MZ@ !L!This program cannot be run in DOS mode. $Rؕ3}3}3}H̴3}H̱3}Rich3}PEL!  F` @D.rsrcPF@@00NH `x@     X!!|.DPMOFDATAMSV1_0MUIFOMBpDS}TRB?B !0(K &&@$ 0/@l 0-1 Ie@ȣx D 6D '& P%(cDE bo,E8qAc {HTMNŕxTaO` Z <^cPYPD"u d'SP^ r )D^ar,4 CO[&BD;, %z(D8&1axq0#Duh&hR8chQH  Ώ ə]~YBg+GlH`M~ ?;/l8 ATdp`pbE9#]!B]R:B!S'TAA:0DLPx8ķPw_i!v<uczxqO$sK{1M Kșz5hP#D=(aGzQJ@7wap)!zؒ 4`Q?|1Pc8XO Yȷ c8ň1X6젞l|~yNPan<6Iم)e:s BaPG!J?^0ܓ?i|g8<,(#fr^|aPqoQ`1پhc FCFf/-> oq:ᱱ1D~sFq x7 `y|G{_qB'hG#ゎ}OL!#~`;@$# q>A0/zdY8\FQp?`cu Or:X u*Y`% ѣ'WuGZN} ! C#H9I{NapY 5c3ȁ=!cĝR nhT sƝpƘ5xO5`?j6ñkX28ܨҨq7`qS>| B`P7 0^6^q*B[]ssHQNQ@GE!JP>Ā46?hC8<.仑0uot`' QɅ)g$1$,' wǰ\ ij~,x8cA,i0$p98 k>`|30eʀ9aI)!3 `ŃP\ԙ| I_'hIV[FA}`a_}b =ށC&=[ ,{4!||d14=#ŀ1`,Å "l03QwǸt^F|gg ?MƠ' p% :_[C~T{ZC`u3.s:L=ip:#9`,0CCxLxte‡-c3ȁ=!##F3 m{4PaaFI>_ᜍ1=jFe4 ~# pk8b 71#!ijq y 3gܗup9j̭wpnQ6;95,nԀ1-p-"01젧'vD>n9szry'Py c!? p6BaPgT=' s2;G0cUw_ĢNXE_ Għ~2ta;ρ 7y`#3E+~'Ԇ;'x>Pi8G`[30004pg^)(iQ;π q  :Y;qee`ۋ/"8qcXCgh"0 ,902q(pc0p`pjcs" 0;Ԁ#I,|1`?wd?10GDkC*9u:sƫx%) G :+I $opo~.:Xn10j`r/,pY@3>3 >py|\Ippnd>w2༽s 6;`<.p\^K|N rǮvn Qg9fU L+g#|!z_nk ,G@Bar_"}L?0BD X+G  "P" r/B "e<d r0 ="@d .Xd*%"0G#QQb r@ J}6"@4 Dဨ'/BC$O hq D@DB~7cAP@T%8C@T[@jj!20 u$ Ji"@@Tb Gxq~/(ym1Aja@D:Q ăh@T L@ " PtmOM7Lxj?Ըpw(ݤr MOFDATAMUI en-USPPXppdeXLACError Warning Information $Blocking NTLM $Auditing NTLM Max 8Microsoft-Windows-NTLM PMicrosoft-Windows-NTLM/Operational ,NTLM authentication failed because the account was a member of the Protected User group.%n%nAccount Name:%t%1%nDevice Name:%t%2%nError Code:%t%3 NTLM authentication failed because access control restrictions are required.%n%nAccount Name:%t%1%nDevice Name:%t%2%nError Code:%t%3%n%nAuthentication Policy Information:%n%tSilo Name:%t%4%n%tPolicyName:%t%5 NTLM client blocked: Outgoing NTLM authentication traffic to remote servers that is blocked.%nTarget server: %1%nSupplied user: %2%nSupplied domain: %3%nPID of client process: %4%nName of client process: %5%nLUID of client process: %6%nUser identity of client process: %7%nDomain name of user identity of client process: %8%nMechanism OID: %9%n%nNTLM authentication requests from this computer are blocked.%n%nIf you want to allow this computer to use NTLM authentication, set the security policy Network Security: Restrict NTLM: Outgoing NTLM traffic to remote servers to Allow all.%n%nIf you want only the target server %1 to accept NTLM authentication requests from this computer, set the security policy Network Security: Restrict NTLM: Outgoing NTLM traffic to remote servers to Deny all and then set the security policy Network Security: Restrict NTLM: Add remote server exceptions and list the target server %1 as an exception to use NTLM authentication. NTLM server blocked: Incoming NTLM traffic to servers that is blocked%nCalling process PID: %1%nCalling process name: %2%nCalling process LUID: %3%nCalling process user identity: %4%nCalling process domain identity: %5%nMechanism OID: %6%n%nNTLM authentication requests to this server have been blocked.%n%nIf you want this server to allow NTLM authentication, set the security policy Network Security: Restrict NTLM: Incoming NTLM Traffic to Allow all. NTLM server blocked in the domain: NTLM authentication in this domain that is blocked%nUser: %1%nDomain: %2%nWorkstation: %3%nPID: %4%nProcess: %5%nLogon type: %6%nInProc: %7%nMechanism: %8%n%nNTLM authentication within the domain %2 is blocked.%n%nIf you want to allow NTLM authentication requests in the domain %1, set the security policy Network Security: Restrict NTLM: NTLM authentication in this domain to Disabled.