!xVf55xl;P#O~CH{ig#9+0PcVU;YUR-3T021D}-70mdOC&w2&3{m4%GNCLka;dN^nqC$tNdZCHZ_#B=aozDO zrGZ;c^AQcA0%wcB4I$Eu4jzf9;=7-L&-8$Q7sewuEXJt*Bm=PTf(ukz4Qzm`q^prC zF#-SJdLby$%a)F4Zjf9c&J?NT3ea4p^g7F8QK;V-DUY(A$x6dY1D~4}(LV*Iu=Iyh zoMei?408PrDCJ<@wg<1(7k^&wRc6hn$gil613F)}cn7RH0 zbi;G9^T-pS1COw{oSS6rO=e*hOhYpq@!q-oa@U*~DI?w&PiY9ls7-X;iQ`aPhX!|a zLytg}(}5aLew_L!vc>z#_JG}DH0X5aK}z3Xh=^p^%;MRr&Y16hl)Jt#P&^@TjI?ij zNmVGFE=){VroM}D9?=R@U8;JjwY4>c5=`D>P7Kp$e~M>hx@$xGyIJ7p0a2ySh!yL# zp`KIkpoKraI6Q-Id+c=SAM?-YQXaxWC2IlS^*A2DBIM2@=}{9DRm9sli?Tx0z6IiXiJ5f&@PF2 z(&0|C6SH#|H{fGfQ7J?lDWC=fWiA14&L8~w&LpA zvww7mML~C=g|n^fT{FegYJXqHu!acvJXzekwx1eo#Y$||W9Kx1K_QC^Bd>~RAFNS=O*%3bvq6m#4 zSgqF9kc|qqU3F~+Ol^LrT2J+|cwW#madQMiT&X0et%0xhwDR5}LIebngQ-U^I_*;Y z22@Df<`Cvb7Sd! zp4Fj{vb0iAWlSjKW~ePKw*8v)EDccQE@{vJjnmVXBqa9jW|2SOm)bzzI*w53oEvdh z2py!H47puK~6 zLWnsS+VZgSsPv$WYX!6Gq!ZCIsX~xBk`n1EHRTsBc0fu(J#7JCpK|F+w=C(Y<^wRV{8LpWw<_k; zbMaiE?9Pgg)@j8;aI7JPZ3(Ka4 zw2t+1%Tp-SrE$E)G>o0nFW!T+i!JFEtLFLw=@pk2ORKnGI>n-*T%vbIw(c-ZZoamLg@rMW?Y*m(^`Alz}9quZD|6lewPZE zn;OxUG=Ob``@2g2H*ea%+hD$y^nPs~yYlv5Q~Ev|i&d|aT{s%Is|aq1#6dp z&3ltJuLCFNpPJ6#=lbdK9@64fKlSlHordCu)8F04w0GB}(2b_IyN_w@u1TNUO<(uv z($>{Pz**zp>?E8!_^#4q*>O^8W^M(-GySR$>E@c!&CN~ghqQ9{H?7?5Dr#NQnsrDQ zXOEU;^Q4Dskwa|>%WTzen=Y+s-rC91me%dMRJm!X{E(jQAwAoDNYA!70+BHqYPn$Mv@e~UW>C%4l>C&#r+1E&m_B&07c1?oMmG*4$ znJ;GWL%OpL>CUb>pw~}pcHL3Fu{=k=_jG30dCTG{@x{;5)+QVHL@giAN@2w5V|^Ynw}dOeu2-wy1P3@uWY|yCKFt zp?H_B4>tz8f?d}0pa#`Q|IcY0eNhy_Dw{z~N*BRRwONWv`f@3ZU&FDyQ@qhBw%^9* zX9Be`$iG@6CsN^R#?Sq$cNDo$nBm+BQrlf|Nk4HfE8 z1M=uzwc!V4+tE{nvN*(zoQ6VsI36yJM^BDROGmKQYKhJnF-4KMf>8>n%16C2&&cOx zc*cO)MzYMA?s>fO*oP%82JU683CM^4 znURSguOo8{IPRr;Wgef;83SDoVwOml2B%oshS?5N3^UCLLSmQCY#q+)=12RLn_|U{2qYV+<2e8Ail6Z=x@OC9=;!JE3ANoBZiH@&;>nA-#r6@u^64P23)~d$k$=1r*Kj?Mlp4a;5>vjl~!D8Bu zb^8G-X-$m=ZL4MRx>P(ar84asPIKEpi{(-tqATMrb14g}ydlk^FeF>EC)c<>^!p~` zv|PM;Fr(ezo0^#v7jdl=jn;ZcOTlwe=*Zl;l|}7?&PkQUShdX3c^nk7a@w3mxsoko z{^W-mR>zdgYWON7dq|_K$~~k}=D&$F$}K{moIklL1LpQ-wWmTBIF*Za$${LlW@mAw z>fGEeLyd2;gFkdWN9)2)&U#tbA}*J~%5MoRtsG z$_HoVgR}C%S@~HxD{GvTR_A2N>h9uY{Vc<)eZ?&(bTUN^URMlu}HNmW7c;6x@${cK~_YgyI8&=HlR$?fI zzm*t@;q_xE?29G4u^5V4_zy7@4>1%EF% z&v)-M`)e%b*WAgdz&HSk6tEfvRo`WfiwWM45V}? zu%$pn5P+hxW8a6-nvUK5R$^ef+e-0ckNMok1mz-?d1+l?JlEq=yySE=3qnfWMYk)t zEDg{+VJMg|vMh=t2SbZ|H}S;;z^k0ki45Y_oBzfhQo+d8c@`+j2p|NwkV1rMY zk5?Q36mheF0b3-q)aj_)Fjd*2D1|Ux51N<89C2Pa^8w!245CSrx1kRSsms`^DVgjB`t`cDNLEd6?_l$O(_C#Op<@J;`oP!00G`VU4?jx~p2LEA2$eL1G`k8py~^BCN{?{SRX_uu z-tq0-@y7V^*ctm9+s+pEcAVYu_O8RX{9SKzw7s)C9#UP8harW#Q8kt0OM?~GBE8e( z(J$#9Bzku+OHd&dy!TX(xIlO|GN53IQUO?D@%C>0x(r|%rgW`?qJh#cZZLiosCBuySx0+;1M6)XwPX*P);^Wcg1Ub+lu%$=X}Hm z8_tM7dhBeCcU))J-yJwxBkz&-c*EP|gGV=rxSsOg^Kfdx9OOxo*^z$x5uW0_&<|5s zaW`dmBwOz`arF;>3AIC{z}@*AEb{ZN%QuHR{v&617g%}A+uCw=eBkG;q2~fi@9u8w z?ht@Zt!Ug!_Oc+8CXw-$-pHN}aUQ3y zfQIA=J)kl?xe_hf?Re?T**iVeei8V#sy!ejr^Fxj7`~_fE4+_ox?wREgo8l!B!)*Q zg3^ol@~OC32A+&TnDdVcxf9Xz4ft(dz(Y7s^y(ky8fH+{FpJ#o?(B@V_}0MTqajSw z0nF9ip}*q{AA38SkG415t99`cOd4F$}O`uHfUmc;Wb9j3|h?`>y~LBk}VGy0nVN zFOQfFxf@3L@@lXh`kgA;r-m@_Vh$@J6c?{uRlrT0g}{@MnOgyq1ni^H6W!z#kj{7y|YyPKHy0L0Xjj@kBrV z6OcrH?dgXC?WVFYCZ~BL>S;|IFJtwswFz5Mt@WwWv`O<3zY7H3=3nvsM?qqkSY%;; zkUE(!XY&i>wBh#daDzT&?%MhIwrA>rbdzMRy4(~G8r*`yz+9fo^TVjMSV&RmCMLPE>-s?@aDBz#Ot zYbl{VPlHQ0^Dgj01bof1T)#aVg)UeblCQsRsQJ~p`?ZO}q0CM`;%r9w{C$+O;;I~X zl4D)8Y4ECs67%8w0E1@usdx{GPuEDO>nrDHM%D$WwbOVjc|5(kO=HgA^|$zjJ9I{m zw|!@8XSnU`j<>k;_|e9r?ExtN8+@?93WHX*$l=W^YJE|KhsE^8>wQ?yQ71`2AfXqJ zt)M4J?#ZvdxiI-QaWDH~D`S=ia*&TV3i;H97Js2zBIpt{PdYKz(U-ig-R|l7&x&)? zb>*!CH00Fw()ZZnTXa;f2)&5rgM8i#=#1#ML6T;#xfdrs?aQy4TF}IO$IlQx^+YTF zwli+FqzBX-AVkg8CLf?uzgq09C$!Ritgj6!<6gx`k?{ypjW&$iqH`>8~a{!T}F{OB1ZQbs7`}4G$0p5wuq>Atl;< z&;-5l_U`uX*mc~U%}r-(G#Wa)8zbNGw>(hnJ$HM1K%} zW+)p9bf<*-DUE}o@;8MwHoaBlFJCucG1@M!M4P?lm8igS4^sbgokl|Hw}^8Rzql<< zo4W++SMxn##X5m3dQAw*M{{+!?Nz9zngCzGjWoJN7OwWis<1#Af~tRMN+wp z#3l+b*E9eQ`WdfPBp+2X*xG7#_=0Qa175CEhq;i8oxv6=RA_6ZgN3Tqa%JqQJ+@#} zDpZ1ToVnR7ZS2#t2#ucH5vUjzhq_0s(yK5`Pr&Wfj$zL}06hxdNn^bOo$mo-l?tP_j zm^jigJZAWgA4eQYCr~fEA`c>Z`VuBDODlNco^ntWLcD;_xPVl-1kGBhc9lsyxL_;D~OHOW&>S1YH&HJXzEeW+2K z6@8=Fk_IX7I0TG%Qh@qnI&(vo&~lWrC*~^#eEPJB&_J*EfyXta**6@!P6*IzE*zc( z8UR%>-$V+%hX1 znRHEOTFN|l=lb%zW5h4z5y&hqct0f?rW@@Ocva{1e~KP%qt9eaYocF>6ZC>QrtHNek(vs$DqBCz(RcmLPrh7Z^!At<_UOgEE9^9@nvJN9EeW;U{W_MrHTUrFG2ilreAn>@1B~|@ z?>ajhJ7Z^Kyfc2ZGuj?(5BY+=qB{3*`*FM9mBs&?uyJqRro6YYy1!3%-rz>udGqo5 zQ`*}sn&s)|!TrbXMDD*54_5s$1@F$hJT5^uvvv`MvVn_-7@x=Iab&ee^;>aolBMp^ zC7NfomBnjoZRvk#M!v>L@$_YLwWlx35of|AZnudQNxPfEUL3~aME`lhxm2_6#5}&? z=$mud?rj(`U<;5;(P3MQvvlRe2T7&;sr;?yZUJ95($2GM6i0{Z!D z#d=)u{JeI@T^(6#W)lK&4IQ~W1cabL<4>R(Ki>8>J%7CE_!}Om#*g67&Zf(qt>NzO zvDVY!p+nQS>5?6Lfiz1uPN^}0Z@CT1c*SNND`QFMs9s` zg`Npwm<{GEA$YDfB}+*g>NaE%uvDh<%c36eTz2O*Au2amp+A7wbFLE7VAuYR70L25 zM|n)#`~=AGR1lBgUIz3|q{snSv{8yTO;9SG0Mq!=Mk!qvcPr9^5<5imf3y6t9~zI}E$wy_Vw!y`cwKOcX)(G`oKY(g#efa+vR zLe&UQ79m4Y*J%>Nzamw!%4*bzhS^J2Vpmuaco^Cl_I4dI7Adx%fq)b}0Nz0lpCs@e zTTx~MS%v#EXd3juw5UdlC^Kb_9?v{Hw`6MDD)tG+9*AvdY$9o!k3%As&v$ z)i-aoK4)fagu;7NWo4D}08*{RyaxBu@JT6-qQ&x& zg$=s(^#;qSMXWG;xD^g9a zd(|>eZ*JOodUG)oYeDWsT>-5@)cLgPaP}R~^ghALa`C;+NsVPuO5-cyqWqjoaW1gV z(}1*6|)b8tqi5X?=h*N$cXFm37_|Au5?|m zMcO<`x!gNprS{CWn$}OYVo+gKg`1bxNPN~4z(|FHX3wzMp6qr@3#E=$nkn{M40S$W z1)-zoQ||87Z;k-H@?SwYpIc%#*0PD@nyrqFJKO4@ zYX+z4mcg{-=u`M?->RptlAea9oY=||)V#}+658U+aj8e5jDz;kD=7Q}&Bb$dznlbT zTe-JOE4TErZg$-kC?QVDl56^0h^%s_iXN=EX&QS0t%tI>7;%`dA`#bWzpxP?QrT-) zJnlOPPj`U6{%o#(ZGD2^j~A~6aqgEBR4x^VKGeX?5?iQ&>BA_5SBT|FxSLx;ELMBM zu+X2S)i;B;<&{?<(leUqv7aw^bdYeDu63awa(}n95Yz+^G+)oL^Jq(7&T)6425p?$ z>PNdZrTE2bftylKR<6P4?A|cCsoFKW!%4qfY@b6#N8X=q8|q?nuSp}b)VhJtLkaD; zd(wdVL8U4X16xvi?_K@{QcMS-=Owf{2A9<^l(9Cf$fZ%p6}Z)9zJ5F~dYNJ_Wk z)pc_D@Z|VU%RScCwa;VPw_>w8hhU(sO1Zb$T{=jkeNfv_?|{ruq%~e9DC*?5hl*S}fq7mopVSg^{qX5GwLEctKEs-RC)t zq4xU#Q>Vzd45|)NA2=)NXv3>nzFl!)+1)31?L8{wt%m;=JhfK{vc|zFz%6@ED0s2r z<|+F7mTdyP7LWRnxSm|IHk7~IxcGVtRFe(+YO{ju?tPJ?9 zLXa#&`s` zC+^lTKw`eW5oZaX#P9K*lP)^P&8837cQB)Yym1WHxN{v7Cmsj6fK>+UjJWj38iNou zq57|KCO)h(@jA@Q_W|%^x(;mP`flb{v0ZYf!B06+h8x47voXN`rU{*Gwp2luA?g6L zLRVMv715y5@@j86AJhJ^Ji)8+T<*!*%W7nu9URm`{TBa7pq<2X-GEg+lM;870j(JTllv$Rahodz%|IisWJ!nf?`EDMNX zAx}3t7^6xPAnDym9b#5!q2UodKSR$F}TNoU4 zXq&sgiKH#R$>J zgE8Mbz5r?1B8~Z+ywfip*IjCp0k+ z)7&ErH5wgSal1|St@Z53r)3ddC4GX?ku~AliL1O5U)WBR@ES^U_?*nKqj3{QBiBf26xzJ zcn@d|HXzZHF6DsA@35Rjy&(B4{yIuZuLo&5gSDb#Z+t_3)OJZImNWuO`!Ao?AnKuu z59kV|-q;FQeVtWM9YC|7(ctdx?(XgfcXuav(BLk?<>2n_4ncyuLvRTM*TBKg<*%)+ z-KxEJXCAtyYNj7&dirZw4SHahZT-vuik*T^cUPg1I z!PBSI-XW`7g{H69>uUOY=pQyP&1FrR+@#QWC*AufFr_NXMN4VAL!ypnPx)*=L8Dl=kj zeTw4ig?_o^Wvp=5FlAf?gKH4q)UjdtB`vnCV$@`sEnJhYD{e3#2UI)T$VB9!{E|7n zQpSC}b%tR`@2->=19otPC`_Pe_i_gpLlNuUAqeOgYN4$ZV}{^>EX{UXKwLSZS+q zTeaKQyTo2G_Smq4a2Ql#8$iBefn{6@+H<@ZnAeYWNK~W~lU_iq5TE}73U1uKy{n(@ z#6o61K_YjRmtM`VvcCc;?TQ+#$eZ`_0i@*MEQpimDAI|b*1H|K`F2qLN~-1_1GebP za_VB^=}So4+)orJVu-Y8t|9&VBsF<{^zkdbYP0F5w_d8`qn_{0x1&11Gn^fp-ynes zVmXYee><+`2z+xw4H^_2XE+jQyZi-g&vW)7^IAK~`9%UwZs|F{4}u{hBzOwE%dgMZ$%Pw`$_;o5}A|F!D|TV|cuWtl;g95flTvgVzv zICiJs7+?q)weDM7xSV2L*|{F^u;XQJ_*VU9rXhx@K8ah)A@9gZ+Pr!07cd^;g04_> znGu@X&dXcC-6iDr=Oz|13|m@@(h#YnzaTa}t<0x+t%>1Pcq}{Nh1y zY0-I*rMppX<)_pc$AQczU!sp+ujR$6d&|yr4s9zt?y7Xzl^x4YQOy3S6T^dH4*eqE@HF=|pVa@Xws@rD@Hx~tnFHSeis{ND z{>Y$Ac|os8TU}Ri-DbU@09@+{oMxC-WW)m;|6DvaVzPg|4rZQ^C&TZJDPol{p16}1 zs)`l1S}DOIk<420aF&*4n0bdqfp+V*9E|O~)TUe@VUyq6m7_X4qwD6h+$g%e<8+r@AMOrD*C4sU#3OQD+>0q1GGO$P42-2;rnS|vUrV(yDPU!bLmBns z;rj#JoB+opYnuVXa{pgE5H$D8UICj-sy{QZei<0A!|=wGqTd!6o4AK|8D)1`xs34u zv>?EI!)h{h!zK41MRWg2LqWu5H0|%q@QU75AzX++? zG-KV}A=!jsx-#3@xAWw#);IArKe67vs-RX0 z`c8;hgahEZ^{(DjbZyDNn6;O!Spg%zC0V`8W9<@~I}>X#Wj;}(ADvqSQCJ~ddHat! zW7c!d{6kkROgTN#ZF~{P=i8<)_xg@&yKG|Tq4QO+Fi`?;WX{{|Bku0c!343_G2M$@ zu8l+USJj8@-SiJCwkxqVujS#ur*Xg5!)xbYi(Zt__0508-nREmzxYJ1o(+Y1N{WKQ z)(h;ox~oO;Zr5lGdmtv?XJ-@s3MP(SQQ7{uM$XG43HpO9I}nt}yPX#g*+0l?hZkw0 z6&p=v>rApZ;!~CC^Aal8f|ae+fe$TO@w@)jo3zJ#Kl>63*(5khu;aaKe`dnsOE+zo z`p#|57KTPrFgBMucDh@5g7pS3)38`3N`Lf-Kv!={GK0R!pTL+i^I-3hD4&Wk9B+=u zH(?tleAt9gUh7o;qJP&IM2^vzH37nbMuREj3H%w}sU>##YFC`o+%7-=*+esgUM~#U z>uIAa2-Ye667Mb3gf^m% z$R8PDX=EgGO>i|)dN3R(Em9{$4t*XFh1~7I&p5pFB6i|(7X)!hNZ>?^$3yc#B1y;q zV)IxK1H^?oJ%(`!$Cnx;=A^er!u=1;W#F7$ytmAgX%|8ij{To8qb+9$&2VI*Fg12T z{3hRtZEv2JFO9o)wAd&IO2c9FF_4hqn?jt75GT=k@mGniEz=J>ked%#l4tB#B+^PA z_mDGImb`^7JR!apKWwVLoXHorqUDmsHLNp3AtL-*DJPzw-M9SsI6!(tYZ>s1lH-Hw z9fgh}#8~K+1mx=i5FmkB{ziu zwlQf-9I^tEbPt^cNpZiX)TNd8c^~yl6R)KbH7-y{N{4)dg%l`CqA?nI=?~yyw2RZ6 z$;UFUw2QW&=ck1d_|OM6)v7sp=oeL%!sabipY6PyHTDRKVw?u5tx)rGqEwKKVg{#} zohV~*)6?7?IEF`<%8<;VkOAC8CWe;a#|H3Gf5vOpYFKh6K(G33!$7|j$0{4>SPFql z8ZZbrRyKEl^Vm-@Q(=kMG(s_JZT4|6vltzZH80y+dvj+zuyZJZ`x=f0MTo54D(Dt~ z-VKXtqiQ0$Xi3S_pQ~3Yevs7d&<&a*S&)7MMYb*OkQlVwu^XbuDA;@GoS8tG-S#fN z+_gXu3mV_QAMM;G7w1 z1Jcp7He|H%6toQ-5b;im3@WZLu`VHW;{}|Si`^rqvM~u5!LaiNsRpIJ>9BWOln$tX zk-1umW|uR@QKAW!4OKdTorsDNxRj>yHxhP`FQ0sL#0zGB{*$P72B^$uRm*r;cMR-> zQwPnJf|_HgU#U_pqi)a3maHxUBaEl_38p zC?+M;Rc6I?2tVvEbu<>7BZpZj8lpdlK_CaL=R; z=AJA#iZV$FK3vvFOpWeIu{@$W8fh6jVobA&U!x`>z2Q%))<=ZYetmBamiZ!srucAY zE+%l#&~p%f?51obOZ7xhHKxhr7iHci*n!0W!%`2hlbV5b>?rHaJM>iRF9gkt_Y$s- z=+g*`dX|FE)oJiosk;PvuwX^xD!)q%P;d9P_^ji#a0b%-%YN^3`oRmu376(?U8ur8 zIw9rBu>MvFN#w^-)rb41JD35z@^JKKDud27?Y^1Yqe zUcb;_$Yo^PM)Gw4oA3x}4>Nsws2A)M3`N{fZ&%CsWv^Cpu!VEG<|e9d73tVWFXadz zi46wE{&4qkh8q-)>}WzD-$lHUfKuK{%Fh4H{+e*SW9c%Hh=ctrA)8bB++!(@OM_dB z{qk@;mUx!rvoFpo8iwFXKDRxO^Hs*+EC+YFXK-vN1zzKkEIjzCoua$lMm}}O3W|y_ z07ZS)V>A@V7&HkOGTxWL9sSG5>S?`+39R$y$u9e|^7`CqI?V`Zwu>!N#($6`4-svd zr~68>D(UZ^PDggBSx(VN5@$WB1a{M-MGkjMDRgwVl5t&T_oSMw%^}=4xRuG6r!YIsKqkUap~3Fw*aQtUW)7se z1i|!6NpE821ESanTdh=TCwn&9DFF-nwZeB<1S;Dg%XRBs2Se0l%*v5_Zv%Ye3VGJ% z3zHa7A&nAZsMyD)DR>V2wg!F@18??!kb(Jds*MgC4H!QPz-;REi*JlAHW78@KHP5S zNmsY!Eh4K4#&h!TcE{n&hQd4(=~uMY8ZOB_OR<8F4_GX1_88v9la(aZQtnn95-&tL zmKK{{SR2rhk)b&)XBKtQBqRmwg?+KrKC};dk@orU07)z&P{+k&(-xcdLf8ls>P>0p zdxBR@#Zo;LkG`f(aVW!zqau#iy#wzF<>DDSF9!07wA?xUwA>Jep}$fj=lW$v|Ho92 zOLGsRb$^!z_f^w$ZJ5b~k%&wic4Ns5ej`b#zMIAt#54*p8&VuDmQY=6_OSIXl7kjD zpm=-=8%)JvCc&|O(EvUK|L8F4WsSVVj^oF84y~|1gt0A6LfAT7=^pc8n%*uSKt{N>D)fe zpLg!tEER6&hySuEh&BSiHpHnkhE^LXyhTwHakP`MxF# zK1gip4A?>~K`_Jc1!R;&7#F88gveLu3_-@Ahg2dn$YANg+lel5P@4ZDiVSIHZ6(m+ zr;w?5pz;+V4lFo93{C}FTM~beG@AbBY^RPz$GW6la zz_F{TjXk6@lQ&*;wq6u!dbZmH@@i0h6tkMlHA2!@DrhE!lnNCs=Th37Oh4c3LmT>1 zeD}mqY7>wJ){=|70U9W;p)Mem_z>P8r=+SgjUr1hibd}sqG0B*>yA-)1;sMm;0Bw5 zeWEIl#w?KmQ@lTl67P&ik(sx@sh7G@VrGjDmRKct`1}hd@y97jC;Q1o*pY*FR>z{F z)VCD15F6#^lBLH_x@%a9YbZen?;IA`>1v*D>A^6%M5v8sCV&Kux1_fI(n1y~d4gbL zU1mAB9(CqbU2PZ3k4bP;GJK$HGJ)KTqS01zxtPqZ<^_8c~t& z>!V$U+2Z4@J}y4+x_H7pf>UFt#WBA1H?z2ivkgbgU{igDIC%-?!Z0q27bb0{D}4vA z01%&e*S;K@s)v!11*g5@#wf$6$1@!tz`{Nbq@XI7E$YPLLubrc_U5?1&QP>7==?U< zNFfvQi2(UjLZ)R*=ezFI(`L*#EaFFNy1BIu^@1+sLa}W9xbrpx__S*O;7-+;cAgS^ zADIZ`(Y2ry#b|bJ(-O@VY)JL_DsOP^m)t-6GTDv%wfEv{0)k#IUv-S~>kuYUI+0A9 z;O)|+;+rNy#}xv%_KlQiY}0rKgDUDoQ7Ys23A3O2_n`7bWqTD0c%*_n4eUw?g2!&s zr0nbHl(Owf^D=W$^avfs_NP&MfwgQ4WlCj6_iwusjBeWzAwii39KKMs^iPd?)BSpH zsK8h_ipL%-3o8O;A+j~*iUsw^!O0dhf_w=YI5ft`hCu2^m+rxRA$#mW?6lPwdEPn_ zR{ea7xr&^S!BI}l+CB3LrNhEp%()TmEP}>&_;(4)3Dy@0n@muAN+f#hfyzuu6l0x0 zxmS(1Lfq%KcU!Lh+VKk6$X0QSv8n4YZZxrPVb+X)<9jbnxk82x_t`T{k{+5LA9?q6 z>ink>9l{SG}yw3Sw1awPElfN~9%((M)3$^0)eEdsn8L_Jdm?03`^ zWf7@-D$^}rOi+i&(t5!c^UPzw2uho|N|^uZpzuy_vV6?L!!zw%3mVAzY~KMDD|(fh5F)f_<<5?RxlcU7OD3wrKaT^5sV0k2M~W3`oqG@P?S;ao@FXnm-pE zuEw*{r}%J42Vn?2{KGlbCt(4%xZT7|mO2g{3#}YKbU1gm`h#Je4CzN29TT-^RDM(c zF86F>x!W&UAx0!EP8&ls3(sqavyq&aduB6BOc&0>)RLTs4 z)T%E4IOr!5HD~qO@0oXaV0uZ4>`ygfa5G8`hFO!cLaysd)=HAcPgyn6=nQ)it?;S5# zX6lOo!?fQ3-yU9Ywka)Sf*hUWr6=PSgu&k*>n=ru6K z8(5#H38Ks4bTfWyC)D0aFWZ2(!>;|esoc`b(mTvEv!(E(rLTN3tp0g(m1nb6*bidF z=`{CfN>Dn`t16E@875cd*Ld*7v*&z3d5R(x+VrIE3x}Y6nCKA<4@xF-eQysJY+Xeh zX+&kkIFOS@Hvi3+5>{mASwVqIt%_x94PR5%E`TF#tD>ZZ&pFz@zd`z+P}%wDEVUa4 zTbN8XK=%0Yuel&4^njKizk$qomx=<+P^UQGSfA6d`x>H{z z;c9|o_5R_S9qEX`P7*Jjy9Zc$aYJ(;ZcunaE^3)>>r$^w@v5aCcvW6zXOQ-WzVQ6z ztnsaCT}BPGRCMxvXk@YVZl2t5o-amfMFlW{vjw4K#yU>QX_(*ZI$adcF76u!qb%Fo zbzrGA$oB=2umvEYVh>v}gaX~%KktcjI<<#=Z8cNLUbxIzFl8tu8V1zhyn0;eKfTCs zvd`yXn4*Q;oEXm}nN&e&VRqZO!$#~&r8w|dP?DD(mtzsvz zCgh5Ajz=q*XBV8U(UYMB&DE^ZxIv&_+*dKsLsgj!ybejIrP{(glLudPlZ4znROl{* z11LH=<&yG*#UdL_++`pq-(QPE@kQRGU!wLDIl9DDAEaKs-PRa~Ejf`0UbPaO%+W29`AW%3Usg%s=6Klv-UJVC{3~aKs;Lq2%P%Gx zctCsT{4|+={Xs!0G7P>q1usd8>)>e%VfO^D4ql~iEErP%ol>rt&#?NqQaQ|RjnuMT zTZtr6_rRx372Z#^hsV5}&(I5YAh?}hpyRnKWQRQEA=&XN?UeNY$o!7iSgrB?gE^;M zb#-lSFfu>>Wj@gp#eQ4f?U;Bn*&`6x;az@S!cJPJx`kcY%qqUfemM1WK0*{qRaUXD z|D8zZr82_&6u~g`VZcE8X00gEdZ!oe>>ylT7s$iZcU(PwcV@^0zf~!kn92lGMBn!5 z&uV(wvqYG0IJ#?Hr;t{z{HV!2M5`h0N5uk(9P22pg+v&6NNN2)y!PO!uMF`HO&u;1 zmWuOU-Zu;|RnvFmuk;$r!ks@QqVK04U)!=(@*1zJf&bxHCjGs;YlRGR-5OgJcacpZ zu>zlIKy#o$Qi6W(epwMp!|DI<+VjyV(?#Ry-7gd)loyv^sOqENO~glmFCTA;Hm%Ka z-GyhA#u_sLu~y_bb!pp))*g+5WlWfVC}@*+pl~MCsLvsCPc**1=8gzyC42a+HALp` z66Dr|XKrb86G~?W^U(hZ#1XI$k5$DiF721SW7k6OqgpX64y|_HC|P@YK*URAemr2m z3{ps7Puu*&u`+pFcV>l;38&QY$R~mKI@m(AF!6&q8?f9{!z`b%F;Ob zY0Q60ph1-u9%@wQSI$UQiP^@!1B;=p`?f`E=|m5(*W8RmuYY|0TIkBmM&CNfZl$#Z zFK~3K3ti(Z!>^e^9h+Wg(80WfK$w|}=ccjQk9fc%pB!K?7@a>Gq9mAeaN+z3VDoPh z7HS9`#sAP6PZsqKxC0*wV5*+Z>D{_XOHYx*eaCj5B5NxzQ`E5RVStaOqMt!kskV+q z%S48dQ&4rHBUz6ZPik&iW}N0Xc_hLe9ZKlfsbcAvOOg<8>(RjlSCs++&JJsDna#rvps#wMmJZiUfowo3MB}8-wVA|w zk;HN}r`Yd^KHT`b0EP9M4YqVz`}qC~zfHAJNj>+yE{#+e0fEion4MIaN@5)j`AXcyAsPj-_^+S=qLPU7pS7t`&Zv zJ2=N?3G_RBIiaE4G>GPH-1HDQk=n3&#P*0&;2$8FbA<&$Z0QX+YW@+P2y$=P4fy*= zciPYjit>RIv9mdo_7k{(}r)vJT3R7XBl*E)6iru2cn z%}uq&l|4SV%R~@c+yP^MEFYye1-gnHt@zWV;EUORkxz8>R zbB(8TW(1hC?eCPsXt@X~pfQjVsIJwRR4me$!r4U}3NMQFUsd9-)EIl# z$3`-GE%lH5=||8E3dHI!WZP7J;nn=vgJ5b`J8I>^wX&)7?>y%imN`f1)&{G0@L&DQ z@FlHQgGPOR2-1#h-40sqPL&{RCxq0QOIS5t`SwUdHx>0iqxVdWbXXyB#$B}O%Y;Fd zOtgkD-#*oEq&=>p-5JakU)4WsZVD1#lz|0L9(R0kVbn7T;WDA-SnJ4_(kPL$u4+cw zX*ha7)X20MvVIn33k%&@+9WG^RqcaJ-F&?7HeNCTGp`<+hE}!C42vG+qcVIM;%M2k zoM$A$k>HOYHAP4$Y>5B4hr?$LV+cqH^8bj>@jrBQ_`j9>cU6%8bM${HfkyamY9gyC T!hZSB7O2k|{wasd|Filp<*5t$ diff --git a/Solutions/Microsoft Exchange Security - Exchange Online/Package/createUiDefinition.json b/Solutions/Microsoft Exchange Security - Exchange Online/Package/createUiDefinition.json index 650c17ea5ab..76a320b1027 100644 --- a/Solutions/Microsoft Exchange Security - Exchange Online/Package/createUiDefinition.json +++ b/Solutions/Microsoft Exchange Security - Exchange Online/Package/createUiDefinition.json @@ -55,7 +55,7 @@ "name": "dataconnectors", "label": "Data Connectors", "bladeTitle": "Data Connectors", - "elements": [ +"elements": [ { "name": "dataconnectors1", "type": "Microsoft.Common.Section", @@ -67,10 +67,10 @@ "options": { "text": "This solution installs the data connector for collecting exchange online custom log data in your Microsoft Sentinel workspace. After installing the solution, configure and enable this data connector by following guidance in Manage solution view." } - } +} ] }, - { +{ "name": "dataconnectors-parser", "type": "Microsoft.Common.Section", "label": "Parsers", @@ -79,9 +79,9 @@ "name": "dataconnectors-parser-text", "type": "Microsoft.Common.TextBlock", "options": { - "text": "The solution installs two (2) parsers that transform ingested data. The transformed logs can be accessed using the ExchangeConfiguration and ExchangeEnvironmentList Kusto Function aliases." + "text": "The solution installs two (2) parsers that transform ingested data. The transformed logs can be accessed using the ExchangeConfiguration and ExchangeEnvironmentList Kusto Function aliases." } - } +} ] }, { diff --git a/Solutions/Microsoft Exchange Security - Exchange Online/Package/mainTemplate.json b/Solutions/Microsoft Exchange Security - Exchange Online/Package/mainTemplate.json index d4171c7c435..22399294e1c 100644 --- a/Solutions/Microsoft Exchange Security - Exchange Online/Package/mainTemplate.json +++ b/Solutions/Microsoft Exchange Security - Exchange Online/Package/mainTemplate.json @@ -646,16 +646,16 @@ "location": "[parameters('workspace-location')]", "properties": { "eTag": "*", - "displayName": "ExchangeConfiguration", - "category": "Samples", + "displayName": "Parser for ExchangeConfiguration", + "category": "Microsoft Sentinel Parser", "functionAlias": "ExchangeConfiguration", + "query": "let _SpecificSectionList = split(SpecificSectionList,',');\nlet _configurationDate = iff(isnull(SpecificConfigurationDate) or isempty(SpecificConfigurationDate),\"lastdate\",tostring(SpecificConfigurationDate));\nlet _configurationEnv = split(iff(isnull(SpecificConfigurationEnv) or isempty(SpecificConfigurationEnv) or tolower(SpecificConfigurationEnv) == \"all\",\"All\",tostring(SpecificConfigurationEnv)),',');\nlet _target = iff(isnull(Target) or isempty(Target),\"On-Premises\",Target);\n// Building Base Request\nlet _targetDate = iff(_configurationDate == \"lastdate\", ago(7d), iif(_configurationDate == \"alllife\",ago(1080d),todatetime(_configurationDate)));\nlet baseRequest = materialize (union isfuzzy=true withsource=TableName ESIAPIExchange*,ESIExchange* \n | where TimeGenerated > _targetDate\n | extend Source = iff (TableName contains \"Online\", \"Online\", \"On-Premises\")\n | where _target == 'All' or Source == _target\n | extend ScopedEnvironment = iff(_configurationEnv contains \"All\", \"All\",ESIEnvironment_s) \n | where ScopedEnvironment in (_configurationEnv)\n | extend EntryDate = todatetime(EntryDate_s)\n | project-away EntryDate_s);\n// Find Config Id (can be multiple id in all)\nlet findConfigDate = baseRequest\n | extend Env =strcat(Source, \"_\",ESIEnvironment_s)\n | summarize count() by GenerationInstanceID_g,Env,EntryDate\n | extend distance = iff(_configurationDate == \"lastdate\" or _configurationDate == \"alllife\", now() - EntryDate, (EntryDate - todatetime(_configurationDate)))\n | top-nested of Env by Ignore0=max(1), \n top-nested 1 of distance by Ignore1 = min(distance) asc nulls last, \n top-nested of GenerationInstanceID_g by Ignore2=max(2) \n | project GenerationInstanceID_g;\n// Parse Result\nlet ParseExchangeConfig = () { baseRequest \n | join kind=leftsemi (findConfigDate) on $left.GenerationInstanceID_g == $right.GenerationInstanceID_g\n | where isempty(_SpecificSectionList[0]) or Section_s in (_SpecificSectionList)\n | extend TimeGenerated = EntryDate\n | extend Identity = IdentityString_s\n | extend CmdletResultValue = parse_json(rawData_s)\n | project-rename ConfigurationInstanceID = GenerationInstanceID_g, ESIEnvironment = ESIEnvironment_s, Section = Section_s, PSCmdlet = PSCmdL_s, CmdletResultType = ExecutionResult_s, WhenChanged = WhenChanged_t, WhenCreated = WhenCreated_t, Name = Name_s\n | project-away TenantId,SourceSystem,Type,EntryDate\n};\nParseExchangeConfig\n", "functionParameters": "SpecificSectionList:string = \"\", SpecificConfigurationDate:string = \"lastdate\", Target:string = \"On-Premises\", SpecificConfigurationEnv:string = \"All\"", - "query": "\nlet _SpecificSectionList = split(SpecificSectionList,',');\r\nlet _configurationDate = iff(isnull(SpecificConfigurationDate) or isempty(SpecificConfigurationDate),\"lastdate\",tostring(SpecificConfigurationDate));\r\nlet _configurationEnv = split(iff(isnull(SpecificConfigurationEnv) or isempty(SpecificConfigurationEnv) or tolower(SpecificConfigurationEnv) == \"all\",\"All\",tostring(SpecificConfigurationEnv)),',');\r\nlet _target = iff(isnull(Target) or isempty(Target),\"On-Premises\",Target);\r\nlet _targetDate = iff(_configurationDate == \"lastdate\", ago(7d), iif(_configurationDate == \"alllife\",ago(1080d),todatetime(_configurationDate)));\r\nlet baseRequest = materialize (union isfuzzy=true withsource=TableName ESIAPIExchange*,ESIExchange* \r\n | where TimeGenerated > _targetDate\r\n | extend Source = iff (TableName contains \"Online\", \"Online\", \"On-Premises\")\r\n | where _target == 'All' or Source == _target\r\n | extend ScopedEnvironment = iff(_configurationEnv contains \"All\", \"All\",ESIEnvironment_s) \r\n | where ScopedEnvironment in (_configurationEnv)\r\n | extend EntryDate = todatetime(EntryDate_s)\r\n | project-away EntryDate_s);\r\nlet findConfigDate = baseRequest\r\n | extend Env =strcat(Source, \"_\",ESIEnvironment_s)\r\n | summarize count() by GenerationInstanceID_g,Env,EntryDate\r\n | extend distance = iff(_configurationDate == \"lastdate\" or _configurationDate == \"alllife\", now() - EntryDate, (EntryDate - todatetime(_configurationDate)))\r\n | top-nested of Env by Ignore0=max(1), \r\n top-nested 1 of distance by Ignore1 = min(distance) asc nulls last, \r\n top-nested of GenerationInstanceID_g by Ignore2=max(2) \r\n | project GenerationInstanceID_g;\r\nlet ParseExchangeConfig = () { baseRequest \r\n | join kind=leftsemi (findConfigDate) on $left.GenerationInstanceID_g == $right.GenerationInstanceID_g\r\n | where isempty(_SpecificSectionList[0]) or Section_s in (_SpecificSectionList)\r\n | extend TimeGenerated = EntryDate\r\n | extend Identity = IdentityString_s\r\n | extend CmdletResultValue = parse_json(rawData_s)\r\n | project-rename ConfigurationInstanceID = GenerationInstanceID_g, ESIEnvironment = ESIEnvironment_s, Section = Section_s, PSCmdlet = PSCmdL_s, CmdletResultType = ExecutionResult_s, WhenChanged = WhenChanged_t, WhenCreated = WhenCreated_t, Name = Name_s\r\n | project-away TenantId,SourceSystem,Type,EntryDate\r\n};\r\nParseExchangeConfig", - "version": 1, + "version": 2, "tags": [ { "name": "description", - "value": "ExchangeConfiguration" + "value": "" } ] } @@ -697,7 +697,7 @@ "contentSchemaVersion": "3.0.0", "contentId": "[variables('_parserContentId1')]", "contentKind": "Parser", - "displayName": "ExchangeConfiguration", + "displayName": "Parser for ExchangeConfiguration", "contentProductId": "[variables('_parsercontentProductId1')]", "id": "[variables('_parsercontentProductId1')]", "version": "[variables('parserVersion1')]" @@ -710,16 +710,16 @@ "location": "[parameters('workspace-location')]", "properties": { "eTag": "*", - "displayName": "ExchangeConfiguration", - "category": "Samples", + "displayName": "Parser for ExchangeConfiguration", + "category": "Microsoft Sentinel Parser", "functionAlias": "ExchangeConfiguration", + "query": "let _SpecificSectionList = split(SpecificSectionList,',');\nlet _configurationDate = iff(isnull(SpecificConfigurationDate) or isempty(SpecificConfigurationDate),\"lastdate\",tostring(SpecificConfigurationDate));\nlet _configurationEnv = split(iff(isnull(SpecificConfigurationEnv) or isempty(SpecificConfigurationEnv) or tolower(SpecificConfigurationEnv) == \"all\",\"All\",tostring(SpecificConfigurationEnv)),',');\nlet _target = iff(isnull(Target) or isempty(Target),\"On-Premises\",Target);\n// Building Base Request\nlet _targetDate = iff(_configurationDate == \"lastdate\", ago(7d), iif(_configurationDate == \"alllife\",ago(1080d),todatetime(_configurationDate)));\nlet baseRequest = materialize (union isfuzzy=true withsource=TableName ESIAPIExchange*,ESIExchange* \n | where TimeGenerated > _targetDate\n | extend Source = iff (TableName contains \"Online\", \"Online\", \"On-Premises\")\n | where _target == 'All' or Source == _target\n | extend ScopedEnvironment = iff(_configurationEnv contains \"All\", \"All\",ESIEnvironment_s) \n | where ScopedEnvironment in (_configurationEnv)\n | extend EntryDate = todatetime(EntryDate_s)\n | project-away EntryDate_s);\n// Find Config Id (can be multiple id in all)\nlet findConfigDate = baseRequest\n | extend Env =strcat(Source, \"_\",ESIEnvironment_s)\n | summarize count() by GenerationInstanceID_g,Env,EntryDate\n | extend distance = iff(_configurationDate == \"lastdate\" or _configurationDate == \"alllife\", now() - EntryDate, (EntryDate - todatetime(_configurationDate)))\n | top-nested of Env by Ignore0=max(1), \n top-nested 1 of distance by Ignore1 = min(distance) asc nulls last, \n top-nested of GenerationInstanceID_g by Ignore2=max(2) \n | project GenerationInstanceID_g;\n// Parse Result\nlet ParseExchangeConfig = () { baseRequest \n | join kind=leftsemi (findConfigDate) on $left.GenerationInstanceID_g == $right.GenerationInstanceID_g\n | where isempty(_SpecificSectionList[0]) or Section_s in (_SpecificSectionList)\n | extend TimeGenerated = EntryDate\n | extend Identity = IdentityString_s\n | extend CmdletResultValue = parse_json(rawData_s)\n | project-rename ConfigurationInstanceID = GenerationInstanceID_g, ESIEnvironment = ESIEnvironment_s, Section = Section_s, PSCmdlet = PSCmdL_s, CmdletResultType = ExecutionResult_s, WhenChanged = WhenChanged_t, WhenCreated = WhenCreated_t, Name = Name_s\n | project-away TenantId,SourceSystem,Type,EntryDate\n};\nParseExchangeConfig\n", "functionParameters": "SpecificSectionList:string = \"\", SpecificConfigurationDate:string = \"lastdate\", Target:string = \"On-Premises\", SpecificConfigurationEnv:string = \"All\"", - "query": "\nlet _SpecificSectionList = split(SpecificSectionList,',');\r\nlet _configurationDate = iff(isnull(SpecificConfigurationDate) or isempty(SpecificConfigurationDate),\"lastdate\",tostring(SpecificConfigurationDate));\r\nlet _configurationEnv = split(iff(isnull(SpecificConfigurationEnv) or isempty(SpecificConfigurationEnv) or tolower(SpecificConfigurationEnv) == \"all\",\"All\",tostring(SpecificConfigurationEnv)),',');\r\nlet _target = iff(isnull(Target) or isempty(Target),\"On-Premises\",Target);\r\nlet _targetDate = iff(_configurationDate == \"lastdate\", ago(7d), iif(_configurationDate == \"alllife\",ago(1080d),todatetime(_configurationDate)));\r\nlet baseRequest = materialize (union isfuzzy=true withsource=TableName ESIAPIExchange*,ESIExchange* \r\n | where TimeGenerated > _targetDate\r\n | extend Source = iff (TableName contains \"Online\", \"Online\", \"On-Premises\")\r\n | where _target == 'All' or Source == _target\r\n | extend ScopedEnvironment = iff(_configurationEnv contains \"All\", \"All\",ESIEnvironment_s) \r\n | where ScopedEnvironment in (_configurationEnv)\r\n | extend EntryDate = todatetime(EntryDate_s)\r\n | project-away EntryDate_s);\r\nlet findConfigDate = baseRequest\r\n | extend Env =strcat(Source, \"_\",ESIEnvironment_s)\r\n | summarize count() by GenerationInstanceID_g,Env,EntryDate\r\n | extend distance = iff(_configurationDate == \"lastdate\" or _configurationDate == \"alllife\", now() - EntryDate, (EntryDate - todatetime(_configurationDate)))\r\n | top-nested of Env by Ignore0=max(1), \r\n top-nested 1 of distance by Ignore1 = min(distance) asc nulls last, \r\n top-nested of GenerationInstanceID_g by Ignore2=max(2) \r\n | project GenerationInstanceID_g;\r\nlet ParseExchangeConfig = () { baseRequest \r\n | join kind=leftsemi (findConfigDate) on $left.GenerationInstanceID_g == $right.GenerationInstanceID_g\r\n | where isempty(_SpecificSectionList[0]) or Section_s in (_SpecificSectionList)\r\n | extend TimeGenerated = EntryDate\r\n | extend Identity = IdentityString_s\r\n | extend CmdletResultValue = parse_json(rawData_s)\r\n | project-rename ConfigurationInstanceID = GenerationInstanceID_g, ESIEnvironment = ESIEnvironment_s, Section = Section_s, PSCmdlet = PSCmdL_s, CmdletResultType = ExecutionResult_s, WhenChanged = WhenChanged_t, WhenCreated = WhenCreated_t, Name = Name_s\r\n | project-away TenantId,SourceSystem,Type,EntryDate\r\n};\r\nParseExchangeConfig", - "version": 1, + "version": 2, "tags": [ { "name": "description", - "value": "ExchangeConfiguration" + "value": "" } ] } @@ -776,16 +776,16 @@ "location": "[parameters('workspace-location')]", "properties": { "eTag": "*", - "displayName": "ExchangeEnvironmentList", - "category": "Samples", + "displayName": "Parser for ExchangeEnvironmentList", + "category": "Microsoft Sentinel Parser", "functionAlias": "ExchangeEnvironmentList", + "query": "let _target = iff(isnull(Target) or isempty(Target),\"On-Premises\",Target);\nlet ScalarbaseRequest = union isfuzzy=true withsource=TableName ESIAPIExchange*,ESIExchange*\n | extend Source = iff (TableName contains \"Online\", \"Online\", \"On-Premises\")\n | where _target == 'All' or Source == _target;\n// Base Request\nScalarbaseRequest | summarize by ESIEnvironment_s | project-rename ESIEnvironment = ESIEnvironment_s\n", "functionParameters": "Target:string = \"On-Premises\"", - "query": "\nlet _target = iff(isnull(Target) or isempty(Target),\"On-Premises\",Target);\r\nlet ScalarbaseRequest = union isfuzzy=true withsource=TableName ESIAPIExchange*,ESIExchange*\r\n | extend Source = iff (TableName contains \"Online\", \"Online\", \"On-Premises\")\r\n | where _target == 'All' or Source == _target;\r\nScalarbaseRequest | summarize by ESIEnvironment_s | project-rename ESIEnvironment = ESIEnvironment_s", - "version": 1, + "version": 2, "tags": [ { "name": "description", - "value": "ExchangeEnvironmentList" + "value": "" } ] } @@ -827,7 +827,7 @@ "contentSchemaVersion": "3.0.0", "contentId": "[variables('_parserContentId2')]", "contentKind": "Parser", - "displayName": "ExchangeEnvironmentList", + "displayName": "Parser for ExchangeEnvironmentList", "contentProductId": "[variables('_parsercontentProductId2')]", "id": "[variables('_parsercontentProductId2')]", "version": "[variables('parserVersion2')]" @@ -840,16 +840,16 @@ "location": "[parameters('workspace-location')]", "properties": { "eTag": "*", - "displayName": "ExchangeEnvironmentList", - "category": "Samples", + "displayName": "Parser for ExchangeEnvironmentList", + "category": "Microsoft Sentinel Parser", "functionAlias": "ExchangeEnvironmentList", + "query": "let _target = iff(isnull(Target) or isempty(Target),\"On-Premises\",Target);\nlet ScalarbaseRequest = union isfuzzy=true withsource=TableName ESIAPIExchange*,ESIExchange*\n | extend Source = iff (TableName contains \"Online\", \"Online\", \"On-Premises\")\n | where _target == 'All' or Source == _target;\n// Base Request\nScalarbaseRequest | summarize by ESIEnvironment_s | project-rename ESIEnvironment = ESIEnvironment_s\n", "functionParameters": "Target:string = \"On-Premises\"", - "query": "\nlet _target = iff(isnull(Target) or isempty(Target),\"On-Premises\",Target);\r\nlet ScalarbaseRequest = union isfuzzy=true withsource=TableName ESIAPIExchange*,ESIExchange*\r\n | extend Source = iff (TableName contains \"Online\", \"Online\", \"On-Premises\")\r\n | where _target == 'All' or Source == _target;\r\nScalarbaseRequest | summarize by ESIEnvironment_s | project-rename ESIEnvironment = ESIEnvironment_s", - "version": 1, + "version": 2, "tags": [ { "name": "description", - "value": "ExchangeEnvironmentList" + "value": "" } ] } From 618ec5834eb443427604cfa1ae306aee8296d8a6 Mon Sep 17 00:00:00 2001 From: nlepagnez Date: Wed, 30 Aug 2023 23:19:38 +0200 Subject: [PATCH 08/18] Error in Sample --- .../Custom/ESI-MessageTrackingLogs-CSV.txt | 18 +++++++++--------- 1 file changed, 9 insertions(+), 9 deletions(-) diff --git a/Sample Data/Custom/ESI-MessageTrackingLogs-CSV.txt b/Sample Data/Custom/ESI-MessageTrackingLogs-CSV.txt index 0d878a84b4f..321a3e68a52 100644 --- a/Sample Data/Custom/ESI-MessageTrackingLogs-CSV.txt +++ b/Sample Data/Custom/ESI-MessageTrackingLogs-CSV.txt @@ -1,10 +1,10 @@ date-time,client-ip,client-hostname,server-ip,server-hostname,source-context,connector-id,source,event-id,internal-message-id,message-id,network-message-id,recipient-address,recipient-status,total-bytes,recipient-count,related-recipient-address,reference,message-subject,sender-address,return-path,message-info,directionality,tenant-id,original-client-ip,original-server-ip,custom-data,transport-traffic-type,log-id,schema-version -2023-02-26T02:40:03.005Z,,,,TS-EX19-04,"TS-EX19-03.RES.contoso.com=250 2.6.0 <1116-23956-1677379188@hz-fw-01.contoso1.com> [InternalId=48112223649793, Hostname=TS-EX19-03.RES.contoso.com] Queued mail for redundancy",,SMTP,HAREDIRECT,48782238547969,<1116-23956-1677379188@hz-fw-01.contoso1.com>,65b0ed59-64ad-42ab-ba15-08db17a2c2d1,fw-admin@contoso1.com,,410220,1,,,[hz-fw-01.contoso1.com][INFO-721] Weekly Executive Report,do-not-reply@fw-notify.net,do-not-reply@fw-notify.net,,Incoming,,,,S:DeliveryPriority=Normal;S:AccountForest=contoso.com,Email,3c34a0be-9d67-48c7-4c26-08db17a2c332,15.02.1118.021 -2023-02-26T02:40:03.008Z,10.1.2.24,TS-EX19-04.RES.contoso.com,10.1.2.24,TS-EX19-04,08DB0F5DBC3D2C80;2023-02-26T02:40:02.669Z;0,TS-EX19-04\Default TS-EX19-04,SMTP,RECEIVE,48782238547969,<1116-23956-1677379188@hz-fw-01.contoso1.com>,65b0ed59-64ad-42ab-ba15-08db17a2c2d1,fw-admin@contoso1.com,,410220,1,,,[hz-fw-01.contoso1.com][INFO-721] Weekly Executive Report,do-not-reply@fw-notify.net,do-not-reply@fw-notify.net,0cA: ,Incoming,,10.0.0.254,10.1.2.24,S:ProxyHop1=TS-EX19-04.RES.contoso.com(10.1.2.24);S:MessageValue=MediumHigh;S:Replication=TS-EX19-03;S:FirstForestHop=TS-EX19-04.RES.contoso.com;S:FromEntity=Internet;S:ProxiedClientIPAddress=10.0.0.254;S:ProxiedClientHostname=hz-fw-01.contoso1.com;S:DeliveryPriority=Normal;S:AccountForest=contoso.com,Email,79bb9b0f-120c-4e8d-c05f-08db17a2c332,15.02.1118.021 -2023-02-26T02:40:03.817Z,,,,TS-EX19-04,/o=B13/ou=Exchange Administrative Group (FYDIBOHF23SPDLT)/cn=Recipients/cn=c30973bf62e34d558eebb7c307232e31-Gilbert,,ROUTING,RESOLVE,48782238547969,<1116-23956-1677379188@hz-fw-01.contoso1.com>,65b0ed59-64ad-42ab-ba15-08db17a2c2d1,Gilbert@contoso1.com,,410449,1,fw-admin@contoso1.com,,[hz-fw-01.contoso1.com][INFO-721] Weekly Executive Report,do-not-reply@fw-notify.net,do-not-reply@fw-notify.net,,Incoming,,,,S:DeliveryPriority=Normal;S:AccountForest=contoso.com,Email,a79f3963-b134-4ada-4b9e-08db17a2c3ae,15.02.1118.021 -2023-02-26T02:40:03.841Z,,TS-EX19-04,,,Transport Rule Agent,,AGENT,RECEIVE,48782238547969,<1116-23956-1677379188@hz-fw-01.contoso1.com>,65b0ed59-64ad-42ab-ba15-08db17a2c2d1,5jxp9m4hOc6q@7UGApwbvQ.com,,410613,1,,,[hz-fw-01.contoso1.com][INFO-721] Weekly Executive Report,do-not-reply@fw-notify.net,do-not-reply@fw-notify.net,,Incoming,,,,S:RecipientType=Bcc;S:DeliveryPriority=Normal;S:AccountForest=contoso.com,Email,4554d722-52f0-46e0-f4d3-08db17a2c3b1,15.02.1118.021 -2023-02-26T02:40:03.844Z,,TS-EX19-04,,,AgentDefer,,AGENT,AGENTINFO,48782238547969,<1116-23956-1677379188@hz-fw-01.contoso1.com>,65b0ed59-64ad-42ab-ba15-08db17a2c2d1,Gilbert@contoso1.com;5jxp9m4hOc6q@7UGApwbvQ.com,,410613,2,,,[hz-fw-01.contoso1.com][INFO-721] Weekly Executive Report,do-not-reply@fw-notify.net,do-not-reply@fw-notify.net,,Incoming,,10.0.0.254,10.1.2.24,"S:AMA=SUM|v=0|action=|error=|atch=25;S:AMA=EV|engine=M|v=0|sig=1.383.650.0|name=|file=;S:TRA=ETR|ruleId=f124891a-6a94-466a-95d6-82b59a9f5b06|st=10/9/2022 12:48:38 AM|action=BlindCopyTo|sev=1|mode=Enforce;S:TRA=ETRP|ruleId=f124891a-6a94-466a-95d6-82b59a9f5b06|st=2022-10-09T00:48:38.0000000Z|ExecW=5|ExecC=0|Actions=AER,1|Conditions=CP,M.ER,0;S:CompCost=|AMA=0;S:DeliveryPriority=Normal;S:AccountForest=contoso.com",Email,58a5ace2-f2b5-4063-6a93-08db17a2c3b2,15.02.1118.021 -2023-02-26T02:40:03.845Z,,,,TS-EX19-04,Transport Rule Agent,,AGENT,RESUBMIT,48782238547969,<1116-23956-1677379188@hz-fw-01.contoso1.com>,65b0ed59-64ad-42ab-ba15-08db17a2c2d1,Gilbert@contoso1.com;5jxp9m4hOc6q@7UGApwbvQ.com,;,410613,2,,48782238547969,[hz-fw-01.contoso1.com][INFO-721] Weekly Executive Report,do-not-reply@fw-notify.net,do-not-reply@fw-notify.net,,,,,,S:DeliveryPriority=Normal;S:AccountForest=contoso.com,Email,706bc799-bee7-44e1-902c-08db17a2c3b2,15.02.1118.021 -2023-02-26T02:40:04.681Z,,TS-EX19-04,,,CatContentConversion,,AGENT,AGENTINFO,48782238547969,<1116-23956-1677379188@hz-fw-01.contoso1.com>,65b0ed59-64ad-42ab-ba15-08db17a2c2d1,Gilbert@contoso1.com;5jxp9m4hOc6q@7UGApwbvQ.com,,410705,2,,,[hz-fw-01.contoso1.com][INFO-721] Weekly Executive Report,do-not-reply@fw-notify.net,do-not-reply@fw-notify.net,,Incoming,,10.0.0.254,10.1.2.24,S:AMA=SUM|action=p|error=|atch=0;S:TRA=ETRI|MsgType=Normal|Ex=|IsKnown=|FipsStatus=NoFips|AttchUns=|ceErr=|Synth=False-Na-;S:DeliveryPriority=Normal;S:AccountForest=contoso.com,Email,2e7f83ef-7fa6-49ae-18eb-08db17a2c432,15.02.1118.021 -2023-02-26T02:40:06.426Z,10.1.2.24,TS-EX19-04,10.1.2.24,TS-EX19-04.RES.contoso.com,;250 2.0.0 OK <1116-23956-1677379188@hz-fw-01.contoso1.com> [Hostname=TS-EX19-04.RES.contoso.com];ClientSubmitTime:,Intra-Organization SMTP Send Connector,SMTP,SEND,48782238547969,<1116-23956-1677379188@hz-fw-01.contoso1.com>,65b0ed59-64ad-42ab-ba15-08db17a2c2d1,Gilbert@contoso1.com,250 2.1.5 Recipient OK,419612,1,,,[hz-fw-01.contoso1.com][INFO-721] Weekly Executive Report,do-not-reply@fw-notify.net,do-not-reply@fw-notify.net,2023-02-26T02:40:02.316Z;LSRV=TS-EX19-04.RES.contoso.com:TOTAL-HUB=3.694|SMR=0.275(SMRDE=0.121|SMRC=0.152(SMRCL=0.136|X-SMRCR=0.150))|UNK=0.014|PSC=0.006|UNK=0.003|CAT=0.812(CATMS=0.043|CATOS=0.668(CATSM=0.666(CATSM-Interceptor Routing Agent=0.003|CATSM-Malware Agent=0.637|CATSM-Text Messaging Routing Agent=0.003|CATSM-RMS Encryption Agent=0.014|CATSM-Journal Agent=0.006))|CATRESL=0.079|CATORES-INC=0.016(CATRS=0.016(CATRS-Transport Rule Agent=0.015(X-ETRLD=0.002|X-ETREX=0.008))))|UNK=0.002|CAT=0.838(CATRESL=0.004|CATORES=0.012(CATRS-INC=0.012(CATRS-Transport Rule Agent=0.008(X-ETREX=0.008)|CATRS-DLP Policy Agent-INC=0.003))|CATRS-Retention Policy Agent=0.003|CATRS-Supervisory Review Agent=0.002|CATRS-Index Routing Agent=0.447|CATROUT=0.001|CATORT=0.347(CATRT=0.347(CATRT-RMS Encryption Agent=0.011|CATRT-Journal Agent=0.334))|CATFIN=0.003(OMDSN=0.001))|UNK=0.002|QDM=0.041|SMSC=0.158(X-SMSDR=0.039)|SMS=1.536(SMSMBXD=1.458)|UNK=0.002,Incoming,,,,S:E2ELatency=4.110;S:MsgRecipCount=1;S:IncludeInSla=True;S:Microsoft.Exchange.Transport.MailRecipient.RequiredTlsAuthLevel=Opportunistic;S:IsSmtpResponseFromExternalServer=False;S:DeliveryPriority=Normal;S:AccountForest=contoso.com,Email,958a7ce6-0dfb-4302-62aa-08db17a2c53c,15.02.1118.021 -2023-02-26T02:40:07.103Z,10.1.2.24,TS-EX19-04,104.47.22.138,contoso1.com.mail.protection.outlook.com,";250 2.6.0 <1116-23956-1677379188@hz-fw-01.contoso1.com> [InternalId=4015794426053, Hostname=DU0PR08MB8231.eurprd08.prod.outlook.com] 418235 bytes in 0.233, 1747.513 KB/sec Queued mail for delivery;ClientSubmitTime:",Internet B1129E5 to Office 365,SMTP,SENDEXTERNAL,48782238547969,<1116-23956-1677379188@hz-fw-01.contoso1.com>,65b0ed59-64ad-42ab-ba15-08db17a2c2d1,5jxp9m4hOc6q@7UGApwbvQ.com,250 2.1.5 Recipient OK,419612,1,,,[hz-fw-01.contoso1.com][INFO-721] Weekly Executive Report,do-not-reply@fw-notify.net,do-not-reply@fw-notify.net,2023-02-26T02:40:02.316Z;SRV=TS-EX19-04.RES.contoso.com:TOTAL-FE=0.416|SMR=0.125(SMRRC=0.002|SMREH=0.001|SMRPI=0.054(SMRPI-FrontendProxyAgent=0.053))|SMS=0.289;SRV=TS-EX19-04.RES.contoso.com:TOTAL-HUB=4.371|SMR=0.275(SMRDE=0.121|SMRC=0.152(SMRCL=0.136|X-SMRCR=0.150))|UNK=0.014|PSC=0.006|UNK=0.003|CAT=0.812(CATMS=0.043|CATOS=0.668(CATSM=0.666(CATSM-Interceptor Routing Agent=0.003|CATSM-Malware Agent=0.637|CATSM-Text Messaging Routing Agent=0.003|CATSM-RMS Encryption Agent=0.014|CATSM-Journal Agent=0.006))|CATRESL=0.079|CATORES-INC=0.016(CATRS=0.016(CATRS-Transport Rule Agent=0.015(X-ETRLD=0.002|X-ETREX=0.008))))|UNK=0.002|CAT=0.838(CATRESL=0.004|CATORES=0.012(CATRS-INC=0.012(CATRS-Transport Rule Agent=0.008(X-ETREX=0.008)|CATRS-DLP Policy Agent-INC=0.003))|CATRS-Retention Policy Agent=0.003|CATRS-Supervisory Review Agent=0.002|CATRS-Index Routing Agent=0.447|CATROUT=0.001|CATORT=0.347(CATRT=0.347(CATRT-RMS Encryption Agent=0.011|CATRT-Journal Agent=0.334))|CATFIN=0.003(OMDSN=0.001))|UNK=0.001|QDE=0.610|SMSC=1.138(X-SMSDR=0.609)|SMS=0.667,Incoming,,,,S:E2ELatency=4.788;S:ExternalSendLatency=2.371;S:ToEntity=Internet;S:FromEntity=Internet;S:MsgRecipCount=1;S:IncludeInSla=True;S:Microsoft.Exchange.Transport.MailRecipient.RequiredTlsAuthLevel=CertificateValidation;S:Microsoft.Exchange.Transport.MailRecipient.EffectiveTlsAuthLevel=CertificateValidation;S:IsSmtpResponseFromExternalServer=True;S:DeliveryPriority=Normal;S:AccountForest=contoso.com,Email,c89f66d8-95d5-46a7-ba78-08db17a2c5a3,15.02.1118.021 +2023-08-27T02:40:03.005Z,,,,TS-EX19-04,"TS-EX19-03.RES.contoso.com=250 2.6.0 <1116-23956-1677379188@hz-fw-01.contoso1.com> [InternalId=48112223649793, Hostname=TS-EX19-03.RES.contoso.com] Queued mail for redundancy",,SMTP,HAREDIRECT,48782238547969,<1116-23956-1677379188@hz-fw-01.contoso1.com>,65b0ed59-64ad-42ab-ba15-08db17a2c2d1,fw-admin@contoso1.com,,410220,1,,,[hz-fw-01.contoso1.com][INFO-721] Weekly Executive Report,do-not-reply@fw-notify.net,do-not-reply@fw-notify.net,,Incoming,,,,S:DeliveryPriority=Normal;S:AccountForest=contoso.com,Email,3c34a0be-9d67-48c7-4c26-08db17a2c332,15.02.1118.021 +2023-08-27T02:40:03.008Z,10.1.2.24,TS-EX19-04.RES.contoso.com,10.1.2.24,TS-EX19-04,08DB0F5DBC3D2C80;2023-08-27T02:40:02.669Z;0,TS-EX19-04\Default TS-EX19-04,SMTP,RECEIVE,48782238547969,<1116-23956-1677379188@hz-fw-01.contoso1.com>,65b0ed59-64ad-42ab-ba15-08db17a2c2d1,fw-admin@contoso1.com,,410220,1,,,[hz-fw-01.contoso1.com][INFO-721] Weekly Executive Report,do-not-reply@fw-notify.net,do-not-reply@fw-notify.net,0cA: ,Incoming,,10.0.0.254,10.1.2.24,S:ProxyHop1=TS-EX19-04.RES.contoso.com(10.1.2.24);S:MessageValue=MediumHigh;S:Replication=TS-EX19-03;S:FirstForestHop=TS-EX19-04.RES.contoso.com;S:FromEntity=Internet;S:ProxiedClientIPAddress=10.0.0.254;S:ProxiedClientHostname=hz-fw-01.contoso1.com;S:DeliveryPriority=Normal;S:AccountForest=contoso.com,Email,79bb9b0f-120c-4e8d-c05f-08db17a2c332,15.02.1118.021 +2023-08-27T02:40:03.817Z,,,,TS-EX19-04,/o=B13/ou=Exchange Administrative Group (FYDIBOHF23SPDLT)/cn=Recipients/cn=c30973bf62e34d558eebb7c307232e31-Gilbert,,ROUTING,RESOLVE,48782238547969,<1116-23956-1677379188@hz-fw-01.contoso1.com>,65b0ed59-64ad-42ab-ba15-08db17a2c2d1,Gilbert@contoso1.com,,410449,1,fw-admin@contoso1.com,,[hz-fw-01.contoso1.com][INFO-721] Weekly Executive Report,do-not-reply@fw-notify.net,do-not-reply@fw-notify.net,,Incoming,,,,S:DeliveryPriority=Normal;S:AccountForest=contoso.com,Email,a79f3963-b134-4ada-4b9e-08db17a2c3ae,15.02.1118.021 +2023-08-27T02:40:03.841Z,,TS-EX19-04,,,Transport Rule Agent,,AGENT,RECEIVE,48782238547969,<1116-23956-1677379188@hz-fw-01.contoso1.com>,65b0ed59-64ad-42ab-ba15-08db17a2c2d1,5jxp9m4hOc6q@7UGApwbvQ.com,,410613,1,,,[hz-fw-01.contoso1.com][INFO-721] Weekly Executive Report,do-not-reply@fw-notify.net,do-not-reply@fw-notify.net,,Incoming,,,,S:RecipientType=Bcc;S:DeliveryPriority=Normal;S:AccountForest=contoso.com,Email,4554d722-52f0-46e0-f4d3-08db17a2c3b1,15.02.1118.021 +2023-08-27T02:40:03.844Z,,TS-EX19-04,,,AgentDefer,,AGENT,AGENTINFO,48782238547969,<1116-23956-1677379188@hz-fw-01.contoso1.com>,65b0ed59-64ad-42ab-ba15-08db17a2c2d1,Gilbert@contoso1.com;5jxp9m4hOc6q@7UGApwbvQ.com,,410613,2,,,[hz-fw-01.contoso1.com][INFO-721] Weekly Executive Report,do-not-reply@fw-notify.net,do-not-reply@fw-notify.net,,Incoming,,10.0.0.254,10.1.2.24,"S:AMA=SUM|v=0|action=|error=|atch=25;S:AMA=EV|engine=M|v=0|sig=1.383.650.0|name=|file=;S:TRA=ETR|ruleId=f124891a-6a94-466a-95d6-82b59a9f5b06|st=10/9/2022 12:48:38 AM|action=BlindCopyTo|sev=1|mode=Enforce;S:TRA=ETRP|ruleId=f124891a-6a94-466a-95d6-82b59a9f5b06|st=2022-10-09T00:48:38.0000000Z|ExecW=5|ExecC=0|Actions=AER,1|Conditions=CP,M.ER,0;S:CompCost=|AMA=0;S:DeliveryPriority=Normal;S:AccountForest=contoso.com",Email,58a5ace2-f2b5-4063-6a93-08db17a2c3b2,15.02.1118.021 +2023-08-27T02:40:03.845Z,,,,TS-EX19-04,Transport Rule Agent,,AGENT,RESUBMIT,48782238547969,<1116-23956-1677379188@hz-fw-01.contoso1.com>,65b0ed59-64ad-42ab-ba15-08db17a2c2d1,Gilbert@contoso1.com;5jxp9m4hOc6q@7UGApwbvQ.com,;,410613,2,,48782238547969,[hz-fw-01.contoso1.com][INFO-721] Weekly Executive Report,do-not-reply@fw-notify.net,do-not-reply@fw-notify.net,,,,,,S:DeliveryPriority=Normal;S:AccountForest=contoso.com,Email,706bc799-bee7-44e1-902c-08db17a2c3b2,15.02.1118.021 +2023-08-27T02:40:04.681Z,,TS-EX19-04,,,CatContentConversion,,AGENT,AGENTINFO,48782238547969,<1116-23956-1677379188@hz-fw-01.contoso1.com>,65b0ed59-64ad-42ab-ba15-08db17a2c2d1,Gilbert@contoso1.com;5jxp9m4hOc6q@7UGApwbvQ.com,,410705,2,,,[hz-fw-01.contoso1.com][INFO-721] Weekly Executive Report,do-not-reply@fw-notify.net,do-not-reply@fw-notify.net,,Incoming,,10.0.0.254,10.1.2.24,S:AMA=SUM|action=p|error=|atch=0;S:TRA=ETRI|MsgType=Normal|Ex=|IsKnown=|FipsStatus=NoFips|AttchUns=|ceErr=|Synth=False-Na-;S:DeliveryPriority=Normal;S:AccountForest=contoso.com,Email,2e7f83ef-7fa6-49ae-18eb-08db17a2c432,15.02.1118.021 +2023-08-27T02:40:06.426Z,10.1.2.24,TS-EX19-04,10.1.2.24,TS-EX19-04.RES.contoso.com,;250 2.0.0 OK <1116-23956-1677379188@hz-fw-01.contoso1.com> [Hostname=TS-EX19-04.RES.contoso.com];ClientSubmitTime:,Intra-Organization SMTP Send Connector,SMTP,SEND,48782238547969,<1116-23956-1677379188@hz-fw-01.contoso1.com>,65b0ed59-64ad-42ab-ba15-08db17a2c2d1,Gilbert@contoso1.com,250 2.1.5 Recipient OK,419612,1,,,[hz-fw-01.contoso1.com][INFO-721] Weekly Executive Report,do-not-reply@fw-notify.net,do-not-reply@fw-notify.net,2023-08-27T02:40:02.316Z;LSRV=TS-EX19-04.RES.contoso.com:TOTAL-HUB=3.694|SMR=0.275(SMRDE=0.121|SMRC=0.152(SMRCL=0.136|X-SMRCR=0.150))|UNK=0.014|PSC=0.006|UNK=0.003|CAT=0.812(CATMS=0.043|CATOS=0.668(CATSM=0.666(CATSM-Interceptor Routing Agent=0.003|CATSM-Malware Agent=0.637|CATSM-Text Messaging Routing Agent=0.003|CATSM-RMS Encryption Agent=0.014|CATSM-Journal Agent=0.006))|CATRESL=0.079|CATORES-INC=0.016(CATRS=0.016(CATRS-Transport Rule Agent=0.015(X-ETRLD=0.002|X-ETREX=0.008))))|UNK=0.002|CAT=0.838(CATRESL=0.004|CATORES=0.012(CATRS-INC=0.012(CATRS-Transport Rule Agent=0.008(X-ETREX=0.008)|CATRS-DLP Policy Agent-INC=0.003))|CATRS-Retention Policy Agent=0.003|CATRS-Supervisory Review Agent=0.002|CATRS-Index Routing Agent=0.447|CATROUT=0.001|CATORT=0.347(CATRT=0.347(CATRT-RMS Encryption Agent=0.011|CATRT-Journal Agent=0.334))|CATFIN=0.003(OMDSN=0.001))|UNK=0.002|QDM=0.041|SMSC=0.158(X-SMSDR=0.039)|SMS=1.536(SMSMBXD=1.458)|UNK=0.002,Incoming,,,,S:E2ELatency=4.110;S:MsgRecipCount=1;S:IncludeInSla=True;S:Microsoft.Exchange.Transport.MailRecipient.RequiredTlsAuthLevel=Opportunistic;S:IsSmtpResponseFromExternalServer=False;S:DeliveryPriority=Normal;S:AccountForest=contoso.com,Email,958a7ce6-0dfb-4302-62aa-08db17a2c53c,15.02.1118.021 +2023-08-27T02:40:07.103Z,10.1.2.24,TS-EX19-04,104.47.22.138,contoso1.com.mail.protection.outlook.com,";250 2.6.0 <1116-23956-1677379188@hz-fw-01.contoso1.com> [InternalId=4015794426053, Hostname=DU0PR08MB8231.eurprd08.prod.outlook.com] 418235 bytes in 0.233, 1747.513 KB/sec Queued mail for delivery;ClientSubmitTime:",Internet B1129E5 to Office 365,SMTP,SENDEXTERNAL,48782238547969,<1116-23956-1677379188@hz-fw-01.contoso1.com>,65b0ed59-64ad-42ab-ba15-08db17a2c2d1,5jxp9m4hOc6q@7UGApwbvQ.com,250 2.1.5 Recipient OK,419612,1,,,[hz-fw-01.contoso1.com][INFO-721] Weekly Executive Report,do-not-reply@fw-notify.net,do-not-reply@fw-notify.net,2023-08-27T02:40:02.316Z;SRV=TS-EX19-04.RES.contoso.com:TOTAL-FE=0.416|SMR=0.125(SMRRC=0.002|SMREH=0.001|SMRPI=0.054(SMRPI-FrontendProxyAgent=0.053))|SMS=0.289;SRV=TS-EX19-04.RES.contoso.com:TOTAL-HUB=4.371|SMR=0.275(SMRDE=0.121|SMRC=0.152(SMRCL=0.136|X-SMRCR=0.150))|UNK=0.014|PSC=0.006|UNK=0.003|CAT=0.812(CATMS=0.043|CATOS=0.668(CATSM=0.666(CATSM-Interceptor Routing Agent=0.003|CATSM-Malware Agent=0.637|CATSM-Text Messaging Routing Agent=0.003|CATSM-RMS Encryption Agent=0.014|CATSM-Journal Agent=0.006))|CATRESL=0.079|CATORES-INC=0.016(CATRS=0.016(CATRS-Transport Rule Agent=0.015(X-ETRLD=0.002|X-ETREX=0.008))))|UNK=0.002|CAT=0.838(CATRESL=0.004|CATORES=0.012(CATRS-INC=0.012(CATRS-Transport Rule Agent=0.008(X-ETREX=0.008)|CATRS-DLP Policy Agent-INC=0.003))|CATRS-Retention Policy Agent=0.003|CATRS-Supervisory Review Agent=0.002|CATRS-Index Routing Agent=0.447|CATROUT=0.001|CATORT=0.347(CATRT=0.347(CATRT-RMS Encryption Agent=0.011|CATRT-Journal Agent=0.334))|CATFIN=0.003(OMDSN=0.001))|UNK=0.001|QDE=0.610|SMSC=1.138(X-SMSDR=0.609)|SMS=0.667,Incoming,,,,S:E2ELatency=4.788;S:ExternalSendLatency=2.371;S:ToEntity=Internet;S:FromEntity=Internet;S:MsgRecipCount=1;S:IncludeInSla=True;S:Microsoft.Exchange.Transport.MailRecipient.RequiredTlsAuthLevel=CertificateValidation;S:Microsoft.Exchange.Transport.MailRecipient.EffectiveTlsAuthLevel=CertificateValidation;S:IsSmtpResponseFromExternalServer=True;S:DeliveryPriority=Normal;S:AccountForest=contoso.com,Email,c89f66d8-95d5-46a7-ba78-08db17a2c5a3,15.02.1118.021 From 1a7a4ee71226f69abb3a4cef17f2f9138cf9a055 Mon Sep 17 00:00:00 2001 From: nlepagnez Date: Wed, 30 Aug 2023 23:19:51 +0200 Subject: [PATCH 09/18] Sample JSON Error --- .../Custom/ESI-ExchangeOnPremisesCollector-SampleData.json | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/Sample Data/Custom/ESI-ExchangeOnPremisesCollector-SampleData.json b/Sample Data/Custom/ESI-ExchangeOnPremisesCollector-SampleData.json index 473f9b6e7cf..b868a57f16c 100644 --- a/Sample Data/Custom/ESI-ExchangeOnPremisesCollector-SampleData.json +++ b/Sample Data/Custom/ESI-ExchangeOnPremisesCollector-SampleData.json @@ -1,4 +1,4 @@ -[2023-08-27 +[ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", From daa2d8fc9c6290f36fdaee34cfab5caf5f69bbda Mon Sep 17 00:00:00 2001 From: PrasadBoke Date: Tue, 5 Sep 2023 19:02:54 +0530 Subject: [PATCH 10/18] Added hyperlink in createui and Readded 2.0.0 --- .../Package/2.0.0.zip | Bin 0 -> 66438 bytes .../Package/3.0.0.zip | Bin 67525 -> 67594 bytes .../Package/createUiDefinition.json | 2 +- .../Package/2.0.0.zip | Bin 0 -> 24394 bytes .../Package/3.0.0.zip | Bin 25244 -> 25316 bytes .../Package/createUiDefinition.json | 2 +- 6 files changed, 2 insertions(+), 2 deletions(-) create mode 100644 Solutions/Microsoft Exchange Security - Exchange On-Premises/Package/2.0.0.zip create mode 100644 Solutions/Microsoft Exchange Security - Exchange Online/Package/2.0.0.zip diff --git a/Solutions/Microsoft Exchange Security - Exchange On-Premises/Package/2.0.0.zip b/Solutions/Microsoft Exchange Security - Exchange On-Premises/Package/2.0.0.zip new file mode 100644 index 0000000000000000000000000000000000000000..a90636a8bad3b621e61ad1d1043a07a7aae811de GIT binary patch literal 66438 zcmZU(Q;;Y;u&zC}ZQHhO+qP}nwr$(CZQItGnf0%4?^EaE{8hO~I#szyr#k)i(+bkS zASeI;01yBS#NU*mY|Qmy#Oq8l9#iH- zh?Tfc@uGBLiE>kX%v-p8_;;{PIy5C3ac|CpwI9D10y3slwJVnovV}F@gqXj(7ccI) ze7CIUmNg=A-o1&6b+LI{hZ$>dY82q~B6bFZI6E6PH*+3y$cBapF&~K81&m9VDsxw0 z7D;Eh-xJRmSmipHi}hY)I};Nj!G(-yWK*VQ)46|Xk};V*U%rZtQ4Yo$bY?{DxJHAp4}t6yog{~#9%c$ z@|K#1$vWpU%*E`>MXnG`YSy7MkvZ+MaRdiHX)?R;{P4w!)~QVdX8kfF&ML!FOK%{Z zU<0r3Qkn`>o~AF%YSJ(PR+lVB8B#kKRi!RTA6Ydh<-4(S1rp0T;xM#lMRP+gkQ=yC zs%JJmBbVO`s9EQN4$L=p9$1(-ikPm`ay zmZcvQoe5RuDR(=kanMa&{np`33IZyZCV~ekEz?8BJr{4o^k&(xx~d zJ5D|um!y$e#-+N-#ds&AJj~8RLoI4cgIh#A{g6i z)HZ@Zo`(${JerCSmmeU>kmG#x{eGY{$y`RXH$fBOilb`Z4-`-tI}l^k{8CNcd=vS$ zq1ccOOw~FkUla&v<`#pBGSwJ~26xHF3cI2$O++H`1?UNPp9tS>_|3ltxL}a1I?EWrJfkg|Xs(b32@!g%iB`1*`F znAZbsXl-`B3x?d?OPJTNzJJ?$&!YJQA92_wD|v<$D0iMc++1b`q|@ZQh4=>kdJ#4T zi9OlTkE}6#jdz1$LjyY~<%{9Ti?Zd}hl@&ghu|5D30hOzPn zc=G*groHt_A0Eu56cw^I*)ZoSO{?YkIP~~a^n6v+96X30rdZRr&3W-s-z6gHZBL%N z;pGo2ujp=CX9T;i$VB57X=t#NsP}y@IKcgl+IgTJYt@irH(TxK%~(O?Q6ookT1BU0 zi9>-6@lq}Ki`!Hla7uR*_T!n>ACBNfePN1@os1%8bXImDNV;%ukI?!DyU5SMQ(D&R zyH|{)F{>?rw=+Cr)&m#nBzF#4kV{mrcMIPMI8PS%fu}9Mfbu3M;gCZos7Rnt@!_lzO99 z33R4)%BEUtFJU(m#{JOz53L&ocJSfEEB{_z_a?lOosAP^(^#&v!-dj`} zt`iq7r-KI>2Wv#o$z2)20ayBgee#yNi0=-j0x>he-vnUl6nNt)Qt>?9imlpMd*S)+ zia+VvSL3x+{pb~a)yN>6q)wL@NZJy0;~B5KNlX5VUKCjky+_L}e<=7X4TRx$4jGBd zj}X0&o93D@S&CZFC)(;|+Y*kxB#=Ofb-PtX{V0{l=!Xk8Vp_jI2BYpPKMi~!=4Oek`c)19E!E|##b~{wt>RNoFjudG`a7;&CQ>zGf1YCD09o!fvWBs$X4k>q}wdfuxT4L>Bw1>83h~`!h++IQonbjo`;zFmX&2d4(z^><6f}b zaIiLElYMEz9lA}HglZ~($ZID}$jb=O#mJ^W7LH*MhEdX0n^@WHW|RhJ{hSI84rgN@ zbWGSy8Yk#%2TXnp={e${%$zs#n26b*JINoTxDBL}buy(N2E(wH9BFU9rQP`adG7qQ z7O|^T4S)w2z&Uv;L0!WGuxIM>G zL%}3bhOVJvl-PYz?M}!7U>Wnk-Y3>9LV`R(Ay6>Tq{PeBQ!A36z_kFhfZAl66CcZ5 zwKHXsB<g#H*>=X|m)dOc2C~{{cQ-0tOa0)x|cHp+6mt0&Z zZz%3c!YC^ZHL9I1^o%KgDsGPKx(mr#%NvUBDhomjz=~g6$ka!wZwS6gAkHVRbtZ@JM4QR3sz76m$rvW5c{t8=I^cSFS+|S*3uIMzp!w%np?|>i2VDk}rZ|_3{gqm4dEI@OO_M9}2%{ zfBL}x;5Ur~5nRBgTNTwmoavZ_9@R46VQEtr`8RHGjjb1ZWW!q|3gmXfQ`&P-uu$Mz zLMlg5`}my}6Zd_)eLJQTV&smZe)#4DF@}Kh_!MDF&aZ^mz;moj_Dz#UV8)#RFklDg z3#Rle2Esq!>qz@`8Vv$s_9!ERGYY(%MoPC9W})VJH%GHT(br8YQNJ9dABjf6tL>1o zbC__{X&3keO2D4FK}0iX8_v692H-8wLtru?Du4I0ysuS%6^kL<#a~J0(b=f6w)>T(eMIpa?Eed-@PEaZgV~9i|4G)Fz$*X%Up6=Z;y>|aYiMbwVruJP z^G|~PkL_7htcrWi@=IieMN-hAIq~Kl$x2T(&nwpyV zZ>YZh@qe#}-252#a1k!Q8zXLVOeSgmSe%3NU&`(Z^p-7Wk?^{+e~x$)J5=e3b_eVJ zK{j{a-@Lu|aAAYIZ`{M?%9Y&-dHcl*AIxX#stHuYAbGe$#~Ss+FyQ{#qx;SG;4h85 z?u0aY;N}YuzvJnIB(C`y!WT8fi9VvjJQ~dx9kaQ_26Pq75;1?;vX^e zY2#c?uI*_)G^Hpz5G9_-kIZ4)1B1*IU%5^?>?s5!#e0=VLc+`*7l|#KOY#XI5{3Lk zKQBr=cPh(~?*Zp?#Zx#JZ+8+a^l_u_74j_=i9Z7A${Qk;ge~=ZN*BX7!t5@B8+q2B z(2ecyBK)1RG zslJI937|+uE-!rj#PLAx4%r`NSYs&ytH~Ks=nUK?Xc&9hgpc}miUEfI1s7!34uY2H zPfpiBJ^FygZ^+O+H-9H#eLfFgby|xTi6#AP+w>`%LgAz936DkkT6 zK`P3YG$mN(i=F@-&y@R#^SGb6!lLxXi;@`#-`Cg~?xc$Q<=Gz94I4KX?76h8nYIDE zhw>P;(&QiSRe6v}yex&3pkG=RR)JzAes*py!1ZPqNM7vdF=Z+T>YWRsuhr6~Q?!=H4G1QLtN1WFo&7{tn>xbm^)-q-w46U$=A zmazJA77?fD!bxOeg7#dwqXDQYBvR}ItLc$n&G_Qee-OD-L6HW`&16u;; zhbBV?8y)WoGMvFzbGB<%kuX+sv}0mH9!Z_<3R0Y>C6&dJY0lyB;{My8*1CWH0y_tS zW0ZAt;~(Ap?nQ$ivtWD0;6|^hA}hL8PL9}oCqw+?CcS<`YnEMAhvm+-gF}3Cje`Af zj`YMv+l$oIXmNyYi78a3(F&RS!@}1|UqfP3$z`sH34A6_C*Q_0o!YQ6fMZbie3nz9 zij#^wedEn7j>>LfT;YYJJ)!_iEey+tE)07EqbeXl4XSO`A_l`sVOY^C6}H7Z{;uh8 zEp8Y9S9|W4qtdvd2P%ELsaaJciLHFQN~DFTe5;vhb??l$nwMJ%C1F`=m{xhUSdOWD zTbe0F_a~~HPm`E8n6hZ<&`b~IR74Oz>QYEiVX8cFrNZDfW;1EL)c9IP+SZ?)rntD( z)_LSM#7jHS?@&RbEN15&_*%gMtNQI@RupvpnnbFhJOO#Mjdw0?-b!CTlfH~{O9^J1Wg{ntX5I#9rq>PP29WK*W81L z%keE9UTjX%f8BXUaG#r#r=Z1uXMF>0n31tF83$-$M}2$J3i<5@$m6+@$qhQfV%>t zBWI~~oeHm`>C=)En7xA6ft9=t4VavaengOCQ&j+A%V*kgS{#vuvc#QoPZFjiRT+Sr z?KxKC)4-jk zfhvf%UI8ui7(*>#^+kWFGR&T@8z5oOj|A2409Ia?AHkyhu?QX?yCf^gOE)2WXqD>o zT{jHEY~w~E{}Mea$29je3eoiaWj<3n|5g-fX@SP8M0piVC?te{COIes8cZ&#n@j>kb#@mg0g&N zf&1ITy&3n&d>JTZqoM1JjzICH#XXpiO&^ZOW9%%s8tMugiV$?WmqF-zjL^TFImwCG z2o32K+@yCVMkX!=&p`@dLg_jA`b<4tC*$n)bQ7W|em&&Kkrhj1Fvh<+q>(>R#7KLi zCRcHG0{df1wGTV3-U+DMd`VdLO!0$h(t<#`fLTF3osXytD&i~#!T|(`OiuI{jUQ$h zU5Vfs@de2Ry<*QCkd4g)Ko2O7@8uIk8F22hxAJQxUe+}nwG56BTaDJ)OD`*Jg znRya5QANsB6C7r|ZLYLHW30+;2RZb_?{3cW&jvQxUWuYpRT~Ygpddn9%=SVexeu%O ziio2+ec#+R+b=XvnqJ>fk4t{JL%ry5%s%}t#!wXd#SwB8f9akUH|S+lxOqu)(bJ;{ z=vR6cHXDY2iVJ$>MSz$VSPptKXu=`l&6^|XUv{G0eB-~hoBqb}z&b9Gb1aHroW&c_ zqR4Ux`H`gTS-pJ@VA!cd%8F@Q!k@4AGJjy;4p(nZ3m2!;Ti^u4B(W!Qe+5K!D5igo zKWSe){%Jm^-nt|%Ugj9Tq^z^EKRxFUa-8m?yR5l=scuypNdRNN7R3zia14?jTn|dW zqPSHunkiRiK=Ln+!8t*hDU8pioU#!VgsRy+-5C0ag}#bI@d==y{D-U~9bgZUQ-SyCE$Io?R*xg=m}aKk2`~lHwKzaVxZ)0O z*wZLLVB(&w)EcQT##?#S_(g(gpXBd)=2J@$?u!r*+XGTA(j2b4;x{D@Sp$_*%lgzi zj)61y)`r#SX6nc{h|FzV2<&DW@GbpK6nZPq^GeFatJB)-RxgL$=B)!C#;|bIA0WfU z0AzLaOp}r4)laJ+&ZZy+2aW)Jy%F7^zdksz3%nruO}kZi$35p!gILc<#)TX|3x__T z*sQygC;TLL41B)dU!%r8UWj{(7f)ewWV%1)4oRo^0ByU?=jTtozsPzhvy-F7YX(n3 zJH?#GxzizYTA8<*jo)_Oe@?5}=kaXqoym2{bO?o5Kt%RPc|hY2lxC0R{e=36_UD5W zSD+}$M`9s=IE?cq@jmf12zrdUNW@AowH?5T_@sj)BDn#9Lj=a#+HXCNwzsozci`>p zp|q4RNaH#!g=|wB>;a;1_i}5IoaYMMD{oSy;2ZA~>1t|lws<;IFBD)mzhA?^hGMnP zgi`CL@$lnLsW+ zHu6)h_CP6wmF@#Tq;V%!d}wi)1t1=go77OPMBhSaVkJ5*5S#1NfdEExON|NbZ7sa> z5a5C=3lioBc*UhK^Wpnlj9lOlGFgHIgCE}H#fCx9m4Sh)0M1b(J(QCj>c#7HwZqE} zG)MA(1wf%Nw?2Xdk-&I0%y?s7>DcDLjdp_Uhy?HF)EAI}5A?a!4{}|pE?4#hxgsT% z=8REAc;+c0-=u^gjX)_<36y;j^%+$uo1+ixTggFdzG{Tj=;U;%;MlkzhcTj-b2LOM zY4H{$DDHMZprkzlK}197MThdtq!q;8O~P(`oS9;yDb@l*xwG31W%W1< zaEWfqF( zbuP$mqUHz;Oc;6)X-%XU3b;Bjh4>Q@WSbfauo7f&agj2sgEM>_oUbrg?7vsqAl+HU zrJvtV$`KAMb8r#ZafBww0xQ3jSVynPd>;VEkD65@7od%WJmcGDlBMA#tb9ZRYO)HS z4&DZpf5#vuy31vh>UFs&6F8v(MsXiZpkw;FmSM!~eAVftuH8eY(d^sWL!*h^Em7;P&Aq*;KJ2Qu zPt2xULCdD60ejJ5ET5$x7g2ykuK@4WR-5PG4JANX*ZZ~7Pc$g zbuzKX6)~5u%rN>o+4izrxA$FrB+ZCt#xMDc>*-*5a!?fpP+AF|r%8JnGVK-wGpB6k zn^_-m(B}eaB~lx)sQRn8R0YkLMl3yrcd((^^0j=MgTRnUZWpadc zYS_9JO6b?_)6;lHKVVMRruw<9`hd(jCoi0BvP#Y@e~C;vh>#+578pW5-P#(~{JX{3 zCE$gMfVmFXB~D|+LO4O$3FQ*t7cSSEq$NbUpNJ*^^gjoU;8-;zkK<}uk1ceuVOY^h zFI)cVS*V&SS93W{EaEM>0#`{*WqPv~1Gd$`+h57p>e~^qO8Yl8(8N&8{CnVU_q9Phnv|LO-skCD)L)rjF)Jq(G`Z zFC;rl5uX&^5P+{M^MT-36BAMocDn{3QgmgIUTnrij7F4@+uOR112jE?MTJ+#v>;me zSbwP6+6x;2t3=LZ_xHp?$*LSBce*9N}iLfg8Lb)Lfo5Q9>2dzoD*u zUM7fIo&k_?MaV$U^z}ghfDvH?0o-80ZIr9kO0R3AzcVI0D8<+dL)w!?_tdnQRcg1A z&2+6;_OdLMf?cIb)E{ltgWRNd&|vi_8>ZtLC(pn|7z&l^42B=)9Cyd5RkccaHH>Xj z3}K;+ELl*vGV0!J{`kV87xc6oA?aEX$CYlOG}>s@?4#1es!7gZCT(Gax`|_jvrQ8> z{40M>gx?MLC}_{OOCG^>?h<5ZvBns40(Kh)k-^X$FYsl`9a_I3XgztRK%x=-y6~|& z(a@8v#8$TGaeX(#jlpntjFK$3!Wq51+^{}gUUKS9W^yRf}`v{7ig88%V)Fe$+KdJUJ^GyyusUi;1n*w%qW{>!&@2kG-3=b zl8$a`v>+uuW-CzdkV-sDcjy!`d49Y`*A~f*UruOiGFhFOr{RFdk`6gpTtJarE})M| z=$+62C6@WB?zjfSzsiYEFou^3E%$iZ@QXhnSD)PW_n@ZgLqv79wC@=uF~P*c8B_C& zVlo(sWOvvQ#~DhqtS5?NP6G($RM_55e=Z~f`dVm9ZIs^dp~f-T-hLvgxwX9+(vuf~ z@yM4=458wabcM^}D54?6 zuojS3_7j?-fZ;KFF%m<^#&E}A^2aoAHSk!ZD}ZM=PzUA`gVV*9v!v?op^=6GBLEwC zcXk)bE7MRQL5ZySC2JGz+86~`*Ub2d;**xibq;%nlP_dG<2oj5pcF52?=Aa zqJy5R?P|e+r-8m!(@iTgb=8ExrwJ>qYC{MhyF^L@tDaeDBd&-h^^NkOM~>j+)(=6f z3GO0suz!3ZC4gvwFachbu6w zNG`o2kG%9VX&wS5U5+np$xvSk9PHXf+=NM(IJ^UrhKcs2&dtqW$NWUDpc5`S#X$iV zk?!(AzLT-OFA4v)f!4bqY}+4i~g`fXs4#M9M*%H zDh_C$J!R4BYG{ZXq#Z%FrKFTvh=rosvD=n%N2N$@is;xbb&~B^m9JU9Hzv8dua-^K zBPqbCEwonil~zD8+4YQh$nmEt4ncH2`(!5fp*NyBsE@(4*OuKT|Cbh3mYPTG$ zhiasANiANnD%6R3<@TPiIo_=#^!Yrk<1b5nbB9Wm%CzpJ?UEW*m(=2O;+M0-9w$`K z8q+eIr9bPRITX*DGBoq@9)%eVa1o9%-RyGQHC2c9&mT4oZ*XX~J^ah$VZ^Dq<*Y0( z)Vw;!0*ow2G`m`k7+j$B%Lbj(Wh$=O%xW2* z9hN%%9+uu+wB#wfRIaPYqFGdA7f{ zr>CWESz$`cuEvzI?PM`rE16?n^>rzcE?u)KC0mw;shr!E1-oCFC9Zi(UeQFO*_Ff& z)d(We#DU%`c51{r1W)!6D%pAnq>F)!{}Vwm`Z1}lmWym@^o+Hy zn9p>EPKwqzXvgNdT1vRnLp8BlOnc#pbl1>SRsRcZ)z*r%4bn%N2eU%_5`2qdkefThwrLc5(2p`R5!W?;T_iJ2 zI)8YFIvcHgy7zX6-QO|ZidMLTmiZs+@Gn8G6K2Z^m&1Etd(f#m1u2u%x1+%ulQ^d6 zeBUoNa^;g~i9vgV7a7jnk1yOe%nDVL_eJ^aO)VaqBKAJ8YG%*yS?$U>Bh#fe#B^;I zI>~meSh`nUR>`kNF0&$+l}xK}v#Wl=v>zm_dm9Xt( zGh8d1K~gnwoki0tj`abN0?HTAWOZBcY#p$siqRJvNQ zSpIv=rDruioWwVsiN9V%x3?d{>9Ha@r?xk2qSZn92lKRe{1frmJlzo#bxDs*!z-!6 zdJ@JnK683&)o%-O!hZWV&~2$!4cr^l{np(T0F93O3u*Z#U`wM4tH%lq zs1DBOcuS+4MvS|K|9#3e%2-;;IMUKp#+n(fE}B@#mrV$K8fxo+{Y-(Uu2RCs zO(JbH@|Ff8D9caSEFOJ!YABp=;nz6fu5rNhwdhl){~K0x-?ghUT;qhhYGiAw{`Z6t zEdsS~+EWgf$&tSTkaB~V$_}|d2DEKA;D#lKeBP9k4Houo`%?=Ok?&%xnBeX_$4lGW-K^3pC7 zZ|nG+lYjg0l5H7`0%I+u&9w(eGzf=N;2)t>hD7>ahd+B1wYnt+sdVD^B&Qp|%Iku` zW5F1?P9@&7dm48hn8mna)#PyA)5C`GJS*ff9pP2ECA;93J(5H&w@t|ZeaW#D;~6?w zRBf2myr%l#UI6-lZ+I(z0mmY+2h=NPI4Y>5%p>XeYzy}1`fxwrP5V8g5^w}fDICNf z<}fsNklJ(mAU+r4x$e2nQk|!tk@}VCKeHZS;ClCf{oH=!)s1At#YR;N|8a3pQ&ioE zgaiWnv;Dm%eiU#6afh&aqHI2epREtzAFcI}{%Mp2WcaD11~F#X1;sO=7KFO1p9nka z#pqvF1;!%CDPK&7x5W^C`Mwpdm+ROyU%=->kk9prm{9-0GQr1iHGWg6$zMe5A0~k3 zji+Z3y}HUgehUBGI{#oZ>!RznW7c;@N`rQe*}&*+wj%0Y@xB!W<$an`m@-p*FeGc| z;ro4RFqc{dNbMRg2Bz>!03OMoW;8&}fHuNGkkCkV1Bej8yZD+h zgm~_sC&c=;jacqy)+tRj$j;)BYD01pKFJ^n(Y%uUCuFP#=r;rv=6g+5;q<@-j9}c@ ze*_6%)AVyl@&g+@y&>1Vg5FFqBIc&U{f-yhIQg&9sA2*1%~8IR`jw^}VhXgc+(s>s z9>LNmk`7f}X^|#XxT%sljVY;+s<_+DlM)5ND3Bp?uuvcUi3>LWwq{3$x~A81V@oVo z{W&0i+Zyh1%+???>ir_3Tah{yJs{`HfbT8ZU(NU)2ws1md0&4jf3-6{YvTt&HGo!` zhgB*6KALvwL?@dc&0(wA8lUV^3TN${@|j4U6AaEa3U1A=-N%IL$gacy_C-!_7gtxr z(Dg)a(hi}h`Z|=;x;my>echiW{*Ep$;?i5!3BCcoLG#NvJzd-Pf>yXXi40B{Ezniw zJn~%P$$#a`8X|p)9+yqal5k!hBHE)?#+mAxSVKjBTNriO3u|K!TbTOT!&XL`SVOBJPV`pY_En(c3eBloOikIE3+l~M2<>!n(8tNLt@5sR_9Eqj73 zJ^Y^9FniJfl2Bu;dIz3*tA{fl<#4<0e_}AOp_Dqss zj~z1X&?uC@x7+8m8kDHcSGN0G!>KY=wN`ER1`$HL6Ob;x2WTiKt2q>Z->8iU}9Krhne>s|#JB?oH>eLwrv1@7nLY&JBI*3+@? zb*z-Dn<#BzCfigkm}&zH7M`vaYzkfL_Mp)mEb>vm6BFV z?0*Z^(Z-e%uC!21@$^#0L^|lhU{lv**LgKl5th93cBx};|An%h zT~hW3kz!<`Z)aCl+>2-ZPu5nM6A&at-`KppeYvS}{jo=ucK3o#G*rM?>- z$ID^XDHX-2hihmw;(WX~VYONYSe|laJ|lFGmTOJ(InAlH#v1$o-)o*#W++&r{<*yG z4V%tVob-9j=TWG&Ya1DY<8h$=9g*SQ$?2;D%hoxu&c@j^|Ojn?a>wvo>^w{VI8VA3M-dr;T#VT6y*I_~73BtDFZZosWTh2{ps zCdj3u>xnvb9)3sY4leFJCd9?(93Eb*YvwN_Hov%o!*zFI89*QRzLQL3+d|-O@Su11 z?hZvAEHbKfWDne!P}j(&N1IlO2EqtW_Vg672Tr9^1C@r2F%rIvKTFKtNnY`#-eLKT z6%#d9hJNS@&~d#%J1xYyST1k7F@# z|K`YB7Sf}>D(9BB8>(=zF(F@7*$&C4g?El;f^X_LV^DU|zjEAP{C&&SMA`dl5Qub7 zAvlF-0({%04+FS?1DmtM|C{~Dqc}~T#9}XQ$l#PL%bRHDrt+LyYc~!7Cn2Wl;nsC@ zJ*TXklOvZdv%|3&V~)(f+2cx_Uz^RweXnffe)p;gol8q`Pa`389?0ckpXi(6_*LE! zp79zor4jBjmFu0I_}i?Ueiq;h$lCV65n|+2!WC`+B7fv8+{ z>kRL0g6OGDKCK!rdb^QWq`aPg!eAtiO`u$Pe|`P+<>lwe)u&XR#Sfb-&5Q0Yu|+{d zqrT3z&`4dY&CUZ=jYIDjy33GePD&+qfu^ax?TL+?xIfNieOpRgUGgGYX!I8f^=l}q zM=OxNr~?|sEwo54E6A=cLl#$~Afg(@!FM#Nfmj}~4V)P-9k++~Dv37kxVb#V{Ytt}(KW<96xw6$4mjfDbhbS|Gn!vC=~EMqVn|7mw&_OggAUcV{KgZmRW45b~BXvW@U ziRq@X-#v5~T<6l+!^z9_sFa>5x+K(4qX z2;ywTn#`6th^Z-|O`p6z9E@S&d$W2W9m(?N>pe^#klY`c4ScMPb2jevE2%q`gm?3K zer5Bxn7N9Pa;@HmQgBml!(SQi=uB?3VTM+eyr<&5vlMdg_-kU8H2vth^+e0=p&{X} zU%8`C7bv!Q`;=3XMCFWKKD)A|k&-w-8>-dE$zk=}pBa*PAH z<1!+B!*4`lqSjb|LX!Z9$?02D2fh?}pv+mTCSy6!O-EE*b#p+IE#znm3V^QVEn)xT zW=Zvl?oMX|G}be2N7(3JKghlItUhDbZc6aLVtfEBu3-^+wTGH?NelmBv#DH&VooUB zcw?ad7n*Uk!u}63Q+Dxd=yCY1XFlcJ=k_=OIYYm17%g-jPml743WwAfj?-KHlLvfr zA%Oj+EEmPmkl+D7;BzNo(chJm?3WPRW&eO$&-ytwW~2#gGda^UJZmfLHV1=|T*27Q zQ9+cNq@6hfh!7Gu4EX&7gtl!|Z_P4f%IbqDSMGsB?KI^)iV!=Vmk*obcj3VI;0ZSC zFR^3j^Y!rxohDW6+|>0Yf2cFT4`|bEK0klz{X^a}Ay@a=NTGPOsx3inK7QZUuHWbN ze6#q*=B~ytL~W0Z80Ra)=eoF$yBtvvdG|=pPpF@8e?BN7W%`y-fcKeq8pwb-W;-kc z3?UBnf9P0rpn$kb)26Zg75G$OL$9viTfnze3Cys-)*(j^ciK-CE7IJJkvh4f4EGfs z2WRZFIh&>&v%7j~XH?1G9%+u43`$wYl30GD?s`rQh8vry5JII{-Yyguu;@Dlx8dRo zf-(Yh!a)ENjVD+$bztuiNJK^mPd^B0vtO4O#SkY)EHzpt*cCh#!Ga^W#KweZvKMZ6 ziF3~F4PYS-KvxXPa>G5@tw_zSG-_05^bmitHh;%?@2C%gs)}*agK#25vgGb|cu|7Z zK=LuRk3cfshEx48u9EO&=zSDg8I+INParENfE(*~teW5>Uw+U^*EJe`?pZAJ*VC*S z7PVfi+6*ES1X#(EGoZw6a-BW8DxXtv^gojKcHfJz`35I9@KJE1JE8?1G6>*9L{RHS zq@c|(7J=SQz-*MAp=FRnh{7cVnj8;gh-0I@Pg}ba%X`*x{K76yo0N z4dNShNpzo%aYl}?7&9MHGw6o^VU3N9X~kWb_LuEP7U)kip>|Vs1x8_$d54h}gv_CU ztAns@(*5D#_a`t~Re*t3cPTRvxB~~l`O5wUuY2V{Jv+qc?CuICsw{So0g4CbTjM6o z$u@8)Egp%CSd+$Vn^zjjVi5MV`$~ znnpg>Al&fF_{jW#rt>Twpu%C<_?Q^Ofg^1ljwa&fWc(zhm@3LTX-LI}6)e!=uA<_N z@R3*8<|E}BA{wt!coJmnY4{fuUaISIizZ0u3#Cm|nla2S^cx8HtKMe3F0bouFIAOT z=HT4zZ88mc``$5BwBUJpogXbU^-m?6%8Mn3fswN4B;3es`PC-$*Dd|urs3Z|)B09< zdCIOU5{}b0-f@n7!FoOs!;HRlW}BFfGREsWwaXGuu9c!%G_b9Kbd|dtXMP##gVPKK zDOH1HJu8N2dT5)0%EsA}v9V;V2Py*D(OfoP>EWQ+FbU=8Poc-p)`~t7l0|` zbs(onM9ixU)eQY?);6W8(FatS+)R8s{{yrh?NId%p=9zO7e|nq@L=uRhR~ACqLc(( zCM=4wy1IB$ESojZL0ZU&E2T-(G_35l+cz0w-7ecXSoY2onI$KdRYjzlRS zkDaSHc1eZX2boj4e;c53hr5SVqtGJ>+dKmEsEp80+|4HzLdst$SyMDpgjW90t<~fe zDX|7mDB%~H1rI+pFP%5V7kL4<-6XnuuI!#^2g>c^_wgF7U@dQ2nG*aj2hYqJ}D@{X$&{y=D-w z^oj}KJ%sIIH#Y%q-Tv}-SZQaGS$1~!$I(1CAtmXnn)aquXh~}f)D&^@d6e%=af>NE z!8Ldajlwd)+N)KW=F;~rl0lsm-n@SIg=Ilw0ai>>Tq{Kqq+L;NG*K2~nSymiy3V2X zSAsa_*e~0*Gfo?}jb_s0TLoAu=Ql)v)0D|MslXm<$QtzJ9IU`jgXg4|D}QA1hNSu2 z$$}4WHnIP^)2yO?94jf zRJm_Ta>qwchjoL5g{$_gl)W9RD$z$T1)m$*B|Q_*b0nmP!eG8(Y=_yJ%`) zT`gDn(1x9u>yVS&At{<`FC#9VTy+Q=zOjS4lp?F1;f#pd+bts7?jGhl6|4J_@^2aH-$ZnAhjDk0$N%alMyF;``sk(+Ov-dQBQOqo-DI zDg!1`0&g?J^SmeDFy4NL_NYsYgpFFVK719dpSy$ig7q-MD&IL99A$&K@#QxDlrl;G zu;wZj;%%@{urFL{CK*R~Tf`Vw_zgVsdkM5+w+xSPBJcXd<~wpnCS=}lo0*UD8tKsP znMMI*=Ggu^{*dHO8`-LpjXmHCbB(2(Yof$4K*8ZcJXj@F;`GtWi_LkRFut5{C2*ly zCUaqxhyCg5sR1>n#jph}o;7FPN!?r$13-6>+>#ouW4kf|-e^5sBi~elP_2e$O{foc zqixk%w$G|*7Q$nr7OC*5D6!@7rjtN6*rAyj+?+p4dGLl8gtfc8L3*V~Hy_$_SkPv= zEO|{urbYkLnt?5S9s0v{Iikg93{vxP%5@o%igY(eo_oXCxwl?PPIX#*_}fgDNk(e> zGV#gLYY78SXp|=x$=Lqz%N37odIlN${SsqO2lj_`jM;jJF_*+9)ig2i^tG;db87Kg_`K!m#lVGejjZU>B=TPt_|q zYiKRG>MyMJajG{S8DpGjU-7&WM{UR4FHVMGcc+UhHWur2Su-A@C@75=GZh!_Wm%+> zr_Lv-HO?t+S4`!49N@Gr%3>@BP`|snY1LZAe(I+Go0w{DpB2^EI=iJb@d$Q0!nxr( z_pm;YL77b^nTXP+A*g><-#FdN*DX2$zqG+XtZ zHIla(MTXSLBpowv%5TnwOFE>aH$Y@L4IIYoc1|^Uw*8EX9625qruXpkdyIuOgEjBpWUT9zOoda$GkhMo_=S=!$b#KOtLu#@vB_ zJ_eW{ZAtXhkh+5Opf6!CBQ&RbRQ9SYC+sV~29>_RyMcSZaX&;sAt1lU+G^ZY(@?8s zX`u^)#t9GNxR#e@#jfBLy%BHArMX%zpryG+w5$C;Zr0=-znlU&S|i+>Y65AahJR!# zinP3k#e&f%ua3;PKjb>=j{8)r6R`ciZm9}!opHDAYWcE3l}!gVvffvkX_qGZ1(%wM z_FmnabY`rdM0-q=QYCpZ7WIWXfQ$Q9=Q zf*a&9rT2rR_@Fwr$(CZQH1{ZCjPLZM^BObMDt2-Ekv2V*gmN@prB@pE<_Z z781CuyCB2^2-XEY5y~YfWtTOCvxku@qoObhBZHn43At=bpN;ic@myv7lc%4N`kCoRcMHY$ zzq$X4g6f)_4sh_7t=}z)qktQjdxX_PCChRA3`0PlC>>zRheogI`${G^-$|ToDt|He=|?>sq*OmSfvofsijjKKB!9T-_(jm=NpvjjqM) zDvV1 zVvY}jW$)O3zE2P4q^yFd4&cSX7I+KBBmLHh0(R!Q*+9qS4H2~7hJsQFVc zIdBdq5I6Q6K^D+3`4F0X$Bsac&wZ<)KV5``z3zCs<&7{({xcF)EP%N-!e3gu+>}F1 ziTR#WuMOTUP!dhnuA(C?+N6RoRZ^=lDHT!`ceQq0svr;rK1dD`>Z3n?&gR$Jxs-(Rh)K%z4?Uup;?IiSdre z>D9vDzoKaWw9_ejFqHqs$0=Q%lg)mv&(c487ZT7Db&YIpqF*fy+N_3kvD+;TU2JZv zqqV=?-a(7f|B5NSd(amhyIz;9;8zyoG-^Iw>XG5t+E?)AGpY`pH7o`~dqS@8aD zZrZbucX@1+Zv;hyf4^Kkq}QNDwKucPJ(y3Wt6XoYfO6mK&C<18fxDDRH))8 zp-Wq1%$pjT&6lcvXs9tnKG>)xJ*e|b92;e= z!2bjIE0O*S_zhOE>k%`7vy+b)xL?uV9cGM%r0#Wf_l^1=4;9C&(93#GR8GvNy=v6p zFKr6Z^$}M8*EW?!VI_vI2)DW}gqTcMl5%*!DO9V0Y!w@cEqt}M8m|1g1>0E-k=JoQ z)Q>+y0CBTDwD&QX`-TVtNagmy`ZpF69^iGRVC?8Z9CE;Di9o3;&tx3MDuTH+KO1f-}-#Om1a)vB-LRJ{g%-hAB<3Y8$Ir2k_4`HDv zwlt_*S){WC5U}09ti<}5`PjJa%=y~w=6HY2u5g2<1(AFw3@d;XpB3<0S%G&XN8lw+ zVdGNH^hn=Gu*Y}7=gzg|2?9A}bToQBL1A|hjke8*aa#*1004n_b zdocK!MZ%0$?Yf(_48*aftvJ62CMP;V?hC8hGSP?v2Xj_HI&BUjL*wr5yA-PkLzb$3 z%D4`{LA0DMUvMlCpAENOyRB*I9OEzMwNQ(F5FIZJOCe?-%%bx1=%z$V`+6nbkX-uj zg1*9v=CBVP5FxOSL_zzuwrt|-qA zIJXaq*&DvQhd8;!l+COi~1O$dMy}9?X$s#p{ z%=d5ciH2mRoMww&`Db~?*N*f=xljQ)`={J(-hvjEL(Qf%`3J8_6pf7q!&3acCGFi{ zH8-Vp&7>)98hCIZj4v4q#?xZ{_qQ#jatS*X@DTt%tnq+eyb2bUXRXpM)guK%Vp32T zkCZzSB`J6N|3Gt`($Ug_#zK6?WN2Y&Kqe0636D_voDIS5+TUOyHvFnlj!d$Y$xr15 z{rXG;&=uFFZ2znwhjkONv_aP?h6({Q8Xi9ey;bN; zoL|m_gOv(#*#5I72I%OPG*7<#7j~aww}xy8XaQ4eJFG#G&--_0wDipxf$q=kAw5CB z8*Te@F{1$8Pp?JndPvkb3`a*>QNi*Ye24MDC^QaA9XMo~6U;6TU9==CTv&oKR&9JX zL~5&4WhRjU1^}NDTI!Pn%8^U{hFz1=4B7;PYpD;s#Q~xdIAg_D)Tw17CR8lxh=%;N zhC6fVpj9K+EX5xI6u{G+cGw2^^~pP+lF!##QKUC~Mm#!Rwkdo z1s$WX5E7{@2@t!I9+creLF*Pip%4>om6kpUOMM4J@0DMgl55$a`r;r6ZG!kq zCWh%MCgL;n4$+dJDs6x&7pH~J%T)+t<~Sp?s@~9LyB^bky4x?|#lP?o>M?u-w-q)K zkc0@NYRj{9-;8#d(3Y-J1{!-(p#|82SNJDc1!0CS?Bs?!jRXcEx&&bQV851CjkV7k zNz?xaI7ec0Kb)-Mw|dWa95U7NhYo?MdBm}e`pyC8xfjGf)HsUf=t@q@_b=Z_U`g0= z&VLWqhB}s+IL@qihm=YN?IRF6Lx^8JVfTvpqw97B{@|WQV_Ip-7S;0~7u36bCMVBJr1eglVzI#k}wID(2Cj1p=jRmEUq5)JP*I>3Bl{{v1;%4%S8o_RC{ z1sI~#rZpUI#?ZAl?~>asH8=k+%~zAq<~jC)HN7jOZFiAmu9fXWQ}Mi4~)^0(?oC0TuP_PUa;t4%1i==&CpFk&0w5hqXpvA?0}TgJIqL24=|+GxOER0D$ga8 z0G(eGi*&LXHK00*OLf0LOqf*x`q3x>CNwQ3G^7n%u-oH{Q(6m*l?Awoco5lybKetE zp2Dne{$bkldHgo(OMGZdl_vQjNtVp@Vwj!)7U2JHt=fT;Fby> zbi@Paj}l?UjN#4^HKG1?K<+pdJ++i27!n>c=%rpTlUgophspc(>$o+{Ne(;VecW&c zLLmi#>?&7hFT5km%%NTjFe-pIcg3DjuUrJ$1xxdfq=sJMZ<2zX&)DG0MzkUo6ZaDe zqQ~(-*)%EKz<`!P)>~t^v+Zm#%fz7CT^H-mTCpF zoSl6+T2JAw!R>ndRCVn}NCNDnC3DIO8f$)?hi^VzqDLZA?xR!Rc~Dj07`P)VXApTv zEF-^Tyy3i#--LKjc77<>D!lD4IQ-Mr=!tCF}&RSbg=BAj}*$a?c?wqF{@A-K`i(G|AWc=qC ztH;0Nq<^OZlM9!a3r;_Fjga#$n7W-n)ThE;DBG~9R~~0?_RL3n?@wdqG2vJ3Rtd(` z*??Rhn*B;E8b3={a!mTGv>5IdiPAf^gEm*XNDL(sKP1F$vj6q~9m9xgf8sI#^d8b4 z0jeQra1%DUe6$usTk!ScMeysApN+4La@ajHGmwCYu8SQeY^6kc(ayxc z%^J7U+4n$V(=9;`$Jp4RuDJ&@*E+xB_Q1WJ;q2^a&8*tx>-+iVkcwy~blM~*P4&#- zjOn{5aLfowyNOP0GcwDNQcclP2fGczXU#mS8mS@fy-(Oj-BfDP;4vJjA%VeFpU5MS z_(Oq3&qli-nDtcYDl6sATY@Nh=GXX-Yl+GY5W}pcp_05J|F)+Ss#vKp33sLQF3w%k zvEhy4i6F)*o>{bsB(>lq@^IG4HiP`Cj#5-5pfh1^WcI*Jrz1k z`cOmXjbmjhMQ$L=6rcJ}X%H;$lJr`}`_Y;6e{=@575{Vwj~YuITQevQky7fjr;V7x zji5;|7nZ4`EU6Zc%ND@JI>yu{^wKS+dJfj76_`LNIte6YDw{sS0is8?xwPuM7%j%) zQF6NeNkb95wgEDwy>)e$mzQtH=K!f(tMA`DAhv8~bOqM9XKSe|H6ysHlY*LUSIIP1srKHZ*#Bx27S*WL|BZ5W4ArVZ zN-s&bYH*O+y0oXz60yXzC9$e2lWK)W|5LB{m#vV@_OY_1$6U4bS;gjbf+0oAX4kUY zw*1~Lx0x=9$mKpP$>%o9_Sf4Ydt6GQt%`lH#JyCfm$1aTSV9<@PA2@X+Y9A(qdtwi zM#N_RtEF35nqsN9*7SpG`r}QVMcC#CTe_CkCXHMIIyWkf)eFQX+tR;osae=xvdnLP z+DcXI#49(#lJvX&Gw%hWY0XrLJ!Ws|DLHRV3ODGDx+YQ8i??AcwegOK9ZBoNKZ@Rg zNFuX|?5vfG{F6hwy2+(xtSuf(i_o>TGC^(8WLpg3e6BQ4pElBFzC2$1dD3c%R<65@ z6Gdj#nmNDZp`(po4h!aRK8q#i*DiQ)4ReZ8pg8VOdCn{23rU?^t?~kz@#mUMgoWvn_YA6UXv|} z#xwMBvJIpKkAL;jxAL;*d}NK>hG(pcpSKmAWm2#Hz>g~QaqApm7JaHE;IB!gRF{4V zwQRFsw#)nI;Fs9trahUhpX<``)Pek8@sNv)znS>h4SXnvnwgnTI+6;)NS%GdLV7rIL9 zAf5cIwp2`4}NtXneR=gCnBPV@;)P>VU*pG*$=`_ zz+B{dp+t*o+uPTsOpD*>#+Ua6ZDT=enxY^^%xql-e2?OpU}gYuqQJOAvQEVv?0JYI z6YcDuRYCSB`gph8BdD&B>x<{<+18uu+HL#ZiaS2wOmB~Kj{v^Xh$qR&ODMkSQvE9J zbD7!F4g}!Uf=oG)CUG9thb1QoKZ>O%Nnwql=gqj9F0G7V1uMNp^263jZ-36ur(Ulx z7F4f5Sp@XUk@c6!(m2`*13lU3ZR}Qva%0Ccx0+y~pIh`=Bq1|y60eB+ z=sDH7#V@fS;j#CLH|3{s`kGr^3o9PUk+?38GKH&NBt$^SS-HNde~x!xD6U z7`MOKT<;|mw%9;eIQOUJNvRo!HoC?}|52WQLrp`1dsn0MfId97r+nmXJo_WvRy$M2 zhQloH@3bUuK$kQ?4CCAWCD=}U_1dQAy6@7hmJL97Ojl388ZaxF9O%;m4A+)=xlc9) z9nu@Sm0?%K6s&mTE-4O&zGjTiq>#%K;k>*U#6=af-`|972)mlmp)S*5@9J5GBhNhz zx*GhIF9d)BHxAkvlKmP4oYiSSqHf7kxa5R5|AHdQ7E$Xrng)`^Rfe}M3}?~hgp7tI zQAa_>axkFmPAA5fGmp^1^gC=6lGpYTIlh#uTiV|C>iV#Q{R#2sn(2gzEob}|uU=B+nLebLkvZQ+o#Lda%>8{lxQu8tm!^CQ#GR@Oa=E#g>$p zP?kd$r7uGHlx-x+yx1`N@xr5 zI5E7)6dOderE1|&mXK4y59SAW&Anjzr{*SZ(@akBe;{}|I`IeVaeOve>geqJaM!LL zqDo|(uM{KOH1LgCQ)pK_+Ud)m-@_q)$RNMv_2&tTB*$8im1gK-v$D4(nnoj?D%Um= zdAmb7ss(u-W-=R1K3bH8{dusfSICS-mgn>sd@>MyIX^04wAl61Yn>f*Qfpp4 z6Hbpe;dlTBJN=fjX>HXFB-oQ#a}?1a5~Y2Xwv7U3E+%DZMWy97&C`G^={Y+228C>z zdJSq*lfM44s0D5#X}MX52I|ZAFg%``{Lwy;Oyx_;>26}1+1Ra#dqnTd((dw%9)eeEvvYR0OT}%A{cyW({R+xWwr;!LukU9sD2*<{n~vR(bp!p)U8H;nB5*!`q%tF^4l?alhyG#72%i>gPfcg`zZ z3WqVvlw?+Irg(iPS@U4P=D0(La2Ifmx2wS&+9ib9BKJT@JAv3d;1iu(B{ zJ0V{$qr1uQJ~-fGf#0)BEih;QIiyS*j29mJH3_!rzDMYn5-D!uoKIyIfD}aCi0ac^}FZo7P@h7D9^~$yTmZX3k(Kw*BQwQWAkEa6G;8b4b`WIN8LI~XMiilR2ND;M$rnvpYw_wIMV$=IUGEq;+l-(;nB*ywB4kQabzij1{A+CrSnM7 z&;ct$_$qTZH((HeyN_mo zQJH;uhNC^Q(K}BZtr4*wPZQ| zNvq4jId<)Qpm1JS-)dN8*5z~-fo9M*>U7G+1u)BfPyTs*nDtXFja%xwHuau*c%TWm zbouuI^G9*qV@Kq28g~(H84UxCOhb;#@l&(8-#nK#C**_v*Pmrb{VGVSYfmljyp_E2 zmQ&0B&+@&9NB%NpO8%_RGR;ZTCGd5!Ooy#QtZNXr$zt;Oebi>L-@8$+!zM{mJ#)3C zjZ}ZM%50ofR-UCy>jd7TQ)1B+yPkpL+NqBC+Q~lGt)sems>ifccje@=j_Tftfo0D` z6oui@qoHmkGF=sC`TcybGTjxYp{ti>YgtV~lkh32Cp(?Q{Xoo8{eZbUoaO}CXSO)wfN~&m&^waVMCR|H_wc0?|8~f`5%dy0Q5vTnKP^ z6h3L%Ri*CzMnA>%Cir7tFe|J;32hmdUs7sQ%!al|G{i5byMIqyfsEdOp;96ZvHZs0InrI2uJ5{)Yu!lM=+hk0-&dT*Yjmohls!@Zor=Q3FgD?MrMP-|$L;3d zA!~@YRtZ|+IRS?titssr$iwx_Ipu{B>X$$=CeOny>8B}V+Bi={a~jT-8RT{%oNZXY zMEbReeSdc(8o-`4Cdt97WjID8MifKxF_k+^l(~40R1pECe(S%xxb{ruHUGpq|S3M#ERen&_YjTrC(JcSw#r`w8jc`tZ2oh!x5mkLe+ z%7lmDimdC9?<1`TnHSd}+*rr+~GKl?Y@ zIC_J*?hD~#%pC^9+%5@!egj_rSerpeF&`6BWT^1b(*^ald_cbTWNL!u_RkR2!0XkI zsW`nQNYjPuG-No@h@(I1U@_lvl>J~=xyzMM+a5Ic!y{tkHLhHgE`W};+5^l*VS{BE zR+7Ijp?d>R{6~C^myh6P>5DJs4oIw>ACH>?^mYv!FE;KK0nu&yYu_;%c~oRd{g8zP zpOt0ufY>`la=NINWznnO%AV_ucgV`WBuD3^%_%$b_?n7Pam&yt6ifg9$nR78nq|VD zoIOKFR9!uA|LEYz)Bh!>Pt&3;Fi`R$+;lb2qIy3s_;=LkSuTp7$d7j_l72mSp)}X4 zLJlSa9%76fw4(RCk^mE|F26#HDZN(}{fmkzfCa@N(};6;oaezh*F|o$pWp({ZnJ>4 z^`rRQV-IfLPG*{+N!!Ljdw!xey{h91`A9+8PXV-5b4=<>mFU|DblwJu!0wk)f?*O) zV3l?|@WWwze3^2RJq7Do$4aLg-(LO(!qBda`d}kh_rQW)2)_)}vqy;ky@F3tP_K?& z1N+}B-Nt;}?9nIob9q20Vp{qN=1RC%VFYM1A(6806xTuq;0fEUW!uaJwe=}I<7jt#qBa8IEp-df%vE$|7 z|1uqq^;2cnsz#&!h}dGRe1ZO)Ky@$qAAIn0L<*`is!xkI;5>)8`2^;$ad2Q?H6|U` z9`f%DBy)7+-!-^|@6-K_ZZ*9x7@(_2&_Dc5;-Sne&fb(G#(?_+#EU=aPN(*h(uE&l zO>!yf8KO0M=rp2>>X=SNpqSgicl4NV{A2?qF-^1h@i?2jy6f0*GB~Y^%{BaAHlFQP z*1n^^?;VB`2Nqec6))`J#GrWI2t$c6pI-nv8FcaeG@h;SZS-tcpqCzFH^^89mVwOO zj{`My32pJ>83aWFYhl@i0&Boq;Kzu-LJ}Y&gy)p=uP24d(Aw)D^pTM4vm!)P5FXc z6pm zBqx98v21Z~xxcu_zt7(9_nyXVGd=nGyBv6hOJ8@K*hss-S^H>50+<*tC%$_x@vdSk zoBZqh5R-@R*Eq3mVz-8bFFL$Gq(yY5{f;2XV?~$@YGI3r|D@yAp`}dH6DUZ9H}_q_ zo$n_$@$Va2!YJ=xC0HfJp`dLL$RKocgX!fydZR(g515F5Br=*Ha2itenft+Sp!tn%^APd5 zPR5Rm&yrsjBiuo_wex$Yu)&|g-gtPGbm3<1btn?n<`-PxtyJ&lW86n>JT|vH9o`q(8mVs66i26kV}gE zwZqLDJSFglAJ+Ue)+P&&nLY+9x;`Wj2I*KtpfF4*IEDZ@oh038upBLI9~H|TPfkbI zNLq<_y3S~XY6Fc4*ii-54ZVoL0Z8vaXoRl3+9i7J8omXFnK;lq9nMoC-1NkR|Q`s@orhjS}EvZj$FkI zkVFB6{)SR;08Iz=x4+jSEBM8bz-Ve!UjZF}n!s3FpQ`!Fe0qfhqhRI2@Atw!4}+z1 zCAA8~_j9@hq9KEgO=8!vZ*n`lS>AQik4=E@G5dYL2ehL5vCPS}#mjR>NN{!23PWK% zT3|H0;yCOwjRg0ASx1;bPH@0iLz&bTU+}XI{xSZ z)Pg~KDB)%9+F_d?5C3K`Xk&eQ6O;+>IzBfU)$0r{F7Ea9RZh&fZI}F{ZslI>{)5?L z(I8Bj^RvX@(|ZJzflz9fI~#Iq?%ZDfL)qM*?`~w0d6O|yP#&1E60d|Jwa4zQB+01m zACA^EM26`WVqr0jvK+8^8$o-zJ@H=QssvA(gCk){n-cgkr2d4=RfXx@uUC#}7>SNd zSD^drEG<=o1ykuIM*ZmmjhY=J)*-VlT1#^Db%7>)^>TCZaqw|n<$KVX_Gz5-!3hG;_J_z2o=#(7Zt9AIX2?OWs2c|nk5YWF z9|~M7)!K5^M*4b(-)?cCL;TVt-!3Ea4*bY2nBo)f4p+g#Le^0lh{P~&>QA$Q1&Q<` zb-gF;`Jsmp=b_Xw>nUfSgI71#D}%G|tB_ItV9jZaHEf1(uR316@2xo6fScow>B-3T zE_1lW7Bn!G`#b}i=rmNjoV8Pz0K!>I#+;wiQ5IQ1ExT_jBA0%*K(>}0{_a}s#2b)D zGvt{YX399udWhICipdAZB?v^nPZe5j%&6oz>VOK~_k6(GM+Q!>r2~nwZL&a!CPtuw zcj+HRxsZlr2Ue0ykQfOcz2oQNps2q{RQI@N%QJW*GT?UB#VAJ82j*jPoPd|W_92#! zWo5i=ly~gg%*DkDxA#hFQRZm)g~ttY;^`4v((Z7GWwLsRC^+iXqvAe7g=ExsoO5_1 zx<5UHYBKMiQ1z|<^ZFCXgR&qUz&;=rGmcq}35o!{vv)ilBqC-?I9Dz}7GWQN@O7wr z(DB;PlbR`#FSv)Rp&Z+AT7{t|@h{hy=V-p>K6ZPAcqfPE08hE3I4p-|Er>S&W@W7% zYSd`>p@UfUBok*Mk<)h1I&n~dGG9nm>bq$VzcrF4$75YLt6^_U;N*HjD{+q;ae<#u8)#p=i$rL<}I-$#yOuqX4mpLNZO3FvJaLx@^ltK>@cv&-=qGr zo#L>!N&I~OyO7)Iyj~U!o0UFWaNXGVGd)jBR*{b92bKb9k2&4Hvs;4nf_in>!3jksFg91Gjhb zM^fXmFmj)?LoE;O4ca`~RW$7VA_3gr1wlu85(NIcHm$3%PTe--0zpBm&PRL==^CE^ z12OR}lz`-WnN4Ey40_FCLQ9dVTC&{KbKUC+|4gsB&IyXE28ezSt7Ld+ z6eSk_SOylSnrB&vQ=8wG83H?dFHk_i-EIHw*d~VC_N>SPC>=m_b6@rkJb*%eIx)`> zjma#bmyt6JoSZn~6y+KLcw_3ZB~e2=eho152pQ_MOr5^ydT3)`>qa&BzmHzS#} z0Ch`o8$X-aM!6Sawz9dd5JmsJ$M&}+ivC`xW&c-kxxbP@yJ4S7ZsFn~!e{p_UjMat zdkzkiwGzF6Y89us$AqLxl-1O?=}|`deeIyA9YK^xNz2Xuu0EYld)ab51VnN4cu+Wy4rI zh5B6K$w>KA3lW5&|HivjJD3dh<{uOiLk~Lk!F*6tzp(oxQ9|x|lGeGgY_+S4HpGSx zl1j&-nT4*IBrYUkAg=;lBgOf+t!apq2M~aiJ1#~>-T};U{~S~PkU}tT)_-=$9)YB9 zAUesUBF6nO`&?d=*rsn8PD5Ipel`nE*jd&!wZ3xq2R+{Yv1+*VH`kRMmf$8iOzC`EnCD|80TFu)M<& zyq^W2A6;ol`wK!B1_c57FYOlTW$RzQ2dtu5@1XzM$e6t4ryzev--~5}HOLPYhq!Xj zDG~F7FGt`)i>iWlG^`$o_He5@qx>w%-o=xx``c=}ac0(Bu{Jj`e_uWC2nl(v`oK}| z*|0+OQ>`wP-LbDeR*ZCmz8zP^!!qrW!ve6pn;TmmQ@}l7hORu`Il|Oaam_j{WjmJ;Lr1;$jUhFS9+^athliqFBmV5JKeDE){0V@7^S)Re&&$|D#DT-=}_ zCyeQ!iGkqp^VDa`7OfI$P8`6thlrW}wduMPoQ!Rusz4?Xuv!Q!qW}j9E}sj5=PVc! z<}P$N>BcVMv$y6cLvMbgQfhDpp$`hu{xWhS`pJPC5PvTA6i1d;VnMR%r5;8_VvE$& zhy4ip*ER615R-=CGy<}#Hl=tNwSG}j=HdJO55uC2rBlJc(9Bxakw7;zBavI4dx~F9 zp_dUW85J%aGGVlHuXDNTqu~^RQtqFZ3-gDF?gZoF{6BBv8iEg){)-~n3l(oSm#1|5Tyn-ux;lX z;$&VWutL_hx+i_-Dk6?MY#-BCNNn0JXKgi>%C`4}QSJRM0uuzDnO)>-{n|+ErG=L9 zJgtceu0)29cnOO~P_j#)+o|1ha<4|i$uv}_ftF|9-vGWTdXMq16hc$EduBJ0%k{c+ zRgDwq?L*nA_C&KMuF^*aUjwvik?0$+DKUpbU%GBZ z&6(OFAHjiLmx|?m?oN9Gp@E=Djt4PfU68-{A;lqU>`HX)!&`wgK#Kj~JH)r&W8O8J zQeM(gLNvWsR`OVVdYtlFIwQ4r4T#q%9J%P}rlPyHagHh+rKYOex8d4d7d3KIN?aG$ zxGb--WpI-JR-q1Cy|w0Jv38V93SOo^D~d>7Te4ZlwROG|H;6SJUpzGIT7bv*HK@6^X$KzY}%8XC#B}qw)aQy)kXh&PH_KKpc!-=Z*~*8~^tww5j3J)rX zht#%!FludgP*9BYcQS?on!#w{aiYP35KKI+ziSgJ!Yr;~LU5G2_#bl)-EBZqCLE9a z_MV=aiOj&PlA+umn+Fi1)21bEfiLB)dcT=v^wOx@8)$xP;Si94EfZj+9D*vdV#s{w zj3kB(8wCCZ6B0W)gUGKzJjxt30vJda1)?^rb~F;jxjR9(cx-l<0%f{E#c_IKafm`f z-#l#aWNi`3*UbB?e+M-%ak1^!8JTIhX@O;_K?X5Q?inB!yaZ?PGUQvnLxGng^ry%4C{3mZW>#A=Zkokq- zna(ksaX@{x+G7Jo?BcQmdKahe=j^l3JhbicY= zsO|I}Y~Le?50>)Al;w$|jIhT8k{aHAB*J;~wQH-|{L5cKOlw&_AKeSG7Y7$@ZsqqI zxFMRYpiVG|je}=QpKC(XvRfM|mjje8-9$yExAK;%wKIbw9$u4lAEa*X)`Sy(mcMpW|mvFqAkNu+bTjeLKsQXd+B8==0; zzt>M~-kxxg1%9)JxWc{dLGGM;@MVV3;=8htnP@wOn*kF8_`e3jI=v2IZZ?i~&p6tl zbie9;#{Ts^-wYW()hn#n?y$~`VsOyU3qLRXPP?dlW|BSB{-rLl#E*=vD{Q8LYW9uE z&NY9fS#iq%tjOCfX8uq!dimd;%8jvM%Uz#3o`xZ7C*g^p%fZ#1$OB{kE~9(|xK~bO z7tpH+xSF45uxi?EemvoA2U;edc;q|=j^}gLfAU|P3i-QO?vy`-jGb44eq8!J74u85 zSH=M=aPFlSZl&Q3rB!z22`ldv!;3amakOI8p!z;HhJ4-3tPx=vj^^%K-k@`BF2-v1CL z*W{`5CIy?erA?25vk%|rp3eM#_x}%C8Z2Id+iF>AFyPA(L)M`!~I{bR66|s%a!!&+~M(Q zF?Ln0;|AYGm{ZYXt=`0|t;0v5reFqI2u@c&0iY|~O4k{RWiDRyJTo#%V&9kk9}GXM z{@-;!LqDIp-%~$tKlM`EW z35xEQF~``5?1nO+o~O$6e?d@JO_sO{$Jf}>^`QiLUnZ4&32aE-ZWhkg@bPasy~Tb19rQQwId1Om<~ecNT{s*dySgB~;RI^b z&@Rj;H3!6Vi{q+Q{QkmOb{>3KJ^X64go(2AjITJ3i+j(qio7^`yfMV59T{RA;H@U6 zkzJ?4{)Mh^B_hE)OmJ3dfuG zkhmz{;2}it?ngbXC04@0d|g*@P;&ajE&Et@e#ZLlV+HW~@qgK|<%}ccM)DzSdJDHu z+e8Tv1@i2x$E7O-YJ}PBjucSU)J`0YjJX37k}(m$&LmwR%Q_d_popCyUE;G4W4?}A zzpA}n;+qaOY0_8bFL(=ic8==`?+O<;Ga+^);f z$KDac&CJ@UqiAgnqOv;ZnH)y0mw$5iibw*pCCk6ceexk zkG{_sz)5}ko9riD*QE&3-)cIHH?K!FXO2F=Z$3dusF0Ea(h6^pP@`X8&!gcUeh|VUtb3(R2Z({ch~38Qk>~HrrS{$Axb0u{00?#( zA7L&2mDRo>d~iXAkKj7++3eNdT3ZgBY7B8RUwMmMSUz&Z%Qh}5>c$+%J1jhyAzIA0 z%cbMXmLVJjO^zVIjwmy}f|f3oKpdK`FMWChebxFx&T;yKPDHFieJ#hnLuJ4ay@nbk z)GqYD6|n?n-b$w3D@CF0k{_gpM;AdzM9Z$dOG0lfS6wTENq|hqHDo=-wxMUj1h}s# z@r`b$TxmhUAM>`WT3*D$6>`b_*MlHjUP7g@FmFMnw)T+SGs~E@wfPJW5c&pVS0$U> zhGk*kFIyMbxBd|>IjFawCwNu(>CQ(qzxRI*G7cQDxKJ%E#fI+BrYlFlMX(aqi5H_kH1orz$MWsr7CJ) zLNF0%l^tmB7y*Ju)e|oe#V-A!(J>5v30xy3U>MxbVeTRc_wPY}c7M3%-YLkoAmh6s zb?RN&3YQ%5gtG~EAITt%{aT+D@I%yP*gV_6M%TfY{W+v5)aOHWsvzCE^=}5dAC!k4A65Beea)zJDLWB2~lgHZmj8en>pex*RF-fD^E4v zA$>*_%!v%K!|UpUx&@~jEs_fCu*~kp_$O*PvDfP&ruzn~8Rbz>s9zBM__OQVD2%e* zn_kWP9-0kb7Nmt|7f$OALN0>uq|3>pCPXlQHJc*Yv1T|@!^GZo;&^Ee#{YV(w}2mE z1T)1BXGTN?!ruO~OuxbLj{txn_z0QERW5T&d&XZaMx*liRN+ZhqY0yuI^W@*>?WRD z{|Xhu%Kc|9_S1|NYr?9<%oq$dt%o9+)}?;*N>G+_V#yUg(Ne>5;&XsqurMTCy=Le&v)DYpyd}KH2Hb z5YRzpxm`$c(Hb+^vj9Uiq#d-eCHL{51=YY^j*O3ySg-wKC> zoQs#jz`h`1>h0|Q8-LT0LYwV-Mv#w}{T|*HEGk}@r27SIE|sA6cJFP_a|yEe42T8YzY=fNsQ9V$t;>tnKPvja z0DeG$zoKEi&GsY*0u_=rW2Z0(@}Sm434ac9e5!Q|?6YCe%*cw!Kzn9Cvh97hE;F}@XO@^-r`F~JmN{&i?PW`9{e~_ zgKa%rxM}>xRc*mF0pQJ=upd%ZdjRS0;~;>_tQMIkIY_AggMAzAy)qy**Gp zIo`>=&Whqh74?CkGeF(Syvx30N=nEtP71$W_1virB*)Fp`CTP;G$>G*dQj^b6h<{w zI*>}50W(iBWB&3!y;blmnT8u9-?b&PLM&2E0t( zr&9!GHU_;Bs298s=cz2Y`vF2c_*#U+Au1+4EGrs=5h~X^6t3$<%~x@A7AtN{o>#yo z*rrAR$Xa?A1i5>Z{GP=}gar>uf_s$7d#PZYuf8H;<{>qM>Vd)%k3V;IJQJfP6cv(r zfxY0?1XVABn5MoQ55K> z$pw1_h=`8`JHhLwm8tr~r zf1O&Z?5ldC*6)<{*s7OysYY|WYu9_NvUlBXw@)|BZawVRqu{-H&(1EU3zr~@Im2t!he0py z*MnBC*9Zn-s}ppiS}Tf&!$!NiP8?J>9jNc+Hk!!+XJE)+puRJsFubjeohh56=3$XDfCsN-Nr&FGeiRc`&Y)DL2r;g;(0`w;lx zOhS~yRrM3t3Fl?QC=u}(OmqC<dI3QDKe2Dc@I5Zqb zc-LW;!)A1O0zvcQLs^%kV16$(?W%UOYQ(DF9$N(#950 z5EVx~ej7{1;Z)rF9(mdhap{vy_#?Qi#j;F;Q5jZLdO(6fc?A%Hybr=8fk=-eM$ui9 z>I0!ewe{6;23YpUJ9eStB@}NGz_>6ipSd=b+)0e4BRhz+jr|a2I1~G`+^vm&EH+fz z8l1dJF(-V}^|`<{!!C9(%3Gc-rCMT}QsIJA%Q0gyWDX*67F>rwJW=5#lk_r9Ka2sQ zUGGTy3lCi~mIm@^NlF*%61iR-R@{$UtQK;4z1xntty^)x{5#U{ z=vVQ2eb9=+ZqSHWEojy2onX*saS%7dcD)r3n(bD+0yfjCl_N6{JC4w!S&Y1SguxbKTbk4sB}wlW5SL(1 zw1~X<2X}{_cdCGFuPtVAgWuP{Z&Mi#lEK!)LY&z{o9)m|P+g6YX$i*q$>J+`Cd`)f z;#2Vyt@*IYNKd>y?t4ix+!DXyz)ep7}Ny ze(};+Xrq1Zx)=Gn_-_jVCia65fF=u6DFQGRRPi*06pJ&yC|6vHF6u}@8BKMLvCJ{( z>lPO|CKZ;vJmAG7$>=J4QLZu973Oyr7Pc^rkHy)po5rVE-)&PKAKx+9X*vx@YZ<4% z+bkajqx%ZOH0thgEuw3k&|Gz)K@Azf7-g9lG!qLxM^TRm7VXQX@;!blAw4zo&=+|nkpwn)*2klO+T@P3BUc%MgT$S(FRpMqu ze)Ou;wM!!L1If0~{T}?-{t?wn>9F|bP4UW(o$566?r!dyVyPB)qk5y!4B~pN7qs}# zU@&O3f_AOfuZPW6y**q}vGjDKSh~T}QW5c2I#g9p%SIa|wNba_X0vf9aaiy-4ka6h zl8r;jlx-YJHV!2lhmws$$qFl@Q{GiHGaF0XonHu6lk{DdI0UAe9q#GI4!5zx-L4%D z4Fn4K3cbD*AQW01{iMJ!Y%1LWGo)wgmtkat9e#x-MA@`&}1y7 zD20?jsJuM3*#Xc-F8Yk*qMMOmh$q_*RUeA^UZD%Bppu*rFru%G*K>Zi$EX%^K|a=wT9$u0OW(R{H}!-EOP1>|j?`?cHs z3MGUE-cR9dnhJRcQ-?pn=F|>SPeM0c{x;P+xClQc7qg2KejqUg&Ukv1a0-zL5+z#OHF03C} zcJ9|#@_BRizKpYXM`Dlj?D`U#!XZWwS2@4t$<+m*yFSE~bbVFN_04ka+g9zd*yW)> z=C5Klz=C#2(SC<~PSOt%B|k5b+0*pX2< z8%O7OUojPI3wA_0A1&UHHSI^UAnsDMua>aumh_~wa+n6pfJfI>3iTvL^>C&|t8io3 zv=n-Ll_%6aOT&@ieqgP}KS}?dm}yR@si*>y2Qk6sE32}u9v-D67M$Y^y&H$_)(CkKSPBXzWg-3iyk~M$}6#sK6>4z#Y4d4dA$Sbs1)83a||nAJXx| zsiD)S_0T64qJtJ^<@_O^qQ|lBJjKkYU{!lZtwGE(p!w=6?-VlPX^)=rGx}$b?E|u0OU-CzF|O zoz5fDA;`}?<1}o^iWZ>afYMxqeO-j(0wo$zdo$Kq{szB#1Ea5Fxfv&WVHCCW29V6RRpesUO0@S7gowun#SJFdu zpf(lg=-;LS9dFm%RG>>X73iv=Q&hPEU2|aty5^<=-8w7KHE*B-ozOMWMdRuZqV`;~ zAfwccKnBCABDo1u6Y&>d?*ZTBXxao19U-c|Hu9IW?#!?-P!d9{tTngk2sf z#j&PXfO*qPP@Z6^d7~S!Al+K+y5^nMu5<0bNgoS(eYG95-=N!(PNGcdQqIFm&LkjC zXPy>E=(fqqn|U0$)AtZqE61Etm7`OZO@kc~+dB;oV%j9(sFAySxfIuyjeos)sG8k= zqh9YuLELY&f)Te4Lj@vwVQXls4t{?z+65G+xXZ zR8Pp%Z8e+qE^7pA5DkM?zugOZoq8O!hQoe$71J(t9}wr~r60=t|X{WUz|KT!3H z{*mY_DQKE}`y>AW8vtAI6IlITV;_`hpZ<8H9{-MI@>gFyB(UeT<$LlvA4EPa8RK~> ze_J?&tEsXi%GMZ*4Uy>rfH(QC@ct7maWb#&rA`w}?CM#$rosW|OW5ODanMcj4JV?T zsJhr})qA~RI1IWWzY@1P{cg}7aI9~H!?54$gu|#dB#Z4@D&7e%wA_aa0G$d0jo8lZnGV9>g`(48gv-v)jfXJ z8-rS-$-3b+1_#0Ke2hj&4(6$839vyg7CGH z_Y%B;WRz*l^82vTf(6QzQ8*UK$K-+wf;$Cb7o0dKj63tTRB|rmZ|+Xn1i~f$GC!fp zwuB&*IhXkzZOVizAozF~*}#7LCr`cMY)pQdAj`AtZOp(EBF)&_(8$}I?>snn5PgW2 z@wQN$rJ|?B?+R3iCW>f6o!y-1+z$J#1{;Jy)Q7U0gI+7>^G88cZ#M@~*z2%*V+F3u zxAVn#bmd~afG6tRBIa9JC;?1A!t8vHkn2tq$5ot=Slffs3H^mkP4PbQlGrM;)cHO5 zPhjNIevo&HR~paE`Q-$8bnt`5mjnuTnu+Z*ifQbHE@R*25qiw7SCXw66UT|8qJZT74`a^M!g=iyWKEoHT$(-&})Z5XV?#; zdT-e1HCn462XYr3IW#=jgst6kBwj9Ttt@fyTF|~Cy<77Ex$P^V=7(HJgi$dv2;Kf= z0w(D!$3C)XHkA<#%#$oePq*Z~OfxQSj+l_NQM8q5Lj!MTM+#Hw>zy6V8;^GuoMVI0N<gl%O z5dQOD{_DT}%inm51_M7LKOpt1}~NO<5nI*-zq@_^Hq$Cm`6) zxR~UvbB(q$K3X*sVbR#=EuE_+GQ-H2XrSMUW(z%t$2p!%f(Jh8UcctW;gwEerNbeo z3V?|m`?e7T3b}cbuu=RxG$b>{q^Zfv!lBj$IIW@J(7Dcxb_zmC{9BCOE@rBMcW$#* z+q?#qBm>xRwKZ|Is;0>eTU(8-{b|ZO0UxP-Aa>~t6!BZ0dq>2L0bE(!yYd@;QAoF% zwRpSOa;c5cKU}am&~&8@(#NQ_N%|M%8)detvRU-SMfi>dWL2>8wQ&A#t}_~2_MjA@IY&7YzfyQZ<#M8DU9vTq$L~5Eh zLeJ~93OyT{=ejZvr4ZaVWFI5p;TIwIEMCF;A&h7%zYamf*hqD_C_x_Wd_~ElP@w{t zTZ#DL)U@Olz)~%XW<$Mm4T^FJT1CXk=XzbSqgz{6xM{gZSzhRyQw`5#~)-QyDuYp4>7MYfp zf7SrjQre}08mU#)GWgY3g#@`s;eMCS(5Q8pK+ui{s#0khl-_qv6*O8vfqDyPJo$lP zpZfX=(v5+77&}p>ts(!9vOq$@Coqb+a~_?j0_8H4M|_6KGSZncclv1b5_u5S^)nOs z52bxAK?CJPAK^FN&dyWDHw&zo{GWWP{fc#^R4ymu#ozrm&F)AFM7{HyFSXvhNk6?> zt=H%_<9ZO*>dl}P_c}qJHTZA+K5N&z?XcG-I#y{Er=yU4;BLxKXme}0hqs2iz5v+1 zS(eZz%IC?P#zhyEFqTGf8Rwky(I16{`_Uub3*S(`)T1S~O=$Xe{@Ud{F^mnL?gQ4S z58@VUwS!JO3WL_5KM2BlKMLyIZrm9(yK%49UE$p8S3~FNH!AJgL|}84H)pxZS=O(_ok&6@h z`$@k-e8LgbkL~Tx;~;;ADsuoCWBEMyCQud~wG(m=?fKeesm+dxMV5^f`Kc&H(%6fN zSu1Avskoe?UJ6a!fMy%qc*R?>lLt?qBA$7-3#lpwGo6K_LyCvmmqn)yqdE?PyC5Db zNg>;|dNZJ3Q}J!R`L=IPg48PDGJ}6WVzYvXJasd1PLz z$b7|Cj#7|epZv+u^S64{G&-o1aSGLKyLrO`Q_%YGEdfx2pRXvTGTZmwexpgmTMy-& zc#DVIMk*YzmcPYDc|Es-XQEOH?EUt(Cx(#e*f2-zYN9KAd3=PTjdRP~Ye)MsVf?5? z?5$isj)ma*;0u;(m!p%fAMQT%Yui88-fY9K{Dv(8uR@kEr{Ao8)VN zGZC#Te!#*K>#G-{Oo{7D3!kjvM3y`eZcxzuG;U4z14;S}5DsD#bWUV`yc^W~7&bMZVuvT2_H#_a1SsQ?3$eV?t=yzGzT`6;v;O9kybRFkj zDdWrCn)}*I>9Xb|MTEbpH1i>ToNI+o*ykM>1Y>~?ir5diIyxfX%074mMB~D?gv^X6GNoT`G z?vjlN-yyMd-Y9t|-H;42?(pvUfv;ftArr{-_V9@(Jf;jBD`<-7`E&LG9J%l_sVs85 zA=e;IcP=j}VXvhI`uqP*`k&&rw!-M2|7&T>MJgMGSH&s&4yYA_uH?lsM{#p&dX{-X zssacu>L2p^PI#HIZzgzc6_6BlGz--rg;jiQ>L$bsr#7Ux+Sa%5xTw|uq?Z^en^fXV zM{F7f}j`q?Gt4bitsb@P2$y6ySAD>5nij)Xc^_S~g}S zT9=$FpYdfIq#yOqMCW#ULI+V#ZGs=%tE(ce+2*>qxi0>J@_9{M16pLhGzp6NZay)w zCCF81iZxON$|8BQ>+-DTqV(k&kJgfiA|Jq6fesG>H=?zxM12=mzDyVfwhLlt-Nzbj z^ExJ27lKQd{g(;b(69{++t9Etf`%=;t;jBY@A&c{jyW~Te2d6Qa`<^%Ra{iByO8Rw zBjWzY)(jtnCk+wZRBLC%|R11wR_T^5C>_ z@ql7J_Pr>~*p|*5p#vQFfBy6T_P;ww4rt)a_AS}|@Bgwug^H~kvh_dz*CJsmHgBuW z|GR@$!P(_Me*UMwF3>9d06K+zT7v7dw_eK@Roy=5S|t9wKE=HT$*gjL5Hyj9A=x@^$rF;)%}yP(aE843SlFDM!9~>@@{0*R zUn)ixtq}?Mhj~!IYm&f8;lx>C2KJ)_-*s=G?{X?w6n^18V6|K0 z-M}p^+=E9?IRCs&rVX2o8Im-s)KaYbtFOF%E#S1>ux+^eXU|hE? zO$$TIS!H*rnlmps9fS>Zb=do`3vxtRAQsW3t%!AaQQ`avuc$b zg_C#doJOHi$wHrDYagsyB0>NveqpXg{*?|uNx?NcxCOd9r8BgVw#Gj+508&eo^la- zBXQj#FJ6fcuOM-$?cGRS8>wp}b*&*AKps z?8UHf8v*bZMS_*YffWQmzOfszZzJ|?#J*L;z5;{LL_eo5oN_Vx_Vo0nN1s5m;ukkp zPGKWOe%?~#Mqn&hOYLJQg~r?Q#zfD!*QVPd`cI04fv|``drvw4fDGtj5i-68$(W6T zXY%ys*~~}))-vtFh`-FDb9NEp$Fevm6$Zs>psJg_gGQEN1US{?p(Ibl$l&G89f39b%DO<;Ms-?+9) zAPD7qx+`%)!THb^Uq6&P8$9&A5#LrJUs+2JEso$yqoS5gi#OKTw&?erxj(>@A#4&(lfiBn!}&0L9sCGAclXPnQ5Dn_a@4qzoDj z9)1_PfUM3}Zg_wnCTvozCBI9&gO(1d11UKD3?v=jOR{Xnccg;I{b4@AO2MbDv(gU7|TO& zNNk8NO*QxwZN7ORjjHV^^p_l2>}Dw-U60>55YB#NOO5)U+V|?Y_(d*?S_FqQDdpO1 zPqH1*>S{A~%8DQ^YE6`E=pe_ZTDQO`TLxWz032KjWylp2Yk_ z22%L`LH4kUSZ{YGc-N^|K*gZclIM_>$)mO$I-hmua-tF@vCO^PC&5<8C}5YMy_BoH2FTUM(t)a40%|j5sfo}<0(!E0q3%_?A;<(MBhb5SuTiV_gIbGY z=pJ9+QF;aKk+QE$FUx6U1e8x{y$jkbf$HV7K|~-CSEdz3RMXtp-_dU_`P{Tee;iDmQX^AKUCiX z1Q#j4c_*@9s&{bYVK{Y0$L)eaxfQ+pG0R}Ss3puV<{&NcD?G}%7^WL@F&su82RkvN^0bc}BO@Y}UK15wJlt3|jqm zFX(mZanKqL``uyGjUu*6MLx@VXsOwCw*q)0W(M}ABzwjFY?e$w4K58p7qihcIYI4s z{_xLcsW3!5#6I|`0Xve&+2Fr69WeOK;4Q2=U8oM;^P4YFJq?gdls`q+2aOV--$R+H zRCrwA|K&ui8W8{#!4ArMW%fH_!;nwwwTO2AMmOp;JMCK78uV7!VSY&1i=p93QZT{bG>q$I~ZHGemqJO!Bd(7H)kb2E`5xq53-)?^yZT0WV;$LqAmfM7z z+X$m)&ZHtv>aIP2_wBcjE-t*{IL4+IM)TcxK%csNr?$*S@bCWM27!GY{Lp)-h9mUF zP2q{r`+9N3J=DtRVt;P<4$5!LPlRh%@ul;H^I^_x&`p&b?zSXn@ioZdIl}aoZ)M#t zPA&hn&ZPnGDM&$fe}IKgITQ1K3yyi7;$_QrE<3b6&D20*Ix4YRQ7pY(5wsUZ{SF&6 zgMPg?2wGvY6AYrL6~x1KE$$6low~?Px||5AQcY=9(ID}bdM+D(;E2l)(mR~({6J{lr#8y!mPix-+w3AH0({HL>QDhg;^FmD3Q zL=RtI@so^4)yD>a-W;y+Lw@L))JCy**E>z+U)T;H_PyvlO*7{GF0bh^P1CaxgH&+S z^a43#erjINsYz$+CHmGv7FJR}%}x+>rJiWE>b>4D90uL6)(Bdi zemCe3IQeLV!?54$gu|#d#BU=u8hx+a;tW?h=$7vG_)cj;)XS%ed_1F?HIN;eWdu|< z8)zRNDcu~tyyREHQ$l?{4{Kh~H9krru?S5y+}NP+uiywY=o_#KCH8#)e0LN_^=j4 z(QweL5BlL?uukBMRHUd=vF8y%lZ6v$boeI3{aVm(v^m#}no$t;n%#gkBNoN2UVqSt z*Eo?=rTkqq0o8Kh6xg8A>-C~A=nlh9&|XwS%4CI95BX3@N_JUC?Gs|<8*4gjAj5Vu+}G-6Fi&h zlgNl2M=)%ZUR)$oyeNJMIVk)l3b#?Pw}faT@uY1G(({3Xoz6~x6{fLD`dX}O$$%O!YZ;{4El!``Q( z_s}RAM~v!oB@;fy2|qm{Nvx%AIaI6Olz1B z*Fp_l2I9@-Ch-r@ausUOr+hhK(Ex&7@0iaGZaJ{^_TF;HuV6qa2!-f=%XcW`{~xE` zcgJ!kM$7;oc9@0Hx!Iu)Ky!FTBfdC%IoLsX8h>obw7EuQhqKbPpp3Emzeuxx2@ z%J&0sjvo=cqH7BUuECQlj`!ia68Vy&pUmcqm3kRIaYU$9JqP=ZPLmV zG*45w81h}wKgBuo^|A1mkIlx}Y{JYsifZ3ak;XwK68e&Cp|Llf$z|p<%3wB_JRHu! zs3MwX$BZ^-z!WnC=9Tf@MGS*J@Xn6+KmYmf{);`&th^fmsf>pZ?RR!;l4j5} zMcGgQG#-8BS=UVCXj2M#LQX}EGvEeLS0=sGAkiE}#I^!j0J_Wd1dPTpe9j|cPN01V zy?{xDW0EakGksCh!3XvR0z4fo6d++sLwVeH?TI+Ajfw@0O3jyE?RGmjLrYji}<(JcB~;)4vGu8}*6yMqrE5%Tfy^$03=@DX2aRAbNypLDDk>b200jF)Zw$?W z_mZ=e#9l{O_A*t&;^h{UO&dgIVXOtVi*pm!pjObmIIErR~O*mC*tT{ zT=J6(@n2VYFBee3gVHg;Ql@;5KL{dJ+^Za*S2HN9Y>)Ugzmdm>>E+dF3TB~k4F7$_ z;)GvIz~4x8^S^Q&8gt47o#2kE2Yib!6J{fxnlvz|OCTOcLU6=U4bErjhNXVtnAFC% z76mN}f#%5+^YeZR+Qu7H!4z|GS%^FoMY9#+Yg&Zml{gBul_RPY57dQOCwBb)&hbmi z`o^uBgGH40VP+!0u3O_@w_Fhyz?hNE(lAP>B@ipFd_xbv%k?`3r+*?A4;-~QT^`Jm zk(6t}y21Fp5!F?oh2wPV*P(YlVMBD|^Q4D(oJQGhZZ`tQa3%oR8?z6=kY5S;smk`S z_keoO0uEasv>^dlYqLKB9=8vl(z*rUR*oZ0bLYXggHbqs2fzJB&Gu`AniyX8>%H(d z1zIH+E6H$*Q;{;o8*+&k1q(Qaf=ph{23$t=C=?D--=rDDI7@vDFzx&y-nPQ=45NK# zmoauUpxv0V@Iu+ZNq51QgYU)O$#=*lr7lSBh^hFz?Gix>AL*L?J)zJc;J|vT1MzJ; z{EjcdJ~~eTsRZw9Z|mhGjc3sm;CMvNfIeR=_3KIgD{lDn!NF)`JUaaD`9M8*7XE2E z(fSeJXx*7lwtqYatddAQ2|w%-3V^61ri!>d9W%1>5__z$dn!c~5E&M6>_T(`#sA_rMGSON@k0YqEt<}RD85c3kN;#BA6Aw zO2#XEg5v>pL0R&-;115>udnFk+pOSitBnFe zMi~U~PJOF+Tk7e_B=yo#ky*1->B#cqDEs8RdYX)*shEaueCZbtv<;j!FSQuX3|sWp zUJGpyk19@kTh{($An;`P+_%;@B;n%-`_9ru;Es{Nchj&uY@k|)U6fOf6s|-se9(;p+f5&^nujv`zMEvVH za(xg8IoAV2z!jTHX#)c|0AL&9liPq8MlnD>Sp{Sxb6XkC=6-afd&weQ>RFh!t(col z=`{|&3pkJ?KH(8{R-WN)jqXqWDhbz?%6cVOtP1f#(Xi-gXw(e;v=P$2Kq2kRkqJI~ z@$7blnqn6gH@^w##AcP=e15i99A!hS3VYj4^ zo39aHLG{KAB|B7B=JTJhOxa{ajy2GG12tx`E2EjW#Xf>&mCHe4tUk$R(K*=WzG2h7 zQ2+gaCiQ;XmVt+4XE$ zRhPZewvwwN_^Uuqi64SBOoCGL73?VXTr{;E*!84)jmox1?*s3<+#6=V&cpXfnj61< zI0q*suy3JdR+v-d+gA*;<=LnN4m`PacMBD|v+3mw^!Kw-tRSIG8)@#BgEmj;wxt=; zxAh7A{FndwZ~yW)xdWML3wSL34>)PG7bqb=CVqL;%w*;#kRB@m^Qg!tNR~|a3f+tN z9*t(P`%@#8ll&Z2rfA{b@wP_7)QFqUrl=T&bDe0GD^o}BpcqrBroRW8 z&wMS48qadN^(_;gBWQNYgn(W)XWPu3kBJ0NbCeKfQB>lOQ!m102Wy)^M!BoI-T`kI5>F9muPD_q24&ABpcl$v0jOJW@0#jppvTW8_EGq-Y)q-_AOU< zUfXSLfgxQXAtardQ{)>cUUM25PPS}>m0_jS7bl+CTX4RPayl=YRTZ??|vX-}@F^(q1LmyS&BE|M*wlW9ccf z0P_yc80ul>->ICRRP8sL4MfMz7Jjc{M~nKY`QWwtF&&n?_aHe&#j$Xkrr_`G?hG?@ z)MQx?Ty(xG&r_{G;87E#e|#%(bKE`oi^ux)e$yQ5Km8vdA>rO&*5mYpCnWh~D7@zu z4XStdkAF3%>HHTj zyFEHO4H!1BK!1vyuPPqdY;CzwN)W}KA>Hw!3M5rTQBXZP<$K~3{0 z*!-G%<+8%#!xPA$q;EH+RGQnfLfCv!N-Zibmh3!J<{-k05 zk1yB|BG6e%N9Hk`!m--*4l)EJ$&^N9pprIV1d>n=tFS4bd=@!%=f@amoD35+a$_3$ zUl_pjy_VXoogJJFBqG?^@lKzfa44e56`nh(nwyB^CjbpP6xZvuT@Mu#Og59cD>n<6DxE_xW^+-%+uX&=Vmpp{UN1gQpFvL5e=T3~`A=cbLysgT(VLAbkh# z&jx?Mh7cdDLpDA$_H~}tRopfaxda;Jp~B+gF+GR;9v{wArI-t&sqps97~vU&Zl#=_ zi-AuVVY#(l{8MeR7>qUb!2dHpF~uE2#E~bPl#E&kmoZauWc3IyvAfbOL}8G3JW(-7k(V67l`i~{tT_gyNQ<*Wbd&MZ z1CF9bY>ghM{fdR?qAjCm=%>qOGG);@r#qI_WRwgh;pA#B4Ez0Vz1Q1%k5-Sf-FmCO zy&GniA4!GbHhV}74M1S+E~tq4A~aQ?NGmsnc-Mon-O8ct)CkHsKyuui1~1b~$za_^ znPb3P2q9L+m>dCA=%dKgJdzZOPcX+Sb>PIkOTMv&_X1%PKY8_i-SdK%;)p%X)kys9 zfa6-;0e=vVybp}M%g~*j6Rr?sz~2)pjWlzE_(onIWkPL^ApBndCPEXKOatc6z2Qi> z9{D@G)14e`LH`b0su69B@^|o+`(p9HX(EGPn~(Q$dQokiQPRI(T2bkXhui&}d?pur zY3xGFqN|3d`D!ew{pTkJ$b;CbjH1l$;d<$6bbVcL>7rC5kwo=eUbBs(K-1_&>Z0>y zui_fxOHma+aKqq>06oWRdT~PLD2#a`k>1^Og1(K^+SusL#+n=ZHR|}i&vkFNsa&6g z)%tUtWJ2_jU#oZ*ZmWuFvcK=uJz*UA&wroGkOlL};(i*U8`8#W&d4X4=EZ=Y_Ezmx5L39@{P&Apfd(QhkLnzBUb?hSSfL zUswWP0_q!3_{B|^!<+u%xaXnBxVl)=H&s4roCeua_aj|nf!YU5+MtvcuW!`{a0OkV z+J=H+uv=>svhI_wA z$CgCrs4l`>QAO>VcYBI8bOOb&{*jr6@8*tuSjPGxksW(sy2NE zK6|~|b%5+O+KuJaYIMPyr&klmwTgBPI?wSbKWq;DnhwX^DcHU#K=S2k*I=G^q*v3I z_#WyL)^TIrDApF}Uy$+{-F#-+7h|V4J8SLiMzvOvP;69d8`auk&DTb?<}asOb6n`X zFI%~G&y--gjCUO^*cv_F3zKhO}%&n1y}0ID^r_Jb;#JZ~`KzTH%+;zZiMU7$<|B&2a3U*VM|8FQHc zLoIc{^K9{4j7WjLRtf7XUpSHF9j|W55X(HEu0ji_))S)okmv5ofaoH;(x8Ibrentf zW(yLK3Jr@Zt06=`3N1+4eh$;wIF>$xR=I8$EJFJNZXT5478B#Zo<&+Rc5wo-T#&5Lj;K=u2)n&}H zL{6EMT}ND@RGy}n0jAnknI4^&JVE1Mav&&I>1rmRt0Uq!kxllijSYS3k7gfN@v_%S1Xzk^l8wjsD zFZhbx7qy3=L`{(Ng(G3hrJjUl5lhxkAkCW(}U4+IL z_<!{h>LgE2tH-Q@*0Rm?E`A|ysbH1>FuSS*1!NwLPAoNiF|JG7X*#s)8z)(_UBE`^?^0X z$M_!>=hIv`PxBM!OoM}LwJAFLoY;SM zfEcDDtWslCF$)F11Hp+i_Q2x{7G7MApvc^>2NR)72#h+4PiA~D!b=d)?FN7=xs%Ee z#bgflzzIYA#GHN;%wt|?jJO=6Br_9`8*gA9wll9}!oBvgHS zb(V0JY+X*UlO=k|RlZ}WLmV9B-d{olSphW8IU;Z}y|RE?B(Tn1okbrPfdP4~e5L&A z)A#31YN0_N0JE(6G&B$aoEksWl|MVa;3S)q7G*t#uN`c>?}R_yU+|R>n5)SXnpH{_#?y)85X&{mY$mV1J~%`e1RuUF zVWgN4c$!Ec;5W;l2y;5r$)|11gel<1x*f9)gc%&B=6*^$_qMR~Z|w~$_TNwsjL3q^ zkoPpDRS9QPp_`_1P*1QqwVRDe_UiJtsop`ZF^f4Zz6eJ+^hNkFxtLu%nNUX8qvR|B z@##?`e|N%x1=`J7t$N)gV`@Q4@=5GEgxl{V37;fv6q{?Qq%!%gZklB|zY*5h8x%cq zeAW)3XHW(2Rl2gAqFFIf{2;ISSZTWoHBga^P#IL|c8sD3KW0>HI~NnkarN;JC%f0Q zVD9W_b2p~GvqK>X>Ktp5R3;(bqWsVb?rn6uHDNa$)^o@O8={{-|EK>#0T?(^B8u8x zrXSd3$mJ)~gIv$x8gY>fT3qETyX%qhPTzqx+I|!q9vrB$O9nGM7aA@ZAKbg$<(();P;QQly&yJq$?(T}T&*tGU))3CH zr=o9SS8h6qVU(DtD3D+Tic0H?I7Lknn{)nDD43ga95#IZB?3=XAG`TQ5l_!un+F?z zI9GwCg~FnAx18iX=TfkoxSd~RgxaVu;#?(CLAbM&Q2KkJ(!xA-^Lv7pLZw`rFE~5C zXy6y3WKt%JAyxjI%1in119`Rj>uEB6$71!&p6MaxW>Y0$e*p2~1c>(&xqH`Lc=wdUn|X{uhHU43)#v=j%*zHh1T zPuOUM?0N5dQjtKR|3M@hrrKWToLHT> zj!E^e9fzdS>gP;LqroU0%_U?miY3Ap=2~9d4)OWWF!GU-_ym`7o++UyhvqT$J(gT6f5AoEX`U zf1un-R*}W}t6Nh+EpHDqwIA2d+PX-gaVuICq2~kuzQPdA)z_9YYscD*MS$V~y{1osMyXUq+EraB!C2V67&l zC<6uA7?Xug;F=;X?x*0Zj#u|g#@o|9zhwROG#qi7dxYl$gYE+id@>J#gusLPKi5(8 zh?NS+SQ*d;tVPS?#0Fc#GcSRw&;bp-t90f;QuA~YP7;|9!BW-ufG}ASi<~FJ6wrbn z0F{j)LgEbgM#TYWLtI)P`Gu}>q1NgUgY_*OF+Qyipw7!%P(8A|6jvC>rklQqmQb1> z^p}Tq3qjjAL0|ABr8Eu6g`@;Iv3-4~x*gg?Ad`0#_kPX?~otc+Vwh0*#H+#>9DJ*a`@#fSMh*|ujw^}3Wu~kccbX3 z;tq+uJA5G_V8&H-dTq)h+A`tcGp?jH(sVy#<%#58ck-~-mcEK+sG4F(PY*$wpuCzhAb_U+NG&Ib)X|zG|`}rE8TTu|n(pRsC(YC^w z-ROr_*AHcjytk|9hpIc!-(iTrMv1kIifN<7y5{A4qr|G9JaFL6Mv1jiVqqs6CDulX zb+<~aji1m)i8ZH#8&F~yI;30CUU7tD$$O4Odnf$7A7q}&fZ<{G00_(GcjIsnW@5LN z)N8Sfp~fJ;FlRCWpzPPfEP#goU}r}F28CqGA$pj3=>U$iJ2B+Wj^3wAWf+k*2eeCS zoP%s<$4*@k7RT|SHb%rd;dnts1Kua>Lx~fSP|9IKNj_!S*+NCh{OS>dLA}xJb^EG% zL~n8N2&Ej+Ry7a3cUO{FtROi`^AbW>U&RRKS6CzC(8flw6H&z`vp@Acrqwb*jfquF zh40Fyc}V1z&_3 zNTI0E7mDvy$q=lAM7=59CuaKOdjxf$IK0VFAI0N)z$Ww^e|)hb?t5!Nez{{C%wG}n z?~UdU4#Zt){Rpv-#2zd5fkNs1QU%V&fH>Eh9xe4foLh;?(fjpp@Ux#DKAud{$-_qv zAA<)bwRni2$R3u-ERknLqnr|W2U6|D8d^EO<{}FGP*1$?#tBD9NRE>y2NB|!_3An~ zDpb5OI-(W?KTSZRL2gU@Uw5X8L;RbB@iiu^$Z??9bHo1<(^TjSS(2$D!u#(JNj#<1 zYg?&%6_#Pr)>GQo4b9%r?3<_AW-`nhB-=+{mk@1wu{_Bxl4g0KuxT_WUg-qCxtvWd zWm1_9;Wh}jM1;2_g4&&LX!j!8eX4fVq1)o;5sFK}2aPsgqz!Rjf8OOKD5TKa=gEGn zNwwDJaxsO;!+szTehNV)_~l0luivpuv`}_;FlVZc-^t_2;Ow0Ub=PpHV0Y_(|og6H*6i zu9vSLEHGp&F^wwxpp4LdGfCny?l8Yx*j@04dn+Apn1jX~j6uq{1AT9`U6wNl5ql-J z0N-wS!Wwx35y;Cl<7DjXaAHmY=`7Sc#rD8J?wo_%Dd}Hht#OE^ad8Cu$TQZ_QO`~u`^@NmbH8xq+R-Sv0tNL_kUK4rVZ96mkIdY6G z+_}N##X^oi8J6HN&6i}FlAU2CIB@94FNMW0<^4~f7nV&kAIc^&Ps0Ymos9(&4}W1=MfH$&gQpfxa7L z9loT#N|(R8yX%f2sau&O%Qx!Up`(-8+`CU2_;Rh+- zE%Z8A5*^TFJRxT_UU3{NxvJ{-A|(ST7*geI%-WOEjIrxInN0vg;S=99V&)q#BUK!qyLJ)~ zImJrwZKPF?cfA9ZzSSEg@0j=W;N=Nl5!qEna9*H4mbTg^d=dy_aVw&W467NXXJksA zixS_m34x)-ZB@ht4Du*+FZN00F)==cGNMUd;1j$I1`z55XGr=o2C{motgS{5)i9^U z%4*bNezG7zvQF&8yO~iRy7F1u+1d4uhrm`7BOUUUcEk#%crk4Z{fR{-I^IrB4SSS0 zuK|gULXa{j_uC+{n#sbiiCRlUFxZ(9?|lOGIMVmH4EYICT${M%U0L9f;n5x!&G753 z&KVDf!$BCff_AUh3tIK45e#b0eh`PlL8o4?H9ED3;H@%BJ_GWJAVw~T{hEtNu3SBG zT~#8>s!)ES-tWA6WVb4_-Pt)!FTHwA9vb5C$enWWLQs0=u@|I)OBZgo-&~7Pa}824ajV?zo&Dh0Z+hFAqYxUka46D72?oWBM2S zUd?P-Qn2qC;>ybqFl=sFKtV!2RoCDM1qvrkd}e0?L#C7D;w^u?^~Voii+`^B#KU=B z^IDIEQg7OP<|=FQc6JXh(6{h##08uAU1$xhUD3NRg9*RYbz6^^fF=B(lOW*wdEvW(y zM@jU~6O|$g%t?xPWUx`Bv`}RXg+5zSR#H&&qdit^;$RxkwU_koUauB&JU=v(F$9z>()y7EAyRs!x@Z6 zjTk3T>YC5WWx&>-{b|ZM>APec?@xfjLe(&Di;mMaXbWB6yK%{;^tz2(oPSihhaA{(GS|D>ZZ9Zx&N@5LJt3aEW=ezgB_tmw0S0B;VI3 z$jcFv`%Hru5fg$L!ll6rrqhz`$>@%Ml%IgZM50yb*xAv+ zQsyBXhz`mnYCj-!e42W*G4BSOlV=S1Wzpd93C;_wsS|$S<9ra^xdldH0~{p;?8_9& zY9Qx@U&RX3cvAl*d~v)BbW#*{Z{>5dD^ARPvJbyx6CqfvEna)0W4tLAwgwIcI!5ab zxVn;YSys3rBU_e_t&Q;tra$jvY_e8uq#QfUrccq$X#V)J*@@E^9A3Zt0KUeHyP59Ut{k#BzZ=bB za9Gn@;e?OB6fH zVvuY@#PZQo_TG@I6RrWdH7^Q-nh(N4xh0pW7JABWWScKqw$X3rU$$to4gur(;*rq< zCZjb0+c&MJDp9CM+*M@?)kg4LJ-{_*2K3U=31`ucPRuq|c2m7+A@67qeh9C;vhCj6 zE0s}vPtc?Ni|`$Lo3ZJZzJsO+v$DLSM0Y7V;CEikvS?|c0i*?q^_tH%f^>E7MS^df z!a&{0-sc#bmkFP%EDyMa41&S|^34ee`ov)r@?knnFOgur)?A|(vUzI_b1tvH(B@rH zI>=lf<;$Npe?IW?FW!7A5exD!mzD_1)n;G8KR!D6X+!A^vc5re6%p!`Of#tu(v?MD z=aqc1atDT6rQ^WXYk82mQP&b_ef<1Sf9*XIK?m7X1fJwkTv$;AwOjnn8Gj%ukZ6su zdI%&Lo>1IQy;t+%@G5hUqC#}A2S}i34TjJ2Kpr+VdvA8y)O!^tw)I9L)cdSc>%{$_ zJ8ZI`6*q=K*sQmLUcV8C?QWg5Yaw<}X%q#zlwy4acEjJ8K$a4Yt}kk=C|=!!2}B}7 zrHGR?vPnER0@Z76Hf#;+QP7Hpt)Nxw41@k~&kNWkBWA&H zSc^M+&zt?hV3nxA>e@=oekMkme=y3ILIG%9pZul44D(5%!$zgylz9uZ7^&FzXW z$DHZpUDa#UmpV225orv&VW-|42EA^pAGBIgKN$1|Ea*! z)+v#%P@m2v!RbvN7U#lU@34Fxc-sFG@D#3DcNVc(-xzRLk-%?F0AGXr?J(fZm2J)J zsXx(e1_3uaSzT3H5^6%-PScpL9#p4v^64$ zE`~?9rb=+s^J=gdT{u9gdT(0s*0b!TXKlB%FT-9gdr6YvmNp<2>r&cmz=OhDT~qCB zKpQ5ja4qZuspIoKs$ybUMn&TYNF@tz0x+} z8_iqO?aOFMzXv3QEaL>QJfN#2#8bWxzHO%{N8UHD zA@wd&G;5&KFBDoU0tmIWRK<13>lk7ICo!YqT;79cwmEHV1am~vL_b}{ zv_>qPjIB~yO!TdO2^zI}Gl<#cD7}K4M4*)!3otJr8%HcKn}cICGO($$J>jxr5=+*!FDmz7ByWneVrx0Qkt+`KekhL2z~%W;H?)A7%}Y+6liAN= z!ZM@z_G-F8jy3manv1l2IQd_I_RYd}hd=$ZE6u}<-to-u>1x{K5<{5^vr4SXr6g1ky= ze}c{pSjhqX{M=q;rOdVftS>re#7%3%WRW>5SPc~Wp2XwHZp#bAh}VW_vgvL=pL{# z8*|*n1S2Y!`*VR#ZD}UA)bzZP^Z*Qg6b}Zv+v=QG6_ukFDx5_lXgnKW?cJU=dX_*=2$nfcrSu80? zbOkkvD@h0|jp<`IBp`j@%+?_!#o#EYFOz{2t4kfl%d>;vEtV7J^mqTR(Th#1)mYf+ z$q}1|$!Hln!S5u@HTXE6*_tQ5@I!a>w@c^QQRuDv|t~~#67^TN?6U5 z5&YQTarxn;2Xz&1-QPl3N2y@nD9-mw4dgHBgYolU{_DT}%inmfWOcTXZhxBbF_6h$ zN=KDONwlL6pdK72O6mJNHyV&GKri@MOhJw?)e43gp4*mVi=#P*Ik`*#a~HRLIU9_U z$a}&e;Fp%g?dg7EHgvW7K4BjMtoOFC>0`e96U-SWV~@QpNOK3LSSYh5DL<~{l)mli zLiohX&mW;BopdRX6_38u_l|xpZ3!RDlF>9s#=#^Vv4D1LIeRylU(r$HYtfYlU5U*{ z^R_yIh=zBTyv`jLD$4SxSYAJ+z&mx(9#XcHi1yBk@wT)kNIZBj&c^pb zhW6KQ^01xdm$!2iccsuz!(V9f5Jg?eO$kZ_km-;?2C&3^ajr=K28wy3VuCL4Luwr_ zCOr^ThOj)Nb4eP%bd?jMXBa{}gxFx;DTk~#Ys#QC=!Tsz4w}7s7_@qEC+PQ^yQaQd(xB6H;#Q3*96c%%%*BuVmg; zI@8OqVDd?9$U8BT%o~wjUshVn#@hU~m1y<&@yQo*Ey`)0l%VH}d{u8qZUvi`8{ilF z-XAaS=yi#y24VLA@s@*DzlP~kzy1Zp=x60*Ek-Yub2J!VEt%%U`1Ts9UW|U0%1q(O z8?AZ7j&Amd0ZEDZ9}CXY!>{YjhfANK<&bizBP8>@*4B%@f9_qp4@kpRdTuk>v}BS( z!fZxLLKX!BaDi>VcpB<<7W+Bt)Xo0%b$Ce-jWN~zAgsH zW*LL}3e||mPx$etoKRHHFzCv7Sc@xV7QD$UhZR9sl-yA2W2@mJ)jL~ov~#mMwbUF} zmp}rE?l+w%upp3FS>#-0ZAzNV%|_=gj{`qtLOKsK(k+P$OJ)r8%#?vTMi4O0q=9;! zJ(-FwU(;Jn8~FKcmz_V5(g$`brVsS2{DJNrE6E^Ox^H$4K{tQGB2n|!-WcGzC8DU0 zxfP9K)G@G72=cY&urkLNz38w4Ih@E9V#21g$(S?JF?hhk z?#m=rx8;kz=J~6*zsOg=@Bz&H+I784fjo{YLg;J=YV1Y19+kVy z%VezKitP_0?lma1WZ(!-*s+2`JxM`<*Dm$F5nAR_=kvSq!N-?tceH;z&Sn!)5}cpC zjI@8MhB`+AFO)fFM4@zNio{)D8{Vt04-Qc~&qh#8lya`IkD&jb2!oZLer#7lffynx zopa(~>)ufX9_BX*{_U=70xDl0fPI#{XXCtZl|KGh#+PtV*+&-52-1WLk74#M2Meb3 zr?YH|&ho&}Oc-Dh#{8x=VpvZ;#=^9q^~c;V z854^O?Ly;z=uP-Kk7!DKQYBgNwUl`Z@MkHfPr@b=yeS08d7h({Bf2VY_3`6J?_0;I_O>9HD;)Df zavshoTjGdszc%ZG(TGkx?G~X5E-sP@2*JoCIRKJqd}!F$;LO-57U@m?5fD>}jeINl z{}4dTpUGJIC2=iKS>%VTn-;y=_gdCNfD<+Ul{tiiMScvZNyE^w@;`9slNM| zb2PaCIW`Nxhz_bqPyr1ub|5Z@k57mU|SvAg-qJ-}1o=g$`~#c7fL0 z(od6udST_8L!it_IF6X}wVP?mw+^N$Uzx0ati7fWg)2#kqT0oBI=FS_RZ2Fg=zIz7tdvq?(TUkm z*_)=ax!!On;?0V5m;e7Ty}T-D`wkQ(TsjEvONe0mG6*hMQmZ&rESXhkl`fqcmgQ^a z;X2>j7^68Pt%O{zk<#f=8N=qF-)zU-V9@OigH}Cm1pU?^3WmL?*X@P%W}{PE;m|0H z7e01HC3(Nm&s1qN#sy!vgxuEkwMYeJdx)LHY=l)OC-}@?ZYwsCPxmM2JKI)>dO$a@6@sM3ooU;SRG``@YOUghF@ycyT`Q@EnkE`x7xCsa<2VsiacM( zr?x^B?v!XgKFx|gnd;+Pb*24mHm9TlcU2eK3Kh7kY*4As>@7t_%&VuZx!4yycwHX2 zYS)!-Ek3@k53lHCt`o0lGslb9v+WC1CA_dYzOA_x>TH?b?JiA$i*wcc_oWQ@4SJv2 zKApE>6NGx%3MH0uA^q0!km5bb+YA?>r{O#DahjwfBbRsX4jGQGa<@!jX|ygz#w|kk z@G5vc9SE<~7l>`(fr$R8B6B)9J9-S=2_&H27W)W=m-+W;#^Cr&@!Ad`qI1B>(YI*n z-xk$sFIY(BZLe^OqEpM6i^i}VVdqUtxZ)mTDd>rG$OTW(6kXW(#Yp!~#A{b7y~F6{ zhJCAE75?Ei-I-^Vh?gyvzFn`0q|xaO;%2)ObmLk(Xw{=;(C>A+L9G^b!a=>?i`wDq z<@Hf(HIe9{!}sg#ajzdq?I)P7uRL}A;KV8-t^V&jwHL)W%S+YGZiu9s;)52M|i_Xa*_uXAh<5x-lKx zhUvia^t=_*!Tl9JH>QJ)>0r_AVPiVjm<~3kgWK7hjp<-xI{5re2X~a411<%NtQPL@ zpT=vYv0c()kSp)$#Znqxb%R_&%L|g{!I34~D&;na^#IbV+cRIBPQq~pXqNj!MY?o~ z&6hH3pr)S>CFOpofI1v9*!ql1tgb=GTT4L#YnhJeKIFUw)Nd=`>lKR_1m<&rea!b7 z^7fUi$F1B%1UL#BBuMw`N>b|GuRQnZ-b^gdjLSS2r{k-ObY}SW=b=o8XrJP|0{#me zc@3j%d%&sSNYAS)OeRVyFD!1o8Wpb@D5JXf4h!dKy_CBcnRJ;jj!qNOyy0&qJ-j;j zm>}Ll?C=aQ^^H6UubqVbEzSHb(LCPv%Ir{2j%2=BB1sZ&GRr6)2;@RZsXsZ(t2djk z4TWS$2j`O@9)$yf%d>UV)upD&F+m`%^0!8(tV z?7}9!BIhm_p!mi?%aqFjA*8)=VXeqcF!#z)q{=$C&@dUvJGEX!y#b{?!s%HC@FQkR zut!%UC9!*qvyInw#3d02xXb)1`U>-4U59ckFPoxHAFc)&M(pqG z6an7ZQ35IlQu{Texp*4cBd;5MKG_lz0{yqB2U!5aOYt@+##h6t60Vwx52! zV&vRI&OQRlBr}C>-}D#CL=|#y%o#wgIC7xL;54!es#`gmW{`jhzDu>_B)i@b4&|1yY@mz-WG&%lEDO!|Bv7p z?ZbzJIgr(=j|=HeXmtRcc&ZZ*JAq}jFc5QFX;V01gm9U_1&v4Q6b2VQ--mo%71;o% zIU>P^1#ZI5!U>{o{&mRN69_*MHGylnfsnhzKd zh)xTB+Tzoz?-%=;8G@5?G83QL%3RqaXmaH?Rr1>aefc5a-$#Leu~@!m@LjLds-b(A zzgBrl_k^jp`t=6uHG@tqtOu>IQ4hjqYY?<+wYb&kG{R1&vjWOKPmf>n)#QsCk;Inc z?z){_XfND8DW?w-?W880bzrsD| z03ZPp5J^e4l}2jDwMF3Y;NSrG;dk%{ecAz>C6#~Wpo18+rXdb4QR+%rg$3z(bRUz^t!6l6FDjXeMo}QW z3>T7{fkxge05^Ik(r5n6oc&}7jQN>sm>OgY`f*g}r#L|ir%&zVWiNS3MU}tN)3^FF zp>TRF6P_FtVyKH%zME-_SqDb98$H0nwbBagu?KXNa7!JmETd*er3!R1_&5IKBR8rl zC0~`D7R;*v0z$t}+XZwCGo@Rq)*4l`iT66kf&qJmW03vR`u`>3{zGunTRbPb;(YAV0^I{ zBx$Gx(6`Sb>ZD!m(JGPojx98wv+Z&zW;e*)!=;gV1tJZ^U!r7sv7hvRm`?Tzn@2wT zw>~ipFpsnd5DDT;L8RQCssPNgXE5aQ38FqmT*%A+*uM74R^N3o3w6Lvs$l*31yrtq zh?Hu94JXcf7&tuTIKHzB7y`7C8^Asd0I>bTXcTrT^e~tFhXuggYcqw}lYy>x_#zPOuTW*PzTW z<#!2@XXqcKXaVErf&eY{lbKnyFoi$E)COr!hcjU+ldSQWpC)^|CV9($?)b`E;w!m= zpDSzGdGw|8@S)Rbe&smb=JA&gkDCMcXwd8)9kq`ixerI3c4q|&XvbRqZduC>q8OEn zJoZK%w+lY#bdE;NrLGZLB`*?BVqF-?D~7cl6_F=)~M`O zj{9Ow?WECNQKL4_sU?nIL#8it1Y7Fc+3AN>m^zoCD|MHsffx&>F*BwB)CL`mH*tp7 z{?sE*)SvouA7%%5;VKg3Eav@Lx`a1hcyVYQ9ma=BNM2PXRrfD1`satQ{b&&%UO;Mi z;kX5#I+k4CjVi9W^^!ySbo%v5BuNP3n3kPl*&qY&33vi5EWbH;aDyjkK&LeE6rN8% z`QvOvb3|tlhXI};(!k3+!?+{BnYy-U$C+x zq=#Gp)W~Jf+POK)sz;m!@juAzz?cue$3Dg`*#tTS2S<6^Iy*+kQZh%x5-Uo=C4hGk3xb7(KiasQQhRO^4W?|qDZ<^5SH<8x}d}lgT zmi;xU#M!^AuJt=dat*T!1NzD;KWeASBEK!+YSP{wHO>DjL7=VYrEg*U%Eq##8WmD##LiBqed^Stg|+YlVePGs(?T&qKGsZ4&pyq}hgKIo>jdB9qpV;7Ao> zk`FRmlUNd6ZZR-4A4u6*8LVXihY10dqpiO9;tTd2*aCw`=Q0458AQZ$@i;$-EGNYd z4s!DOxjEQD$^aR{5TXbo4nqljB>)eXxdYh2^XFq82otXpw^GGg@GNE@(7p-g(!*U+ z8E!bR^dfLEnihG821G1UIT{AM6EI3V$DkXA#yqzr3&NZQjOB`q^pqY|qZaE2afk(S zIX&AzN-vyxGN&^H&!Wo9=G0-Gm&DLAp|i*vF9IhDZiMDPUxyqcK0}Py=i()v1Y=69 z-;Yh|^4Imv`wBD$b3-ugAG}Jy|CL{>g0t_EoOxW9+kJ7HiZ`Jb9C|KHn<@iLr3|T% ztnM2vfvEK+d2$o)cEG|IzpYvry^#nZCF*9o0JNx*dqU3Q?Y|$~Tmn+83`Ql>Ss9LI zGTHzsD?p^FmRd*5J1!0#MT{;IL4GBSzQ5raLx$3A!_g`QT1~6A#?8({O_9Sbs4ON8!&-eXT% zfDs6%kb?5CkvT5p4{-z^^6OkiUW6D*pfW#_tROT+F-0^N9F(>OU{Uy4(McrSNy~*nKvGc_hIZnNxIik5QVfu$m`eO_ z*=Z{j#f5(kzf=?kj`tai2&I6Lj4$*Ths6x(ID2{{25eQR)M6T(3gWQAFWQWG>o8eE zhrY6wmn`G=C?mW2{t|v2MmMyez66e255`4Q+f8B9ru-fe!BG=eVJ?9MT6>GPZ}3-Y z<(`IpZXs@qdj83-=YRdr|NZZOuB56a=D+{Fij4ZI zKuH#iu5aBYh}2l0ZCV9bl?oE_L+GGE$U!k3togAIzk0Sa(9SdKht?ZMCUSYup(9k1 zV@mFess-7c|eM z`DM2&CH+9L15)HcJiLbKC}os`;TYU&F`zLp5pmd0cXT(;L=`rFf+|EpBR(7i;Q$88 z7|e0VMN<9Z!xkUWKSJA>)*65O1Iv8m*in1TYA|FNlW@m6b1}`E4`5boa`FCN;zK`p zGRa>3tx*K%?v2Cf21Q5{)w1b6>R)`!2>LCXp2kCzm>8<{Ds}as1XuR)2yBy-=3LBE^@A%SwfAeP`Sze&-5 z^=^6vPW*%}G=Js?9=5_>|5xbY-d&37ZN(qPPnaUUN9>6#8`2f7=b~40QbQT%Q~F<} zUt&6_BDtBENF%UZ!0*}uz3`f1OM}Ho7Mc$?N+iOE$z8<&SBJp@H~4@~fj8#wYp{sR zR%4ZoG(R2b0E0X8C)igw@OF7AwOGi{4+B=kPrVq+JLVgDz&DIg!v6}Ncc z;Rt-gx?r4SmC){0Jnth8DKbTWXUqb!O1I!D-C>VbUlq{UC?! z`MmFB<`bF1Dg*Be!R)dn6?N+-6-5VUeFyK)&0U6~!X=(gVlk7_EiS8=X8N7d16Tyw zMxuAIP=t>_`MlY&grxDAthJCi?JY_Xp`6o*zOA5)IG@F)jiS#P>Ge(1;X0&1sZnOvolu$q~pQ>uqr|K+L0$j~5RIQ1P!^~PKl zi`lY`?&;;3J`sL*^1aPGil?87PSQ|x{FsW5pYlpIrB<(|vJsqwK|sB2N&S-E`Sz9U zFc)!hs%DIMUU#AO8(?~@ryJ{Vgv)Kl=wD2l;aMP8A^$b zm=R&4k|e>1N-yDvi6<_DyHZ5saM{uN<{Bae3DVve@nusc(KF7Sai;Oru6-9;Wm5w2 zpQMCUAbwVu7{9KB5tFGk7BQ*v)Dx`$H499uk0C61H!U+{9dTfou(MVOfhu3FJYcc@ z52@tMx!9o?$5-_=F{3E&ayXZ0SdxpkLaNWgGx_Khznbb}PVG&Uym5c8um)iYSKj&x zTzFf(iJX9cV!)eoUh$8}CY^fXe7SeBynN+)u61Z_LjrTwMPRNOl~_9I=$SEH5*jL^ z;NP?+Q1Y>d6mQExNI?*TKZ_5Mr*F28!G{mQ=s|dc>EufYvwxwFE^=T}+JUWGO`SG_ zbd@88upIi}SWBcCp2_-;^I)V5N0FQO_XCe_!<9ugjHSlmqpy@R8LIOorTnH|<9Io% zk)V92CKq1e8q%!V_!9wD2?{b6F1K~2d=W-E`R0C)#Dez=*cj*8IQ?a>&o0tcxVXwB zjAdLvzjX(f&)_sSJypQxd;cdgH!YHF8K+E{Aw+#CIKMwz1deq^$(LxLu}65=mMIA_ ztSHzB!QwRF;ls0-T0Gw3x?gACFlQX@AGIg-G|^dnnVf#m>oE!qCl7y&z35ehtE?~} z{x7!oH!t2(^J3YOT*d;Cw$CCD{y!a(+80+x?Q?tD3jp__%M*597}LdgLlI79Akp`s z!C@JnMMeBXm{Y-jESH(4e_C7z^T;2M!8Xc_<$2^mgN?4BN{lZMS+1_(E!Say;@d_= zXyXMr_y_PBRK+MS5{J%dP}?TpO&_c1dAbh z(Tm8RIMIy=h+6!~GJiB%2tUF~5)_Je8Ks-2&v$6QlW;P_D}pQ74!3qt_S-Sni!e5~ z?0dJ>ioSN~yLMAq#oW4DJj3(Fc4~LaPS)oOXt&ePP8=8>s5fV2g#a)qfHz;en@Mp-(y)L9r)N=qcG)Er-k*hRB; z(X49GtfH<_{qs`{E_8Rnh0S)h-Cb~@*yTzD7rMLP!mR`sy6XlP_(p6=3*znRDoxl= zS1|dXeXOCI!y&)dSVO*~l>he6?g7R>jB=}lCaBa>OV(o@_sQR<_$5@%6x`A0-?k^>>$zmb;oCNRXAW&Jys$|I zAFe>gb8m{XOi-SOHoEK}eQjM$4TI-oHow_dyDE`DZXe;sekuY+S6oHyEe(EQ6t}1_ zS5Mdt&24yofzBBxsV)*<6=@}tC;uc8!5~K^WKb>TPhN_Dgy1FEc6#70pfB4Ow_7o@ zE#=c?=G0B8rnUrzWFp*vy_j)z0&g@Av54&5b8r5WGap_DFh1<>Nxfd5UF_8{KKB5V zw)B$r*aKR6+Zux3OmQ4RL#J<&m4^+dMAhL3b+=cZo}#Gw@RO-R`bw=vUE-38RMKN{ zE+T(A^k=-p%CnGDfIps{DqqI^b3yuKQd5jh)F0S5QC8@vwvn6-o2EALXQd7E-15c^ z_~O(H<_;9AlqhrVvnj#=tU$xdn>op90p?*4PRIL+s5<+mr*tiJ%$%M=yi8A6K9bon zE>g_JF)hi|Fy;$za&w|x98>++NQ7M+QzY5NG4GJ`&vnx_$D+Jz1v9OJ??&4nXC`mq zpY>uDyFe@dlr-1&23l=!wSw)iaG#~^HXJt$l>-HqNx)I7ExZb=q%2T{;5Y^+15-Vvy6&eHIU8hrVNuD#6Ku!|dXaYJ6e0c*N0 z+gZDON9~fGw0RU{-nf}Z0Cr#2P7OFI*rQ?@4>cL;S|43NF{rz(;#k696^hecr#Kf* z6q}|IOUf~$EGyOr&%B9>SYPvMrq?vTXPY0buKCeAn%j?!sB$_*HIK<0JF%9}Y)1cT zev{FEEzjAE{?)uEqyHB8kNM=0lKLO7qkqA)%wC8J3tTJA?AB@vn=MPVHes8kX3C=e zsZJ-9_tZvy6wfafgTRlkPx)FOj`%y>W>;IrTubH*wG4bwz+n2d$}Y(>$V`Yy8~~b? z3G<&a`TCYglId&lup%$Rxrb z!oa}5!C;VlHmqNKL7oRM1H)lc1_p7UCXnXj4 zxHHI%SV*xP?Ha+I_<#OjPfTShoz&^@b*`NJAsPPN>hw3AKCLz9X{?07wO-4}Xsf4g zIHtLS8H&LRVJu99gByz#-5EDL5e^2yh@Y_u8Y7)f<*aUiCTZWucihC#IOWQUe$_MK zRz@})42`j{k&&4zR{oPrX3U!C)p?~I!$p9pNo)nYWQFXq*+u7c~jNs&F0)C!|C^yor;OC&(^IbYP zG9r;y*ij(~2{KILUM=|PT)++!zJkrNvx`(OQzos=LxK4PVAqapAz-;dOQZeZ9?OJr z9I%Q?LOn{$O5yt~+f;M1sof!-4G6@_U9fU@Y@El^F@Hci+a*NihLesDQj5o1D;-Qs zt=6v9yqZ7uNEf-TFwJ2p~^g_lYAueL+4G#9^?9jvL`!p6tt#H%T z`LI(F%~K6COIQ*h9Rtw(&Oj%XppIWaH)pZP1k92~D~7EN{JCJJKCNzbBAA}yIM8SH zF0Ld1R)3(~;wUBH@5tMCaFFB~lFCz%|H-pV8#hv7#?`2B2?K0ZD&klE(urSaZEmnD|ng-OB;l78bHB|j!0W)U!orPke$7eX{?u)?Jr;ne+m(7 zTSOi&GL00RII8ueKFZgX{|w%%cLx|V>DumS$AA9cL88HvYBPd4QfEgocYI)VZX#g^ zOE1qr;JmhnVopHJ-P}6B2FX|NY#}+@gSP>TBr@#uc>m;-jgJnlmqw(6+_uVuD|m^b za?SzIcrE*`_zg&5gSVz51 zKZqVSpM>Ef2rSSE6VUM;c{`=Rbrz0bVOadG1f#8SG^$n(SH0>*t_pW!M@!JG%{V}3 zl$EQG$Tg5+ubHhe1s%>cgCWSth(=DqC4bmXIPh)#@IF+T(h+Y}7X){X5L@p+9wB3J zBN(6mBFXH^N&0Ll*i3+xJMSjZK>=93p9LUUR;i*P-TTI-Ityv#M2V6!Tp@aSpx+vu zXB+Z!bc_3!5{xiKO5#i&PE`IZev}i}tfYcQNKaDWJh*Szv@(psHL+(m~R|5PgER&27WH3m^;&K(oDC-kGJ+~YzAjFbRD3B7@c z8*@V(^9~nhKbsNLGhGN^nW$@xk15AU+ruIkJTLR8ZrefbFE@eyHDtRAdX+L^co6cSTRP9wUkORh3BqQ z6+j|DguNpqtTRBsoZUE6G8_^Az!e-h9bm$%7xH?~o+zz3;bR>bGk+MQlqW;!PhBYOHoi;h+L&Z%gk1EIhl>d7xK~s&L$nrnQ*e z7&K8l7N^pYG}n$4o|J7wxwTAEz+-8wdp#8?WfhN6n2;g45v| zCEzQ*ThM%Pc}vZ@J3WS?v065uy{6O6>XR@A9#ESgsk9L7;3Z;YewksX zxySe6V>8g*?i_ZibGTafC!Py$Xubl}^I=P#RQlIO+EdZgjmfTp6aH-+?3LSj@$|52 z9%h+4*ct_mRIksDzZsLB1}J|OCkEyR85%`I@5WOhVgl&|Q|vSc{I4)+Q+fp>!MoE^ z!K_0@yDK&Z+XOcjIe4jyIR`-f67W5xc}3jAnSmj)lGFz=w_@!$rT{tW>{=+dG`tNT z?*sKO?ud;WVZRf=-d6>J91^v32#G8t(__r?9trSYwr+}ExI5_SwQGNX@29;6`~<-U z4*cdZ1Ek}&wh)C@$Gv$0V2Q(;;WF@u8lZ2I6Da8>G zGQ!dmcy!3X!Gh4F(ae8fm^4Vc6D)u5x(bonJV9YrzKB&QV=G1krad4D%nlxlx&?V#=?=aWL=G^}~o zEN^avVBHrzPxeib>OzW=T8y_vPy$1vutWw~b&8@e8}SrFCyyXaw9uH_5^5zfcAH_o zY#zsnOes1Xl9vGxmR@>Z@SxQjN*_s|AA0K2)^dF)fdMcSiE zjm3?!T_GeYn+$)psFJouF7Wv{M_JyBb!1y>uw|`pR7^ey>#rLQb4}Szv#lShL%6vt zuu*DjCivb}4an1MkbQ%`T8rf+xC2W`Q zuD+s@?1}wDYZ_Pz14J7AJ!NAU*JsEpsxK}wEk4RQ+N@qPt1{qw0=-FihwO&f1kJ_; zuA~&?-XWxZx>@mLj*qPPyP5pM7`4m6rAe;J4;llE-(=!0z52=YLzuH>O5|K=hiGY9t zOGEYO@QWk*gw#_LprepMRDnP z9|*l}R0{$>$&f`1x( zoM=n~Vm-0JeDSyjQ=RB>aHBAI_fsvVy^2gj{}(JKmNrv-<$*DW%tra_29!phoUSkk zOhCAiIu9ntA||AbM8hh|5|FDtGk$J(8Et5S)r_D9OQAqF>Yn30|6$qsC{nVddisJ5 z5&x-S--uPnsceDlHKX!YTiR3*bAMb}@u|3$J?$ql>;KWJrmZc z8#CEQEDO}y{J$>?#KK|C539o5*?~{jzJ7B$OrjrU{OSl@ks4Gx{n6j+4u9{k-(cUL zp#Fy}BOvW~&83>?OZ?(1vt04kH|`q|E1^GIL>%KSNBjy6{ETRnuk07KdUEKhjE}_P z#3f!6Dq|YnQ1<%qWqpjP;u8EjzJi{g1v>n6Pk$#QJY+WQc^>=DNH}KLnx~v>41NZA z=|%@$6n}7(e7@9rj||?!#D5b5IQnA81#GA;gZtj>B1GW_*P@&VJ@}+}p5jFd|8W)^ zGHlmRP~4QGhGID+GngN+=i3aZ3g8PuhD^j1|C`Gvx-XqU}xnUbhWNrep#=)c7>0w;VYGUXk5YTG@6aWAK2mqIpC9`Y|%lQs#mnB!gAixf94FCXM gHJ3#P0XGAelO>mb2LT%aq?elq0VD=+2LS*80J74R{{R30 delta 3385 zcmV-94aV|{kOak#1Q<|D0|XQR000O8LA4%NchIfADh&VtUo?>zDt`-D3iRSQxwZ(J zJLqiR)u?l4#J7ZY zL1x54isfk62=2sB2Y-8FDpTpCPKU2@<>b%F@E=yEf9UjStvOF)B@C|hN=8OoJ$1t| z%^l28bY2K!VIu6@Sgd%Ral;egpcC}?fKAXC>2xY*bptd>`$oR!CWgi-S61|^Hxq7U zWW&zT7z-O2nYm)+zsh9BtchNpRoXFpIh;v1&nLMR23B;aA%D~j?Zp2c97Cf_g&Kjf zK*-Udo@wjfy(`}h?P7M;S<2YWVg5gVm0iFpLeA!{di?qi>C?qn{E zU6f-k= zA!8B|7qK*g1K^w;dOiM>#=@u-?z#dXI}y=5)iAS!C4b>eW6-qU87QR^)bVq8%~>om z0kfphieW44eyWwyOVVU8Q=eA1IuT4yu^%Y38jC9lz!0dnI7^wb(<2Y?;3Ua3lFC%b z0P`%<#*LJiaWyJzVt}oRY?Z44;0?~d$KaqGtPX3C&W*5OleiL(V=_{%;Ati-Z4mlt zKm{*eM1R^k`vUdAhwSu?Ok=&YY<~eu_)~~r+amISk!hsh#8Ius^-;d697r&(-W`C< zq-(pQ9sA#dM1w2QW(0Gj&W>X4_`vGiM8Xc1UY>!#d2J8HoPe0SxpjaIlCR#`LUOhT zqXCN~GVJvA{_zPLA01pRjYtQ%ZIuaE@DfGkoPPtJ$!{E=*q51Jf?JvkrFtHA#o}p7 z9W7e&PMNa|5PE)w&u_FjpJ;tfEzhxKjOO8F#9rr0_<=a(=^;wX5;RCY(YXuY zTzZ!chd?_hy+V)ulWopYx`0h@(imL1lvqc-PCsy;HlKw4Gw`hN5+tK!voya33%S&p3&JJkeEhq#V0~x_jWX7 z3R>n`#h!N_)A>Lgzhvn(6vVJ%jDI9+DV1Uh&t0b~fJA@@drL@IXMlk@yK$yuI3oU; zD>!mGz=UUA56G@JkM35}0JeI=1$OVVqF;}_{2KWal04gW`VeDM@eWSD*Jov0EB<=W zp(~w8Xr2t?RJTCU)`v5%^Rv#2v(6R-f9OV|`fTg0(?9EwB<*iMZo$-V*Isan*p^1b zn?54cSnZO+P6g23mfi!%c6P1vK(88A;kX@5YcadgX`*;6PNXAguIwp1Dcgv2>khqL zvZp}hF5E`Exzs*Rp!c^B3eGo%=*&mWjZlKq;Tk32E52LslU@cH0?Ou-c?KR(oFJ*R z5baXRp5&7^Gza{z zFlkeI1wFyL(^A2#Lq@wRHU`@SHx@Y<)Ww_wpnd`Pp3=M`?%~Y95Lrp;gP2>fcI;Dt z9Cdajlv^6!hL3lF`tw_2<67A71hDs2fgp!OEgeE43(52tv%Cia{8z1;q5-!DJq^18 zfB1gdE5J_>Y~a9e9y4$%5V2Q2%Pg7!5rw@#c717bjr#1jco^TlrxPFotRTJ$iS1gC zgM(ufDx3pf4A~DF{4J6nJTPvsEabyAo8**d_^O7*atPUnw<0uHXj!6NK{H$O=2oaW zf+7ftB=bC_I08aOSbGAG4jDLD5Slcae;IU>25EPK3)8 zf48da*H8ZmV7P8%`19a~_NQAK+UGgp@f3JpP`e|ZTB@pFd0#=tB2o@Si@K~q7ro@K zpZ;Z8qAeDblvotUN+;juc=2HB3fU}|F;63^clqO}4-5-g*M{z!DR)4Obu)h6f8C80 zrJ5T%s9VYTs8BcwPCj6Hb0Y-nKI?h1Z;DhGQk2wUye)zf7#f8oGRW$sC9zGe?p?N$zY2rX=~&HpO15t<-J%(wzURZ*7`=p&pTgrM70Gzxmqclf$A%Go1!r2&pvqow5S6TX{Q#<|TE#P6jTn zIc`sCH8HZ9HzNH-L^HJ{%djkV?SwQo1=Mk~a?8_;XcOQElYQljsR0f7%OD?G(~y zu(LGgCib~^Ebs#(3B@S=ZcN`s^om@#6pm39lUxKWJJT?u$RI&pU}1Si<8c2H zIk(^scQJuua1)@Y2A#ThfAsHsS@hTb-(HUYx(I1zJeBV~lIsc(;-fv87Ik$3af^6G z3|A(zg&M$IQ+g}mWx`GBJxeUNvwp!I|mfR90+Nt9DoQ; z@cs-gn8}6qrPCa5FOZo+TCK6y2y!yYut67mI`v@|dL}xS(*pJOe>VX8XAcW|!aEy# z-LLK)@a^?d>iQUffAeU7M`X2nm9`>nKVmPKYccIrWa|3AU@@_@nc^!C zj5%aB%4avAH2UOpi9uij!j05b?U}U_5sTRwKo6n%L1`*So6cGFn4y~)3tBjoD7rbos3@|p(|2@ zYNzk~#pdu5fA=-^{Tb@N&oTnij#pf&iN3%uzB0=dZyj;hh*$~z#UkPuZ#m*uXy9i= zqkLt*sMV80S7m%87AG$7not?j@P@M2k1y+EOcfX4-*E_feirEP^F95okZ_;bwC8#3 zMdTX~>Iyi0f2n|XclOAhR;96?v>%H@~!%4=8n z=o((RDu>1uyiQ|h0ADnhiU$EV9|pD_R}w8C7M=M309vmH01*HH000000096X0001A Pm*58hBnB%70RR912G@5@ diff --git a/Solutions/Microsoft Exchange Security - Exchange On-Premises/Package/createUiDefinition.json b/Solutions/Microsoft Exchange Security - Exchange On-Premises/Package/createUiDefinition.json index e6f179b843e..409fb86f0af 100644 --- a/Solutions/Microsoft Exchange Security - Exchange On-Premises/Package/createUiDefinition.json +++ b/Solutions/Microsoft Exchange Security - Exchange On-Premises/Package/createUiDefinition.json @@ -6,7 +6,7 @@ "config": { "isWizard": false, "basics": { - "description": "\n\n**Note:** _There may be [known issues](https://aka.ms/sentinelsolutionsknownissues) pertaining to this Solution, please refer to them before installing._\n\nThe Exchange Security Audit and Configuration Insight solution analyze Exchange On-Premises configuration and logs from a security lens to provide insights and alerts.\n\n**Underlying Microsoft Technologies used:**\n\nThis solution takes a dependency on the following technologies, and some of these dependencies either may be in [Preview](https://azure.microsoft.com/support/legal/preview-supplemental-terms/) state or might result in additional ingestion or operational costs:\n\na. [Windows Event logs collection, including MS Exchange Management Event logs](https://learn.microsoft.com/azure/azure-monitor/agents/data-sources-windows-events)\n\nb. [Custom logs ingestion via Data Collector REST API](https://learn.microsoft.com/en-us/azure/azure-monitor/logs/data-collector-api?tabs=powershell)\n\n**Data Connectors:** 2, **Parsers:** 3, **Workbooks:** 4, **Analytic Rules:** 2\n\n[Learn more about Microsoft Sentinel](https://aka.ms/azuresentinel) | [Learn more about Solutions](https://aka.ms/azuresentinelsolutionsdoc)", + "description": "\n\n**Note:** Please refer to the following before installing the solution: \r \n • Review the solution [Release Notes](https://github.com/Azure/Azure-Sentinel/blob/master/Solutions/Microsoft%20Exchange%20Security%20-%20Exchange%20On-Premises/ReleaseNotes.md)\r \n • There may be [known issues](https://aka.ms/sentinelsolutionsknownissues) pertaining to this Solution, please refer to them before installing.\n\nThe Exchange Security Audit and Configuration Insight solution analyze Exchange On-Premises configuration and logs from a security lens to provide insights and alerts.\n\n**Underlying Microsoft Technologies used:**\n\nThis solution takes a dependency on the following technologies, and some of these dependencies either may be in [Preview](https://azure.microsoft.com/support/legal/preview-supplemental-terms/) state or might result in additional ingestion or operational costs:\n\na. [Windows Event logs collection, including MS Exchange Management Event logs](https://learn.microsoft.com/azure/azure-monitor/agents/data-sources-windows-events)\n\nb. [Custom logs ingestion via Data Collector REST API](https://learn.microsoft.com/en-us/azure/azure-monitor/logs/data-collector-api?tabs=powershell)\n\n**Data Connectors:** 2, **Parsers:** 3, **Workbooks:** 4, **Analytic Rules:** 2\n\n[Learn more about Microsoft Sentinel](https://aka.ms/azuresentinel) | [Learn more about Solutions](https://aka.ms/azuresentinelsolutionsdoc)", "subscription": { "resourceProviders": [ "Microsoft.OperationsManagement/solutions", diff --git a/Solutions/Microsoft Exchange Security - Exchange Online/Package/2.0.0.zip b/Solutions/Microsoft Exchange Security - Exchange Online/Package/2.0.0.zip new file mode 100644 index 0000000000000000000000000000000000000000..878c6bfa76f417292b03b5c64fcc974213eb01fa GIT binary patch literal 24394 zcmV)3K+C^SO9KQH0000808?|wR?-=qTG$8x01h4i02crN0Aq4xVRU6xX+&jaX>MtB zX>V>WYIARH%~@@48@UnwUZDSh*cPy4NGr!c(ZXo%;B(xoQKx6vzRL&O2&mnW#F|U) zkz6TCn*ZJza=9;(9NW2bP{T01+~Le{W}bQBe){7d7)$A+Dt%i?Cw?i?|5&a5 zl#INr1y{KQL$cnA%xJ4;EB<9#>E_LW<=>~$$uBcoLQ5-zHO{y_$r+Xx2UF-1%nbD zS%_@oPZIu)uW(T)kP|c(DmgjVb8W-B_wik7m-E|XC33ew{(t>T`2nSXm@i!O_}#6# zRr~w@)((#L_u2dF1sGrjU$ZH&n|q~KiV15guy=!~Aiqc7*@>;CSS>3$j`h@mc*sgH zj-#*CoH@h(W?;f=C{W-`qimt9<5J?r^gStu8nMQi?DRv1PM!n1 zf~+#at=Vyv3&+s$?8G~#GMt34GiB+dmPP%LhRgLwuq_j%(Rqxkjdr1;tD4~^WmkPyhE<&7l9O@BL zG>GvytjbawH<2*sa#BNMOsmpEmdi1Q9frY>p}!nTM;T-e^r}T@k|dtz9;;m9(;Tcn zAkt|J4qm^=v~~7~?7&lYb5dD{M)&4#w=4x`Z@A;=VJRVV$l~(!>Y5#2oVAC*kTPoH z5TM4D4aWYoqk`JFcRQ?2jA3hli)C$(5XkbhUEp z68g2e3G4LO6vw4N%sHcFf0x$sTF@yHpE_qkQk7=Yb!#!q(+lnx(3vO`k#R3;8!&GK zOzQ-D$a}o85`>gR+;8T-XD|ay{ByS$^o%$drgXyL=wNu4^iBOM7C^TvNEVv9gyhH5 z>waWnui+M6BFe|`7<9pjf!9JO0Qw#i+PLm=ULPJD9*htEHa>W@hYIiVZllsJ zFRq^Gz!P0yicQ}bUB1C?phqqF6eN-Fj)qd=%0kOLG;mkmKUfJL5WNuvIZDi_TUiMy znIyksb?<~kCnD@KL&7?Pt&FoF9#tY2LT>~y*>c;hUt>XN35nB zve(~H2SVMF9XNeX#ixFUo*#}_T-zCcLnIgo2ZiTTQb8KjQMC8zHrV_&Il4{uMvTb( zt`Xb2O-8qg*JStG&wI%FZX-@9wuOOwJ4bXa)~2K`Q5|S^F?(RwT0WXQD63{o-Q68c z8^yUtG?hGuYvH^$U!;W4)@)U}&4j*NvsYWC=0Rv+V2gYTn3ag5wBu52iW<)!Vw=atC0%6vZ^nx6KA z)F`J(-yEMet+TOk*M00)_@}va?2&Jt?$bxZu-3fg+T7ZA!Wp)c?tEPm~ln370bht08JYwv)tKlJxl%=yDQvyP<<69QF{s|@>NCW zX~1s{@8S5uhJPO9e;-i03R9ZkGTsD@sfF+me;%}-WzOHTJ=}2@iZ;S==fa4kkbuuC z;TG)jhvO4AW9GGmRL)Hv?3V-Ge|p83FWg%q9JY+gQDe|i zi}}IOX9*NG*T@G-mWw6zvayeCdHaUIXbJHu*=klmF{O3{)dHR^I@CC+sZ3URObaUX zClZ#}_|kq_ocn=R6jLL@eG>`x-Ezk!n+bz{UZ9(ZG4qTT;%iXQd=a?xchxT!`-lG@ zu}=a0#pn;AX;XIQF!pRI`8ovH0!x+*WeZJa&=#%n`rksRvT!4G)%j?GNwvg&fFNZ{ z$iz%!B)t~e#%2dQqfi;CZ>En5J3hGh+fOV9c#`IOixKv|{=Px~uIa;z(^yrvT44Hl zUf{M5ZD$t#X)Y+Rzbvc%rB8beHtt*oCpR-;tQ&mg-4C8`@Eh)bM(}He86)oS7dTP; zs+GKPQRFXs;u(4uJxT9m@nO&-X|LpnW{0$R!{}{_fAIHzP)h>@6aWAK2msb*L?yZE$R1bY(7Tb8l|#z1wo+$dVZNK4$X|ao9)VWfRHF zJ)!kIrZHnyfIaVy=Ac05{r;v#}0J2!@o-)&e^d^~1defL>BR%Y{**@*# z?(du**!hHY_qZSc1TL9OvRKv3(}$G_M0j|3czC#bczFE!*MG&>%I_2Jl8@b$$86;? zO{dA@%}w#7J9a1T1t0TC+I4@K#k}i9WBD%G9Q6A8PH)@k^*4P!4Wnx;cgn}p&`o*w zPf0ZSYNbOBc+n(^g&h{3P;03Nxs^fHRE=<~pfqa+%o z%wfrFI*sD=Z^!BxA|!xNGh;*{!CEI#I7^{1mP&-!D2iDI>*)vY(w$szcEY_`9HiF( zT|av{34;k=L9ibMhEq3o0ZZtBfnykXZYnw?AHl=)ddd-jB#nc~g~AOx8BCt>$whhz zZ~NI}pO4&GnEvF3GphF{=1DY*J^o!B&8BPXUDe846IO{}5?12H!Bpb3@*+yvEa85K z4QDBvaPD)Tr4gIDNy6NC?4;>Cpih#re|RPvaZWCyS?D`Z)%k`y-@CEzMNsV@x{UqI zSujab?)nIorI(!j!&MZ&OQx>J9fjsUu&c|!yJSJad>#kyp~+Dkjj8yvL#8XND7-(4 zFCWz?mO-|oZ;_C5lj{wzDKxmY`kG%5=R{2KHA@sTsj*3z1I);gE0D9We+pT69C8o8 zt#&f5SzA@_SJ&6yHupW(<(i&Vb6cw}|E$_$6F`)v$g}8z9ZuZvIt{!8#*)X}m^LRc zzhG*FIJ^l@XVcoQ45R2>-$Bre4WVVaKI1O%>nmWaAms4-Do8Kc>u(N^VE)Q!+c@Rg z(dLDs2y(9KO=EWl%k8d~POtg3R5C zPI!q%tbeYpW(~ZY@|fnf8y-)R;Nmh(HucO(Ry)j;0~$050@dIwIEp5t;NsZtV?$3* zjvd7VV!)505XA~CiMlI=I%bEAS7x`6AK=A=03C@%d7c()>YJ@s6syEUf#4sYB(g$A z^)-{?&ub}u)rR67WZ;+-a#wZURb?a8~j+9}~dwR21$o-4!`Vc^Zg1-l zg=Snm5_L0X?vWU@8i|&SJ?BUannt2D7i}Qknr;nk&qB>N0&dxE$;hSjvSc$gdYmYf zppH8Y3@^{1HyAiQ_^)pik@iuwT2$g|gMC=e>$393N?a$iwatpDdtq2D^yo71eLm3^ z$!phK_#u3QxG~h)f3ntrKJ}icmWu9tRn9FML za@hMp0uQfW$kCav6%A4MOMFq?TY#xH-wQrkl)L2Yn}f-UOR-fEHs}8r%#1#t@`<0k zoMeK5o>$1xiZRR!(_z2;2JkMJkU02`Pk0=7KOS4kR81LOKr{Z2(obYB2PK1& z>^ZmlmJ0RKAPtF#<;kchsHUR!GqJT<0!k1{nQolVG#o~&0iF`W&=Ai3oEO`?jz zhOl_<#_#;-iiSXs744JI-pDMuEJ+KEyJz|l3Oh>LHBR31B(MxWp>h$s)62h`!RXnh zkos7M13&24g@IS=^l6m3p%7;=_c-pi*xRMLXuAmhd3thOboXJ`&X1neR3EwtN6fDq zAlLzXv^{=nCsN{q{Np#EQek!Y37zMc(G>$xe9ew>!wBPstuX!p?0AM7KbN48qv%p&xE27~!5 zx=>?z^P%|1)P2WUA6xuK25Z)zpnJ^dD728qGhQ(qK>M4Ill$HcLU$O1Fiur#AWEau zO=mcM{R*wHYE=hdK+TkauffGeMtL1$`cJ4YRtWmGkLECHQ4?%4Tv2BkBLZuW!UO zCaZu_CV;Yc05!K+ZDAeu=7fvb6hHE2C~L$b4^Tqx#uGM&v#=v5kJjjH(A!ynRI=Zo8 z-TdF!$Og=P=XS@iWJ$x_F=JqImE`7+=vaF9G_!(QT9;ilA*aXoV0DOxPe`0 z@N9Ahn4g?JeZ~6Bk(5YS<}cjXsIdqPKB$$bwbPy1gJ3HQYY&hdwhULc_VXp5FyZW} zbK9yI-j41tF7;{}d2Se9OR(Ip@DdpawVw^yr=gSh$vWEavM15iB#b~_A#2KxkAkpX zgVvA=bL|vhpbt1nwMRM{5#)gYTFKwolECwrk=qorJ(v$uTbhU*H8_* z>`2HEIY^b#f~f^`kr6zeuvIXblU0;&A*>=Xj^H)eaTdSfYQn5ouhf4>Bu3!**3cP(bVNdvob{&BhnM}fE z#7*9bwFX~Zg5n@3E(@yJ2p|Mx0_$FYx?a5wtIv|@x7}s0IVk-8%o80+pc}@Dm(jJ& zBC`l_3(Z5zAXjk0Z^`YjJmam_2!T~1YcmP!3sm@X#HXJ8nV+m6 zQz*(@-w#M*mm3POKEvXJSa?yACLl8}Im{Ylj5j4jr*Yunf<6Un*jN&1yECs7%aWTu z2SYhbOucxWcwfG#nv*vk1F1<3K$AMUjG_dn`QmAIN@YYEDE1}2icGyFnhG5=I~XG8 zh#WzjJov;-lE@2ObYT|Bw6TGz95BK0^H(olpB}zAMNasJkI=*rK&fGXvI;Z5dM7F; zW>+&LI_wgK8UoPX0CxO@aLXRNii5EmU$Y!%DbcSRNWd;m(7es_P>;MH_I|1lyt`cH3?vPKTw1OB5e-7vPwfPS&E3K`KOtJ*Qxln5`YYe!k9BpotJnKhn8ATpDV2Z-g4P;ao zn*wV|C}9X^W8;YwsM4bYLQ$xDAelf4b;$xgOW*wNjVyR73zn=8fn*xd$|GQ`w=+?6 zAc8}61)%k_2^b3}bf!<}kue|f7~RpZjLe3b>>C>$c%rFHiU;%p? z#OmIyc(?8qIn<^$61B=*yNCe;5`=xLv=ssPRTQUg*a1!CeQ-f-Miy1IL;o8)^nH{P zLbjyQv`gaQcp_!PH*OMm2~IJ0*g-2Rq!)z=PxJO7Kx0-YVRBNJxDRIVwgLUne~&x# zzLrxjc#0lbm?rwsse6I#pSr`OgZ}XMTsMjiNIJpF0`h7wAEtshXijzu?creP0JJvl zlJHo4j(h$QNi88sas4dBRf#Ew(W3xY99!=o40t2yCO8U2QnSt3$XIi6^EX`_v65JL zt^+*TbFisH-Z8AM?=avCmfIP20sWTP$qq^;VKUHCu`Vkvdc_X)~YDYd+<27Lj0A+r*jN7Z~E+fDyP% zW7EwK&1$Dy0tYKuB@{~UX#BuBhWV7Dw}eI)r-PaZS1ynu7c6LPmlh)+zW6Z|HsLgm zJf4uNe8NAZsuvp@cg^`n1@E@nNjnlQq6OJD2eRz!#wA#*W$3ji6_Up52w2@`6wdXS z6_h=@j(0+s&>Z-2@=Guk+#)@zqd=PS|MukN3-MGL_peU+;sFjQ4GHoaaNu1J$P>M= z%Ar_r2wF-GApvAliPq0cQshW&y2hfYlq0k(!88bicS5yt^iZs-%~@H4p?QT0W^~2l zlS>|ksPQV9P!t!LR9F>FuL_i;fFSKR?>?uH+^QjD~KQQ$g8JGDQ0>xInd4!v?rYx*Dkh6YvkN7lIPKYUzmP2FV2{bTUpY zSAga!<;z$Vi$e7#NpY0*Oja6J68PM#i2f-sg{427q9_vtW|(7WpGmbyKO+lGE@-Oz ziW3!a?wV7+)tn;CMzk6~PX@{Gui=X=8()ZM5k$xIPO9y^)f3RW;r#Pm|cX+_-cJE z4WdFf(b7!}Ya*YU!@p&%DST9-R`$$f25l9fkIb9JV!(x%)$2d^;0*_h6z3@p_BHD> z-@WdXSNJ>&$OR<79Xz2PW16ZI8bhzxGcsR6#by-lUo=l%{-6mUzP8*Mt}pPL*w&O= zYFp@T25aSFQnG)uXj39_(SkN!^$;B=pZC4F6Sm$d*fM{ z2Gh_CQ@nRBzsxl!M#_i-#uFUEFlrKAcj7qI)}g^2?a(7o#r%E-lpm))ifr+|v^`+A z7!5kzdBD;)7%n0iHnn*6$}{G>ALXtu3>1&a8zb!-Us4rHCkqo3mZ|R|oJX|6l$WZG zYHedfp#+ongcHMb*&m}BneN)q{%#idS#VULGh)ShZK&teJ80qe&yUaH+W|XU`TOj1 zwvvUgP{~TbcRh|run4)ciS(!mimK&rV?&rj&LN5$5ItZJMKP{Ji~Gn8pA@5wJ=vsm zASdkki4f1yEl38aT{j2rMVtf&yWjTBG= z63790jJ1Kc><-q$1ViXEFjyG|Ha(lX8Dw zN3ezn`8;0SyLOluY{d#})nOMjfk7dQawD&bXdkiG+$5ma6j+DaVjM}&n9!myLWz_> zjd-$J&>2@>L~?PJYAp9xO-HkJn(8%{4A~*S2qqIWhG4bY*g!VQ*>>f%88Ef^ohm)m ztKxZ1&&16U40olHptc6S+SAHY!l)OV8kv(?p;?}|ZSp-;z)}oQ zqGLYCv}Ly2`d2S?EE30#lr=;3xlU2t5}8I(-(JkO7xBvz?~UTr{Ap+;`nmj~Xrqa+ zTroR`c)izRwL0HhJt%9&wncMXRi}FU@?`mqWq7mfzKP7Pkkt(`dKt2Lewl2FzX}=L zBzxP-++1UoGPYT^Hp|qT%hG09xFnI(ihFZ2y?s``o5<_@L^WV8ETL+$?^R1LuPNK! zEoRGWl_l>UWXEgBidVLl7RZ9PvRL-J1+(7eHIxFqt245ddun(H+T;91WL~Qyq1P_M zTD6(ooKdYVliEUbyf+!t-nOT6Ln6j9eQzo8;-^ZuSVx=s>~Ymu~O8J z!dbl|3*`2)8ufRS{cWMFZ!HsJ&65zTIlEh9R=1{XZe`QA1ZG(y+K{cSX>fm2S=#2! z&UPEj*N}y+$!SvDjj7ABW@E9E71chg+9FB4KDTUY?dGW>V%CU}{~-I?Hf!1}- z{HYGjXf+f|&Qf+CvyAvVzrR1)H1J581!&Z}zX-RodEQpK6iS%O2Fo=E>sKAcvarO4+L4HeDLC zaW#{rDf`wPBvTk>USh_WR^Xyj-S+5?lUbW78bwhLU z(`L6?{3QHCR;w>QtJMuT`v%#oexq5dZbW1TU!|YM_W|Zzl)~Fkf#iH4vZaN4LS)o2vR;Vvw zJL(~u(>&RnZr3GsqijvL;?P*#&kpJ{mHT}{noNA-Ef?4E348&Hl^FlrgXzW zzggC#hiploU$&(Cs9Kpn3&(?k@)_otJONrbJa536BX5D)lu0&Ix&3@H<(_%Y)s~$A z6BHOl^bueKO%beiY5+w}%AXNm{0wdCUKCHrUIsq!uA}yo%@B+NY8rTU_`i5`y#P#l zcuytyM8un>e8wi#=XVQ|!Wv@8@UW!{rxUB8Bwr3UKYwyJpR~}PUuA$#S>@6 z+wco!n&^}YW;qAGY=)}LsbSAnQ88Tk{1TOV492lSZ>3<> zto$B*2V+e8rn4G|C*85$bu;#(#k*v4(ChCzy=~yf%`A9EHPZc45>39!FZC+BhQZTi z`Bs^(s9=}nSCSPC$MQ}MY^$>+HpzP~P%DdDU8^)xdrogJH&b=dxicqVK(c>AnuTqr zcHtSS0W>D<;-@ZVM_93j8n=?3){1}=zlg-~;S)O0Y(Gn-qQnnFahQCLCREi|Chx4^ z1Pw-kCoM6IXnvfK+mei^vy~20MRHA`+tVzF$N5o%!V0Hue8F>IUQV1>F$XQ4CzTMN zPTreUKwUpuv35kCvp$=IJZ0yWE&v3PXUOudv)Wl*|N1PJwY_4mpl&c4tp&+s7KUq; zonL2B%%DS*8=$&WCr6qz5J)iKJ}<&E2Fx~+Mb30DqP0iuwy7Vr1= zdQc;c5C-m~TI#JEqlU-nUW2vGi3>5H5@ctH(Kc(d39d*%GMfGJ%k=@CkflXSNaTZ4 zl(1wFfmH)mshZgv9V4H>2E%r68mJ5vn3h7O5daJ84<=!kl0nTmEQ(yI8~7>)HJ5_)tGz+eo+RUA>(*nxUmMhDLy`^I?+>qsKw8wd*i(_f0o z5!OotDz_3$Shal{5*yVFuhqJm_Y6-HE*XojW0E~`Cv(!ASV^p;D)WQL8o=(~3MxYMM z=n2o8W?6=48cm%EP>z$A5Xl97J-(PkG4CB<(vm*Ra#b8ZMuk3B(OuN_`Z!;M$(nkz z&fLUfD5w%jT~`SYpxLRM!5$D!1Cu*dHWYhR%{HXn=2v;Z6R7xWPSgqbS9UUUS$G6=Iq+!s0AEWA3Q9w4O666TEZCi!k^xl$emyga9G4m`X z*CkBJetDU8!19c$i)nY#f&MCXT+fqy!K1McqWhG+*CYLFg#j;i@u>|UWEq2^LH znPX0lsNC9?Q38Op%Y=hHD9qZ9A_~0IpYb&hnFvNW_B%onom>Ogk2{D;UW9xkrnNAv zRgKG%{}r>(&}(TkTla#hcA}KQV%m-t*i=@fPO8wLZM7`ky^?3IP^Nifb8Z{xGfAo} ztn!+)pTdxAOru=kqtNf`jMHNA@&TY`gKuhP_FN>3XWnS7&gp6KqGX;EtIb%Mpi|U7 zYMotKdWh<0={yb!Svj%h=+v(j$JON^XqzaxWo~9Qd?k`SwVDuUh`%}rORw#cU865)ass^+bz}Pj#|JC_1U|h9^6h3Zl?#g z(}UaT!R_?mc6x9-J-D47+)kgB+sSk{E#G2T)(tER8wB^uc~c!&QUPPW(2#rQl3Cmp zQ{#eJ$o2AYElP#!B-hwye=SPuP`U;&v~Z~9U`dXQ`x+THZ&;eK%911C$xVVS>wta6 z;g*AjaLd6%xaG3KEeFdAw`|SVUsAy3pfKRREnLe}G@Hw|d84Im9mD$;@=)YpTfK*% zhug552e%URF!)k}9tJlLday5+Y-vFcmGB>e9v*@onk;D!l?z7OjfgU2COFD1$@`=MM9^k6GzO{`#Vf<;Goic;oGG z7KD_qjjq&kSrVYh%22t-;J`@)(?4}5z8m|3|M6b$3nGKK0(MeyQ&yMd(8A24(G{iE zhsG}ORuw*FKHh5qP{ef-25gbRROcXb!$hSBqrA~{S8P@q69anT%n#(XVlucfiEXUp19L)3czRR};d;YGozYnau?QL&6dp_{<_P}$2 zrT6!H`+EeSRVy0zf;Uf)Nt4KUOK)V)1~`wC*YW}&cz{kbct#m|MgGC;;h$$wD%x5l z7$6RVaX>@zm>y6W9$$+Vo3B2V&c1`QGwnBnZ|mAaR&ZMV?ttNY`oHSKiOe@G#)a?^ zXrD*puy8C^XQHw(d&5eRnvQ6YLNsL+GoN?VYR&WwxXqs%`Nl>H-l&Ug3rhTD9* z@9^OOrfeVP?f$^ua|VyRy{+Ayp1VCGPiQ&5yEF_3@e)LSd zztI621E1Uv%Rw61*qp~`@+cZ(c)&!e?Q?y`qvBLehpk@2$9ewT@xh!@5Ht614k#Y1 z$R6m@>Uc%2EcR3%S|JjgNcoIse1L^i?d%){8v&C!q>-0WD>U5$$U%ov_? z+wb{zGIqmj1Fm>YM^cIpvk_D$Ht@`z8m>-O-1v%TerO3TmPT6Q9TDt@Npv+~die8I zRdJ0pU9fenpLZlGXgO3!>${cAd#<++`qGxO-`^WL+wRt`GxWS|#~YqT)VIbaY(=#Os7li&-bef{5O|w?#rGct ziD6=qwf#ZrXTF@x&ymvxJNttkeTv+*_wjAV)CuV-(M*k577rTSg2LoA3dFpE*~cZi zQo~f17bR2H97xus#s@6$6xAz9k5u+Zs`Ldb#Adk_5kOatKp8Jpk~WcPF2}e9I>zlK zGW)?S=O5@2E<7(NZ*nxtD+LhcSHXbq3Lzr?p2`c?t}X*Gxxt{HCEV9H^ob_j0I*}z zkh_Vxv`-|CM+II&L%bzM_#zSxib&-1pW?M%9{Vmxzn=}WOQuMM=CJYPCF~M5d(8gE zWtTA@k#9*N^-{;)_MB|@9HQpAI=XjZU&!<_mKE>kBGXzbbe-JZGc)kjn~pg)9c$b?EHOy zoA=y-Gkmn;JKKAM9cO>E&7DWPz1^KYDE~d)Utonni(4dd=Owj1ufoG(`uz1Ftmmkc z#2}E+qsP|JDgx0U9sZ^lPs2$Ab;;9CoInzw)Nu zG)^{uR-Bt`D$gCDA*Z&NyvG*bqSJa!=tVRiRYElQPA)_ zcrbzXiY25(yAPV6H`>|X*&n%%ySKIFY!8P6XTLY}9e>*c#olvwc6z%D&eQ7o`I)n; z!6gTZFIWX**qNbdDA1)M?x!>k^2*;7*4X4$mA`D=fW>GhzY=YA>Q|y1%RNZ_&vhCJ zsox;ZN&MnwHf{70s9(+ZgcWNAGVe7ZC?Cz$;kH+yifRIU4mZ;17FoEO7pvR?WeBq7 zCC*lB35%q18Ho)QV6JHZ9P~5Zt4Thpda#w%?C=HG&Ii0$rwVf+7h8kPRVdNcN(T#7 z%jJsLm3wT#s8FZ?<0N&{SyJ1lrxP@KGDo0dSRCpOu}Y`JFdYH6Q#pnm`v7z-1ngL= zS9Hr~$A*?3XY2e|SY`UwKvp9CpkPQ6%x-S+B!?^OIa5kPi z$JK`5i-91O5+UgF5+CvVC50+Tke(zd!udJy(@WVRf!peLcM$SNT8)d1okpn}E~TCQ z?pAd(M`*d0ni=%%?Mz)DfZT~2(%xyOsgqm1>4&Pu4=2$WMo5l`i9o-iqb33|_rIY8 zNONF;idP(6J;U8PY6d>oQV@!EC95INese9^0Nn&XaG~{-Y>O3H`ep13#KpeujR9!Y zjksR;PC8O)EUT;EM6x#G|FHm}o#WyT+%iu;Ohb3#%Hf1p{KFL0H!7(}KbKR6!fq0| z`5_}w61w=8LSv$dj^{B$dHiU?p>z!O!fWy%qNgur^0vI37w!oMMIpo+7>yffl}pg9 zm1tL)#Dn{J=OUp>G8nyrgacleM_xrVX)K;jeF>+x3DAc+iPF4p6kF0D$YNTK686}9#eh$r)Dar!^*->prZoG8 zW7i1*dd-EyGe-lU>Lm}SRKUeh?q9^cgGMM5tR=9{jCrn)WA_?|V-m4(gx%#J`V$w- zmr9KFsEjeU+`ByPxw|2=sZ#)UGE1g`7eq6&6S-11=PTSi9CGwLOV(HLt^UVeDb_?p zhm~SYZf)LM1rWhmzzJD=OB@W(FYQA$sz{vl8n@9Pwppk*cm?D z(aui4?+%8}{&2MGZ11@oru^=nGw}PPy+`}r-f-kDIOVIS`e)Ah4?f(*+UQjIaJL_P zxQi?x*kO{EcntY-o>I(AO6_d9TrKi4O^G6ZF;WfPNH z){bU<;&$EU3%F(<9Panl;U0oD3wE$r55R~l@k)W&MV9SKj<5A|xASo0r`qnBy!_@rw((-P*vJJ*+IA1C}u9*0b$ocB|rVY<;ifmd~2|0jZc8DF@Q;1|(G zwkBc+v8O<~cbv)fnH`TQbo8l=X^r&@kqM=`!J_-JShCqSIfqwr3KZbtAcH<}dW*iw zZS@9NALbKDx1WL}7zSaGUZ2U$A!#AKP_=W%`Xp1R*%BmA{|qCEr?omNsGNjR;cR8S z*qB2A-Gxv&E{q##O*v1ZO`?1fY{V9nNTnqrK7Y-f*YCGvEvQimKeh&ByJ2Qx^XhVdE~}ro6YYy1z|# zUVka>y!m+j3GHp>&GO{);QkYLEcaiD2g`n$oOfql9+#l&Sv!wH(ZIz+jL)KrXkxWT z^;>ZbmZk2iD>Tn4D~s3G+S30}k9>ub;>nBpYENDiBhG|L+-wsolD0R6y(o;t>HdqD zbE#(CiFv%_=$ms`2i5pNHJ)2JxT$JLCxh_D$O8+$UZ8=?BeG_kRMt zqP)#w0c@#SSAlv)S?PXv087c7%uhAX>sg-46qQ&L``X$@!6J<3lzs1&3ra~Xh^*X$ z0Z?xMn4{9(2>1dOeyPdbiB5UHH2uPcfl&PQw!wYX|F`bPzC*KLza6XI9^1{uM_+yQ z75g4Dr$mBBDCi$xiDBE==;Lk`(GYhHB?oP6u*d9B?q&*!!$Nn4iBfc462)x(jCTL< zks1q1PRB+#RHbdI{0WDRje*fV^Qfs@>vDVY(oNM0S>E}|L)-$0ujw8M0-*Lv2@ruk zl_W6ZjNIzxay=8oFdNKRLhxK=N|u5))NaToz*4EoHH&({GufTjgs9wLh5i6y&$voR zgI)VKEKio7Im%<==Ep#WCxUnc_bQ-wB1I0sqK#6#iG)(=1ens7HcIh2cM>W*9@9CO zL}guvIrlE#+{tXL+d3Rac=Tj$e)9PUG%1svItGH-ff}5qA0+e01i@57r0?bW9gAlZ z)f`TS0xQ0ZFP>kFGZGnq;9m~-Un`NCPy`H6plZ9Brf-)Wk8JFN@bE~G#Lvgy?&O+9 zP&TF(J3w`^C86pBPZl9VQrBq`!@nYJvC3*xi-y@tR$y0H5_lNe8TNJ^G8QSepn-rC zJp$fA51%CP0b5gM16hTKGiVz0z$C9mizqW?j-JdsJhxBrg+}L z8k?l>zabuuM&&newLWKNZG^%HRAp_Q@&Hn;#k>ah((p+rj-tWxk>s!7;l+%fs**2< zs7oJ(pv0(lXSof!&CMFisY4@HV2+z?Vq{r0Lq1AHQq8qIFH-_m^XV<&%a8Y66%wwAh;zC&2zBPb{!KJiroV~ zu8a*WpgK=jX>-*gPj7A6d3tLx6Kg^4MO^`{LDc!Q>Tv!YPxU^*+G_s2&Pk1BQA*=0 z;-c)FOMWh}*3*DB&H!d*egh){Mj9-rK!u(u=rk)X-Q*l~&NZ_SxvdPP!5=WGp~#5q z;t8MkNv3q&tVP;9Nx0lQVTJb0w(8bTwq{UaU4@$$*GPQU5x_`=f@aUL*^caXLkoqD zmYT`;TMTtJU^$_uys1%=1fU!X!|oslO%^c?lmq%zD1dK-od@q<#X*F|nJlCECf86W ztCD47mn2y47!7s`$_)*k1g+CTi+To3X?iq@U(xB3HGAJBW{#9|3(Z!wi*j?jLKmo% zn=rR70wD)Q)jL!U?o_r5WsC){DK6qArWswnrhEL)`1!Una}nw1aDTV zwG1xlzXDR*>TN{0pjSa80;6FI{pI;&V&v+FCY| zT(Q;ByR)qhx^Zx-E*wk>jy{FY&aHa-O6h56%89KkLCw27DWNUC43}yoia2N=y@J9& z&|JJwcg;y~wv~IQuyRW;>sH%sfdb;BEV-u7g~%#*s_4O*nrdzE*Y+m}{&@ac5a)h5LFH0$>_ZLQEU|?em_CeLc!gM= zguA&h#A3Z83=92PS%1@iTU>b+A|0cN4*U6%PmW^l(zP!1L+Kb?fuGzI!9!NBCYW< zK~X2WJycv9_?LhBpa0+g^Pky^DAUvnIS6z>iBajl|A&0=hpdvR(RQs{ZC9`V26U$7 zsP_*d>@Gyuz3g^Q86sg(k{0-BkQkX`%~eqtMm!D51tHH4v{=ADFJ>xu3L{}%Aynke z@PeQMyU%kPL+$qgrcRM@8B`slK5$mt(uP;Fe5d5Xvb#_2+Iy7CTMhp$cxo>fWQ~K9 zgIn~TQ1D{O%~SMy^d1D`k|e|zB^d9Mk(fT@)@uniSD`d2RytV5qg<|tUAe~=j0%Np z6Dp@4D+4}lxQ(WQ>&lY@fs9x+Z<`#c3 zITCim6<;5#QhC?B%P8R!wU;x_j6Bi|=>&snTAs-WVrCq9Eo%(WnuLZR(&|(%GgJjrx(E@nX~k>c~p<$phw91PmqUz9|E(cZ7;NH=1It&Xc#7 zHp>(#Z#!q7?&SG$9IT76nv`1ii{nHX&|1tv;CcL9sy&6D#nUZT&9eJM_|axTa>*$i zx})vtPH$aoLB2T?pOvE*2l_1`q`uMHxA}MLh0v@_M0^xwY$_eRl`8T5?pzUjYF}dB zc0X7#xUEL^x+pcWraDF;LsR+8c3EtiN~i7qZC;~kp<&!nppLm5=1?@yl2UaPN8?jI z2JTMzu`gSMbz#Co=eeS!l3f%4^hyN)p;m&CbB+`dh{Nv_?~;#Qf}@h{h(tS-T}MOQ zJevj^&oDTs-X)vEFdA--p*0?F3Xn8%__8bXuaCf(la4;Z)wOIzG^n(?-dWAYw0j~?@M=6)JF@nw8d+zx!*CN!3eE!QvBa_8C$OvQ z@Uf771$qo5Nduk$ekBS*0iP#c9MJhF?7`puszCq1uMg(q>8~kk!MA}}77h-7nZ^A4 zM2>bhd4KUWGg>3qr~)Ez@!*0ZdBH=;*od zEjv2P0%DlU(~Su83JT|@wfPr-V5Pj?AQ`@(cwPJCst zOk}2SVQ|o)ZSH!PM(K_`h8)O4*At##_d_~TsZO2?%P$xYV<`ZzVZbLgY0?GC0yCpj zPoD58Mu<*481sXZYXCWxXD{Ep6~$mxnZVB|ZYV4H{df$vSfYm2QcjAH1CSrx-q(z* z$c%L|LKE{a%{{_UqtS7g;-FMY*Vi2W0+})I%wn)e@_o&c*-#*a{SmW2gZHs(vcFAm zO({;xF8lNZtdMy^?Jd_mSCx-ciAosgs=?}tADcwD4Mi!;D%%jU+b$jq6i%XWRz)U5 z1X{*QNjeys!lbK!Rkh%pClUv-(3I;ImkfgD&eF>$uIyh4@d~71RSm)tM)Y(JWRlqw z6}2jC4192peTFxI+VR2VFW_;zl0fTsSkj_okdzjG9VM$bgCv>3iqW!9z9B^_$t=`M z8i$p`7f&jP?4hF%s0*du*!xmJw&HwydUC9IO|Y7<AChX6mrO<58@q<>3*tS;HnD$yjl1L$`|!XSB z9j=D35XbLl5?`1X7C<$+`0e?S?~# z)HEH@NAJkbVKxMNL;kcDSTs+7Tn1+3x`LFa#XgC;Bh1`YE<;O$vs%&%*3}(x^d|33 z9_MlLtE0sXe_Qkos!ljT+%PPnZsp9GjM!(i@7r%UT%jy@tBc;>tgFrss==sSg+8@S znd`l>3lL9_2g6RjrCZO;S6`>e<@=`QOff&J&1Leh7foGVU7M?$`X*M*H9`OmX-|0( zn3iS-{_jKeoai!v@~+ZU@udmc$OxRwZ%dOP3<(eBf4&P8Ri9o6|2=m(;(yHU%(PooDf(BPIcn%b2*O>0F^ga4$@A;!2c{IN{A2i+x}n zEIsKA;T{QXf-YfI(mi1Dx`c(WY1hWv@R~om_b6hhsriOCfF#tL!j-lqYEDUPCS7QCWG#t=UM zclpBP71m4cIzAg&l5O6GMuAL}AN`q52AUOIP%`7wZteFMIpJ@T#v=c6CEBW3qegTW z!o2mS2P5Tu?d*HCwVck%XXI%^dzi2TnwNEa-qquN^M{(%)PFwGrK!0`;nKR`^q%Bd zx6~E2c8>h>OAG1hY%WyO7ITV@6VDPzUzzNII410*k}>jiSo&SHo)!-up~yR?HiDBx zVpw@8*fo0`C8>zi-8m^@8Ih(3QQ;Fas9u@<;#CS!QH!Sd0Kc=k_@y4F>487?wKhvSJzCY&k>vPJPG0%#K*$>sf6FY@( zG#upOwH|Z*-)m0KFP@&o)S^5kK7G^A+P!cPgFGe=iTQnV@)NvD341N&FC9B^CHFI| zt3}OOyF5Sls=Bq_yAWRWaoRdNf08c#4EMIW4tenQ?d)f__6#-Bx(UlJaKxK=vaXo5 z{+FR@SNe$^+quVGZB!Fy zV9rM#e4O$yU~lcUfApeN*|tcE5*@!udt}kVgl!KO?zTDY9z)ps98E$ERA_d&0a_5_pf4eOdkT!4GwAc)E;gc1es3F>xyQ$F~ zr^YWRI5KMSN3otPk<8y6p+ig=y;809V4f8#BzPX{dUgVn?~}Qi3DY!2w)dd|B-J9Hf ziljs^^g#2Ku1tv`z#YWr>>5NU6hJ=;6AQwEY`-Ujy?)JDZ;X?skW0-Ahd_zomdK>I zMRlLRpwhOH$o+=FYuxA2+cm^80NeMPdJ#Wi5qL6m<5KkvQsPEo3_F-0Fl!?!y2*+g z8H0*kRQYMjRHlvyLUq;kzdy@RgW`}yUFH2w^|r+VL95BgkFD3>f7*t;c-L7-0R%o8kSmt=QXjCv}u*nlPRPu#i?qQp(%L2 z!SP7nQ%+{UOd9L6npDfa%I8|Xdtz)64E#w@jhnGZi#bB_-9bYaGz&AHaj5#NX{w0n?s1U9^MiKZ{0^`JPJEkP$dQ^nm~Q~cSq_2AKCq%VxQ3Epd} z3WMA8EO|xFRL}N#39u5e*k|Zuv%OyaZ9uAgdE6R)#(1P~P)?#FWnZeJL+&`j)VN5@ z14)mjTA2nPAh_&hP*%NQ-#jhZz5wcg+;;%wK-tk2(JeE< zM1?IH#{k`=VaD3l#7uT8!nAN|uT=@}%5X6=@Agk1VsBnI6Kul(0=SK1rsF*M#t3cfdhL@J{q~fq1cYD*zCQ0tjpi zS-j2FD|TeYIfv4T7Iaw2gM^NyVG}X8Ax!Bd=+Vw4!Pkw`*)s$sJMQ*0`g%Y|023$9>qaAu=HQ!L58s4fp-tQN_d`ljC9jqh|N)cDdA8EK%{gTRTHVQ2raUOacO# z$`2m%VXYBsX@_@#CUtHvUhLMGT2ED!PcaE!6I@BQsA_o`XRt<$_N}bxn-lFVl>$q}tf892)YBl2m;PK@io7y(YzLxh=7zMH|d--JSbMY=pJ5+!o6=A9uk>C2BI z4L$-#UZ~z$)vPnSXygr%xUh2{>=RZhHvAa3dz#TjZz+4z|d;?=QWSK$CpK zD(%4ETk#*kD!JEwW|q=)%q1msAy1j=hOJ_=C5;W4rUBSKM=%s%q+44)_jk&V@T-ne z12;phmLe9Jaqafw8}>O;M%?Jmzf$UE=)$^bMXHQiXu1fk+LGyGH1VpjZ8yI-^5puO zqeSoAL27|XrW@>wa?mjZU*@#&V4aQfw!D5`SUd))?B2PvvyMRMs3QCn2LM8%SivUb zJ*&fTaSrg0lmUZ|^2)L6m_1+l-;xcgDF*{1DGQZn&eoABBe7AnQC_`IcjesS#5~tX zvU}hJ;}5-#V46kQ?!+)o4Bx*vD!?&4drC<(uYOuz;w(^bL&Asq1sH z$6Mni6r!$w8_xM;DjTbSVd@_=-bF_;W$0VRhEzkdGZ6M>eECqS^FS{4H@E4w~hw`i952a7*?M z!9uP=2Fb*ay;%Iz2im9n;GeZ!TxZ-yjZA&E&~rP>l59~`IGl&N_c`6)rm(YS`zZcP zgol1lAD6o7f9}w`atJU*rh*{iJ>^|7k%h18Plb@x7&5K$njUR}fd~7@XzeLsINd~4 z0wA)O+I@DN*8GGO!lQ3A)agZBOwYEXqD9mw?XDEVN-y7K&PQM8Ado9&V$JwlsJ!Yt z?V}E}7|psmk2wn{mTZd66o@_BKlsYl24Q_r1pPI6gMk<2v+RQ2I5}=Om3LoAOe!$} z&aY~;thYy?w<6oPBc&rDxaEEEz&)VZ4r3FimnJ&9A2WVC_M2ZeY^mEcU?KJd+b&2} zn-^u}>7gu5TcRyt%v1#z$EF#{264p>s*x#r4 zy}$2}5m(=uiU`rD$aHRvtS}-x!=3?a`7*3_F)*Ocv3Z`8+rxNzuJdt3>VkBc=g|_& zOo_peMYRbOH-{+-)f{!&Oc>&0V#0b5JTQ2xBb)}Kiqw$m(2PT#U#aytlP0{zRl4! z{BCUY7-7SAm1y+Z1CI64sWgs|x%_*Qfg)4rwAk8e@oQx|ePZ0+`$t|&xpXq4K*!|< zcs3!d?bXr4E^|#;G~HPbwLigJXg|X}WLJ;br6A}t9MeivVuDu1=D^12L{vhy>>q_@ zdKixzmSWB<3VT(mET{WDU%fbu^oTgZV>*5ZTx%?@F~sKCXp3H!huoPMih*@77v_W9 zKiml?!~Ljqk%&nCdfL69e2`Bait3+b7Ekm0V*o)4NL2iTliY!q5W}>?ky2yreav@BWBwX1{I*Mct=CVA0ua`}+P4 z$~K*iSjt4ZnR1?Uk*Q*jTe7JD`>=a}|Bq<}HUdlig*TbZe>n~;TRZ_aQ22rA?PF8D z?CPV55(SzpTmCYs{v~Kk030xqwfHO-wP_zoXh0o%15u&~6`=Tz;pRr@MSKAdih*rx zm>+JVE{;t^=~w+@RQX+j7h@mhv|vKHfNzxC2J_37DZq3~xCtAo9&iE+GP+%?Q{<#)t8rOxEJ3=me zAiW}<$ee`MR&KSB#x&;)WiLcvI2CjvUqlATZ(&^m3oBhwE74hAujR!B_&+2~+eENv zdp4NGwM=pWq-|_jzBe@Gr+EQXaB7^mELT3M@gHhKjD48##79>(P*rFE@|NUUprKOS zQj>X3f&0d8O8wBNRFse%l{JYHdyUP3@h)TbT$>Bo&wZh|@caUHYl1@DhrW^oqjKuJ zK?7m)#MLK2jp#3TwG_xI8Rye(j`!C#50CH|p63n1!yjda%jPwntjpR} zb}FfCDlY+V*rzO~+!fb#)k5?p*Bd4D{O2Ets9=e)Y`!)-(P$@Ixb!hWn^NjFN8?i%zkvun!nyPYJ0^w7=fa zIp?zH!?eVRo4f3GhqZ;qrp1V0^3rk9UDz5RxMhsqWKp%*=_D^(huvi>B2> zdsb#KnX)A55HXqWIs9nvtJ@~FMQm_;a1$58<@qbg*lm){CX2uQ=o#eJtk^Og(b~<) zz@F>}WH8mdetMOp9%26{X_@*E9UuBBVrTGA;1A|f!6J|H2OwJWkJvTCMbD=De^vEt zj;Tv4uA%vI8_w0A2^~ML;LjE)vk>3e!^l@4X3~XSJkvIu;(n#Xkig2&S_@<=)E=Y# zn@3rx5W`)&`TO^5elQcQ{PonbrU5FvNRbEJ;ZJ zOQW`cf7~W+LO69uUokv!X)VL)M)cMBvgnTw+3&@O^r-u?Y3I4*%j&Zb4LVPYoh93(mCW5W$L9h$QId0!Xs_rGyeV~CxX~m7S5CAF3^dnxd~sV9V2Ppv zlkeBzoH(NC7jocU?}Pmp7cc^`^uH_*kc}@SiMG4n3%H4d)i<`CR(qyl9qqxuzMa0S z_-ugf);G>|bbgl_E<0Vf=IwGzJo`)pI`;_0ptL2F1jx(F1EG zs5Ychz5vEi&KJ`7EvGdG)1L`yavV?#3GvT=*7Y-`(TX%w@dLzt8q#2UX;P3vUfKlX zsK`-esBt}8FBy@b(+A2?&VKJbyj}L&B+$*553hs`Tyn#0f8~Z7o0-%=ZR#%$QxV4( z$Fhal7gw57QAYrs-;@k)7Xs~5T~Y~`R2%p65hLO$zUQf}?2ZV?XXif`YB$b%95iT0 z33i3r;;|%JZXdW)>NH^gK_0nDj+5Eea1#87A7f1RPrL&CD-M9ILBmBvGzqI7o>jL2 zNshSnAVvjNP(PY_PC642Om~?$F?L#`(ibYL2gO+ZhBTpQ(KB1ZS9@y9-vkMMD2+K9 zTo%&jvP~A`h_dWl+XZrp=O^`QgUUq@)|9iqVAr8$k6xVN183U zRIi=d>MCWCyWLrHO!{hgr;uK*l#H*1$2>rize{BTo8NM@mXnw%r-HQSjmrOVZBM=% z1xw8>3ZQ()Nc&}kr^lo@Fhln*W?k@={6v6Fu{Fa29-!`8O6&a|#k~5w>y4v`(_`;0g zEUIT}SFO2&FeRKV_dVf_P7%-UGb;UMXY|hDO_+UC%)C^287LT|5Y|O2x02hcT>ZdM zw=CRWwnw9DopxfSSJ5D0j!Zysm4#XCD9yO3YPn#48J5ve@sQPMf$FAS@jN)3cFT=e z7QuY7I*6P*$$;3)M7w<^c3OetFVj$oO}Dx8{(2^|wHV+pql}njQz8>r-QMIErladW zs=%}WpuLX5X=Lu6I9Xx?6%N5s6H}x?sPO zCf3g(kt8W4u9zOiCEdqs_G#p$s4?}qe4I6psjj^?!~s#waaVbttkIU0Hj9Q@>s8uW zI#C|tD+`}%U#K0Hd-ed97!G=MRz|hv7zKH$O(#uA$8Y+E8kCYSfD^Q~n#v z!eMds-hSB)T$y+~%86pw1Jvx3v5eXtl@ukRaKz6bulG+uX+g68=BQMggDSCanOTR6t$M@C>*h ztE28;tygFwU)*4Ghze!|=Cy4oZvsCliO{J+BaE~K-XnH&qnaNFSGE&tW*Ua#tLt(~ zYtM%a?_8Ru%8aJ~}Kp4^trjSKcjfdGTu*{1mRkq3rj5Yls z51l2HvY4NLzEM4DC|yiyzQ%R-w1x~FkS4Ynq4U9;R@{w^Bj*H8592F=*jZ^p)NXdW z@P5VA9e}K-L&H#kjJEQm`p;wUkFgaBPRuklog1}>OnNX?UFCy!*>4Q=PGF>U(v0^v z3VfKl&XSefCHMvmkLtOYKh#3T$(d5d@lS0c(XKPZ8cBvaM2<4krm0FdiLu30@(o{% z&7jNngMY+`m;QtgL6)yRzG|Wwz}vZf?r#eQC7l=-9rJp%w|GJG|FvHV`EGA3pDr80 za|n(pxUFyR;8`XOopyFTqnAihhK>&!ayevedJS)h-H~o zK&e7?VZ-P8PvUT3$T#+oznoX2{Kb6vmqW(kr|ik)M-q%1>FoT7T9SOo07+~cd5*09 zH9ZP_99S0Vroi{W6d$0~Am#Bnd8X$ixJo|mN2-iBsur#E&k9)QJjKd$SNuygz|6K` z7qPd8m2(lc8ANB=nzIM4LX!QVd{}`-%P0O5{Hr@PrZjwlXMwk(mfF0s@L%FCqurgK zvPQV{>(wJzp%4+T-r^G15BORVgd?m#1Kau^dyV-E8oaZhOCXP(W+)l#*HHQM44eA* zKk#bbWZ%wKJl-Go1%puNs1(=#s}=XZXU-d6awOWcPRkK{Mq;_OfxqK9K4)n!HVLen zDC^Cr3}VvE!SQNwWA2lneHu_6_F$Wd)I8p2fe|oCgvN?i6IF1z?;9~=#xN?111B00 zNI*)(}1ZoVpqz9@gl*t@*1wI zo(_g~i@z%|m{qFKv8zckr2%wodQjn-*Nf^>?mY7GL}7oEeQ(gi)fFsrS!V<*NISo3 zNSdo=HH2t5o%xnh>brD`i3w@9(}R^$eGla(%fifS{^2kQu)%f5Mk77i#HJ-|7v2Af z&EuqnUc>&(R^vpWFgh#QGMWV-P~F@u^LUTb%5OJkULo&l9FN?|&#SX}<2^Y&yosa^ zqwj_!O$jAVCUIipLx+o&4<46Lwuwvl z75-nK??9+6EE&?sF;KKHnq7G9>^7*gYdGG`56dX1nInlchnyujQj~0fK1(01PttS9 z;aoJbV<($M{ln0ZXU>h^xpChA{&$QG{%F$`%++?`8 z;L^gl-kEbNQrjlR#SCm}MBysQe-rtVS(84W)!s3DlPrZ>mGjbqL4S#kJVd_nmW2P4 z*SIJY$SFDtm7HGarM6-3pK&j->*Z{)5t&;d|G)gXc#Bd%ELX06{A#9V>hSP;?cn6_ zkX=gP7MOtr80Iu{D_{#PrQQg&WOG<(157CExRkU)`&P@6%sF8*!)A*8_uv0vSKgDI zZFX}7fjbGax5H>}uz&S_1LsoDqm{2KW_DVi@1Ks3Uc625CJA|#B+Df-*oAuOzc*F`Yjw4LT zKjcDTS=4*XioS>QzGD+Q7F38u16VYSotBw!41vzhJQz#Ey?=XODoZEZ_#2~3Zr`<7 z1P`#Z^BOUddTH6h=$vt8qZ|p!l7fZNYms^7h`;r3aEvl%lK`F{RR%_G$=>=@*fpdp zrIE7$%Mi#J!Ydes?x=Ni{0_G{%b)<{qS7s+)eh=hi__Rkw>k%=7et4ytluR`fM7z$ zR;MTsb(bNkTYqQh^Fdzc2cLDyqR_@oB`mp|R*7IjtI{VZE++^-JoypBBXTGmWq5ZR zu$YKQ63;T9nYhHKC0K7D(rLs4uQpO`ojoBx@Pyr*mDZutz5AP2)`GKh?l_*Wl#n`P zarNT$H9Nh0*%*N+GHS;NP?ORI^TPj0t}$6^GbIVr41ak}(#Uhd3-Pt%bNjr|8%%O5 zka85xvl6b9C$y9oo{ibz;Uzbiko@y8J-^ZBZm#uRSfO`sE=Vnw6PWp2m#zhf7|*?6 z@~Xy&8nItkpGzI~55HW8W2V#5VBE^Oww$-qZYv?!lON)7 z+E;b`nt#@k+fwg)k;^Jp?R0}Kv;|MWPKzjg>Vxa5l<*L@4hw$@4-jK<5UHnJU{KjX zoA9=I_|SHl)G6QVE-Z?iu(Z2D^;cvVh*a19E;5SU$Yjhmz?Oh<;zFXK5JyyoB;~M7 zvf33L?LKsj8mxsCa|yB5-lKXv(C>^ci=O_R5`W8!w*sS0Q7Lz(Y%_{Ks~?eZQ_X8= zw9C4}UV-dJ8!t}Z)TXqxa@zvBok*}Ae=DB?!S!wEt2H(B7?jjRAE4T6zQ9i0ovFBe=2SN>!9XfqM#i!cClOK&)T-%Gk5fTiAgWU5e zs2~k16dk;u1)t9bC$qu9m=T$OYs?O2gYj(OHQB%W;Q(3R?%16(WA?!AwfJcApsbqKb$36Sc8YU{XfAmM*TQ*i_E8QXv@^X5x0}fKYxJyFV(twI zY*&3^*?r+rc6_Fm*s8sCk5}~?slUNOb=P}E7on#23LUW{88IB|ezxl1t&cZSi`9Bz zM{8Kseo<+J*p}<6Ew7uw@FE877Jma^PY2aRdBRQ?7&!M$WaGNm2j4e?;)v8Rk?bgk z<)rDjm!-(KN`3zvnw-W$YK)UX*BuD<58aj9_9KPM^=&!s%PyHd>+Iq zJ%3}M!9JXAG#eg|LMk*>BY+89S%h0&O%;&&<4$PAZ8o7A{8FxHR^llZQGcA%a9E2t zij(76Z(@u)FVtEXt;m%ZRD}LPAZFi|Dh;Gk;IL~y0WZzdBTodue|P+)&w_;P+h`-M zH@s9zl2d)qg|gOzr00U8H}Qx=4$d)lXUGfVU7UEP74wN7?jq-1#yigLJhmR{L-=@e z)EhXu?M{Cid%TN^qT5v9tbdIS1?HRBho03biy(N9W$_LiHd%+QYL&IX71f~p5wVw=_6++bH1uJoKY)|qWANEr5%>wBf){$T0qPuVbMpp%|e!*q1mA`5@+NpbJ@%7udA<`*givN~;M5oyxe$g8wq0 zTT8DP^X0iG!eQg59DkMnmRih@b3RL;u%$*mP_Rs_sUwZuXv5o=eWNAB3t+2R4*8s# z4pa+xx@uA5e5F!ZW-%?O(1l1?WBW?))8f*Pp(39f5pIb{uGQjZ zh?ys}5T6nS^(}t&f#i!}|M>p{`vm9*(I22`6ZX;}_G}^fHh%zYg(XXdvV|@)=!?dA z-7gqaS-26pv<-Jmss;7~6jHW;R4hbF(kr12He0bX4waF*WBL@Z=QD}Fv&3?MmegNK zjIejrR|)#LrOzc!V^!@nz4Z4q;5H9UXBK|c*9zEQ7G?LUrn$VDw61UmHw$5`8-C)A z4ca&Sj9Z&A{5o7>#)xnDYnLc~(@5UA-tkv7(T2|T%%Edgd>D2}nu|1|*&{993woc1 zk>r0+O9KQH000080AiOVvlR*XSPsLKC09ZiWA_^g006QclN@3;Iq?fP^V`&zRL&O2&mnW#F|U)kz6TC>i^yua=9;BIkA(=q4^Ma z$>Gd!W}bPWKK}6!j3s}z*$N7tJZH(uxzawL&B97raK)EUfO0ASP#H)wUDSJac9cF# zkEf-9wSdj+)Btzz^M9)|SO_JY&?V zygM9f;x!nHjEJ}=tlloU;RQG(LW+;Hgo~M03$bh$a7oy=;sZB1E-tvVFllz?+=|S0 ziE%Lpn;B8MTJqmTv1Ha{FK!y^7`{oD!mX-#Wx=3CM;0R6_)>5pN6OeeZB^bxiS8B~LO$B2>COUo8U7mPC-fawL%p)H%UBndEl(6Y4~g<{tiA+|eC^r$Erlz8k_WvPvuNmz0@tKl%E zRq0{Mz&41q>Sqsk2xZ~(wDIs&n;_~I2D|T}6s=Wk;kx@IB05z>_xL){wT4+oe+RRA8 zEJvQxEb^T4Qhe|D+`cIF2BE$JDaXN|wQ!|8p(S)Yo3O*f3vLjW{`;7|-)eI=*ZMB3 z(An#AQi~N7&3vva*9nLS%>kOcsu5CS_Fp#S5`XbCgktY-gU4KF<7CpwJ+_*6lTRlt z;U+TBmC4{DM7mFV*If$MO{zadciPuY7N0eeyHX!I$YqUHJKLZMZOJpRvocDbd2n4; z5x5P&iGz)VQJtLOS>CXg+z`(r0o7rkrQ?! zlYa@@09yj$#Dzpd5XYztNy=fdV2vqy+THgqm8^voa|yBHJfM1X=#NHM#L+mV8;&POR++wxqU&h($pCwKfb)`M<(_cZsjGSd<>6K z7n~?a(1uI@zL?o^yqKXqh|-G@ILQ0D(&;)=8+CO)di;5^nc9g z@(eqG9<}6ikVL*e8cK;PD=qWTw7v2E!Akgm=$$CYQDROV%0@`ZB>7z{*$IhGMA#>W zgmnhn7iR}P^}vDr7cSA|-hl-#M6*wVtfm{Y7vE6_LLHJFIekvW zr`|))k0&gy?Tx=N5{!g{!t*JqAb*YOC_4Cf6KsByJikc}CXC4ZsR=u{NhUXm*JS_h z{Q|}w! z=}Zn@ux-YT*z1Gun?Z4m)G(6lD2L^w?YNhf$hpdV{~Vf}_J-6Lr%B%&80`1`mD}zo z!R2wTn|ef>$NTQHVOIC71Al_A3$a?y-#O4=Uz}|;8y$~BDl~N?fC*e#47Z}5Dj@gn zP8soNHlZH;GOlP=;u#iEoYQbvi*Xbu$J4>Y78_%JOzU&(y)O4U)z_V3{8s{sO$tsU&L4__v!W!FGI!}vBKZc58 zZbWz`BEi1r?SI&0H(}7f``x9l?-QnrLlEJQ}qYoTpy zcCa%Em65t*`YB+~&m{iM63YSJr1_P^2zyumDnWm4>3`=Er?ILInqK<%w7_jY+RiNe z(L5_)e_2-jr<(ThYT9|iO|BQhSU38@7aP3a=qp}rCh%*886%$X&n{8?rj@+&yyKr} z;vIU=GfD4e@nh5@X&=&vW{@6aWAK2mn*I9#?F~M7YaX0087k z0ss*J0JCig=~xc;wH{Y8j%$e12mk=M9g}2YHv?0)9+RG88vzKDx?&^-0%8CF0046! Br>_72 diff --git a/Solutions/Microsoft Exchange Security - Exchange Online/Package/createUiDefinition.json b/Solutions/Microsoft Exchange Security - Exchange Online/Package/createUiDefinition.json index 76a320b1027..0cbf0f7948e 100644 --- a/Solutions/Microsoft Exchange Security - Exchange Online/Package/createUiDefinition.json +++ b/Solutions/Microsoft Exchange Security - Exchange Online/Package/createUiDefinition.json @@ -6,7 +6,7 @@ "config": { "isWizard": false, "basics": { - "description": "\n\n**Note:** _There may be [known issues](https://aka.ms/sentinelsolutionsknownissues) pertaining to this Solution, please refer to them before installing._\n\nThe Exchange Security Audit and Configuration Insight solution analyze Exchange Online configuration and logs from a security lens to provide insights and alerts.\n\n**Underlying Microsoft Technologies used:**\n\nThis solution takes a dependency on the following technologies, and some of these dependencies either may be in [Preview](https://azure.microsoft.com/support/legal/preview-supplemental-terms/) state or might result in additional ingestion or operational costs:\n\na. [Custom logs ingestion via Data Collector REST API](https://learn.microsoft.com/en-us/azure/azure-monitor/logs/data-collector-api?tabs=powershell)\n\n**Data Connectors:** 1, **Parsers:** 2, **Workbooks:** 2\n\n[Learn more about Microsoft Sentinel](https://aka.ms/azuresentinel) | [Learn more about Solutions](https://aka.ms/azuresentinelsolutionsdoc)", + "description": "\n\n**Note:** Please refer to the following before installing the solution: \r \n • Review the solution [Release Notes](https://github.com/Azure/Azure-Sentinel/blob/master/Solutions/Microsoft%20Exchange%20Security%20-%20Exchange%20Online/ReleaseNotes.md)\r \n • There may be [known issues](https://aka.ms/sentinelsolutionsknownissues) pertaining to this Solution, please refer to them before installing.\n\nThe Exchange Security Audit and Configuration Insight solution analyze Exchange Online configuration and logs from a security lens to provide insights and alerts.\n\n**Underlying Microsoft Technologies used:**\n\nThis solution takes a dependency on the following technologies, and some of these dependencies either may be in [Preview](https://azure.microsoft.com/support/legal/preview-supplemental-terms/) state or might result in additional ingestion or operational costs:\n\na. [Custom logs ingestion via Data Collector REST API](https://learn.microsoft.com/en-us/azure/azure-monitor/logs/data-collector-api?tabs=powershell)\n\n**Data Connectors:** 1, **Parsers:** 2, **Workbooks:** 2\n\n[Learn more about Microsoft Sentinel](https://aka.ms/azuresentinel) | [Learn more about Solutions](https://aka.ms/azuresentinelsolutionsdoc)", "subscription": { "resourceProviders": [ "Microsoft.OperationsManagement/solutions", From 400be6257cd02f745eda2e1c79cae24e3e170042 Mon Sep 17 00:00:00 2001 From: PrasadBoke Date: Tue, 5 Sep 2023 19:03:22 +0530 Subject: [PATCH 11/18] Release notes corrected and V2 folder changes reverted --- .../ReleaseNotes.md | 5 ++-- .../ReleaseNotes.md | 5 ++-- .../Solution_MicrosoftExchangeSecurity.json | 30 +++++++++++++++++++ ...crosoftExchangeSecurityExchangeOnline.json | 23 ++++++++++++++ 4 files changed, 59 insertions(+), 4 deletions(-) create mode 100644 Tools/Create-Azure-Sentinel-Solution/V2/input/Solution_MicrosoftExchangeSecurity.json create mode 100644 Tools/Create-Azure-Sentinel-Solution/V2/input/Solution_MicrosoftExchangeSecurityExchangeOnline.json diff --git a/Solutions/Microsoft Exchange Security - Exchange On-Premises/ReleaseNotes.md b/Solutions/Microsoft Exchange Security - Exchange On-Premises/ReleaseNotes.md index 90b2d92ed28..53423aeccb5 100644 --- a/Solutions/Microsoft Exchange Security - Exchange On-Premises/ReleaseNotes.md +++ b/Solutions/Microsoft Exchange Security - Exchange On-Premises/ReleaseNotes.md @@ -1,4 +1,5 @@ | **Version** | **Date Modified (DD-MM-YYYY)** | **Change History** | |-------------|--------------------------------|---------------------------------------------| -| 3.0.0 | 08-23-2023 | ** ExchangeEnvironmentList ** parser not correclty named in Workbooks. Correction to call the good parser name.| -| 2.0.0 | 07-04-2023 | Initial solution release | +| 3.0.0 | 08-23-2023 | ** ExchangeEnvironmentList ** parser name | +| | | corrected in Workbooks. | +| 2.0.0 | 07-04-2023 | Initial solution release. | diff --git a/Solutions/Microsoft Exchange Security - Exchange Online/ReleaseNotes.md b/Solutions/Microsoft Exchange Security - Exchange Online/ReleaseNotes.md index 90b2d92ed28..53423aeccb5 100644 --- a/Solutions/Microsoft Exchange Security - Exchange Online/ReleaseNotes.md +++ b/Solutions/Microsoft Exchange Security - Exchange Online/ReleaseNotes.md @@ -1,4 +1,5 @@ | **Version** | **Date Modified (DD-MM-YYYY)** | **Change History** | |-------------|--------------------------------|---------------------------------------------| -| 3.0.0 | 08-23-2023 | ** ExchangeEnvironmentList ** parser not correclty named in Workbooks. Correction to call the good parser name.| -| 2.0.0 | 07-04-2023 | Initial solution release | +| 3.0.0 | 08-23-2023 | ** ExchangeEnvironmentList ** parser name | +| | | corrected in Workbooks. | +| 2.0.0 | 07-04-2023 | Initial solution release. | diff --git a/Tools/Create-Azure-Sentinel-Solution/V2/input/Solution_MicrosoftExchangeSecurity.json b/Tools/Create-Azure-Sentinel-Solution/V2/input/Solution_MicrosoftExchangeSecurity.json new file mode 100644 index 00000000000..81fbe66e8f6 --- /dev/null +++ b/Tools/Create-Azure-Sentinel-Solution/V2/input/Solution_MicrosoftExchangeSecurity.json @@ -0,0 +1,30 @@ +{ + "Name": "Microsoft Exchange Security - Exchange On-Premises", + "Author": "Microsoft - support@microsoft.com", + "Logo": "", + "Description": "The Exchange Security Audit and Configuration Insight solution analyze Exchange On-Premises configuration and logs from a security lens to provide insights and alerts.\n\n**Underlying Microsoft Technologies used:**\n\nThis solution takes a dependency on the following technologies, and some of these dependencies either may be in [Preview](https://azure.microsoft.com/support/legal/preview-supplemental-terms/) state or might result in additional ingestion or operational costs:\n\na. [Windows Event logs collection, including MS Exchange Management Event logs](https://learn.microsoft.com/azure/azure-monitor/agents/data-sources-windows-events)\n\nb. [Custom logs ingestion via Data Collector REST API](https://learn.microsoft.com/en-us/azure/azure-monitor/logs/data-collector-api?tabs=powershell)", + "Data Connectors": [ + "Data Connectors/ESI-ExchangeAdminAuditLogEvents.json", + "Data Connectors/ESI-ExchangeOnPremisesCollector.json" + ], + "Parsers": [ + "Parsers/ExchangeAdminAuditLogs.txt", + "Parsers/ExchangeConfiguration.txt", + "Parsers/ExchangeEnvironmentList.txt" + ], + "Workbooks": [ + "Workbooks/Microsoft Exchange Least Privilege with RBAC.json", + "Workbooks/Microsoft Exchange Search AdminAuditLog.json", + "Workbooks/Microsoft Exchange Admin Activity.json", + "Workbooks/Microsoft Exchange Security Review.json" + ], + "Analytic Rules": [ + "Analytic Rules/CriticalCmdletsUsageDetection.yaml", + "Analytic Rules/ServerOrientedWithUserOrientedAdministration.yaml" + ], + "BasePath": "C:\\Git Repositories\\Azure-Sentinel\\Solutions\\Microsoft Exchange Security - Exchange On-Premises\\", + "Version": "2.0.0", + "Metadata": "SolutionMetadata.json", + "TemplateSpec": true, + "Is1Pconnector": false +} \ No newline at end of file diff --git a/Tools/Create-Azure-Sentinel-Solution/V2/input/Solution_MicrosoftExchangeSecurityExchangeOnline.json b/Tools/Create-Azure-Sentinel-Solution/V2/input/Solution_MicrosoftExchangeSecurityExchangeOnline.json new file mode 100644 index 00000000000..82a299b1fbd --- /dev/null +++ b/Tools/Create-Azure-Sentinel-Solution/V2/input/Solution_MicrosoftExchangeSecurityExchangeOnline.json @@ -0,0 +1,23 @@ +{ + "Name": "Microsoft Exchange Security - Exchange Online", + "Author": "Microsoft - support@microsoft.com", + "Logo": "", + "Description": "The Exchange Security Audit and Configuration Insight solution analyze Exchange Online configuration and logs from a security lens to provide insights and alerts.\n\n**Underlying Microsoft Technologies used:**\n\nThis solution takes a dependency on the following technologies, and some of these dependencies either may be in [Preview](https://azure.microsoft.com/support/legal/preview-supplemental-terms/) state or might result in additional ingestion or operational costs:\n\na. [Custom logs ingestion via Data Collector REST API](https://learn.microsoft.com/en-us/azure/azure-monitor/logs/data-collector-api?tabs=powershell)", + "Data Connectors": [ + "Data Connectors/ESI-ExchangeOnlineCollector.json" + ], + "Parsers": [ + "Parsers/ExchangeConfiguration.txt", + "Parsers/ExchangeEnvironmentList.txt" + ], + "Workbooks": [ + "Workbooks/Microsoft Exchange Least Privilege with RBAC - Online.json", + "Workbooks/Microsoft Exchange Security Review - Online.json" + ], + "Analytic Rules": [], + "BasePath": "C:\\Git Repositories\\Azure-Sentinel\\Solutions\\Microsoft Exchange Security - Exchange Online", + "Version": "2.0.0", + "Metadata": "SolutionMetadata.json", + "TemplateSpec": true, + "Is1Pconnector": false +} \ No newline at end of file From 5ab5b50c58f85bd2229f7b78fabc21ca0bce05cb Mon Sep 17 00:00:00 2001 From: PrasadBoke Date: Tue, 5 Sep 2023 19:05:14 +0530 Subject: [PATCH 12/18] Update commonFunctions.ps1 --- Tools/Create-Azure-Sentinel-Solution/common/commonFunctions.ps1 | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/Tools/Create-Azure-Sentinel-Solution/common/commonFunctions.ps1 b/Tools/Create-Azure-Sentinel-Solution/common/commonFunctions.ps1 index 7a0afcd9445..c397c6c4ae3 100644 --- a/Tools/Create-Azure-Sentinel-Solution/common/commonFunctions.ps1 +++ b/Tools/Create-Azure-Sentinel-Solution/common/commonFunctions.ps1 @@ -2711,7 +2711,7 @@ function PrepareSolutionMetadata($solutionMetadataRawContent, $contentResourceDe Write-Output "Missing arm-ttk validations. Downloading module..." Invoke-Expression "$armTtkFolder/download-arm-ttk.ps1" } - Invoke-Expression "& '$armTtkFolder/run-arm-ttk-in-automation.ps1' '$solutionName'" + Invoke-Expression "$armTtkFolder/run-arm-ttk-in-automation.ps1 '$solutionName'" } } From d7d713f5b852e2daf847c16b53d17a5b73738aef Mon Sep 17 00:00:00 2001 From: PrasadBoke Date: Tue, 5 Sep 2023 19:07:54 +0530 Subject: [PATCH 13/18] release note corrected --- .../ReleaseNotes.md | 2 +- .../ReleaseNotes.md | 2 +- 2 files changed, 2 insertions(+), 2 deletions(-) diff --git a/Solutions/Microsoft Exchange Security - Exchange On-Premises/ReleaseNotes.md b/Solutions/Microsoft Exchange Security - Exchange On-Premises/ReleaseNotes.md index 53423aeccb5..b22f165af6e 100644 --- a/Solutions/Microsoft Exchange Security - Exchange On-Premises/ReleaseNotes.md +++ b/Solutions/Microsoft Exchange Security - Exchange On-Premises/ReleaseNotes.md @@ -1,5 +1,5 @@ | **Version** | **Date Modified (DD-MM-YYYY)** | **Change History** | |-------------|--------------------------------|---------------------------------------------| -| 3.0.0 | 08-23-2023 | ** ExchangeEnvironmentList ** parser name | +| 3.0.0 | 08-23-2023 | **ExchangeEnvironmentList** parser name | | | | corrected in Workbooks. | | 2.0.0 | 07-04-2023 | Initial solution release. | diff --git a/Solutions/Microsoft Exchange Security - Exchange Online/ReleaseNotes.md b/Solutions/Microsoft Exchange Security - Exchange Online/ReleaseNotes.md index 53423aeccb5..74460254876 100644 --- a/Solutions/Microsoft Exchange Security - Exchange Online/ReleaseNotes.md +++ b/Solutions/Microsoft Exchange Security - Exchange Online/ReleaseNotes.md @@ -1,5 +1,5 @@ | **Version** | **Date Modified (DD-MM-YYYY)** | **Change History** | |-------------|--------------------------------|---------------------------------------------| -| 3.0.0 | 08-23-2023 | ** ExchangeEnvironmentList ** parser name | +| 3.0.0 | 08-23-2023 | **ExchangeEnvironmentList** parser name | | | | corrected in Workbooks. | | 2.0.0 | 07-04-2023 | Initial solution release. | From cc16f548bbbb98d32cb16ab0c7eb12de1f64109b Mon Sep 17 00:00:00 2001 From: nlepagnez Date: Tue, 5 Sep 2023 16:09:00 +0200 Subject: [PATCH 14/18] Text mistake in CreateUI Definition file corrected. --- .../Package/3.0.0.zip | Bin 67594 -> 67617 bytes .../Package/createUiDefinition.json | 8 ++++---- 2 files changed, 4 insertions(+), 4 deletions(-) diff --git a/Solutions/Microsoft Exchange Security - Exchange On-Premises/Package/3.0.0.zip b/Solutions/Microsoft Exchange Security - Exchange On-Premises/Package/3.0.0.zip index 8785be4689d8f92c2e0f1feb2aaeafebfd8ce508..b50b95b9b6be0e8352d2605255f1bf36d071e9f6 100644 GIT binary patch delta 3560 zcmVbV`uOvYeGx7}(LFgitobiGTlhbPSC$7it2+0wN~| zdZDfF`yup=?P_t_Tg%ifVg28IS)9WzLN1oB{`~4RKg}OK`m1*0*`r77Pzi1YGh!|b zbDFuOU~{dMUdw#JW@4_5U^2IkD}^oCZ?!6sooDRSu+yA<{O})kM3QWEvo}Y=ua2A9 zxBbAc=k;<1XMal10++|tVs=uW?{9V=zc^3ed9*d+j(rw`9sNM5zJ~}ialUCSC zMF|ly&eB0c_{mZLhZ)}hv+T`TuGcw})|N5B{0wy0PHaVBV9?TNKX||jVH^itMIoUa zrDcKmAuG1UoNY^YjAsJ`vA_ij+_7nyO2MIm67JlQa8ZRwwjRvOaoR%e3gIgSH))^l+u0cr)( zt&UQH{(l{M`;HEhJVRD{3i3Z?QE1~PN-VgVR4!qJt%_U~S0hkFIQ{{Hb8@gd>_IX& z!h%b}op_p(kKzix7QzyPFiwL~@Tw!x*4bw$2R>$RUdueyYs+4&U<-c=39u~^uP-uB z6r4DU^|(38SGE6)<~7`bj+y)dcf_&(ca&-Hq<`8>V2#|_Ny;4`SzVe$*wNb4GZMJ2 z9Uz%AAak#@4s?U)YdBj;&h}w8=pvB}oF2V6K4H_tmse9G@=<9!X~G>mMM+q5#0&Yg z<1_ob&};C@OQF=jt6jBup3^{!j%;_x9z8nb20SQzKgI9Y+MLa_KBJZ|uw{zo;bg*& zN`EE%L|pRC0aD8{v`0SErHj-#_@ym>KpX_8Fkt^++pE;>>*~q1M@e-u=nbRjVar(@ zKBB+^ov;8M-=Vit3S4jE5iAai-v(v0jUG+vo#S0Eo5)q=ZtP?YlC=c~)tMAw_X)WM z66_VLwU(g6xneK`IhoMNIk*JdiwC}KK7ZcFB2zlyo#KMv&QZlKb|8+BDYy}g&wrL= zc43hrTMM=jVCBxcNpw)4tlrOpB3V|8qD9^N7E`^Iv~s3Izzmm=9uD*yqswB8evWSO z#km9{%n_0}Q^pI0pVg1BaDz%})rjFq4wwh|1|AQluWMFfs@$d!ZG=^;^>}KsX@4QX z6rItkJxgnKB9V(8IsUm+h^^Rc(?|@W%#u4MkSFw`DBPn;28@INK?%KqNLy<|9PvU_9x=wL@!voyY8F=3D zzR|@#V3^iu#b-j{@NR7=6tpb0N=5YQ^Z(nsT5Oq?mAbIN<bX28316;Zk;I^j!3`f3XYr(FylqvD`elBM}Mbn06T;63WpC_HEzJ3e}9Ge2{E4S zJAHsLsp^B19}HP&>(svi4CqTIGFqp=IMuJTXy?aMFZ0vhv(w%V1b-MtvxaQvv^PBM z5hdNd?{{G7w-@vjbz2&dZu^K>VvS3R2UUvpHh2#};l;Ji1HEcehvRN-x)8HlgJz1S z;zT;4=E{-6gR-qichRADQ-AgZpxn9JiZ_?q#|e!7BZPvpttqs`vIOR zstpl_%Q@sG2r4Z^JD5a>%x^R9wRwCWf3^eN&CX%BK8MR?f9$dFmVe}Hg?cjX$diJ9 zZKXXmOx;@SGIhegt%JRkou?14R_((Kxr1%Apq1(k+0h@TdvMsGV_B2@aY`!VR)RPi za9=HDtHmtxl{7j>k@f9h%w9Uo?=XwQDozT>4>B~0h~ACoLZqamGfc7b67+wANt@Ce z7zy5;wu)9AGvcmd41d@JHmnL@6CWA`8j%6tld0Qur@BnW71|S9+Ruh2r~V zuTXwc!ImC)<}m}O(h_^+v&^a)G@`N>$gVF=-u6Z{oZ)t>J{ig#D_Dz-QLW+`GjJH)#0z;#)M1KZZcZ#YooA4Y%Cr=pU)+ zwX)N8O4v=|ZGA;e*#rBB&NMI(13()6J!NAU*B6K@>KhlCSC?{*n000o0=@^(+kkh> zu8B?1Y+U3@0wH$}A0Yw4DhNZvSTbrO@7D5NK(ES$196P1 zn1AFVVB3X;6-5CF@(K$>Eb$k0%`O!4AvF=<*4Ap4iEM^Q1PByZ8fr$zH;(8Nat}=a zjzR{F^RaP3)mNF#jP#cyb%xTS`Y5C`?K z-UuMngcJ)vv;#-x@TEW~Jawj5+y`tJndwx{EBmo`HK6P3J`ZX-Pw&@s$Y$8opWo)Q8-GoA z^_GS{gwecyFrz{3?DR}sCF2NY&NdhC4rpUUtfc&4WXYMgII=RJY{-NyL?Wr+3yXdK z@{oN;S#V_<&<23jf<1y2SJqYqymc$!Ss%J!8@eovs5UE!H^}}QcEl@tg}JgWf#b;B z{W~Y@1Tpxi)mla%Lq9vC`{I6$u7B2wqv(xfH1|`juDdQyLw^odmr7eGzVXVn1Q4S< zkO865CE6uMg((#`QkT)v<=f+ez40Z_PJ2RLP9!T8`9$$$j(ICTz^yU1Mua^iLLBr}zRCZ|DIn5~%aH z9@RYtg$5NOEn!M=j!&pUbi~)&UOxWH1EaGz2fvR~Fov*5h7WYh7=-#c>jNHjvTu!q zV+Phd0A^G0Gl-J6I`9$wXV;RSu2`^72Jh9xLku|jisMRcsAh$HZ+~}@M&V_2RceJE z{8GHk@ezu@xCVy|?D_?&SA^71ZHKT3vlaH_F$2&8`UN3FW@3*21?ZFYs`+RTg#S@L ztJ9?`%Jx&m=JDnzdcxd$L)Y~EJHA*1IpRCRyS`c+0xAQX7iQ42!?69j+4;irMtY(c zcxXLO?6o)xAN|&l<`f|*j_KGfyo)87zNd@H{{m1;0|b}52LT$F;|Bo|v(pW!`3|~( iC0ESQ3WJ6X004S6mx>1gRROz~;0FOD28Ra$00011z|U#` delta 3529 zcmV;)4L0(jkOYd51Q<|D0|XQR000O8YnLTgz#za5Zw&wdUNw;zE`Q=UcWn_gchK4H z)u_`mY~SUB9UQ1#N@C4j?vY%{$~8d#MuGNAe_DP?XNLR2mDaDZoooFe(2`toIDBU2 znOWxNU;m1+&Tnlr7YXmYWSzNlnSD7L`IceAQ$7=kNZpXX%Z(UDIw|_>XnXj4xHHI% zSV*xP?Ha+I`2Ju|On+r6oz&^@b*`NJAsPPN>hw3AKCLz9X{?07wO-4}Xsf4gIHtLS z8H&LRVJu99gByz#-5EDL5e^2yh@Y_u8Y7)f<*aUiCTZWucihC#IOWQUe$_MKRz@}) z42`j{k&&4zR{oPrX3U!C)p?~I!$p9pNo)nYWQFXq*+u7c~jNs&F0)C!|C^yor;OC&(^IbYPG9r;y z*ij(~2{KILUM=|PT)++!zJkrNvx`(OQzos=LxK4PVAqapAz-;dOQZeZ9?OJr9I%Q? zLOn{$O5yt~+f;M1sof!-4G6@_U9fU@Y@El^F+e-pC4WTbhLesDQj5o1D;-Qst=6v9yqZ7uNEf-TFwJ2p~^g_lYAueL+4G#9^?9jvL`!p6tt#H%T`LI(F z%~K6COIQ*h9Rtw(&Oj%XppIWaH)pZP1k92~D~7EN{JCJJKCNzbBAA}yIM8SHF0Ld1 zR-oPDD1Rm3@5tMCaFFB~lFCz%|H-pV8#hv7#?`2B2?K0ZD&klE(urSaZEmnD|ng-OB;l78bHB|j!0W)U!orPke$7eX{?u)?Jr;ne+m(7TSOi& zGL00RII8ueKFZgX{|w%%cLx|V>DumS$Nt|zqJP1YYBPd4QfEgocYI)VZX#g^OE1qr z;JmhnVopHJ-P}6B2FX|NY#}+@gSP>TBr@#uc>m;-jgJnlmqw(6+_uVuD|m^ba?SzI zcrE*`_zg&5gSVz51KZqVS zpM>Ef2rSSE6VUM;c{`=Rbrz0bVOadG1f#8SG^$n(SH0>*t_pW!M@!JG%{V}3l$EQG z$Tg5+ubHhe1s%>cgCWSth(=DqCD=|l@PBRn@IF+T(h+Y}7X){X5L@p+9wB3JBN(6m zBFXH^N&0Ll*i3+xJMSjZK>=93p9LUUR;i*P-TTI-Ityv#M2V6!Tp@aSpx+vuXB+Z! zbc_3!5{xiKO5#i&PE`IZev}i}tfYcQNKaDWJh*Szv@(psHL+(m~R|5PgER&27WH3m^;&K(oDC-kGJ+~YzAjFbRD3B7@c8*@V( z^9~nhKbsNLGhGN^fmaoL4UzbU+ruIkJTLR8ZrefbFE@eyHDtRAdX+L^co6cSTRP9wUkORh3BqQ6+j|D zguNpqtTRBsoZUE6G8_^Az!e-h9bm$%7xH z?~o+zz3;bR>bGk+MQlqW;!PhBYOHoi;h+L&Z%gk1EIhl>d7xK~s&L$nrnQ*e7&K8l z7N^pYG}n$4o|J7wx^;)%E`Ql`pmLXPBi>wTAEz+-8wdp#8?WfhN6n2;g45v|CEzQ* zThM%Pc}vZ@J3WS?v065uy{6O6>Y2RfX(36k*n7#=hisom^MEX`tp|K6 zD;7i=E~k*2AgQzv?cgP1WPX`pr@6=X;bSw<-R>NAs&lwn_a~kUZ+~dM0@U+iOP*Bv z*GAe?(bSE}u7VT(Z5-^C+j;TyuxcJ=nLF4T1&vg%&yK$t@4{gN#*#YuZT%J*9a?+{2lHA+nOx2Qjx|?Kq|YIqK|M zD7Q4c4Il3V^)K#-jT>RV6TseA1%ezBwR8xHEF{xo%<>)y@L#rWie9)o=;^gM)*H# zp~5+^V~Eu-#*zHsfpLRXAs?>UB&R&XS2Zk_L&!e76`{dG%M$Ghn%R;!w?fqs6hTlV zndd3R5fC!M(i3=e$iTsZ(4^7KV3;&WyAv#b@VW|-+B`vFR=$W;SC(Mrk01WksnLH&&EtZtbA%Bwy2V}MlSIAI7eCDi*;mMYp`XlZ&XY^2{NTtE=logoW%G)6{uc+&FGH`Lt_x5xe7R?&j zX)`5km+-E>qLS>1{X=USSPBC~8vQ+GV;I+G$SbNZE;21X$~oGsGpjP-djh>lc!%tU z*aXeS1+JtN!x**8!GEPmuF4M@1B~Bf;&(IcJE`;e?KOF0 zJZ`BsfQ}$O92vQgO2G3{x;Z71w+`C)cU@LdZRGRj6Qy_Q1NDw&#L>3E?7|X4K)}E# zEl_o-h^Ni@LSX(2G#V%#eFO)pokIEyc9zE6#6I_q1%6;8p%|s#jp^HnUXcrz!ZE61 zl7EYUWoH^@6d5GQ3oHz=$bYD-SD}~>sfj4R+FH#LkxY<@fPex^L-pwJizE7k)Ke3n zqmV)4``9?6>Z?p9M*5E-pL30@z<1v9zOzI2-7?FBMZNUJrD8bMA*88+yG zPp3Z2!pKC&a$2C?{sLhC;&EY5cxPj;`_+R3zP(;bL!SchZ=MYBh^$tx(pIDmh<_cV z_-oaAS{OMZ0T&D;y71OQ76Ov>nXs9NB$ZfUvL6nP*!Pro7O;jkpokW12`sR%lp@3| z8zIK}U;)d}=ea;?vyk}B)<46F_>o*;cB*sOabT+cW)XIR8ho5+Oao#)vB7-txCT?5 z=y7nPFnIS-g54Wr!RM%bFD+uG(?tlAM5Ly>w zpH@L=m+-C?gi5ksLIt6DSF#k1nH+1)0>~A|+pag210uRT6V|C4GucNh3)I^Dzb^~K z!ePx1tHRvbflt@IeselZq90}a>Ihwt8dN*|(ckM1@37xs-=CoVhb$u??Rd?ln&?aX z;w!UU@zyu)8xbp^KU+i`<9{tj{0a^HjA)dv>=(6qa_FjzkHq4{C0-LMV;bI2_WJQ< zeT=E%68t;9f}WoRI{b7`e;m`+YG1*;0r>AOvDubo69HTs(z>$g#S@p9n-nX^5%8C`hwyhxTf1VqfgP@d)~?e zJ>p%u``*m!i=T2}XXP7owXR%#S+Bfyg^#Y`m3wGh!Rs`3Rz7qaL+ZLtT~ diff --git a/Solutions/Microsoft Exchange Security - Exchange On-Premises/Package/createUiDefinition.json b/Solutions/Microsoft Exchange Security - Exchange On-Premises/Package/createUiDefinition.json index 409fb86f0af..1c8da416924 100644 --- a/Solutions/Microsoft Exchange Security - Exchange On-Premises/Package/createUiDefinition.json +++ b/Solutions/Microsoft Exchange Security - Exchange On-Premises/Package/createUiDefinition.json @@ -159,7 +159,7 @@ "name": "workbook1-text", "type": "Microsoft.Common.TextBlock", "options": { - "text": "This Workbook, dedicated to On-Premises environments is built to have a simple view of non-standard RBAC delegations on an On-Premises Exchange environment. This Workbook allow you to go deep dive on custom delegation and roles and also members of each delegation, including the nested level and the group imbrication on your environment." + "text": "This Workbook, dedicated to On-Premises environments is built to have a simple view of non-standard RBAC delegations on an On-Premises Exchange environment. This Workbook allow you to go deep dive on custom delegation and roles and also members of each delegation, including the nested level and the group imbrication on your environment. Required Data Connector: Exchange Security Insights On-Premises Collector" } } ] @@ -173,7 +173,7 @@ "name": "workbook2-text", "type": "Microsoft.Common.TextBlock", "options": { - "text": "This workbook is dedicated to On-Premises Exchange organizations. It uses the MSExchange Management event logs to give you a simple way to view administrators’ activities in your Exchange environment with Cmdlets usage statistics and multiple pivots to understand who and/or what is affected to modifications on your environment." + "text": "This workbook is dedicated to On-Premises Exchange organizations. It uses the MSExchange Management event logs to give you a simple way to view administrators’ activities in your Exchange environment with Cmdlets usage statistics and multiple pivots to understand who and/or what is affected to modifications on your environment. Required Data Connector: Exchange Audit Event logs via Legacy Agent" } } ] @@ -187,7 +187,7 @@ "name": "workbook3-text", "type": "Microsoft.Common.TextBlock", "options": { - "text": "This Workbook is dedicated to On-Premises Exchange organizations. It uses the MSExchange Management event logs and Microsoft Exchange Security configuration collected by data connectors. It helps to track admin actions, especially on VIP Users and/or on Sensitive Cmdlets. This workbook allows also to list Exchange Services changes, local account activities and local logon on Exchange Servers." + "text": "This Workbook is dedicated to On-Premises Exchange organizations. It uses the MSExchange Management event logs and Microsoft Exchange Security configuration collected by data connectors. It helps to track admin actions, especially on VIP Users and/or on Sensitive Cmdlets. This workbook allows also to list Exchange Services changes, local account activities and local logon on Exchange Servers. Required Data Connector: Exchange Audit Event logs via Legacy Agent" } } ] @@ -201,7 +201,7 @@ "name": "workbook4-text", "type": "Microsoft.Common.TextBlock", "options": { - "text": "This Workbook is dedicated to On-Premises Exchange organizations. It displays and highlights current Security configuration on various Exchange components including delegations, rights on databases, Exchange and most important AD Groups with members including nested groups, local administrators of servers. This workbook helps also to understand the transport configuration and the linked security risks." + "text": "This Workbook is dedicated to On-Premises Exchange organizations. It displays and highlights current Security configuration on various Exchange components including delegations, rights on databases, Exchange and most important AD Groups with members including nested groups, local administrators of servers. This workbook helps also to understand the transport configuration and the linked security risks. Required Data Connector: Exchange Security Insights On-Premises Collector" } } ] From ccf962c351078014e5a57a044f624469597fe4a6 Mon Sep 17 00:00:00 2001 From: PrasadBoke Date: Wed, 6 Sep 2023 12:08:41 +0530 Subject: [PATCH 15/18] Release notes corrected --- .../ReleaseNotes.md | 1 - .../ReleaseNotes.md | 3 +-- 2 files changed, 1 insertion(+), 3 deletions(-) diff --git a/Solutions/Microsoft Exchange Security - Exchange On-Premises/ReleaseNotes.md b/Solutions/Microsoft Exchange Security - Exchange On-Premises/ReleaseNotes.md index b22f165af6e..2c5f059d277 100644 --- a/Solutions/Microsoft Exchange Security - Exchange On-Premises/ReleaseNotes.md +++ b/Solutions/Microsoft Exchange Security - Exchange On-Premises/ReleaseNotes.md @@ -2,4 +2,3 @@ |-------------|--------------------------------|---------------------------------------------| | 3.0.0 | 08-23-2023 | **ExchangeEnvironmentList** parser name | | | | corrected in Workbooks. | -| 2.0.0 | 07-04-2023 | Initial solution release. | diff --git a/Solutions/Microsoft Exchange Security - Exchange Online/ReleaseNotes.md b/Solutions/Microsoft Exchange Security - Exchange Online/ReleaseNotes.md index 74460254876..b4b0e1d9655 100644 --- a/Solutions/Microsoft Exchange Security - Exchange Online/ReleaseNotes.md +++ b/Solutions/Microsoft Exchange Security - Exchange Online/ReleaseNotes.md @@ -1,5 +1,4 @@ | **Version** | **Date Modified (DD-MM-YYYY)** | **Change History** | |-------------|--------------------------------|---------------------------------------------| -| 3.0.0 | 08-23-2023 | **ExchangeEnvironmentList** parser name | +| 3.0.0 | 08-23-2023 |**ExchangeEnvironmentList** parser name | | | | corrected in Workbooks. | -| 2.0.0 | 07-04-2023 | Initial solution release. | From 001a5b91847498ccb801901a12a9de49af683ecf Mon Sep 17 00:00:00 2001 From: PrasadBoke Date: Wed, 6 Sep 2023 12:14:17 +0530 Subject: [PATCH 16/18] Parsers .txt to .yaml --- .../ESI-ExchangeOnPremisesCollector.json | 4 ++-- .../Package/3.0.0.zip | Bin 67617 -> 67619 bytes .../Package/mainTemplate.json | 8 ++++---- .../ESI-ExchangeOnlineCollector.json | 4 ++-- .../Package/3.0.0.zip | Bin 25316 -> 25318 bytes .../Package/mainTemplate.json | 8 ++++---- 6 files changed, 12 insertions(+), 12 deletions(-) diff --git a/Solutions/Microsoft Exchange Security - Exchange On-Premises/Data Connectors/ESI-ExchangeOnPremisesCollector.json b/Solutions/Microsoft Exchange Security - Exchange On-Premises/Data Connectors/ESI-ExchangeOnPremisesCollector.json index ba40af4132b..c10a4038781 100644 --- a/Solutions/Microsoft Exchange Security - Exchange On-Premises/Data Connectors/ESI-ExchangeOnPremisesCollector.json +++ b/Solutions/Microsoft Exchange Security - Exchange On-Premises/Data Connectors/ESI-ExchangeOnPremisesCollector.json @@ -75,7 +75,7 @@ "instructionSteps": [ { "title": "1. Download the Parser files", - "description": "The latest version of the 2 files [**ExchangeConfiguration.txt**](https://aka.ms/sentinel-ESI-ExchangeConfiguration-OnPrem-parser) and [**ExchangeEnvironmentList.txt**](https://aka.ms/sentinel-ESI-ExchangeEnvironmentList-OnPrem-parser)" + "description": "The latest version of the 2 files [**ExchangeConfiguration.yaml**](https://aka.ms/sentinel-ESI-ExchangeConfiguration-OnPrem-parser) and [**ExchangeEnvironmentList.yaml**](https://aka.ms/sentinel-ESI-ExchangeEnvironmentList-OnPrem-parser)" }, { "title": "2. Create Parser **ExchangeConfiguration** function", @@ -87,7 +87,7 @@ }, { "title": "4. Reproduce the same steps for Parser **ExchangeEnvironmentList**", - "description": "Reproduce the step 2 and 3 with the content of 'ExchangeEnvironmentList.txt' file" + "description": "Reproduce the step 2 and 3 with the content of 'ExchangeEnvironmentList.yaml' file" } ] }, diff --git a/Solutions/Microsoft Exchange Security - Exchange On-Premises/Package/3.0.0.zip b/Solutions/Microsoft Exchange Security - Exchange On-Premises/Package/3.0.0.zip index b50b95b9b6be0e8352d2605255f1bf36d071e9f6..dede4c3fd0d0b8c30985c54b6d72c249f87e52ff 100644 GIT binary patch delta 48287 zcmV(=K-s^ckOZTU1PxG20|XQR000O8_+Tcn4Y&;roM9$cf(;mdpZNd)V6)N<>OOz( z!JbX4a=;QyR;!;9PAj8NS@fjlWDQh)v6!Y@Q6&>0*G=XSzf=8+<#>T|nSwD9;2g3P z+N>|96S7E$EweVdpw#9f1CYBKB?GXe22eSe!M=NB`l(c}5WC_>#(LKt zIinMx7|;4s3IugHtd?BSh;tTW zK9CTj$MJHLp=(CNHz8=MOFYgqU{XGeGoLkP>l8_ThtaZ}Zp9S}qo&0)uN{DtB^RYU z6EnN^=*O}*Sqj!7#F%7JJm^wHow`J>U$`3)C%xSxqAvOz=O= z;AD2_J)TyPU$IuWYi6SIT1)=GYZWp|45f2z&4x=p-m^8b8WJW$cDaWYv@Af8f?RGz z;0fvx=AbP=?wQ;28A+|+NdrN2Z*lUK3w$Y>wJ3Bd7eT?T6Mu?+hSE;5wD{Tk&7CJy z96x|-g3mV#Axj++&Rr!GaYlaTM5iI%Wnl-n6x(Rjj6dPov<1i0eR>K>lZ28t z{5DYBg3~Z8&{P_j6p>zfA*}Vk7RyL?laUfTv-)?UAd?$bG`Eyq|!QxQ- zRs~{wV+&{>4@|H$E=IqEij%CCkUlg_l<+-wW_Wi`EP_Dv(9g9)mR>JkzznnbX8sin zkWYz?IDi=hHm4R%zTG-b&pRcq|svDn}_|5T8w=a_@zQu z3EH5TeJ{_HCiA;DvkQOmR(v{-xSF#^2clVZ;{J>P9iLzmvlv!^1MIU9FzHd?>ePv#dUD#}c+ zL{3?5Z5~=K(k}|2OuQ_ZS1m0>&!AMh=wxmUTLXW~b${ha*haXR;~CXLq$MV&AO{N% zgZxF@$YY;X>SFpl)|H#C8&J865epqM%aQ+UNqO7>E?j@m+;pA15!#FB)(LkMeEL)E=X1fjleM44Chlf+RRNbWm%5U zLuYHtoM2j-YzbIX%ur<``Qka*$qdz0N_MT(TA~t>&$CIQxsc3&q-r`V({;M~te^BO zU=-_0h0K3tp`OeNZsqLr9DtGwGQ`v~~=tAl|1qTeg-7D8{DvGN)ZB&*^Q1 z&|m7`;@My(VEVMgvg$zs_^C`gY&gjToF$UZWuJc+EJRa^d%AXJ2!;gudI0JwJlXUy zPD*8$_ZrLkS}*7Mr>KfS8P6>>J>-#p;OX15A(mGTr8Yxt(b3zQZG;lrU}ZKzeOn;0 z;F#C`vNgZ@TA%1FXKgQA)63TK<=61?L!&FwNR^m3A?Vdlr7feblX9xTY^fMI_WW(ujCX`nRhK6s4F^UWMZ+Eo+|pPPZOmHTcEDX(=AIE%l33o`N55|r%@~3<%H6P6`$f+$J0AYQfQ^8bk=|I zbk36WdE8StU-0zJ3Xbm9O%Bd)IYVdcBfUAq<~z4Yn@8@Vy98oeL;DWQzf<6kM{IPf;x}7 zuvIy|P~lWamdSXjaSEh_|I5xLn3{h-HeE_jbCi>%?DWR6RH>s4nw-k0E!gAamOJqfiAMLttzJE^N^WAUn`CidI-%?tbd^}$`E=Hh3{&_F4 zm;IJ5^5*O$UiMQ7YMF&6<;7q94c_{ka@4Zity*OyX<+qtfifm-R#%kKCFOryQab>; zKgu23rAIpGm5oVE8%D=dIvH7dr?v0#+K5H_l* z*j6Pcz!sE@e>uMh$qD)R1C4&Qqw(z&)}&445QDd!EiGRo@?ph-6=DMc?`BiJ7I*%MJ^QXBBo>7j9`5j`sh2T>nW})*33@d9Vq4-Mzi-JtjQn=QNP0qC zce0skaGNL5&(cz~5cM&kpc^(+#?vxNc|beg8wZbG?7T|0wQ(4Y&eyPM8$r z>kVMAtgQ_U94ZXfJ4F-c&Ab;J~P(g4m;7YoWHh=mi*wEh+v{+U-y zg@Y}~GKF~BR~mFY$^X%ZCMX0`bm(lxFI1DiU=7SDKAF-<vbc# z*g|JhvT6zr7dU^e1Ol+xz&7|Oh1Q?V5v4Bt#@z6DLE9eg#07(tZM4wV`>0NCBf&EY-%Z}$qHL(wE}F(hj+d4v-ipK?>!56 zRpF4~z4H)PnRt2dBzS*|BpHTeAj&0&I?(i$f|-Bq>O=ryJsK7&tZ}{ZFEm7P z)BEfa=K<_kcf9E>rqj%zVgxktEklB{f#kcmA#lLI@09iU@-uAi>vc$ZlaHVUH~$0Z zh3gla*7f!MzuRJiO|ZX)Oc^5S?yBR%CczE@`{Co1dN;5rhcx==xRVJiA>Np78phZ) zQF?0&VJ3ed8Jcd1x#SZ|kgJReh~vx5AjzAX2Cn6UVDSkP1DfsAPmoJQ6U0rvXitomv*v+gsX~eqOfpn`*VFpY~yAH@J2eNTBG#Rc2L7o1$3vkL5Eh($M0xWaDI3AN8oqRWB!mpSZNbUP6cY{0h;7dSQviA%XnRlraRbBrDW)`8RR(w=Vv#(v{u1 z_*)l$>*8-+{H=?>b@8_@{?^5>AybA(>*9ZJUHtsjBl*Q!7k`0^zk+K&$E9y{<)?gB zRb2NuE_=;gq?|>o+u0Yn;A^3bL}y>|MUG48r>8y+Fj$divONx9bm{ytP6K4GwqK9a0Ol+AEBNzO)!LH$^`CzR zNbs)_M(xOeYMC1$DDN~8DEMgbl)~nV+d+nR-A=b7oz@@6dS7^JA#U3y6ZB!ghE+8` zO;=-EGgwoZ&mq57_nO@Y3PvV{jk0p$0LDLcCs-e=_jiwWp+)2)j0kp=hIU(OCh_(# zfhWP6NF%&Cb&8j0Zh}PuI^PW^i{E~GU_k@6EO4E7a)mmK`DI~$_xwWL$hm*reHmZR zxvd;p+JBO8>3R&sGuvHQOho1MJel z8J1n0$hT=!@OD2ZV0gWhNpj8VI*qidYkgi z7O}%IL7f(|{dW#DfMup`40*ut8N`e$omS?CoU7RSN_cRO^9_5FTuNDlj{Gg5ilCEp zhye7kOE!~yr-cS`@Q>pJ<_fGMdHpok^rjUXLl{g~@JAm*E}w>)TMVL%wk7o43DNm9 z_R7l8*@^n|lC5ALL%o06X*y5}^_l(n5l!OFz`jQVo(oYd?g2%^GkNWDJbnOC?V@SK zJteGNNepi0a|HJpc0bsNKgC*jh1Mx!45XFz>tiHdvg`8H zOa2RAvZdjK{YMZjq3*7L27O(`W zNer(xOW~%-1k2I&~EVFJEI?bd%5a zrJS>+-|H*bc~)`OHvK~1s=TubV4D`*rbV}D(KR%|O46beE4>MN-K^*;U*D_Pva7h@a9y(l+i>6HvmC~o# zK+KhM_D4t%9j5dgS(60OEMBZtxocBZtu4!6e}ZU=gN=VsYWqo5%UpkHm2Q)s)0KJV z5ZdL~p4vgu-L(o2*Bbe)gby;|ddv08Uj z7(Pli#_(Io#uzT2jbUCp$;z@Za^bhx7^QnERj=~iN|rVogFV;qYO^uwYJ!zyV-%Qs zP4h7_cvgST$H=s-tiWWO)j0zmFCSx7oBfsNV-)g2-JM3G9Y(ve_y%?s%kL=K;Kw%< z{4j43>IFX%I=+fmaP18LC6@UmgC7}qZSbQFetenW2X;5|{ZH-3G9N4aVUW&O6!bH> z2;4h&N^iJ1wz*;H;6 z0J#K&x3GLVh6)+^2P5Uk9I;VWj@dJp`Jl5KDt_z|hdS<<BA`stAba+qA{ z-;;j_e}UcJ_yCd4iG$Y?0=)4ejQp9_3%e^Y@L?X=U-mTg$&AiMKt)85+T&ZTc9*!` zc)DP@$@s-)k@q*Hcd*C8_W1B7@E3F9&PIXDClfmce1Zhl88=PV@q9BAaQQ0};%&_sdYiYJzZ#=u+c;kOZ6v6EDd%G+>+yzAh`+;Zgp&|+q{CNzI zh1A2Z6o8-pI#nBub7-po#mEY1uEQD}?hS|iLpreNXgsm@j`xqOql3Ohs!2rH-XF#riJ?panu?;lu(Y)OjyXBMX>*NLuer~DVW@^Xx53pOi#;ZwLiX2D& zl15;h+=P5W7$O|sD<2;9p;mb7-=EQmjY*{&&)6N9ze^0S`0#h(x74cQ5sY1FOg~lwkXtYQ7`Y@{lnALy&Xkr}?oFi*+I6fL4?C;upqoW41ikW|JC#QPq zUTS8=r`J&qF_XB;?8cK+`IN@rQq%Z*!UJM{E6-&Z-k$Io#UmNli19T~LBzk+!HjG( zc_QOFxW4u@9|$MU$J1B*%~C1(8YYP!hSYq~SnPSPb$UL%joO4Ykz#i%fYSW}F zcSNG@e4y5EHYa+^^a&I^F>}1@BxYZJl?aM$^Nc$G}$}oAMQ6WL4TyvdCKOzgmDq|Tv(fZ97?gd`8S*h+50s< zf`9tx=V3F1|HyroeES~$!3jXF`x`2nYX$=;FMm8!kN<^jB-o!_^^l`oR2SytI_^Y1 z&FSNfFaIj-!c;X>TqS>Mv#8(i_%}!3L;NSc|DBT*@wT#2%in}AiE>k?BI&*i(=Rb$&%@B~7C#3gJJ1>9UeaFR`3p00L#KD8$ z#`fIbVh4)t`~})GlyD|UfYo{&!ixuqN|#kYv4HV-od{3Hs`2#5l`ns>dbd!oOUAdp zA5sF$hy!39`2NilH2We#gpmbeX}cC1;CMn^Z{nwB0GWhXPO<%9VdX_m3yLlf#KMad!8uJvu(Jjwk!a7Tt4>$HUS7(eY%!+K%aT%CseG zrer{Z9BX1vVC;M2W7~f@Sn0@P&Nd8}zs9$vh#vv7 z9`Ehh*8Xrpt-bxdJy;};Cf5FFIJOTCsACWJR*1M*{m2hY8i``S%n(FHRxdMO2`HsQ z+^3X|Xn)rl(St*4Z*pW?$Ifxz+8d1z#)rG(A?>enZj@(MEr`jHg^?XZW~4tP1eXaI zNbWEtxr2Wq$(8;~Mj9o)O!+BQP8~NwU%psMB7uZps#p#_*GueT3F`aq?$M={ATPa}-%m@_=niCIngURoXZ_(|(2mval4zWdo zbz{4L5}8jaW}i%a<|L1BX+f$=I8a+)fiHaS;un8xt7y;v z9kXvkD%j*1`6rv)26V!Fnlkoef3kbCaEFHOz5LK1z9v!Z{`@$a+Q0_F5csa3)Yx17?_E#kGe)F{Y^1dH28 z28mBdw+>PYqgzuLL8L+6aY91gPf`VWenfxn+|UIklya_6V4tfcr!Y1eBw+p=F6=1@ z*o6Zjd8WT2zzAnWQwEg3bH`N88F@jGh$sd8HRYNkK~0z+v<6uP8}l`OqYPCooU!ODpNBc+N3M5<=h8otf_}rZmPJkg($H1>C&Y z(AN#)h=0amou~oK!vf5I066it!q9(Ce6HX$MOz`c@Gxx$6&i55g-BYM?&(-I`(UVr zDiWR=XiW-G{#l303}2R5>L6bNRJ^JLp=#LYEpyO6tV3-3`U|Q8cM1~56}B?#-ejB| zLIFyR?uIY_3R(e!i(Tm&z~}#x*#L_rBW1*`HiYaPJ9~839$2HpeaG568ti|=zH5(K zhX=a{`~8Fc-Q7kZ;ul% z=}$Oc^N%>gfAT)#tb0OdpbS5duQu_{U!bFNq>Lp9PAgqSy^Qt zIy1ye04yr|$wg(@EnZX-?A0ppwG|ejz)LhUQ>K_-%(h=lLH|vE&w3}7K=PGgtjBU0 zsNZ#k|EQ}{9 z99|4Ix0w-TUYj#wy&iwkZOjxgVm}5m-9(UV<&zV|4_*A{4Qx)?j~cB9spiJ7XqjGUx^n8c)dYlDzfqW&fGP8KSymmW5D@>Mpjxv?9J zFGo3(Sloz>bzi=H`l-dw{d}g{|e6yux_AWPwtfW zE4dK(@5O^)1B^%gMEM>n4 zUML-`J&d=jK$oq@b$~MP&UVCEFpu7g<6)7X2{uf@+#l{u z4tM)UBaUd5UJ@aMHj?+XI)Yd4bLD;zT!N~%8PspmXKm6u-c0-4UHVdv)%=K|6o97= z7IlBKdyGW*uz$RF*gv$bJsT9j-uQ56jdlkh`+a+Sw10GX&_8w>%6`7ge;tDG6yd`a zPV|?J3huR0!Fr1U4i#D92XbQm806Z?gVLpG-F8wI|N0u&zduMI^ouOY-$wKl&nr=f zd5nY~zalUs%$A4^F}iSvJwFTx3h`Q;+Eagi`>F4Lf=;-)fK72`9K7DnP8Hm=SGAB> z$9P5?$8HktY~$F~!L@O01*eT;FDEBoYaF{m&{$hjzWD$$?pW43bX*ov{M{JRxtpJ~p*yI+Z44TNBVl~XWtSO#%ySF{g2L~Lw zF}|_8T*RAmMVMiVWYmyz1>3NDP{9}*7r|JJSiVxEN_h@46PL3uAN2C4z{(x)0O1&hU)_DP|@+&O=Ab!iQ%89pne;M0;q%Gr2 z^T+W!tzU3Sk0kYXK_v0s*};E!GO+dz_IEA&c+$6qlpgFI*khZHnnaONwqTh_*|!W zg<&NK$A|e4*wV>O4hE|b6yAzl1yp~R!{VSmBsu?Ja@ZdnQECk)gR!+Y=sVVEd_1v+ zhc=~0`;*b2zt@2CrI~@8o?`xtE!jW@jPzJe2EGpVJN_2f?~4X|`zs0d*0Ute*d-xJ z-xBw~u8nPRY0tz4ASZvKmk16fp~cs+no=J+Dj_;afR)Z)13zKc7&*( z!k#TG2BTHXL>MKFiXo&)SpWs^pVd0#zGOxMruSgZGH-DwxDbD8-&o<5KengLfm8`b z7yo&)!}kS<5ZSEDZTyO5w1>7#k)>4qF8d0hddM+~l`gtC-q1VcDPeDb*7$`t@t!?W z0Prhr1`>0@0veagT~X_Go1v-`l+-KV5jI7`gM<7j(p$uH#GjfbNf|vJo2`&WMN`G$ z80JcZH;P3n=PZBU*_+~KXK&I`6U)B09}JlvvYHGvNR3lH!Z7xyKL6^;O+cwgSYF?# zL$}}@Ql9?iW2$kWsV<;Q6r}mVraJERFCTs2MILloW1LY1@z-Z zPY@X3r)e^$MHspZUv=@d#0~gx+Q7l;0|)$rWHEeG|j`HIP1UGUqQQD}&I!6@_ z_s7GrGZ|XW?s#bJ9l$?FLz`NAgX81F zj)sSOV{3Ph-M#J{Tcg2bY*B}foL&3)aJV~YAjoP1c%5{{#*4Ks-nm}b%G7B?7VG0P z{?8a_eJ?XkP6$0#S-fSp*`F%CFehsQ=*v_MbH^FxK*8i9;XjqEkIL+IzMjO`nLxz7fxQ!>yx7KLVUngs0<&Cf(#XV-77^C~?ck4H zcG*}!XMi38r(x6yiSYQRJFDa=iPGP#Hu8pzvSj)x&Ev5)20|+jb z5cb>+$36>Drdr`Y?8C=rH2f4ldAM<@m+5~3|H-*WQ@!UQGV;AYh1oS#P)Cb%UIJT$ zrdO~|E&|}{Wf=|kR)p;+ldvk=_c`@S$3mteol za!}@}S<2xO2Rzx`*?7kQ#^X1)tUj(GhV2oR*CWh?eSwz}kWJS7yImGg%=PW%%7lN~ zWwP`K-V!v{V(Q>UsdP36F8hy*kl&<=+u-;m<_T~Z9EJU26pDmN!-C4sFY{Y+(@0Hm zIpSaI^^tM8pKX{Flu$>jgfcneUxhBPKrtK?Jarpz$OREP-to0hw%cCh0>>^wayhqW zDg`6%@Est4dtV%0z^}6b_?T`)?^%ChNrEwaY zpDX1k@dT`75|jLX{q-h#LZ4NZIGxru~o2oYQ7fRs8% z#5CQHhmzIF$x)1XawX+FF!NoR8J1Z>_juQ`5q1tF z;F(O0?R6V{zV#n(sP~bxGD1-GukmcU>GPyq-~WG5yM?)rePfF}=x8&S zIpN{=tqYV2#QB{X%Sh;klKXA(nNZO9$d-S=(4*WPo{F2YSndq=%?M&f zCV@ZGL`m<`f};Qa)1SzdJqnYL{zOi75}p}{%7_Qt!Rf{(!1U4I6tNP*yS@Dy)^0g+ zX3enbEZB#iaz&X1D%|+640yes2$QHzVNJht9sCUN7(eLAzsalMX;&a19QJ)q^%-6u z7ce(RX?uTLN9x6cjz3t$NM_p;w;1UBrFRfe@%>+}fl~dm2~m8(KID7)bHAS;#v9|8 zl3B1K^-W}cKSv%eijlW#D;cdk?ZA zV+wYc3UgYelNS&>m)+h0>Yw6)^&6(HC{^tAK={oVA`}SbCJT__@=&%KJ^Gr%lzh%& zbMQoqjrei`OY9fsK<={gSU8}A3b{qYB_D}uh7YoP$hc7eoy8&?`0PXE$RPBy%QK^3 zaSMM4{Vh13;LND+eKQlY6EYB$lJN7<#X&Q`36Xy{9?=bL@~juVINte?s`+r59{RO3#?x1MzY3#c3NeE0OO{M>{ca$@bcAANQEKyZuVhp6>eRt(9^6 zl6%u95{sw3kEfbM!KR8&>dJ_W~k z{&?DF?@6@}2Do3p`JW(FmJ{>6uV4Ef}G&dFpko%(+)9d$DyWLxrtW)33wpMGvf-T2@Np4#MX;yAbn zUHz~B$N%^L{x6t(toAi2cMEec1`G++=zsekx$g-dv!q^?zf!nIk$D(ftxcJu)$5$( zY_)o!X2TS}I-=WZ_Q%ld)#;x#C7Wo-_>`Y5KNum7`C;S$^&qRRMey;TIAebwuMM`j z5_N=Yhs`WD`ij-oof|ITt@tc5HircdSX}xutLmp=CiG`^20pbfG}Kou_+K1wUe+h6 zhc!~ZHO*bAhF$7mY^bW6DWp~(6pCB&PeU<%o!-O)dF}U9d-Z+#8m$j`fB0`|euYP;9=IcIFlU$)?v55nlpjQh zUQs)GKA%tBG1LAg7R~Za&fKPJ)|gmx(?iu%XU8IHnBi#Bsj~;KT$g_mm_;uMfyPcA z5?Vc7De(zbq#*f7<;t0kL7AATy35E(3W!Nes<$=>NhRvX`&~^3i_Lf0o+EdCF)U?y zvs&DU4edaiVOhbuiRbwpzy5%Yj+8rQlqsED3r|vul$QVcU;p#}^`HLB|L{Nm*Z=%~ z{y(fzw~lXTD+TI5{oj8aM%fac1VW51orKebJEJor>*lY9-JCV7Yg&A|8I{#di|+r= z-n%Wwkz@yg?_)Oq5Y1{^Tr2|2`-R3H3S9}OCQqgHD-aez{@NYD?Z zvVu;XKnGNsUuwpw`r`Xy{2)v>1-Wl|ji{wYM|n!MLUMGsF|3W1Xc$Hi!^*wlvgdK& zGnv5I{=>ya(m2TGu(4SJ|Lk%ju*MwKJ$VG`XFY{NdQ^X0c?z2G%2Qm@Jp_%X_(;;H zlz-yfc6}=FS_Ys9nB_}U(bm)c?d!OyDteVQ?<=}q?6{;lpU#!@<$H+4v@_e2i1GCx zddnqX<4-9WGwvTxi&R`kWc8cH>3I~Q1dI^lj~WxZ;TH&Dhkp+apYO|W5g_p!e)~rM zZl}^^$-aN(4~+Z0I1_rDpF=*Mpk%~BQ1AlcAfyz7He^#NSKHNSje1qSBmsY644<-V zFoGI0SCfCgxI~IYLk9fm2IHXlgU^V=u~!5P{Hav9oz>3Uy%)ZN8`i#I?O!TuAE6He zXV`25m&4`_tG^L9tj6m3wYlF*S_Om8NQ7LCit2xI4lBYtn&$#nOJ;-G6qzcG;MZd| zjv*jUpt;K_jVcuYCo9kXSIgt8`Xw~y_$5>esp0yqZReY4>S5p;hDFLk=Ufwo0o067 zihP$!l;932zj$mcZ7@<~I=)9r=$`Ui7dkisKxBedlxH*?*KBaK!-0|^j$UnG5h$3A zY*&A+wKqD1@-+F&7Bpb6FI>X7c<)i-28X!IG!fa_vIP@&_!S<3vH-U1IN$O<3UExqU`Las1l|DiVKxfc#>lXrj2 z@zDE`=d4K|4o1m<2^T5bs)sZrA}M^iM^AuH>sugCfO`jF>}nWPUHUilyc=AnOm;9tf+WSi2cH5y*64*$EP0x6a*fK#|T44c7O zCwreLyR^0AZe?e>CsM#lIJaEhdrO?Gx8-7@70!K)t%nxJVI7Cvf}DDmt$)B)40RUb zC}r^Fc91m)qcoVrs2heA{P9OIG$SMXC6W18m=)$pOhU!}!S832=_BhuGE3JpIv zS6aL5u^NnKAv`ZIg-4XaCX9bDcd5whK~6dG#bCnkKTNEq0YRwQ{xVz!{*@j@mrM+a z#sNF>{gZ1pL?{Mqz8nG`NE2Ymrh5tMbwL4==H04AMXf)u(C8VFmR zjoHo>K*MPGq)a;|sJ?%Lb{2sG2{Zll1bKcKr|FEHOUc!Q3dty35=qT?0uK(J9~A%! zm60O0udLNiwgwiCFaGJ*?eWR6u6cNS_|!fp_7ymO#7U-Q>G03CeE3%$C{IB3Vl2@A zFd2=I_LhWC((2m>5);)QFm?n9l^?$crn@2_ZT~*mn!d3hq4|H2DI}_YD*e@sVRSus z$C%i6bBLR0^MjqdN;<^9H^{5#{ana_wyyAHLBEBBPwm4`@B{^Y1>Pp`Ut7y%n3CxG z-5j3ufP2`=Rhwcjbf|k{%ewjKFDFSj3+4f6Hq5~p-=J>=UMhNVd=uy;@7Yb>A{n`6hca5?$3Yz_n80q zeGIoxX1%n%*6A(@jp8izq154&0hxlzEY_f)B)r+b^N)z>*yFYq4vp>x{v9aaQ6}~^yT88&jjsU6$4@o1m1JA&oLhgJ#X4b}_LjADUtPN^4uiqZF zyw)&md%a*dV1EXUsM8#_!`gtXS9#!fXU}VOdiBnr6GUz9=e-)(4Hg4s5k@0o zJhpYPFAol$E?mSQ8q_+&LDw6GT?RTMYo1>VnG{@SL@XGDwV>0v)kQqZ3;;zn`Yek( zc>3ZQvA0R|nur=7T)rsSXwI{88oRG9W1e4t-F#+KvAkWm^$n|1l}|gALVda#{^Eo`q+Qaiak6A zBOCj0a*fhF(81qBPP6FDpGZ^NFaaR~{tATqL7K1ja)=d#c;R*KFh*uC9NPKe_$Am2 zBlyJuH$F5{`W#cB)0J@WLr)_KI%^Mq@6Da?FuXvAR+#Aolqp~s#49}8r zJjH_Y5*p4k5F$qa!=OQ-9y@;q!e0uHL31UhAa@@tpD<_`j)BR9(#?&V}HuueUBXF zgqZXhP1r~9SPMnL1+B&_ui1bEgE9ml1lbsbNgR2$X}p@>5)i+3jU^43ETtDo2Bhm&xL|m$|wYIA%Cy z-u01+BtS&iC#q9-np0X8=<)Lgmg;IN`s5xDvR#bQmL;+kG(rw=pfh>l(` z4AljuGckUw;<|?F0$qQz2_FmksGWpx^EZ#85U2EWP{+z2NOm=q;j_pA6+UIRi+jP& z=X!chwvpDQP2|_+D$RA#td@ls=aRJ@M1em8W<-duqJ^M(RZ#?$P$hN_9pwT+8QH}V zSdiNKW=n;XLoX(fG$#siX)0UbfS{S%G;hWoVpR4V zuV!ad%3GZGq+E)cLg9i@%W)KikOPRsS#SaZ@k9oSOp?nmxf%mRd(M&a7hbw}EDYY$ zg5)g5BXYGmtgs)pqMFa-^=><4l6#}=^@pv<>vn3LcD>WC)uLro6ikSH#&{M9dYJ-Z z*|eMG3x$I-8XK9pj8x99>^n5tpeMd$3Puskllfvw)p!VR~AWB%NPCgn_=$Jo088?hZZg zQ~}vuS@huszi)uwx-uLjgYB(c#MqX}cIYK2pT@|vIAi@}@D;ohdQ1A^Q~nmM__B$Z zO?*94A$x!R`#y=o0HyXK{lz}bhFLRHE&1f%AWT^TOB@M2G4xNITzPj@AQwO=pDYH& zfaGugM-CGGC1U_(erfV*4N+Wvwk|HlRUvW}u-)tkT=V(lTApXF35J`0H0IhU-EHq8 zR~7$FAwb7|@BvU{fimg*r<^LjP9Rz0jBUy_lcIm~I#N(ZQ^jH|SPc5Q#pQ}gg(V&j z_%Ml6dJ10@Ys^)J`P~J0ElkK`aJHK!0>B=lUt>691t?1AK2)7k zaG*iAwPV}1olIljLYa@!MoH{J`;PHY(*dGXjlGCW*-M;rPist2;dl zJBgx07nO&4lf<{D$#2D#bLQ9ECu@CVZDGnG0M%7nWS8JsU6=niS*TB%2zm(g=Bm)5 zytYGX6A0>PA8_V#c4z~7tB1~js-;`r3lHC!%Y`*}0QZV=V{=mVB|w1EL26&BMpnIJ zK$Sbu4!&O~l$cMbz=sz1u-iKYsNc({oBY#}-chLaD{M3WuN8Y|t-+Z$evWE?a6u3vmyJSP%2YW37KLD(F3!( zNvuFlmsv{+?9F%xG5*zerFhZ|Lyh%b2Gc@zjc1blSN*$QZ*yFbyB)5aI!G@ZtFI@;qt;b5eg3Gv350XTTjiFXI!OE3cRkr<%}0YRre%W`8)i6rA~>_pF-!0X z>!%g#0a)Azk>-DnnBR$n0aJqQoWDIGnaWgpn~%Ap!AgYY_k=%+0Hqck1+)F>p+&_(>fC{HqM=4BYzM?Fx`JU% zZPCq!0b=J%=p~!?l>4i?+(Wm_Yab$Q6m){FM!L$=9c7nN>k(r!vW}&K*~_?GK^cn? z&LP))ryi1*Z3K%Sz|bT6ufT3CPVsJxd5#>x zi->j>V!}oodQ0MZN?wGsDfEe0IE^OH1-twl20rG|Pw%iA(GPF^?>jZtqdiW6m;6%EO=bZh3$RsLDLLcjS zw;nHUO2Q4(M#X40gZ-1x&X!~#RIP1ADyA_66ScmUR=yZbrIPnFVf)o|%}pigWa*Tj zj39Vp;+sP64|Ye;F-4jQ3GSsZp?GFX^7=idZ~N#_ClYK?_ksw{)2^3AUJ(1XM{MtS zY$#gbC@@E@KxQtS^CCaHKs73hEY(^^Tu49ejPdvpSSv*llayTgV!D$3*5_*2 zGwzu6a0?NsQKgyX8>C6cD#faTx4WB~_3EW0JUWh%zE06XTtm|K zVX3UH5T`w=7fru207W2y-pY(sA)Vh7Vj@NN%VLmuGCN z7q+(<#r#@dNLGDgr0}yL4hXKSqO@c~n0*>*+W#%#G;q9VJ9@DFTj@K~atjzUW@lHd zj?3h~lk1g~!)cQDCas?#G-S){4nOWFF_Ola;og{hwf8|h^~4o+_o})Zc0~BD!cdM2 z!YS~8q;R4SVXzne!Kmq?S@TR>HX2PhF3&cF(CF`Khg8K|q0dAW(((+lO9Dkuc)!9_ z=|HDTMSM%Z9`^kwYUc{NS7V*V$SXiK*db~iUeOv!v_ACl!-JZ-$lNCR7)34lfE>X? zjQd;e<3A!YJTm~oGS0<*kNajJ^}Dp&hcmVJf4Vxhl(y2>6z8%UijtRIN9 zt6q^5i|rC&XKekD2e-#L)67!(wR*vI`rxn~_8~cLD49@5(; zU_65uT!J>^XtSU8w5pO&bOimO01*av))};Xn?>k|0>Q{k&}?h$xN^GCaX}d`hIKkN zwGA<0f9ooeZ3~~UO^&lNa9(ze`WD2i=jJ9}CZ#Yx&>~bv>;&QjLEP)-8EvXG=J&dn z^#1IrOc&sO5CQS{r}_ zO>a~&2SM23BRNL{^gN@*x2g~{rua?bA9IdTbLu`AI36Q+RvX%SRVj3zJwPLz;eXCt zJ@J0Blp~JbwwT2{^Zgn!S!Il+Kd67?>Odw>{F0PHkjhX8 zWrMbm_b5)}W~HKmvB6Ge*xC0IphRK1Nq@;u_JDxslFps@Yc(JFb|2Ib{$uH^V@uFI zyn&TRFPMS2#IYYn4=AmYt}z9%C}CSLC9*_Lln?jiA$@`C><*UavgO*uqt~W*xr<`822&$T@i(|DCkXHV`PvmY(?&0Fp z>HIQzoprqDvT^yi?C=P=PX)!Pi0jsiYy-UU1O-TQTJ1oHbw-%N_;Zoszb=z`pQhAz4H)bk=i& zZ~VaG?sPO8NDair_qh&C!$fx>Sj>oBJ;|74Qo-YHW;R;bnwDcRjEPb*c2XCJ809-E z9_EzPsH~#M?`t$`(eHV=4IT8Mw5z_Jn$DG`AupDR$PUpeng%!#-k@zRCarS(ttpdf z4e&IskdWTicdBWVfLCh~{hy+R>rA9~R&JdJ2_#E$7O}+ltBIl6i0=->QBxmJtf8`$ z=(8q$)f}1${q&&uDr0X(B#F`>V~kjK-6kGrw5uHZWqg^IPt(8+^VjP%fVh;7bAOaL zfVlyPW_n=ckX8t5dc}@LZ|jKd4<1ki5I0wCbOv^-;E;F3)5A z5oj=sJY?rJax^dY`w68-#>}rBsC-}=_OuB?H#Qp$++B@p)~y%m+86ML+Up;wvD&!Z%j0> zALFk6N2RMl@+sr^7aBc2k|`yRwpAS{sj@0dwbZn>O%IkzB5GgZl~s|IX&mwnD{C%x z7m8?{FwfE#;C0_E@*}rA&Z+wh5w^!ngwnQZBShikv>KMrnyYVkx&s;^140VbS{-h9`n(S_9y9D=Bjn@^ zm~VrUvGx!_;E^Qz&QjeI*Kub?XjH-PRo~B?8erv(>F6igw0`Jh9oJP@$lBJI&g=Sf zsA5w92@rkvYKPN8g^-FkOIShLdQXkrICGR^xlB-+LFIZ$YU%V#n8o9Xu@Rj3IHfeZ zH}FjU$NKxAbX84$$N^PEv-_R{?9q`6Tu?2e)TY_xC!_!&o~Y{&;-8_QOqqKq*nVx6vt z(QdFhk^`elKB{#^x|MVrjpq$&*u1B49?q~2y6Ijv<`R*Vl)37fKFo+$Y-GqA12r`~ z%|ZBUo~WbX-TW~_j?ka`jJtihY)oQj*m}LoJ+xRca*GFfn1Sjt9jU71O=CJx-LG^& z`Uw{8##J&dUK5ik%$l>XI-Oid-`mu$U`coyCCAHHYF?|yikccyN1XBqXB6u-y!tO` zcnUKIu%e#=-m_7^*_lMWy|@tSU^3*6GuO6%S*(yEs(u*aFX(*V;9PU$OE39endPf-lS@lyk>Y5P zzj;D9pTo(#H%p_>A;##jc5a^vY<@Qs(V_w2ga zlZ3?5cmiYV{Ng`QXky~|VV%PdeI{S$UWH$5M%Uu~CcY=JKNbF3NX88qbEIbW6aBuN zzY5A_@X07N8d9c+I-UI>N>|w~XZd-YxLfcj@nAJs9-p#Jd!0~HoOp=?6j{&Ilt(wO z`3*1nX5HaeYU_jAyKfU}=1GCEcFQ(%7721q4M6s)Ed)^xwZx&P47 zFzM5Mjp`*!RnAbM7h%f-tb@%d{~9|*Fcu*zZc(_k>1lU#(3^IOY-RAey(@s1Te^C- zq+ZsW>A`E>s&IQV9kGF=!*^q|(ugK87a45-RZ$_7Ka)en)WMLUyZtvvK5DegdhA$2 z2XOjcH>it=E}nX{KT#!vNeaV5l#&EWXQ@Y(3}XxDzu(+%ACr6sYMQP>m+fx3S3Y4| zU_4>CU>=9VI=vf;BE97zP5eX4J<6#F*9CVLkra;iMMgyH9ru%X(vn`1s|YAb`UPJu zX75^TUcR-Lr#ize+WTtv6R0W;IU#~71?64Pl(4OP{tYOS9$42kk^eoo6#oMb`uBn3 zKQsByi)~zHZ!pVlpkeQtR-Bhp?xj8Z7)~G|L8-BhD8v8iSdR*|!$#y@O2i&>rlQ6{H?{Ch_aLRcBdX%hfxYe99PY z7YCLp%q5L6_qsE$0?G2;y^pSAt!Zu}mA;=)0GC4b5D^>>fEG_EmTGWW#Uh3VSsuzp zdXH8fMn*GA_IP#2hDq5nf%%EPmG5?0kl%QxDo}aDRhF7J0aG@@A~`9w4!1mfI3@2_F;YuBHPB9G)7Fg(SFA6qy$X(oC*Ai^|PNbGI>Xe z8FcRFq~p#xfTKfJv&xc*SoCiZLXrHI-i@;gaxdE(I+25I~O<1Yfo5;TYUA&)pT6bSH`EB~-rhQyjYWtx+Mej?;Tg-F8 zBmL|m9uLj~EF-j7^kRn#kNRy4&eIPx9x^7lgt9=3zCqaTkL$4ccofnF^x3stXaojU zpU!P{DLVl~Kep06?OU%_5rwCDt*lGv4^{?8tYomhzX;`%vnipIT;(T?VN+ zj)O?XRkcfw9%}{-oFK!ABAaJYoAH`w2qBmGTXFA~Dj7xGLeu!gXRVJaxQ3TY8_U(j zBjPYaI;8?MXH_9Lz$t zvC%w>s`aKP+UhXb4pplnEH7o6qI42}$s>4C#cuc+gqs!8{G!?U4owxmh2b-etxDER zMo#Efe2Xu2BKcFt3g$BfHtL2rND?^mtq=sb+V(y%Ca1;Z*ODqxxVz6SzdSB2tDFqF z#qAFM;Z?}r_wiu{>3MgpHQ(P)q%-BIf{CaLRkW9yFs3i^t5~lD>f9c&NjZWUp?S0+ z2lE!r^I@&bPQ5&D=K@8V;T$=P5WV$G>RC8S6%dbBiao_6xWpCV+Y)k)6%q=JF-!!pJ4f#q3|2*Ym&*kt$yN0lUQg%iS>?L0fH>5|(xs=`x9= zClfQRaZLf#YsZ(&Yo4E>s`0(zS7+@3Sz6pc<$JO|{6exw`mISuQLA>=Kg(hw9dvNi zYs7iyo?+=M7rI}wi}WpTW|&Rl22<{7JM3qeI)3t&eG#)?wx%t}9DFQ>ysR@&T4Z%P zO#WHA6INwcBW}6w7M#yqzf3(wgRxU~lr>ORd26@mPnNAwHajYH(^ zR`jlY%A;tE7)UWy1MIQqTpZnBrXUMC44^P>5AolH+<6h0KW%+mEbZognje>;SZLqZ zdx^DQCwa;D*bB+JfF<-2Xo3YiS~V3VHX0^fo$vJC!4K}DTcH}Izf`DcUOn%kqG&~! z#8hK5WR#W7w$s^Q$cP+C!c>rtMrwceT&7#s0XhY$Jwo?Xf_ z&2}ekyDi_ZuQi9$(>Br9xDctntd63T$+xKnp*mCh3J zk6^Zz%A`-ymOo_Imb>jcNQ{I3YPoU>4A}(hSUTfTNnWX4rKn`M3aWIFA%|JF6+%M0 z(n~dCH~ikhdwq)kC>CXG`;#yo02k43jDGkT=hbCw4{ZNNv;g4+Wy)fFo^>jLE{lqR z#<;7yf(XE~ube=I>H(s@F7iJ2faXMknVypi-NKKp4~clV16?lhGvM{gyD!!8?~jl# zMfj@Vj`4u^_XHrVNc|MD5$>%KlFQQZWfx3hVvk4=)vnl0Op?p&zYDvRBz6~<6<@Jw zrJw&yL*$pYYqT$Tvi2cpuQeH}SiSr2QS{`6Nex1F&v4++ht^7LPOsP^ZhZu7fB~%} zRuwAia|Dl4k1bliyg5JW`&}ul@4<7*Ho?bnDx1-&Zd3i3+a9$X*I;jU-&H5`b!EBF2T^QfmFw}3i-Bn$DN zy>@9TCCj)R+w`(CH%G%_?Go4NJ|(th_XRZXosCjxHSMmR8w&&BbfXveUde2@Cwux4^*5Rux{zd9o?(Y*l&c)jur{He(3Xm~<%;(s@n>qg? zZp`%vJRigE<(-+WIj#I8m8p|eH`z4wKe)FgD!RzDA3yY3rmNJ%tbUqZN^O&Q7d4f&wl+x8$Pkw-UAUw~dHZ~k{1+Ax;g9fXOZro6~zG9Ptg{&?d z`WUD1Emb{+3iw8S7LjRiqa&`umf%lXTDOR!jlVX{AZ;Heb(KoBE0c&%Mi@o+v^uUw zV}&<2Oq{5UGarXGK~~+QE;81*%`GT1ngj#T-Y~=Zg~>AAwaHQ86tB%a5G8P#X8BH5 z6~CfBV5u-=-%gupXU7VIWLl&*=x2T|xPs*~MC_I)Z)N+?lwi!m3H`yY&(tN0Z&86n zi>@ih9@K0tgYWaR9bA-VV;===Xiuhyo1+vw{6R6BBn0g!Ldm(tkBsFCnqVl-Ripuo zCJA}BjG6D#r7_&&a!&P@Q}#jT`yu;t)f>=(Kte80Y-8bEa%>jFHFA8`d3*W!-KIv( z;78fU{qdp|{1ZArnczw8ZeLs-x6l;3kfuBmx8IcXhckJ3E*X2X(2d+92QPpYf7Uh! z!JF3NPw26^v%p%Up{>wG-19?5j3F;jvJq*7k7`FA%*YsQoo+oSTkB}Z2KEg<fo@wHFoSi#?$?u#YIz+`-={FQzgtwQ|D2`pASr6Z#TF+aOGU)Z4 z+P^Q@8h}zAAH*8XWgeVRP6Hh)q`vsyNNM3Y~lpi?f>IjIVNS|I4`(M%wJz{gs_=`dJE3oRPJ*?Lswr3Z<5j+t1oB`>0 zBS_#~8R0|UtYmgAQ@ zay~9c9vK>;LGj`?Tn(e9Ru=vDW8 zpy_(N%==8!qTTRF0c?q{cje3;_Czt&C%{DGTW0%U6qV8DeTf{OC9l}k2V6P~nUoKP zK3g?b9C#uG?eq(g`pWwWA_re8K5I8)H~BF3Ig3gV<`0kT^Yd?+4VrIhA!sXI2gS8= zwZDCO@m!MM;A9nRJ=$`4N_769qxuej`{Dm$mGJqWQmc%dym^^ZF1)8K}lb>^%1N1Yk}>9)$kaN)i>^j@_bt768fjRfzM z=OG#JzV(+U3NCtSIPqqq)iXnS1)oC$bp_w)kyEMjeOR%M0cnItdwHH`3iU33 zk|v)EnoDdw4T4g*#AYDRPJT-(aprv_m2^=k?elbqrJd-H>G>(p!80J=_|mIjKuNf} zg}<+UAHXyquB-W6pT8yASN6C=?G=0l@{c!j()oXQGm?p9U=N{G4S_K8?@GOcAg}Lh zSc4H!phZ7H_6_2z#&$^|_ApnF!ENs5ensC7MuPmo+Cd(je9cn5pn5%Zv^k}TRjqc9 zbyFjd;{_62>_xnfgxdQcj^0V`9CAOXRknj1AgWIqnA1tnLcLm}Ywj7i3af4$!;lmANj;#(*$@@fGPmwW~fxu@jwDO>iq8;yk`z8BvZTNzd? zpN;=p#8M4;U;4)tL~gNnZ+>jJa6g$^o|eJn9aBtk)Qg1imbqgLf$;UzeRe08==YF~ zsv6%WB0k>lsuhPc56_09dwLqd5nRVS>u0E!E&a7bxr!2wj*mhs=Vqk{@uiWhk$4IK zf4GV&t654SX3+|`m#AsORIO}z*q~tQ2WW6is6c_K^2-7bw+jmsZ^@Yls>mjW`?GUu zpO5lpdS|W3v$3NyhA!)0Ei+}VzgNX1DAP}?I55u`Jv|ih=s-3Y$bly1KQqbT}}-KDUde+g<=WhgMD{CB;m2v)w;X}i(61rUaWX-X5?1b zg`Bb9roqTfchaI0pW}}e3PPtw_vW2Xj?ZyZcz=K=j#~(cPHAJVF%D2H;Rur|!JRu>$KG}o_JU{Qc}ARZrZx>+kZ zZpq&WaMPiwcXjcEeeVYOOLGkpi1H`jJDszm$m+PEB>PtBLGe=d!Yq>fUG2lbaVA>F z-QyRc$FGOpnKQ1w+~s4aPKz@AJKd1KXk}we{}eE<^1m0^9}rufPA8;1k{R=hoBDrk zQbS_ziwVNr1f6+v<0RL4=)e5{P%Nk;mK@$%=FL*|B+%De{zOL$;T3>l2M}Cum4FL( zt;cs9IE-cr{h)3&<`RTmfejBY$gQI7-WA?AQzD)HoKe2DZ#VU7-#-F7^K+n@zmwqU z^p80Aa+DA(xv(Y!{P}YgszGu8isEip**;GDK2E@kWobrm(olGe366LJ4_5ZZB}N2+ z*4FR};*Z<@(1}v6@FJe@mLoG_uevKpgW6}_Ag0=vatpbbe!3bS!R$63(Z@EV!_9mh zG#!8;=a&Vv(gljc6-i?fZVDVuMaK=qRLhoNd#ls!omE6`)@0KjsCyHSp#53g_SQ!) zBG?<%b3wckl2rMy{Z16X`D)`lD7ZLxY~ry@@Fh;%3I8-c23UXey&4bM%?zjhIcSEo zbjBRnaSc6Tk_t5sYvP6f~PNAGz>416pDu` z^q!*4d$7pNL}m##`3z%d*pL;gxi|cxU)d#HfK33>=Dw$ z8`Q5J!arxuUYo*~PwzVnfSwVle&W{;gJEK*Cela5!r5c!lljt@-rm~#=HaX2N3nnx zwd4d#H76()J}Fwzv?(arBl3!berD#?lxvOxLEVTtCLBDWXz(srd7cC3G3Lo-a-rB~ zb5)r`65#*W{H7fraW?G`Y~m~y>{|*S;jo!l?||{t@E-?a4I$)byz1LoO)SUvcpNpW z=OM2nSH1x&7ryq7MVeR77d^zkQM@KZ|?5#l!ien8x{5o`rUlF?x79$=;Y@6Pp z!2i~Gi?9%|pM`V@;rvE>=Enp^&(tQ|A!f{WMDYkcV2ryDAMovm+(Rt3Upg(8V=_fB zLaPjb85qsh#ATJ84lB_5gFZ^}5XqWlc)uFHdp-mDQ;t6d%miK!pyXgVrCXJYMVL$? zI^bS#&g+MYA7rgt$LCaSepqpqHA$_TCW7qFeixR~H@!&r>rI`SxU0Okm8b2sF->5!Y3_AwFwJ?G&fjvgSHph7^sqHl$8Q}A- zJL0j&bA^n_lBSd|058IhTB{N^5E*a=ALI1$v!PD(houjI6k){P{#mT0$wa-)411Z{ zD%iLxew8xoYlV>z5*ckfh~7K^+aVxGkuK32`r*xq|AJ2X$^w|-Nc9k|evG6qsyl}Z z2<RmJ0-(u%n{OaBJfsq}+<4YjAX!xOGOB4}vprH79H%dZRd!XZZkK}zgz zxeEJo{^ij9hD{n9JwOM#wb<-y@oD{ESGj0qET*ktuMh`;|e&1oDCt{L_);!lpTTu zf)cYWdiYD~dEV=jrXf#v&R{PeG!3K{>P|T*N)$cKLM5OdZ;>B0jpsBcJi^{7OR&*7 zfhLQkAP&aB(6^lexwlVJL;a0CB6k9cw*8tnAuzpHVkmXQZQXm|UuUVny4=0vkd3cR zp&EcIkHaX3s#;%XtQXyyNLWfm1686xUPr-C+V+FkXjR&A#keyeqZTiybD78M6$7FJ z#q?PXo&}f?kXad>*EGr2lt#XBcB#6oKc<5H0k6!tM85VEe&Y!!EY)V$@s zOKUq43fZ$!k#MpcR41RDL{iXJw`z?*W+iQ~(il!4eXEhTvs2iL%q2l^SK^{%DW|t% z0P3m)$+Yq3ZpqplEVGQ3A7QnkT;F-p4nTM}cLk*O+&H7|$s%tz49Vj{*vJ-A&hrYs zPF1_6i~VghKtzDrDFjMqYd!DwbX%?8k$*##(4 z8jSyl3@Px-}`I%dS7(+iJs7TOne z7&OO=`pO&R1Z5|mh@iZeaM843lj zE6P8m3w$>p7bb%mGKV8}IeGf7tjQ2pT3xgl(zM;JFHRp6OVe+mWV5NOE(a+)+ED(u=ft^y9&pj5gV~w)O+81W7rbkmgLGz!$eXzi z)vU(w^UE>S7*ZQy;YD0;X)5D1Si(Nz-xz;-hKrd>W*DLHJHLSP?T&N*%imID!oyjh zL`fiL;@9MyVl8%fwUNWb9{ zq2ryWi~y;R?Y!%Tl-h3p1sEc`im^+>V58cc2^=l zKAe|5&+B!^eVcB{@~EAX?ttSjDyhl=i$Pi@=drsSZZWExLL<=S#1vq3d^K=%1WBSn zId60%&QDe`F0Kz~8U5xoRE>j(E&ongo#AZx?qMt@lpt?uv{SUMB_eV-j-V|shgo@&OrGO|XiuaD?(!t$b%en3zmx5i^S+%3aJV@seL=>^4hniy* z_`QC^xQLHTyjAdRbY{6F3f8XItGb{QFSAg&cLQ zLaY|)8Y-c$2B~@A<(oANUxJwT&5w+}g{+aN|#jG=@t7 zy`u~cLqmSuUfF7xt>y9`LPGuWiPs~B5FL8xL2)9K4{Hn(!3U{@y&2^t3D;&%RQv&| z{k=mYv>}6-@WfzFIL!y^P;Z=CBgH4K|4IOAKa$Z)JOs1MQn%nOr9-Z{QI@unJ0{Io zfCleS06=UC?#|;BUBjj+_UB>iwPen%k}4lXHg>vOPgIc8IGH%IM83-oa!;J-#Yqd< zIiIKHTW>!H*QY_J%c6J-sS>|MKItM#{^H$2-KGUw$JAgelXf4Hg-{BC^#ThWUG(Zi zpfEJ~WQ$)>$9`?L$queLG$*K%A>}e8?+QI-1m;rDm9R3Z0JM@hs($q1puhO#&KPTR zNj&Sb&@;c;ct()T)7`MLL+mfJtX{9(Qx!bf1%CcoLEA9LcuA?NUU6ZYTr%&|8vECH z3D2`de>kHE3|u=*Lq7{Zec^UYG*AEf)jpBKnWjhCYY62d`?y_Ygqo_!{O^O9<-+od z9-x|f!`AE<|Lb4ZuIWFN#;t2C*JN*-|(cjF>iWlrlV2q%1}!2zE!z{@i5c{ULw*8<6p^$8uzo{5i< zLX7UqPiMi_32)XK-OE3g0-8*T?o;543h))pGBkQF*0V-kma|E~KUFsf?3POMzf1F% z4W9BR`I|*YE4MD!nY7Kh-(y9yV%og==D$ollGWTWl=5(V!{lH?_}Xb-S7FTIlz{&+L$nnxCuDmDTH1pMZ@jr#KC%hj}_ zl26kAvL14C*W<{`^Xc9)U4)Zb;CUnK29c(1JBsXB%m^q#i}~*GUZA3vV%3Y}cG%OUI16_G}U6Kc(heRx8O5PG_7fuqUVEd!J^C`ov81M5h zFT`JCJi822?p=`SjhfD{Otv?7LhmJaT3*o%J%2(PU>;cRw$zrG%!lPI!3ArZ!q(|| zW(u8cn7l3mq{AV%_!0?<_Vv8vRIi_!k;8F$Z3?NN9eDZDj-uFzuFGNP03nZ5FYd>r zjX~EBpYDq32g6U~#Kdbm7ISBp11A|lBA2T+iIiXcAN__?*1W(tTeLcszgvOTY&m4a z6n<;mB7$ll@2;&SJnrA6cvTnPqVO1ZB?8y+u)JnnpUA$ed;4C5a*tX-O3f5IK`jxS z$jrX|DH038bFaXkTh0g^P+5%p%cj6Co6#ynq`$siR5VZ0cSw1xn0uEtNS;!qo>c-u z8XFFOZF^!2e?4h;XxFJNTz88yAtvDJ#|KB3DK&Md$xoMpNkp703`P0SN?S6wkwn>N zk)>j#TvumymNQ4aQ`%)etQ?JrIU>V%dz&5jR_tXCf}^;@(&H)tJQp3+&m7TKd;c)& z9AlzI_0N`N55nDVTnj5>Xlb?zm?D%CArOswgiiJ&hRlRc=%2% zqNY=^^FEk4wm$a*u<6MctKIBeh6;z3z_NH<)Kti*V;~BDsCOku*OvBJEhuFU{t zDo=R*HQ^xlIe_9kFiAyOgw|J5m1?NX(HE0f?F7FAWIBN1NrTY3FTT{*%1ek%Fz3w( z>DK54bW@>TqB-a?&<*$^F+Y)yeh=SP!48mKB8XF=cv&QEk9s}<6;ozxmPA|#zsk1<>na#kYI*yo|Ce( zg9JGP?fGODSu?3YWK|P5yBi2&9`qsgs^m0BAfryMr=4<4kReU@=JBA8q@h}Prfd+2 z1qu9ochX8U%{>T}`(b-mOgC|?oqNt%&!d&Zr}2B8`QZd=M_kH}w-QXuE-$Z*=}}9Uy7VEU#)%Fa?&umx zi3_0)R$-!NP3}r!MfNK{81FYj_QML5g;?yXhgAd?0s>UaWo@;t@I)R zA>-ip42JXA)MoL0KdI49F660?*QKkPLjDr`4yZLOir;$CoA!vXxq#J*6VjBSdd698 zh(Y0I%@hy*msH``F)Lt%#Jvzj=0eJqd{!>DZ72Cvk^^S{j zt5-6d2PtwhX^(d6;(QOYprl{%CiI{eXuIFdD2!qM<)VK^)3#dC(hl=FV)x9kABY=~ zFic9UaF#r&)G|TBGM_E!mz#CwOsdtkQ+H7aTW|1^bt)U{oMzt2p5s%qv4PbJrlc9t zH%Z+7)8Gkv_}i2B(BfcbSH-=uDf>ujJ8=ab{DPp-98^Ukw|*t^Hd?!=Hv-QfV6?9D zea+yuT{!AEFGt=CYe)*k(uq~d-f9UAY4DnH?ifoiixgT)N2cmvtyhwBsLXqYsG;F17QqGo@J)lm)VC z+laroXmj6_Ri?Q&(iH1~2sM38+hK?GkqI}vNxRZDDsp>Zvuu>(S*)oFv^*1?qHElk z{H0mKIyOwaweI(`Si`<3=AyREK9_9LNLI2_v&COrGnrhLY&z6Xt#&q% zQ6K7v!mNUs7*(rqo@T(N%+VPvH>T{)QlaqC^L7zf^&*+GyyP(y3pe?VIz*(W zbOw!Q^3ulbge2S~xfq}XNTeJfN^Wpv!Ko7{uD3v^!Ul!1Pwm( z%#A{Yomplx_8-I_Zuqk|&q!pF0llD31G;DK<#|GW&RR=Z|qx7y<-0;W=J zTxZS^dMs59Ny|HJ%!VJ)XE{SNYabG3YuGaxqOxIPLcrZ1EHg9(I0|RV9V@K6>o)Qx8i;LIvVFm6Nq~+FhGq>}F}oEaiy4v-;llW8sH=E5=_E zCkbZ5|2UEw;ee@|*nS)npM^an&YQSSv`C-oAD0<0Xq@d$I_s&9`Dq!HO-9=h-Ktl? zFV7?(*JQe?r=C#&EHA1k{9uaWH^5QNk>ptuu$O=2kB^Pnp#q_TmrJrTF#}r6+p7t< znFE51o=UML(~I`;C;}8gH%!Ud3IYhkbN{|)Yl70xVaZ4rG^HR`ll~##Kce?ATp-Fu z<8YU4Tyr_?T&p#7Z1$^JEJy6r;5zmV@oBkS1n-6fKmgIAg|w-oMkyKKB@Rv>L%Y!K$S&5Wsv# zzO6}34$*EC!TCTG!d4#rMa*H-B)lFpAmhuz?6mazsP_(g8hAP%e4?J3 z$KLwmmFs`=ese}__~&(s$NT*>Vo!_`>~-Ihx`tRtHQyrNfO=1QN@D(7b17Db%8z@= zxS$A*vXrN(0FJ5*tE$U|kC}hA-F&8Z&sp7(HKSSg{9xk>6n_-y0?Ncn-$o}@>qOmp zE2Ux?V8C;bxtIh;Iy91+&S^UYjrt+QO2H`j z-^?W&ZXG6BZ7clM(0Yqk6OKK?UohXTo}UIR4ef<0l?=(WzlxXj@|onA`AgGgP3gmN-d8l=E1E;!AO~0o zjnnX|qBEvn2w@ar>wJ;cS-y5%AS4b01b#Z{2bV1>`>~m(pc(`RI&gyMjb^Kb(@@2* z@K-A2Hzc=6akO2oR)#c1yJicD+C&0vL;Cvledz-P8RzP3(MT!`ud){HhKWiK7Z2JK zTJ<;Fy&`n6$rXOXN)ao3BY(PEVd^2QVqGD&&3x=ZTBMC~I{0FEkAgtGtGvoKZpS^3 z7;Oqfh(W&ner4xC0oB9nSSaZrG-OGhl#Xd65_5#dXFd)H=77b{uDBraa+d&3f&5n( zI^D$aMLwx1mT6n)Z?6g~WpD64&OvS2`~_MiX2$$!+(>nLDI*rQr)MEzp+R>$?y%%9 zp*{0jAfVm2P!d}61+s$jrc?}|e3c#(yeJkyHCbkIlQJ?)QTh?ruQ>ysDcpEruLiOea(ds=&jbcVa1jW|1<_w_Hc6a*og_E5r} zIi=Ey&FnViQl#3#3Gt^i6k~Nm&Zg^#S6Qy`Z?!N_Yx!7ceYU{Vf>te289J6LdaetV zTLUWF*Pry-)rS@yEQ107zlP`E5P@=wN3f8T)E#Gdc;z*>Ji#HCDNszyt?;>%{U8ee zg&Vnfnz41w*>k?@5YLA1kK%-rMqW-<7WYEA6Dv#gl!kS8&N-G+)BmoGf60U&E>^xU zo-0YSTm_6=IXx`0a;ezTEMO9)4-(mhrIC}kz!>I)JPwkr;1?JWROS-fd0r6Na#TGT z5+{^hCTw27!n~=T^5=*j?pM_Ms%m&;oXfWP?!}0Bd51|`W!Uu zZ%7qEpslp+p&AkZcQ3ws3Fse=a#KaCP=eS?RdAj7^(_WfZEH00JYx-Kj!3y!yTZy} zKh6QPxNvpLt2w{xd2T~HHTTxsdK{%CgWQTGG?~L$!3`X`8r)jG z%hl(<3itkO)+Q8fC}0YdJ1^!0UUSx=dT?Fo@ukr?yVk4#aAi2m(_iX(~D&Ex_YK z3SA;aumfxSpC1lJZGUS|ZRI3LFq!#H?B3xr6N&2qD_eORZ#+f(bb1K+qW=@-I~l}} zs7awor-Hi1x~aRn&Rk{9SXDMzHVl2%QNIL3<9@Mi+H;O!h%^!7q^PmR?^T_S_JXgX z$jLc4i#}MZNh-=fK{m!@p%Zwf@Q3?r@KwjBdn)4X>78G&|7seJFv&c^vx!0X0R}#i zhd@B!K>eSaD1UnRPI+Xk^ymOqqUEt-gQ?+}m%x?lfQHU>GIJoQc{1@QvB-yDsA^n5 zm^2P~&XZvRXu&Rk%*GHPaRz*&;sA6YHm#57p{iV{wYwD{EEnkRRL1^*U1701r;#u&bzY*yAlz@qmc0 z=ry4{|Dck-}Sw!VyJ zsGMR*O%Fkup-e4c+sP%=M0cbcqWxW|Qix9ZuCzg_b_Tw;X=ozrq0s?}{_{0NYf%u1 z+b1aX>7D9_=vd*-ZuCRT>xa@s-rHsLL**Ul?|(2vV57vUqGH-8v2OS{-zc$4C=V=n zvr%Gglvp^(Mv1jiV%@D0YvU)hQDV&*;1-lvnht3#+AD@|QT(1E(ZdsV-w#qpX25VT zdjN!Gv$wH7@Kb(T74=$C8llD@doZUW0iYPy!7PB9{$O{P0|td;iXqxcon!#l*`643 zcYjwMQ>HQuNSg!NB{|PQy1Q$pF7Wg7xKJA-V1qEcprQfqW1@lX+5pif^t=I{# zVw0L(T_;j%nV`nRsHVcs?&m-M`!p*v!hiZ-MUe1u!tMb^roq9y8z)y|@OJV^!-j!u z?7OiH+9iL$J)(*@RaW!|v}99&n$43izy>4z+@Kf^n`AC_R=~}97)lqj8hWMx+y%t> zokcuAEnfqMKkA|23s(b46y^Ft-d~ms!8%AZn$&$_rcZW8PzQ>^8xPf49CilLgn#<6 zk1v+QeP<=eFHUTO`AcH{z0v%^g}5uNA0hS;KV!*0P$<1$s=(P85a&kAqpiM&Yb#JW zI=}u6cKf*Xcrr;QTaUILg9j$H*g{am2vssmWLeQDrv$!%WP84cM$WIfhyp+4C(ifd zn4u#i$H|g|aBLxiVWV|vuqJQQDKSe;JN!BI)uR2r3A^uIm_zII%WH^u?x#50^ zX)4r>EXY(5;QRN-IGob%wT;xh63Z}Y>uWmK4b9%r?Axc=dNRygB-=+{7Z7dwqB_aW zlVnX{vsX zIvdczWcnG2l7OF7&N?P_pyGOY`e1<}qrx)E@Pi^k`^_W{i@3x5a$$GDAMUMmykQOs zbI>L!;ttf`Xj_#ta1nbcwg7!MJYj`Afe7Sfk}@*(wLj69fOHn>oqu9`U?6wSLGG0F zFF~^j*((xk-BiuVJ}0B=O5%Q`+%OHCW0Ck=jS8sTk zQeZ(U92lU0`t2|tvL!{J?*>_iZK*5M(t}4g9NXP&RhE%Z{z4oLqW9&Ik zW)r|r=;G=|%5u}S8f6#C*KKnjI`_Fo^v46w>qQvUF1AHczMEhL=2S@oEPYi zrR=s2p8!JJ+<%hjBEo7$$r+iF=c2^7(S*QI; zwQ|LBrg*+=4E+gtB|6qlEDc8#IIjSSjzW+!DD&GOvVWS2!mqL1OGGd@nGqX(0`)kO z_qYw&4U$}&xaD10;F00c8RyOLtF6u%4u`{m@3*{muh;Wh^`PMmYR$eE`olq|UavJe zwSeF)GfTDt@`)fu&WZhsi%2eAJ#tl5B8#d}exlLuyn1A}EVJF+eVtr7^_sXe#Nm-U zW#R>=^nccC&q)K5F6?Z-xe}w~Xki^o6{_rn@)a!M$2_9Rn=C9kNkcl}%n5N0#28uJ zv6>!*?mQbW3qrbI3Y4NKw5M2O`WO37O>bFHu{>Zi#5Sv5m1o?XiklYe(tKy$bQ&0Pci4KB7i2L-*8~6~C6oJ@0nK#>RJ%lG(*)aUEQ~YGb{J0>zB4H!nNaXD zq0eG_E`&4l^VjU-haxW{`Aft~g@2CST@@^89>R&}qFkc(1475Ai8C9sVX!%Q#*kkY zO%7dfU0_X}unQk%lc>%uFiSMRS$x30RHCc`a#r}2?=a0L^k3W;$GJc!MQ-<&J~w;( z#@r|S@XKhz1&fu%Yj1Rnx5dI%z`;PrXuJWJS29**g-bHBs(fr^jF&V0d4HX;$x5}6 zVs1a3K1Da9`SXirCsto@`1<7)_!=)BhT7T3;VIGP4^ogf?dbXZZb#3HT+da{^X!yd z<*Nv%=6|W;8oiLs8+({>dG!lr-6f@i)Yd86{;c`)fs^%k^Qk~A$a+?m z2#VEaU%@{%JNRis=?${JL3I@#>J(2?p$}4(MPFx?e6ex|hFc|L&(v!68baWKmpLQ3SPH?3*+80k1%!G{)*7kYsp5aeq7YUd;*p>(oAr4AH?6 zAc3MW8GfDx@2Hhxxnk|h8m_;YA-U|%S0a0WUUuF+swYOvK z{)ZLQU9QQuMtMxa99gF?97|}!C;xA6&fkyaN%<& z`$9d*6&{Q8(XywtaL!&jT>60))*Th+Wj(I`oU!?L*?)nvf7U@5qbwe!b5U*(#t(}J zsb6b@SO@4f=RnaYF+jc6n*&0#)Cm1<@d#N&FpV{LD7GDQmXi%tuhCfY)~HvcG3@%C zdUNRYx~;y~Y6X37&>KWvuhr^zS_7X6UA-l)$V)ENz?Cp=iTDcj=}Z!w-sWYoZrsf- z%jbco{eLe3PvMz$XAztAjRAKV34Cn=_zL82ivf48Y^!Ha{YbAF1Y93vc~xmas0j@_ zO+vPNP@U2?dd}?V{Mzx)lI@QwE&jBFuUan2mm7v_4)e=g43BC}72wFv%fX@zVF9J= zyJ^W+Pt`}y%3f(-hP_;j634@BWkM>}CAHar2Yj%YQXNwU zkF#ABfq#Pt45I9gt(>9J-i?QB4*4MgbSlX(sEM9O@1?d0zfmma?0fu34zRP6!?NtI zvMpYGmFM;TTn|VmRljlYh(G`ysVqv^b(qH(gb%0gt;w+lpPygCpmgSK?|^ieX0&Vm7`^)n?{6 z!=x{lllXl+iq0aDt}a$mSrGtxb^}4_lz%gjjBj_h_-(Pf%dc#lVx}?xb9$9H7YUj* z(CHTnt>poP+FG*WI^=cqv49g_QGPA&!82Q5Ha3DaB59(ZwqjbN$e)ajQd$uoTmIrT zYW1cUMwg@H8eS5fQfADCi}MCMs~j=^Pz=L)$%ej$e}7nsfO4h0F7Rv9Y4dsYt+vx#)PW zt^AC8IdDa~Mue2S-^ridrqtfc$O&EY%un0yr(cPj+}wRz>>|f{iS&6F?$Q_N$9NpV zrew9((iL8z%^flC2y7;OZKGi)cz>LH8>^x2oEU?9fx8^hGCV_O1|=+38i4Tl^$C+5 z<4~}seO|c-BY6{~72DPHMz%Q2`=L0}1DEGZ-OvJRHdkCcBeS2yf<;F2o#k|c3~TPu zG8bw2aPhwY?VEw^7JvF@*NTT3dpB#tf$%8wR3{WqjsT#8nbFSFVL1+c=YL@3ai`S4 zid~+=wc|=9*-qsLTQLRYBsNbcc?2@dln=2#%*0vh??e9i%j^ws_X*@z9`k4-S3%G{ zx{57I@j}DoJ2%{g{&VLE8yadLAQQbvq7xsMwMH<*vPz8CJ*8T*Y8?cfC`uW+t z$_klnPK4v!1o$5^!uoHCjeo6<4Q3p0Ia+vM+>@NjY;HLg@Z-zRl?4dukB_IKwlvRt zqnx41TZX_3YEHl5eGz50$v=q6W8yJ4iP$kl>?J{Rqq^?TlY!AYU}-jHd5dvIR4n&r z0-Ze4R2-@9c_rup82l(640N~UIbpQngd0w{22R+paKhVHkJ|2@<$ugmxja7*Y@)3ThOWk`R`f z)5T#(K)Pbg)*>W@;3%kWlZF$^OC9;gvxVR-mJ{ZTcmJNzi%qNLSlH{6qiE{KqbhdD z%>!@qz^h2>g4I6oHh*+-89KRs39%f#wZV1IC~g^AnzIk3{2kzyC9HbN2zG7oy8QUk zfx3!o_qX8IQ7YIs3bXT)6S)rXL0dLsEt;jF?aiFWh> z)PrM0DS4meMg!6X=mnkm62uHsrC^xmxotSMSei4K7;T z>7+}6ta#K@Jv;hY*%CgO#iOYgkG)AUiaa{8YW8k0zoMhY*L)}khT?~h=52We5e@Gw zd7V9$c*Qq)b$_pNI#7_+UW~#Y5CFy=E51Vyjyh?ETR zDh>p_{GK zAK{I~LPM23vN4qr%&I8WQL(swN{)A`qCKQ+DG=?g72{25jgxrrV4RKbg$(Vk-sE9A z%U8E^iP2{mLOg`nVAm>#tTt=Ppf%|F9Y6G%y}IwUdSS=w_nSR$Fzg0{UcE7B zbz6jWWoD7*@QuVK4t2vdRaYBvXd@2Y_L*$Np>>EuW#d_~(_-DOZSQ4b9yx|78DxXY zpfE{)N@ZbKA(K|KRrsBLI~+FqUcKLGd#!HY_kaAbHuMIquo>1nJ>TcbxoQMf##rLV zODA;MwCRU)bWBrt>0+28?~T*FS504 zlCYd^lCV@E@kL2knq@<D-QM~vbSN}`^sw%*P*(9EF zPJc-94-c=BxhqLXQBqgZdj<8`^g06u&t5A^O3RcFLdp&Hpqs>l*)+o9E2(px%+&HL zn0yi&vO%;Y^ID|WmzCDCu`+*cDOx>#eDZ}ni!z!gBZX4Jj*KA(7{`wp#T4Gw0&HM;fledz*@;1&ibw#&j>4 zlV@IxAzq~lD6XbXPbnRW`aSiR{~lNpvPc+!3+%Z0+fX;N*w5J~+k#m41@}_+I)B1f z@!2d+&!g};!9!DjGmGb64mn2Fen+i#8;{4}D_qg1>`S^Ht3`hc6e*niVdZb< zwv}`%JRe6~$(wIuxdZ-^wQ$B>E-eTw%g$H9%9mr~M&HuH%bz)h-jWH|t||tIW@!ZV z70MBhkJ$NBMkvZ>7_?8jC2)|p<>2BM^723VgvzWO&X}y*%PVg zvOQgE+Q856xXk>4ls>RiGJT+9#mWdX3ntGtKi?vG>S!Ki2_Pe&f2{g+LyMB_Xsn1U2@eT#wRS=4Cuq zaK-e8;qMw0T2gR?C+t|lp?{vFAkS$R`rdFYbD{J3-T2_+mn(O)e>_fS6J8RW-My5w zf3k);LjuPaIcIpGbZd&lJzyKotFI3ZQ9B=vpqMD-T#G({{(r&^R%-gOJplz`2(NU` zh=ZwnM-{lAy(C!QJ=+3gzCHl^EPfx2v%*#C{9_Sc!a$8aM8S+8jenW&=%?>8uwY4l zGE1lEEDsD#hXFQW%wAff2H{+Jt17%LEhE1o6rnyo7$D}%BRE_@(D7~uB{ z*@3|%i5DiadoPR7tJ_8t0QOCLDPG82^jUs2Ojrn352{*^-SL&?9LyLVf|Ns65h?`*G6vN>)F%(`;3v2n;9s#1mu?&LfZ-ybC`b4U!Ko+oRBXMt@|%Jv-Ut zM{yd!>0Dbu;}2)sSKnTrF_~5hY!xTmRs#?Lok;= zW|!pLpHa5N5j%cm)d!;y-FiALLKWOxBoh#VkqUAEBvI?A+1KFCm?;+No2(NMQ-O`_ zDB1rIK+K=XSTR8dX$Lj5f&{2CUttbJWjY>IG>DuFLeMD8=nSO)BqG4zzETzqU<7Dv z3tb1;Y8WvYHGhxW0{5)*h-ujQ#7P)4Iec`j-cXSyh2Ii&W9a85;%0QW5jPp%KA{q% z>gi+7(f9)7SbscK{b*MgsI$B#^=78l3YOLqTJRFyc#G96_b7USKTXBI>cI=S0oES7 zK>Kazr%6G*u=33zQ0CYl2a)w_JJS^3T9~HzN@w+B<$r7H$X!Va6xBACE56e;;^ydL za`wVV%`Z{?sBV*nV#gOuj$^co^Fh+D6t<=}@9Ak?FF8MgM0twOi5*$nt9ldap@w>_ zgZc0{4q(fv!H4h_#bhBag&2{*FTO8!#eykp0UsOYwP9Y>23R}uDkPg!biROgmP)Cy z=*DcQ?0;=j*-URZ^hv`w}A9z6^p3meev16&14zEi
YXZ##<*Y`7n9q%x)%wjY=2ugNEnT<>f{7JbE_T2Ci3b21f6^V zkx$y~YBpQVPLExzs8j1Rmego?gH{xJK^V4cgKjtMw{AP;spLId^15uoqbwtQHkkT( zgh%P-+blF{6B6|Y6B6}h2-$b)So(#R(q60%GG+L3nitJ4wd~vDMv9g%!k=3n*=;%3 zet$Mao^Rq)TcQegLNp&gP4hmPvh!M9X+N98DX73*)`hl21@1BjROmCirl^Q{^|Tci z`@9FQ%>!4Sy7aBZk8kS3%Lke3#LL^v@#1w%`vO%7&+U$DYHqnYTcmfpOH<(DT=njK zDFc3s-lwKd=UQxnP%m4eL?su}Zw(JAHh+?M%`g#q>c1l&r%5u>a(QR&kpB2ObIatG zM&n_my&_Z(ubkJ@0ryIMf!GEfi0GfnGpCcYqZ6S!fdJImjy^!)W!67QBe*_Oe6|CK z=p1lz^etNYcX+khi^!+)w%52sKB(c$MRORAu=AG1U2%`G6!b(mKFZs1pD1nC{H8ipR_5OW&^6MAGQ=24S<^@w#EH?X~Jb)9d#-U9VOP zI{u*E?*(oDw7NcOr6v+JbohR~-pY#q8`Hzh_}3>@h1w5mjld5Z-mnz_%JxF9-|Y;& zL9aJxcZR)MFlaAOk1nJZGo%5a;PWn*KojPTju>7Cjb>Sb*VFWy7IR&)hIsTs{6 zr2ceEh^`yc!8%L_hNtIROb7Q@_}rKdHl~9`uZNB4U}HMim=4x+I2+T!#(#A1`I`>z zC^rW@3Km%{?BPF+Q>n47Xfeo?_w+?24X=DbR?zZ- zoC2C<{!oD`onrG!W)0Nzv#EsK4;4^{!w8N(WfH4x67trPkicFhV|ou+Ujg-X1$@1V zf(QchnZQ0~XAOD#3ie|yFMkmZj)VpY(*1gp6nghd&wY9~6U)=%G7rYd`1&H5X}q*{{lx|!7Muta4NXc^XdwdiIU0-^H;Az#cLYM$l;yC+&x+?<<3VYUB(eZ zrwM7^@Hd?vULSmj5pN-Ocm|mIM%;u`D`9_2D}PHgkF~wl2UL?I>3`o;NRq^w%uQC14>doendha9L#=^da#Gy$+Ooly@LR(!`{L8+LIyW&q#pt2!Hh7ydGo@3@5?YtZ?no zuCK#h8&iC$Xxe`I`6?pk9&+~KP{ye)bi2C0P|B;2gJaGBa>bDYO$xU$x}dt1vuO$m zn4n*xBq!N(jv}@x=#!Mywlrr7GIY3Ldp9r~hK^sRd(OAX6}bPn>@V?cOcn@mS1FN1;rU%8E(m={>r8VK)VTB8&E@*S4Zed99aX-Xzjm!pa znqw23h=0HZ&ZQlY>c+Kgn4Zx2>2ncWmM0Xl#uLchZxKr?R(R8!#fJ91;lul#ht}X= z_`vG44~CZQG#XaFXSW*%_nYmW-Dj?gyd`RfoSbPMS$(%yYG>&NdQb}^KY1<|H|Z^= zf_w6mUUAUDziIdB?T?H1nk5{kXp@<&ng(+fMSnzcRW}vdw}E*15$fM(sec10zEiCC z;Gol>?OoNi`cwK&m}ci;v*kQ!TL%rhX?5&Y)3V#0o^`L$7<3K}TK2)g!4fL_+CMo1 zX@YS3?6JkVyY9^{+!y9ODHj2MGw#9onbj`d*^*15`W#=KOX#&9KT2$z!9P(|5pVG* z-hc6TyBQ>P6mg#Ch>>ak67$i{rr?RwrVQGXfnE}il1KW)rSg)hZyDD?PFiChCzl{r zr8L75^lab7VsxVs4rN6ZQc+zLNH2ngWLBVoGx0!;-plf-uc_QmhQOGcx`wGrvYnd;o!S2&>fh46yjsA!K#Ncwt+C%s} zTKtCvf;Slbo|=EYEJA0R<-u`LuRj&dR!+{eG&$TA)9jQfd{7?rX&O-~?5*&kryaI|!MCucAPBwB7Prb=+m zJ{|&9noJT}8QmU|?&E5rhZ4ShOfd587w74_!`%sswg^<`oKDo1nPm<&&aW0P#$#vc zU)bNOF1IV;76H^v0ff6r#KjyZSPR^1V5T4AyX29l;2(r&!N<=80czqWGk>z0gA{&( zr47QKHX~s=lAORXzfSaaMevsYZt=<+!Yi4i$oot&$v$+BssFOHY411?<^E!~2p>i|o&RrNy1bS@m$ zR|r(je$zn;Amev#LD(z^yZV{1=p0mhG%9_RD!ni zkBIqH3C!DM;we0F;5!n-olR&wB#lv3xYYL`et&#PSF0uzz>98DhQ+4M^MWI=Hc_DpSad#+o>ev-t&N`+?PP)*Cz1M60RK6!?0@Qsfgzym}rBEhmda9PraM z4}g@q?Y{Q+N`F_vZqwG=nxcx`pV5=p;<8&@b_E<_;Zk;s%PzoWd;MOkV>g=C!&V0r zap?4|Ub|sijaIL5??JoY>p!@^gd#4&W&hlJM7Qv3QTR2!W^aqaZc*66DD38L_**z* zZNb+&1z$yq=oZ}Cf?MkXw{r1|EuQu3P2gF}_Q@6#~%+gnDSVA@5hSr&GKC0X;#W?R>`04iFw1fJ2Q~2JM}jiZpwKSrGn%*bdD3 z@bA#Y*rgbOL9lU_&)a7wC@rP16&$3}UE*yBwih_|;96YSKxsGw+Sr)D_wu0)hV2Ne ziMb3kA%D_I3FIu2q5@nzco(4{*jV`TA$+7<)$d@?4A9rS@MG_F04tRK^pqPIKhTTm zf1g7`Df_R!ZB4$R^aj6)@45YJ3#`6{xQ6H2FwOxKR zPPI*b8-mru)*d;|0yVd?I!G|FflGs;Zl-oF41Yt*26r|pk#L^h1eY&em~Mjp6^w+F z%Q0v@HDr!|q$siLS)`;PYRC`#v*Cw5PzJ7oSj7GgJS#p8TyGb}ie^voMzG%aw@8<4R` zEj0{iC-^Ag6oYOU8gm9U)evFNU@q5a#94ZDj%uRog+4ZD!0>DpAw7TWsG4>kG>bYf zT{G#{IZ+HP6*>!?%b8~f-nHcX)0NLY;&b#7yG&mBlORmx>vuyFyZpMY`CLH)!GBzn zoAwXx63~C`pJko1zehE*ep%-9#Z5A9ffejK16Vedb}+Rz#6;4(ueAlT*Dcay3-5No z#u$Gs+nD4akwgmg&1N~!vPepWBy^=5y9q%j&7C<8rzCHaz;;kpO3$bbz%b@(!3oGX$gw>NYBmsvc`=AYw+_5x@PIp z>jUZvdSSQYO05}O%Z#@deDlGrI8Ge67svhx(XsAq>JR--b}&e#b+*L5nznJbGv^Ay z($D<>i>q}@X$R_LDE9ZWgn#z;Y3nwpIKf?hoO?plJMTj~p|4S;9G>&Hw1n$^DOVsDEjqlK(d^+X_W- z;Xj)%6@`i8L&`^lR=`Zg8~tUnm_DVmr#E82R(F+ZBH>PXpz>izajSHx^Eh$q={f-_%+rnL#bKHW&cnddg^4EIhj;4K< z5DRDn=lr4*x7_46Z-2TpP1Z4(GOs2}2kX~zz!byi0+NJjWyxg=OK55;w`k|=ri_^7 z()%RvXmc8VQx^cv-_3;hCKm61I86rl^<>aVQ=Myh}FD!I*GA4gB*f&^jRv zx~nyh4=luS5;_-AB{k5Kya-Jh787YkM4o--ld!~b!P>2;_Q^P18~?y^uFL0KdmM)= zIz1Gd0pi79%704m4$XZcGxqTim)y6LEG*ZG`?M0IJ_;C7-yQp!;oQs8IhSTfT`>Dq z%|o3M^H6euFQ zS5bOPu>)e{+pvEH%TcPRCc{fmuUU`gz=%Y>8=vU5PJd(t96bqvnpvBT<1V!&rnB>tujse)$Mu#UU5&?nFBD)=@=v z_TCvu0PoJFA6z2|C8A2Y+?V7JUs8mAPnW0p5Gh82s=bL-{UodEbubMdVPzkLbRet(~gypj+hy1u4;EiIYKx$nKzjY!H0~S_~qYx=slEWh4j%wETkDf`9&9k^bJf zK3t&0kLg15=dS1AC_L=`1{Uu9x$NFr`0?_w(0|Au5_+QAhH%Be8K71(sG-gCG5oK? zFCitWh;Ak(&b;3|J>Wc0z3LB_HSk`Qgp>_F&|W!SexL@rVZ| zM}Oc0>k@HNT|%c%7)*e&SaMlPp zm#{PLgSH%=Ujw6~8ehu(%R4T16rDqvUsjHklM$Y(Q2JpgCymcx6VGBk7BuO`N~cGG zB+p9krqb%-B#NF1Ug=(-B3Z-7n0kU=g@2r~MTjeZsp&()WXxc6gVLDoVKgXn>>#`C z*}CslP!g4NYXT4dHuEJ_2H`wq6}W|N_@aE{qYa>S&W#d#fL#lLA5ActVy zO!PjKjPMMUt(%@ph#IeCa~qlAK8Gm+lrtRBuO*m~`B@fnbL5XkctP`Z4mV)xgMT9B z&>CPlgWo}Roc~(Nn%CVhoI$@7Y|TJ354lZZzm$5Q(tUlL!zc_zm`Gh4O8sIgU~ml7 zCpp}nou4F^!0(StFeo&pzVpxh5t}pD(7O?|%$RnEom4OX^>>`nq7iuJ=E{g!TO#&PBFr}cowZyV=YQ^{o}B~|zPIdf7)x@=La)7~*w z=vZSzyCwCrz#q)|^B7DQ%<$>1P`AWfs%lAnQ|c9svsIQXl25hZ)P`Ml$$!$e8Xe=3 zC0?p%EwLs3fx9skd4%h*$C?RgRM25nYlTcl63dn{uocO%_W}yb5p7r+xmVHUbs6bP$29**Nc$ zAHdJTI>P9zPj%=;&%YjNYDg~iH_0hLjoTb6sjHhT(oBsxvU#dAu^q`7tP)W(JX6XO zW<7=?5JE;jx}L+QWDO%PqO)jNMK(6uQmStP9n2#*suDTj&`kq)#ecw1X4&By5h#lv zkg#w!tUcyE67kxY^&Z##&S#J@E`xD(Dt)xJDGWQ?t+hZP@u4fm z=Ya$NKkgITXBX|pX@1!=@WA~67i_*XmJ9I$AzW`jp;x{^VFfR80#4X+Ea8dyG~@Em z7Wct4a4#=GHrle{Mc}}I4KAQdj4zN?F0SA$SH6ej8%9RxTz>>9_(#whWW`7?kU8NJ z{;t6g@h8Xqu0)7TUPUTJ&UcP4{m#G~e$X;AQ^h=c6BUC`ZhBp1iU(l(xov=v5|3i@ z5~6a3CNTuV**A(?;4+t1N=Tw8TTcIK?EdR4U%HixW}{_SLx0!t28$}=CwGZQ%HYjLV`UOK>dN4pxq-48xTC=PPy!9oik=1T$PTV$ zyfSx*XI#+D(N~tzg_@=LU1qg3lDI|r9r>dP-r!q8c6joFs^5&bUizWgK-{^kmejR# zSjOdwDwoWSv&9u&%r=v|8&wPixo#*#VUSfMq(B(V)PZG%lk zgH4N!qW*P@^B2YW3mJzr)}Lz|mcd#UL;VIGqrw?h4RC*{`X#NJs`lGHo6_!Ec^D8)G9W2e1gC5nSCJtFQ7^^h2{DU}VjvnEBToIYVr; z(fdqIRx*qBn-sfUU>C=2<^e_~jC9Kc4XD+MOMh`FnuEu`j`2t6oH3}Q%fB{8^5?0- ztKruM{ALb12)yY?g#|8v#tUbRrWBaxphHXS$FJSfOM_cHnoO^EbyFn^sB;%A>}N8R zbHOYo-cse8mRO=vT!&I_C~m{^GgQtnDs>j=sw}H8HuaU3_XavTRDx`2U%3_k@Igy( z?0+1Bx&XgoS6&Mx@&Y*gbe=eqqSQ<0gltqHJh?oZFguA@&1J~{mGv8uRNF^ zc6StC;7#r9VdU&vELuyp^iX_Ddsb_G(3>&NBPi(jO{(*7;1uXO{2=f7otG@JsQd7f z>O%TS@5Us>IUT8$$L5>`?zrzxxW(EtpMSx*A5M<7AH(jcgkw^rDS9UR4`duMD|yt% zNJfU1X-quP#xU2G2XpZ0vExl`XjUOo=GrG?bOW#h4KKGcl=TKoea|0X?nb2c#M48~ zv`~JwWC{7QWWnMw#-?$PUnatsQ%nyqz62#V7urS`_0KlKxQ#GwPJ}UIrp>LCb$?e1 zGv*S$9d3V^n6!mIt3?sEAyEDl6xZg4K=a(y60*a_{V8R)=CIxxjKz{YSR``1QXg)E zj&~V!Y;9W5v1Rlriv=Ccn3X6USIDJv6G6w^mu-WN+o0n%=&03OsB?Oq8w)z7$LrET z$5nCM)dG^4W|Ry_X6l!;c&g?N27e?~;4EgdOgwVgkVJmi?c+QxoM+BUD0523R*0s7|7py&@Yl*y`X=}*=Eo8!eA^vkE(6L(?uJ4MwSOumo`c!h z;YCg$)0L0l?L*E87EZx!hl;f)bztvFee(3zF*E^_wrAx>FcGJ!OJp;Ux+xUDf`-6v zj@kX`XEGsp7#P9CEfkuPFY_F}r%5WgP-${FN`;ZXuom&FME(P&U+}I`60ss&AokGduVvbGG4wHkC`nqQS|z4Jf8@j|?)Br=!hw0t z2~@|sV^iN#bT`frL~&l8p6i(Y!mG;>YvHdRg@kR-f)NTD16py$Pe~yVxOC_g4)sew zsg@`Pr)L$FhhDIpmW~MeC!B_lq-1wR$KH*_1l4 zUa|qs*qVjLW*}{DL|>f?x4_i?)70*ThZFx3Sgb3@^Pnw9vk))2r$)pw|LEER;bL*5 zs*AVJ&M!pw>?F%_-GBFzYA$Okq**gEt*TIk&g=jtRsCT*ey9!w>yJC}V>PAoWgt5J zc*x~hFA|h8VIY84C|JJ1)b9DSsWvi|pGQjjZ}|o>K{B$61HW$~uS}oT_w&4$dDBn6 zqoJ5c7cAgo6t3FmDes9px)fp1*TfRopK9znBOodX<$KXG4S&@u|I!cZ*^EHHRzA6d z=@rnwe{b>`-r}Iuh`v58=sV_nrg>}GIaSO{!39gewJrV1FZmMd3iA?g(bBH?k}mPG zoF&|%rQ4z<+v-cT1ef!YkIYXxGAG$c7U?qQwy0*x8k(I+^+W0|*?=e)fN=lMCc z=J1}$l2T4%Qh7vH(wX(}UrujQ{I8@r>*2qg_N4gV0R1tiWh=;kXBGYzK=1jDD0G5A z5-E;ltuz+a+m>=;Vi7LKpF+U#&<(=r8AC2~V`Nw27AKO;P`h+qAC8+~WQE^m1-y1y*a5*_3yR|Mf5M-~R(p wO928D02BZK00;p1U?!KA2LVD2oM9$cf(;mdpZNd)V3*|w0X7DS2LS*80Bl`p+W-In delta 48285 zcmV(s(>OOxj z`dpa-mf*2E-IVZI8Fk8HCpD*Ppt6g_B;^V!nFy(FGK2V)>Q^ko3slP#Oo;$zkR{M& zJvp6_#W`%5v(W{WHW&GS+|ekfpQSW_!od^|3HYfgh}jPI-6PXaC3=O}6+bZ6yY|Q# zodCsn&Yw~rsKH^aWDGru8xqhP@3@e*X%wB(j|7q4H zGeYn2sEYiAwZdJq5tYkYvIpL&kkMf%oNH?{T=Mart&z!)uotpxJuIMQ(TNn~auWiN zPmeGGZ2@A>e3s8hY5`B02cmn6ldoLhOVO-Fp;NgA3T~bFQ*<(vc9NyV&)#qDJfY$E z>01+gzEcQU-jML@Dxrwek;s4P%$d@N3-UamX!tz&Lh>^(kT|J*aoHz)mKxccd`%3{ zNrU6(+Z_dxA6oNK4_v4a9|kc{=FcZO4e=riJHVCLMw@2*2@j?%IG*m)Q%G7Ql)T|r zf#Uv~hGBuG(!ivM^wJA?0<1X2B!=XvL4AtTxGMK{bGzp|Vb6b`yTSt&$Kkgs z5aSzLK>K)Fg5_{A`XyAHWVM9!pi+f@b1fqw2t{t-Udieron9VnHu3&V0 zN^HadtROIPePv#9Y(W;#=6|>FkoBMI6+2|+JG862dpaSF7W3Xb?03{+?5n6R6}n2$ z2F2`qd7w0z+`XAyh_`>@qj|*DJUu!P&8QQXX9Vc=1e2HrunN47UuGf4Bu?`C4tpMDYqVGlEf{uUqi9W21 zyaFUCgSl$zE~CxRk&uvAlRkSa<#ZLVKe~fh^Bw!_mh@PCCNqCZ;I-L={}n?dusqGM zF#-_~^%c+eFqlFd`vF@ZDz@-y%M2Gy(_JR8ga;$dph`Hj6FRd%10@_0I(o(hMc#Yh z_#R7_z>0De5>=c9vTKcw$H#lewmmr7%}vPJxQkQK`n`TKxiC>trg2^IU#!bq}oL%6KmKS_*<^`D^J2U!o?g9s1_nEF*yY}Sa=xW zFXBcX_^eVFbLX+H+;rW5%3X|D+>lw0{9jAT;|_4)g64nb>g0{kUPQNkP-%d1N?Q$1 zHayHcN63;Yvt7vm4$qs%@ECnWCkQv(^;9W)75AFjAsF( zSXU}!E(?G4WL9u1r=I5klw6P@rk*DM!Jr;Y>Ze5Y7}Sm#DLS*=X$B+qv<5OIn!c)* zud3l!r`=1nss2;*0_ao#4Zu!6{8YeKvQADyzhVLLKE>Ixwah*-HpQ1Y?Miu0ZzF{M zQvVRo1~UQEMr}rjKz< zD!aVbSk~8iInO^rRSe2_XsPK5kNne4-<}PzymBbD8ET7;-qvg*l-LF~y&r6XeNax|>uNLY4P-rxvW?W13{k9-v!?soDIC1pof?-0`0eE6t{WaDaw zjPhMJ<%f!j4ilA8Z|x2deW*^_l7og>l0MSG!lyq_SVWcLqf_}urizbBC0zi;N24ko zi88v?8k}^=PDc{G6&`(RbmXbxsgOFSLCSxRHkBS}Dm%)Q^^s)2tZD*Fjw+SS>rX(N}$xC{5S`bzPorS-M!ZM}x|bZB*@|?$MwM zSwUu5t&*kEMu?M{ibeXt!==aHh*_qSKc?LQ|f7vJOXOo@fmfIdA1hVOGC{uIk83g(dZ| zj=C(Vcj_N$S+}DsOA?^|k(ISOsnZ>O*(Z7P2lyzOjh$r_OlD;BH}o3QWkJ#+#g1-8h) zzxEJX*brLy{Iv+JCBX4*@+p6Q-W`CV3JicctiHZ!GHV(>Xl?-`AHC*N5%PGJRTNAhQ|vMpF#P$)9ZA1x8Co5*up>IpHB4w zLdP1W|A@7E8cHYRADL%WQx_jo14t?fKBr_;%Rfz4*h;GvU`sx{>y4kiPo978S-`6b zhYatXhq%hbi;R>nt;Zz6`&%T*FeC#}E;-bJrmqytY*&9L0ubxbuux%*>y3Y*A&Q&c zXO}n+V8^=SO>Z%sW(E}_powo85}XYr-^C4q1O9!dtjCw1VRK)vL&}?c1TDDvA3!f$ zzu2^{ukZie78`7W{WWCD5J`7e9UnFcb`aPPAE(s2fkio_(MQLfOkfG|#&pv##;%Fd zTU!V-0m*;RbW6-7pICxiWmG^MUuFhL-rO{BEguAnPna0+gaao`59ZRKpt<%spTMG8 zQlk&U*z4Grfxr{xx3cemtu zn&sJn4YPYW`!ExnTGz`c2I%N}%F8G&*dD&%*y@~BV4p!Ox_%CjLeWNQs<+G~d zy3cXhYwjZDELz>pzQ_e%!}Z>LKi~iae9;aR8%B=Z|q3AbYR@rX=GAV47l@lkwff+IGBH|+|!w&r>rO3%ja_633i8(c3Uj*o1 zZ#-xJEglB*+azclvHet%uzZh|KvaJ`f^IaE1-cW@0ou+Ed9iS(4)jf4*sxiBM}ZT< zDAA8LiKf}b;b>Dr>>Gdc(AnZ{oxBDx{;4~``dGccd$bEJA|GKyu%k4z+fp-$SBD8a z30^}Q;kBt#yg_plEE3T9Za7)|_S*vs8n9)7>%5aI)M3mo3;Vn07wS6B?e2fe_-@W^ z<4*8*6%!udT15Q><$1aJ9 z4$sSkPof$5bISvY;k8l|MkpBPISbhBp5UFpeGvWFC9YNPV*@oj)e3(jQ8U-ulyA0( z9gYd=w2(W3r@5v#t=JgCV7h`o`WSNgG}PQ;5M{J2q3=$J&Zn_g zR))?_)Ss7Z1^XE4)lPrYfl{c??8lF25^o0fJsR*_h+=UMC>oy0JD20}1Bhz3Oe5|o zVeLv{z&k~jF1ff=!4LN5D}1Qqj@OzaxX-Zr!AATk*1{{aP8nk$t+ZbsBk_{mmZx6w zU-*(O4JYhBf@leKcLhX1mr0kapUVee`dJqd(KQG9B@OIZEAfBWzz`xGfSj;^B~UHT zy3#A^HUPIU^tVY1#0(MUN^ioJA>%;WwCK{E(zlitUGi1FhH25Mt0;K+8q=bie6ug* zoGtxWU%}3^inF%q=lNFUomBwawCFZ1x=o9&p$S%!7M)n>P0;IRMOXRsUd5J`)t79u zy4b|yWks(l_OO5Qtmpzxuxq+L8@N1MS7+<$Y+aqLtFv`=wyw_B)!Di_TUX~dHoAjKn%rl43 zF30xN4wCM!Rd~48$ZsWlkO|jgcG#&8f~U82*}Y@wPOw%oNXf3o2&v7+C{;_}S~kY; zQL-_H-%2*daQSQu^V&&PmW`1Mzs<%d-BYQ0mG@S%wAmQ!xrSGpjZs$s`@RlI_0XZSC%%r6=I$iQoZA8qjC%LG5LyOHmIYCo3wSm6(YbiSgXpUFkw z-nmnH!wnqr?#1&{_MvHv*mi@+4aU7KcasKW~blVW$EEAC?ePoJbMonQHbErV|Xm2 z9)6_&{PfqU+Gw0ZTLmaaRzPzd*5Gh&IP4$Nfkj8-iM4mUe`FmU^c`z&GC4k+j1R|S z+GhYN^@4+EHB#GJ_L6;}J^hxw5hEMmfJ5Awxgc@yfL$1Qy}=TCFDZW0JAU}rg&%+M zzB&vB@QphIas}*Jm;H}zpm~qx?Y7u0pIl!jH(>B{OYJsOJHCH_-P$!?P0CW_IP#Y? z0^{T+9!dw6Tj81G!D&2U-?!f$AVtB=ezYD*mRuzw6>`G($@nY;| z7vt-V-@Eaw+DAvDJ-XM2SslQv_D6pc>v-TCS%bsz(ePk@*WMc)HJDY*{Chh&)l>IU zGb=v5j&g{Z#8qZDo}|jBH2#*F#@`bj5c6AkF2nHlgwH4*$+$+0uXze0{;dvXWShwo z8P~z}wWs+&IC(yvzT$6|O3BwSN&GOR=8Mj1rsgM6)MoF5@Z0A{Uqs#eD4efvPR@vJ-W2q$;O#~+`~W+dBBV$w6cbWR!O>oZKXeGyc!aljEIvsE_z8sklwD3IEoC;id6~@nO8!$O9>OOi`{ZT@7=5&T#q&Q`zrkhZg_YN0-Md zw1U#`kPBa-&*3Nh>;O?~SzX`~pju!3AVNy1j>K?qE16@KKCKCQWRHK359nxU9ruq$ z)}B2)utwwYp5;vTcb%ij-a-Fxzkvz*Bc0AuHs>Xbi>T+q+U(;{ip|Zx;Y7&ZukjK5 z(?>rKn<4y1?z80E_wWx+0CL^mP|;j77)W{fh{_LuU9POgIFele>C-P}d zA8&m5S7{ffs-fa4QJa57{eH*4IRYQzKk@zVoW!6jnEU0k*nv7iJHAFv8|)tsc3DYt z*U|4E;7J%gO!-{eBma)Z8?{yOpvEnzkl*1lBY0CXM>n;FM$Z~=fZh$cnI~e$Pr0i> zxHHn8lV_-994=Sf9T9e!;t|!EyF)(zIYe)UfW$l@y?@$y@$P>+F4kO_x%(mx9t1bG z=l&KuP;BQf(4L`$GeH8Z*5eRfJV;c!tOAM!jK}LlcrsRvr$?@Q`HR)Ng?e2wzV-c( z5@1Fg0PDc_Z>FHx7ZDsKQ#l$B*Y>|sR_u;fUX5zx!$LQ^v69! z_9*1y4|P(m47z`RJlUNbPOOQuyKn8$@sV{r**~`Eo^w1Nj`oj^Cj-`YOs7+(Em<=q z0}?Fv39xs{YocDhinqFp0K;mWAI=m%aD*2l4GPvsRhS3#ii;0_odz(6eW$9Bq5-0j z)U^kPhr{FJ{?Hl?5B99R-NU|hbg<`G6MF(<-y0v>&cT05M;>#wVYvJ?zAZ)k2$=PF zZ_l>&hZAb;?eFcuB5^da_D939eQ-b>d$_kk#Kr1Ieqho_6a!|4AS$wYnfXdUDIMZI zrF2C5yVi&v99nymBilN5j{DZ$XnZg}+#L^Tf0c8iJhN&+OpYv!>>x5D{UIT^Ou#^L zhbhS&6iI)s^j|X4DDh>=PpNY1xDopD#ZnRpBm`5%a==;3-~cVs-l(OySn9rQJ3#Al zhH-G_M7KRKkTICa4y23e)EhXy$2{0d31eVJs94aPc%U0hes_F}Zudn9P%(9gEfTC7 z+Xa-!d`dCD-_Hrl#|9|SwA8Oe&8DwmjF&0(vJrxwnh=4*3g$5ZtAT~!X!GvcN zw&7EX*KP3KCH5pGLT?o+PKiws9S}z~VqgAq1rESVT&TF^l$LH0uf3&4K}IB4+&(f$ zd_uZ)kWv`kn!*So4f2i?67qhMD#-IAa_4`BE-;~#bAo0%w zK_qG|!<&);gz$v$5;S>YdQ93D)PCUg;w=kC_^Fua9gN0WbTUDZchrL242&KXS!l^R z7VzWHx)nCIQAuxn_X|dKndzv25e-;cNms>ljzN+T`kwC0d}lGGG3J1T6=yHt=Ea7- zZWu@WGY;!S4PYJ?VEzNZiN6(wcH)0?1*a+63dx0sX*;OUfYU8R(!z94$FkW6LoHO1 z@YFzSQh@T$I#g!(vcysc`4XVwRV4^j!#;1BgZ^P1V%yhWP!+gSkT9;Wm09;Dp}%9LJzyj0u;yaJiVj-wgc#Dy+NQD_mHuzZpWh&lp4f zp5OYVcXyJFhjJvPD?D@aPmg~ke*Xiy)cJgEF=s}$o<8qryvgt^^UBFiRKPIZTviYc za2*&!pzwp$>Dp>ccr}&lL4WBQnzVmuhwI+K_+S?{)Yk5B2x2(in^?!k^uQV%9_{T7 zkH-_c-z4U*_VGsX`#N}1V}=ts{Um4pd-)SDA4=alTL2FW^Q|EtRzwph zt}FaUT~%`0aM%gN*ycsYOQ@FewI!ieG=)^YBIPz+!NMk^(A;GUtTM-s{r(!b5oO`< zVz9Z*j41QkoDu8wkZyltric;yF_`Hlf@CY7oG57;J&hrB=hH#NVkQeALI+F;IbKktrMdO!EUYt)XO&*z}5 znTzfkkNl;$C(AcEbDOSNV`9xs4^>m09gC=8hSQI6(Ak4mu1kN3chq(yAuu~84+*WF zuJQN;D^ierq;lm<$DmBiRNZCdBn8AICe>RTgrpMnFPV3;P-(sNu(6Y`vT@Cg-C%q< z%9+ICMrr@UXu zg}{F=9t0a;JnARP_fQ$H#D=K-HgGuNJh;0w0JRZhT+gF)U9kntZhl|*qBY|GdkR9O zxZ9VB03v@P!aTv6j~DsFj(BEJUa0R0Vtg12QEzc0q}LYMk#o0s?)yj=ylY(1_6l!14)BhG?(^j;hfi~K}LPZCLs41DFGLjG^v;2z?L1QN&I5~*Qv zNCm0KYE9iw6rQ`&k^h;T&)A?|im?Ui1wYqMHb;LdcPtYXgkKoE91ACcvTaPLrlWf4 znkx<2&4G55XKJg{fNdbJ4dg8u$RmHuNZxpV?}(0ekFEVZI^@R&?c-y|8qwkYaBp(B z+dmp{M62|Y2qCnQysy;}yn3H2_k-XPRK3lhev>|Hliu-W+UM@lmvXG;M+~I^Jaw?B zo85n7B*KUN6HipaAy9heK<$I{?}5+vB7Cqr-##vC~lY^JV_)5QL`)AFgns zzid=+uZ;@UTMTfh$O=D@6Z6L)*G?XkE=}vUld|~N*SP-uK?0#)WKsS$qNjLXi8{<< zB>ealfgxeGL~MxBg*)u|VL(ub*W%Qk^4ot;eg6}5!qo+AiZkQj^>%iu;HJH*g~U3> zGuk+IlW=Dn$F2^pjbke~Z5(?!Ir&=S*cF1t+M4ps2as{cveu#FvXJ8M#*iM*)n7?S zPYa52Io0xn%s1Qh#b(Hs^<98v1U0UJZ8FB#kfNCiP66(5?wf8yYrz^X^y;s>bl z*2+&FJDF><7^P?h_=LnJw;*NEMBWsuVcum;@x0r;?P(WoI+C>$II$ocy8`Bwe}kmB zu)`2!*WnLA#(KTPaK$YU;=JX8lsjR*ADa{B$D zwKtj^TSvP`6Ki*JG&wjL?f3TwT>Dk(CE>Kr3s{w3VfhE~TYgneyw&^5*!ClB8E2Y5 zj^Anhf=hZNslN*%iTBP9#*=@6wRf<;YuU$>zBQ!uVDG>l+jP_P{KCN=;$5xsvza4-oizK+$DVt`_PagTnUOKwS$e`2@H{!P~r^1}1{Ooc3% z6YW;}n)tA_H-(ORUJaK72m>lr?W??O#9}+^f_)#0`A*VaQn`;SY@eL&G>Eq&MEw-@ zY+*4Ntzss^C}~s-Ax+8xD0u&@)*<&LGZHYp2XmHri#x%EQ2T$z3a|XJJ!KB0N-(#m*=mS48!CKUE^q=K8T6v~P>`3M8T{kSCA1``> zzyLo@lQ}KI&|Ubdi?1baz=zWY4ptvH;2$K5IfQeOI(2`PA5S2-k&B7aMitgMs&KeJ z9*&*K&~kRiLu>B<{y7@j)Y=;yA0Hkc9_|f>P24zbRH2P3ltmR9XW`b}DgQAd5%zF2 zJlq>wyL;^Jb?4X`4JKoYI&|dh+Q)~(-9ZCERvW>uqP3=YKS3F?VRCS*}23~fl_x(!Lx z(empQl6d*~2kDnvA5%p0YPS)HQe4U+5P4L7#lA-U4=1qytZ9L?8oU14~-|!?+4u0}Te%eiQ<6h^*HXaL;G&K^K;iTd8oU{a?*}?XGZj7$JU|G^*FemcW*^k?@b&8eB4ukUs=rlu~)W~id=^^t$01D zHt5G&_a1*eGxX4Ksle!!j2%gNb{>Gx?syYFsJ(Ft(=~N%jIGC7HWp|xMKBpaaIu82 z=WaOmS%@;#3jbjrK0c%2r})XkjZ3{u7x;fq&OMsyJr9wQ@BJyvuBn1LTAcF|*djE& zf^~8c09Pl!c9(sPCzh%HJh(F>^7CucQ@mo*dh1Oe@@@>pN*|hq;MU&vg~7N4`(>7c zGEdD?4wpFK$?nd^I|eWwzqw`gaSbtSkEpyJVJ7Sgyp(`!vgY6IvVdZ)Z!cFS)GmLM zr9beNps^NH2QNycvpI0te_Vw8CRN-9$1gEYfWzP@>=&a@Bup9>RDOP$-;$d~YKqGd z|5~q)jLZFO!=#{uI$9-^$r1l5bb$qm;h^BD+kitZh|uwluYI!J_97QJb`g@xxjj=U z7;%U100G?l;_w1~oejXpbR&At5=(y)w2^zgYt59AHi$mnl=*?`I>-EoH!E)zhzI*z zDMyJXU?r27e#w_?X62jWeE332dzp!D+`)f1~JNm*-)_*~rcow=== zPh0wu>P)q_Ka*$VwVa#yxmtgO6@=MCTF#cZP1_BK$GAviqC}$EIs3vj(@K9XyM$U~ zzs-Eljr<_Z@M-K(tnrK5l;zq@DKI`u7qi)Y;X;t01KV*@`GMa9@G%U)MfV_w)`e#G zcHm(s0PnaKn`@WLnHUEJwx*coWh1Rz4a5ZbU|p1z03T!I2BRc zx6PXA1Hx|eF8wxjt*b5mLlJ)$m<}k}BX2UF3D)oy#7$^u+9S_RBveC)*g6NK)Hx!i z>3%$vtWHjjV$72(Dd&Ni?>g?}AEuW^Mz98^*0qH%uH`9^HRTzPVKP#TzAr z+_6e7Xb?Mss_2n#DsiCs zYv)<3nz;1`OeA{}r{l`9ytvz~MvfY%w9JazO@V8Z#;T+wwMk=b(%2s|X-rltPY|o* z+dj*2hbl{}yHabf+vxMH|9C^akDQeef~tRwXVXoeC*}J7huVKF%zf+|TjW7Uo4L#h z55I3+pj0rveMr(G3aF%OzboXIpWaX5_<_L$I=^_x4gig6wjt1f$Amq1j6>G9h#L8R z|L{i*86-|Y=S7^vnP$V;Xp@6K0BamWmJScwjc@7r6NB|C_79>TcbahO3DHc#uIUvW zJXy+!P$@seteAg6CbhMDG@f_`D`Obh7!AQmdPR|}7jejrJ;f9k)~*(F{E7SudJXX+ zH@-a;-dl{>vY#p*a4&1Q?2D}^9PEk%#!uq&tL)2`>H8q`f3Fgd*rz+Cvp(}d)Hi6p z01pA*6u`xrO6Mm&A*)n>sy16jLN}D$Z;Q`_g2qR-1crYenn0)jna;lT?%s5m=Jm3yaH#PyLkN&2Jl@Q+T?bon&%aJo{ zhE-?5KKzs`$}CXf#)oCV>-9vKM0E;l`km|GXMo4}K~MfoUIkCP0s-N$?{lip@B+Dj zxj9PP+d6+zFCKLK!6HU7+n%_^K<6*LgMfYq)B;tTd6-_xJ_{RA=I7{8Rv zf)%N6BJ=w>@_2$#hJDj`q=ifqUGW=KG8ay$%c;|!uzjZK(XLU6I;jgmkcXrV^g|x| z8#qXdgr?F0@&e2_wLB6mdPv}r=C5vg!NGOI_cDJ_@zc@j87^11?tCr-&okS5kQEtI zu)9>4(<+_3fY`b0_6|`06c4Q5Fm*+#Vy6efZ^jUzKrlC1fE1U9veoF(*Bqwga~7L} zCt7U8mlIfGzc2@KmzBrD0UcDxEgCNQNK`X?kljPZjRNQ_7U95WA0kHvp`Trz83l`5 zKq!Crnepsz!TAJdMt$#_nV6lBfvA*(pN}pMngM1wAm<8913rAlf$Yhzt`l+VeLod2 z5q<90=~E-LxE@B+ZuYl%qmunR1DcCcwl3V zd)PYTO36S&UwS>??CW=&IBaMARLmVpc?8Jqt{I_&w{a$SD>J9!o;^*O_T`VMqcQdsJp{mH#{M}vP> z4naRcq#dxiEdOeu;Y(X-6e>We^mRo{Aos(moP{rVlpjmadi#b#ZVq^;Csy%bY*hG)FqEQ~C5@|unPn^nrI(uj4~Bi4sq z-hVeUC<*j0KI~)2C)aaMCX4CRXX$^an+YM?k|#8C5W)ZSb35wB2UqaaCT|nR!A0om zfBirHzyJ4t!Q^ALuSvOEn1eB3NT^2t+yBUYPxzQ6^{V`p!aa)2!`NzV${ej;=OkyV z)eAKnrufwn-Bz{A~Hb2yx60BL}DlS#>RfkN?CO`*?qCu+5dI zBV0RdX0g#%thVmlZ~wfd;Q(yXhF3`QygpZ~G)RL#Wq()}to3+opPi!ZFpJSkJ& zQciR2Gx0oLE`Mp4Z6qd2j5L4OI$nuUo#=$KSiK(7ZOpS}#J=q7@^NLpP{agOAGoj4 zdZ1d@`8a(Vis|e0CLYLZzo*)(@6*?4eaQR6e^c`-JUaEj9chC(!=!L`v_PW#AVTzt z+R^j*eCm#w_BXL;mTz+AHeIvE#G0EPs-`+S7E!|tN0UySJ$U81l)!&1dPxX0cJh$W z>gh^}Pp~2d$ww+z&U6gQ#7xy)Mov;dOkz^KwLwTKQ9s`AYC2eKzRUI;x$BEzDa)JH z;zn#}2igqF3f@gT&+qv42W)ht+%cm}>Ev2?l3Jv+{MY~bpZ~A_^k4pm|M|cE=l}En zVU@add^=kyQ2*)w<}iQCmhdDHVsz;woF?2Eof%m-e>LpptYKZ#;?vEjtZrI#y9QzU z|Ji%D!QKGVP4n?5^$8KFot;vtLs`AbrC6Img|@-NSz)Ga`{lfb67oqkv4m z9Ctr{&hc|~i!scdi!qCmXq_rgnm-8ry3LF?$D45-?-)_S3AAn6n}$$2bxv>gkdd`@ zh9bwqd6GtBQS&M1Y5|UGV(QGHNC}(EKZMw9LFNv@osP2PD&V^@L>Ghr$At_G7m+$7 z5Ar9!y?L%aw-$d$Uh4)uKj<~RX15-Ct!}O1`GZc!>o)vo(C{0zTDyq@l$u3?ekhd{ zbm{~;pwj$OGfveP-xuQtVY(^EeamY^Ej2pIQ>qn`qq~h^ZLCDYFoGCX?iH6kj{~2{ z1kUy!E;f?JK{kht%@X)$mm7gK=BVz;BTzrv$h(2Q4};*#zmXgtM7l0K#U z6X&+;Q-Rkq07bwoU!sb(p7w8F$4ynytE_on(e+}-CDr+KuADF5LnNl1*`7pOg2hAURMjVd4B4FT8rNZs3cHZv2@EzQ+_6=+QQd#>5eHb{y zW*fL1Hg8z{jksYoR?n}^{a(^47<@(|gMh{znp;NVkNQa=sEtsuL9*da~OZR+On=nW}myhW|7JSpkr`R>YKWq_y5i@{s{^9!6WAZ6Kt(b=yn{3 z(B`N2Y|FuzpKfo-i|{HEO}2L4Scic64`<2b8io*C^}uZRN&n!JG0;b|Jxc8`qTHyx z7ukJ1&fnLEJXg#leaP_22N^IA?E`=RGX5dklt!)5@M?AV-z61Dv2+2P!rfum49+^) z`$XBLtsQqOJJUUp0#?GgCl8QCw1%)i2{Fi&Co9MP3hb%84%q6Mp|;Vl@p2Le2J<;WF^A^eDPyVn{R& z*pcs_T(coBcsA3Y-cU2fKgaCPWU`jA=zJ(z6pjHQKhRxZ-y(W#1Cdj%!a0ag+i8IU!bvik6>XD3@8;F)QF5Ru zx2|BoA{O&D<$w@t$@evx1disFg4u(1p-I*y?P| zcCG*#M#Cp%+A%@(9khS52oy+|>8B^i^TRkzXY5=`t|nASM&Xi3YQ__IaPa)708prm z6tR6}t$wmKuyB0wPrq)DPmXoX!`s8B_BpYy!0{taGA&Dof41erzw$tN0;(5df&Pcd zXoR%4Bz%%q-#(C-sQ!SlBS@(H_&qS)6#;4c_sQ1ujRgtKk4%3dQT%lw5 z#J-zD+(ern?BrF_A^yEVUPbTcLJqWbg)a;GEhKzuAAW)-DCjHjHi7@zS}wzsMBne` z@T3Ra!&a`^6nmjV-5Xoh%}0MZNy1q$4?weF4$k-neJk)%(Tn4oKreaEZt@o4aEceD za_#bOk)~H`S>Jym*&D>N5-~I=Na3^^+D<&c`g~#|tZx@jG|@W}H%MQMbsGNQCsc+3 z*xA!?dy@USRd$!y1E}CFwc|R#O=`>$l)B>_-+?0lK!H~d-(}OkW?COCW$?~1RmNYLOlu-m|xP)2~%j0<7 zm64P&zbNdx?46MV2o9Q_vsXuGX^^}7b+6WAM`vj&wHc+}_6u(x$@bGY^9_>i9mn=wE*TNK7$uCyrSi!9TM=fFYxW|Yc+L${`0@b{KxNO zxP3C~rR}v&cS&dzXQ>aR4yO#r6tu=vv~f0?#xUV!{63i?FtagGT~HJ_SLcZ+o_hts z8f-88;Sg1f4i*Rv!JL$75ONRiybddWIEz&$Pijf6yLw{IKJbs<_N767<*cMf3^~5kKaTw_JN%izR#mHP}FF(2gWv z*35qx^_DPWnBTOTje>77(?@Q!ZlhQ5RioW68n07p74@n&YW+^ph^>0zka9N5ckOzw zRrFoA+wJi0K>3a;IqoCDmGb2cLpVA|kaoY->kNW{7Y_P;uhkqd1nGu>=XaWeMz`+w z>tTHf1Tjp__+?i9LHSliphf`#s24u~OMx!63(MmIP!La17pszuG`Bb8p;Dw@~06{t%DBXXl z32R`i0tVt6B4BT|{9ZE}dd+Tk$Sz2?<*`3|UaQlqcLtpxYI8sD)xd7B7$}P{8WH2M zt%H4eaPV~DA_mc*))@}E-Z1Pk&>30t{94GQ;5s8>!62*!ozAT;;#p<@D5}wCS=_st>(h*spu7Ua#Q|{8q>72DMfY4u_3) zca=COUpi2!(XzG^$|r9FTDKwNb>gAQ>j+5Z4>veJxzQlPI>RJj;x3dkUsQwxN3_XS ztA+XYXUKNtTd2sONzLeBiS=sTl~e+XQq95CVecXErkVIChs!!9a1z$XhE{*<;V~H5 z*oTvAl;(jB{vL9gMQ8p*n%ag52odmCAlwhqe6^QDtRTb-uXBenGJE0B&JV{g!Cn}_ zFAlizp^?((m;#-ygo7V?8cEPud-!{A?u3Wo1v<3COedgB0mB%7?9jC4r)6MxmW<;m z7L=FJaGrq>IRY344GQ(xF%W85@#>VV0D$32YezugPz?3hYb+l7Q~vIIrJsX3R{lV;tEmj1MGmO&DZ5?V3wA!& z({r+ov@UHTzcyECu8U^1EW|jMtnDBQ{24GKLVOi11l6mGBB+Eav2*As7YNG8E{?#0 z)Ydm!Dx@5GF@dBxQHV=Z*#aLA$45Q_&g$Y*01S@6ch2zLI0AnJ&D^GWGwu+hvgdd; zJEKzG;=Cv2Qq&X*7mQktqbP(NKqStB6A*|eGEiiaT!zWj7$Dknj+DRf(#2z8@SYYV zXE7d;tJPtJ{je3)d?v4V+aZ(O8*Q&YY(-wTQ|q+rop!AjEu*4fLhLifvq;d(6cEd% z-7H@y9Guyh1`MaT~#N=P#-)TUdY zXenP{Tf7VBIM-cRcrYLbMHvQqdvv!^+7A}yIv!R zYF?{e?|6fL6nbIPZ`WJlpxJJPOJFnYS}`&Mv1155nuUMJn@1S-p~nHy$2`{OwnKe% zSmYPW$NcCRXT;*@`ofC1OwHJXeL73URXUjk>|_hm)1oBl`~o5j^o8b;H|ubB=y|6K z$o9&j4>$OI1N_#N;UF1oZ{;G!woJA|FG2YnDS+;GNK0(ifldw`j$eO~h>C z>yZlC^WT5>NgM_!wHN6x_GvcEnwe_JC;tXv$`V-ONZ^T~f8ylIyQ>1Z07Cg>F(?Kk zfBQdjkmxTN11R%LlUHkq;_|a~aWSq6k*k31W=G(f&nMUNJabJj-29_4*GB1Xdl$K? z_-_gUI`)GPfFcW&N#{T1RPl8J$r5L5Q?8j5o!5Vnf-;&a7GuF;(AO<4S4=7_@p!<8 zNu1JC_@Y>2t}4v$F2HMHLLP&&-83Ojv%c4+j6AMove(JfAFX7b{$8_q8jRD+P1C5` z=ehLR225$U2WU}n7cH_`yZlfz`N253U?;>+LAAl1yydb~3STJDrJb+qTV#J+Y06ZG3aiS9S0Gv#a*s?yBAIUh7$_O)fZS z&71*ixc8B~8T>aN`;FwX^E*p*(@lFdwY*aajKZ|hRbtk*pZDHit=jV=ez|bI-LKM= z0;I!WhM)%NX|MkVCX9W-HZZPZzYI%t9b$2f<0vXnz)(v2)y9@PpQjb$#xZ!K{Vng%(h& z|CCwn<=s|f^!KlLy-Q?kG5H>YYx($AN;JE)Md8w+S)(IW{m*L-BnrIHglLg5)-}!~ z8+>W@|L!T=#EZKoEX>$b+IRpITFSrcw2m;cTs#}|(FAtJq1v?sNQe;dbPnzoyK6uB z*;8WGwD`5o8m+JE7!eUVZ4KrA$$_Ym(42<6=c86Rm|7fm@Z_vG@YK?z6evF^BW+ti zn&Kn*$=Xlc$g%gvjzXOf#@-v&kj!wY(s8ws?Bl*rmCpxBW}2%DNZZTS#iKT8E`3gBQZAQZQ5lV>UfRBM7?1 zRVGVyhB?@GI z*C8Ar-%+UJY7P`lV3bYu%`5}gc_!M6Tpfb#j7tME=jDsQ36|sv-_sXJkAooVwe|@B zFh=zqaZcCSBy58+5&w1rrn|$6;8c0f#cCkmF)*a9={ssu6}9jUvD5=-JDw_Owz}HA z^@le*$?8YE+;u_aF29k5O>F3Y994kL>gw+)cl0zoy}GqOcBpwPS==cS-)ZpU8OV2z z$dk#BmLWI%OT?H5pIQP?!?lQwD4|n*q!U7)5(Revi%z6u06Wt3O?Ls! z3T9TA1HYCJF%5UDnfykvg+7Jha>jj8lXDuBY@o!Vy3+%>_yc2!Sf_*aiYhE$&-k~~ z9E#5{XMsBP{oEoT_JOr@K4|%FG$3u~x>!w94LLS}MNR~X3~jX;Dca5c{$7e%q=hL5 zJQy5m4BDKrk+lUVRf2pUY9P6l`CisXZ{0_*9*wxu=IZ;m)B=tX5nW@qtVT$~>#`#uzE3%6bt5@6=1$YI-ZXXuc#dLbg@?7AX$l^Vq8diCf|JO0vUx|5c%N8Gh+8;@qAIsnLnG8`8T_QY*b&6>4Xag(f4NT8( zy(*Pbu*s@>Z3DhbIh-pZ{tpUP>Bd6p{HN{d1f7z8P5siV6Q-cs}Sb-1js|1?qxNZX}zBV<*F^E4pA6O2{c&%+2%sRgor-KLP<(iG@FgpSTdxQ zicHP(_P_m_J;|=h+clbwEge^)VOS4G4TU*f0GW8Lo(w&-d9apKdk=<3`N@OnLV~rO z)!3#U9ajx&0oLFHktk|=iDP3HLw=Z!pVEr^>I5lt+diq&HzNCwY((TWPlg~tWH$1- zFjnCH1p3?PF}1u8VKn{xWSmgDa$Ea^E2*kZ0W$~5$M@e)l44dyN)4AdY_p1VS<0{; z?1*bL7-f`K#v#c_A5&&QDuhyqbp<5;uJfsRko~7uYm5k04;cB@Tb8KY>n~^bOr?3L zBSOcB(zv@9I8w!q@}N$#SX`6$L@$ z^?ucK`tIaJYEyZl`?Bk85Qfook(F7oUFB+(dtnF`VnF`#X{)zhtqOAYlEcasQXpW5 zLYwUGr$ScSHIw3n|4)f^C#6#Td4<@OvVHCmNNnM`Tc-=}J*Zx~Wy|1*-=L`B21RLL zmzWE`r=#rwLDb*(-Ao`jb_IE1x1f-Wo6jlZd(TJshd;PK*)z;hrwV?c^3gm|?7>KH zr1DKAjR1MwakHtpQ-&NVKV90sCn?~k%^6%>&I%i`gsqB5a)j^Cv08imLAkc)p$96H z{QYEQktIR=1$;Qw;dk<0UiN|YmSC$AfBkC3la~l^;`*UAXzlu{TPtAjbNf2fuXp(- zRLEAcWH~vhX8+P8odpwwdqP8jTt2f%MKi7F~+4^enA*8F}u1sA)w4|Ou! zXT90b*YrTWiL=JouDmTfB(UD)@Y86DHhP|Eto^y>=o_${(JM@*?LUAptida4$*Omd zjyow=%|X!bHNvi(S^d!k@~eIQZ`xuh+yKNA?4%AS(yjbw@&F5qAD56`dm5KkCC^g^ zcnf%R43?OpP01B0k>MkydIl<9kD?V#yY7>F;-@*e^fk?H?m=jH zR)qDy#x`yYJQ}hF7{Ep4^dWByF`%#ICd?$QBW{lU$v4wRDcv46#LjQso+tNcML()h z#hr>P#JGRW7Vo}n?$q73W_x3^pS6C|GhcZM^s-+$Vbhu*h6bFlFu2fpSAOSiI+NF6 z0_sVi9uyY(30u|A0ab5OWt`~8%vwnZH$q>&@lsMA-C{%q2J9I5u<>L+qcS+gJkyJ0 zH}J)D{)o@1AAH?sZR(Q9j%{^zMrae@O$r41IH)9b+zxO~!jC4S4Vv!tXWP_d=?bRP zP>srD=2qAY4*~?by9C7{%Pu>y{c{;~PMmnZZ~_hhbM_d19j7-*m&@K*64f8+VVG!c z)$LyRdaxkL%3ILjzeK?l?dlEQFd7s8Wg$rfHs^RdfzL?bWf}OiuIu@oClE?rv-64e zr>XD+K?<^Cz*trtVi}i|fu8c_EzOrm31;SJRIj@i0Bn&;mfs@B%jw*u4r&ncCka}N zp&A0F!ejPi04tw<4vvzw^ft^C|EsoOFx*U{XUqa#-AZR#`7sN2=Ja^&@Ui)r5u+J}J%0YJotwf>#b5TQQyLDodxqr4(apAfZmE zPr`~QOqUs4?7hWU0QJ)dL<94!{5|Af0{_AcpxYR0t#Vp&+mq8`}mYK3OXS-`1i8cq*2EUbyf%CV_vC9-92omQrI5POmX zC?%!Lz$Yr5$3R^R%;a82>BmqUz0#u#QyZMchm}BjSmKcotbLQoObzd-Af$M>ium5RMLH|_+QYF1soP}Giw#59rsL?J9v`X&! zrB2S4x#Eb-#(-BS8{(pGxvOKaY6<@GayI9k6KYiO^+og?6y%Evl$>9R`;gEgCUHi? z9y%Y3ls74ML>(XOGz>FkPCSywiq_-J&-d{w;f>F)s~xh)%PM1eA70(`#jPI%qxt?u z$*<-&1g6AHo%lGk{fRtuDG4VExL&WA!$-8F|AHdy4<mr|FY$2DY@+zyQOB8u9v)QVFkuT}hbJa^HwI-sWh31heR zFH(fOz7ZZrRanZJi>BOn5~1kG%?uS1*5a;N5DLElT8dzo5o|di&`(UQY4M1sW@|lb z`{&dtoJA%0Rog4?x3CwrhGv`x5+|o(adBA|P)Rj-KK@=)a`IiJ7HgGPhWwS~7SQ3g zaJIWA?E*y=oJ= zb7I9&DrI)-6Szld0n8!RF#d4wHWJjyt37v*cw(emTi>jW=vv&GR5=akfXL{E0UPKU zk1;gPw`>9+RDtAAz2W%sp{T}*r%zBp^uy@6x5P1X_=*~QL95XhHfF$C;Dlz4riQ#v zcXR9ElAB*e_v$bGRpd>>{v+948yY*b>sZh@U;mJIec>}c$S&XGRErE%`J3u`Y!L?u z*umA9c}K8z!qVk+uRwykBDTMKZ#SKePHc~geQ^%JId;LllYKBw0+k>|5^R2|ARW4p z6lOh;n_5oQZd!Al`wUg=j0{pJVMY$qZ{riq;B)ld*Sb=SznG6F4h><%^TkH*yolp{jfER4su#F$Q z`N%Br&2uVb&IbG6^8Sl4qy2s8#4JE?=JO?P?1D+l(G;4B$bo$se>kZ9;NYLkG95Db z3?B0(lUc9}IATO{<(Ff;^!~F)zJ6zX0gzJ{xHxD%o~5Le3wVdE;$MF8n4*Lwunm>5 zWFbQTPCy*y(w3`n({S$^iF%oD6DNut7r^Zg^wuDTEVm$-{G6~QOaTLf@VPU{T5h8= z%YXhY!A!!)Afi)8?(mw6KwOam_%5-i(6Q*jNT=A8LJ1{r|NRJQ;lo40xetvSjCJt8 zJofx!Ml&d92*RnJz^Pl8mN~Wy^oQMnd+Ip;(2M65vF=E7>iDx$>rsyzh3-;T5fFCG zv3R-1RjbyGRxEV@X&1afNwdN|km(HNDZ|{mXb1+!Kf7h>IUB7SS?l?tX{x{Y{zrmXK>996RFJ5VXOy;y|Tnm5InZgL=b3X`0>3R@`JuI@^&o z7<@N68gF568no;^B>MFs(r)!IpH1mwn^c(FE z_4106rY$pcB!iIfan`9PvBF}78JnQgNA(g;nd0yVn}NM`Sv0qgVVzvgMOBkh>(M_z09&Ocduk7`2#J`)pP#_I!3_1y!Nl;xT8Hq%%1QOdSX_B22s6sX9pgs z-?*A1z7sVjdPS3Hq^up)f&+o+p?VQG$~cvbBb;vW&wVp6he%NETuN%5juVlr^$X)%lfE&i*mfo~tKMn!iMGJZ^5Y{!e#l z#v|IWQ8?*4E0?Pq1iHO`?B&?zL}niE5mDu8{ASA&drjpQn(NI}kd=jX!pSh2R1Ii= z*|PEGooJTyZ67F1CNCI;c2LV34D5?GIQ*fsJeqg%r zw;y8s5BHBV{r^+5f&nw0;9Ow`ByMg>_i9>5mPe;p3Fk;mu2n^`*R? zx6n3?VFZzX2kgJ@iM|?x5B#Cz?YF;Od|fg)sZwoskZ66)12bqPK6fqn?|_yC#)j_W z{xR@giC?YEkf*j%O4r8aJ%NQqWkmRN9d1BYjK|zTQuyD6i@D>vTWFnxK>P44Fh}ft zCR1etFK&_<8Acv096O=fSS}~7$gbryubt)K0vH)EJ4Ya_n2zIlc{( z1*VsXZTDk8d?%MfZiQwf7vlItqBIF~VoQ4CFs*B5M-$@G)9mCpSpcUnx28o~;7_Sf z5H*nj1#NUJwSUG4Iu)8DN0TJ+%sX8x8@B4?VVFE!YPepDcgNlFXWrNdOpC-i>-Y2gk{qtw!g)<`=9R9Kx^Dl1e zbDd6J-BRy2(y1TW-k2c?_0@$bqwvS!k;%}O<9&GJLppLwel9KyBB zSIu4OgI8Yv9?MgJc;oUZtJTM)LAs4|E>O?nxX=CGQoXsMwPw?91?(8})Y0 zl;^85_e2==1L+o{@>H7^{4$*s2|t%=gWW(lV(;1b{zQY3Sn)%sKn(k?t2Z$=Wt+;U zYWWFKR?%5RmsZ(%7AKa(SfQfvjshZ_m*0|QUxSlnS;^;GA-_|p&60x$i^!vKp8ob9lX$MZTbPVu5)~QBM zrcrK^KU3$3Buz(i#7t3`#}SW(L*T=TQ3>$+oEaCU)vylS5*uY|xgZj`hKi z%*`$ZIlX5WUb!`yt8Gz@X;Dp-upN1A^g(lcS4v9P31%@~{n^5`%xak4naQXO(>{eL zL*&_<_`BAdrTy>P8J+h()Q5mL#Cn(k9;%Hcs%)n$je3CZTLNm@Dz*;to(t#O$5m~8 z7%FCWer0ZkODcyEg&o!6%6eFU7@T`MDCt6oH%5Gm#nHRb z#*7?Fatt0t#bI?NCQcW7w{S~h%yzXOSN%*P@{MRi z@@|&@nqi-)LC$gk7qM17^h;Nsv~1GsFW65YpmR_W?Wf)mN6q;+7~$3QOW3S92fOyJ zrxZ?2`w3U^^PlZLrvD|)GC9weklxH!U!iS=Y-IZOllxQGg_b~mo{)<>LC`$!#~Phn z6`Xy13wx)LwRt2jS^o3ce`TI{asex_*L}}tohMr#yVYgni*kS_PGZ1bOUn4DCl3@v zVk_fGPG`tYzca<2NHV?rnpAx}7i}p(z@oAedrlCEHIQVY!^(dJcb3=`^lhx~73ci| zOJtlKOY;?o$Ey zaYIAVE5PBU0|y=OX2};_s76B0hVwROp6dCmpt96QSiHNJ_2u2R`H7$o`i) zWB7hTZ#P5gWCtFP*7A=!i&>Wn1{;9g{}5X*iW~Ign3>>LvGeWs7sEfX9S0?uPQ0?d zMZurSm77VF+9h?K#R3^xvEdyT3d&Un`JSyikZD4~dQRa2%9ULUpJ%x2r(8ndE!Gw2 zhUp1z$?^DPARqjp`yf}f0q#n z_c9_bFaG%fSt}Yl!DaC^V>$ki5o_V~Wi;?w$Um`|=HrC_)l;yV<;N^?f5{|t) z4SS4g{!JfmCf2XR0YOI+B?#r8<@XvKA#)Eq1jZWMQviuw!4$IF?T^1GUt7er1y9Z- z-`6?@QXxMuzwtLC3-qJ;KvVtW&F23vZ)TYCj%UtTY;-bvKb+!vH@7;^kOg@M!isma z6J%5B)Whb-GX0mTrB`#xLwN$95-km?NZ=Hhd}Z;)ZvY&H zeCUnXJq)IXGUJ3G9IuFBm>UteMmvQAJwHEe;~Vqa{Lv|M?yGveu;xf$nzW%Ulf}2m zfL(gxL>>C}U0ZXmaok6KD$!qW7u7VDr0%EGi#p7x{O4N0v}RV?m~pVQ(Bbv{*jBI) z@x@EuUi{&_``MhCz&ru}XBtS=>3On@Aod$O^mPV65F|K=&sSX{v?cRm~B6pz| zu|$Ip+f5u9CuA}xk(1NH+paF1CRjslH>DkR4v>CJKxR9hm|?a z3~4rr@{uoT!sCW-yj?;wt9r2xy#yf-*FHbIyc@sz%_vz+9azPpgccn3n1G~=2$Ia8 zD(oS`J~Z4+*AO*fI@-tlb7T}9@^e^%$nnzY{`f%0IcnY3NSM=-vccFw^rgttp7UVD z0c7vU!j*`dVbaKs8$U|OUmiU(!-9RKAW+{Ov!3_SL6}nLd!Xm=ods?YGk*W=bYZCd zK0$P6M5h3&zR^%`#09nzN(|IPos^>H68bcSX3L29Huv4MTj7!>hlr;@C*WD)sAobJ zu3NF6ZIgvf)2=4(8!O%rO@~Ah6`+GiZE(@8Ir|?d zL-cx4AG^dkPS|)ZGPZH=Q#jS!nEp9nA`f=Q=akPqfilQrOygNKmzTHdh4>~#l!uH( zcj5ClHmqyYn(6gHi~tW;liPZ4_V>br9~mn>hiaocy7|^7YfpFoEp)m>e^8|zQ6arX3kDXc4a~Q_|UhtTVc+=cc z+bW>FobBJZI3bQ+V~&H^>ox*gjplmTYhBz;LL~Jnk3!Rx5`Z;44dgzEtc$r$`9lpX~uRs%fnmaO?>u^Mc2!o%MzWv?8TO6;Ta%u9nSJvDJ^ah8GSV zf2&XjZ|MB!$u!kI$<1g=hn|nexuM|1TnV204VxMQ}{Zr-)YYCafERetCfUcE}GqO?;DVI#v zepP8{^ZieQ{#jm(C!BH|7oowf%JA>3tG>$V_^ztc9V5YcIa&GNsbq}>heLlJBJ%#@ zrWFXypDlZX*B)~4Y!Sm~>2caD4{X&fmf!s@SQJ%E2PmbfEul0U503Xppk&e+?EHcP zQ5tgxB+j8TtZ#yLLOsmG?Exc!9T1Q+ez1J5A*R{dkgprbe|aV!$(`Do_qe{C<&^9( zOZM>RCWDyc@Mqgy^p=u8?vhR7GftxuBcL9MA8^}10bR^71&dA7TQqJli;L^|Db8QS z`ZbY9Kv5e5>BkBfMEdbgWnAQxqFY?aYP%T3u*dVAMa8Fsw;m`2vpucO-vM8l+xq2tyoMaOZ zY|w=WTP>Y_;WKx#l{&+Xr+0+))W^4HtJ>eq10L`4okOb#ahEYQOxDI_v;!un();QLg>7&r0~$au(y%u_}I+J%lfYzZo*6ng3aS z!2k99JpCF+PRxuItyv50Ix(6x+8n~uzqCtOn`ntL2=FzR%fYs*f`v+#%RHydh!!OL zw(kb*wyhh9y1hp1p+60R`;0NIoC4ylWZ(jTXG#(Z4S+@6y#(c_%1xC}dB_phN`pS(ZQmqJROQqP_>a8)Owe zhK|)~OKdrPNpIi7f`$=0+ekdTVL2%!?p{;4S@7Hp^LPUw;?lS-GUD|+Ws%}^sUge# z=E}4F@7*G&s7kfz)+$A2^Ia!R3Wbv)6@-QFjHThp3wk&VkEy;fr-9b>Y2_LSU%6D! zlTx_h_caMQIidmzH~AiiEQ%{K=z4_)#y4~H2hUeH_BUg`nJt`P%hOV?ce!7DP0&4q zn2uZ`Oq)0JoF+W|T5=#h&yjeFE&cl{JipFme%{c)Sha(UkPme@ae)F-4yC^z@~6Ig z)KSQoAB3RB}P;;Zl zvO-pETo)7-a55rAj0k464ryj7ZFmglK?3-W)2b2mxE$_}R+&d@4TVWyUQT!>G|_KXJU@S;Av@SEi_W z2mLU=pYsAB$Mlq_{Bz0CV7*&oY=hoky1#tJW)+I|#3ms)9Vq*Q5e)}-=&)T-lv)fP z#qUd11Uy2Ac|jL$k}zT7M*kXjjg8xa+#LjM?#Go35fU3JpT!ya@pieH8B-bgdue7e zPL`T{E%f%jj=x;cB5iRAQujr`NFe%4>ImiQT{r=(;Br1o{)te+C4bfSb}mg*6dN2! zzZn>!Lgmt8Q$l<4rRQ_qo3KmH1uuI-bRp0)mxz|EPm}$dES)0SKM~#cH%3X*Zzn7U zEDR&k5~30Jm464HGqMRWQMuxVQ|!WyHNS&QhtzA>aIHc-S+mMtygc|r5&do1zHryJ-tW5-3KWfkvG)2DC zf*i^F%Jw2f*(O9mz)nR^$s3~xiQEp9upI~{w7w!BV-5MXQSYTOBnNUE@4-F6r3L8>Nb{gp!UwaV_zaQ1f$4z7Vo+WNlcq zmEbD-C$}At#XZY4@3IuwRMm;0YQ%bAR9Q|?J#qrA|ES`_0jU!r4%vkkj65ptJ4^xT z35mU49)6e~B6XwznN-za+%YE(Q1K=qeO=1z+{l88lv|swpBK5GkG<(LNW=hnDja!)GmL<`AiSV^eXjo; zXXu27=qOARydzp26(HLHiC;1S&)n9xCFoxo84N~_U(QhTmeY=M*64WS6ld;ej-Ct# z^8+ygXqRSZ^v%iKe7&UMcuONec?Bw-6BTuTc$NGNp+FIA+Y5?()Fv^$^X3NS!4U5+ z7`nF}Z9F5(-rHg}&V&2yB;_-qLjA8(gjjq!WG^vWH921us&Woa&;KVSx;!g#(o*>B zGHeiwfpvgM7%pH_d#GOcn+BIR^|#c95dCvGpU*j2C)KutO}v+;70Dqdxe9;-sipyX zz@QEFjfs(7^6P?B3)VywhdogFET%xLeowIq8;sN3Bi;ia z<+)nq!U&Ji>MoT*kCYi-fXBmf@?A3g%4v5&KW0Y?Jfb%chxkBs)Bc0ELRC0lC25ptV!dHI z)&%I_`Wd{#>AsKy1O4h$@J{uaO%gm+uTVR>0S%hlutpZl;mi;4lSKq8(o7b=DZPVT zLnqGk`NLTYh}xB6Z194A_Y+4;m=!yzXUZ%&+x?;sF5 z3KGT?(%6sY1f8oFBRjgpiYxFzWsWqH5dO5D7XTw{Mb@?4=5?SLNiRvi+ga})CF%{_ z_9N4HV-uD`VEA|t`QqTxqF|?ycMMm_x%!R69F7GE-xiW3s|QR&$%?yCWgy-zkyArZ z!TTaGUYv{g*uL!Jgq%*(i{M)bmNG@Z!&`z=ZbGgjxnUwJ^hnTCy9n)xx(pq6oV`i< z6q!FF2MLGzgICgB48~ksd$&Noo$!JdedDdkwk6~Tci<&87fiKHd4C{(!$5w2*)d@K z!_WQx`6B3dJqdgzniND0zEKVS%{_m2LHbD%=e4JQfePneHkcaG#z!cY`nk&a`XK^i zEs36LRO^R?epfj@S7z&b5f=`QcslJq8UTIfn+m@VRZYCOT4Z9(%@XfD zo)Cs@GiqNaq_i$lL_5>H{ZIiC7;16h(?gp&4;?VBlZH*62oKui8Aqc;j{7t0j~ZW z9_W6)a)5r1oby)8I4!XWx)8|r*uQGk;tXwBMFxu4w0iDz8QRVmBiZ4~(i_gSThlfz z1r8uzZYRohY^ttgq`-cvTk*SNnNCxqZI%KYn0~|n6@se$)gmruLE$$L2?uj`$ES{N z?@)fd4S_o}$PP_Pp$T@JfurTmv2Ae`fKc2oYfo#9uB2oK157^Zs zQ#qV_%DMABLSzY>{&;ds!0Gklg{Gvav(Gn8$yE8>T1zVHYF_Y-^V(!-(^mClx+Ill zc6&xVKPafdnmk<}X^l5{J;g|JTM6s_PXB$P_w!EQ9Lc1EZm0fQz@TVuBQNbeZDn7H zDee#@kz7;Qsu)$SIKK@(W!{428EwwA`O3bRLuTP7-R`f~WHvvUJrxe2;Fz>y zrlh(Ti$>XJ3vG=jA?{e=Jq_xC4`IwGa#HLa5=PzV zclR51_(G6stIJ8?5nZ~oLQ!;X9(wBprhz2;#3baK>C2-Wid|-`e{yXyVQ2=VEosGh z=UaC&S`j6Zd3Ljl2~D3qfcJa0AC#<5{#?Q1G!-_XG`MKQ3P?FQyu-yixzjUW&l=OH z=8iRYbZtf55%cbvk-1;H4A~`zgI>4ql9x%=b=xz07oSaocW8-p|UoGcVNV@Ttkc<1Q2MT`=*2f;u=bSCS z$@$iN-2(nWLFR$fk%=^+GPgHz-ZOL=ssxurpHA}gFWMY3G+B?I#q#tY1;JfO`Cs2(EUp7;mrh_13!2Qa63JU0`RYit>?QX znhe_TkS_)e!SLcL0P*`2#{#AC-yb(8Yg>c_*-)tL3_`$dRxK@Ix=r;OEhLN~tB$|E z46?Sry%~%7*%Vkra;O2}Y5M-UlHwe%6MOHTQhL?(^ECuBRr!bta#fk2{91hKF~kPt5Dj>r2V5v<4$S}&z?T}#ui!YH|eae@4O>u`=sk)+ZB%JpEm+;=T(u&uqO=_f2GQc<`6Zp01jWR{|Zy^M;h^% zVM%o>r9~ASfFcOExa?+Ul%;B5oUiS18jmu)VXR8c-cNgXGt59E6a)J~Qa2gs5~IEo zbR*X!;T#Pi-WLBy@|ESTCkd_0yv)*#Ha7rZhI+F0RPcm=B7yGyV(%(4rBHY*4wSzbAv8f^Om*U0ZB=yTQU@b--@ z+#%Ir-AIXK%h{uyNJ@_xBDLdMq~XXSiFB+MX-@990y1`lRXv+k-ecvc1ePr-pNN1h zd!i+J7E6cmPdV`$gFS^BqF2A(?dm75^{cs4#}*CyMfb<|`&;mG#&a{|{CrTDsCh^L zgK0ge1OeUBbQtB>OtD29Cn+0OhznXWBva+e)QK9qYLm(t!2_P;_aE#;5`P5WgVl72 z0O5K_v!4_U_<(!3ebirq*!ABEdLN4J_*WFYMhYx!-`?E%9O&@;eRpF2HQ0Hj7Vz+p z>F|&G_fo3jQXfHWN$?VheX|WAKF@^)z6%qise&HOWbKA^61I2R%x)ss3Vk6-RG`>K z-L_sQzZu>1nUV(Tr^mXpb(b~FQ2pIzs4lx68r=7j=TD66W_`>v-BKG=@?ra7^|cxe zdfONKqnN7EyG_3WS9cR@ql0)?id=~=6+_3EYIZ>!wd2HQeWGo+O;~jZ$qicvAj~s= z$>`xEaYi5JjhD2y=N8%)x2h(%KQed-{J?d6pFZ|#;Ze0#=(BonmuBuC8O>3%f$3Be zV_)5NKSkn*d0+0GFd5ByF}dMHAOux8M8iBI2vz(u$FoE^IF z=;h35pJAz?U%Hnoj>Rn$Dp~lDT>P2$2%5+)Sv>St%NHbd7GvCalp1OsSkn6Qn6L~f zE&6qCL)ys5AHW$H$z>(di23X}iOCB)UHd>GM;X78(=qX2T12&=9=I51+@h(kp9%kQ zPtDN!2cef@Y@V)?l(rZIoB~h$Qe(D3=xsU3zL&lO4@iu zOIuI`qC^h{K_-j%Y2L{Szz>a~UFoT>YEykQ&SsY!@fhi15u&ha+IX_8%6Tc@|0su)z@X6yb=F1JozXD_JSpbZMPS{D*S83M z1tclp9kI;!SWtFzY3`eFR5T|985L@+mn~sh_pn#6wPsjN-R8OX*c`6$sRWcWZ^<qnOB-NJo2{wNw3F_#uu+^Rk&lI=4Tbcs4c+9?$PQ^McEaZXC_{xD%iyFpDxV zGxWs@7r!to$fUmr#@K~vAXXvDc9(R+CHh|MY9dj~3RM=#X5Du%)TGrD z0RiC}p)gaZR*mlw@{C{4CLy7$oi2p`sGG-vXrve&XgA&8yzmF;Qmbme52X(+o&FkD z5KJ6Zj3ac{04YulE>Z_K18JwM<8zmm)(yvwCOQZlpp2RZ5u#{hZ=H1Wu7`b|H}DXh z9Nml^_!P^;H{NhNgn03=5BtQo_eaNFa6jW)B!%Isvuzv@cMo^C^y}XW9(R(;%2f&$ zQ&g@NLq5D35523!ZBLpzgtqY(I$diCpS#P}4a%0u0XJ1EOjvFSvC)Wtt|+v*0^CqR z*;Vhkksg7Y!9K6xh8SWDD4%OD=1AsxO;w}=ePyKqXr%QaNRc*$ybP0F!Jl4nKyecO zoE#n2V%!CVhuz^Y$B$tX={ za;`I`u%Xu#yYGJ8G8?!Mp1X|GN8)exVG}&ExJ#S?Q00&6a7G)rR?SL{CG|WV*`KS#*uKM&&a7~YhFoiDB`d};H~1y z?s9*uw44&Pb}hXO?U9`Vaoz2W+!9`bimU<0K#&PO2^55*`=zs47@R2`xRD?hNGeC# z1JL-9sD(3@5rPl^Z+KC+aJFz$P7j zx!k?JW`RdCRlC6T{3Wu_NiBpb416K@2G<<07UI+qj& z=bV(rh1W;FC$Y_ARpMMJiv1KG)WAQfAf~Bql1{P-pH?nHo2!qWzm*p74Juv$oX>u6 zla60op)ja{9$>0vFJdHXna0a1QFI@Hxf*)yGF3+rYBT-b8R^+mXr|a;AP)HpQ@LQF zHt92cCFo!jwduSP@`9C0M#cPe)*p2Cjkh{xFA*m*>iQdmOC#ux^idJBD3fN;uBIzk zc5)YA#hB}i9zm5_*8V-JvdAPGaCw@5(L;VTYEqk^8B&+Fwh&b??uJFTXG~9sV}Pmo(9Q z+Kju-t0JAkvX{CwGL7l!0*|%@NO6{v!s3w(@2K*=yFeI&8J5ELq`3zw{zxGouZ7Vb z9>YGc3$rS9zfE#uD|u-rsdMh2Z^-x{+pEJbAHer6B@A{v3kOn)lObk}u={jPG zB#F5$$WCm5)_tPP7LM5$=Q$$7JP!~?#Xq`atc`e255Ms4|hW#mdyJt#qMk?ccV^5N&L?-`R7-OCx zuC&z?VYdB?s4G*qf%4P>YA{fQrSR*r%X+h9yo z53FtbUx*MTqk=BM08}dGYKA>@HZhy&XO$WQy8(xvcQ05lyg;(?xhb+(7oWQ=q0Rd) zFXRvSV9&ob83%mFN{VtD(>csKwn>?eHQ%TyH*ln>9=vP*4Dh<%Nd%Q!|y7Cets5LyguG8~)tz0xb(|bsr6BrW2*kZv55L=dQ=^o=_f~wa| zyzQn-En2uVmzBxyry`i5Fkz1v8pJ%((mO}GSzTbfi%)vyOl{a7e3x&dCV=D+4ZP6| zA>rjjdm5q+lDgHCP0Knic!TnmSp<|=E(s6QxR`Z@BD)OSJQBWN#+rrO$@pZFz|^y1OfsF z>i^tC(Zhdt$|GZ?M+dMHEsqr&ObySx1g=~MG<2?$nFC49lZiixMLq;WRpSD}q;be| zo(vN}3w8lyHiiI+GvFH)2cQG7X?;WwRpmmhYpgH z2`;O$*{E2mDL^(VmK#1DH!7AAPg@J#Y*Z{86$=isQL$`PEO)D7;To1=M!He4oZgL! z#hv3dZ0<6xwu0Mn*#TCl;+dyiS*v=7{Mc5m*OAHwcyJ1bT}73{9&ee72Sj{DufbI~ zr0svX8%0kUcSs!F;tL4@Gq$SJD^niPk#P^7aVf2lqWc+3PbB-klZUmk^<^|eu!};8$Y3q5^K%?x1hw*bVzH_UNMA=;`a=R9-grKevmpc1BQdy10XD$ zy^Z~WpYqeHsMm_p2sH-TgEOK+8od>$$1Xa-CZ+vfuEnph1wVa8-(En6%BYFM^^<-L|iF{2_@N*#b65+CG)FC z3Jh!g#UrG0MA_9W^xj@cVzGkcD9K6)VSN=Xm|tRzh(jA|#ZGt?o7C*; zI+0S#1T`i`H5GPtKmYmPr&*a1*8hJhf`pF~b`LNz4G!krIJp{wx06pAHVkBA-;HI^ zF8KrQ5mm&gvZ6nrC7S}&Y@UPxHW=yW2E}mLBy+K|0&dR3P`a4a&@%<#E+EeDEaCxb z`5G|%Q4a-QxEe^JDAyPA{<35U)N46!;-OalRkN3>_gk zPL>>mi(|%DH_1^U|@oy5wSD36K!-4$B4fjh-Q=x8T zL8giT-@iY`;goi-ZKUp%ScXYkU(>m6X!eF?-#*ROlVRQ>**^NZfN0Yf)k$`qG>Zp? zNuwF@N+#InayGdXNo6*KTO-^85#EvrY7V}k-HT}VYk8^`-4?r#P+WfsIyBmBlQzVC z^?8>oP)M$~&yxL?lWL9bVl%nQzciK2)9FJ3gQztUVGf$B&S7qlXmeQ5a(R-vP`x=$ zV7h0d`oO-=6Co^nnwXq#e!{PO(_JGK&TG#X7N!zT7A7sMQuDp%E+m@+e8RhTPzYWw z@Qtfiz>;6gwE+C`EE<2mC3b?p;@EF%Ix#&(Lx9UGG$^oTJANGIwwqK+Q}uJy*?A7689tJhH2m&i^S(5?|Gn-<24!4pC*AnqIyEowHljLwUuYyk@y;tQI9VMCq7qzzFpS2at*+0QdP6z}RzitLU>NmFwjDk!pL90t-^% zzyJl*Z-?=aEhz$hH^@3{OI?{Re{XNk9z#+$GD#L6)(dczmwwEKSACXC)d;zmb6Bi} z9FERQPbl)cWX8h}5_VeXbx;u<&}2LzXD^3QgIJ$HBtU9z(wI_ucW6yaqn*fGF z7gsl8W(P1MRUBKpauX0a`A)E7q+Jj9oCBG@)fvU_BIoJB%M-REVyKkhyg+{}Ww&+s z1Q6QhmPCIS5mqxw&d8KJ7bU)pCIp5Ow^b4sFvue}JU=Iy$3*K2Wklnwz$bVa3?S4A z?vU_h^hEViQCp2Zl+(P*Ug@*TkhE4v*X^6E8TW zw_bmHP8yhWVQ2fzl^7*Q3+q^_P-Q2SuV4v3<`GTaWMR=s8qx`8PKa|L#>nE1)$}NI z=h=8!5YqippcF-+J;fT+zu0$bddq@>ea{eAUiyGxbISs967s3M28Sz97-?cFJL4EK zox~S!*~i;|ymiX|+1?Xd^StJj5p$*9l=XkiRn}zf%n@FoZ{gvH2{!YGP#PMiq7I=4 z6P^id5*>0jUIj2v5h-gGU8Y1GAhR8*JF_lw)PzdMz!CE_c3 zE{fJ_jd*8mB-NQqQyp<}>55sbo9Q!A!4RO|2Rg>MuA~{DZ<$wk5RIa%;zRdl*UGUX zwpsP6Jmcn6+_YGi<~#GI(-@DOF^qqq)HPd`&48_b_9qGBr0?Q!xIY033su9MZMsf7 zpe?lZx8ssY=~WvyzyGLo_Zg}Q!8LEz&gg}61t*x!u*4nJmh-`q{(G)AD>QT8Zx)kx z5S5#!afx}fzgB|u7kF$gB;PkD$km9+eWt;ShzY?A;nLs*(`kwJWOTUvc)AIW2Kp5jwk99T3$0`IxBN^4>(8K z+~M1}!`7?3Ad4xwCIA>IncT+=Xs$b;+9fiZCfHVEVVrTc!+65*okx_R*R;rB@bNlJ^ zDY_ZWpIfP8yGg1T^+ zg?yM^CznVtPZfXH=!Iol z3jVR#!A~1XZ;P#sU#fTT+~=nyt)k&h(Lr=5hp8TlX!7Bs@K}lur;g)UMm>3yjHC< z^!md=!|Q)XQL`2X{iZ(%mq2wj=td#bY-vQmEIN7hUSNO@h$55tGJ6QCy&Y@!KdhJ@ zS5?g;Xxh>CYxTjf-)(!X20PVOuQTv^jWF_t!&=y3XWr}&2Fo0+&`24F3!gjL7wSo_ z@K~IWmOZV7bN15V(hsz-?x;8~>v8qxjLpBx4xE4evkt--W$`GTi*kc7epoz6{aPEu zIzYEM2Z~0C0qV8h91xnNM(B5oN5~?AX{@Me0aUUH!Zu7q(*#8;?KXOiIbHZO~H<8F3YJ`X(Y ze+hqh3eT)Ni`cAh47kfk;A<1WS0H~|47hV;TRnT~M|#a5;QAoTt4a$(O=#F@60+Tc z>Xf$8b7n{9*N%UdY=2Z~@uwYp)pAL`+%Q~om|x~%cvNeu07rga4i;?)3n*pZO-sId zsy=#F_DcIQ?B!yVI38{*6H>7*sm%sF$bEmSYO1Xb=)go3u7zVDb$tGi>X&+I<-f>Gyzy zkSb09)d5{5A)fSoa7{Z!E)U&W;@-2|R_tmX968^-5?7;A3_E%dv+-rBHZ#W=CVjb_ z#P8!#bQXzpb+MAliU8QN8wg6LoPmF2e7n2FZ;Rbser4knGnE0D)2qa}NYJc-PQOrS zEe{~n){+(1A+Mv41)TVb@@shyp4s}cu@S5hNfZ6F71J6;{$y;F(u(-l@)xgBt2ezc zx*R3f@RIP9GGiX*1&qc)&E&v)k+1OeMGdZ?dg-h8Vp5cEB^}F(+ zAsA$4R33^ zfh*EABBbQ~PX6pRrS@J%PUwm%czh#^Vq+C9A!b zuJ8(N?udCuU^D4!8x1?bx#Hp(nf)vlEHaw!ET#C2P=P%JEaCz?D8D0 z9ak#Jb}B#EiYX{3v3WYlBamUHe2D#FCeBiSAM(#%W^aJIPawbYm`4-23WDy@Rcuj; z7aAttx#2GKpF2<3&`<*jdBzNm>Ml~du*8~ zA{^%?!2ggD)_+TEY;}KZFynyB(Zc)Up5#U zG6Y^wbNUVMizu^A{y|J06OXw`#EvmyFA0(x)pdWK42<3ZOS3V{TZ}WJV!1yP=;V>6 z;z)JRD?tyy;79Rbpt~*438M`s+;GA*aKeU#6W+dh)OPnQw@!atq7~dai~jXy3}3zk z#?j{8yLtDPS>~7U?q%4{dqR|!o>7hrpAK0*|Lfl&vc~HyEd+0|oG@p+`}d4qY+5bH!d{;oMN>Z>Rk1^E9(bDv zUPW3LtoDJop_6~h(8={nh~?<54X%4eam&!soP8+e?*O+fVbxPcuxo?Y<;Rx})Ky%& zzXi9BQo+7an4OoL$gSvu@$+B&%fJ5fUpucvbvB<~e~R(Z6Uko+XB9?Cw4)E89vmY| z$@?rf8jvnPFX+sdAZC~<1;aGYZNss}(wxB@U&esBi`##`oDD{C;5=avut&?{_Vhl{ z8`|3a5Jy)Y)_Ysn^fBB13FeFwvB%Cfq`8Az%#~S_gk4v1O5d>!!F}RI_eW?+CtV6; z#iO3;+0oC+mhizW9!`jtU+G?_ zE56CAdzF9Ffr6~|Vif*>05JAg@f~__gdJBQui3jVBe0c=KiD?}lKiDYq-2O!aUkd& z2Lwxz%X~>s_~iu25BKm)977sgYCjeUrRty{nrg=~mnEDEgTP{rkZU@hA>^9d`9ZE( zAv?eq2`SIy#a*;9N{EhKM6Xa}Bo~#T9AA3LNbG-hxfl&;m=OOS?EHjAlw`R42yZMF z8mjD(jj4=aRz<0fipBL)a=cR&?IC4LfoN~77;j2zoWz3%<7|8{WN3HwCJ)nDzPgWx9G+ajzh zGmAWjZzMKxs2i@Sy4r|C8*%8i&txMGtwS6t8_$ZJ7VCCxdoL67$T3XGARAl;g-QBT zDhtC3nY5a%!teCk;jr2F>itgJYjyj+=ZAl_p*LuS&9L6-`94?9RU@!6#u7hXI-$!Z zPs{zufAIz6Y2nvS%hnQh`U5}gd9{A6<+VCp-|Kavju#AS{YJChs0HGv4`ey=ARRJE%Ch?SWLXv-f zczBh}T}eWUlDd-KE2z(=*BLN)_F7R=TBdvuQf{yZ-6S5&rV$ojNuBFtrj}p9%O6gG4@2S81_rQ{nMZy4FV8_khhPs)>e$GDG7R0(QxR!8$T70^J8HGtcsvGQ;fg+GU()qhE&5xi;KDOf&jyPPD}Ot;t)yGw z`8eWA-h3O&9q^Z|g){bYX+dCFcD@Q$z8o7j`j!@6{>(A-mQ1*IRWU#`OCzYSP>y(f z#Lk~GLQy`$pe^HJEi9E;@HT(59F_!OQF23}k1dCbRPSuT)y~Z7)KYO=t$+jq-ETWl zU``-0vdG!W+7vXIn~lz19tVDkgmeyOq^pPw6*C4pddff*BM2C4(m=J&o=8QP?de+6 z27Z3WW#$j0^nsm{=>r`jf1v%u3Ni>5o|~CN(9WN*NYuQ&*Cx1Wi70;>V{U~gYBHxl zlw8h&*93nDXuv6DAXN;^6@olf99HJ|qURk}AcqsVLQJCRY%*qybPOKwaQY&N)w-Ng zmMGzrL)KH%Ys6liX`a7|y+^kDxel=M8`t$N1oAj638A$isIeF2dX(-mFXOR-E2cjT zf7hVUl7b^VVaE~<^(21+N0o!n1eSL6<+WBY%#Y8FRTJ!<*{}XPoQqzy^2`CUlc%^ej98BFi zs=)p1CBgdc*%l!4^#Ryt@%w0;6|Pd}AB*@B25R&n3T6ap%!GeOKYf>h1xxyqSvo~$ zd0=Qd46q4f_R<VcOxQk;Xi0x;Q3YA>m6UlB@Mj65PuwOFWG-g#=P((Kk}KFrLaawZ{ooZ%kTuBO zy~_05kCVn%vih-|W~&-SU^vkyo*;v89)Z;0UHI{6kbH329);dB`XdYO*~un9iqim2 z=h_Mye>mH|`u6&a!5mq?GalZl<(pi9oa0zpS)!}5Rv&*pd~m+C+-heVg1P)LyCmoS zjIt$;*zqf?J{XPY*3)Sbs^I1#nSc%xM!V5OvBD6PQsYU;iGHyhKe*P{FbO2Lq9hWH>10axXJkT36&sKPakuR z#up&R`s1nUN4vT}o#i#DH#4-PM5v(c$7acQK* z3qQ6+B{{!Q?^Izl#s%BBnB3OYy+}A^+rocA!f1q5CnxxsTkR+|kx%z0=;RBCe9~@L zv)O8PdhB9Fom!u>bpqWSn~n)k_+o!9D0``H{$K?UxzF0>^oaF;otLZ8_+MMcc3r>(fy=RJ6B z9=P(5 zJ~e$h*J2Zddf5^sD!Gt;Yj{Ypk;H#%hKbNq{~h@_O_Gt8%R6(2^vBnkTPC+O8V@7w z6`^`~<-DE_xL4{6#5V9iME_KtIh~vxoe13t1fb4#^Z^Plv;IjM!S$KqvmHQ0=YW%= zZ_(1f!>iR^L_U?by~ZW-K@Ddvn!|8}owqFRihGQupeMp17d$}|bYWu;Bh`O95uaU& z@D8Jw8;&hUmH3CpbZ4GbJYF_m`gXM@l18UD2%GJW*9~iJuT>A4UccArdbL{6@dx#O zFKGLx)%8&;HIb;H!}sg;R#yDqm>zD%zdord)P7iN1b*1?hOGclwikN+ZfEEXdc8rr zGwjuZL3;_5m4fl9u0MS$4HSPWKCfDBy0J3crSA4ivoiFfcE8?g^u4eb`Ch9QG(2`K z>RzMO=mgzH&~JpxT#+hPhTFU>8ykaVgwF;~@6^UnFKc6X@g4%UqAL(e&1eQ8^`~1x zblsQ^)?qp@JU!Q9I=H{W=f-rfF&!*=J#0(|8`HtYbg-Vo*_aMCrh|Xa-*j+CxjEob zu*hm*5C3VLN{wwri$SKmr!OjLc;ySSf|eH~&x0dFww20l5bFV?SL-uhyq@^u6woa5 zhYD2b6q{EvYoMl|O(o=hsDL^gMsV~glUQw&khhkE1oko+(|gGJ3aGCu;OkWsL=c$I z1okmIYslMIupeuAiEw{#Bs55n?$?u~(7RuH?$f)OSe_o2c`#1K*B8l5^X<<G zzv=Yw`rt#1cnh(^Gr-h0;wGG03Hw`G`CFoStnIZvpqd;>|E7OJk|fq-mQp+r$c2JZ zf3lWWZ#GXgg=9ep=z6Z>p@vKM>?U$C>o{cHfZ{6RoA^w$&F&aQ3u0uTXjF{qFD|3; zs|a*kS22^~VD^jDgFW<4p1pqQ9Ry$<_729^o(w66Mo8|nty}NSsDf1WyFjYXm&PB= zrsvOKpT}`}VUmAdo^zK8Q0(BKWy0hDAJX2~u$E^hnET|&Q)QJ~D42}oomwxV-hk2$ z;q)v8_z|-O*rRKblA?QzvyD?T;*u0cp3}QCp~=Z81?}o%JZ1J2eT8|jZbCV#%ciK) zho?b`5&OHld4P9!rGUzSRDShoEsjF=$m>R3Pg-F?p#Oj7^&oR#I0?RHg=>#?eI54N znBr4K)ArNPR}ne)kh2emGEQ}&+tvMrQeK4|9CHScD~=p!Qn-!L1=X#bO;bp~1pN{v zImw=L6tPV~pQNm|r8!fOp~D5+yMf^_bo?^ibG}Wk!2QQ%e~E8nvOs_%PwEeik+rq| zE}0?p!Fhiayc1cX%AbTdLwl+Uu8W6_b2Z1lMREIuhnUR;xa4q&=b40Sw~EK^%V^1h&<{!2iF!Yin-XSkmvO>imZ} zOsaG#f_KYTd6$uV(TQbiEhVW`;&Oo`DB&0+xBzKe$$H=RdEdA8VSmQ{tNjbxmlbu2KJ4-jvgIXB*$#b!|NpCR~+>@vD zih~aRO}kHTe_XuREa5mso6Ka@G?=R>B9ecrx~b5<4aCcjQ2#zl{ToQ}onpNQ2b~6O z@2alVpVD{2G&>KQE$2boI%wEUt7EsCmfi03tb2{dpmT80vJVapmQdN({>d3g6NKAm zk1f{Sb#HdzzA*1exd`~1aSz7NtakCvmRu6m=lJSeLa+V!QDWl^{)wuJc#B8zj=z7~ z%^<0xi1R#0j7 zXZtP|qZ^HIC@ZRvit3_3dJ!xnvjPpAi3e)*UY1XNP33+v1jgLdHB42K1^sF7aTX^S z;q<8-y*`YdQd8Bx=;^!UGs$p#Efarc4)QV7B}(7Tw85x@pxceU#m3d*4m=d!QYzt^ zK3V0=noS)lNP@w?^OG+uRGmt;E1NY~SAh!%cAt(5Bq=p&^gsM32A50L9>V9*;y)}9 zyus-A)co^h5jxW>4~~m^{i$fSa&o4n$>FY;W~WTygYuwH(}?=W`U_p2rm=ro6api+ z>Jab1FjY+yld%u5Ko$s74N-Itbp~LSJ%K5g7l_F@;!Ius zCw3FBtaS$itU?CZq7F_zKZAeHH2{%{Es){J{s0q)qow0JIfE%6(Q;!kRf2Q&@erue zWRlRz==P9wA6FASl<@6if{|~(I8Wal?oL>=MW8z8bfUJ*EOV%FezkZp9y?3_!v0ou zxm^jj2%v5XAlywNF6KDFTHsy-GyNFfC67D>{~$yQK7J+$P!m6yk=1`3r0^3gZ4maf z841&o zU*@d!A}kWKF$eBsswjV=jmoo0890ikT?3l=)q|9G3q7Xrye;(j)gV&E%-xD;(@J2| z9b--NcLE{d+>JoDhB+;q%!-3jD`8U0LsEB+NUa5s%EP0WrgmOL!%^^jP(%@oYUsR2 zYdP=Y1XX))@0aE~f@;Lx-wt^of?#48pU-|QPrdO@0YwbnTStalCXLaOtXO=@u+q2Ux1Dsux10bK$VQLZEW? zn+{R{8NYK2!e&9()z5@Q=b+-FQR$-`cZHhfgGRRnjpkuaHJN@5k-k(4wph2*%a2@Q z`dWsr)Sbfy`dELkjF||{L9J41ypi3%a>ou~qVCw8y0ALH3s(^!7a`lTcnfc~@iJ*0 zCF4UT6t1d+s=McB-P8JyZZHe$XHXhmcv*wb9=2TFjViCXb)qDFN%-|b7Ks4jkhYy- z+n@ql0xp1!<(q?h*O);AjMB)_aK2>bkCP#-5$#^+dzgPkMBa{^L92UC-^LtyM9im3 zVBRJZPvMCJ-;o&ZY(nE9X^g7ErM?I8`{PTxS~Z~nUUZW(EH-VP7aVz2ED9I;4b&fG zm*|;LnL=JP*2Hm~%`YI^53Gi>-q@KYT1|bXz}G95BA-Cw)$>?rIaws)fS;~;0HoAy z_qD%Qx)OhOo3`H86jkj0jGn|6m)+vBE8q|dm$F-2b^$Ki>-Sn6yV0~BwmP7QL#J=` z+6~)kw0ezu58C}+|H1tw6mbzQ`{&*xx`khh!msf)ds`HCi^3L0VK;Zf-@+Md3%=ed z_$pFFx8T+m+*%j7m5X0&@vL8O0?%5uM{Wh=iZOq-w=>U?eo-hr1YxsRB;s`a<$2c3{qje}^u{ zF2x88f{n9$-ab1)X(@%R;2@Rm5^qDWy}+>t*W$_sO2Zk@#>ND`mk(_)Y)4p4%w?bn zkxqX~AZL*j72x8*y9for#=@5m;Und$eg}hQfWGF1AA7F@SfTW%r`*8!fnH4i`y3id z*?;wIYw``HH~39_&+T7ZVD&A;H9XfI_qA<*7PUD2z3g7UQv}zrx)h+R?ee2>s%`Sy z5UeJ)_Q-J-sJWHZL4t`5TpAR0GqrPJ7+QZexU*4-g!B9+xP0ltbQAQiU?iMejzR0G zA#?mAMTuR{A|(xB%kwE3tNCs*7D+pY_~R@jmzEM*E~qWtTIoxubxzT0P0bnBNMM@F zd68R11ItqR=pRJs*bO66nGBcbAh8R7(Ru;Pq&!o##~?O;^NDB$&6J7|nO8q!br*ld zrc=euR8RfE0=0?M6N{z?Qcilyj29V=mdKCPT};wJfqN1QdY2pQ7@8AOHkWqR(hi5o z11bhvee=yX;_n~}3?7}T090xck?ATD6x-j=(C554XdqR94BZfd2m*FP$@_{N zJly6E&JO0E4>=GfUng&+3KPMzP<($x`9?lhGTfz@VZniG@+v)wKJdS=4#ynn}0L ziDGD}&{^PI&OAHtt|jN6u6*_ppQDf1W%A0O1Ys&)zZ;s^<=1u1=L!-C=9+)pw104y zfc|U$EbE;8J*t`Y%QB}gZjx~etYF_6z_O{dgQ>M4CX(iTtu2tfZjmNic((&K#`tU5 z#v})cBvPPnHp_vQU2;dBvwZs>$8Rp+QY`I^Dx|ZtJDRGP=a7m89%)Rbgioq@>#M-I zQc<4a$d$0;d^&~-S>IBg2wi{VQ_5m7lv&!rE8#yDbOvMWC^_Lrm=<2J!?=hOEB~eg zj9*N)sq87@+W_n$p)2JePeZvNh$!{!uvmALgYiO{6 zaIsVk2IC@ER5qc!7ixAwWAXHLqkKz#>Fb0WN*-gbFRJ;k$?aoHJEVUF9nq~jx)S4C zcXVlYbhBL0*jC(;GkV(leEeOk6C3D|=IwAuOHjl|dT!R2HEtYOgP&K>HA|OXA5d4& z3%eaxYR%wUX1u-Nn-6ZqapJ(eIQB<~j&)~Kf9QX*gFz~-vnBS`w2ix+Iadgle(ncY zT&-J5J5VP>vA>@sw7-8(TemsI3GVXa+!Jz_{D8Qv^8WY8je0YidLRVyQ;0#8Y-EZX z`F)(h`+S|t&~bNh9g{s$QP6jo+b) z;^Ngg{Iefi(}wy2e%xwqTtK~TNts&eck~F_7Vg5F;}#^wTex|Xzt$^vH0`s5SU?*% z=NFy07m#R z5HJ2xR)T+bXzml4v5$wi zglC{^-Sk{S)OaPE+sF*}IZP3toZ*OmEy0Y;&$5u4BY!l)3!1NUxB*ii6e)j))&R>H z{0_3?{MS;}yzYkK4Em*DYX+Km$ZZn)rPKqJ?(5?mMqwzzMC#g5>K9W1gJYmR$>H|w z{3N*qet-1J{7$N?bo^MFM?=%`V`@HriZf*?uHKB5`XBk8M|QR#f013jc_zC!S9LL7 z|H{97_7P{#H8E-Wd@&V$XHb8_^iOGDQva&e*98N1z5f9wtncR-H&y0Gvw4l|kbIsp zud4QINQoBV30))=WsFf)1-%D`Yy7ShiG=WJR74!Z+ij9k2XCI2E!UuOfGY_@6sP zB?W7xoMqQuRcKT)>n_#*JjRet-T>1&_+8wxyd_q8X>|l|#dtJBQsEB>_8dDh{o8wm zLGi}&P(+v%?U9wa?qq-8D8E@`$1;IvvRHcJRd|Cw?ej0S5vahWg9vQR#(AIo0DczM z5k_ZyszWb&{`E*xLvpFVNlpQ3+~!zGUEO4nW@^ll%~PF;?MTjGm57?*nNprG>oF98 z5HkAF^&CDWYZ!SEokhbcva#8gQhgKXU>?CymBh}Xuf_qgtNK7)*L8H}q_@#D!^yh#=}f%u_f0);)qTv(eyJ$B~^UI!r2ksBJVDqK1T!EKDpDzOzH@x(cLwJ0gO-_@D(2ans2F^5)9WfzJOJCzZ3B#ycodtL5S24D zi6I!yzERu)m$|f3LJ~#Ua{5KGOMML#4XD2$RADc2Hz60!;=?O{bt1V(htoB;?8BYq^_OAGA>tC zxnypfEw1olwwc`Bu#$Cof9q!I*^v#?LzxkISAu`a{+L0zw&7739*vg9xUkBPk?PAY zT6e88PFg;skzUa^jSgg9Y$?;2vhk%7i%}7;EfbNoHh70$3~fcs0;FKN|O%|8z8-`c|dYl8jx1hWF{ z@Y;WI9l-0xTYua?eH5UT8iwKz8wJR=libH?V96bJYj6Xu>j6oe;{^Pe(j!K8rl>%sk2B|Wm$!>sjsxWH_*|c5@bvJ%B}c^4_bm_=MaC? z1^5-a@>(d77r^1C^Te4HrCvHGWTOh<$>rIE+3}p=)W;@@_b;63PxiEb<-z>0yQBC5 zZ)#@`BWK@Y(OR;lhvHk>vs&we-i&b`K|#lFQk{nbr$E=?2YJu$ykv<*-G`r47t&99 zHzq00=}4_SHs>sG$9;FgE!Lj-49@iB8(X`ZEmHkyHbCcF_-Y| zaQnl=q%HheEsC%Wf%2!IxHdNgn&+;TkR3MePbs@KhxOKAESBuSB9Y^j`fwX`yvv|t zYtw>`Eu&9aEa+&)tVHR!LN1+~2s-AzY#Vgk1|7FSN3GsMozv^wSkN&&UY8C!u8QNX z7Ld#|qhvrbQ@^CeQ#EfeAgO->XEB>);*raSB=W;ix1PWkv0vztD8QkUPv6KC}Ff!RWX0@9L&xRFLDBz zu6zV3q@IQr?L+~TK=O_L_5FW|u(T^a%s+PLr^gPzF(VqH0&2W>f;g?Pz5H6oVzN7ohz7mFiRUA%pE zej&PNCs~&3zL$Sgb6Ha%&6<&ERfQ^aW(P2->JQuTLv<)vf82>5t0|o?1JUWnLoUyH zk)V_b0|C53!SW5JcF&(pwUMd(JW|?!%QuJ#l95#$_NO3G{ zrLnNywv-zai*Pyq6atQiZV*n-7%DpE{oEV?YqnCXR^kv@CBo<`DfdNl1LL3d2%<{R zYVw$5cJwq&c%r4HO|(pJiuz~VrgcT;7Vp=mmvb{Kuv(kUro2=9uYZC6{vS|F0Rj{N r6aWAK2mrc(C6|~70YVLzlOJvJ>~}j_G$0_`~VlxSEU4xqfDn)gta|}UdiCn7J`1MbR+qiu6WWLs z9Z8@Y#yVG`YiVhjhoFTfp*4^uILkNXc2}O+mg{EzGSRY`ZuJE!TsPuVPxH(fR*>y< z?5YN_N|dVnNEK+ztt$=9Erz75xuRktir`m03UcdzVOi`+1OaHXNw!|Pa*KiaA-pfk zm#%1gjD|X%f|>>?6lJdG`J|l79RpaFVa-7-hEb9xASf?6Ocmsew`Qtb znd(Y^G!g1#c9cv`5;=l6d+>>yB+<}!(OX$0)7lzpaKHpdFOOfpIo*GCik$E*AE7lN zfKtN%Wf|7Y>aC`nY+cTf=&(zaWC%bT{_N}ud{x8>goF$9p;KoV0FuIgV0S@An8OZG(2L`PswN$*AblU2t_or- z_{FEgSB)xR=2$uM8bn`}M?-yW2B`oa_L8DaVz#pX=H)6=kt9Me{X{2$acSV`W#o~6 zG?wBSM1v^`N4JnsU2F=BB%ygBoVB$>DNv>J285!}@jxa<8~Fy*N{nR?YZNZrgXjaJnLxN7fwmiSG9Iu5pfgSgTNoyx1|$r(xS+5*h_1Lm zeOry%+S)Pn^U_UlsPuw(hfB6(Xk4^`gQuXQ9Ol^3zS6RvB-dx7nrx`U*HuJ0?Z8%4h(oq1D8k^vGrt0ws+9~hE#8p@6d ztl(a`TKcJ2PqG%o3u=0QtE+4;8Gi|{x4S)n1Yh3(-WbrMyq&~wd0FhdksTQq_yKwfpA$gMw3AZJHf_2p`d$Y?}jF_HpA9 ztkp8~T9gV&<8=hA?lFqldd3RMo?XW~Axvlv{1pD`PXxC}ck0NOru=_6dHqT}RmT1C zNl!e$0i_{9egh7??*Tc~3#%N8IftO7`%Mwh3z<)1P zD@PB-vf780H5i(ISEyh{*E~MC#tdTCM=iWy-L#EEa|8osr@w>zS;7G_1t;xLFbXQ(y{9hd6~w zCJ4+h$Iw2LYLR|M7MfhpRQDApD&pKXr+lY5MVO6fHGZB9lHp&&7n?S|5P>0xj_I9L zdu{~$Zh!AOh8oNVO%RkRiEcRl)v0Q$|Vbx!LU}N=z9;+;n=wx`wQBAv# zL3*Q?S?Mr;%c;r4>>@J8Q|oJK5EZ(KmTqEL6Zza6{!MF5;iD3@vS%hUXsZByWW#AJ z23&|)z5eqdyy0Mx;ylH{zF|G)xi_8i3ZG{Ixq#&NfJ5prCbmnVG4zVPAoCSeY(_Et zMf2qKkD37DYs>B6`U1a;ZB4nQwu$a$uvRX@lKq>11(p(tix#x;8n-OTwDj1KhvpHC zl$-!CDCpHYjZo(&&jIa^k|J3G>4zAID<%+W@3~qro|6I|6Lxs9?3j-SJPzo@&xpC+ z7<9u6vh&Cjp<|D*xSX40?Tx2F>Q4eQBJshw{4&>^7%3y<7Y}L(!>CDg-HYQ;TZaaB zv_p@7Kov8B8c=?kcqp>P`_lG+-C{K8bnj70-(rl2WZ2Z=*(=YO?|+iJzA#WcCU1~R zAFNS=O*#W=s z!w`)jSgqF9kd1P-U3qN=Ol^LrN>BBFvUr};GjVg|Ln;+SP+NUZ?P+DbMT7_lA_r5C zUbNb!_ySZ&+vAE8miBDMxgsL7z=%H`4u@Mi4)6B{&emXe!x`*sa%XqA<31S4D1y$07TzZDe(qh}MPS4T+Rr-<|4bV71ZOKDo-)Wc=NJDBB!n1P`!4@-{<4~n>!FuP4g5j~Si1eqZ(k*>0!bS$!VJ|Qora>4`uE6F7A z^ZB82^G;@AThAx1GLURcUjkTv^H8O<`s4|Y@;P5-&qkf=+E5jtzO{m62c#s_VUx%+ zrReNwgd~i5k*Se6sTG&yiQ6WXQw1!=03|x+6T4exyRCoqQpX~3>_}NN>YwYB`Yn-Z z5b|vWd|TnZIKkd1NX?&y7GhEXCO;(-`>}?lRGEqdS(*iOlDT)b+Ug*GwzVp4SlH_| z@|;;m&i50_1!mw|PCa&8$)EuI*d!R1y!=7*@*KQX1}B9_J~3fse~P6`-Lhn;nhn6L z@=sNj+^U#U&&9>A_A{*V4|;X4&QMqn%9;~!-Yja>$ppVVmE!gSqfv#JdFq&T?J7fq zs;~$ZVRqFZxBl2wfhHAyp#9RHYpi0aZ(8D;miF5(>3XTIl!6NqMy>cZH^_8<)8PKDG62q+`R^{6uOY)bp%kW!B}txyoZ?i?v@l;bcEmJD$Xa;Pb1nXUR=)1@)fTQgajGP~WDDvOrNj~Ut?GqgQ~ z3~lo>?w6N|?QU0yg&Wbg&#d;CQSC9KTI-Bzx3m#IZRWK3vn)JjO#9+9rrnaWZ;=`8 zcbXCHmIR-FDf8L~39Bx5@-|Cl0Oo zGJbuMOkcN@-k&U^*Y7Qp*Dc5Ct}=E#X6m}jOkKBs9Q4~|BwdNp!od9X)E&$eDc%% zlA^~VT}bhGzj+AVp8cTmFmORCSz{O(p4?RNdSd031EBrO<=i7se5PYNY$8BnrREi(r+|pdzb_;HJt%MFoAi z5XrCMSl%h#XcgXXj|Mzt z=P17Xkw27bGsd5Sswc$s5%@g*Np5+jgkD!^?p>rH_&~AAG&B^BgZGD}6JM{w(^^R}d z1f#lu6OuI7jxmU~(Z%iE=S`DOp_xV#Cj^RradMj=p`f2f7hx3hjXg}((1WQj3ggEp-opyId%9K+ zC$S%{s5h%%7!4W9w1kp$RX_t+cIsx3`-D$FV_cO3!d_8u6|Jur-3n|Z_=cY3mr_6( zi1}Mi6hR~Z%>EPs%VF}Hy?~EWki$M($@ASR8j63wx7`Z-VdVZ0qv}(CQGgm!xj}@a zx2@Q3H{Q`|ARnD4Vt!gmt`bDae|dSg$4oxeg|vaar@x9lsPn`ub};sUfP$8^BL(G2 ze>_K(cqMkPQGpkeD4XsvC$l`a24?*S5be@`Ant|9+EK)ScbY66c6=fbg{SoO1wJ%! z#~42Z_W`UQtR$XdDLmMJctDJSv@(93r}CxTTiP>!;Y(T?_UIo;w4AsT8?#4VM~I)3 z8({iz2N5wP$4B5<3wxf~l{}>%9-G#~l7%6j33Y_rnb3xfUrrBAwm7r4IEZJlC%MVL`ewjj<=548&Ev5OA zF89&lai2+-g*8)?k5QPLjcJxE93=XEoe5hkUOv9jY!*(;l#BB?VDhGIwL2!~U&(c3 z<|NFb_Cf3H%Qco~Mef7~H-@a7)aP3+rPY`{OQMF=GIz5Yz7okE^DV1#kNKAQ7m;td zK?oEREth4$ZG2vT&FPZ`dc|UG@+P;e*;;a`I*Z$usBmVsaG=iSnVs7!TJ4;-dO>f; z3GR$u&pEuEk6zA4FXy9|^U=%s=;eI$az1)FAHAH9Ud}Jb%lX-RH!HlFR&Qp(c5mao ztngYIX0tY$7iZ$kb{R~i_i=s;=3%)jtK+yTV9XXW_28U;khkzVR68Bpo9t#KyOZ(p zhL&7opYaVXw-8OkdkzZiFUULd7!;}|o}vDb7w7Qz5Ej}mh&c8@!a~bkvSLJJ&hg)*~?RM)I@m9}X%?=)SQQx2h>4Bfzu^Pa9nIJX{<%SyT*b6&@Cw+lD3 z6fL^4+1O}*1kMx!(qPb7Aw9-mG>WA!Ee4~1CovfPFC_+}fBP5=``XDC7K2d<|1k#R zF$Uu?2IFDGU=%0mLSis#G`)GFFiLo~j>0I_Y%RM~oyGY9?k);rQFi{qqcCcDVOAq! zF5}|SsQ3bmirX6#k6RvJ(3XeYI+$(CBPZkAI0PSmoX&rXW&W019wm5>TON;F9{0ZG zfz4qOy~j)#ceUwZnV2s)h-SRZ=E}#b+r^&8n{W3IV5Z81K)=Xw`J(ni6th)q`m+1l z5h>5a9Ai;N=Av@aFn{ziQITb1-U*}usAV9bYl$rdN`e3sl^y$rjn;JRj=2H@)7@H% zA3Mx{;~pkR7pc?>>k8wU`kCN8tAnW@Q0g$c-N|K%kN2-L6igT^7e=9ju~MEJdtw6M zZPFJ+266FdSaE5Syz)y=6PGR;#Vqg8*acqj!6(eaD;5BXxY@vfEs|;KbXabXsBBe~ z!kBI-%}QgAx?wP-cx1{#C1U*oegzhm%2Q5%Ss9r>9>gkrd?eGA8Z>Eh%Wkvdv|uro z*a->JbHcL6L_G1dKIM{!L0YX8x#`mg9rj^;MrR!h|>qY z_ImJKPI&lPfbaqq)FY^*AtdQd!0A=$4ib8Vi>?Cdd-RTP?~XP`Pe;zk+t_xt_;AO6 z*&S`~I(*C99c~V`cXmg8sypOCK+$_tP30KVV1-pf?=*SzOS*@N-W^P1R7eHy9qJJm z2u}wF6f99F04pqBAg*5*0ZgJK)ddPPKs3&lK6bL6_n&NRKk4o4I8WWd$l2QMZ9495 z|EaUH@nmCnmp|z};e&lzjfih^&Ii1=;SBhbr_R=B$8~nS-JY{G z7(N+3-5752-jf9)uBZGDJeXK82YC{wcBJ2Zgr_(!^uq*J+)ddX$=17dT>ayp18qI$ zxI3GJd4Aq?`DTB|d*bZw0xNF~x3-)e5BPbjKXiemcXu~-cL+eMRy6JfUyUGtlO~bz zmfpyo^>H32Z{%Gx@Bkev@Qh;9MJl}P;h(2bD%x5m7$6S)u}?$tj2=)K9^Z%-?LH*w z0@^z}(;gN0wyM1+1rNsG>@j>#|5tdQ$aKeIEC>gI>S+XzPy{8H(e3Cp_D2SP_Fb5RR7Gw`}X?4aRR~CD!$K6U!!6_OND2@b~n6x8N0!a0av`HqZq}9*$Ao= z3wVxA4Ob^CZhXZfFSKlb7E2>7@rnZWV;EhBOb>s)sw%FLru&_4^z)8H1+9e&X??$v zdB+{@f{wK5?DlpB&X&9R#2E~STaGu{-tcxtTTgmVx95<|TFuBr@d@-RQ$LhCywNCy ze?u~>*3a+}{OO@7ucf2XJk;B_@COF~hJgKsli`eDkQOC>JkyVV{}D(czjpLPfp%S4 z7?ZQC5%sj9jaQNS*4TutsMh*aY1-WRh~EVQ@3OD>{-Yo7dbOnorL`3JfK3J=W5iv-Q` z>ULz5Uj?JRD};#ndn)hyy1w+m%myQVns85F5GR^+eZY=Q0*-rT;?6jcw;Yvr2@Ua< z7~zXZI3*&HPJV*7N)6ffe)_|7klk@aGBk(HP~HJ9VY6p{>}!`@#(YFdYayXOPyA~) z9bV#v4EUO*nSOgd2wbo-Bwv41Q}gR}_Zt(1Bbgn2z}b}U6Yx;ZimQ6uafWr?ropQs z3e1P|0}Pt}r{X;%K3!v>uFssE8Ce^k)=uNC=+WfnE{!>F*W2P7Zr>R^-S(WVo&L77 zJKEyT(HHFRAr;6&@DTmv8oAJx84+27!cLJhpwBm2e4`Ivn zK+OR{)LiB1Kq~c{#m;(0E8WNH+MqJ-m5dY_#URya!??{Wm!-p|U5YyR8&piiXs(hA zv0TpN3USm^G=*~k|1GKZMF<7`)r3bl;7NCBg4MT9gQB3}foMO3_KGE>M0*ID;Bd6P zyS+PqavgVPbJN)x4EoOQ#=vvDtsyA(Lw9?72r{W+)m8 zbf<;;DUE}?@;8AsHn~&fFIzWYG1|_rM4O%Zl_s6?tngE}}jWoJ{c^0nb#VWTz8G@{NiL=#Oz#^$!Mq(2M zm}}w#2mONAI+Bm79&BYbJAA>lvjH#Gslr^y#nxbR6-ul6yf~hd+DWYk-%;Cy4wi(Bdx~8#!jQu4HnYQZg;b~nFF+3OU?9q z_I4&N5J2v}4QRi#)6~h$jmd|q#`nX2XbdAHN5n*+SJ6=uftY*WQsSQ(ut3Etj;>$e zZXGoPA8g4FM7xsJkY~TWk!*l&f*-lidP=s%k}Ul?_5|W$FZb2}wCYA&FMKB*sWg_= z)o&wN8}a{GfY8oyaSv{p=N~448@h5h;T8WdLG_JFD$>v7l%Y_YL~ee_=#zwh?wzG@ zm?+dSJZAWg7lj;3$51c0ArB&Y`eG(8Ys-1z4ml_a0bT%TT!5-vf@ZBmyUHXU+{-%` z300E8=oKU!@U}McDxyha@pS4tAT3@^^Be}lcsO?OQ?FNOk|&(5c20zAG$R4}P{SzA z`$n-P4N~5*2pI7=2lc09>IN)-rsXJM&&*d0`1G)j&_J&%f5mmrY_(FYQA$vg(}f{fH^Pwppk*cm?D(e`$)=k^EA z?qKx9+1hbAO!+4}PT%W)jdq^y4tEA4cg`taJ=H&R&VTgb&euk#%7?r4=);|70l^NF zw8S&1pYxPrW`5qHnB1!ox?kLK+GeTyygk}?w!Ghii~OZN#g!o_V=bGQ)UtLo>l1hD zHlM>a`{;0gunzYCtXZ&w#d-inWQkV_%q}ubS8{x5Tn z`}1^)_7>|D&D;q0;1zjL-ca;B>9@EnK!DXiTAhqt9hbYph?0j=PB#O#tZ`J zK7`6qVcbY-%6SrP66KR%BetLnvJN9EeW-M*!?P&yEFH2|0&-Z_W7>k z^?DfZH`;Y}Hg-nN#%O2sWM{D5+wSu@eMMF7;pXFZzblLXi?DGQZ&NJJFmA8 zciwEgen@+pd9ytEJh=bF9n1Y!;=!_CCgcy{b22@Img zgaq`m*NXMH;Q3kYj{7>YR?j8`;ubn`aR>-OgT|kKKsA24J=`36qfN)#7=mj21pe%7 zy4>07@9sX`efo5(zq$3O8b7MWGb;zTRgLd#yJc2Al^K}AvKk2U2ac*Ub?ATAShux5j_~No%>3l>5ol5-J9P{Mvja6aO+QHHkx7B6gh<)T^*a_% zL)9Ekh5{?TjxSzbj587$fZ$&a_}?gznotA`P@rnNnWk@-9gS@4gYfW3ki^f!-)?xr zA}AYEiyfdk*^*E-#FItHkkoaW#PF|wNL8$|8r7m<_L3FY6_x~!x0<&&&T;orY)%6K zDS80BgC0If;61jY%m%Uw_ovV_=z&RIjTTX6${anJ4)NTQscoy+Cm4GmwxO|!q?zJ* z2Wza8!vB_dI2x7Tywm!enY9rL?@^VNRmuZMwdV60JV?VQp*V^L%SV#Gf`{jSGk&T{ zz8;`1eGq^WquQP3Ht5#ZYb>V@jaY#>ZnKGzWz`J$C>2RHSMt0}xgh_5ue-XXJ@yAW zj@uOsQ?L{iMkcmKx7r#KH9HBJ;#(znguSM9VF3A^&jU}ZZTm(rf_Q&iQtiw#3p7GH za|Y#&8V{{&Y;{pduTlN+>d7>Jo*+HZz99veLSN`;HNEc_Jg<#0d1LoORvY^B??k~` zC3Q~W+eXYv@tOB<$kDYpHyWj~_Ol5dCWa|6Z}z61f0a5V)F)Fxa7!GT=U}7lIwmd@ zdjNb~85>$ab(XNw=Bh=W-rThF^yYjf)|}jnx&m5*sPk#n;rx4^>V1NLmF4_=2lpyo^Eupq(^;55J__KrEq*})*pP^ScOgx+XCUi9jeyK& z`xk;YE7e*Cm-Jr&scrQ(B3#g`pfYddWHyFAjKRo5$CW5fM_QDN3(e_;?=df2aueb+ zOYGWOHj!Mh)vVD1;j~Na!sELkyY+g(SsE?Nur@o>!B|g6=Hc3?&ii2i`9-WEc9n-^=^#}hmvh`-s6i8_Hu}--Oeuc(M&PE@la*WWIeRdSZmM?m?r_pC=iBE{(UA|Q z+lIPW-)qvyEVUL8dMKftv`-pPo#-H^p$m}ZB)4Vt+z&(Cy~we4z4l*(*`c;ffurvB z`@#fHe<5psUucAy-FXSN50VPJI|N5Wu!5^|prbgSf zZna&#`a95>7Ng!jim>|-VGpv~Ic121MM+xVr$J(WWR5jgMPV56G$er(x_PJU>T2c zxgvId_RS__hpogXm zwB8Xa?%ZgKwK`AUUfL{Dq`d2#eY%t9i*c~d$7)h)JuHqBVL&S}2Z1-_=Thw{{4Ab- zZn0{X-9zC=oBGKmr*PENwYi63_7ir7>867#nE!HU6cHL}-5sgX6+F$x))%4fFAV$)PQZTD~U8chogpYkzqcgl}E*&?ie3n34jmx_`~c2NM(u?he}tpp?I94R6Yhd(64 zOFni9j!L#8675iS9Sw1Pe*!aSNTcH%$-!}cfx$ubE?FN0(O`WHt?_tWfTWSbmtCQM zeFVk~mpXs_SFG?+@_6YPTLLj`Eh1Rv$ip&kuYjVcFeWR@nmd#lf8;H%zO#aV0NnXS z6yG2SMX{w~xsUk=9}9qfE0(7<1|e!fbzf&pd{k!Qb(oh|KJa9+4s7FkZt9k?U2-S> z&lyqr8~whs(Zl~HF`aF;R6&*@>HxDsS68wX(V)`uYG*kc)9#5p!K?9H?#SB9YGj?| z4#Q0_DL4zH#}Y?gkH9Xk!pA~?`X%TwkRTy z0USO7>*b2>5|s9Z>9`C%WwC@Z)3-1<=+HKIhnGg_jy#6!%R|>8Pq6y|9jR0&&xPgZ zj|Z_70N60#6Pq;Y0%d`jQK~10e1Z|8;Sk1r@8kwRj^)|Qx9>zTSXDy!8O04{CBGky z!4^x@uv*GV5wZvJqr35cM@Cj;#yT0HiFugj9$~1_=r~MqP%5SC8xDVg%$Rp(K3F9A z{>YN)Kp=$u5wkyo_pxiTzfEvWC{D{R`}72?ka!Rm@1n?$$` zMJdcG+YqwbE*=aNPNHC1MJ7W8TESs|CCn_2gNx~P|9g`N{y`YoX!$B{Q3 z)*)CdSi;l4Mco-zc2!IAn_@3LpKfC;Nj#P1Ysi4Iv9#%IY*~$^%t*5IM1e-X8;({# zM~S5%61uN-5D8sJ70Fi=3smwt%r7fTZ^^TRXlJ(TN}PRNZc8Pw&?=0*)ebYDl&n29 z_F{e^oT|xxWeo1StY=k*UD2Sc)5m14E~PPNR*%?1kz=Ctdsd#mnB!LsU2*+a-VIax z5Kp?<_DSXCY+>7J zvHP&QF5m3$cu$<&-QkY2HQd^AcD(IfXRAMSx4hlm-HqLyIrd=-TS@dXa0leS&%JH4 zO*@_jsV~wwn(qHdCOTRs7{I7_Y?q5mCpr~>n{EZXR>Te$ZMYcwTl$1M8eCZo%mt=) zUMew$lWI7HhlhX&zA7az}eC}^Uia3XJ@d*w|WjA^heHCZ!mIp``(Vz ze>&XRe6qdaZVl!cWy?-uVWg$$f&v0JecFt6K3ws9SlFgydrY{DF$~vF!f6n!ly)wE zSMe|^7@*@xdQje_W!$F{dJ-ro%Zz1g-ezw7E~dgK_ao1(=gBI|Z`79C!YuoxmP(t7*%yX+;p$|?jjugu{soGU zVrir$rHcMBjIKkbhd*Cc71v0sBti;|Lceu$Qi zN*z&eDV8C|KOy@KC&L-Rpe0KFc%~o!Bb|<*uO0nRpj}rM#^fw(L_Mu&<5i@-H8x=@ zs<+-%X(STE@DYi?yX-5z|0qa*TpQ)k-`?$SSYxDi3QtuG`K})H7bN) zc4`A2m3GZ8fvGT;F=?{2e^=IXbK*=!Ebe=MnkK2RDli#yj8%lG075QgA?F^M5-O26 z>fI_?vImBN2a+IA>Sdd3*}H`fmU?K;vKL^<087w)>9fCh6aSQ7eC=of;fNB&R}VN*AGlt^a&HgG*ICxI!-27IGGe7d>q zJn3z3I9r1!+;KN|K%Vt~2OIrO{&ahbZ!fUp&;Q{y`}d6Yc-a1-zWck>f8@peLu*G( z?E6oKPj_-EjS){XutoTehS)6T`SMdz zbgx}N1+-_>pwZdnl2c3N;HPLfm5ZJdfc@n^{;yab6k7xiCs`9L72(_91L{fS5a_^P#9al{01A89yFjM_6$bIh5v^U`{^jV4IzgfGI+TjX@|F9gNt#=I;9neFNBUFcpdh zaVFwHl*E7l!tFg76##TVtVZ`oxM}JR-virqnL_F)6&*xObn`yVWMejB<}t{^gg7OGorR6*3TY9Qf}~Ek>Jp8R?#s{E zZIU;CStdJFF85!&Kz+iC#$?y$!L4!+bCe9Q! z%oAgvEXM5k@&eC-u0W zl8nR4QAADQHuhMkkMBc|66_5fq{4ZCJ4pefh!LTgV14zd@#K*De#=o#5Q16G6&DiLZ=0;#Nb7iHW5XON=iAk7~@SfBV<}^52X7Osc_1OeHK;er>HN(sD9QOEyvfbC14a1@k61wSBs9 zNie6D#tE(lFj{FeF)%S>WW}&j@N0HC6>&7R(SbF>0|5<&C|aGkJ_y|c2eTtDAL%fW znqN*VQXp|iT{Ydi#g1qq{(Hk(Y3>extyx)^t%jncG&(DFF9EQ4UTXbCnSqp}f6@}v>;;OytQ#c60)2^JM|_{C%li^MYpO2ltKxsViq?V|Nr%m_ z%vC4VBCj-?m&m9d%M9E=M&dk1@qaKmE^Nq{#gAVf6EhsW+&?a~{ETthLC2fCIymab z0h%=EaN3_DL#9eb8*2OC+D6HLvrIDL^<*;!VzNfXBE}zeqVM96NDcA`-Xcym?gM>S1ZB%2jHO) zBohLm5!VmY3I2j2L)HMjB=e3Ht)a3tK7_j4jlI%RT*7?)GR5`3pF z7~>eev^uj1UF9h;)@xX#Gy7kyMJr+q3(0%3a>ATV>CQ$NpOx>Xz~(}qFiHUrHo!q$ z5@QBetDH&qbRhV%y2pKgXzq`aD;mGFzLj0H`oqly%sgJWzm0&*03}-)s1uHH@=#q0 zHalv-#>0rzUJG(-ITI#Eo z@LPVjnb1Bkg+}oLxL75#Fzq0@q#%QmSnk-5XHZv z;-Va$+d(i-;ca9B$hHDJkU(QMpr*&}2Y);re@CuY5M%y@pVB62_U;6bMTrF~g?_#H z@uNBE^SFk}R5FXcI=g5J;fUH1Nn; zhqVwN-(<;0yOe1NYzJf6Gac6*fp~&ZDv1dy)2{$ka-s--!%mtqu&%r0+|(%NjMAf2 zII_tRi_Tomi!Kh~FC4hT_h1yNsBzpLhB@qmrN(eZf|uB1uH-UTHk0{&O&e@v5E!6m3(HLxrgQhqv|C40z&xxhW|tUym1ei(>M5KwZS|!_jj#=nW~HkFRGm_*sBkCg70vfJxnw|MJs>P7 zgIRx)_Yt#B?x*;Lb!ZajM)NT}qXp&zNzW)@WbAK$47-e1ZOVaK05yO9P79;!6v=s( z-7D}Ow1i1P@W;RX>;L(m|MDOI=YRXx|KtCrLZxdQRtv@d^ZzBvm6~5=)~vAQ6ptou zEz&(MI@@FA*maE5k7iEDqQz5@TrYKqop{M`1n^j@aU3GL*q?zx?H2 z{(GI>l`H%0jiPafrDh%UN@nUQs-=J(ZN`9q?I6vH)BFZtX0TKY06I|Ah-#M$k_PE69Iluf_^S#M!0W8qqsMGcD)z}bg{=%&ct@%<&J!-#EY#J7z`561^ zp=T=D(x4Ew$EPtn+U)QWbjzkKUSuzS!nc*rf5E1V7_z4ApqvR~7$Tu|M%(EwLUIk# zFVIXOJve8lWJRaczHBlS{W~ij=i{r@lw~^ zCy%0ORy-f7h4pA%Jz7_f*43kR^=MtqZe8V!n|q3jHnSw;gQHb^vI*dWcKMr z7nfB$KJ+H4xta9NvB*N0X0kh*)pUnFS4a0;JY!xu^+wh};V4o5z?(V&#Xv3!Bg-@# zusr{O2fJdK^2R)M(N$Qy(BW*;#JwQ9SKeSClxxzfGws{gr*`ul(1C1-_Jxm!(Mc^A zW?R;Ns7`&*wiWQ1z|;o|!A;(OXJ}!UC}oN-(y0}2Kq7=7Dg#Q<1Qr6C&vcAP*zks7 zpsWjR2IWpj(P{lqUJr-g$GQUGq-7b|hQM1EvSo)Ua~7X*`JFTmW%wZ)XY$lMRyR-Q z1kpu8??vJP3>4IHeFX~$EITeOJLpuEt(l#T)QG>Viq|u2K*?Cr6l5TO=}sv%r-&Ik zcRqahz*b(0US0YVZH|#8D@YH&lACaN3HAV{n*{!VMec#o)M$72ji%Qo|&kMdj|3@qJqk*9Gi5}H24qhyYBcyxdrJQbmp9lkRf zx0?^@tu0nez0-%$@`rnW@0eIP9zR&57F$6l2yTOZxO8EjV{|FT(;8I|U^xqX7t>JK z`m-MdLg)!*WrbtG*oX3Vs;X#;I1(Afqr~D(R>=&q^%J$D?b4AjP<93K!W(4FDs?2& zj-t_A7HljXCU{k)60>-2QOH2R``YL<#TBbtR58fhlp)p06CDp)nljeRXJ0jCaF@yM1TBc?*3xED7N zDx1`IG4mgmOK6h2bI-6LMS=D88aGak%z0nXh4N7p&0sNNwZ^NuG*shQee6eq6K8ug zotu3(RIK0@%c@_x$vJw(f60C|S7IVQ5wdEvR6d$2uakIdNLuTAk-x!}X}5G(sh*2guAX>^ofu=4yvif2&C!GntZ>z|1I z>uzxPUK&L(1*LT&l1*!eOPZzF^XO(^u(8Y(D|lEk)i@}p#0zm%W(sUSK!1=(vWtF@ zDdv5nq#=Z&xKp#>f1ye$j;Y=0T@r(>!Bh8%>p7b{J=fV1w@Pg8ID^sC;b5oNA8b9{ z64RtjD;o7|0!Xa;odt;Qha|M?6nG#GKoOi&+=4BoR?8&xydbSfjxw>|xVXr5fk@oE zMVs3>gGmCy5rFH;MS-3{b(5hX&yg?gJ&F6fj%n;q{2)j&f2CqUZJ5&_n{_acHy08q zvA#ar_`H)fs0a`~>G!UgRPF_G0x zF;fe|C|HIfkiff=>w#qD$}j{8YO7O`a!qj)^g-Yz4P-D1TH1FLyk#^Btw9O;?Fj*| zt?m0Gw!*TDe><41D|vXU>}$Fm#MylE#9Qq&BhbkO2K<-*o%p=5)~dbR$Je;2UDZn?sVT%5CS%f zR~6WC$?yH&i_<1cs#lS<5sTkv2*Ob~0L#+LQVX`kr-)8I7CsSb0_8qT)J{<)a6Rk{^DeP}-yLTcppy!&0l-YCAJpD@L4OL$!((O0#hDI*=<` z3Fm}le|bwtqHw7<9DNH%$NQcKYXjayQ46h9+zwA=#B2de7A?Y&hOW7z(*Vv^qX>0h z=K)s9J7x3oI;_*6p^+8<%Bw#@8>X`0Y1Eq7bu}AXIlwzqM|8{VjI9_oOPm)(Q%~-3 zB^aO4N@1(2RUUKhrY|uG*#%GblOqsbl!&!qf7q>+O0a`O@SD-Q=J{V$tHkv~H{1`s z!#J8~4X%m%ZB@!MecT+3EDIIu8bPr2^^Jm781hPpW*DMiQ4BlowR=-7i^ zc}Pm{g5zBqm6?0d@m^2UPpDJr)*qEByHW)Ndeo}gYgIob{N+E0P>A~aM#0ZPGt;X= ze=B9GSh_^tu^Xp9K>em=Ntd&%paOQ|k|~N=S70G68zHEIMHoj(Zidn^g@#eLRw>aM z?+V@z0;Na%?7OeSV|6!MJ>l!B-mm@ySQNC<24%KX-mcBR;n%T`XAhvbE1k1=S%=8aF0~UTl7Q1`7#WZ~yAHa~RB~zL zfobtdKSn2Q(5D=urU8?|m3Mb0p!F2dqY(83*;1y&$dW&grJ%<{({$5KhGlFJk#^${GfhQA9`95NFvU0q zqhM#@$NNMlU^6a9QIAe=+d==5?;aKNOfky{jAB87x^+xK68e6df0C=kHKB!7Kt(Ki3$Svdo&se~=ykEaF+1vk7zOQ+ z+5oAmukI_7>SYtCQgJ)fX3a|vUQYd*ahcV;R9I?zU)WMxTs>^d*}bf?wi~qQ0 z%D<+LK+*9nx@ieZe<$wSk~;hBYw*#Ct*w;-i4;h<&H_bFfq>#TZOBeuf1V!8%T?tG zRDF0A)RzG70jBf6h@i+rgg`KK6eB5zEJebPP(+#EVtVJ zqVn#@@G&N-D2f`GuhE9=rMNZOLNBRF0JCOkU2z#!Y8T}@RsF&hoKRGqp#x{?!ZYlQ z(G7rRkV@ZFTcv@>3qmmMf0R50=qK+B+8^`+FOa1Zw(@FBb#@tAL}kGYSydMzi@*Cp z5_QA@;Y7?78#PD=(kh-BWpRTm$ek#>pc8gOeId8FN06PqIDxOj_=WWB0V)-60X=b+s6YN#m)W369iP5|YPMz&z8a$y-Me}s}B|E{l)I!k>bobk|XK- zB5&_Z)(1f}SRcCyP-R_!q+!OFU7-to1fC3+I)D9Ftng6_!_qUh1nYsdh~Tdy56is0 z0_x&~NLH3LE4|^W$nxqtD+t`EzKG%*1feLkR4n%~|KMW*f6#Bm^0e3?L`|sf>x|=% z${fEA6ZZ;pD<@tcc3+b1j#}kYd;0fSY zq97FTcruKAe^PC*2Y>gQ0{tVu*=xtkf26yZzw-l%McCW_6;#Xf6FJJ=kTd*X*7(2 zr29v5grVF{4*3Li&Tt3=wRb`%X=Fh6+jpYafxgPPzN}=@qcQpf)tFey$$7sAlfJw0 zM@BYVHr|#~W@5-O2aFu_R0=@6Ga3DT82LU61QJbuWXW_O8b{p4^vs}q?3(;(lPnVo z-M0%Te?3DggpyE@%XQCHXJmU5|rx}Wja9vlk+l)EBjYMyaFk*PfHll(;1LSrW2gqjo9GM z6W%d;Q-KYL+_+6Slowdevi_4G6@MKiPS^b;f0=?XZ`m8qkQJ3(5^5riz|#J!!wN)) z@{BE%dTT3SS)kP?KhvI{94RgnOePGz^Me=mmI;Dl@MbXbRAv0w>L{}y#;SlLxA$#06i^nALFHKXtp zykLlcvN5yiY;0MLnWZ2S7N&I|s7Xf^f60-d(#9~UQ)aC?wPgklEpX7>+Rf5rItcva zlE;U6h}H$%G@E`%$E0?AJ^AKq;Ya=kw@jXWy)J*Tule|!Q`&SNyEmBS?Q54^#(cDw znf>m2w>wVOm2Ir%Zt^~iu0yfrpDleuznJ*>^}72FX0E|aQM6R(QUtK36g@j^e}ef9 zG0*2n+zCx-GzWYX#c1IqsT%+hF1lZ@1A1StPrf+|p$nKQuS`0T2-6LVJ2#Ro_2t-5 z#0_qKJ?@n;f2}j!pyim)4w)KIg;AG8V=hC96V6P1i*Zopfbw$8 z{m?e-sN8ikj~%LgQUhH_!!uZy^VGqo0p-+k0|(|MFbgomv3N_okkICI6w6JNm^_k{ zchytQH24MLK^VnG8dVp=K9V$fCMgpI422Qk=|UUuAn?B_;||;vhXveuf9OmT(JS%S zksFTdINa-K$T~x%2sj{|{x)?7$sSz?0&_12pgoa*TkuDQ@0IT|R128aBiNhgC#P)x z_y~Ld^*Z1Pn65`bo;hS4Wjq_Rve#j%(6JliKA-WjpS{$6HuH7HgjG|Sy07Llbn69@ zi;W|?O(dG82CpjRo`&(Cf2*ZK4x|`U%js5>Ukv`UQNPae6Q5T8hLIm9>9Md#Fl+*w zp`EB+-|6@AtBSG$I*Zc5kh0n1cezDO?8?~$k__o7OC0mc^IXr&uBfkBpBA-6#;TSg zO=oIcbaM&xpvg3)-oaz|@BasrN@7tBY+)u>WWpP%%~${c>XWEqHU>;$00000Fu)}o delta 20210 zcmV)LK)Ju>#R25S0kB#L4PuuiS8T^bxXV}o0OYf03CIe6^h0aTy9IO4(o8*rS4uwh zsa}=TXQrX*ciDlE8*-2;B?ME8<~$>K6tZP7k&|VVX#uPpF^=F3*lrdN;c~))=mJPC z!}dEMOD8up-qN+Nh93tXMIT1_E5P?n!Obo^aj))}eg}a+e2>co#!un-mlSyWEM$j# zgbrAwMJAJfaOrT9_hNm)SC^nH2#U*sYBmB00hz$M7oeh7uf6KCVES!!*&9BgZCKHf z1iE3YawWQ!7M6JkT4)kl16hKTd{b_A<(X}{X5udsDVxbwU!cNoBR=&c&pcrT!A@tc zY7nbLsmh5|fyUg5($L&rNXlv}YBiz=e$|5@_Z^mh#fC%>fGV40i=`{~7nmQy`?7fH zinhmSrQ;E(X^=uu=6aq_nz`IAfHfHw9K>Q6C20b3@{+?$LB@DnLUa=QLtMlsVD%cy z0BvUGbzfO>-Q!>o2Z^cwt`fh?7gh7{)?*;Gr#@&;2bWQl05xAd&knVXNYli=q}P$D zt3(rjp-X1x$mAT6BZ!j+pSVd94Sg3~l|?eGt)cn`OmOt_`1PC9{a2^R3E%P&ni2vi zH4IReVacrCXUd7z;MH_I6mlU(z^=6_n|4OAjX1U zd^&m6s1Igdl_Re~^i{bt)Mp8(!GoNq2F9!wXiIr`0BQqL`UN#mBL{21eJc7&CIuc{ z72>D#|~D+`{=f+dSX zAelzA@(38K?aUG#X5dg=0ciCs1OwrOjsOeYG3Fy4quUvlk?BB_eQm7+Pc)TD@qk{S z++AB!r?J=8uqU7|KL@=kmR&dJynvE_Jpo1)k4}Y%Mc*$zSO&Q3FgULPM66v_poa0l zOO~;bZ$PWWKnAf!;le$LJ}{aIg!>UFyD=x*0ZRZnT)O4M}jYArLuer(; z*7f;#8^Z^trre)3iyZ(3C57}h0 z+9i3S=FtDZ_B{`!gpe(1H0hFmcsL5BZ1~nq!2HK4<_JsNs8-dA!@Clc* zhy=UZ4$kDhz!3KUj9_FMn{Iw+mOJGVI9SOtp-_59;|JC;%%>E+B{aG?9n?g)c7YVR zP(W+Dv={;L#gBoo2`6zh5zWcAIgn)sH!i_i zEkmzGsgN{YN5JYHqkyevtf1`Kb-WY8gyz6c;jjKgaEtV&j(lm#|A&*;uf$Vj+#jFx z!~+~q8WQ9;;K2JHkVCz&%AuHZ2wF-GApvAliPq0cQsh8wuEwIMlq0k(!88c`_d>OD z^iV9TO;}ljp?QUW3TAZ86n1Fw9 zhXE+j%a)F4Zjf9c&J?NT3ea4p^g7F8QK;S+DUPz9$x6e2N_>x-712Khrm*yfQ=DXi zzzlN??K7zs>1Sl2$puYyUvZ)$&V6&rcbZd#*@#x-=gA-${xy8DY2ynK6@uuP-buCP zR#4y`*!X>~$M1!RkLIVbJ4Cho^Bl!uFXkJ|=xzpUj~#hv9>GY- z2>^qFUcJ)@b$;?3(EcbXk|mISh*7v=0+IHfs}jnnc&VI1aUSXmCe6 z^axacF&(G@<)?{i5_jKP!rk( zF;6<&S$b-A4&w$q3@a*xXd?yGfcSDio?&g^ExUttKfzG>3=9@V{|zvB7sJ83`_NW@ zR9<`bkB_h@=q|KyHkG|^rZ_D3_e}(Ah>*|Y`MqoViNRK^z*Zf0K@%7hvM4w5s)+Ux zYt2mpdPBiU(NWE9)&HL_iQZn0oZ0 z)h@*sphDUnR~)ajr!vkJ5orZR{ONEw+}d$?zc+BU2D=;1U}uv%yTcv#$#Bqn>h(ue zb7Sc$%j%FzSz0QnGA875GgOuq+kSO=mIkPDm(*y0#_4HG5)%7%v&bLtYh|E+Zxu(V zbk4Q7D})YIw&WV*Q(v3{Y*QBc^B&78RqFy)kLiGRTS=J_e;pN~xDFD2$}11ISM^Ze zGSJ+?EFr`U3~hN>dQ^B&#I=OkZPJP8nN%Xk3`vP}l?CNuk+t*LcrlL?p7vi!CV`(% z4wajCG6mauK5LbMWMl3Uz?z4DDxcLS&u)}Y_%eGc>Ri``stEP16(l<#C7}+RM4l-{ zXU`!dVbqIEjm$}{xGYcHHhG*XU?~PD(J`OZ-7?#4{i~Nc7Kvj=%9>99T<6noiA;l# zZ!6&23irhc_C`T!{xq}@lL|2TDT~;TH7updRAk4}ETA*Yy|dL;r?9PmRcXV*Uayho z%sO(upHLz&1K)DqvD-=p1>naf!La1zPobCR;H}a(DLnF72`l?kEM4lBB|X(_0A`hc zs;cBx#hiLBE_St_VU>T-t9x~N!g^5Fgn;v=P^-=)_~oe-w-*?VD#XlF$E<5t85&fD zMW_g~s|LCC$F2%AsQ~SNm;PL16-#~765q76-+oEgOLe6bT#zto#kaXR-ag&qZ6tMm ziW)HImQ6Kj9joQmP@zzj#_T>N6!VI5f!@`r z{>nWyoKx*_{_Iow)sat5sHW6?)jpo)RDE?R`sSeFgGkNyu04f+8}fRVDSJnGJU>HV5KcE#<#y7YZE7Asjz?bG$mlP&IZ zOVihGo+=_{jTi}kH?ps7)A7wiSW6^p`kAKTD{{E`v#^jhN60lQGmmNYnlq2JZQ?G{ z>a_^qve9{4OzX$Aat}AH z+}$c_ZPJ>xNEc_1mSwY~hii~SO$p0v)$f`vjcMMR$7oRTemYjWyv}nK6 zbZECE_)KYk&*q=`Vg^5^J8O~d?3M$1`?O}a9p#1PIr_b)GrJ`x%$>IE!7#w-!%kOr z%kjBoTCxW-N)I9(*)7Ln-n3)49fZepW1lMB*q5*!^_V7XmNa2^>yo-v8n8QYXw8@I z>yxDUx~25~Wa+$qZ)v=4IZk(#uIn*P*IlORy5*pM-!2{3V;Zi{FAdj2RISXPg=0XL zoCZ^QzO!&B-hgu#`3R(|L2Xi-=UnH>OJHVzE^QRPqyX z%DK8!=Zwy4<05*t)Jda+TwgU6?1()NuXK-^u!FMA$f-hU6yUZqzTjz|u&4Aahp2o6&Abks+IX9A9$#DeCs9{ z)dif8q`7vCL9~r7cE=bJ=3YcAPd!*Re80K^^gr-NSRRY_Hg-0kMj9au+(oj~Th$|p z2Zkh`bU2*Ov}7j1$x7 ziNPtM&fepJdwEP6G|O*HqNswj2z%^AL~0SG*h0dRs&VPgZ(H1i5wma1t2E30~A+ipRcJ3xp}R0mfaqh1CLoYR}ct zay)vU4fu28e7~w8&+9wxwR>Y8Ntc}a9oq0>rhvw;<9D^I%J(Q}I|x<<-=NJeip%B= zMk*l*;sNF)CVCOHM!KBasG@3S=jzFHSgFfW01!I5KZT}Y388|mXB_fF^E6{&bPYH; z867(;BRV{9ntTe)G@3XeP>hp*+XM*({XDt|qnK~(VWx&2Onp%pKSuE$R?ywkwR$*- z{cuISSp~yr$WW#wl%cBv8o;tsH-p?KeEJ#Vsss@Bih`?XeZ}ZjU?agd^d!HO0?I(l z-*Tb|8u@4TrwCXMGvDk5e3XJ5_Ss6F?^e-J`~$x2R^SgK_lFo&pNay1)R0OHA|$py^Km-_>8FHF{sA_lzEWa+Tu6M-l^rLQmWp@}=j z_#wCtVEtev@f1tpsm23;Vhp5}@#{R5FXi6Sp7{%3($cU;|45?c#GTlfJ@Pt2{G8kX z(~modh$%Tf0?%65^USW~DgE%+v>ui$4Dn2;Bjnyh*-@!onFUQ9Kxi1|+q?#1hX`Y3 zR-t9c+L0_zTi^CNbuTL2`&F9@%GNQ>&Z?~hmG5TB9=l(DSn|t%6v{MjOU-O4&6jbx zj}DLf%(yJ9nVMvb!rW}kv0ULG(eLX_*kbYW@r`D)aAM|LoW}u^H*KrkF**NAt|K#N zU>3CxTBlyFu{WkT#_TB)HLRA2o7M1@NcNa)S(STCw#>hXWXlag zpqOR3ECX)i^J>n2oh;BR7Hg9V zXY_i`;q83%az1)FAHAH9Ud~4^=cAYN(aZVh<$UyVenDQ&&)&OP;nlQyGYhtR8}DU> z*U~VXwb8sd6KA%YU@EDb<6H!InljE~o| zfNHG4I6(V6G+ z=N}eY;9x71nO&s1W~HmNO|yBY>B5|H2<>F(25y}9bS=WU^?+Pf(*2n8I+nX#xR#}8 z(Ur}{Mk8>4rVx+@gT@N!F$SYiEPZJ)82vkm!RUV}F&O>Z$6(mkPPVWZj7s>AF&K|A z7>_X+4RQ5cJ|^A{e4QOgUn8X0pL z7mr587hqJ}-k5mY^7w+bJnYuNY+D{V8Q;bs_~3MZ{#z{bx7_k5!F$~Dc-->1_bm@> z4wL9TX2Q6uO%Kb&e8E99<7GBiKHl3d_B`HvyMF*PRVD=bMUKlCwI8CGtzy%c-Pevt zc_!u8b~ zVIKE?FhROVrCwN97|+zt1TR?~O#OgThtcg$E=zp8e4U|S!dSU53LT7<^4!=H69BK0 zz92G)TSvo+OPl1CUwWFjbjv7ad56X>@PZFMVIE$w08qru1_o@AOjD=Ba)U%=tD+Rf zbUkTS8gtYQgDJ%$Qx+-_>lg4Vu&`8~a>~ko$o%mjR_Ws-nXc5JNt-Knn;oYGi?PH` zNRXZrmOUmKLZX6`y+gqUOTV2drR8kt+1b*oDCG!dz1Q8KkZ>PF5Lg4x-a!_NYQ7qFlnK_v|#NpAv9uTpoA&?8)Q6;R)!cYJ$yv@v=*az@_9wzI{DJI?NZ zXnWV;Ti)()bFjU$JL*&2ArAtI-lJ+N$Cw5ytQvZ!$)jJ=JxuiOU>c)BDtPZukGMd1 zIxwJMi9!KbVe$5G{kjNX5+$iFP@n;#akliall8p+WMlhDZ)eAO>JCQE)^2apad-Pq zot=#*8@s#wN$&|CEVSn|CnzVJrMu#PHNI^`e4BGV;JpoJz@I#IwnjUyv+M2loUOs| z$?)mMaFh3*ED&)$<$vJ8#DY1p92W z*&NLC^RCM``#atfXLlD^d26_}X?L8@YF#cwb;d}bO!uv#~I~HR>I0#fvBY1=&D7lQT55>hc@MHwSoPSiv zor<1sz;E*cAi{a9SN|x}F#WQBhMDJfcV}m?#kYD6AM|0G_F%5=_Prga|8%&s`DA;; z-5Sg@pcudUdURk0pcV#I<}<{V1>@n{3~V+&tRi!Te0CNZK0U!gf=K5FFU0#>9WOEP$^Eb#Gm(vd&3MctkD@V# zdrV|{KGz2vD$bpN6>|e0=jBVs17k!%%zTA8pm??*d!S3JGX}Y`*i#)RO(ZyxG8tYX z3#r=K`2jWpCW)rN#*D47>Y=&ap`ZI275iB#Jo~k~;oZyF4Q>p$;x!$`C_cU^v`zywUcCw=>#$(tEl+hh)}jMkb0+pkJB#q154xMk)Lo zl3BHWhL7M+4^4S39hK&x-oAxDH~=sN>^GbYX9R<^DEZ@=e*BMrKoa@2qaO;i>&n8I zoMnxurxk6yiqyBpCTvBu)~8C-=FUg_E)aN^eZ}`51&Lu|k%j$1>SUgr%`cJD`rEtx z4f+(hYv<#;j;ROIO_rJJvM3%jxCMpD8x)9nrLu=hbfs3QtS!prt2vM?N{tU#-6{GU zBt25uBdNw0EDxK1wN^v`-8TYdywgY8L8gfuc{CU`}2nXqH#E zBcuE(80}plM8w}ydEeLdr4ME{81d7Dd-{Sn(WL7Gc5D)G+%pq*#)-V;sI*IHh_}QD zUqr$w5s7s26TDSw$iDZ}AEtxsjw6zxIc$dV4sZ#ZJ!4;gyX-RNBT`xm3H^EEU%Tn> z5-()H*DTHS+w(!-f|Vip`kR`XU$490m?#{{?C1l|rgWcxhjLb2)#Hvctn)SvUKLSb zKAaz5(DXkQ?;-K&8VhxO=IqSK+5ok78gE69CO3C!%z3-s7T<9D&fw{`=WOltx1HV5 z7I&UL*?6*l-2>%+gZJiGVbIDJImCHMtLf7;B=q9374!tj4cyhY zmnPrF?sZpeWlXcU4)XDa0iU?g;;(c|1zo~6lupcb^d+xrw|lbwi{jj5U3u#O4LP-k z$rZNv4jt7iLNB8EAfI=9I`#UUA1CP>K8#|I_VZVNO)Y5bzUSu%pL(Jde_MVCTc!tU z4iKW|Do+PesoyMi)-zh^K33NTm2t0Rq{t`+sYV;dZC<%79X9P!)WP4NVk$;+m0XDB zawb=Zqn@HEoD2AGNwqIRDCn;yJi-A_x=RzRzI7TD1q}~G`ysSfEFmS@L(l|=qwU@8 z-I42mxI3Gh&emYicXl@hp5tu|L9rjY+uIvY=A5V1^Yb%jSA$FT6ko6k#;`L((NLf} zE!mfGoRj#)ZE@P%B~ZVa z?+Gi`3S{1ELQp=MtHWKdLKW2n_#AGe(ap1ea5XPhxdqA)WX(&Qt=0k-N#!yUn<&6s z6CXI}7rfSyd{p&dE34Vz3$C3Fc(G0u=0YyE2Aiu;qOFw<7OIxZ6|pP#*n&}^PyxnC z>Za4AwolJPGJG6=r^GNF0k=~*h8_C=bSwnySgTib%UpGH9E>Y)rkW*x zAbI6#gbVOKtR^?9Kg2cJbXP5AaqOTW>3jKgUn~}eaW#yB={S6es|~>y13@Y!LeS+U zKH~Rl3Qv$AhmxcS=NI2gFJ+4aZnM|jM#vv&H7+)G8l`Tqkal*vo7K%6pygU>rr)!- zGjV|ca`$aO`=yRj+zL>-20Xi|IB~|DqeAP{Q`IE zs2TWROMW2Qm8^z5`|XWn19TJo$c5HZvMrWm>DRF*5Epy7w+5h9H{yEXJLyQJv8=9s z8_C*;|HlG^c8-gCaLYXZFbUkymBR_I_=gFqZ&Xr|ekP|3h1w)?^Fv0TBy{h8EQP~F zp^o7(!*{$Wdch5O5Yf{YGkIBC&I@x3DAccMrqzR ziY;l7@{UEoh{rjoKP6K)U@HgyWXPNvDkAJTpG1}z8SQ zFW%(E=QIPz?rl-oVg$cAdg;6bi8P2lkf2NEF^Csrq*i-!KbgbM@ZpZOw|hOeKX7&j zqbJVRj>}=nKiP5mUT?I2^K^H(GZ?vZPWkGo{+V|xLddR z9In|%hx>zdxCda(f*mZ@127^>yi#Cxk!iY;<7@rg?L6H0_&EiCj-5szoGGaDo}AyG zr&F}ISf^;_Mz{yB$b<5RqUTA!#bp6XXAh`9NtYdk9>@4<<&G53)e%b6w(KF8c-%70 z9hr1ZXIjGWE(+I^=N&_SEssE^QO^4*(J4(EnAmk*$f?LF_4z z?mcI6eP%~v3LSlaE@N6_{X!&{sBW<6zATn(_D#;$ls&WrEAGiBmS^Qswjk|c8^1;UH{yyD#y@j~* zX5;lk+S|;V<;my4{U`2N?!OWbmi;n0@6N0|EVIfs2P2UqlyCXthW6+Y^Fr zse62l=2>NbW%1ftTlydBk*{!49KNcrcKE6oaVAXSW}8@%w7n@jjDkp<=)Z_Lmul9% zn8yo_zL`Y_x)&AkzU)q~%9b$g2zW3B&Lfj7XL1@g*|W@op~JxePMyNDV>d})5IrU& zpqIT?tj7h<&uVwv*O9e)HX#tV(2HAd}rG&v+5y_y7q0_=sYA{`}qgWQ4fCt9aAb? zu>iJIt*b!2piFdsvjSC4feOFWjyO&~f8VE?y z1K=I>@JRyiu@z-DkX5)pg{DCdO!8{9h%!^==*e`5=ax)uTg5)X*aNW*jZGxY6wfx@5z?76 zC~wqwXkBBgi%NQp>W^1Xrtt)S>529YDZmu^LPx9VeZSy&ZH&nqyC1UJ(4T)N3f3yA za|+)!VpfXJyoW=MuEn|0D3!IJP4F-=Oo4f`H}(9h)G47pnF@ki;?O(?8*SGyaiQ1) z;N!~J&;qKngq1c|E%Nl{rk$rZ=QFY9BRYPpb~+-}6-O6Ra$M=ilp`)L0g! zG`=D(%Femu=K^az4Ort0U{>ZgFd|^2!Ga1@=$V2}v*OZC&Qa%FG5e6)%1|2o9+Mi1 zjJPhI@VQDdrR#Pr(&kCR<=zP^v}d+ew|=q}g9@uE+`PC(;v`z~x>KQPl>Cq^DMW;*F>_eBBIa1CnG+Wg!%FV3` zU7%8K!rZ#>g&Y)B?@>9pSMi$9;r^S>!u;`30Jm-N3lhMFM7#@sX{tQ~SqEwaWIo%! z5WHEb)-t%H{|ZQLtG5y1f?frcc_SyYG4x>!Mjkq@L~%OOqFh{PPA`0qdEt_q5T99M z*VeL$XyNz;OJBMY~QJ;uausKrkvQy64boUlM>qE%W$biqKJd` z(JLtY1I@(?b-$c{1ZP{hw+kz`^s;WY-4-YyPRf#N`do;ta;J(Othh-M4SiYFK-w5J7EGMX3Dvms;ftw|^Py^G4 zkqfU7%ad?7H-=cOc7$P}KTE4`d+&-XuR^3_G|^$dT=MXLAm%Pz>q0-|{%&C*s0bja zzn){~$(FvHIAe+=9>9gJE=2wX1iBlYTkhK8K2qd^p`U z)W!NN!kloHHLnJIp(gHsX5+ieethp)*!-%Irxgg}(o)!!E=hajN zPhljiD};)?4PFpbVE1`WW2k-QW9k$cmqFD*>H}xREp2!;%ePA|EW7*UzP(4eyw&jE zoTv73LDo1pIk-jd2?Z~f+&o3U$Ht>zT#$tLq6FhZG7{6r+p%#YzXuc$CW( zu`Bm~*n&}^kZnTc^kZefrwzB!RFHk{>u5TauEg8<3_gb*ex4eGb^EGUxqWrFf#KPL zFAmj<{l(nkFD6IAZn@&?V^u2e+VC<;c&PSr#+i{vnjxKFP)*A-8Gg)+Bd=wR0a}yL z5QIE%@P^CieG2Oz(QeF;;C95_8U{$r*EisQEav0r3hy~-qjM}aeZa=k;f_1p*>pCa z_B?0n=|Rp8JkK6 zZ>387usc`8p4yj~x7`m`3~sBDy)H_Ptf`Js$k0?ivt1UOrqXG=7&+%i5rH`TAsJrs zu}g4NvK^6VhqCKvi0k_km^nil9p^|6j`Ir)4yt#_`XGn~>tkq*$Lj(ljU2x03jOON zFlM;a`Rl)8g^!ZQOV8L6h+%6H!7@i4mU(*x6h(zGSy|THq15;zZ+Z2d6$Ida&M%_) z2080Q6h2JgqSZQ4^~BI%DFaG83=Eyu9*(CzEwx8`pDFw~XzQJMn+c zh|=Ha_nnO%{x^x~Y_p{bvJ6oNm=(IZlC6jam6lgK%h{NAPvi++jpuSl)?QX4>nwK| zZh}d{Ss*=@IP!V~c6k*(7Sb<&L63nXsm~L@uS7v8;PGS_`*c1Ed+>L^DbPRio4wh1 z`j3>g;5%O|3w!&&PGf$4B1gNMTwVN;8LjP+L7=*d`L;b|aXfS!W$CE}Wb+z4%7HzY z`T=E@mT9>YA0{Pdbo5;KmK~jC0Wr+w=|%@*SZV?!y&I}S%nB_uJfdrVb`wppv5N@c z@CjHiS9F)4v@cA@W#}o3C6t-Ig~36Gwz)gJG)i~mF=SsJx(<1Q-4EzUr8;>oEI)rd zh@}9)h5?`0q)8Vj3(SmCJvrnPj1UcnFy?zFHvn=h&tATLCyK$U62i|YZYV4H{b&rf zSfYm2QcjAHJ&+&WjXyGfvLZ9q$p}r%!!-8@LybnqVTyxNDP7-i_zPslyfgE`BFXnh zmP`i%A?%Ns{TaNEU6cK7f@?x?T6Wo|Ct!ul6KZd{?zyUbph{H2KvxY`SNzx{!fhx@ zVOH6Okll9iV4!dk1=A`r86wa!R!Y*r&=e+J1+1zC=RA=(h=rzqT(`Jn5Hxq1UPf_c z|4N8gAO)+cACxenr!ydvOed(QHDZH1>{Gl4v;rHD=y98JK;`#X&Z1tBd=`HlC8gK> zB$>im(Xuz5AwMd+Bos>;fu;RdhZTqp(ZvUJg;H;A1uW~o`s8QY^OGaRWrE3s4R?O< z!rn4LP)vR(rKp8}0Qj*H0YB|gb28kHV?Op1o*YC$K;pP1ep-CrJ(9WeKF_ak^?i6q zs!?7r6>X2-S>{FYQBjLEe;V~o0>COWd=HE4k2RuJmHF8&?6qi=?+e0S)qbTERa;ej zSy8W17MpeCNS%-+V&J=p`hl(FJWHgi`(w=txg_1py4OX2y&Nm_oY2y53H>;Zyy>tG z!D7J@p8hTB&akqpT9V%sd+GUf8)Hf0sVrYZ29%AZO=n}vYAj_&lBFjKH2U3ewE8(p zECrF!eXWB?=sK!MzM@#5lGkB=Sy_5Zo*hIxvt3u>?CWw{DuIPoVeGATm;t3^?WwUB z^9$irO)g`9aNlJ;t1|4023?&#CUbQujXAS=#1@Ji6Q$p?^8CddziQ};>%a1DnA(SU z(#^Jax-P08q>hMp$vR$0BzR~YMlXnN#s=$=QvX$6#H+blAsGvkrC*q1B;(WoVjuD= z(~^c{d8ZgADJv~)oE15CB2P|v?W&zMS~!+FMRn(Yoi-YPS}>DKFoQfxfztHvIU74L zbe5vp6xk+;Gr5VXcUAZ&NMyel>C1Op5D5(pd+k@Y26n)`>QZy&8{q%htarJtZJTY{ z@ia(%k(K5jRM#W>hTwFTQsn~RXE8w*vcDQK6#n|7{C*0BC%4%RPFtzhi zu~|wu2vpG-uQx&NHX*m+^M8A`gl7iMmfo3np1V6cgDt+*bNHY?a<+Pdk+a+PcAWmx z;m+oh?G1NpFwZDkb{Y#KEln2`5V+~nX0-F+is!?^HYM9*!exwMxPB5&gJ7k!bGeFt zhf%=*9Z%AminnPLMAtmFy_NC)ZV>3rwte|s@As9ft#+0>I?+V6rEWW9;h9V(4jz>I zJv4VQ6+XEid2T&VR#|?dw%itG*)O$J+EmQOaF2&mozA;K8IIicg?lOg~p@%SNLV{td~jT0g@_@Q3z8v~*PJ zh5-*&IkrAQS!$#{rDg0bOe3v=!XLBy0S1PXIUfaX+;~aBK57Y30qOU z^{z@Ikr;-LNCe(xU-A7%LE_qfD2M*`ZhylXBeheAa&iaJ70>jUMe(4)Ejp`FAq2Bi z8}O*KYjz1tg}IDLlcoK;vYwk0XEI`O-}}=vNrhE`$(UoTB1{Dkav=*j_sEn`iNsOw zR>_h*Fbq791c6d7+hoh$Ep)KdLvxnB081t}yRsHicOcX*v~~&__2yQ8Z)a!Zj-03N zM&H?bvisE89l*5iyCZjZ=ZQNSZj7kzkO#rfI#eSU-hp6+YD(|4@~&UL(9>F7F1#v1^=Oi?!A8~x$a&28sN zZ+pYp8a&~SySW4MtUuU)=x_3;+gp5lfgOMT53kw3XSBz|_7C;l-=+Q|FYX^&J8ELz ze=>Zskl1Ka`b*qqn&c{ogMw6F3oSxF8 zy2BXo8O?Uxzl+EXa@TC1V( zSncBR;}VtxalpBMyqg?F^O$m%VWxTW<#39~a<9w21LJCpc$$GN!gn;pW--r~pOT_` z?E)&GJ);JV&L)?fS}F%WMZ>9F^ppVXFaPm>#quccpc9iRscpdC_kceBl0K;w zeg(*xBapqs9-B$Wbg4<~f;tJpR0iN+pbNi>f-5ZK<7EYZh|dV`YlAf};B=z_g~Y(m zi)rA-YAM8o{2ZmS8{d>~y*GIV)KPI*6qpC~&mwD>`LHqgUk*}sbUecztR7+!#GuQL zpl_)4(gA?N*aGG^*r4>F0UfbtFhVZ;KaAKn=`a(bhU}Pk^{*= zMz_rTB?4j%)iAzNS>_GMzd*O}$m}tXK^7*&DH-f6Y)n^3i>MSNb;4DbXoPfMe#UN- zyvZ_u*`ac||KbJe6J9hXyFMSs7Dq7h;+2B)hU6i6z;8?{t7=+cnRx9dVg~8*2~nd& zv;3tT)#MjfdvMScDATz69$UtREsg>uLQAk=GzJ_CimrTv9V}rl?__ z7z1?yx=L{$qs%He;p)aaFDoP3F+d9dM#ZduN___U6!;g~=3z38rJRm1$`LxL$NiLK z9A1thY6`cp$3lI4A9|EvZ|EQu&I8;@3K&I4iyw=Y%G<0jrWZcy1OtEpR0UFS4|WC|Xof%BjT=7q5hW zE`;$hDA8csUy=oUDb9eMdkhl$ku za$=DJi9_nD>E11NL=*Af8`es5cWBLj%ED|l6eXq6S*d#ofW`At>o3Y2+_v@HwQfdN zX|vA)R^3vRKac1Z?iQ-9Nrw|tyrrm7eyMwqNKVNONc0lOC0D3#WhqrWP-z!cZ6sA; zsmWcShiaX=OH8x_Ts7jfQH#nME^A6;sQec|YfWmA@>Ukea*L=rC>1}mhRD8usjC=o zB)4ckohYI8IC1@xmY`-YQ2b@xAR!j$OZ+e9QYg0gEm-8_Pl>T!!y=v8|7tB-5o1_L-jkIR=4?uLHp2LQb=T zQ3Ey}Mx^#ykZS`bN1)n!=c@=!*?)3i#EDr#1COA#sBttFMvoM!?JJ&;I&7ku?Gt+< zY1%AFg($%qo-!+5d{C^FOQV**{w33uwBvzfab^wBVJbSymQBTf#cZo}Y+2G$U$una z^1IE1_JJuhiWk7eDw&0O|630QI9^>*TU89ed5MDOMY@;a_dAUj%(<{6%aw#E{v8z; z&=fJ z)gkfRfoyyR6W~C9p1Ywd*7CH}H!Y}ly^pyi5v1(j3jy73Lv(G;kS4jw1V%La8p4d} zj0G)G{*;xNyTXesjL%hE>Wa1{EL+)XG)>5>_sdB)pH-A((F8-AFzSUs0)3`|N7g#5 zh4}a;OFr7AOhaHh7|WjNxb6tV6O2+xOi-DA1*nn}MHqH}(v*R9-6iLyMmcAc9;L#O zO^#S}=5k(iaR`6mz#YB^qfkYSIrylVFnPf(-T900 z90h$=l2}-sADVOuQQv7Si* z)EjRtmA`*~EbaVj-vJJ?0Cz9ipD|llZn`j?yJx1|I+_CJVP!G9#MrAeyCqkTG2x0s zCH53-)6E`Pu$TmmU#KeBM&D?wFEwg}ZGbc@T@|3}lv+iFJ4vr-zQ@TW0}|^2VL=(p z`jfnmn00bL#V@QwlQ=h;kLejLFds;IMhPQhe`DBxWxQ%r4%7mu`SW*L7+t4G&a>=Z zf%l*#ObUWO{_S7?&;R_F|M)-u+rR!F|2GvXUE{D?DE^=SFHx@4{3^3%g)OIeG;wQ@ z?s3uC9xKPLW2AmGb3zs^o{Hp3_meWIGtb>=c^&)qiI$qQhze@$0w%@Xs@Cwo=ZKJVVWm`64S)S{Vlt4EcZ)Q^kDvq13W2a zzoXsi>9p%eb=H)Xs9;Lf+fupRyowFFkhD64O#}lv(a|~z^O11G79W$L40ikFFaPr2 z>+G&v*>7(YjXNwg>!4RMQ%_MX1?*@u25bj^X;z%(Hvlt(rD6ckfucs#i?TSatYM5v zL7yn{GR6N$449t}Hv7x}`2XT97jN=mJ2@jxM84o@+9(G51MEt%HJoST4h{hA5;Oaj zyofWw@uL$vvV&Q&(+rfVVH#L+*HFz0bPBowhoPqcqpSoe`o7wka+vFZNs!-wq`eh? zZRbTHbVwvp1yKY5LBjZvN5h~FGd&0!4%yXiz&+X_^>zr)Jf)8c|D(eHsPI23{ErI% z;uQYQS@pHYB~H)z<PTdfd)sNu79t_hFJ3#Ze?iAmqO}M`;B7LumH`+*jEod zQ^}SFg|Iz7joHy=hnJvRHf`}Ddl9~Wt$h9qHf6++HEjpwOc=uu3AHoYPInQKYmk0{ zW(w)SIXfj&s%@m4!)WH4 z6iu_@`A{vaN9*d*x_Y#(9<8fK>uPrEDrel>Q(Ux}B_SUit>Tkacyi8OxhJ!KPcOQ- ztm5&ZH&M;aq<4-*7Q!@>-Px?BJM6hSy655<^U|p|vIYuAiSh^D)CnjCa#0vrrs06) z`3F4M70Z-2=BbOW!s3MvXPYMO1=+pw1_Pm7lU|)^-@ZPzo9}=QWJ9zsd_0U!YPm4m zvi3uD>VvkefX@V`K3E8D@;*a<3%f)qQ+$z5t$+g(Ap}twP>Lq75YT+4V?@G+Hw*)1 zU1&2XcS4Fz>xc4sIQ%}=6#yqK%g8na-m;J_J4~6g_>9Z%qr>bnt>};e){AE?Vo?!z@#*(HW14(y(N~t+T%+R^> z;ll^E@>2Bb(w}H^j4W9}dia&xgu_d)2Qb|v@CPgpiDGgYjz)-jYzR2Sc&2DIYp~Y& z!HhcyP6WhzL@hfWV^CVQnGb!G=kj1+>7I)`jbo9}^cfx{bELzg1MJ|b2(9e!ozb}6 zd{A#~v100-K8%(>+8}!4a3-cVKOEI3-sCod)S>U^vhQijL z{U8uRPcSPh91F%il($n=MN`C)$S58q7H_gjW{|C)s2y#Wj)Z}-E07o7AY)dkBbjy- zjpnjoW9cx#t16Y4#dC{71_IvKMyDyRSlyzELFOLE6b+@Rt@zP@+Ky`Gn4BhH-(t+P zA)su|t>mHjR4ROwccm7bMv9QkJgBOUQz=rxssXGHQ}JPL>}!ERwhS3D6$-_@xPegF zq`r%p|FB#_liZzqh7BnStgqL&adKqN`+_c%kD_P>ixI0eUe%?c8prBmKN6fc+oS2+ z?7N|21-DpM{nAa&(JM~&f2+9?6Y+_VRjZ})(NuYz#9KqsTHlNOCDvEgWmw~7Uvo^r z;=NH#Y})6R*s$0rs@1WVlwRVWQn+sP5hY8zrNc`7Y#?&2lx*>hvtq6_#hOH#e?;WwzL!MC@O8 zgTwdID1s>{trL-KT030QEXAHjHv@x>Wu{oc!;-1SK{+K}h^sPFVEY03gG7>D^n*+> z?;9lzAr!@(ngtJ4e^PNw?N0BK7;Fumx=&os+1%;5&X%}UVspnCjGhh$JH7s3>*%`CZXpAX-#sJiT%dKMXn1(;^r;d z+|C(H5)h66Tvsj%^bD$-3=MgXd~xqd+~0LfV}IfYL6RvIe+z2EoCevfgL%BUkVuL3 z_1PxR^A8Vh>de-G2d%itXs;R#M{W83M!!C`o9$vDfqA|$>m-)Tcl{JDXm^N-tZs^# zS`bFTG8BOX-j!SrBr8{jAxKbLor;ueikqMh0yk+OgHh1ZzMJ4JqfuxLO3-gl2zYI6 z-yg9RmR;Pze{5aJ!&_xv)9oP6=94GhYNr{2PA)Luzx?mS=Z&>i?cF}U#!cZ8(Zmnr!7AZ6P@Bdz$Hd#`=imZ)T{60evj=}+0mR^=xuq8f4bn>zAiBJTe?k(4OTFRfTR1x2_dHk|@Ft2{Xr+1Sbf-l008TV`i$#i&{0ydau-a*r#) z_>5KxTUD*{m~%IMiAl&Vc(R`yf$*Y4tPR6%f2~x49VCL^jNUcR|EgLgt{=MLe&`*> z(L`%-P26v*Ql9DK=3r!5s94tsf~~J_6tu#SS3)$y5Cw~3*m1Ajn`&81o*s1dXfMx0 zQhFC0@7k!$+>4I)dYXPhol3XqBIeH|XFyV>dqUsv^h^(Vlhpp`Z#v!(KOZT=0vj(r@DR@mC>l(+%3&XL0ANi$HX&E3}+e^Ewg zeKC~Wr=znsZh&dOZ$$JvrR&Dd#8EykgGHUDn{F~JV}ppa8;6)_DkAcDr&53^#xWQL zI}1PFCprO}aXE^5bb{Ls`j>q7sF-Jpc@BxsQ#n_Aw~RIxZJT7e#L$ced>vo>;Dh*z zhnK(=M;Bof3kuY&V-k|k_uG_Qe=V*FEvy16V$oZGl^gXGD04!ui}j7!Q4ho@Xou7W zNL_t(Uy)QVn?RL{+o3jVUV89y>er0RtmdV{Qrr8&mfGU#VO!4bWtFwvphXvG9TZmn zHFX4vj&IRTOIZ3lao?8I*=Jvak49{5tqe${K*DtvC~^t}6vt^pcJlJ{e^_3wDo>#5 z!>gda1b7cHo&QAyMIIsqf}x`rNjYRG5`HAFei4Vv{FrfEctv_7?PynL`b1;7)%F*a zcSnYgF-b*H)WCd=He@fwt;rU8NlgNnHB0M?%dk?rDBr2-7p~xhqUsDCI8zs%VP}kP z05pSC`li|{4MbiLf@!DZezI&6rkLFC@P52!%w7t z2)-1P`}0&kq;Ifp;juXf<*rvlO+grI{W5a`D1S7v1yhv^%Sa)VfBg7wMW&;yc@_Mp=oq2M;EINh0B=h(88t0@nq$<0vGTexw!!ViTDIZS)kZ4Dq!~#^ykOz)F zsgVVR2}p0~@U|nxe-+~Mhh%sOt18vMOw&p7Y<>L#Z0PBr3;kHvkk*Y9XU>rvN#_@N zduOsf2%^FI*iC>c>jESVGrsH!UFak5WVqD%>%U@!k6IX(p0OoZ53EH5e;s*P=Is?w z7birrvaDI@4Oc~$SKnDd;70XD6yG2SMX9A?xsUk=9}9qfe=C-!#SS5ALUmtf9Dh{i z_;r}LSD0HdSqBz!(G5|?cFCRiKW9YgZ}j`lMi2j+h~xK`D#$-X9bguW$jl<;4Js|K zc9yd-?JBm=crJHj?PWEx&T@zDH(p6#_|ugF>FMTHuTNl?Q9M~lzXUy=V5|U70KXCi zp@7GeVeFG?e}g^vyWbS(ANkE*J6`@H-NpQ!A5bj9-u|zkTArWCQSK&J7k^|%D|@61 zsxHzc)!d^<22#-q+5K2b2dfjhB0(Nv66q~akqkt#4#0^nwYJY$yh9a9hj;yI=-HjY znM#PsT}7jQhzVHzT<%wqlSZicBq0j=YbXyx`Qdv~f4wCtsOlyidW~OiaPdf^VH70Y zKawL1<#uw&C#Z9VLl~&N6FNyF1G?Y76U7enRmSyYC6gYF(I=?J#8OVq`#qTS-Hkso zve~lnwwy8(LykFM+R{^VPML1WNB#M=wT(>CG2^yH3mr-2VzY^jVNRfS7!ib*EfJ`!-;OuV126vwD zj?tS6Y(V73ZOWm%z;c%Lp9HD+>nL%$?kC9mg_Wa~XahYH;Vep+Fys)=S5EPRiN{MM90Df#lz)ySBoD4U$Ykm*~ z0g2w0_-Rpn_efHP4$4yYBD#2fh3nbFLsE_Mf~jbG{LV5jijRtFruoyTZxR4jnc;g_ ze^7s{5w)t!&vs$2MWcLQ5caC}E2T-=s^ZIvdX2K!tRqM2giHkk-%Zp7Y$fMeB30cV zYgWi5snO|P7Zqo$(04*hza{kJIP#{$Is}UaOL+RXs5`^Tu4+ksQ|zVZ(`~F7g{R;J zLj;tKnN4S7%WBLl1(C2Ytph<#I;u#He+-p2hDn_=Yt^YOGjM2ugXY$5mL}6d;3tNe^_hED$iZ%ai=^OgR#LutS-ES~+4Q`5}r9zh?fHkG)*TjGU;Hm9RlZlc8Gk)*t< zo^qzaFAxvHC^pilx)}D6q{%Z$nJ8c=i~vs;+JFav|4kWp;I23<;Lby5f0~G1iNB8A za9qdXUPnXL87f7<0pawwsXIva=sFOXdqDv0i3Hq&KQer;e3zkGz_cF0-aJ1!W&6iR z*!!>70Y|`eJqq&7A?qmP*_f5R4pW7W-5B@zjF&0fUU!APgnOG3P_^kKJ*0SKJXtS$sm_+JeJ{NP_)oVdAD|VE^GN^v zrln$3t#(zpDr&0OP5%aye-Wns>?VFrU$&d{O{RQ%6F%2ig~{Gzf2uc`=(jh`b6D1y z;`JtYjp<$XiQ7%6PN`fq1LwSrTD|XCy;D^Ra1Msl-+E;)OtXt$bw^0(nffuIDsy%~ zRDKwk+Z}_gFz??6^J<^wEOy~+bT3#=x1#)F@SlzPb(Wv_wDLEM{5VOEg++p46W9#x zMD_Ykzn5QCloeQ%I1YxC%^ttYEn;F<&L)s#NKaYfm{*?XdS-S-ea-r`s4X&9wG?SO xQ{$qWOP~i$rYZFf9>ahCKa)&iQ4M03C0A_6M7YaX0088Zs$w< Date: Thu, 7 Sep 2023 09:08:51 +0200 Subject: [PATCH 17/18] Add description and installation instruction in Yaml parser files --- .../Parsers/ExchangeAdminAuditLogs.yaml | 26 ++++++++++ .../Parsers/ExchangeConfiguration.yaml | 46 ++++++++++++++++++ .../Parsers/ExchangeEnvironmentList.yaml | 34 ++++++++++++- .../Parsers/ExchangeConfiguration.yaml | 48 ++++++++++++++++++- .../Parsers/ExchangeEnvironmentList.yaml | 32 +++++++++++++ 5 files changed, 184 insertions(+), 2 deletions(-) diff --git a/Solutions/Microsoft Exchange Security - Exchange On-Premises/Parsers/ExchangeAdminAuditLogs.yaml b/Solutions/Microsoft Exchange Security - Exchange On-Premises/Parsers/ExchangeAdminAuditLogs.yaml index 8222b6467ca..fa809222b2f 100644 --- a/Solutions/Microsoft Exchange Security - Exchange On-Premises/Parsers/ExchangeAdminAuditLogs.yaml +++ b/Solutions/Microsoft Exchange Security - Exchange On-Premises/Parsers/ExchangeAdminAuditLogs.yaml @@ -7,6 +7,32 @@ Category: Microsoft Sentinel Parser FunctionName: ExchangeAdminAuditLogs FunctionAlias: ExchangeAdminAuditLogs FunctionQuery: | + // Title: ESI - Exchange Admin Audit Logs Parser + // Author: Microsoft + // Version: 1.0 + // Last Updated: 15/11/2022 + // Comment: + // v1.0 : + // - Function initilisation for Sentinel Solution + // + // DESCRIPTION: + // This parser takes raw Exchange Admin Audit Logs and add elements like ESI Environment, VIP information, sensitive information, etc... + // + // USAGE: + // 1. Open Log Analytics/Microsoft Sentinel Logs blade. Copy the query below and paste into the Logs query window. + // 2. Click the Save button above the query. A pane will appear on the right, select "as Function" from the drop down. Enter the Function Name "ExchangeAdminAuditLogs". + // 3. Function App usually take 10-15 minutes to activate. You can then use Function Alias for other queries + // + // DEPENDENCY: + // This parser is linked to "ExchangeVIP" whatchlist + // + // REFERENCE: + // Using functions in Azure monitor log queries: https://docs.microsoft.com/azure/azure-monitor/log-query/functions + // + // LOG SAMPLES: + // This parser assumes that MS Exchange Management Logs from Exchange Servers Event Logs are collected in Log Analytics. + // + // let cVIPs = _GetWatchlist('ExchangeVIP') | project tostring(canonicalName) ; let sVIPs = _GetWatchlist('ExchangeVIP') | project tostring(sAMAccountName) ; let CmdletCheck = externaldata (Cmdlet:string, UserOriented:string, RestrictToParameter:string, Parameters:string)[h"https://raw.githubusercontent.com/nlepagnez/ESI-PublicContent/main/Operations/Watchlists/CmdletWatchlist.csv"]with(format="csv",ignoreFirstRecord=true); diff --git a/Solutions/Microsoft Exchange Security - Exchange On-Premises/Parsers/ExchangeConfiguration.yaml b/Solutions/Microsoft Exchange Security - Exchange On-Premises/Parsers/ExchangeConfiguration.yaml index 12781036a25..3a7186b57be 100644 --- a/Solutions/Microsoft Exchange Security - Exchange On-Premises/Parsers/ExchangeConfiguration.yaml +++ b/Solutions/Microsoft Exchange Security - Exchange On-Premises/Parsers/ExchangeConfiguration.yaml @@ -24,6 +24,52 @@ FunctionParams: Description: The target environment to query. Valid values are "On-Premises" or "Online". Default is "On-Premises". DefaultValue: 'On-Premises' FunctionQuery: | + // Title: ESI - Exchange Configuration Parser + // Author: Microsoft + // Version: 1.6 + // Last Updated: 13/10/2022 + // Comment: + // v1.6 : + // - Change consumption of Identity_Name_S by IdentityString_s. Requires CollectExchSecIns Script version 7.5.1 minimum + // v1.5 : + // - Change the usage of TimeGenerated instead of EntryDate for filtering BaseRequest. + // - Change alllife duration to 1080 days instead of 90 days. + // v1.4 : + // - Capacity to find all configuration without date limitation with the keyword "alllife" in SpecificConfigurationDate + // v1.3 : + // - Adding fuzzy mode to be able to have only On-Premises or Online tables + // - Simplify the request + // + // DESCRIPTION: + // This parser takes raw ESI Exchange Configuration Collector to pivot raw information and retrieve a specific date configuration. This is the same parser for Exchange On-Premises version and Exchange online version of the solution. + // + // USAGE: + // 1. Open Log Analytics/Microsoft Sentinel Logs blade. Copy the query below and paste into the Logs query window. + // 2. Click the Save button above the query. A pane will appear on the right, select "as Function" from the drop down. Enter the Function Name "ExchangeConfiguration". + // Parameters : 4 parameters to add during creation. + // 1. SpecificSectionList, type string, default value "" + // 2. SpecificConfigurationDate, type string, default value "lastdate" + // 3. Target, type string, default value "On-Premises" + // 4. SpecificConfigurationEnv, type string, default value "All" + // 3. Function App usually take 10-15 minutes to activate. You can then use Function Alias for other queries + // + // + // REFERENCE: + // Using functions in Azure monitor log queries: https://docs.microsoft.com/azure/azure-monitor/log-query/functions + // + // LOG SAMPLES: + // This parser assumes the raw log from the ESI Exchange Collector are on the ESIExchangeConfig_CL and/or ESIExchangeOnlineConfig_CL tables and are uploaded using the builtin REST API uploader of the Collector. + // + // + // Parameters simulation + // If you need to test the parser execution without saving it as a function, uncomment the bellow variable to simulate parameters values. + // + // let SpecificSectionList = ''; + // let SpecificConfigurationDate = 'lastdate'; + // let SpecificConfigurationEnv = 'All'; + // let Target = 'On-Premises'; + // + // Parameters definition let _SpecificSectionList = split(SpecificSectionList,','); let _configurationDate = iff(isnull(SpecificConfigurationDate) or isempty(SpecificConfigurationDate),"lastdate",tostring(SpecificConfigurationDate)); let _configurationEnv = split(iff(isnull(SpecificConfigurationEnv) or isempty(SpecificConfigurationEnv) or tolower(SpecificConfigurationEnv) == "all","All",tostring(SpecificConfigurationEnv)),','); diff --git a/Solutions/Microsoft Exchange Security - Exchange On-Premises/Parsers/ExchangeEnvironmentList.yaml b/Solutions/Microsoft Exchange Security - Exchange On-Premises/Parsers/ExchangeEnvironmentList.yaml index b88423ed75b..4fe2236135a 100644 --- a/Solutions/Microsoft Exchange Security - Exchange On-Premises/Parsers/ExchangeEnvironmentList.yaml +++ b/Solutions/Microsoft Exchange Security - Exchange On-Premises/Parsers/ExchangeEnvironmentList.yaml @@ -1,4 +1,4 @@ -id: 1acab329-1c11-42a7-b5ea-41264947947a +id: fa748dc3-00ee-41cb-b54e-8acd56041b2a Function: Title: Parser for ExchangeEnvironmentList Version: '1.0.0' @@ -12,6 +12,38 @@ FunctionParams: Description: The target environment to query. Valid values are "On-Premises" or "Online". Default is "On-Premises". DefaultValue: 'On-Premises' FunctionQuery: | + // Title: ESI - Exchange Configuration Environment List Generator + // Author: Microsoft + // Version: 1.2 + // Last Updated: 19/09/2022 + // Comment: + // v1.2 : + // - Adding fuzzy mode to be able to have only On-Premises or Online tables + // + // DESCRIPTION: + // This parser takes raw ESI Exchange Configuration Collector to list Exchange Environments that are loaded in the tables. This is the same parser for Exchange On-Premises version and Exchange online version of the solution. + // + // USAGE: + // 1. Open Log Analytics/Microsoft Sentinel Logs blade. Copy the query below and paste into the Logs query window. + // 2. Click the Save button above the query. A pane will appear on the right, select "as Function" from the drop down. Enter the Function Name "ExchangeEnvironmentList". + // Parameters : 1 parameter to add during creation. + // 1. Target, type string, default value "On-Premises" + // 3. Function App usually take 10-15 minutes to activate. You can then use Function Alias for other queries + // + // + // REFERENCE: + // Using functions in Azure monitor log queries: https://docs.microsoft.com/azure/azure-monitor/log-query/functions + // + // LOG SAMPLES: + // This parser assumes the raw log from the ESI Exchange Collector are on the ESIExchangeConfig_CL and/or ESIExchangeOnlineConfig_CL tables and are uploaded using the builtin REST API uploader of the Collector. + // + // + // Parameters simulation + // If you need to test the parser execution without saving it as a function, uncomment the bellow variable to simulate parameters values. + // + // let Target = 'On-Premises'; + // + // Parameters definition let _target = iff(isnull(Target) or isempty(Target),"On-Premises",Target); let ScalarbaseRequest = union isfuzzy=true withsource=TableName ESIAPIExchange*,ESIExchange* | extend Source = iff (TableName contains "Online", "Online", "On-Premises") diff --git a/Solutions/Microsoft Exchange Security - Exchange Online/Parsers/ExchangeConfiguration.yaml b/Solutions/Microsoft Exchange Security - Exchange Online/Parsers/ExchangeConfiguration.yaml index d27dda0a98d..3a7186b57be 100644 --- a/Solutions/Microsoft Exchange Security - Exchange Online/Parsers/ExchangeConfiguration.yaml +++ b/Solutions/Microsoft Exchange Security - Exchange Online/Parsers/ExchangeConfiguration.yaml @@ -1,4 +1,4 @@ -id: f4a39262-f2a9-4799-9ac3-d9cf03942d74 +id: f2ae482d-999c-452e-b108-31880aa99620 Function: Title: Parser for ExchangeConfiguration Version: '1.0.0' @@ -24,6 +24,52 @@ FunctionParams: Description: The target environment to query. Valid values are "On-Premises" or "Online". Default is "On-Premises". DefaultValue: 'On-Premises' FunctionQuery: | + // Title: ESI - Exchange Configuration Parser + // Author: Microsoft + // Version: 1.6 + // Last Updated: 13/10/2022 + // Comment: + // v1.6 : + // - Change consumption of Identity_Name_S by IdentityString_s. Requires CollectExchSecIns Script version 7.5.1 minimum + // v1.5 : + // - Change the usage of TimeGenerated instead of EntryDate for filtering BaseRequest. + // - Change alllife duration to 1080 days instead of 90 days. + // v1.4 : + // - Capacity to find all configuration without date limitation with the keyword "alllife" in SpecificConfigurationDate + // v1.3 : + // - Adding fuzzy mode to be able to have only On-Premises or Online tables + // - Simplify the request + // + // DESCRIPTION: + // This parser takes raw ESI Exchange Configuration Collector to pivot raw information and retrieve a specific date configuration. This is the same parser for Exchange On-Premises version and Exchange online version of the solution. + // + // USAGE: + // 1. Open Log Analytics/Microsoft Sentinel Logs blade. Copy the query below and paste into the Logs query window. + // 2. Click the Save button above the query. A pane will appear on the right, select "as Function" from the drop down. Enter the Function Name "ExchangeConfiguration". + // Parameters : 4 parameters to add during creation. + // 1. SpecificSectionList, type string, default value "" + // 2. SpecificConfigurationDate, type string, default value "lastdate" + // 3. Target, type string, default value "On-Premises" + // 4. SpecificConfigurationEnv, type string, default value "All" + // 3. Function App usually take 10-15 minutes to activate. You can then use Function Alias for other queries + // + // + // REFERENCE: + // Using functions in Azure monitor log queries: https://docs.microsoft.com/azure/azure-monitor/log-query/functions + // + // LOG SAMPLES: + // This parser assumes the raw log from the ESI Exchange Collector are on the ESIExchangeConfig_CL and/or ESIExchangeOnlineConfig_CL tables and are uploaded using the builtin REST API uploader of the Collector. + // + // + // Parameters simulation + // If you need to test the parser execution without saving it as a function, uncomment the bellow variable to simulate parameters values. + // + // let SpecificSectionList = ''; + // let SpecificConfigurationDate = 'lastdate'; + // let SpecificConfigurationEnv = 'All'; + // let Target = 'On-Premises'; + // + // Parameters definition let _SpecificSectionList = split(SpecificSectionList,','); let _configurationDate = iff(isnull(SpecificConfigurationDate) or isempty(SpecificConfigurationDate),"lastdate",tostring(SpecificConfigurationDate)); let _configurationEnv = split(iff(isnull(SpecificConfigurationEnv) or isempty(SpecificConfigurationEnv) or tolower(SpecificConfigurationEnv) == "all","All",tostring(SpecificConfigurationEnv)),','); diff --git a/Solutions/Microsoft Exchange Security - Exchange Online/Parsers/ExchangeEnvironmentList.yaml b/Solutions/Microsoft Exchange Security - Exchange Online/Parsers/ExchangeEnvironmentList.yaml index 6c58f1cd898..4fe2236135a 100644 --- a/Solutions/Microsoft Exchange Security - Exchange Online/Parsers/ExchangeEnvironmentList.yaml +++ b/Solutions/Microsoft Exchange Security - Exchange Online/Parsers/ExchangeEnvironmentList.yaml @@ -12,6 +12,38 @@ FunctionParams: Description: The target environment to query. Valid values are "On-Premises" or "Online". Default is "On-Premises". DefaultValue: 'On-Premises' FunctionQuery: | + // Title: ESI - Exchange Configuration Environment List Generator + // Author: Microsoft + // Version: 1.2 + // Last Updated: 19/09/2022 + // Comment: + // v1.2 : + // - Adding fuzzy mode to be able to have only On-Premises or Online tables + // + // DESCRIPTION: + // This parser takes raw ESI Exchange Configuration Collector to list Exchange Environments that are loaded in the tables. This is the same parser for Exchange On-Premises version and Exchange online version of the solution. + // + // USAGE: + // 1. Open Log Analytics/Microsoft Sentinel Logs blade. Copy the query below and paste into the Logs query window. + // 2. Click the Save button above the query. A pane will appear on the right, select "as Function" from the drop down. Enter the Function Name "ExchangeEnvironmentList". + // Parameters : 1 parameter to add during creation. + // 1. Target, type string, default value "On-Premises" + // 3. Function App usually take 10-15 minutes to activate. You can then use Function Alias for other queries + // + // + // REFERENCE: + // Using functions in Azure monitor log queries: https://docs.microsoft.com/azure/azure-monitor/log-query/functions + // + // LOG SAMPLES: + // This parser assumes the raw log from the ESI Exchange Collector are on the ESIExchangeConfig_CL and/or ESIExchangeOnlineConfig_CL tables and are uploaded using the builtin REST API uploader of the Collector. + // + // + // Parameters simulation + // If you need to test the parser execution without saving it as a function, uncomment the bellow variable to simulate parameters values. + // + // let Target = 'On-Premises'; + // + // Parameters definition let _target = iff(isnull(Target) or isempty(Target),"On-Premises",Target); let ScalarbaseRequest = union isfuzzy=true withsource=TableName ESIAPIExchange*,ESIExchange* | extend Source = iff (TableName contains "Online", "Online", "On-Premises") From b5df20badebbbd083dae1b9bf4ca86ae092bccf7 Mon Sep 17 00:00:00 2001 From: nlepagnez Date: Thu, 7 Sep 2023 12:20:21 +0200 Subject: [PATCH 18/18] Requested by Microsoft Sentinel team, move back to the old version of parsers by removing comments. --- .../Parsers/ExchangeAdminAuditLogs.yaml | 26 ----------- .../Parsers/ExchangeConfiguration.yaml | 45 ------------------- .../Parsers/ExchangeEnvironmentList.yaml | 31 ------------- .../Parsers/ExchangeConfiguration.yaml | 45 ------------------- .../Parsers/ExchangeEnvironmentList.yaml | 31 ------------- 5 files changed, 178 deletions(-) diff --git a/Solutions/Microsoft Exchange Security - Exchange On-Premises/Parsers/ExchangeAdminAuditLogs.yaml b/Solutions/Microsoft Exchange Security - Exchange On-Premises/Parsers/ExchangeAdminAuditLogs.yaml index fa809222b2f..8222b6467ca 100644 --- a/Solutions/Microsoft Exchange Security - Exchange On-Premises/Parsers/ExchangeAdminAuditLogs.yaml +++ b/Solutions/Microsoft Exchange Security - Exchange On-Premises/Parsers/ExchangeAdminAuditLogs.yaml @@ -7,32 +7,6 @@ Category: Microsoft Sentinel Parser FunctionName: ExchangeAdminAuditLogs FunctionAlias: ExchangeAdminAuditLogs FunctionQuery: | - // Title: ESI - Exchange Admin Audit Logs Parser - // Author: Microsoft - // Version: 1.0 - // Last Updated: 15/11/2022 - // Comment: - // v1.0 : - // - Function initilisation for Sentinel Solution - // - // DESCRIPTION: - // This parser takes raw Exchange Admin Audit Logs and add elements like ESI Environment, VIP information, sensitive information, etc... - // - // USAGE: - // 1. Open Log Analytics/Microsoft Sentinel Logs blade. Copy the query below and paste into the Logs query window. - // 2. Click the Save button above the query. A pane will appear on the right, select "as Function" from the drop down. Enter the Function Name "ExchangeAdminAuditLogs". - // 3. Function App usually take 10-15 minutes to activate. You can then use Function Alias for other queries - // - // DEPENDENCY: - // This parser is linked to "ExchangeVIP" whatchlist - // - // REFERENCE: - // Using functions in Azure monitor log queries: https://docs.microsoft.com/azure/azure-monitor/log-query/functions - // - // LOG SAMPLES: - // This parser assumes that MS Exchange Management Logs from Exchange Servers Event Logs are collected in Log Analytics. - // - // let cVIPs = _GetWatchlist('ExchangeVIP') | project tostring(canonicalName) ; let sVIPs = _GetWatchlist('ExchangeVIP') | project tostring(sAMAccountName) ; let CmdletCheck = externaldata (Cmdlet:string, UserOriented:string, RestrictToParameter:string, Parameters:string)[h"https://raw.githubusercontent.com/nlepagnez/ESI-PublicContent/main/Operations/Watchlists/CmdletWatchlist.csv"]with(format="csv",ignoreFirstRecord=true); diff --git a/Solutions/Microsoft Exchange Security - Exchange On-Premises/Parsers/ExchangeConfiguration.yaml b/Solutions/Microsoft Exchange Security - Exchange On-Premises/Parsers/ExchangeConfiguration.yaml index 3a7186b57be..37d0526c648 100644 --- a/Solutions/Microsoft Exchange Security - Exchange On-Premises/Parsers/ExchangeConfiguration.yaml +++ b/Solutions/Microsoft Exchange Security - Exchange On-Premises/Parsers/ExchangeConfiguration.yaml @@ -24,51 +24,6 @@ FunctionParams: Description: The target environment to query. Valid values are "On-Premises" or "Online". Default is "On-Premises". DefaultValue: 'On-Premises' FunctionQuery: | - // Title: ESI - Exchange Configuration Parser - // Author: Microsoft - // Version: 1.6 - // Last Updated: 13/10/2022 - // Comment: - // v1.6 : - // - Change consumption of Identity_Name_S by IdentityString_s. Requires CollectExchSecIns Script version 7.5.1 minimum - // v1.5 : - // - Change the usage of TimeGenerated instead of EntryDate for filtering BaseRequest. - // - Change alllife duration to 1080 days instead of 90 days. - // v1.4 : - // - Capacity to find all configuration without date limitation with the keyword "alllife" in SpecificConfigurationDate - // v1.3 : - // - Adding fuzzy mode to be able to have only On-Premises or Online tables - // - Simplify the request - // - // DESCRIPTION: - // This parser takes raw ESI Exchange Configuration Collector to pivot raw information and retrieve a specific date configuration. This is the same parser for Exchange On-Premises version and Exchange online version of the solution. - // - // USAGE: - // 1. Open Log Analytics/Microsoft Sentinel Logs blade. Copy the query below and paste into the Logs query window. - // 2. Click the Save button above the query. A pane will appear on the right, select "as Function" from the drop down. Enter the Function Name "ExchangeConfiguration". - // Parameters : 4 parameters to add during creation. - // 1. SpecificSectionList, type string, default value "" - // 2. SpecificConfigurationDate, type string, default value "lastdate" - // 3. Target, type string, default value "On-Premises" - // 4. SpecificConfigurationEnv, type string, default value "All" - // 3. Function App usually take 10-15 minutes to activate. You can then use Function Alias for other queries - // - // - // REFERENCE: - // Using functions in Azure monitor log queries: https://docs.microsoft.com/azure/azure-monitor/log-query/functions - // - // LOG SAMPLES: - // This parser assumes the raw log from the ESI Exchange Collector are on the ESIExchangeConfig_CL and/or ESIExchangeOnlineConfig_CL tables and are uploaded using the builtin REST API uploader of the Collector. - // - // - // Parameters simulation - // If you need to test the parser execution without saving it as a function, uncomment the bellow variable to simulate parameters values. - // - // let SpecificSectionList = ''; - // let SpecificConfigurationDate = 'lastdate'; - // let SpecificConfigurationEnv = 'All'; - // let Target = 'On-Premises'; - // // Parameters definition let _SpecificSectionList = split(SpecificSectionList,','); let _configurationDate = iff(isnull(SpecificConfigurationDate) or isempty(SpecificConfigurationDate),"lastdate",tostring(SpecificConfigurationDate)); diff --git a/Solutions/Microsoft Exchange Security - Exchange On-Premises/Parsers/ExchangeEnvironmentList.yaml b/Solutions/Microsoft Exchange Security - Exchange On-Premises/Parsers/ExchangeEnvironmentList.yaml index 4fe2236135a..76bab8257d3 100644 --- a/Solutions/Microsoft Exchange Security - Exchange On-Premises/Parsers/ExchangeEnvironmentList.yaml +++ b/Solutions/Microsoft Exchange Security - Exchange On-Premises/Parsers/ExchangeEnvironmentList.yaml @@ -12,37 +12,6 @@ FunctionParams: Description: The target environment to query. Valid values are "On-Premises" or "Online". Default is "On-Premises". DefaultValue: 'On-Premises' FunctionQuery: | - // Title: ESI - Exchange Configuration Environment List Generator - // Author: Microsoft - // Version: 1.2 - // Last Updated: 19/09/2022 - // Comment: - // v1.2 : - // - Adding fuzzy mode to be able to have only On-Premises or Online tables - // - // DESCRIPTION: - // This parser takes raw ESI Exchange Configuration Collector to list Exchange Environments that are loaded in the tables. This is the same parser for Exchange On-Premises version and Exchange online version of the solution. - // - // USAGE: - // 1. Open Log Analytics/Microsoft Sentinel Logs blade. Copy the query below and paste into the Logs query window. - // 2. Click the Save button above the query. A pane will appear on the right, select "as Function" from the drop down. Enter the Function Name "ExchangeEnvironmentList". - // Parameters : 1 parameter to add during creation. - // 1. Target, type string, default value "On-Premises" - // 3. Function App usually take 10-15 minutes to activate. You can then use Function Alias for other queries - // - // - // REFERENCE: - // Using functions in Azure monitor log queries: https://docs.microsoft.com/azure/azure-monitor/log-query/functions - // - // LOG SAMPLES: - // This parser assumes the raw log from the ESI Exchange Collector are on the ESIExchangeConfig_CL and/or ESIExchangeOnlineConfig_CL tables and are uploaded using the builtin REST API uploader of the Collector. - // - // - // Parameters simulation - // If you need to test the parser execution without saving it as a function, uncomment the bellow variable to simulate parameters values. - // - // let Target = 'On-Premises'; - // // Parameters definition let _target = iff(isnull(Target) or isempty(Target),"On-Premises",Target); let ScalarbaseRequest = union isfuzzy=true withsource=TableName ESIAPIExchange*,ESIExchange* diff --git a/Solutions/Microsoft Exchange Security - Exchange Online/Parsers/ExchangeConfiguration.yaml b/Solutions/Microsoft Exchange Security - Exchange Online/Parsers/ExchangeConfiguration.yaml index 3a7186b57be..37d0526c648 100644 --- a/Solutions/Microsoft Exchange Security - Exchange Online/Parsers/ExchangeConfiguration.yaml +++ b/Solutions/Microsoft Exchange Security - Exchange Online/Parsers/ExchangeConfiguration.yaml @@ -24,51 +24,6 @@ FunctionParams: Description: The target environment to query. Valid values are "On-Premises" or "Online". Default is "On-Premises". DefaultValue: 'On-Premises' FunctionQuery: | - // Title: ESI - Exchange Configuration Parser - // Author: Microsoft - // Version: 1.6 - // Last Updated: 13/10/2022 - // Comment: - // v1.6 : - // - Change consumption of Identity_Name_S by IdentityString_s. Requires CollectExchSecIns Script version 7.5.1 minimum - // v1.5 : - // - Change the usage of TimeGenerated instead of EntryDate for filtering BaseRequest. - // - Change alllife duration to 1080 days instead of 90 days. - // v1.4 : - // - Capacity to find all configuration without date limitation with the keyword "alllife" in SpecificConfigurationDate - // v1.3 : - // - Adding fuzzy mode to be able to have only On-Premises or Online tables - // - Simplify the request - // - // DESCRIPTION: - // This parser takes raw ESI Exchange Configuration Collector to pivot raw information and retrieve a specific date configuration. This is the same parser for Exchange On-Premises version and Exchange online version of the solution. - // - // USAGE: - // 1. Open Log Analytics/Microsoft Sentinel Logs blade. Copy the query below and paste into the Logs query window. - // 2. Click the Save button above the query. A pane will appear on the right, select "as Function" from the drop down. Enter the Function Name "ExchangeConfiguration". - // Parameters : 4 parameters to add during creation. - // 1. SpecificSectionList, type string, default value "" - // 2. SpecificConfigurationDate, type string, default value "lastdate" - // 3. Target, type string, default value "On-Premises" - // 4. SpecificConfigurationEnv, type string, default value "All" - // 3. Function App usually take 10-15 minutes to activate. You can then use Function Alias for other queries - // - // - // REFERENCE: - // Using functions in Azure monitor log queries: https://docs.microsoft.com/azure/azure-monitor/log-query/functions - // - // LOG SAMPLES: - // This parser assumes the raw log from the ESI Exchange Collector are on the ESIExchangeConfig_CL and/or ESIExchangeOnlineConfig_CL tables and are uploaded using the builtin REST API uploader of the Collector. - // - // - // Parameters simulation - // If you need to test the parser execution without saving it as a function, uncomment the bellow variable to simulate parameters values. - // - // let SpecificSectionList = ''; - // let SpecificConfigurationDate = 'lastdate'; - // let SpecificConfigurationEnv = 'All'; - // let Target = 'On-Premises'; - // // Parameters definition let _SpecificSectionList = split(SpecificSectionList,','); let _configurationDate = iff(isnull(SpecificConfigurationDate) or isempty(SpecificConfigurationDate),"lastdate",tostring(SpecificConfigurationDate)); diff --git a/Solutions/Microsoft Exchange Security - Exchange Online/Parsers/ExchangeEnvironmentList.yaml b/Solutions/Microsoft Exchange Security - Exchange Online/Parsers/ExchangeEnvironmentList.yaml index 4fe2236135a..76bab8257d3 100644 --- a/Solutions/Microsoft Exchange Security - Exchange Online/Parsers/ExchangeEnvironmentList.yaml +++ b/Solutions/Microsoft Exchange Security - Exchange Online/Parsers/ExchangeEnvironmentList.yaml @@ -12,37 +12,6 @@ FunctionParams: Description: The target environment to query. Valid values are "On-Premises" or "Online". Default is "On-Premises". DefaultValue: 'On-Premises' FunctionQuery: | - // Title: ESI - Exchange Configuration Environment List Generator - // Author: Microsoft - // Version: 1.2 - // Last Updated: 19/09/2022 - // Comment: - // v1.2 : - // - Adding fuzzy mode to be able to have only On-Premises or Online tables - // - // DESCRIPTION: - // This parser takes raw ESI Exchange Configuration Collector to list Exchange Environments that are loaded in the tables. This is the same parser for Exchange On-Premises version and Exchange online version of the solution. - // - // USAGE: - // 1. Open Log Analytics/Microsoft Sentinel Logs blade. Copy the query below and paste into the Logs query window. - // 2. Click the Save button above the query. A pane will appear on the right, select "as Function" from the drop down. Enter the Function Name "ExchangeEnvironmentList". - // Parameters : 1 parameter to add during creation. - // 1. Target, type string, default value "On-Premises" - // 3. Function App usually take 10-15 minutes to activate. You can then use Function Alias for other queries - // - // - // REFERENCE: - // Using functions in Azure monitor log queries: https://docs.microsoft.com/azure/azure-monitor/log-query/functions - // - // LOG SAMPLES: - // This parser assumes the raw log from the ESI Exchange Collector are on the ESIExchangeConfig_CL and/or ESIExchangeOnlineConfig_CL tables and are uploaded using the builtin REST API uploader of the Collector. - // - // - // Parameters simulation - // If you need to test the parser execution without saving it as a function, uncomment the bellow variable to simulate parameters values. - // - // let Target = 'On-Premises'; - // // Parameters definition let _target = iff(isnull(Target) or isempty(Target),"On-Premises",Target); let ScalarbaseRequest = union isfuzzy=true withsource=TableName ESIAPIExchange*,ESIExchange*