Obs/bin/ObsDep/content/Powershell/Common/SecurityHelpers.psm1

<###################################################
 # #
 # Copyright (c) Microsoft. All rights reserved. #
 # #
 ##################################################>


Import-Module $PSScriptRoot\Tracer.psm1

<#
 .Synopsis
  Returns deployment configuration setting: Cloud.PublicInfo.SecuritySetting.SecureBoot.EnforceOnAllInfraVms
  Default value is $false
#>

function Get-DisableSecureBootOnInfraVms
{
    Param
    (
        [Parameter(Mandatory = $true)]
        [CloudEngine.Configurations.EceInterfaceParameters]
        $Parameters
    )

    $ErrorActionPreference = 'Stop'

    $cloudRolePublicInfo = $Parameters.Roles["Cloud"].PublicConfiguration.PublicInfo

    if($cloudRolePublicInfo.SecuritySetting)
    {
        if($cloudRolePublicInfo.SecuritySetting.SecureBoot)
        {
            $DisableSecureBootOnInfraVms = $cloudRolePublicInfo.SecuritySetting.SecureBoot.GetAttribute("DisableSecureBootOnInfraVms")
            return $DisableSecureBootOnInfraVms -eq "True"
        }
    }

    return $false
}


function Clear-SecurityItem
{
    [CmdletBinding()]
    param (
        [Parameter(Mandatory = $true)]
        [CloudEngine.Configurations.EceInterfaceParameters]
        $Parameters,

        [Parameter(Mandatory = $false)]
        [string]
        $ClusterName
    )

    Import-Module $PSScriptRoot\..\Roles\Common\DscHelper.psm1 -DisableNameChecking

    $clusterNames = @($ClusterName)
    if ([System.string]::IsNullOrEmpty($ClusterName))
    {
        $clusterNames = Get-ClusterNames $Parameters
    }

    Trace-Execution "Clearing security items on: $($clusterNames -join ', ')"
    $domainAdminUser = $Parameters.Roles["Cloud"].PublicConfiguration.PublicInfo.SecurityInfo.DomainUsers.User | Where-Object Role -EQ "DomainAdmin"
    $domainAdminCredential = $Parameters.GetCredential($domainAdminUser.Credential)
    $domainAdminName = $domainAdminCredential.GetNetworkCredential().UserName
    $domainAdminPassword = $domainAdminCredential.GetNetworkCredential().Password
    $domainFqdn = $Parameters.Roles["Domain"].PublicConfiguration.PublicInfo.DomainConfiguration.FQDN
    $domainCredential = New-Credential -UserName "$domainFqdn\$domainAdminName" -Password $domainAdminPassword
    $virtualMachinesRole = $Parameters.Roles["VirtualMachines"].PublicConfiguration
    $clusterRole = $Parameters.Roles["Cluster"].PublicConfiguration

    foreach ($clusterName in $clusterNames)
    {
        $physicalHosts = Get-ActiveClusterNodes -Parameters $Parameters -ClusterName $clusterName
        foreach($physicalHost in $physicalHosts)
        {
            $session = New-PSSession "$physicalHost.$domainFqdn" -Credential $domainCredential
            Set-SecurityOnHost -Session $session -IsOneNode:$($physicalHosts.Count -eq 1)
            $session | Remove-PSSession -ErrorAction SilentlyContinue
        }

        $clusterId = ($clusterRole.Clusters.Node | ? Name -eq $clusterName).Id
        $guestVmNames = $Parameters.Roles["VirtualMachines"].PublicConfiguration.Nodes.Node | where { $_.ProvisioningStatus -eq "Complete" -and $_.RefClusterId -eq $clusterId } | Select-Object -ExpandProperty Name
        foreach($guestVmName in $guestVmNames)
        {
            $vmSession = New-PSSession "$guestVmName.$domainFqdn" -Credential $domainCredential
            Set-SecurityOnVm -Session $vmSession
            $vmSession | Remove-PSSession -ErrorAction SilentlyContinue
        }
    }

    $ercsVmNames = $Parameters.Roles["SeedRing"].PublicConfiguration.Nodes.Node | Foreach-Object Name
    $activeErcsVmNames = $virtualMachinesRole.Nodes.Node | where { $_.Name -in $ercsVmNames } `
                          | where { $_.ProvisioningStatus -eq 'Complete' } | Foreach-Object Name

    Revoke-CompleteBootDSCShareAccess -ComputerName $activeErcsVmNames -Parameters $Parameters
}


function Set-SecurityOnHost
{
    [CmdletBinding()]
    param(
        [Parameter(Mandatory = $true)]
        [System.Management.Automation.Runspaces.PSSession]
        $Session,

        [Parameter(Mandatory = $true)]
        [switch]
        $isOneNode
    )

    if ($Session)
    {
        $computerName = $Session.ComputerName
        Trace-Execution "Applying security actions on: $computerName"

        Trace-Execution "Deleting not needed files on: $computerName"
        Invoke-Command -Session $Session -ScriptBlock {Remove-Item -Path "$env:windir\Panther\unattend.xml" -Force -ErrorAction SilentlyContinue} -ErrorAction SilentlyContinue
        Invoke-Command -Session $Session -ScriptBlock {Remove-Item -Path "$env:windir\Panther\Unattend\unattend.xml" -Force -ErrorAction SilentlyContinue} -ErrorAction SilentlyContinue

        Trace-Execution "Removing unnecessary registry keys from: $computerName"
        Invoke-Command -Session $Session -ScriptBlock {Remove-ItemProperty -Name DefaultUserName   -path 'HKLM:\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon' -ErrorAction SilentlyContinue} -ErrorAction SilentlyContinue
        Invoke-Command -Session $Session -ScriptBlock {Remove-ItemProperty -Name DefaultPassword   -path 'HKLM:\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon' -ErrorAction SilentlyContinue} -ErrorAction SilentlyContinue
        Invoke-Command -Session $Session -ScriptBlock {Remove-ItemProperty -Name DefaultDomainName -path 'HKLM:\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon' -ErrorAction SilentlyContinue} -ErrorAction SilentlyContinue
        Invoke-Command -Session $Session -ScriptBlock {Set-ItemProperty    -Name AutoAdminLogon    -Path 'HKLM:\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon'  -Value 0 -Force -ErrorAction SilentlyContinue} -ErrorAction SilentlyContinue
        Invoke-Command -Session $Session -ScriptBlock {Set-ItemProperty    -Name ForceAutoLogon    -Path 'HKLM:\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon'  -Value 0 -Force -ErrorAction SilentlyContinue} -ErrorAction SilentlyContinue
        Invoke-Command -Session $Session -ScriptBlock {Set-ItemProperty    -Name AutoLogonCount    -Path 'HKLM:\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon'  -Value 0 -Force -ErrorAction SilentlyContinue} -ErrorAction SilentlyContinue

        $exists = Invoke-Command -Session $Session -ScriptBlock { Test-Path -Path "$env:windir\Panther\unattend.xml" } -ErrorAction SilentlyContinue
        if ($exists)
        {
            Trace-Warning "Unable to delete not needed file from panther first location for $computerName"
        }

        $exists = Invoke-Command -Session $Session -ScriptBlock { Test-Path -Path "$env:windir\Panther\Unattend\unattend.xml" } -ErrorAction SilentlyContinue
        if ($exists)
        {
            Trace-Warning "Unable to delete not needed file from panther second location for $computerName"
        }

        # If this is a one node, do not disable administrator/rename on host. Host is the same as DVM
        if (-not $isOneNode)
        {
            Disable-LocalAdmins -Session $Session
            Set-BuildinUsers -Session $Session
        }
    }
}

function Set-SecurityOnVm
{
    [CmdletBinding()]
    param(
        [Parameter(Mandatory = $true)]
        [System.Management.Automation.Runspaces.PSSession]
        $Session
    )

    if ($Session)
    {
        $computerName = $Session.ComputerName
        Trace-Execution "Applying security actions on: $computerName"

        Trace-Execution "Deleting not needed files on: $computerName"
        Invoke-Command -Session $Session -ScriptBlock {Remove-Item -Path "$env:SystemDrive\unattend.xml" -Force -ErrorAction SilentlyContinue} -ErrorAction SilentlyContinue
        Invoke-Command -Session $Session -ScriptBlock {Remove-Item -Path "$env:windir\Panther\unattend.xml" -Force -ErrorAction SilentlyContinue} -ErrorAction SilentlyContinue

        Trace-Execution "Removing unnecessary registry keys from: $computerName"
        Invoke-Command -Session $Session -ScriptBlock {Remove-ItemProperty -Name DefaultUserName   -path 'HKLM:\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon' -ErrorAction SilentlyContinue} -ErrorAction SilentlyContinue
        Invoke-Command -Session $Session -ScriptBlock {Remove-ItemProperty -Name DefaultPassword   -path 'HKLM:\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon' -ErrorAction SilentlyContinue} -ErrorAction SilentlyContinue
        Invoke-Command -Session $Session -ScriptBlock {Remove-ItemProperty -Name DefaultDomainName -path 'HKLM:\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon' -ErrorAction SilentlyContinue} -ErrorAction SilentlyContinue
        Invoke-Command -Session $Session -ScriptBlock {Set-ItemProperty    -Name AutoAdminLogon    -Path 'HKLM:\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon'  -Value 0 -Force -ErrorAction SilentlyContinue} -ErrorAction SilentlyContinue
        Invoke-Command -Session $Session -ScriptBlock {Set-ItemProperty    -Name ForceAutoLogon    -Path 'HKLM:\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon'  -Value 0 -Force -ErrorAction SilentlyContinue} -ErrorAction SilentlyContinue
        Invoke-Command -Session $Session -ScriptBlock {Set-ItemProperty    -Name AutoLogonCount    -Path 'HKLM:\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon'  -Value 0 -Force -ErrorAction SilentlyContinue} -ErrorAction SilentlyContinue

        $exists = Invoke-Command -Session $Session -ScriptBlock {Test-Path -Path "$env:SystemDrive\unattend.xml"} -ErrorAction SilentlyContinue
        if ($exists)
        {
            Trace-Warning "Unable to delete not needed file from system drive for $computerName"
        }

        $exists = Invoke-Command -Session $Session -ScriptBlock {Test-Path -Path "$env:windir\Panther\unattend.xml"} -ErrorAction SilentlyContinue
        if ($exists)
        {
            Trace-Warning "Unable to delete not needed file from panther location for $computerName"
        }

        Disable-LocalAdmins -Session $Session
        Set-BuildinUsers -Session $Session
    }
}


function Disable-LocalAdmins
{
    [CmdletBinding()]
    param(
        [System.Management.Automation.Runspaces.PSSession]
        $Session
    )

    Trace-Execution "Disabling local administrators on: $($Session.ComputerName)"

    $localAdmins = $null
    $localAdmins = Invoke-Command -Session $Session -ScriptBlock {(((Get-LocalGroupMember -SID "S-1-5-32-544") | ? {$_.PrincipalSource -eq "Local" -and $_.ObjectClass -eq "User"}).Name) | % {$_.split("\")[1]}} -ErrorAction SilentlyContinue
    if ($localAdmins)
    {
        Invoke-Command -Session $Session -ScriptBlock {Disable-LocalUser -Name $using:localAdmins -ErrorAction SilentlyContinue} -ErrorAction SilentlyContinue
        $adminsObjects = Invoke-Command -Session $Session -ScriptBlock {Get-LocalUser -Name $using:localAdmins -ErrorAction SilentlyContinue} -ErrorAction SilentlyContinue
        if ($true -in $adminsObjects.Enabled)
        {
            Trace-Warning "One or more local administrators are still enabled on: $($Session.ComputerName)"
        }
        else
        {
            Trace-Execution "Successfully force disabled local administrators on: $($Session.ComputerName)"
        }
    }
}

function Set-BuildinUsers
{
    [CmdletBinding()]
    param(
        [System.Management.Automation.Runspaces.PSSession]
        $Session
    )

    Trace-Execution "Disabling and renaming specific built-in users $($Session.ComputerName)"

    # Start with local built-in Administrator
    $builtinAdmin = Invoke-Command -Session $Session -ScriptBlock { Get-LocalUser |? {$_.SID -like "S-1-5-21-*-500"} }
    if ($builtinAdmin)
    {
        Invoke-Command -Session $Session -ScriptBlock {Rename-LocalUser -SID $using:builtinAdmin.SID -NewName LMASAdmin -ErrorAction SilentlyContinue} -ErrorAction SilentlyContinue
        Invoke-Command -Session $Session -ScriptBlock {Disable-LocalUser -SID $using:builtinAdmin.SID -ErrorAction SilentlyContinue} -ErrorAction SilentlyContinue
    }

    # built-in Guest
    $builtinGuest = Invoke-Command -Session $Session -ScriptBlock { Get-LocalUser |? {$_.SID -like "S-1-5-21-*-501"} }
    if ($builtinGuest)
    {
        Invoke-Command -Session $Session -ScriptBlock {Rename-LocalUser -SID $using:builtinGuest.SID -NewName LMASGuest -ErrorAction SilentlyContinue} -ErrorAction SilentlyContinue
        Invoke-Command -Session $Session -ScriptBlock {Disable-LocalUser -SID $using:builtinGuest.SID -ErrorAction SilentlyContinue} -ErrorAction SilentlyContinue
    }

    # built-in Guest
    $builtinDefaultAccount = Invoke-Command -Session $Session -ScriptBlock { Get-LocalUser |? {$_.SID -like "S-1-5-21-*-503"} }
    if ($builtinDefaultAccount)
    {
        Invoke-Command -Session $Session -ScriptBlock {Rename-LocalUser -SID $using:builtinDefaultAccount.SID -NewName LMASDefaultAccount -ErrorAction SilentlyContinue} -ErrorAction SilentlyContinue
        Invoke-Command -Session $Session -ScriptBlock {Disable-LocalUser -SID $using:builtinDefaultAccount.SID -ErrorAction SilentlyContinue} -ErrorAction SilentlyContinue
    }
}

function Set-AzsSecurityParam
{
    [CmdletBinding()]
    param()

    $ErrorActionPreference = "Stop"

    Trace-Execution "Creating/Updating AzsSecurity parameters"
    try
    {
        $eceImported = $false

        try
        {
            Trace-Execution "Trying: Import-Module -Name ECEClient"
            Import-Module -Name ECEClient -Verbose:$false -DisableNameChecking
            $eceImported = $true
        }
        catch
        {
            Trace-Execution "Failed Import-Module -Name ECEClient. Exception: $($_.Exception)"
        }

        if ($eceImported -eq $false)
        {
            try
            {
                Trace-Execution "Trying: Import-Module PSScriptRoot\..\ECEngine\EnterpriseCloudEngine.psd1"
                Trace-Execution "Trying: Import-Module PSScriptRoot\..\ECEServiceClient\ECEClient.psm1"
                Import-Module $PSScriptRoot\..\ECEngine\EnterpriseCloudEngine.psd1 -Force -DisableNameChecking
                Import-Module $PSScriptRoot\..\ECEServiceClient\ECEClient.psm1 -Force -DisableNameChecking
                $eceImported = $true
            }
            catch
            {
                Trace-Execution "Failed Import-Module ECEngine\EnterpriseCloudEngine.psd1 and ECEServiceClient\ECEClient.psm1. Exception $($_.Exception)"
            }
        }

        if ($eceImported -eq $false)
        {
            throw "Failed to import modules for ECE. Unable to check and/or modify required AzsSecurity AzureStackHardened, SkipSEDProtection and AzureStackEnhancedEncryptionMethod parameters"
        }

        $updateECEXml = $false
        $azsSecCategory = $null
        $azsHardenedParam = $null
        $skipSEDProtectParam = $null
        $azsEnhancedEncryptionMethodParam = $null

        $eceClient = Create-ECEClientWithApplicationGateway
        $eceXml = [XML]($eceClient.GetCloudParameters().getAwaiter().GetResult().CloudDefinitionAsXmlString)

        Trace-Execution "Check if AzsSecurity node exists in ECE xml"
        $azsSecCategory = $eceXml.SelectSingleNode("//Category[@Name='AzsSecurity']")
        if ($null -eq $azsSecCategory)
        {
            Trace-Execution "AzsSecurity node does not exist in ECE xml. Creating AzsSecurity node"
            $azsSecCategory = $ecexml.CreateElement("Category")
            $azsSecCategory.SetAttribute("Name", "AzsSecurity")
            $eceXml.SelectSingleNode("Parameters").AppendChild($azsSecCategory) | Out-Null
            $updateECEXml = $true
        }

        Trace-Execution "Check if AzureStackHardened parameter node exists in ECE xml"
        $azsHardenedParam = $eceXml.SelectSingleNode("//Parameter[@Name='AzureStackHardened']")
        if ($null -eq $azsHardenedParam)
        {
            Trace-Execution "AzureStackHardened parameter node does not exist in ECE xml. Creating AzureStackHardened parameter node"
            $azsHardenedParam = $eceXml.CreateElement("Parameter")
            $azsHardenedParam.SetAttribute("Name", "AzureStackHardened")
            $azsHardenedParam.SetAttribute("Type", "string")
            $azsHardenedParam.SetAttribute("Value", "Disabled")
            $azsHardenedParam.SetAttribute("AllowedValues", "")
            $azsHardenedParam.SetAttribute("Reference", "[{AzureStackHardened}]")
            $azsSecCategory.AppendChild($azsHardenedParam) | Out-Null
            $updateECEXml = $true
        }

        Trace-Execution "Get AzureStackHardened parameter value from ECE xml"
        $azsHardenedParamValue = $azsHardenedParam.Value
        Trace-Execution "AzureStackHardened parameter value from ECE xml is: $azsHardenedParamValue"
        if ([string]::IsNullOrEmpty($azsHardenedParamValue))
        {
            Trace-Execution "AzureStackHardened parameter value from ECE xml is null or empty. Setting value to Disabled"
            $azsHardenedParam.SetAttribute("Value", "Disabled")
            $azsHardenedParam.SetAttribute("AllowedValues", "")
            $azsHardenedParam.SetAttribute("Reference", "[{AzureStackHardened}]")
            $updateECEXml = $true
        }

        Trace-Execution "Check if SkipSEDProtection parameter node exists in ECE xml"
        $skipSEDProtectParam = $eceXml.SelectSingleNode("//Parameter[@Name='SkipSEDProtection']")
        if ($null -eq $skipSEDProtectParam)
        {
            Trace-Execution "SkipSEDProtection parameter node does not exist in ECE xml. Creating SkipSEDProtection parameter node"
            $skipSEDProtectParam = $eceXml.CreateElement("Parameter")
            $skipSEDProtectParam.SetAttribute("Name", "SkipSEDProtection")
            $skipSEDProtectParam.SetAttribute("Type", "string")
            $skipSEDProtectParam.SetAttribute("Value", "Disabled")
            $skipSEDProtectParam.SetAttribute("AllowedValues", "")
            $skipSEDProtectParam.SetAttribute("Reference", "[{SkipSEDProtection}]")
            $azsSecCategory.AppendChild($skipSEDProtectParam) | Out-Null
            $updateECEXml = $true
        }

        Trace-Execution "Get SkipSEDProtection parameter value from ECE xml"
        $skipSEDProtectParamValue = $skipSEDProtectParam.Value
        Trace-Execution "SkipSEDProtection parameter value from ECE xml is: $skipSEDProtectParamValue"
        if ([string]::IsNullOrEmpty($skipSEDProtectParamValue))
        {
            Trace-Execution "SkipSEDProtection parameter value from ECE xml is null or empty. Setting value to Disabled"
            $skipSEDProtectParam.SetAttribute("Value", "Disabled")
            $skipSEDProtectParam.SetAttribute("AllowedValues", "")
            $skipSEDProtectParam.SetAttribute("Reference", "[{SkipSEDProtection}]")
            $updateECEXml = $true
        }

        Trace-Execution "Check if AzureStackEnhancedEncryptionMethod parameter node exists in ECE xml"
        $azsEnhancedEncryptionMethodParam = $eceXml.SelectSingleNode("//Parameter[@Name='AzureStackEnhancedEncryptionMethod']")
        if ($null -eq $azsEnhancedEncryptionMethodParam)
        {
            Trace-Execution "AzureStackEnhancedEncryptionMethod parameter node does not exist in ECE xml. Creating AzureStackEnhancedEncryptionMethod parameter node"
            $azsEnhancedEncryptionMethodParam = $eceXml.CreateElement("Parameter")
            $azsEnhancedEncryptionMethodParam.SetAttribute("Name", "AzureStackEnhancedEncryptionMethod")
            $azsEnhancedEncryptionMethodParam.SetAttribute("Type", "string")
            $azsEnhancedEncryptionMethodParam.SetAttribute("Value", "")
            $azsEnhancedEncryptionMethodParam.SetAttribute("AllowedValues", "")
            $azsEnhancedEncryptionMethodParam.SetAttribute("Reference", "[{AzureStackEnhancedEncryptionMethod}]")
            $azsSecCategory.AppendChild($azsEnhancedEncryptionMethodParam) | Out-Null
            $updateECEXml = $true
        }

        if ($updateECEXml)
        {
            Trace-Execution "Updating ECE xml with AzsSecurity parameters"
            $eceCloudParametersDefinition = New-Object Microsoft.AzureStack.Solution.Deploy.EnterpriseCloudEngine.Controllers.Models.CloudDefinitionDescription
            $eceCloudParametersDefinition.ConfigurationName = 'AzureStack'
            $eceCloudParametersDefinition.CloudDefinitionAsXmlString = $eceXml.OuterXml
            $null = $eceClient.ImportCloudParameters($eceCloudParametersDefinition).GetAwaiter().GetResult()
            Trace-Execution "Created\updated AzsSecurity category with AzsSecurity parameters"
        }
    }
    catch
    {
        Trace-Execution "Failed to create/update AzsSecurity category with AzsSecurity parameters in ECE. Exception: $($_.Exception)"
        throw
    }
}

function Update-AzsSecurityParam
{
    [CmdletBinding()]
    Param
    (
        [Parameter(Mandatory = $true)]
        [string]
        $Name,

        [Parameter(Mandatory = $true)]
        [string]
        $Value,

        [Parameter(Mandatory = $true)]
        [string]
        $Reference
    )

    $ErrorActionPreference = "Stop"

    Trace-Execution "Update security parameter $Name in ECE"

    Import-Module -Name ECEClient -Verbose:$false -DisableNameChecking
    $eceClient = Create-ECEClientWithServiceResolver
    $eceXml = [XML]$eceClient.GetCloudParameters().GetAwaiter().GetResult().CloudDefinitionAsXmlString

    $needUpdate = $true

    $azsSecCategory = $eceXml.SelectSingleNode("//Category[@Name='AzsSecurity']")
    $parameter = $eceXml.SelectSingleNode("//Parameter[@Name='$Name']")
    if ($null -eq $parameter)
    {
        Trace-Execution "$Name parameter node does not exist in ECE xml. Creating $Name parameter node"
        $parameter = $eceXml.CreateElement("Parameter")
        $parameter.SetAttribute("Name", $Name)
        $parameter.SetAttribute("Type", "string")
        $parameter.SetAttribute("Value", $Value)
        $parameter.SetAttribute("AllowedValues", "")
        $parameter.SetAttribute("Reference", "[{$Reference}]")
        $azsSecCategory.AppendChild($parameter) | Out-Null
    }
    else
    {
        if ($Value -eq $parameter.Value)
        {
            $needUpdate = $false
            Trace-Execution "No need to update Security parameter $Name updated in ECE"
        }
        else
        {
            $parameter.SetAttribute("Value", $Value)
        }
    }

    if ($needUpdate)
    {
        $eceCloudParametersDefinition = New-Object Microsoft.AzureStack.Solution.Deploy.EnterpriseCloudEngine.Controllers.Models.CloudDefinitionDescription
        $eceCloudParametersDefinition.ConfigurationName = 'AzureStack'
        $eceCloudParametersDefinition.CloudDefinitionAsXmlString = $eceXml.OuterXml
        $null = $eceClient.ImportCloudParameters($eceCloudParametersDefinition).GetAwaiter().GetResult()

        Trace-Execution "Security parameter $Name updated in ECE"
    }
    
}

Export-ModuleMember -Function Get-DisableSecureBootOnInfraVms
Export-ModuleMember -Function Clear-SecurityItem
Export-ModuleMember -Function Set-AzsSecurityParam
Export-ModuleMember -Function Update-AzsSecurityParam

# SIG # Begin signature block
# MIIoQwYJKoZIhvcNAQcCoIIoNDCCKDACAQExDzANBglghkgBZQMEAgEFADB5Bgor
# BgEEAYI3AgEEoGswaTA0BgorBgEEAYI3AgEeMCYCAwEAAAQQH8w7YFlLCE63JNLG
# KX7zUQIBAAIBAAIBAAIBAAIBADAxMA0GCWCGSAFlAwQCAQUABCDDcERv5QPcvOjm
# GArCioMHysRd5pn3CZ0GIikEYN9tO6CCDXYwggX0MIID3KADAgECAhMzAAADrzBA
# DkyjTQVBAAAAAAOvMA0GCSqGSIb3DQEBCwUAMH4xCzAJBgNVBAYTAlVTMRMwEQYD
# VQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNy
# b3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNpZ25p
# bmcgUENBIDIwMTEwHhcNMjMxMTE2MTkwOTAwWhcNMjQxMTE0MTkwOTAwWjB0MQsw
# CQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9u
# ZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMR4wHAYDVQQDExVNaWNy
# b3NvZnQgQ29ycG9yYXRpb24wggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIB
# AQDOS8s1ra6f0YGtg0OhEaQa/t3Q+q1MEHhWJhqQVuO5amYXQpy8MDPNoJYk+FWA
# hePP5LxwcSge5aen+f5Q6WNPd6EDxGzotvVpNi5ve0H97S3F7C/axDfKxyNh21MG
# 0W8Sb0vxi/vorcLHOL9i+t2D6yvvDzLlEefUCbQV/zGCBjXGlYJcUj6RAzXyeNAN
# xSpKXAGd7Fh+ocGHPPphcD9LQTOJgG7Y7aYztHqBLJiQQ4eAgZNU4ac6+8LnEGAL
# go1ydC5BJEuJQjYKbNTy959HrKSu7LO3Ws0w8jw6pYdC1IMpdTkk2puTgY2PDNzB
# tLM4evG7FYer3WX+8t1UMYNTAgMBAAGjggFzMIIBbzAfBgNVHSUEGDAWBgorBgEE
# AYI3TAgBBggrBgEFBQcDAzAdBgNVHQ4EFgQURxxxNPIEPGSO8kqz+bgCAQWGXsEw
# RQYDVR0RBD4wPKQ6MDgxHjAcBgNVBAsTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEW
# MBQGA1UEBRMNMjMwMDEyKzUwMTgyNjAfBgNVHSMEGDAWgBRIbmTlUAXTgqoXNzci
# tW2oynUClTBUBgNVHR8ETTBLMEmgR6BFhkNodHRwOi8vd3d3Lm1pY3Jvc29mdC5j
# b20vcGtpb3BzL2NybC9NaWNDb2RTaWdQQ0EyMDExXzIwMTEtMDctMDguY3JsMGEG
# CCsGAQUFBwEBBFUwUzBRBggrBgEFBQcwAoZFaHR0cDovL3d3dy5taWNyb3NvZnQu
# Y29tL3BraW9wcy9jZXJ0cy9NaWNDb2RTaWdQQ0EyMDExXzIwMTEtMDctMDguY3J0
# MAwGA1UdEwEB/wQCMAAwDQYJKoZIhvcNAQELBQADggIBAISxFt/zR2frTFPB45Yd
# mhZpB2nNJoOoi+qlgcTlnO4QwlYN1w/vYwbDy/oFJolD5r6FMJd0RGcgEM8q9TgQ
# 2OC7gQEmhweVJ7yuKJlQBH7P7Pg5RiqgV3cSonJ+OM4kFHbP3gPLiyzssSQdRuPY
# 1mIWoGg9i7Y4ZC8ST7WhpSyc0pns2XsUe1XsIjaUcGu7zd7gg97eCUiLRdVklPmp
# XobH9CEAWakRUGNICYN2AgjhRTC4j3KJfqMkU04R6Toyh4/Toswm1uoDcGr5laYn
# TfcX3u5WnJqJLhuPe8Uj9kGAOcyo0O1mNwDa+LhFEzB6CB32+wfJMumfr6degvLT
# e8x55urQLeTjimBQgS49BSUkhFN7ois3cZyNpnrMca5AZaC7pLI72vuqSsSlLalG
# OcZmPHZGYJqZ0BacN274OZ80Q8B11iNokns9Od348bMb5Z4fihxaBWebl8kWEi2O
# PvQImOAeq3nt7UWJBzJYLAGEpfasaA3ZQgIcEXdD+uwo6ymMzDY6UamFOfYqYWXk
# ntxDGu7ngD2ugKUuccYKJJRiiz+LAUcj90BVcSHRLQop9N8zoALr/1sJuwPrVAtx
# HNEgSW+AKBqIxYWM4Ev32l6agSUAezLMbq5f3d8x9qzT031jMDT+sUAoCw0M5wVt
# CUQcqINPuYjbS1WgJyZIiEkBMIIHejCCBWKgAwIBAgIKYQ6Q0gAAAAAAAzANBgkq
# hkiG9w0BAQsFADCBiDELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24x
# EDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlv
# bjEyMDAGA1UEAxMpTWljcm9zb2Z0IFJvb3QgQ2VydGlmaWNhdGUgQXV0aG9yaXR5
# IDIwMTEwHhcNMTEwNzA4MjA1OTA5WhcNMjYwNzA4MjEwOTA5WjB+MQswCQYDVQQG
# EwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwG
# A1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSgwJgYDVQQDEx9NaWNyb3NvZnQg
# Q29kZSBTaWduaW5nIFBDQSAyMDExMIICIjANBgkqhkiG9w0BAQEFAAOCAg8AMIIC
# CgKCAgEAq/D6chAcLq3YbqqCEE00uvK2WCGfQhsqa+laUKq4BjgaBEm6f8MMHt03
# a8YS2AvwOMKZBrDIOdUBFDFC04kNeWSHfpRgJGyvnkmc6Whe0t+bU7IKLMOv2akr
# rnoJr9eWWcpgGgXpZnboMlImEi/nqwhQz7NEt13YxC4Ddato88tt8zpcoRb0Rrrg
# OGSsbmQ1eKagYw8t00CT+OPeBw3VXHmlSSnnDb6gE3e+lD3v++MrWhAfTVYoonpy
# 4BI6t0le2O3tQ5GD2Xuye4Yb2T6xjF3oiU+EGvKhL1nkkDstrjNYxbc+/jLTswM9
# sbKvkjh+0p2ALPVOVpEhNSXDOW5kf1O6nA+tGSOEy/S6A4aN91/w0FK/jJSHvMAh
# dCVfGCi2zCcoOCWYOUo2z3yxkq4cI6epZuxhH2rhKEmdX4jiJV3TIUs+UsS1Vz8k
# A/DRelsv1SPjcF0PUUZ3s/gA4bysAoJf28AVs70b1FVL5zmhD+kjSbwYuER8ReTB
# w3J64HLnJN+/RpnF78IcV9uDjexNSTCnq47f7Fufr/zdsGbiwZeBe+3W7UvnSSmn
# Eyimp31ngOaKYnhfsi+E11ecXL93KCjx7W3DKI8sj0A3T8HhhUSJxAlMxdSlQy90
# lfdu+HggWCwTXWCVmj5PM4TasIgX3p5O9JawvEagbJjS4NaIjAsCAwEAAaOCAe0w
# ggHpMBAGCSsGAQQBgjcVAQQDAgEAMB0GA1UdDgQWBBRIbmTlUAXTgqoXNzcitW2o
# ynUClTAZBgkrBgEEAYI3FAIEDB4KAFMAdQBiAEMAQTALBgNVHQ8EBAMCAYYwDwYD
# VR0TAQH/BAUwAwEB/zAfBgNVHSMEGDAWgBRyLToCMZBDuRQFTuHqp8cx0SOJNDBa
# BgNVHR8EUzBRME+gTaBLhklodHRwOi8vY3JsLm1pY3Jvc29mdC5jb20vcGtpL2Ny
# bC9wcm9kdWN0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFfMDNfMjIuY3JsMF4GCCsG
# AQUFBwEBBFIwUDBOBggrBgEFBQcwAoZCaHR0cDovL3d3dy5taWNyb3NvZnQuY29t
# L3BraS9jZXJ0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFfMDNfMjIuY3J0MIGfBgNV
# HSAEgZcwgZQwgZEGCSsGAQQBgjcuAzCBgzA/BggrBgEFBQcCARYzaHR0cDovL3d3
# dy5taWNyb3NvZnQuY29tL3BraW9wcy9kb2NzL3ByaW1hcnljcHMuaHRtMEAGCCsG
# AQUFBwICMDQeMiAdAEwAZQBnAGEAbABfAHAAbwBsAGkAYwB5AF8AcwB0AGEAdABl
# AG0AZQBuAHQALiAdMA0GCSqGSIb3DQEBCwUAA4ICAQBn8oalmOBUeRou09h0ZyKb
# C5YR4WOSmUKWfdJ5DJDBZV8uLD74w3LRbYP+vj/oCso7v0epo/Np22O/IjWll11l
# hJB9i0ZQVdgMknzSGksc8zxCi1LQsP1r4z4HLimb5j0bpdS1HXeUOeLpZMlEPXh6
# I/MTfaaQdION9MsmAkYqwooQu6SpBQyb7Wj6aC6VoCo/KmtYSWMfCWluWpiW5IP0
# wI/zRive/DvQvTXvbiWu5a8n7dDd8w6vmSiXmE0OPQvyCInWH8MyGOLwxS3OW560
# STkKxgrCxq2u5bLZ2xWIUUVYODJxJxp/sfQn+N4sOiBpmLJZiWhub6e3dMNABQam
# ASooPoI/E01mC8CzTfXhj38cbxV9Rad25UAqZaPDXVJihsMdYzaXht/a8/jyFqGa
# J+HNpZfQ7l1jQeNbB5yHPgZ3BtEGsXUfFL5hYbXw3MYbBL7fQccOKO7eZS/sl/ah
# XJbYANahRr1Z85elCUtIEJmAH9AAKcWxm6U/RXceNcbSoqKfenoi+kiVH6v7RyOA
# 9Z74v2u3S5fi63V4GuzqN5l5GEv/1rMjaHXmr/r8i+sLgOppO6/8MO0ETI7f33Vt
# Y5E90Z1WTk+/gFcioXgRMiF670EKsT/7qMykXcGhiJtXcVZOSEXAQsmbdlsKgEhr
# /Xmfwb1tbWrJUnMTDXpQzTGCGiMwghofAgEBMIGVMH4xCzAJBgNVBAYTAlVTMRMw
# EQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVN
# aWNyb3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNp
# Z25pbmcgUENBIDIwMTECEzMAAAOvMEAOTKNNBUEAAAAAA68wDQYJYIZIAWUDBAIB
# BQCgga4wGQYJKoZIhvcNAQkDMQwGCisGAQQBgjcCAQQwHAYKKwYBBAGCNwIBCzEO
# MAwGCisGAQQBgjcCARUwLwYJKoZIhvcNAQkEMSIEIJlvPwlkS6yH/w5X8KX+DTL9
# qcdKAAUUwlVl9ylUJEV9MEIGCisGAQQBgjcCAQwxNDAyoBSAEgBNAGkAYwByAG8A
# cwBvAGYAdKEagBhodHRwOi8vd3d3Lm1pY3Jvc29mdC5jb20wDQYJKoZIhvcNAQEB
# BQAEggEAFDTVIvcVpGCKF9lsdmDZG1tRsaWSq5atbgfgqNieeI5n5IDeqz222Trl
# c2n6iNXr2L6pu8BuCGn/CisqMcRQJnVn+GMAJi7i+41RASHCJ4ZL4S5uOfeBwrAX
# LJlnfmMVdj3R4PI7zrVszrDpL0HPpwNZXmelqnzdQBEBcftEIeDJXjv5QEBo4I/v
# o8hKngZ6min53olEFcTL54/UqlDEts+YB04twbRDQFV5PHRPi4cuIUcxmD16TASe
# xhe/aM4ZEpoPxObxs8+cRPuBraK4Mozo0ohE10BXh32NUXj07jodumBbOpjdwVJ2
# 3zahLkMZ+N9HIMbdGaQ4xAIavReIfaGCF60wghepBgorBgEEAYI3AwMBMYIXmTCC
# F5UGCSqGSIb3DQEHAqCCF4YwgheCAgEDMQ8wDQYJYIZIAWUDBAIBBQAwggFaBgsq
# hkiG9w0BCRABBKCCAUkEggFFMIIBQQIBAQYKKwYBBAGEWQoDATAxMA0GCWCGSAFl
# AwQCAQUABCBpfJcE+Sfr2t6zecS83TcCHwR3+mJgtROOgV2mVe6H3wIGZusoG9Hn
# GBMyMDI0MTAwOTAxMTMzNy43OTJaMASAAgH0oIHZpIHWMIHTMQswCQYDVQQGEwJV
# UzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UE
# ChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMS0wKwYDVQQLEyRNaWNyb3NvZnQgSXJl
# bGFuZCBPcGVyYXRpb25zIExpbWl0ZWQxJzAlBgNVBAsTHm5TaGllbGQgVFNTIEVT
# TjozMjFBLTA1RTAtRDk0NzElMCMGA1UEAxMcTWljcm9zb2Z0IFRpbWUtU3RhbXAg
# U2VydmljZaCCEfswggcoMIIFEKADAgECAhMzAAAB+KOhJgwMQEj+AAEAAAH4MA0G
# CSqGSIb3DQEBCwUAMHwxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9u
# MRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRp
# b24xJjAkBgNVBAMTHU1pY3Jvc29mdCBUaW1lLVN0YW1wIFBDQSAyMDEwMB4XDTI0
# MDcyNTE4MzEwOFoXDTI1MTAyMjE4MzEwOFowgdMxCzAJBgNVBAYTAlVTMRMwEQYD
# VQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNy
# b3NvZnQgQ29ycG9yYXRpb24xLTArBgNVBAsTJE1pY3Jvc29mdCBJcmVsYW5kIE9w
# ZXJhdGlvbnMgTGltaXRlZDEnMCUGA1UECxMeblNoaWVsZCBUU1MgRVNOOjMyMUEt
# MDVFMC1EOTQ3MSUwIwYDVQQDExxNaWNyb3NvZnQgVGltZS1TdGFtcCBTZXJ2aWNl
# MIICIjANBgkqhkiG9w0BAQEFAAOCAg8AMIICCgKCAgEAxR23pXYnD2BuODdeXs2C
# u/T5kKI+bAw8cbtN50Cm/FArjXyL4RTqMe6laQ/CqeMTxgckvZr1JrW0Mi4F15rx
# /VveGhKBmob45DmOcV5xyx7h9Tk59NAl5PNMAWKAIWf270SWAAWxQbpVIhhPWCnV
# V3otVvahEad8pMmoSXrT5Z7Nk1RnB70A2bq9Hk8wIeC3vBuxEX2E8X50IgAHsyaR
# 9roFq3ErzUEHlS8YnSq33ui5uBcrFOcFOCZILuVFVTgEqSrX4UiX0etqi7jUtKyp
# gIflaZcV5cI5XI/eCxY8wDNmBprhYMNlYxdmQ9aLRDcTKWtddWpnJtyl5e3gHuYo
# j8xuDQ0XZNy7ESRwJIK03+rTZqfaYyM4XSK1s0aa+mO69vo/NmJ4R/f1+KucBPJ4
# yUdbqJWM3xMvBwLYycvigI/WK4kgPog0UBNczaQwDVXpcU+TMcOvWP8HBWmWJQIm
# TZInAFivXqUaBbo3wAfPNbsQpvNNGu/12pg0F8O/CdRfgPHfOhIWQ0D8ALCY+Lsi
# wbzcejbrVl4N9fn2wOg2sDa8RfNoD614I0pFjy/lq1NsBo9V4GZBikzX7ZjWCRgd
# 1FCBXGpfpDikHjQ05YOkAakdWDT2bGSaUZJGVYtepIpPTAs1gd/vUogcdiL51o7s
# huHIlB6QSUiQ24XYhRbbQCECAwEAAaOCAUkwggFFMB0GA1UdDgQWBBS9zsZzz57Q
# lT5nrt/oitLv1OQ7tjAfBgNVHSMEGDAWgBSfpxVdAF5iXYP05dJlpxtTNRnpcjBf
# BgNVHR8EWDBWMFSgUqBQhk5odHRwOi8vd3d3Lm1pY3Jvc29mdC5jb20vcGtpb3Bz
# L2NybC9NaWNyb3NvZnQlMjBUaW1lLVN0YW1wJTIwUENBJTIwMjAxMCgxKS5jcmww
# bAYIKwYBBQUHAQEEYDBeMFwGCCsGAQUFBzAChlBodHRwOi8vd3d3Lm1pY3Jvc29m
# dC5jb20vcGtpb3BzL2NlcnRzL01pY3Jvc29mdCUyMFRpbWUtU3RhbXAlMjBQQ0El
# MjAyMDEwKDEpLmNydDAMBgNVHRMBAf8EAjAAMBYGA1UdJQEB/wQMMAoGCCsGAQUF
# BwMIMA4GA1UdDwEB/wQEAwIHgDANBgkqhkiG9w0BAQsFAAOCAgEAYfk8GzzpEVnG
# l7y6oXoytCb42Hx6TOA0+dkaBI36ftDE9tLubUa/xMbHB5rcNiRhFHZ93RefdPpc
# 4+FF0DAl5lP8xKAO+293RWPKDFOFIxgtZY08t8D9cSQpgGUzyw3lETZebNLEA17A
# /CTpA2F9uh8j84KygeEbj+bidWDiEfayoH2A5/5ywJJxIuLzFVHacvWxSCKoF9hl
# SrZSG5fXWS3namf4tt690UT6AGyWLFWe895coFPxm/m0UIMjjp9VRFH7nb3Ng2Q4
# gPS9E5ZTMZ6nAlmUicDj0NXAs2wQuQrnYnbRAJ/DQW35qLo7Daw9AsItqjFhbMcG
# 68gDc4j74L2KYe/2goBHLwzSn5UDftS1HZI0ZRsqmNHI0TZvvUWX9ajm6SfLBTEt
# oTo6gLOX0UD/9rrhGjdkiCw4SwU5osClgqgiNMK5ndk2gxFlDXHCyLp5qB6BoPpc
# 82RhO0yCzoP9gv7zv2EocAWEsqE5+0Wmu5uarmfvcziLfU1SY240OZW8ld4sS8fn
# ybn/jDMmFAhazV1zH0QERWEsfLSpwkOXaImWNFJ5lmcnf1VTm6cmfasScYtElpjq
# Z9GooCmk1XFApORPs/PO43IcFmPRwagt00iQSw+rBeIH00KQq+FJT/62SB70g9g/
# R8TS6k6b/wt2UWhqrW+Q8lw6Xzgex/YwggdxMIIFWaADAgECAhMzAAAAFcXna54C
# m0mZAAAAAAAVMA0GCSqGSIb3DQEBCwUAMIGIMQswCQYDVQQGEwJVUzETMBEGA1UE
# CBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9z
# b2Z0IENvcnBvcmF0aW9uMTIwMAYDVQQDEylNaWNyb3NvZnQgUm9vdCBDZXJ0aWZp
# Y2F0ZSBBdXRob3JpdHkgMjAxMDAeFw0yMTA5MzAxODIyMjVaFw0zMDA5MzAxODMy
# MjVaMHwxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQH
# EwdSZWRtb25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRpb24xJjAkBgNV
# BAMTHU1pY3Jvc29mdCBUaW1lLVN0YW1wIFBDQSAyMDEwMIICIjANBgkqhkiG9w0B
# AQEFAAOCAg8AMIICCgKCAgEA5OGmTOe0ciELeaLL1yR5vQ7VgtP97pwHB9KpbE51
# yMo1V/YBf2xK4OK9uT4XYDP/XE/HZveVU3Fa4n5KWv64NmeFRiMMtY0Tz3cywBAY
# 6GB9alKDRLemjkZrBxTzxXb1hlDcwUTIcVxRMTegCjhuje3XD9gmU3w5YQJ6xKr9
# cmmvHaus9ja+NSZk2pg7uhp7M62AW36MEBydUv626GIl3GoPz130/o5Tz9bshVZN
# 7928jaTjkY+yOSxRnOlwaQ3KNi1wjjHINSi947SHJMPgyY9+tVSP3PoFVZhtaDua
# Rr3tpK56KTesy+uDRedGbsoy1cCGMFxPLOJiss254o2I5JasAUq7vnGpF1tnYN74
# kpEeHT39IM9zfUGaRnXNxF803RKJ1v2lIH1+/NmeRd+2ci/bfV+AutuqfjbsNkz2
# K26oElHovwUDo9Fzpk03dJQcNIIP8BDyt0cY7afomXw/TNuvXsLz1dhzPUNOwTM5
# TI4CvEJoLhDqhFFG4tG9ahhaYQFzymeiXtcodgLiMxhy16cg8ML6EgrXY28MyTZk
# i1ugpoMhXV8wdJGUlNi5UPkLiWHzNgY1GIRH29wb0f2y1BzFa/ZcUlFdEtsluq9Q
# BXpsxREdcu+N+VLEhReTwDwV2xo3xwgVGD94q0W29R6HXtqPnhZyacaue7e3Pmri
# Lq0CAwEAAaOCAd0wggHZMBIGCSsGAQQBgjcVAQQFAgMBAAEwIwYJKwYBBAGCNxUC
# BBYEFCqnUv5kxJq+gpE8RjUpzxD/LwTuMB0GA1UdDgQWBBSfpxVdAF5iXYP05dJl
# pxtTNRnpcjBcBgNVHSAEVTBTMFEGDCsGAQQBgjdMg30BATBBMD8GCCsGAQUFBwIB
# FjNodHRwOi8vd3d3Lm1pY3Jvc29mdC5jb20vcGtpb3BzL0RvY3MvUmVwb3NpdG9y
# eS5odG0wEwYDVR0lBAwwCgYIKwYBBQUHAwgwGQYJKwYBBAGCNxQCBAweCgBTAHUA
# YgBDAEEwCwYDVR0PBAQDAgGGMA8GA1UdEwEB/wQFMAMBAf8wHwYDVR0jBBgwFoAU
# 1fZWy4/oolxiaNE9lJBb186aGMQwVgYDVR0fBE8wTTBLoEmgR4ZFaHR0cDovL2Ny
# bC5taWNyb3NvZnQuY29tL3BraS9jcmwvcHJvZHVjdHMvTWljUm9vQ2VyQXV0XzIw
# MTAtMDYtMjMuY3JsMFoGCCsGAQUFBwEBBE4wTDBKBggrBgEFBQcwAoY+aHR0cDov
# L3d3dy5taWNyb3NvZnQuY29tL3BraS9jZXJ0cy9NaWNSb29DZXJBdXRfMjAxMC0w
# Ni0yMy5jcnQwDQYJKoZIhvcNAQELBQADggIBAJ1VffwqreEsH2cBMSRb4Z5yS/yp
# b+pcFLY+TkdkeLEGk5c9MTO1OdfCcTY/2mRsfNB1OW27DzHkwo/7bNGhlBgi7ulm
# ZzpTTd2YurYeeNg2LpypglYAA7AFvonoaeC6Ce5732pvvinLbtg/SHUB2RjebYIM
# 9W0jVOR4U3UkV7ndn/OOPcbzaN9l9qRWqveVtihVJ9AkvUCgvxm2EhIRXT0n4ECW
# OKz3+SmJw7wXsFSFQrP8DJ6LGYnn8AtqgcKBGUIZUnWKNsIdw2FzLixre24/LAl4
# FOmRsqlb30mjdAy87JGA0j3mSj5mO0+7hvoyGtmW9I/2kQH2zsZ0/fZMcm8Qq3Uw
# xTSwethQ/gpY3UA8x1RtnWN0SCyxTkctwRQEcb9k+SS+c23Kjgm9swFXSVRk2XPX
# fx5bRAGOWhmRaw2fpCjcZxkoJLo4S5pu+yFUa2pFEUep8beuyOiJXk+d0tBMdrVX
# VAmxaQFEfnyhYWxz/gq77EFmPWn9y8FBSX5+k77L+DvktxW/tM4+pTFRhLy/AsGC
# onsXHRWJjXD+57XQKBqJC4822rpM+Zv/Cuk0+CQ1ZyvgDbjmjJnW4SLq8CdCPSWU
# 5nR0W2rRnj7tfqAxM328y+l7vzhwRNGQ8cirOoo6CGJ/2XBjU02N7oJtpQUQwXEG
# ahC0HVUzWLOhcGbyoYIDVjCCAj4CAQEwggEBoYHZpIHWMIHTMQswCQYDVQQGEwJV
# UzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UE
# ChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMS0wKwYDVQQLEyRNaWNyb3NvZnQgSXJl
# bGFuZCBPcGVyYXRpb25zIExpbWl0ZWQxJzAlBgNVBAsTHm5TaGllbGQgVFNTIEVT
# TjozMjFBLTA1RTAtRDk0NzElMCMGA1UEAxMcTWljcm9zb2Z0IFRpbWUtU3RhbXAg
# U2VydmljZaIjCgEBMAcGBSsOAwIaAxUAtkQt/ebWSQ5DnG+aKRzPELCFE9GggYMw
# gYCkfjB8MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UE
# BxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSYwJAYD
# VQQDEx1NaWNyb3NvZnQgVGltZS1TdGFtcCBQQ0EgMjAxMDANBgkqhkiG9w0BAQsF
# AAIFAOqwA2wwIhgPMjAyNDEwMDgxOTE1NTZaGA8yMDI0MTAwOTE5MTU1NlowdDA6
# BgorBgEEAYRZCgQBMSwwKjAKAgUA6rADbAIBADAHAgEAAgIR3zAHAgEAAgITKzAK
# AgUA6rFU7AIBADA2BgorBgEEAYRZCgQCMSgwJjAMBgorBgEEAYRZCgMCoAowCAIB
# AAIDB6EgoQowCAIBAAIDAYagMA0GCSqGSIb3DQEBCwUAA4IBAQAgTOmJI7baBGFM
# RgzPL4EDqm75mcq4+hOT7AI0dfPGojpdve4IDkz6uUirK1hc1UEq7CxU5wRcWXMu
# zcBLTZEjgnChcK78bKlQbMpLf5K3s8hUK57IQRdRQSUEPkZ5amRy18vztTTRsIyf
# WPcnVI75l482vD+aIDr8/0eN/9O7fwgcshOwTrvi9b0nzRCSwPmD4gSpUVwp3OIh
# GGYvLqkDCUbLCLTr6v5xDh8T9ORYf+4dtcoYsQ6b47yUMKQVyGsTvfju12FZxbQ1
# lMiCFuhgT6LZZ5J40ttM8o91s3ii0rB/fXwW76sIbJz/j7pe6rqd2Kz1lndUOCCo
# NPZL28PeMYIEDTCCBAkCAQEwgZMwfDELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldh
# c2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBD
# b3Jwb3JhdGlvbjEmMCQGA1UEAxMdTWljcm9zb2Z0IFRpbWUtU3RhbXAgUENBIDIw
# MTACEzMAAAH4o6EmDAxASP4AAQAAAfgwDQYJYIZIAWUDBAIBBQCgggFKMBoGCSqG
# SIb3DQEJAzENBgsqhkiG9w0BCRABBDAvBgkqhkiG9w0BCQQxIgQgS3Gmpk5YdJTN
# 2iJSUNgLYDFC3gt+m2Ef7Vbv2IjuxoEwgfoGCyqGSIb3DQEJEAIvMYHqMIHnMIHk
# MIG9BCDvzDPyXw1UkAUFYt8bR4UdjM90Qv5xnVaiKD3I0Zz3WjCBmDCBgKR+MHwx
# CzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRt
# b25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRpb24xJjAkBgNVBAMTHU1p
# Y3Jvc29mdCBUaW1lLVN0YW1wIFBDQSAyMDEwAhMzAAAB+KOhJgwMQEj+AAEAAAH4
# MCIEICn0/x81jkwcJTJFGZudBTir8MeBr8+U2RhTJ54x0eCiMA0GCSqGSIb3DQEB
# CwUABIICALTE+AJ0OxLs+fTIZ8oLohxjUFVdQ6eVcaQcBoQZ7wsCiVygPkDsuwP7
# VLLLfFd9DWcRGXpyu/VHm0Ogk8jBZezSQlK6lNeNQ/LzFFxF18ROP12MrHuZR2QC
# +ItVpdKI5ttQeNvbGZXuj+pEFWruMufv93+PQPCLN7tgwCRc7Qn6tzBrMCkGlY4d
# h3GIsk4x/CG7Ks9UwS/RM9f0fG+jKwjaLjB3tQdSmUyUFM+rEc6NCgkVt+ngPegQ
# PzbRgZG6WjGnvoIdc9j/orDZhi5WhSl2H84UfYyeRBEJuOalE2+VYZGaeSoAY+Bh
# F8BU7xg8Sw1qD+EgQD+7bq48B0vv5/xGtHyL34/XXv9wBGH33jiJAVo+QoxtwJiz
# DwMXf26YYqOlTQS3Y1eZyDFJ3o3V3pHxIGCUft3/k8Pu3ufWl6aagrEafrb/HWrS
# LmO6sN3YhfNSv/HY8jhVJ5GDmtaL3C96DtCVskTI7Z+GGEGI36OwWq6eBovomFMH
# JHhcW4hrn5vB1X8w6cZHfjqWYQDK3BSTB/ndOKEZUf0QhVj//E9ufTQF/qsUT/mm
# D87mHBTbAr7B/Qdg5jxeGq1OrlbsmgpI3tOvlftdO8h33k6Agj5LXxYmjYmB4XJV
# Dz6UYuA5lU5ZyQSDkNIWPhEvGfLVCHEKJV7mZd6+/hrzXaTaFlFF
# SIG # End signature block