%n%nIf you want to allow NTLM authentication requests only to specific servers in the domain %1, set the security policy Network Security: Restrict NTLM: NTLM authentication in this domain to Deny for domain servers or Deny domain accounts to domain servers, and then set the security policy Network Security: Restrict NTLM: Add server exceptions in this domain to define a list of servers in this domain as an exception to use NTLM authentication. ,NTLM Minimum Client Security Block:%nCalling process PID: %1%nCalling Process Name: %2%nNegotiated Security Flags: %3%nMinimum Security Flags: %4 ,NTLM Minimum Server Security Block:%nCalling process PID: %1%nCalling Process Name: %2%nNegotiated Security Flags: %3%nMinimum Security Flags: %4 NTLM client blocked audit: Audit outgoing NTLM authentication traffic that would be blocked.%nTarget server: %1%nSupplied user: %2%nSupplied domain: %3%nPID of client process: %4%nName of client process: %5%nLUID of client process: %6%nUser identity of client process: %7%nDomain name of user identity of client process: %8%nMechanism OID: %9%n%nAudit the NTLM authentication requests from this computer that would be blocked by the target server %1 if the security policy Network Security: Restrict NTLM: Outgoing NTLM traffic to remote servers is set to Deny all.%n%nIf you want all servers to accept NTLM authentication requests from this computer, set the security policy Network Security: Restrict NTLM: Outgoing NTLM traffic to remote servers to Allow all.%n%nIf you want only the target server %1 to accept NTLM authentication requests from this computer, set the security policy Network Security: Restrict NTLM: Outgoing NTLM traffic to remote servers to Deny all, and then set the security policy Network Security: Restrict NTLM: Add remote server exceptions and list the target server %1 as an exception to use NTLM authentication. NTLM server blocked audit: Audit Incoming NTLM Traffic that would be blocked%nCalling process PID: %1%nCalling process name: %2%nCalling process LUID: %3%nCalling process user identity: %4%nCalling process domain identity: %5%nMechanism OID: %6%n%nAudit NTLM authentication requests to this server that would be blocked if the security policy Network Security: Restrict NTLM: Incoming NTLM Traffic is set to Deny all accounts or Deny all domain accounts.%n%nIf you want this server to allow NTLM authentication, set the security policy Network Security: Restrict NTLM: Incoming NTLM Traffic to Allow all. NTLM server blocked in the domain audit: Audit NTLM authentication in this domain%nUser: %1%nDomain: %2%nWorkstation: %3%nPID: %4%nProcess: %5%nLogon type: %6%nInProc: %7%nMechanism: %8%n%nAudit NTLM authentication requests within this domain that would be blocked if the security policy Network Security: Restrict NTLM: NTLM authentication in this domain is set to Deny for domain servers or Deny domain accounts to domain servers.%n%nIf you want to allow NTLM authentication requests in the domain %1, set the security policy Network Security: Restrict NTLM: NTLM authentication in this domain to Disabled.%n%nIf you want to allow NTLM authentication requests to specific servers in the domain %1, set the security policy Network Security: Restrict NTLM: NTLM authentication in this domain to Deny for domain servers or Deny domain accounts to domain servers, and then set the security policy Network Security: Restrict NTLM: Add server exceptions in this domain to define a list of servers in this domain to use NTLM authentication. 4VS_VERSION_INFO@%@%?StringFileInfo040904B0LCompanyNameMicrosoft Corporationt&FileDescriptionMicrosoft Authentication Package v1.0r)FileVersion6.3.9600.16384 (winblue_rtm.130821-1623)6 InternalNameMSV1_0.DLL.LegalCopyright Microsoft Corporation. All rights reserved.FOriginalFilenameMSV1_0.DLL.MUIj%ProductNameMicrosoft Windows Operating SystemBProductVersion6.3.9600.16384DVarFileInfo$Translation PADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPAD