Obs/bin/ObsDep/content/Powershell/Common/SecurityHelpers.psm1

<###################################################
 # #
 # Copyright (c) Microsoft. All rights reserved. #
 # #
 ##################################################>


Import-Module $PSScriptRoot\Tracer.psm1

<#
 .Synopsis
  Returns deployment configuration setting: Cloud.PublicInfo.SecuritySetting.SecureBoot.EnforceOnAllInfraVms
  Default value is $false
#>

function Get-DisableSecureBootOnInfraVms
{
    Param
    (
        [Parameter(Mandatory = $true)]
        [CloudEngine.Configurations.EceInterfaceParameters]
        $Parameters
    )

    $ErrorActionPreference = 'Stop'

    $cloudRolePublicInfo = $Parameters.Roles["Cloud"].PublicConfiguration.PublicInfo

    if($cloudRolePublicInfo.SecuritySetting)
    {
        if($cloudRolePublicInfo.SecuritySetting.SecureBoot)
        {
            $DisableSecureBootOnInfraVms = $cloudRolePublicInfo.SecuritySetting.SecureBoot.GetAttribute("DisableSecureBootOnInfraVms")
            return $DisableSecureBootOnInfraVms -eq "True"
        }
    }

    return $false
}


function Clear-SecurityItem
{
    [CmdletBinding()]
    param (
        [Parameter(Mandatory = $true)]
        [CloudEngine.Configurations.EceInterfaceParameters]
        $Parameters,

        [Parameter(Mandatory = $false)]
        [string]
        $ClusterName
    )

    Import-Module $PSScriptRoot\..\Roles\Common\DscHelper.psm1 -DisableNameChecking

    $clusterNames = @($ClusterName)
    if ([System.string]::IsNullOrEmpty($ClusterName))
    {
        $clusterNames = Get-ClusterNames $Parameters
    }

    Trace-Execution "Clearing security items on: $($clusterNames -join ', ')"
    $domainAdminUser = $Parameters.Roles["Cloud"].PublicConfiguration.PublicInfo.SecurityInfo.DomainUsers.User | Where-Object Role -EQ "DomainAdmin"
    $domainAdminCredential = $Parameters.GetCredential($domainAdminUser.Credential)
    $domainAdminName = $domainAdminCredential.GetNetworkCredential().UserName
    $domainAdminPassword = $domainAdminCredential.GetNetworkCredential().Password
    $domainFqdn = $Parameters.Roles["Domain"].PublicConfiguration.PublicInfo.DomainConfiguration.FQDN
    $domainCredential = New-Credential -UserName "$domainFqdn\$domainAdminName" -Password $domainAdminPassword
    $virtualMachinesRole = $Parameters.Roles["VirtualMachines"].PublicConfiguration
    $clusterRole = $Parameters.Roles["Cluster"].PublicConfiguration

    foreach ($clusterName in $clusterNames)
    {
        $physicalHosts = Get-ActiveClusterNodes -Parameters $Parameters -ClusterName $clusterName
        foreach($physicalHost in $physicalHosts)
        {
            $session = New-PSSession "$physicalHost.$domainFqdn" -Credential $domainCredential
            Set-SecurityOnHost -Session $session -IsOneNode:$($physicalHosts.Count -eq 1)
            $session | Remove-PSSession -ErrorAction SilentlyContinue
        }

        $clusterId = ($clusterRole.Clusters.Node | ? Name -eq $clusterName).Id
        $guestVmNames = $Parameters.Roles["VirtualMachines"].PublicConfiguration.Nodes.Node | where { $_.ProvisioningStatus -eq "Complete" -and $_.RefClusterId -eq $clusterId } | Select-Object -ExpandProperty Name
        foreach($guestVmName in $guestVmNames)
        {
            $vmSession = New-PSSession "$guestVmName.$domainFqdn" -Credential $domainCredential
            Set-SecurityOnVm -Session $vmSession
            $vmSession | Remove-PSSession -ErrorAction SilentlyContinue
        }
    }

    $ercsVmNames = $Parameters.Roles["SeedRing"].PublicConfiguration.Nodes.Node | Foreach-Object Name
    $activeErcsVmNames = $virtualMachinesRole.Nodes.Node | where { $_.Name -in $ercsVmNames } `
                          | where { $_.ProvisioningStatus -eq 'Complete' } | Foreach-Object Name

    Revoke-CompleteBootDSCShareAccess -ComputerName $activeErcsVmNames -Parameters $Parameters
}


function Set-SecurityOnHost
{
    [CmdletBinding()]
    param(
        [Parameter(Mandatory = $true)]
        [System.Management.Automation.Runspaces.PSSession]
        $Session,

        [Parameter(Mandatory = $true)]
        [switch]
        $isOneNode
    )

    if ($Session)
    {
        $computerName = $Session.ComputerName
        Trace-Execution "Applying security actions on: $computerName"

        Trace-Execution "Deleting not needed files on: $computerName"
        Invoke-Command -Session $Session -ScriptBlock {Remove-Item -Path "$env:windir\Panther\unattend.xml" -Force -ErrorAction SilentlyContinue} -ErrorAction SilentlyContinue
        Invoke-Command -Session $Session -ScriptBlock {Remove-Item -Path "$env:windir\Panther\Unattend\unattend.xml" -Force -ErrorAction SilentlyContinue} -ErrorAction SilentlyContinue

        Trace-Execution "Removing unnecessary registry keys from: $computerName"
        Invoke-Command -Session $Session -ScriptBlock {Remove-ItemProperty -Name DefaultUserName   -path 'HKLM:\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon' -ErrorAction SilentlyContinue} -ErrorAction SilentlyContinue
        Invoke-Command -Session $Session -ScriptBlock {Remove-ItemProperty -Name DefaultPassword   -path 'HKLM:\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon' -ErrorAction SilentlyContinue} -ErrorAction SilentlyContinue
        Invoke-Command -Session $Session -ScriptBlock {Remove-ItemProperty -Name DefaultDomainName -path 'HKLM:\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon' -ErrorAction SilentlyContinue} -ErrorAction SilentlyContinue
        Invoke-Command -Session $Session -ScriptBlock {Set-ItemProperty    -Name AutoAdminLogon    -Path 'HKLM:\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon'  -Value 0 -Force -ErrorAction SilentlyContinue} -ErrorAction SilentlyContinue
        Invoke-Command -Session $Session -ScriptBlock {Set-ItemProperty    -Name ForceAutoLogon    -Path 'HKLM:\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon'  -Value 0 -Force -ErrorAction SilentlyContinue} -ErrorAction SilentlyContinue
        Invoke-Command -Session $Session -ScriptBlock {Set-ItemProperty    -Name AutoLogonCount    -Path 'HKLM:\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon'  -Value 0 -Force -ErrorAction SilentlyContinue} -ErrorAction SilentlyContinue

        $exists = Invoke-Command -Session $Session -ScriptBlock { Test-Path -Path "$env:windir\Panther\unattend.xml" } -ErrorAction SilentlyContinue
        if ($exists)
        {
            Trace-Warning "Unable to delete not needed file from panther first location for $computerName"
        }

        $exists = Invoke-Command -Session $Session -ScriptBlock { Test-Path -Path "$env:windir\Panther\Unattend\unattend.xml" } -ErrorAction SilentlyContinue
        if ($exists)
        {
            Trace-Warning "Unable to delete not needed file from panther second location for $computerName"
        }

        # If this is a one node, do not disable administrator/rename on host. Host is the same as DVM
        if (-not $isOneNode)
        {
            Disable-LocalAdmins -Session $Session
            Set-BuildinUsers -Session $Session
        }
    }
}

function Set-SecurityOnVm
{
    [CmdletBinding()]
    param(
        [Parameter(Mandatory = $true)]
        [System.Management.Automation.Runspaces.PSSession]
        $Session
    )

    if ($Session)
    {
        $computerName = $Session.ComputerName
        Trace-Execution "Applying security actions on: $computerName"

        Trace-Execution "Deleting not needed files on: $computerName"
        Invoke-Command -Session $Session -ScriptBlock {Remove-Item -Path "$env:SystemDrive\unattend.xml" -Force -ErrorAction SilentlyContinue} -ErrorAction SilentlyContinue
        Invoke-Command -Session $Session -ScriptBlock {Remove-Item -Path "$env:windir\Panther\unattend.xml" -Force -ErrorAction SilentlyContinue} -ErrorAction SilentlyContinue

        Trace-Execution "Removing unnecessary registry keys from: $computerName"
        Invoke-Command -Session $Session -ScriptBlock {Remove-ItemProperty -Name DefaultUserName   -path 'HKLM:\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon' -ErrorAction SilentlyContinue} -ErrorAction SilentlyContinue
        Invoke-Command -Session $Session -ScriptBlock {Remove-ItemProperty -Name DefaultPassword   -path 'HKLM:\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon' -ErrorAction SilentlyContinue} -ErrorAction SilentlyContinue
        Invoke-Command -Session $Session -ScriptBlock {Remove-ItemProperty -Name DefaultDomainName -path 'HKLM:\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon' -ErrorAction SilentlyContinue} -ErrorAction SilentlyContinue
        Invoke-Command -Session $Session -ScriptBlock {Set-ItemProperty    -Name AutoAdminLogon    -Path 'HKLM:\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon'  -Value 0 -Force -ErrorAction SilentlyContinue} -ErrorAction SilentlyContinue
        Invoke-Command -Session $Session -ScriptBlock {Set-ItemProperty    -Name ForceAutoLogon    -Path 'HKLM:\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon'  -Value 0 -Force -ErrorAction SilentlyContinue} -ErrorAction SilentlyContinue
        Invoke-Command -Session $Session -ScriptBlock {Set-ItemProperty    -Name AutoLogonCount    -Path 'HKLM:\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon'  -Value 0 -Force -ErrorAction SilentlyContinue} -ErrorAction SilentlyContinue

        $exists = Invoke-Command -Session $Session -ScriptBlock {Test-Path -Path "$env:SystemDrive\unattend.xml"} -ErrorAction SilentlyContinue
        if ($exists)
        {
            Trace-Warning "Unable to delete not needed file from system drive for $computerName"
        }

        $exists = Invoke-Command -Session $Session -ScriptBlock {Test-Path -Path "$env:windir\Panther\unattend.xml"} -ErrorAction SilentlyContinue
        if ($exists)
        {
            Trace-Warning "Unable to delete not needed file from panther location for $computerName"
        }

        Disable-LocalAdmins -Session $Session
        Set-BuildinUsers -Session $Session
    }
}


function Disable-LocalAdmins
{
    [CmdletBinding()]
    param(
        [System.Management.Automation.Runspaces.PSSession]
        $Session
    )

    Trace-Execution "Disabling local administrators on: $($Session.ComputerName)"

    $localAdmins = $null
    $localAdmins = Invoke-Command -Session $Session -ScriptBlock {(((Get-LocalGroupMember -SID "S-1-5-32-544") | ? {$_.PrincipalSource -eq "Local" -and $_.ObjectClass -eq "User"}).Name) | % {$_.split("\")[1]}} -ErrorAction SilentlyContinue
    if ($localAdmins)
    {
        Invoke-Command -Session $Session -ScriptBlock {Disable-LocalUser -Name $using:localAdmins -ErrorAction SilentlyContinue} -ErrorAction SilentlyContinue
        $adminsObjects = Invoke-Command -Session $Session -ScriptBlock {Get-LocalUser -Name $using:localAdmins -ErrorAction SilentlyContinue} -ErrorAction SilentlyContinue
        if ($true -in $adminsObjects.Enabled)
        {
            Trace-Warning "One or more local administrators are still enabled on: $($Session.ComputerName)"
        }
        else
        {
            Trace-Execution "Successfully force disabled local administrators on: $($Session.ComputerName)"
        }
    }
}

function Set-BuildinUsers
{
    [CmdletBinding()]
    param(
        [System.Management.Automation.Runspaces.PSSession]
        $Session
    )

    Trace-Execution "Disabling and renaming specific built-in users $($Session.ComputerName)"

    # Start with local built-in Administrator
    $builtinAdmin = Invoke-Command -Session $Session -ScriptBlock { Get-LocalUser |? {$_.SID -like "S-1-5-21-*-500"} }
    if ($builtinAdmin)
    {
        Invoke-Command -Session $Session -ScriptBlock {Rename-LocalUser -SID $using:builtinAdmin.SID -NewName LMASAdmin -ErrorAction SilentlyContinue} -ErrorAction SilentlyContinue
        Invoke-Command -Session $Session -ScriptBlock {Disable-LocalUser -SID $using:builtinAdmin.SID -ErrorAction SilentlyContinue} -ErrorAction SilentlyContinue
    }

    # built-in Guest
    $builtinGuest = Invoke-Command -Session $Session -ScriptBlock { Get-LocalUser |? {$_.SID -like "S-1-5-21-*-501"} }
    if ($builtinGuest)
    {
        Invoke-Command -Session $Session -ScriptBlock {Rename-LocalUser -SID $using:builtinGuest.SID -NewName LMASGuest -ErrorAction SilentlyContinue} -ErrorAction SilentlyContinue
        Invoke-Command -Session $Session -ScriptBlock {Disable-LocalUser -SID $using:builtinGuest.SID -ErrorAction SilentlyContinue} -ErrorAction SilentlyContinue
    }

    # built-in Guest
    $builtinDefaultAccount = Invoke-Command -Session $Session -ScriptBlock { Get-LocalUser |? {$_.SID -like "S-1-5-21-*-503"} }
    if ($builtinDefaultAccount)
    {
        Invoke-Command -Session $Session -ScriptBlock {Rename-LocalUser -SID $using:builtinDefaultAccount.SID -NewName LMASDefaultAccount -ErrorAction SilentlyContinue} -ErrorAction SilentlyContinue
        Invoke-Command -Session $Session -ScriptBlock {Disable-LocalUser -SID $using:builtinDefaultAccount.SID -ErrorAction SilentlyContinue} -ErrorAction SilentlyContinue
    }
}

function Set-AzsSecurityParam
{
    [CmdletBinding()]
    param()

    $ErrorActionPreference = "Stop"

    Trace-Execution "Creating/Updating AzsSecurity parameters"
    try
    {
        $eceImported = $false

        try
        {
            Trace-Execution "Trying: Import-Module -Name ECEClient"
            Import-Module -Name ECEClient -Verbose:$false -DisableNameChecking
            $eceImported = $true
        }
        catch
        {
            Trace-Execution "Failed Import-Module -Name ECEClient. Exception: $($_.Exception)"
        }

        if ($eceImported -eq $false)
        {
            try
            {
                Trace-Execution "Trying: Import-Module PSScriptRoot\..\ECEngine\EnterpriseCloudEngine.psd1"
                Trace-Execution "Trying: Import-Module PSScriptRoot\..\ECEServiceClient\ECEClient.psm1"
                Import-Module $PSScriptRoot\..\ECEngine\EnterpriseCloudEngine.psd1 -Force -DisableNameChecking
                Import-Module $PSScriptRoot\..\ECEServiceClient\ECEClient.psm1 -Force -DisableNameChecking
                $eceImported = $true
            }
            catch
            {
                Trace-Execution "Failed Import-Module ECEngine\EnterpriseCloudEngine.psd1 and ECEServiceClient\ECEClient.psm1. Exception $($_.Exception)"
            }
        }

        if ($eceImported -eq $false)
        {
            throw "Failed to import modules for ECE. Unable to check and/or modify required AzsSecurity AzureStackHardened, SkipSEDProtection and AzureStackEnhancedEncryptionMethod parameters"
        }

        $updateECEXml = $false
        $azsSecCategory = $null
        $azsHardenedParam = $null
        $skipSEDProtectParam = $null
        $azsEnhancedEncryptionMethodParam = $null

        $eceClient = Create-ECEClientWithApplicationGateway
        $eceXml = [XML]($eceClient.GetCloudParameters().getAwaiter().GetResult().CloudDefinitionAsXmlString)

        Trace-Execution "Check if AzsSecurity node exists in ECE xml"
        $azsSecCategory = $eceXml.SelectSingleNode("//Category[@Name='AzsSecurity']")
        if ($null -eq $azsSecCategory)
        {
            Trace-Execution "AzsSecurity node does not exist in ECE xml. Creating AzsSecurity node"
            $azsSecCategory = $ecexml.CreateElement("Category")
            $azsSecCategory.SetAttribute("Name", "AzsSecurity")
            $eceXml.SelectSingleNode("Parameters").AppendChild($azsSecCategory) | Out-Null
            $updateECEXml = $true
        }

        Trace-Execution "Check if AzureStackHardened parameter node exists in ECE xml"
        $azsHardenedParam = $eceXml.SelectSingleNode("//Parameter[@Name='AzureStackHardened']")
        if ($null -eq $azsHardenedParam)
        {
            Trace-Execution "AzureStackHardened parameter node does not exist in ECE xml. Creating AzureStackHardened parameter node"
            $azsHardenedParam = $eceXml.CreateElement("Parameter")
            $azsHardenedParam.SetAttribute("Name", "AzureStackHardened")
            $azsHardenedParam.SetAttribute("Type", "string")
            $azsHardenedParam.SetAttribute("Value", "Disabled")
            $azsHardenedParam.SetAttribute("AllowedValues", "")
            $azsHardenedParam.SetAttribute("Reference", "[{AzureStackHardened}]")
            $azsSecCategory.AppendChild($azsHardenedParam) | Out-Null
            $updateECEXml = $true
        }

        Trace-Execution "Get AzureStackHardened parameter value from ECE xml"
        $azsHardenedParamValue = $azsHardenedParam.Value
        Trace-Execution "AzureStackHardened parameter value from ECE xml is: $azsHardenedParamValue"
        if ([string]::IsNullOrEmpty($azsHardenedParamValue))
        {
            Trace-Execution "AzureStackHardened parameter value from ECE xml is null or empty. Setting value to Disabled"
            $azsHardenedParam.SetAttribute("Value", "Disabled")
            $azsHardenedParam.SetAttribute("AllowedValues", "")
            $azsHardenedParam.SetAttribute("Reference", "[{AzureStackHardened}]")
            $updateECEXml = $true
        }

        Trace-Execution "Check if SkipSEDProtection parameter node exists in ECE xml"
        $skipSEDProtectParam = $eceXml.SelectSingleNode("//Parameter[@Name='SkipSEDProtection']")
        if ($null -eq $skipSEDProtectParam)
        {
            Trace-Execution "SkipSEDProtection parameter node does not exist in ECE xml. Creating SkipSEDProtection parameter node"
            $skipSEDProtectParam = $eceXml.CreateElement("Parameter")
            $skipSEDProtectParam.SetAttribute("Name", "SkipSEDProtection")
            $skipSEDProtectParam.SetAttribute("Type", "string")
            $skipSEDProtectParam.SetAttribute("Value", "Disabled")
            $skipSEDProtectParam.SetAttribute("AllowedValues", "")
            $skipSEDProtectParam.SetAttribute("Reference", "[{SkipSEDProtection}]")
            $azsSecCategory.AppendChild($skipSEDProtectParam) | Out-Null
            $updateECEXml = $true
        }

        Trace-Execution "Get SkipSEDProtection parameter value from ECE xml"
        $skipSEDProtectParamValue = $skipSEDProtectParam.Value
        Trace-Execution "SkipSEDProtection parameter value from ECE xml is: $skipSEDProtectParamValue"
        if ([string]::IsNullOrEmpty($skipSEDProtectParamValue))
        {
            Trace-Execution "SkipSEDProtection parameter value from ECE xml is null or empty. Setting value to Disabled"
            $skipSEDProtectParam.SetAttribute("Value", "Disabled")
            $skipSEDProtectParam.SetAttribute("AllowedValues", "")
            $skipSEDProtectParam.SetAttribute("Reference", "[{SkipSEDProtection}]")
            $updateECEXml = $true
        }

        Trace-Execution "Check if AzureStackEnhancedEncryptionMethod parameter node exists in ECE xml"
        $azsEnhancedEncryptionMethodParam = $eceXml.SelectSingleNode("//Parameter[@Name='AzureStackEnhancedEncryptionMethod']")
        if ($null -eq $azsEnhancedEncryptionMethodParam)
        {
            Trace-Execution "AzureStackEnhancedEncryptionMethod parameter node does not exist in ECE xml. Creating AzureStackEnhancedEncryptionMethod parameter node"
            $azsEnhancedEncryptionMethodParam = $eceXml.CreateElement("Parameter")
            $azsEnhancedEncryptionMethodParam.SetAttribute("Name", "AzureStackEnhancedEncryptionMethod")
            $azsEnhancedEncryptionMethodParam.SetAttribute("Type", "string")
            $azsEnhancedEncryptionMethodParam.SetAttribute("Value", "")
            $azsEnhancedEncryptionMethodParam.SetAttribute("AllowedValues", "")
            $azsEnhancedEncryptionMethodParam.SetAttribute("Reference", "[{AzureStackEnhancedEncryptionMethod}]")
            $azsSecCategory.AppendChild($azsEnhancedEncryptionMethodParam) | Out-Null
            $updateECEXml = $true
        }

        if ($updateECEXml)
        {
            Trace-Execution "Updating ECE xml with AzsSecurity parameters"
            $eceCloudParametersDefinition = New-Object Microsoft.AzureStack.Solution.Deploy.EnterpriseCloudEngine.Controllers.Models.CloudDefinitionDescription
            $eceCloudParametersDefinition.ConfigurationName = 'AzureStack'
            $eceCloudParametersDefinition.CloudDefinitionAsXmlString = $eceXml.OuterXml
            $null = $eceClient.ImportCloudParameters($eceCloudParametersDefinition).GetAwaiter().GetResult()
            Trace-Execution "Created\updated AzsSecurity category with AzsSecurity parameters"
        }
    }
    catch
    {
        Trace-Execution "Failed to create/update AzsSecurity category with AzsSecurity parameters in ECE. Exception: $($_.Exception)"
        throw
    }
}

function Update-AzsSecurityParam
{
    [CmdletBinding()]
    Param
    (
        [Parameter(Mandatory = $true)]
        [string]
        $Name,

        [Parameter(Mandatory = $true)]
        [string]
        $Value,

        [Parameter(Mandatory = $true)]
        [string]
        $Reference
    )

    $ErrorActionPreference = "Stop"

    Trace-Execution "Update security parameter $Name in ECE"

    Import-Module -Name ECEClient -Verbose:$false -DisableNameChecking
    $eceClient = Create-ECEClientWithServiceResolver
    $eceXml = [XML]$eceClient.GetCloudParameters().GetAwaiter().GetResult().CloudDefinitionAsXmlString

    $needUpdate = $true

    $azsSecCategory = $eceXml.SelectSingleNode("//Category[@Name='AzsSecurity']")
    $parameter = $eceXml.SelectSingleNode("//Parameter[@Name='$Name']")
    if ($null -eq $parameter)
    {
        Trace-Execution "$Name parameter node does not exist in ECE xml. Creating $Name parameter node"
        $parameter = $eceXml.CreateElement("Parameter")
        $parameter.SetAttribute("Name", $Name)
        $parameter.SetAttribute("Type", "string")
        $parameter.SetAttribute("Value", $Value)
        $parameter.SetAttribute("AllowedValues", "")
        $parameter.SetAttribute("Reference", "[{$Reference}]")
        $azsSecCategory.AppendChild($parameter) | Out-Null
    }
    else
    {
        if ($Value -eq $parameter.Value)
        {
            $needUpdate = $false
            Trace-Execution "No need to update Security parameter $Name updated in ECE"
        }
        else
        {
            $parameter.SetAttribute("Value", $Value)
        }
    }

    if ($needUpdate)
    {
        $eceCloudParametersDefinition = New-Object Microsoft.AzureStack.Solution.Deploy.EnterpriseCloudEngine.Controllers.Models.CloudDefinitionDescription
        $eceCloudParametersDefinition.ConfigurationName = 'AzureStack'
        $eceCloudParametersDefinition.CloudDefinitionAsXmlString = $eceXml.OuterXml
        $null = $eceClient.ImportCloudParameters($eceCloudParametersDefinition).GetAwaiter().GetResult()

        Trace-Execution "Security parameter $Name updated in ECE"
    }
    
}

Export-ModuleMember -Function Get-DisableSecureBootOnInfraVms
Export-ModuleMember -Function Clear-SecurityItem
Export-ModuleMember -Function Set-AzsSecurityParam
Export-ModuleMember -Function Update-AzsSecurityParam

# SIG # Begin signature block
# MIIoLQYJKoZIhvcNAQcCoIIoHjCCKBoCAQExDzANBglghkgBZQMEAgEFADB5Bgor
# BgEEAYI3AgEEoGswaTA0BgorBgEEAYI3AgEeMCYCAwEAAAQQH8w7YFlLCE63JNLG
# KX7zUQIBAAIBAAIBAAIBAAIBADAxMA0GCWCGSAFlAwQCAQUABCDDcERv5QPcvOjm
# GArCioMHysRd5pn3CZ0GIikEYN9tO6CCDXYwggX0MIID3KADAgECAhMzAAADTrU8
# esGEb+srAAAAAANOMA0GCSqGSIb3DQEBCwUAMH4xCzAJBgNVBAYTAlVTMRMwEQYD
# VQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNy
# b3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNpZ25p
# bmcgUENBIDIwMTEwHhcNMjMwMzE2MTg0MzI5WhcNMjQwMzE0MTg0MzI5WjB0MQsw
# CQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9u
# ZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMR4wHAYDVQQDExVNaWNy
# b3NvZnQgQ29ycG9yYXRpb24wggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIB
# AQDdCKiNI6IBFWuvJUmf6WdOJqZmIwYs5G7AJD5UbcL6tsC+EBPDbr36pFGo1bsU
# p53nRyFYnncoMg8FK0d8jLlw0lgexDDr7gicf2zOBFWqfv/nSLwzJFNP5W03DF/1
# 1oZ12rSFqGlm+O46cRjTDFBpMRCZZGddZlRBjivby0eI1VgTD1TvAdfBYQe82fhm
# WQkYR/lWmAK+vW/1+bO7jHaxXTNCxLIBW07F8PBjUcwFxxyfbe2mHB4h1L4U0Ofa
# +HX/aREQ7SqYZz59sXM2ySOfvYyIjnqSO80NGBaz5DvzIG88J0+BNhOu2jl6Dfcq
# jYQs1H/PMSQIK6E7lXDXSpXzAgMBAAGjggFzMIIBbzAfBgNVHSUEGDAWBgorBgEE
# AYI3TAgBBggrBgEFBQcDAzAdBgNVHQ4EFgQUnMc7Zn/ukKBsBiWkwdNfsN5pdwAw
# RQYDVR0RBD4wPKQ6MDgxHjAcBgNVBAsTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEW
# MBQGA1UEBRMNMjMwMDEyKzUwMDUxNjAfBgNVHSMEGDAWgBRIbmTlUAXTgqoXNzci
# tW2oynUClTBUBgNVHR8ETTBLMEmgR6BFhkNodHRwOi8vd3d3Lm1pY3Jvc29mdC5j
# b20vcGtpb3BzL2NybC9NaWNDb2RTaWdQQ0EyMDExXzIwMTEtMDctMDguY3JsMGEG
# CCsGAQUFBwEBBFUwUzBRBggrBgEFBQcwAoZFaHR0cDovL3d3dy5taWNyb3NvZnQu
# Y29tL3BraW9wcy9jZXJ0cy9NaWNDb2RTaWdQQ0EyMDExXzIwMTEtMDctMDguY3J0
# MAwGA1UdEwEB/wQCMAAwDQYJKoZIhvcNAQELBQADggIBAD21v9pHoLdBSNlFAjmk
# mx4XxOZAPsVxxXbDyQv1+kGDe9XpgBnT1lXnx7JDpFMKBwAyIwdInmvhK9pGBa31
# TyeL3p7R2s0L8SABPPRJHAEk4NHpBXxHjm4TKjezAbSqqbgsy10Y7KApy+9UrKa2
# kGmsuASsk95PVm5vem7OmTs42vm0BJUU+JPQLg8Y/sdj3TtSfLYYZAaJwTAIgi7d
# hzn5hatLo7Dhz+4T+MrFd+6LUa2U3zr97QwzDthx+RP9/RZnur4inzSQsG5DCVIM
# pA1l2NWEA3KAca0tI2l6hQNYsaKL1kefdfHCrPxEry8onJjyGGv9YKoLv6AOO7Oh
# JEmbQlz/xksYG2N/JSOJ+QqYpGTEuYFYVWain7He6jgb41JbpOGKDdE/b+V2q/gX
# UgFe2gdwTpCDsvh8SMRoq1/BNXcr7iTAU38Vgr83iVtPYmFhZOVM0ULp/kKTVoir
# IpP2KCxT4OekOctt8grYnhJ16QMjmMv5o53hjNFXOxigkQWYzUO+6w50g0FAeFa8
# 5ugCCB6lXEk21FFB1FdIHpjSQf+LP/W2OV/HfhC3uTPgKbRtXo83TZYEudooyZ/A
# Vu08sibZ3MkGOJORLERNwKm2G7oqdOv4Qj8Z0JrGgMzj46NFKAxkLSpE5oHQYP1H
# tPx1lPfD7iNSbJsP6LiUHXH1MIIHejCCBWKgAwIBAgIKYQ6Q0gAAAAAAAzANBgkq
# hkiG9w0BAQsFADCBiDELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24x
# EDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlv
# bjEyMDAGA1UEAxMpTWljcm9zb2Z0IFJvb3QgQ2VydGlmaWNhdGUgQXV0aG9yaXR5
# IDIwMTEwHhcNMTEwNzA4MjA1OTA5WhcNMjYwNzA4MjEwOTA5WjB+MQswCQYDVQQG
# EwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwG
# A1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSgwJgYDVQQDEx9NaWNyb3NvZnQg
# Q29kZSBTaWduaW5nIFBDQSAyMDExMIICIjANBgkqhkiG9w0BAQEFAAOCAg8AMIIC
# CgKCAgEAq/D6chAcLq3YbqqCEE00uvK2WCGfQhsqa+laUKq4BjgaBEm6f8MMHt03
# a8YS2AvwOMKZBrDIOdUBFDFC04kNeWSHfpRgJGyvnkmc6Whe0t+bU7IKLMOv2akr
# rnoJr9eWWcpgGgXpZnboMlImEi/nqwhQz7NEt13YxC4Ddato88tt8zpcoRb0Rrrg
# OGSsbmQ1eKagYw8t00CT+OPeBw3VXHmlSSnnDb6gE3e+lD3v++MrWhAfTVYoonpy
# 4BI6t0le2O3tQ5GD2Xuye4Yb2T6xjF3oiU+EGvKhL1nkkDstrjNYxbc+/jLTswM9
# sbKvkjh+0p2ALPVOVpEhNSXDOW5kf1O6nA+tGSOEy/S6A4aN91/w0FK/jJSHvMAh
# dCVfGCi2zCcoOCWYOUo2z3yxkq4cI6epZuxhH2rhKEmdX4jiJV3TIUs+UsS1Vz8k
# A/DRelsv1SPjcF0PUUZ3s/gA4bysAoJf28AVs70b1FVL5zmhD+kjSbwYuER8ReTB
# w3J64HLnJN+/RpnF78IcV9uDjexNSTCnq47f7Fufr/zdsGbiwZeBe+3W7UvnSSmn
# Eyimp31ngOaKYnhfsi+E11ecXL93KCjx7W3DKI8sj0A3T8HhhUSJxAlMxdSlQy90
# lfdu+HggWCwTXWCVmj5PM4TasIgX3p5O9JawvEagbJjS4NaIjAsCAwEAAaOCAe0w
# ggHpMBAGCSsGAQQBgjcVAQQDAgEAMB0GA1UdDgQWBBRIbmTlUAXTgqoXNzcitW2o
# ynUClTAZBgkrBgEEAYI3FAIEDB4KAFMAdQBiAEMAQTALBgNVHQ8EBAMCAYYwDwYD
# VR0TAQH/BAUwAwEB/zAfBgNVHSMEGDAWgBRyLToCMZBDuRQFTuHqp8cx0SOJNDBa
# BgNVHR8EUzBRME+gTaBLhklodHRwOi8vY3JsLm1pY3Jvc29mdC5jb20vcGtpL2Ny
# bC9wcm9kdWN0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFfMDNfMjIuY3JsMF4GCCsG
# AQUFBwEBBFIwUDBOBggrBgEFBQcwAoZCaHR0cDovL3d3dy5taWNyb3NvZnQuY29t
# L3BraS9jZXJ0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFfMDNfMjIuY3J0MIGfBgNV
# HSAEgZcwgZQwgZEGCSsGAQQBgjcuAzCBgzA/BggrBgEFBQcCARYzaHR0cDovL3d3
# dy5taWNyb3NvZnQuY29tL3BraW9wcy9kb2NzL3ByaW1hcnljcHMuaHRtMEAGCCsG
# AQUFBwICMDQeMiAdAEwAZQBnAGEAbABfAHAAbwBsAGkAYwB5AF8AcwB0AGEAdABl
# AG0AZQBuAHQALiAdMA0GCSqGSIb3DQEBCwUAA4ICAQBn8oalmOBUeRou09h0ZyKb
# C5YR4WOSmUKWfdJ5DJDBZV8uLD74w3LRbYP+vj/oCso7v0epo/Np22O/IjWll11l
# hJB9i0ZQVdgMknzSGksc8zxCi1LQsP1r4z4HLimb5j0bpdS1HXeUOeLpZMlEPXh6
# I/MTfaaQdION9MsmAkYqwooQu6SpBQyb7Wj6aC6VoCo/KmtYSWMfCWluWpiW5IP0
# wI/zRive/DvQvTXvbiWu5a8n7dDd8w6vmSiXmE0OPQvyCInWH8MyGOLwxS3OW560
# STkKxgrCxq2u5bLZ2xWIUUVYODJxJxp/sfQn+N4sOiBpmLJZiWhub6e3dMNABQam
# ASooPoI/E01mC8CzTfXhj38cbxV9Rad25UAqZaPDXVJihsMdYzaXht/a8/jyFqGa
# J+HNpZfQ7l1jQeNbB5yHPgZ3BtEGsXUfFL5hYbXw3MYbBL7fQccOKO7eZS/sl/ah
# XJbYANahRr1Z85elCUtIEJmAH9AAKcWxm6U/RXceNcbSoqKfenoi+kiVH6v7RyOA
# 9Z74v2u3S5fi63V4GuzqN5l5GEv/1rMjaHXmr/r8i+sLgOppO6/8MO0ETI7f33Vt
# Y5E90Z1WTk+/gFcioXgRMiF670EKsT/7qMykXcGhiJtXcVZOSEXAQsmbdlsKgEhr
# /Xmfwb1tbWrJUnMTDXpQzTGCGg0wghoJAgEBMIGVMH4xCzAJBgNVBAYTAlVTMRMw
# EQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVN
# aWNyb3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNp
# Z25pbmcgUENBIDIwMTECEzMAAANOtTx6wYRv6ysAAAAAA04wDQYJYIZIAWUDBAIB
# BQCgga4wGQYJKoZIhvcNAQkDMQwGCisGAQQBgjcCAQQwHAYKKwYBBAGCNwIBCzEO
# MAwGCisGAQQBgjcCARUwLwYJKoZIhvcNAQkEMSIEIJlvPwlkS6yH/w5X8KX+DTL9
# qcdKAAUUwlVl9ylUJEV9MEIGCisGAQQBgjcCAQwxNDAyoBSAEgBNAGkAYwByAG8A
# cwBvAGYAdKEagBhodHRwOi8vd3d3Lm1pY3Jvc29mdC5jb20wDQYJKoZIhvcNAQEB
# BQAEggEAKGgE2niYcLEv6Cm6x2gUB1x9fQqwLUgdTBD/D2YJMLdqsLUTEDNsTYIp
# kQcD4NYprMjgKo11fBIQlzh4G7pu61dHUFg4BSTXN1Ghf6I+N9LuDmHir+H8j+bt
# Tk9BLG648zUNovmMWKT08/K7bI2cOsZV49yq2j7rL1uSEM79G3PnnyzLLBssMhZM
# ldRcE2B2dJBkFdqVkB92KWD8MLXWd29wvCIvSz+DOEsqHPccufY1YANMjRJX1U0t
# Bmvg9VZv5G1zB3cQ+hZrqsEsV/aHjiy+TD94pqMTnFVEABOmuU208G3xxbtSUtfs
# BKmVuxGENHRBhvx6fhIK80tfW2RMFKGCF5cwgheTBgorBgEEAYI3AwMBMYIXgzCC
# F38GCSqGSIb3DQEHAqCCF3AwghdsAgEDMQ8wDQYJYIZIAWUDBAIBBQAwggFSBgsq
# hkiG9w0BCRABBKCCAUEEggE9MIIBOQIBAQYKKwYBBAGEWQoDATAxMA0GCWCGSAFl
# AwQCAQUABCA1ZbFFEQ77bHL+ME5ZCdRxRL9d312qjeG9uuQFJz+URQIGZQPePKjF
# GBMyMDIzMDkyMjA4MzIwMC4yODZaMASAAgH0oIHRpIHOMIHLMQswCQYDVQQGEwJV
# UzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UE
# ChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSUwIwYDVQQLExxNaWNyb3NvZnQgQW1l
# cmljYSBPcGVyYXRpb25zMScwJQYDVQQLEx5uU2hpZWxkIFRTUyBFU046QTkzNS0w
# M0UwLUQ5NDcxJTAjBgNVBAMTHE1pY3Jvc29mdCBUaW1lLVN0YW1wIFNlcnZpY2Wg
# ghHtMIIHIDCCBQigAwIBAgITMwAAAdGyW0AobC7SRQABAAAB0TANBgkqhkiG9w0B
# AQsFADB8MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UE
# BxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSYwJAYD
# VQQDEx1NaWNyb3NvZnQgVGltZS1TdGFtcCBQQ0EgMjAxMDAeFw0yMzA1MjUxOTEy
# MThaFw0yNDAyMDExOTEyMThaMIHLMQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2Fz
# aGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENv
# cnBvcmF0aW9uMSUwIwYDVQQLExxNaWNyb3NvZnQgQW1lcmljYSBPcGVyYXRpb25z
# MScwJQYDVQQLEx5uU2hpZWxkIFRTUyBFU046QTkzNS0wM0UwLUQ5NDcxJTAjBgNV
# BAMTHE1pY3Jvc29mdCBUaW1lLVN0YW1wIFNlcnZpY2UwggIiMA0GCSqGSIb3DQEB
# AQUAA4ICDwAwggIKAoICAQCZTNo0OeGz2XFd2gLg5nTlBm8XOpuwJIiXsMU61rwq
# 1ZKDpa443RrSG/pH8Gz6XNnFQKGnCqNCtmvoKULApwrT/s7/e1X0lNFKmj7U7X4p
# 00S0uQbW6LwSn/zWHaG2c54ZXsGY+BYfhWDgbFpCTxRzTnRCG62bkWPp6ZHbZPg4
# Ht1CRCAMhhOGTR8wI4G7wwWZwdMc6UvUUlq0ql9AxAfzkYRpi2tRvDHMdmZ3vyXp
# qhFwvRG8cgCH/TTCjW5q6aNbdqKL3BFDPzUtuCNsPXL3/E0dR2bDMqa0aNH+iIfh
# GC4/vcwuteOMCPUIDVSqDCNfIaPDEwYci1fd9gu1zVw+HEhDZM7Ea3nxIUrzt+Rf
# p5ToMMj4QAmJ6Uadm+TPbDbo8kFIK70ShmW8wn8fJk9ReQQEpTtIN43eRv9QmXy3
# Ued80osOBE+WkdMvSCFh+qgCsKdzQxQJG62cTeoU2eqNhH3oppXmyfVUwbsefQzM
# PtbinCZd0FUlmlM/dH+4OniqQyaHvrtYy3wqIafY3zeFITlVAoP9q9vF4W7KHR/u
# F0mvTpAL5NaTDN1plQS0MdjMkgzZK5gtwqOe/3rTlqBzxwa7YYp3urP5yWkTzISG
# nhNWIZOxOyQIOxZfbiIbAHbm3M8hj73KQWcCR5JavgkwUmncFHESaQf4Drqs+/1L
# 1QIDAQABo4IBSTCCAUUwHQYDVR0OBBYEFAuO8UzF7DcH0mmsF4XQxxHQvS2jMB8G
# A1UdIwQYMBaAFJ+nFV0AXmJdg/Tl0mWnG1M1GelyMF8GA1UdHwRYMFYwVKBSoFCG
# Tmh0dHA6Ly93d3cubWljcm9zb2Z0LmNvbS9wa2lvcHMvY3JsL01pY3Jvc29mdCUy
# MFRpbWUtU3RhbXAlMjBQQ0ElMjAyMDEwKDEpLmNybDBsBggrBgEFBQcBAQRgMF4w
# XAYIKwYBBQUHMAKGUGh0dHA6Ly93d3cubWljcm9zb2Z0LmNvbS9wa2lvcHMvY2Vy
# dHMvTWljcm9zb2Z0JTIwVGltZS1TdGFtcCUyMFBDQSUyMDIwMTAoMSkuY3J0MAwG
# A1UdEwEB/wQCMAAwFgYDVR0lAQH/BAwwCgYIKwYBBQUHAwgwDgYDVR0PAQH/BAQD
# AgeAMA0GCSqGSIb3DQEBCwUAA4ICAQCbu9rTAHV24mY0qoG5eEnImz5akGXTviBw
# Kp2Y51s26w8oDrWor+m00R4/3BcDmYlUK8Nrx/auYFYidZddcUjw42QxSStmv/qW
# nCQi/2OnH32KVHQ+kMOZPABQTG1XkcnYPUOOEEor6f/3Js1uj4wjHzE4V4aumYXB
# Asr4L5KR8vKes5tFxhMkWND/O7W/RaHYwJMjMkxVosBok7V21sJAlxScEXxfJa+/
# qkqUr7CZgw3R4jCHRkPqQhMWibXPMYar/iF0ZuLB9O89DMJNhjK9BSf6iqgZoMuz
# IVt+EBoTzpv/9p4wQ6xoBCs29mkj/EIWFdc+5a30kuCQOSEOj07+WI29A4k6QIRB
# 5w+eMmZ0Jec0sSyeQB5KjxE51iYMhtlMrUKcr06nBqCsSKPYsSAITAzgssJD+Z/c
# TS7Cu35fJrWhM9NYX24uAxYLAW0ipNtWptIeV6akuZEeEV6BNtM3VTk+mAlV5/eC
# /0Y17aVSjK5/gyDoLNmrgVwv5TAaBmq/wgRRFHmW9UJ3zv8Lmk6mIoAyTpqBbuUj
# MLyrtajuSsA/m2DnKMO0Qiz1v+FSVbqM38J/PTlhCTUbFOx0kLT7Y/7+ZyrilVCz
# yAYfFIinDIjWlM85tDeU8ZfJCjFKwq3DsRxV4JY18xww8TTmod3lkr9NqGQ54Lmy
# PVc+5ibNrjCCB3EwggVZoAMCAQICEzMAAAAVxedrngKbSZkAAAAAABUwDQYJKoZI
# hvcNAQELBQAwgYgxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAw
# DgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRpb24x
# MjAwBgNVBAMTKU1pY3Jvc29mdCBSb290IENlcnRpZmljYXRlIEF1dGhvcml0eSAy
# MDEwMB4XDTIxMDkzMDE4MjIyNVoXDTMwMDkzMDE4MzIyNVowfDELMAkGA1UEBhMC
# VVMxEzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNV
# BAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEmMCQGA1UEAxMdTWljcm9zb2Z0IFRp
# bWUtU3RhbXAgUENBIDIwMTAwggIiMA0GCSqGSIb3DQEBAQUAA4ICDwAwggIKAoIC
# AQDk4aZM57RyIQt5osvXJHm9DtWC0/3unAcH0qlsTnXIyjVX9gF/bErg4r25Phdg
# M/9cT8dm95VTcVrifkpa/rg2Z4VGIwy1jRPPdzLAEBjoYH1qUoNEt6aORmsHFPPF
# dvWGUNzBRMhxXFExN6AKOG6N7dcP2CZTfDlhAnrEqv1yaa8dq6z2Nr41JmTamDu6
# GnszrYBbfowQHJ1S/rboYiXcag/PXfT+jlPP1uyFVk3v3byNpOORj7I5LFGc6XBp
# Dco2LXCOMcg1KL3jtIckw+DJj361VI/c+gVVmG1oO5pGve2krnopN6zL64NF50Zu
# yjLVwIYwXE8s4mKyzbnijYjklqwBSru+cakXW2dg3viSkR4dPf0gz3N9QZpGdc3E
# XzTdEonW/aUgfX782Z5F37ZyL9t9X4C626p+Nuw2TPYrbqgSUei/BQOj0XOmTTd0
# lBw0gg/wEPK3Rxjtp+iZfD9M269ewvPV2HM9Q07BMzlMjgK8QmguEOqEUUbi0b1q
# GFphAXPKZ6Je1yh2AuIzGHLXpyDwwvoSCtdjbwzJNmSLW6CmgyFdXzB0kZSU2LlQ
# +QuJYfM2BjUYhEfb3BvR/bLUHMVr9lxSUV0S2yW6r1AFemzFER1y7435UsSFF5PA
# PBXbGjfHCBUYP3irRbb1Hode2o+eFnJpxq57t7c+auIurQIDAQABo4IB3TCCAdkw
# EgYJKwYBBAGCNxUBBAUCAwEAATAjBgkrBgEEAYI3FQIEFgQUKqdS/mTEmr6CkTxG
# NSnPEP8vBO4wHQYDVR0OBBYEFJ+nFV0AXmJdg/Tl0mWnG1M1GelyMFwGA1UdIARV
# MFMwUQYMKwYBBAGCN0yDfQEBMEEwPwYIKwYBBQUHAgEWM2h0dHA6Ly93d3cubWlj
# cm9zb2Z0LmNvbS9wa2lvcHMvRG9jcy9SZXBvc2l0b3J5Lmh0bTATBgNVHSUEDDAK
# BggrBgEFBQcDCDAZBgkrBgEEAYI3FAIEDB4KAFMAdQBiAEMAQTALBgNVHQ8EBAMC
# AYYwDwYDVR0TAQH/BAUwAwEB/zAfBgNVHSMEGDAWgBTV9lbLj+iiXGJo0T2UkFvX
# zpoYxDBWBgNVHR8ETzBNMEugSaBHhkVodHRwOi8vY3JsLm1pY3Jvc29mdC5jb20v
# cGtpL2NybC9wcm9kdWN0cy9NaWNSb29DZXJBdXRfMjAxMC0wNi0yMy5jcmwwWgYI
# KwYBBQUHAQEETjBMMEoGCCsGAQUFBzAChj5odHRwOi8vd3d3Lm1pY3Jvc29mdC5j
# b20vcGtpL2NlcnRzL01pY1Jvb0NlckF1dF8yMDEwLTA2LTIzLmNydDANBgkqhkiG
# 9w0BAQsFAAOCAgEAnVV9/Cqt4SwfZwExJFvhnnJL/Klv6lwUtj5OR2R4sQaTlz0x
# M7U518JxNj/aZGx80HU5bbsPMeTCj/ts0aGUGCLu6WZnOlNN3Zi6th542DYunKmC
# VgADsAW+iehp4LoJ7nvfam++Kctu2D9IdQHZGN5tggz1bSNU5HhTdSRXud2f8449
# xvNo32X2pFaq95W2KFUn0CS9QKC/GbYSEhFdPSfgQJY4rPf5KYnDvBewVIVCs/wM
# nosZiefwC2qBwoEZQhlSdYo2wh3DYXMuLGt7bj8sCXgU6ZGyqVvfSaN0DLzskYDS
# PeZKPmY7T7uG+jIa2Zb0j/aRAfbOxnT99kxybxCrdTDFNLB62FD+CljdQDzHVG2d
# Y3RILLFORy3BFARxv2T5JL5zbcqOCb2zAVdJVGTZc9d/HltEAY5aGZFrDZ+kKNxn
# GSgkujhLmm77IVRrakURR6nxt67I6IleT53S0Ex2tVdUCbFpAUR+fKFhbHP+Crvs
# QWY9af3LwUFJfn6Tvsv4O+S3Fb+0zj6lMVGEvL8CwYKiexcdFYmNcP7ntdAoGokL
# jzbaukz5m/8K6TT4JDVnK+ANuOaMmdbhIurwJ0I9JZTmdHRbatGePu1+oDEzfbzL
# 6Xu/OHBE0ZDxyKs6ijoIYn/ZcGNTTY3ugm2lBRDBcQZqELQdVTNYs6FwZvKhggNQ
# MIICOAIBATCB+aGB0aSBzjCByzELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hp
# bmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jw
# b3JhdGlvbjElMCMGA1UECxMcTWljcm9zb2Z0IEFtZXJpY2EgT3BlcmF0aW9uczEn
# MCUGA1UECxMeblNoaWVsZCBUU1MgRVNOOkE5MzUtMDNFMC1EOTQ3MSUwIwYDVQQD
# ExxNaWNyb3NvZnQgVGltZS1TdGFtcCBTZXJ2aWNloiMKAQEwBwYFKw4DAhoDFQBH
# JY2Fv+GhLQtRDR2vIzBaSv/7LKCBgzCBgKR+MHwxCzAJBgNVBAYTAlVTMRMwEQYD
# VQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNy
# b3NvZnQgQ29ycG9yYXRpb24xJjAkBgNVBAMTHU1pY3Jvc29mdCBUaW1lLVN0YW1w
# IFBDQSAyMDEwMA0GCSqGSIb3DQEBCwUAAgUA6LeWnzAiGA8yMDIzMDkyMjA0Mjkx
# OVoYDzIwMjMwOTIzMDQyOTE5WjB3MD0GCisGAQQBhFkKBAExLzAtMAoCBQDot5af
# AgEAMAoCAQACAhb0AgH/MAcCAQACAhKDMAoCBQDouOgfAgEAMDYGCisGAQQBhFkK
# BAIxKDAmMAwGCisGAQQBhFkKAwKgCjAIAgEAAgMHoSChCjAIAgEAAgMBhqAwDQYJ
# KoZIhvcNAQELBQADggEBAMMZorCacoCGWONUA0UprCJrLvLeTJ4b44I+sLVpt09M
# liZFEw+lydZaB5kgmnaYEqCJQTlzvUEwmhjJPkbJQpMwlHCO56rbfNUy6NeL+ry/
# 0k+6/jVsktnFGB/bThmMKLqURQwRSjL9B/EAZK1weD7uaWj+WfAK70+UHnykQaTb
# qKDjRh8/PmFyzQ+v7STwmuB1DGuZySfYfvL9TSUrf9HkzF7zW/Nsr22psW7w9FfI
# ueH7ZDfksQsYTJuUWooeJf+V52ZFUo/l6hi82XIFVnj0H35uMoroyH2K52hRA72m
# yhrZs64BZ33zNaxyAkj/TR0oLZORGQvAac7WrnibMxUxggQNMIIECQIBATCBkzB8
# MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVk
# bW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSYwJAYDVQQDEx1N
# aWNyb3NvZnQgVGltZS1TdGFtcCBQQ0EgMjAxMAITMwAAAdGyW0AobC7SRQABAAAB
# 0TANBglghkgBZQMEAgEFAKCCAUowGgYJKoZIhvcNAQkDMQ0GCyqGSIb3DQEJEAEE
# MC8GCSqGSIb3DQEJBDEiBCBWtrWNu4xhmH29R47Ks/JQlvSCbicboQf3oG8XgKgm
# sTCB+gYLKoZIhvcNAQkQAi8xgeowgecwgeQwgb0EIMy8YXkCALv57c5sRhrPTub1
# q4TwJ6oVA36k8IiI/AcMMIGYMIGApH4wfDELMAkGA1UEBhMCVVMxEzARBgNVBAgT
# Cldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29m
# dCBDb3Jwb3JhdGlvbjEmMCQGA1UEAxMdTWljcm9zb2Z0IFRpbWUtU3RhbXAgUENB
# IDIwMTACEzMAAAHRsltAKGwu0kUAAQAAAdEwIgQgvPNc74y+0hlzLzQQhN//sdFX
# fKbYz0wCrq96EjDDf4AwDQYJKoZIhvcNAQELBQAEggIAXZ0Bz3kRVnxjAwfOswI4
# WGpYQ0w8rvfZ5lT73IC5cgNVGgolmeTH0jApUlXl7g3C8rA67E8g/zBR1gb3YSMy
# Yzq2uCYHfZI25NEidw4RZBRa0NXBoz9mjJbP84B4NXgn9mLaQKIQKf7BOcHN8cTi
# P6+JGscctNfIfg8Dunnk4hiGL282V85xQ/lqT/rpZAzq2w17A27NDSJLcRXKl07v
# nU03d56Siy9rwMLNlJ/jCbN9XBrv8QCcByQshkuv+ds2JoRNjMpQ9AeRHZVdT1Fg
# qiZ2YMLtGUVyZmThMvgPjEgOV3rh8k/glg43ZyyHfJbLYcBhcZhpqWvoxhN3aACY
# YlkFb3ayplPHIuUt86WEnNNUuGxccdI3aTPrT9CrkiEscExwoOqc4fANaf9N7E3U
# JlLm1rMgmJBDHYxWU8oCdid6WTsybhn1t6aJG9aCCv3jhep3xZl67d59m6kPH0ZO
# yIdZqXvDTJuxsevBkGxXRLHaDW/KTQ/UiYNKd0JeWdTfQSAkPUIuKvciR7+fpgSc
# VZmfWd1/SbqSTO0CLdskq1Mh12ijqEGBpzW637IvNrnm4fi2hT0vQDyByWZm2/HS
# EWRM7SnEjfnOZi3eyd0H52zixYGea3nOLYa5gs+Q0nqWb2voQ9zMCc6z/ZR/L11u
# LG4mQHZo31Kdgf1wYTHLI5A=
# SIG # End signature block