{"version":3,"file":"tQZ7tM3qa-2.Cx8-cnW6.mjs","names":[],"sources":["https:/framerusercontent.com/modules/4YbcEreTIp0bxiaV6tuj/1US5r89lG7swKlduDJLA/tQZ7tM3qa-2.js"],"sourcesContent":["import{jsx as e,jsxs as n}from\"react/jsx-runtime\";import*as t from\"react\";export const richText=/*#__PURE__*/e(t.Fragment,{children:/*#__PURE__*/e(\"p\",{children:\"Automate\"})});export const richText1=/*#__PURE__*/e(t.Fragment,{children:/*#__PURE__*/e(\"p\",{children:\"Mindflow's calendar automation seamlessly integrates Slack and Google Calendar to streamline meeting scheduling. By extracting attendee data from Slack and utilizing Google Calendar's free/busy query, it identifies optimal meeting slots, ensuring efficient time management and reducing scheduling conflicts.\"})});export const richText2=/*#__PURE__*/e(t.Fragment,{children:/*#__PURE__*/n(\"p\",{children:[\"Time Spent on Scheduling  \",/*#__PURE__*/e(\"br\",{}),\"Missed Meeting Opportunities  \",/*#__PURE__*/e(\"br\",{}),\"Manual Coordination Efforts\"]})});export const richText3=/*#__PURE__*/e(t.Fragment,{children:/*#__PURE__*/n(\"p\",{children:[\"Efficient Meeting Scheduling  \",/*#__PURE__*/e(\"br\",{}),\"Reduced Scheduling Conflicts  \",/*#__PURE__*/e(\"br\",{}),\"Improved Time Management\"]})});export const richText4=/*#__PURE__*/e(t.Fragment,{children:/*#__PURE__*/e(\"p\",{children:\"Attendee Data Extraction: Attendee information is automatically extracted from Slack messages, a task that would otherwise require manual data collection and entry. This automation reduces errors and speeds up the process, allowing teams to focus on more strategic activities.\\\\n\\\\nFree/Busy Query Execution: Google Calendar's free/busy query is utilized to identify available time slots for meetings. This replaces the manual checking of individual calendars, significantly reducing the time and effort required to find suitable meeting times.\\\\n\\\\nMeeting Slot Identification: The system automatically identifies the earliest available meeting slot that fits all participants' schedules. This task, traditionally done through back-and-forth communication, is streamlined, minimizing scheduling conflicts and enhancing overall productivity.\"})});export const richText5=/*#__PURE__*/e(t.Fragment,{children:/*#__PURE__*/e(\"p\",{children:\"Slack: In this use case, Slack is used to extract attendee information from messages. It serves as the communication platform where meeting requests are initiated, allowing for seamless integration with the automation process and ensuring that all necessary participant data is captured efficiently.\\\\n\\\\nGoogle Calendar: Google Calendar is utilized to perform free/busy queries and identify available meeting slots. It plays a critical role in checking participants' schedules and finding the optimal time for meetings, automating what would typically be a manual and time-consuming task.\\\\n\\\\nMindflow: Mindflow orchestrates the entire workflow, connecting Slack and Google Calendar to automate the scheduling process. It ensures that data flows smoothly between tools, reducing manual intervention and enhancing the efficiency of meeting scheduling by automating data extraction, schedule checking, and slot identification.\"})});export const richText6=/*#__PURE__*/e(t.Fragment,{children:/*#__PURE__*/e(\"p\",{children:\"Automate Threat Intelligence\"})});export const richText7=/*#__PURE__*/e(t.Fragment,{children:/*#__PURE__*/e(\"p\",{children:\"This use case involves automating ESET quarantine management with Mindflow. It integrates ESET Quarantine Management, Slack, and various Threat Intelligence tools to automate weekly scans of quarantined objects. The process enhances efficiency by analyzing files, notifying teams via Slack, and enabling decisions on file purging or restoration.\"})});export const richText8=/*#__PURE__*/n(t.Fragment,{children:[/*#__PURE__*/e(\"p\",{children:\"Manual Quarantine Management  \"}),/*#__PURE__*/e(\"p\",{children:\"Delayed Threat Response  \"}),/*#__PURE__*/e(\"p\",{children:\"Inconsistent File Analysis\"})]});export const richText9=/*#__PURE__*/n(t.Fragment,{children:[/*#__PURE__*/e(\"p\",{children:\"Streamlined Quarantine Processes  \"}),/*#__PURE__*/e(\"p\",{children:\"Faster Threat Detection  \"}),/*#__PURE__*/e(\"p\",{children:\"Consistent File Analysis\"})]});export const richText10=/*#__PURE__*/n(t.Fragment,{children:[/*#__PURE__*/e(\"p\",{children:/*#__PURE__*/n(\"span\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Scheduled Quarantine Scans\"}),\": Weekly scans of quarantined objects are conducted automatically, reducing the need for manual checks. This automation ensures timely identification of potential threats, enhances security and frees up resources for more strategic tasks.\"]})}),/*#__PURE__*/n(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Threat Intelligence Integration\"}),\": Quarantined objects are submitted to multiple Threat Intelligence platforms for analysis. This automated data collection and analysis provide comprehensive insights, improving threat detection accuracy and response times compared to manual processes.\"]}),/*#__PURE__*/n(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Slack Notifications and Actions\"}),\": Results from scans are automatically communicated to teams via Slack, allowing for immediate action. This integration streamlines communication and decision-making, replacing slower, manual notification methods and ensuring prompt remediation actions.\"]})]});export const richText11=/*#__PURE__*/n(t.Fragment,{children:[/*#__PURE__*/n(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"ESET Quarantine Management:\"}),\" This tool is essential for managing quarantined files within the ESET environment. It retrieves and processes quarantined objects, enabling automated scans and actions based on the analysis results, which streamlines the quarantine management process.\"]}),/*#__PURE__*/e(\"p\",{children:/*#__PURE__*/n(\"span\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Slack:\"}),\"\\xa0In this use case, Slack serves as the communication hub. It delivers notifications and updates to teams about scan results and required actions, facilitating immediate responses and collaboration and replacing slower, manual communication methods.\"]})}),/*#__PURE__*/n(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Hybrid Analysis\"}),\": This tool provides detailed threat intelligence by analyzing quarantined objects. It helps identify potential threats through comprehensive data analysis, enhancing the accuracy and speed of threat detection compared to manual analysis.\"]}),/*#__PURE__*/e(\"p\",{children:/*#__PURE__*/n(\"span\",{children:[/*#__PURE__*/e(\"strong\",{children:\"MalwareBazaar\"}),\": MalwareBazaar contributes by querying specific malware information using file hashes. It provides insights into the presence of malware, supports the threat intelligence process, and improves the overall security posture.\"]})}),/*#__PURE__*/n(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"VirusTotal \"}),\"aggregates data from various antivirus engines and tools to comprehensively analyze quarantined files. It enhances threat detection by offering a multi-faceted view of potential threats, thus supporting informed decision-making.\"]})]});export const richText12=/*#__PURE__*/e(t.Fragment,{children:/*#__PURE__*/e(\"p\",{children:\"RSS to Email\"})});export const richText13=/*#__PURE__*/n(t.Fragment,{children:[/*#__PURE__*/e(\"p\",{children:\"Manual monitoring of multiple feeds\"}),/*#__PURE__*/e(\"p\",{children:\"Delayed notifications of new content\"}),/*#__PURE__*/e(\"p\",{children:\"Inconsistent article tracking and updates\"})]});export const richText14=/*#__PURE__*/n(t.Fragment,{children:[/*#__PURE__*/e(\"p\",{children:\"Faster content delivery to users\"}),/*#__PURE__*/e(\"p\",{children:\"Automated tracking and updates\"}),/*#__PURE__*/e(\"p\",{children:\"AI-generated email summaries\"})]});export const richText15=/*#__PURE__*/n(t.Fragment,{children:[/*#__PURE__*/n(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Fetching RSS Feeds\"}),\": Mindflow automatically retrieves content from a list of RSS feeds, which traditionally requires manual checking and retrieval of content. This automation ensures faster and consistent updates, eliminating the need for users to search for new articles, saving time and effort manually.\"]}),/*#__PURE__*/n(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Article Detection and Tracking\"}),\": The process of detecting new articles from the retrieved RSS feeds is automated, eliminating the need for manual tracking and checks for updates. By automatically identifying and saving only new articles, Mindflow improves content management efficiency and prevents the redundancy of processing previously viewed items.\"]}),/*#__PURE__*/n(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Email Notification Generation\"}),\": Using Mindflow AI, email notifications with article summaries are generated automatically. This replaces manual drafting and sending updates to users, allowing for consistent and timely communication. The integration of AI ensures personalized summaries, enhancing user engagement without manual intervention.\"]})]});export const richText16=/*#__PURE__*/n(t.Fragment,{children:[/*#__PURE__*/n(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"RSS\"}),\": In this use case, RSS is the primary source for fetching content from multiple RSS feeds. It is responsible for retrieving the latest articles from various sources, which are then processed for automation. The integration with RSS enables the streamlined collection of relevant content without manual intervention.\"]}),/*#__PURE__*/n(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Mindflow AI Agent\"}),\": The Mindflow AI Agent is key in generating personalized email notifications based on newly detected articles. Analyzing each article's content creates summaries and custom messages, automating the content delivery process and ensuring timely, relevant communication with users.\"]})]});export const richText17=/*#__PURE__*/e(t.Fragment,{children:/*#__PURE__*/e(\"p\",{children:\"Device Management\"})});export const richText18=/*#__PURE__*/e(t.Fragment,{children:/*#__PURE__*/e(\"p\",{children:\"Enable seamless execution of Microsoft Intune device management actions directly from Microsoft Teams using Bot Connector and Microsoft Graph Device Management. Streamline workflows by automating device queries, executing commands like lock, shutdown, or wipe, and receiving real-time status updates — all within Microsoft Teams.\"})});export const richText19=/*#__PURE__*/e(t.Fragment,{children:/*#__PURE__*/n(\"p\",{children:[\"Manual device management delays\",/*#__PURE__*/e(\"br\",{}),\"Switching between tools frequently\",/*#__PURE__*/e(\"br\",{}),\"Limited visibility in communication threads\"]})});export const richText20=/*#__PURE__*/e(t.Fragment,{children:/*#__PURE__*/n(\"p\",{children:[\"Faster device action execution\",/*#__PURE__*/e(\"br\",{}),\"Centralized workflow in Teams\",/*#__PURE__*/e(\"br\",{}),\"Transparent reporting for IT actions\"]})});export const richText21=/*#__PURE__*/n(t.Fragment,{children:[/*#__PURE__*/n(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Device Management Actions from Teams\"}),\": Microsoft Intune commands such as lock, shutdown, and wipe are executed directly from Teams conversations, eliminating the need to switch between tools. This automation reduces response times and ensures efficient device control compared to manual execution through the Intune portal.\"]}),/*#__PURE__*/n(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Query Generation and Execution\"}),\": OData queries are automatically generated based on user inputs in Teams, identifying the targeted device. This replaces manual query creation, minimizing errors and accelerating device identification for faster action.\"]}),/*#__PURE__*/n(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Real-Time Reporting in Teams\"}),\": Status updates of executed actions are posted back in the original Teams conversation thread, providing immediate feedback. This automation enhances transparency and eliminates the need for separate reporting processes.\"]})]});export const richText22=/*#__PURE__*/n(t.Fragment,{children:[/*#__PURE__*/n(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Microsoft Teams\"}),\": In this use case, Microsoft Teams acts as the central interface for initiating and managing device actions. It allows users to trigger workflows and receive real-time updates within their communication threads, ensuring streamlined collaboration and visibility without switching platforms.\"]}),/*#__PURE__*/n(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Microsoft Graph Device Management\"}),\": This API facilitates direct interaction with Intune to perform device-specific actions such as locking, shutting down, or wiping devices. Automating these tasks eliminates manual intervention, reduces errors, and accelerates device management processes.\"]}),/*#__PURE__*/n(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Bot Connector API\"}),\": The Bot Connector enables seamless communication between Teams and Intune workflows. It ensures that commands initiated in Teams are accurately processed and executed, providing an efficient bridge for automation and orchestration across tools.\"]})]});export const richText23=/*#__PURE__*/e(t.Fragment,{children:/*#__PURE__*/e(\"p\",{children:\"Automate Data Security\"})});export const richText24=/*#__PURE__*/e(t.Fragment,{children:/*#__PURE__*/e(\"p\",{children:\"Analyze OneDrive and SharePoint events using Mindflow to detect unusual activity spikes. This automation ingests events from Microsoft Purview, filters non-relevant data, and compares user actions against historical data. It sends actionable notifications with remediation options, enhancing security and response efficiency.\"})});export const richText25=/*#__PURE__*/n(t.Fragment,{children:[/*#__PURE__*/e(\"p\",{children:\"Manual Event Review Time  \"}),/*#__PURE__*/e(\"p\",{children:\"Delayed Threat Response  \"}),/*#__PURE__*/e(\"p\",{children:\"Inconsistent Security Posture\"})]});export const richText26=/*#__PURE__*/n(t.Fragment,{children:[/*#__PURE__*/e(\"p\",{children:\"Faster Incident Resolution  \"}),/*#__PURE__*/e(\"p\",{children:\"Consistent Security Measures  \"}),/*#__PURE__*/e(\"p\",{children:\"Proactive Threat Management\"})]});export const richText27=/*#__PURE__*/n(t.Fragment,{children:[/*#__PURE__*/n(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Event Analysis and Notification\"}),\": Events from OneDrive and SharePoint are analyzed for unusual activity spikes. This task, typically requiring manual review, is automated to quickly identify potential threats and notify relevant teams, enhancing response time and reducing the risk of oversight.\"]}),/*#__PURE__*/e(\"p\",{children:/*#__PURE__*/n(\"span\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Historical Data Comparison\"}),\": To detect anomalies, user actions are compared against historical data. This process, which is often labor-intensive, is automated to ensure consistent and accurate threat detection, minimize false positives, and improve security posture.\"]})}),/*#__PURE__*/n(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Remediation Action Suggestions\"}),\": Based on analysis, actionable remediation steps are suggested. This replaces manual decision-making with automated recommendations, ensuring timely and effective responses to potential security incidents, thereby reducing the impact of threats.\"]})]});export const richText28=/*#__PURE__*/n(t.Fragment,{children:[/*#__PURE__*/n(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Microsoft Purview\"}),\": In this use case, Microsoft Purview acts as the source of audit events from OneDrive and SharePoint. It provides the necessary data for analysis, enabling the detection of unusual activity patterns that may indicate security threats.\"]}),/*#__PURE__*/e(\"p\",{children:/*#__PURE__*/n(\"span\",{children:[/*#__PURE__*/e(\"strong\",{children:\"OneDrive and SharePoint\"}),\": These platforms are the focus of the event analysis. They generate the activity logs, which are monitored for anomalies. This ensures that any unusual user behavior is quickly identified and addressed.\"]})}),/*#__PURE__*/e(\"p\",{children:/*#__PURE__*/n(\"span\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Microsoft Teams\"}),\": Microsoft Teams delivers notifications and remediation suggestions. It is the communication channel for alerting relevant teams about detected threats, facilitating swift action and collaboration.\"]})}),/*#__PURE__*/n(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Azure Active Directory\"}),\": Azure Active Directory is involved in managing user identities and access. It supports the automation of remediation actions, such as account locking or password resets, to mitigate identified security risks.\"]})]});export const richText29=/*#__PURE__*/e(t.Fragment,{children:/*#__PURE__*/e(\"p\",{children:\"Automate Threat Detection\"})});export const richText30=/*#__PURE__*/e(t.Fragment,{children:/*#__PURE__*/e(\"p\",{children:\"The use case involves analyzing Indicators of Compromise (IOCs) using external threat intelligence. Mindflow integrates VirusTotal and Google Sheets to automate the analysis of URLs and attachments. This process updates internal threat databases, enhancing threat detection and response by providing accurate and timely intelligence.\"})});export const richText31=/*#__PURE__*/n(t.Fragment,{children:[/*#__PURE__*/e(\"p\",{children:\"Manual Threat Analysis Effort  \"}),/*#__PURE__*/e(\"p\",{children:\"Delayed Threat Response Times  \"}),/*#__PURE__*/e(\"p\",{children:\"Inconsistent Data Updates\"})]});export const richText32=/*#__PURE__*/n(t.Fragment,{children:[/*#__PURE__*/e(\"p\",{children:\"Faster Threat Intelligence Processing  \"}),/*#__PURE__*/e(\"p\",{children:\"Consistent Data Management  \"}),/*#__PURE__*/e(\"p\",{children:\"Improved Response Accuracy\"})]});export const richText33=/*#__PURE__*/n(t.Fragment,{children:[/*#__PURE__*/e(\"p\",{children:/*#__PURE__*/n(\"span\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Analysis of IOCs\"}),\": Indicators of Compromise are analyzed using external threat intelligence databases. This task, often done manually, is now automated to ensure faster and more accurate threat detection, reduce the risk of oversight, and enhance security measures.\"]})}),/*#__PURE__*/n(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Data Integration with Google Sheets\"}),\": Analysis results are automatically updated in Google Sheets. This replaces manual data entry, ensuring consistent and up-to-date threat intelligence records, which enhances data reliability and reduces the potential for human error.\"]}),/*#__PURE__*/e(\"p\",{children:/*#__PURE__*/n(\"span\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Threat Intelligence Feedback Loop\"}),\": The analysis results are fed back into the system to inform future threat assessments. This automated feedback loop ensures continuous improvement in threat detection capabilities, reducing the time and effort required for manual updates and analysis.\"]})})]});export const richText34=/*#__PURE__*/n(t.Fragment,{children:[/*#__PURE__*/e(\"p\",{children:/*#__PURE__*/n(\"span\",{children:[/*#__PURE__*/e(\"strong\",{children:\"VirusTotal\"}),\": In this use case, VirusTotal analyzes URLs and attachments for potential threats. It provides a comprehensive threat intelligence service by checking against a vast database of known threats, enabling automated detection and response to malicious indicators.\"]})}),/*#__PURE__*/e(\"p\",{children:/*#__PURE__*/n(\"span\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Google Sheets\"}),\": Google Sheets stores and manages the results of threat analyses. It acts as a dynamic repository for threat intelligence data, ensuring that information is consistently updated and accessible for further analysis and decision-making.\"]})})]});export const richText35=/*#__PURE__*/e(t.Fragment,{children:/*#__PURE__*/e(\"p\",{children:\"Automate Database Security\"})});export const richText36=/*#__PURE__*/e(t.Fragment,{children:/*#__PURE__*/e(\"p\",{children:\"Mindflow enhances email security by automating threat intelligence analysis. It cross-checks email domains, URLs, and attachments against internal databases using Google Sheets API. This process identifies malicious artifacts, provides real-time threat assessment and streamlined workflows, and ensures efficient and accurate security operations.\"})});export const richText37=/*#__PURE__*/n(t.Fragment,{children:[/*#__PURE__*/e(\"p\",{children:\"Manual Threat Analysis Time  \"}),/*#__PURE__*/e(\"p\",{children:\"Delayed Response to Threats  \"}),/*#__PURE__*/e(\"p\",{children:\"Inconsistent Security Assessments\"})]});export const richText38=/*#__PURE__*/n(t.Fragment,{children:[/*#__PURE__*/e(\"p\",{children:\"Faster Threat Detection  \"}),/*#__PURE__*/e(\"p\",{children:\"Consistent Security Checks  \"}),/*#__PURE__*/e(\"p\",{children:\"Real-Time Data Analysis\"})]});export const richText39=/*#__PURE__*/n(t.Fragment,{children:[/*#__PURE__*/n(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Email Domain Verification\"}),\": Email domains are verified against trusted lists, reducing manual checks and ensuring consistent security protocols. This automation minimizes human error and accelerates the verification process, enhancing overall email security.\"]}),/*#__PURE__*/n(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"URL Analysis\"}),\": URLs are automatically cross-checked against internal threat intelligence databases. If done manually, this task would be time-consuming and prone to oversight. Automation ensures rapid and accurate threat detection, improving response times and reducing potential security risks.\"]}),/*#__PURE__*/e(\"p\",{children:/*#__PURE__*/n(\"span\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Attachment Hash Checking\"}),\": To identify potential threats, attachments are hashed and compared with a whitelist. Manual execution of this task involves extensive data handling and analysis, which is streamlined through automation. This ensures faster and more reliable threat assessment.\"]})})]});export const richText40=/*#__PURE__*/e(t.Fragment,{children:/*#__PURE__*/n(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Google Sheets:\"}),\" In this use case, Google Sheets API is used to access and retrieve data from spreadsheets containing whitelisted email domains, URLs, and attachment hashes. This integration ensures that the most current and accurate data is used for threat intelligence analysis.\"]})});export const richText41=/*#__PURE__*/e(t.Fragment,{children:/*#__PURE__*/e(\"p\",{children:\"Automate Email Security\"})});export const richText42=/*#__PURE__*/e(t.Fragment,{children:/*#__PURE__*/e(\"p\",{children:\"Mindflow's automation flow for continuous deep Gmail analysis integrates Google APIs to enhance email security. It extracts and analyzes URLs and attachments from emails, leveraging internal and external threat intelligence databases. This process identifies and mitigates potential threats, ensuring a secure email environment.\"})});export const richText43=/*#__PURE__*/n(t.Fragment,{children:[/*#__PURE__*/e(\"p\",{children:\"Manual Threat Detection Efforts  \"}),/*#__PURE__*/e(\"p\",{children:\"Delayed Response to Threats  \"}),/*#__PURE__*/e(\"p\",{children:\"Inconsistent Email Security Practices\"})]});export const richText44=/*#__PURE__*/n(t.Fragment,{children:[/*#__PURE__*/e(\"p\",{children:\"Enhanced Threat Detection Speed  \"}),/*#__PURE__*/e(\"p\",{children:\"Consistent Security Protocols  \"}),/*#__PURE__*/e(\"p\",{children:\"Streamlined Email Analysis Process\"})]});export const richText45=/*#__PURE__*/n(t.Fragment,{children:[/*#__PURE__*/e(\"p\",{children:/*#__PURE__*/n(\"span\",{children:[/*#__PURE__*/e(\"strong\",{children:\"URL Extraction and Analysis\"}),\": URLs within emails are extracted and analyzed for potential threats. When done manually, this task involves tedious and error-prone processes. Automation ensures consistent and rapid identification of malicious URLs, enhancing security and reducing the time spent on manual checks.\"]})}),/*#__PURE__*/n(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Attachment Analysis\"}),\": Email attachments are automatically scanned for threats, a process that typically requires manual intervention and specialized knowledge. Automation streamlines this task, ensuring thorough and consistent analysis, reducing the risk of oversight, and freeing up valuable human resources for more strategic activities.\"]}),/*#__PURE__*/e(\"p\",{children:/*#__PURE__*/n(\"span\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Threat Intelligence Integration\"}),\": Integrating internal and external threat intelligence databases allows for comprehensive email content analysis. Manual integration is time-consuming and prone to errors. Automation ensures seamless and accurate data correlation, enhancing threat detection capabilities and improving overall security posture.\"]})})]});export const richText46=/*#__PURE__*/n(t.Fragment,{children:[/*#__PURE__*/n(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Google Pub/Sub:\"}),\" This service acts as the trigger for the email analysis workflow. It sends notifications when new emails arrive, initiating the automated process. By using Pub/Sub, the workflow can start immediately upon email receipt, ensuring timely threat detection.\"]}),/*#__PURE__*/n(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Google Sheets:\"}),\" In this use case, Google Sheets stores historical data about email interactions. It helps track changes in the mailbox, providing a reference point for identifying new emails. This integration ensures that the workflow can access necessary historical data for accurate analysis.\"]}),/*#__PURE__*/n(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Google IAM:\"}),\" This API manages access and permissions within the workflow. It ensures the automation has the credentials to access and analyze emails securely. IAM plays a critical role in maintaining security and compliance throughout the process.\"]}),/*#__PURE__*/n(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Google OAuth\"}),\": OAuth is used for secure authentication, allowing the workflow to access Gmail data without compromising user credentials. It facilitates secure communication between the automation and Gmail, ensuring that email data is accessed safely.\"]}),/*#__PURE__*/n(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Gmail\"}),\": The Mail API retrieves email content for analysis. It provides the necessary data for the workflow to extract URLs and attachments, enabling thorough threat analysis. This API is essential for accessing the email data required for the automation to function effectively.\"]})]});export const richText47=/*#__PURE__*/e(t.Fragment,{children:/*#__PURE__*/e(\"p\",{children:\"Monitor user mailboxes using Google APIs to automate email security. This flow retrieves active users, sets up monitoring with impersonated tokens, and integrates with Google Pub/Sub for real-time notifications. Enhance security by automating email tracking and analysis without manual intervention.\"})});export const richText48=/*#__PURE__*/n(t.Fragment,{children:[/*#__PURE__*/e(\"p\",{children:\"Manual Email Monitoring Efforts  \"}),/*#__PURE__*/e(\"p\",{children:\"Delayed Threat Detection  \"}),/*#__PURE__*/e(\"p\",{children:\"Inconsistent Security Protocols\"})]});export const richText49=/*#__PURE__*/n(t.Fragment,{children:[/*#__PURE__*/e(\"p\",{children:\"Real-Time Email Monitoring  \"}),/*#__PURE__*/e(\"p\",{children:\"Streamlined Security Processes  \"}),/*#__PURE__*/e(\"p\",{children:\"Consistent Threat Detection\"})]});export const richText50=/*#__PURE__*/n(t.Fragment,{children:[/*#__PURE__*/n(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"User Mailbox Monitoring\"}),\": Active user mailboxes are continuously monitored using Google APIs. This task, traditionally manual, involves setting up monitoring channels and managing notifications. Automation ensures consistent monitoring, reduces human error, and enhances security by providing real-time insights into email activities.\"]}),/*#__PURE__*/n(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Token Generation for Impersonation\"}),\": Tokens are generated to impersonate users for mailbox monitoring. This process, if done manually, requires significant time and technical expertise. Automation simplifies token management, ensuring secure and efficient access to user mailboxes without manual intervention.\"]}),/*#__PURE__*/n(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Notification Integration with Google Pub/Sub\"}),\": Email notifications are integrated with Google Pub/Sub for real-time processing. Manually managing these notifications can lead to delays and missed alerts. Automation ensures timely delivery and processing of notifications, enhancing the overall security posture by enabling proactive threat detection.\"]})]});export const richText51=/*#__PURE__*/n(t.Fragment,{children:[/*#__PURE__*/n(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Google Admin Directory:\"}),\" This tool retrieves active users within the organization, serving as the foundation for setting up mailbox monitoring. It eliminates the need for manual user data collection, ensuring the monitoring process is comprehensive and up-to-date.\"]}),/*#__PURE__*/n(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Google OAuth:\"}),\" This API generates impersonated tokens, allowing secure access to user mailboxes. It is critical in maintaining security and efficiency, replacing the manual token management process with automated, reliable access control.\"]}),/*#__PURE__*/e(\"p\",{children:/*#__PURE__*/n(\"span\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Google Pub/Sub:\"}),\"\\xa0This service integrates email notifications, enabling real-time processing and alerting. Automating notification management ensures timely and consistent alert delivery, enhancing the organization's ability to respond quickly to potential threats.\"]})})]});export const richText52=/*#__PURE__*/e(t.Fragment,{children:/*#__PURE__*/e(\"p\",{children:\"Automate Security Monitoring\"})});export const richText53=/*#__PURE__*/e(t.Fragment,{children:/*#__PURE__*/e(\"p\",{children:\"Azure Active Directory events analysis with Mindflow streamlines security by automating event ingestion and analysis. It integrates Microsoft Graph APIs to monitor user activities, identify anomalies, and notify teams via Microsoft Teams. This enhances security posture and ensures timely responses to potential threats.\"})});export const richText54=/*#__PURE__*/n(t.Fragment,{children:[/*#__PURE__*/e(\"p\",{children:\"Manual Event Monitoring  \"}),/*#__PURE__*/e(\"p\",{children:\"Delayed Threat Response  \"}),/*#__PURE__*/e(\"p\",{children:\"Resource Allocation for Analysis\"})]});export const richText55=/*#__PURE__*/n(t.Fragment,{children:[/*#__PURE__*/e(\"p\",{children:\"Real-Time Threat Detection  \"}),/*#__PURE__*/e(\"p\",{children:\"Efficient Resource Utilization  \"}),/*#__PURE__*/e(\"p\",{children:\"Streamlined Security Operations\"})]});export const richText56=/*#__PURE__*/n(t.Fragment,{children:[/*#__PURE__*/n(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Event Ingestion and Analysis\"}),\": Azure Active Directory events are ingested and analyzed automatically, replacing the manual process of monitoring logs and events. This automation ensures the timely detection of anomalies and reduces the risk of human oversight, enhancing security and operational efficiency.\"]}),/*#__PURE__*/e(\"p\",{children:/*#__PURE__*/n(\"span\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Anomaly Detection and Notification\"}),\": Microsoft Teams detects anomalies in user activities and sends notifications to teams. This replaces the manual task of reviewing logs for suspicious activities, ensuring faster response times and improving the overall security posture.\"]})}),/*#__PURE__*/n(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"User Activity Monitoring\"}),\": Continuous monitoring of user activities through Microsoft Graph APIs is automated, eliminating the need for manual checks. This ensures comprehensive oversight of user actions, reduces the workload on IT teams, and enhances the ability to respond to potential threats quickly.\"]})]});export const richText57=/*#__PURE__*/n(t.Fragment,{children:[/*#__PURE__*/n(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Microsoft Graph Security\"}),\": In this use case, Microsoft Graph APIs are essential for accessing and monitoring Azure Active Directory events. They facilitate the retrieval of user activity data, enabling automated analysis and anomaly detection, which enhances security monitoring and response capabilities.\"]}),/*#__PURE__*/n(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Microsoft Teams\"}),\": Microsoft Teams is the communication channel for notifications about detected anomalies. It ensures that security teams receive timely alerts, allowing quick responses to potential threats and maintaining a streamlined organizational communication flow.\"]}),/*#__PURE__*/n(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Azure Active Directory\"}),\" is the source of user activity data. It provides the necessary logs and events that are analyzed for anomalies, playing a critical role in security monitoring by offering insights into user behaviors and access patterns.\"]})]});export const richText58=/*#__PURE__*/e(t.Fragment,{children:/*#__PURE__*/e(\"p\",{children:\"The use case involves analyzing and remediating Azure brute force alerts detected by Splunk. Mindflow integrates with tools like Slack, Microsoft Graph, and VirusTotal to automate incident management. This process enhances security by efficiently handling alerts and ensuring comprehensive documentation.\"})});export const richText59=/*#__PURE__*/n(t.Fragment,{children:[/*#__PURE__*/e(\"p\",{children:\"Manual Alert Handling  \"}),/*#__PURE__*/e(\"p\",{children:\"Delayed Incident Resolution  \"}),/*#__PURE__*/e(\"p\",{children:\"Inconsistent Documentation Practices\"})]});export const richText60=/*#__PURE__*/n(t.Fragment,{children:[/*#__PURE__*/e(\"p\",{children:\"Faster Incident Resolution  \"}),/*#__PURE__*/e(\"p\",{children:\"Consistent Documentation  \"}),/*#__PURE__*/e(\"p\",{children:\"Improved Security Management\"})]});export const richText61=/*#__PURE__*/n(t.Fragment,{children:[/*#__PURE__*/n(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Alert Detection and Notification\"}),\": Alerts from Splunk are detected and notifications are sent to relevant teams. This replaces manual monitoring and alerting, ensuring immediate awareness and response to potential security threats, reducing the time taken to initiate action.\"]}),/*#__PURE__*/n(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"User and Event Analysis\"}),\": User profiles and recent sign-in events are analyzed to assess the threat level. This task, which would typically require manual data gathering and analysis, is automated to provide quick insights, enhancing decision-making speed and accuracy.\"]}),/*#__PURE__*/n(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Remediation Action Execution\"}),\": Actions such as account locking, password resets, or IP blocking are executed based on analysis. Automating these critical responses ensures swift action against threats, minimizing potential damage and improving overall security posture.\"]})]});export const richText62=/*#__PURE__*/n(t.Fragment,{children:[/*#__PURE__*/e(\"p\",{children:/*#__PURE__*/n(\"span\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Splunk\"}),\"\\xa0is the primary source for detecting brute-force alerts. It continuously monitors and identifies potential security threats, triggering the automated workflow to ensure timely incident response.\"]})}),/*#__PURE__*/e(\"p\",{children:/*#__PURE__*/n(\"span\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Slack\"}),\": Slack notifies the relevant teams about detected alerts. It facilitates communication and collaboration, allowing teams to discuss and decide quickly on the necessary actions to address the threat.\"]})}),/*#__PURE__*/e(\"p\",{children:/*#__PURE__*/n(\"span\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Microsoft Graph\"}),\": Microsoft Graph interfaces with Azure to gather user profiles and sign-in events. It is critical to analyze user activity and determine the appropriate remediation actions, such as account locking or password reset.\"]})}),/*#__PURE__*/n(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"VirusTotal\"}),\": VirusTotal is utilized to scan and verify suspicious IP addresses. It helps assess the threat level of detected IPs and supports informed decision-making for blocking or allowing network access.\"]}),/*#__PURE__*/n(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Siit\"}),\": Siit is integrated to create and manage incident tickets. It ensures that all remediation actions are documented and tracked, providing a comprehensive audit trail for security incidents.\"]})]});export const richText63=/*#__PURE__*/e(t.Fragment,{children:/*#__PURE__*/e(\"p\",{children:\"Automate Event Monitoring\"})});export const richText64=/*#__PURE__*/e(t.Fragment,{children:/*#__PURE__*/e(\"p\",{children:\"Monitor Office 365 events using Mindflow to automate event tracking across SharePoint, Exchange, and Azure AD. This flow enhances security and compliance by eliminating manual audits, ensuring real-time alerts, and improving operational efficiency through automated analysis and remediation triggers.\"})});export const richText65=/*#__PURE__*/n(t.Fragment,{children:[/*#__PURE__*/e(\"p\",{children:\"Manual Audit Time  \"}),/*#__PURE__*/e(\"p\",{children:\"Delayed Security Responses  \"}),/*#__PURE__*/e(\"p\",{children:\"Resource Allocation for Monitoring\"})]});export const richText66=/*#__PURE__*/n(t.Fragment,{children:[/*#__PURE__*/e(\"p\",{children:\"Real-Time Event Alerts  \"}),/*#__PURE__*/e(\"p\",{children:\"Streamlined Security Processes  \"}),/*#__PURE__*/e(\"p\",{children:\"Efficient Resource Utilization\"})]});export const richText67=/*#__PURE__*/n(t.Fragment,{children:[/*#__PURE__*/n(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Event Monitoring in Office 365\"}),\": Continuous monitoring of Office 365 events across SharePoint, Exchange, and Azure AD is automated, eliminating the need for manual audits. This ensures real-time alerts and enhances security by promptly identifying and addressing potential threats.\"]}),/*#__PURE__*/n(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Subscription Management:\"}),\" Automating the start and stop of subscriptions for Office 365 resources prevents duplicate monitoring and errors. This task, if done manually, requires constant oversight and can lead to inefficiencies and missed updates.\"]}),/*#__PURE__*/n(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Scheduled Triggers for Monitoring\"}),\": The automation of scheduled triggers for renewing resource monitoring ensures consistent and comprehensive coverage. This task, traditionally requiring manual scheduling and follow-up, is streamlined, reducing the risk of lapses in monitoring and improving operational efficiency.\"]})]});export const richText68=/*#__PURE__*/n(t.Fragment,{children:[/*#__PURE__*/n(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Office Management: \"}),\"In this use case, the Office Management API is central to managing subscriptions for Office 365 resources. It facilitates the automation of starting and stopping event monitoring, ensuring that the process is efficient and free from manual errors or oversight.\"]}),/*#__PURE__*/n(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Azure Active Directory (AAD)\"}),\": AAD is involved in monitoring user activities within Office 365. It plays a role in tracking and logging events related to user access and actions, which are crucial for maintaining security and compliance across the organization.\"]}),/*#__PURE__*/n(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"SharePoint and Exchange\"}),\": These tools are part of the resources monitored in this use case. They are integral to capturing events related to document sharing and email communications, ensuring that any unusual activities are promptly identified and addressed through automated alerts.\"]})]});export const richText69=/*#__PURE__*/e(t.Fragment,{children:/*#__PURE__*/e(\"p\",{children:\"Mindflow streamlines cloud security by automating the analysis of Microsoft Exchange events. It extracts relevant data, filters non-essential actions, and generates incident tickets in Microsoft Teams. This enhances operational efficiency and ensures timely alerts for potential security threats, leveraging Microsoft Graph and Office Management integrations.\"})});export const richText70=/*#__PURE__*/n(t.Fragment,{children:[/*#__PURE__*/e(\"p\",{children:\"Manual Event Analysis Time  \"}),/*#__PURE__*/e(\"p\",{children:\"Delayed Threat Response  \"}),/*#__PURE__*/e(\"p\",{children:\"Increased Human Error Risk\"})]});export const richText71=/*#__PURE__*/n(t.Fragment,{children:[/*#__PURE__*/e(\"p\",{children:\"Faster Incident Resolution  \"}),/*#__PURE__*/e(\"p\",{children:\"Real-Time Threat Detection  \"}),/*#__PURE__*/e(\"p\",{children:\"Reduced Manual Workload\"})]});export const richText72=/*#__PURE__*/n(t.Fragment,{children:[/*#__PURE__*/n(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Event Data Extraction:\"}),\" Relevant events from Microsoft Exchange are extracted automatically, reducing the need for manual data gathering. This ensures that only pertinent information is processed, minimizing the risk of oversight and accelerating the response time.\"]}),/*#__PURE__*/n(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Incident Ticket Generation\"}),\": Incident tickets are created in Microsoft Teams based on extracted events. This replaces manual ticket creation, ensuring consistent documentation and prompt alerting of responsible teams, which enhances response efficiency and reduces delays.\"]}),/*#__PURE__*/n(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Event Filtering and Analysis\"}),\": Events are filtered and analyzed to identify potential threats. This automated process eliminates the manual review of logs, allowing for quicker identification of security issues and reducing the workload on security teams.\"]})]});export const richText73=/*#__PURE__*/n(t.Fragment,{children:[/*#__PURE__*/e(\"p\",{children:/*#__PURE__*/n(\"span\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Microsoft Teams:\"}),\"\\xa0In this use case, Microsoft Graph—Teams lists channels and sends messages. It facilitates communication by posting incident alerts directly to the appropriate team channels, ensuring that the right team members are promptly informed of potential security threats.\"]})}),/*#__PURE__*/n(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Microsoft Graph Mail:\"}),\" This service retrieves messages and analyzes email events. It plays a critical role in identifying suspicious activities within email communications, enabling the automation to focus on relevant security events.\"]}),/*#__PURE__*/n(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Office Management\"}),\": The Office Management API is utilized to ingest and manage audit events from Microsoft Exchange. It provides the necessary data for analysis, allowing automation to filter and process events efficiently and reduce the need for manual oversight.\"]})]});export const richText74=/*#__PURE__*/e(t.Fragment,{children:/*#__PURE__*/e(\"p\",{children:\"Mindflow's email security use case enhances email gateway defenses by automating continuous regression tests. It integrates with Abuse.ch and Gmail to simulate real-world attacks and test security protocols such as DMARC, DKIM, and SPF, ensuring robust protection against phishing and malware.\"})});export const richText75=/*#__PURE__*/n(t.Fragment,{children:[/*#__PURE__*/e(\"p\",{children:\"Manual Email Security Checks  \"}),/*#__PURE__*/e(\"p\",{children:\"Delayed Threat Response  \"}),/*#__PURE__*/e(\"p\",{children:\"Resource-Intensive Security Management\"})]});export const richText76=/*#__PURE__*/n(t.Fragment,{children:[/*#__PURE__*/e(\"p\",{children:\"Real-Time Threat Detection  \"}),/*#__PURE__*/e(\"p\",{children:\"Streamlined Security Processes  \"}),/*#__PURE__*/e(\"p\",{children:\"Enhanced Email Protection\"})]});export const richText77=/*#__PURE__*/n(t.Fragment,{children:[/*#__PURE__*/e(\"p\",{children:/*#__PURE__*/n(\"span\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Email Gateway Testing:\"}),\"\\xa0Continuous email gateway testing identifies vulnerabilities by simulating real-world attacks. Replicating various attack scenarios requires extensive time and effort. Automation ensures consistent and thorough testing, enhancing security posture without manual intervention.\"]})}),/*#__PURE__*/n(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Malware and URL Analysis\"}),\": Automating the retrieval and analysis of malicious URLs and malware samples streamlines threat detection. Manual analysis requires significant resources and time, whereas automation provides rapid insights, allowing quicker response to potential threats.\"]}),/*#__PURE__*/n(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Email Composition and Delivery\"}),\": Automated email composition and delivery ensure that phishing simulations and security tests are executed efficiently. Manual email crafting is prone to errors and delays, but automation guarantees precision and speed, improving the effectiveness of security training and testing.\"]})]});export const richText78=/*#__PURE__*/n(t.Fragment,{children:[/*#__PURE__*/e(\"p\",{children:/*#__PURE__*/n(\"span\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Abuse.ch URLHaus\"}),\"\\xa0retrieves recent malicious URLs, providing critical data for testing email gateway defenses. It automates the process of acquiring threat intelligence, which would otherwise require manual research and data collection.\"]})}),/*#__PURE__*/n(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"abuse.ch Malware Bazaar\"}),/*#__PURE__*/e(\"span\",{children:\": This tool downloads the latest malware samples. It is also key in simulating real-world threats, allowing for comprehensive testing of email security measures without the need for manual sample collection.\"})]}),/*#__PURE__*/n(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Gmail\"}),\": For sending emails as part of the security testing process. It automates the delivery of phishing simulations and other test emails, ensuring consistent execution and reducing the potential for human error in email handling.\"]})]});export const richText79=/*#__PURE__*/e(t.Fragment,{children:/*#__PURE__*/e(\"p\",{children:\"Automate Endpoint Security\"})});export const richText80=/*#__PURE__*/e(t.Fragment,{children:/*#__PURE__*/e(\"p\",{children:\"Mindflow's use case for user-failed sign-ins focuses on analyzing and remediating security incidents. This flow integrates Microsoft Purview and Graph APIs to automate event ingestion, deduplication, and analysis. It enhances threat detection by identifying patterns and sending actionable notifications to Teams, enabling swift incident response.\"})});export const richText81=/*#__PURE__*/n(t.Fragment,{children:[/*#__PURE__*/e(\"p\",{children:\"Manual Event Deduplication Effort  \"}),/*#__PURE__*/e(\"p\",{children:\"Delayed Incident Response  \"}),/*#__PURE__*/e(\"p\",{children:\"Missed Threat Detection Opportunities\"})]});export const richText82=/*#__PURE__*/n(t.Fragment,{children:[/*#__PURE__*/e(\"p\",{children:\"Streamlined Event Analysis  \"}),/*#__PURE__*/e(\"p\",{children:\"Faster Incident Resolution  \"}),/*#__PURE__*/e(\"p\",{children:\"Improved Threat Detection\"})]});export const richText83=/*#__PURE__*/n(t.Fragment,{children:[/*#__PURE__*/n(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Event Ingestion and Deduplication:\"}),\" Events are ingested from Microsoft Purview and deduplicated, reducing manual effort and errors. This automation ensures a consistent and efficient process, saving time and improving accuracy compared to manual event handling.\"]}),/*#__PURE__*/n(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Threat Analysis and Detection\"}),\": The system analyzes event artifacts and identifies patterns, enhancing threat detection capabilities. This automated analysis is faster and more reliable than manual methods, allowing teams to quickly identify and respond to potential security threats.\"]}),/*#__PURE__*/n(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Notification and Remediation\"}),\": Notifications with embedded remediation actions are sent to Teams, enabling immediate response. This automation streamlines communication and action, reducing the delay and effort involved in manual notification and remediation processes.\"]})]});export const richText84=/*#__PURE__*/n(t.Fragment,{children:[/*#__PURE__*/e(\"p\",{children:/*#__PURE__*/n(\"span\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Microsoft Purview\"}),\": In this use case, Microsoft Purview is the source of event data, providing a stream of sign-in events that need analysis. It enables automation to access relevant security data, crucial for identifying and responding to potential threats.\"]})}),/*#__PURE__*/e(\"p\",{children:/*#__PURE__*/n(\"span\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Microsoft Graph\"}),\": Microsoft Graph queries sign-in logs and gathers detailed information about user activities. It is vital for accessing and analyzing historical sign-in data and essential for detecting patterns and anomalies in user behavior.\"]})}),/*#__PURE__*/n(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Microsoft Teams\"}),\": Microsoft Teams is the platform for delivering notifications and remediation actions. It allows security teams to receive alerts and immediately act directly within their communication tool, facilitating quick response and collaboration.\"]})]});export const richText85=/*#__PURE__*/e(t.Fragment,{children:/*#__PURE__*/e(\"p\",{children:\"With Mindflow, you can Automate Office 365 event monitoring. You can ingest audit logs from Microsoft 365 and dispatch events to Azure Active Directory, OneDrive, and Exchange subflows. Automating event triage, retrieval, and analysis can enhance security and compliance and ensure real-time incident management and operational efficiency.\"})});export const richText86=/*#__PURE__*/n(t.Fragment,{children:[/*#__PURE__*/e(\"p\",{children:\"Manual Event Monitoring Efforts  \"}),/*#__PURE__*/e(\"p\",{children:\"Delayed Incident Response Times  \"}),/*#__PURE__*/e(\"p\",{children:\"Inconsistent Security Compliance Tracking\"})]});export const richText87=/*#__PURE__*/n(t.Fragment,{children:[/*#__PURE__*/e(\"p\",{children:\"Real-Time Event Processing  \"}),/*#__PURE__*/e(\"p\",{children:\"Faster Incident Resolution  \"}),/*#__PURE__*/e(\"p\",{children:\"Consistent Compliance Monitoring\"})]});export const richText88=/*#__PURE__*/n(t.Fragment,{children:[/*#__PURE__*/n(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Event Ingestion from Office 365:\"}),\" Events from Office 365 are automatically ingested, bypassing the need for manual monitoring. This automation ensures that all relevant events are captured in real-time, reducing the risk of missing critical security incidents and improving response times.\"]}),/*#__PURE__*/n(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Event Dispatch to Subflows\"}),\": Events are dispatched to specific subflows for Azure Active Directory, OneDrive, and Exchange based on predefined criteria. This task, which would require manual sorting and routing, is streamlined, ensuring that each event is handled by the appropriate system without delay.\"]}),/*#__PURE__*/e(\"p\",{children:/*#__PURE__*/n(\"span\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Compliance Monitoring:\"}),\"\\xa0Continuous monitoring across Office 365 applications ensures compliance with security policies. This automated task eliminates the need for manual compliance checks, providing consistent and reliable tracking of user activities and security events and enhancing the overall security posture.\"]})})]});export const richText89=/*#__PURE__*/n(t.Fragment,{children:[/*#__PURE__*/n(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Microsoft Office 365\"}),\": In this use case, Office 365 is the source of events that need monitoring and processing. It generates audit logs crucial for security and compliance, which are then ingested into the automated workflow for further action.\"]}),/*#__PURE__*/e(\"p\",{children:/*#__PURE__*/n(\"span\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Microsoft Azure Active Directory\"}),\"\\xa0analyzes and manages identity-related events. It processes events dispatched from Office 365, ensuring that identity management and access control policies are enforced efficiently and accurately.\"]})}),/*#__PURE__*/n(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Microsoft OneDrive\"}),\" handles events related to file storage and sharing. It receives specific events from Office 365, allowing for automated analysis and response to document management activities. This maintains data integrity and security.\"]}),/*#__PURE__*/e(\"p\",{children:/*#__PURE__*/n(\"span\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Microsoft Email Exchange\"}),\"\\xa0processes email-related events. It manages and analyzes email traffic and activities, ensuring that communication security policies are adhered to and any anomalies are detected and addressed promptly.\"]})})]});export const richText90=/*#__PURE__*/e(t.Fragment,{children:/*#__PURE__*/e(\"p\",{children:\"Automate Endpoint Protection\"})});export const richText91=/*#__PURE__*/e(t.Fragment,{children:/*#__PURE__*/e(\"p\",{children:\"Mindflow streamlines user action investigations by automating audit requests on Microsoft Purview. This flow retrieves and analyzes user actions during an Azure Active Directory session, creating detailed reports stored in predefined locations. Integration with Teams ensures seamless collaboration and faster incident response.\"})});export const richText92=/*#__PURE__*/n(t.Fragment,{children:[/*#__PURE__*/e(\"p\",{children:\"Manual Audit Request Submission  \"}),/*#__PURE__*/e(\"p\",{children:\"Delayed Incident Response Times  \"}),/*#__PURE__*/e(\"p\",{children:\"Inconsistent Data Reporting\"})]});export const richText93=/*#__PURE__*/n(t.Fragment,{children:[/*#__PURE__*/e(\"p\",{children:\"Faster Data Collection  \"}),/*#__PURE__*/e(\"p\",{children:\"Improved Incident Response  \"}),/*#__PURE__*/e(\"p\",{children:\"Consistent Reporting\"})]});export const richText94=/*#__PURE__*/n(t.Fragment,{children:[/*#__PURE__*/n(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Investigating User Actions\"}),\": User actions during an Azure Active Directory session are automatically retrieved and analyzed. This task, typically requiring manual audit requests and data collection, is streamlined, reducing the time and effort needed for comprehensive investigations.\"]}),/*#__PURE__*/n(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Data Compilation and Reporting\"}),\": Relevant data such as operation, event source, and user details are curated and compiled into detailed reports. This automation eliminates manual data sorting and report generation, ensuring consistent and accurate reporting while saving time.\"]}),/*#__PURE__*/n(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Integration with Microsoft Teams\"}),\": The process is initiated directly from Microsoft Teams, allowing seamless collaboration and communication. This replaces fragmented communication methods, enhancing process visibility and accessibility for team members and ensuring prompt incident response.\"]})]});export const richText95=/*#__PURE__*/n(t.Fragment,{children:[/*#__PURE__*/e(\"p\",{children:/*#__PURE__*/n(\"span\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Microsoft Graph Security\"}),\"\\xa0retrieves and analyzes user actions during an Azure Active Directory session. It is essential for automating audit data collection, investigating user activities, and ensuring security compliance.\"]})}),/*#__PURE__*/e(\"p\",{children:/*#__PURE__*/n(\"span\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Microsoft Graph Files\"}),\": This service creates and manages workbooks for compiling audit data. It automates data storage and report generation, replacing manual data entry and ensuring that information is organized and accessible.\"]})}),/*#__PURE__*/n(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Microsoft Teams\"}),\": In this use case, Microsoft Teams is the platform for initiating the investigation process. It allows team members to trigger workflows directly from a communication tool they use daily, facilitating seamless collaboration and quick response to security incidents.\"]})]});export const richText96=/*#__PURE__*/e(t.Fragment,{children:/*#__PURE__*/e(\"p\",{children:\"Automate Data Analysis\"})});export const richText97=/*#__PURE__*/e(t.Fragment,{children:/*#__PURE__*/e(\"p\",{children:\"Mindflow streamlines PowerBI dataflow updates by automating cascading refreshes across linked datasets. This process ensures timely data availability and reduces manual intervention. By leveraging Mindflow's orchestration capabilities, organizations enhance data reliability and save time, allowing teams to focus on insights rather than updates.\"})});export const richText98=/*#__PURE__*/n(t.Fragment,{children:[/*#__PURE__*/e(\"p\",{children:\"Manual Dataflow Monitoring  \"}),/*#__PURE__*/e(\"p\",{children:\"Delayed Data Availability  \"}),/*#__PURE__*/e(\"p\",{children:\"Inconsistent Data Refresh Cycles\"})]});export const richText99=/*#__PURE__*/n(t.Fragment,{children:[/*#__PURE__*/e(\"p\",{children:\"Streamlined Data Refreshes  \"}),/*#__PURE__*/e(\"p\",{children:\"Consistent Data Availability  \"}),/*#__PURE__*/e(\"p\",{children:\"Reduced Manual Intervention\"})]});export const richText100=/*#__PURE__*/n(t.Fragment,{children:[/*#__PURE__*/n(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Cascading Dataflow Updates\"}),\": Cascading updates of linked dataflows in PowerBI ensure that all related datasets are refreshed in sequence. This automation reduces the risk of outdated data and manual errors, providing timely and accurate data availability compared to manual refresh processes.\"]}),/*#__PURE__*/n(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Status Monitoring\"}),\": Monitoring the status of dataflow refreshes automatically tracks progress and completion. This eliminates the need for manual checks and follow-ups, ensuring that teams are promptly informed of any issues, leading to quicker resolutions and less downtime.\"]}),/*#__PURE__*/n(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Scheduled Triggers\"}),\": Automating the scheduling of dataflow refreshes allows updates to occur at optimal times without manual intervention. This ensures data is always current and available when needed, improving efficiency and reducing the workload on IT teams.\"]})]});export const richText101=/*#__PURE__*/e(t.Fragment,{children:/*#__PURE__*/n(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Microsoft PowerBI:\"}),\" PowerBI is central to managing dataflow updates in this use case. It executes cascading refreshes across linked datasets, ensuring that all data is current and synchronized. This orchestration eliminates manual refresh tasks, enhancing data accuracy and availability.\"]})});export const richText102=/*#__PURE__*/e(t.Fragment,{children:/*#__PURE__*/e(\"p\",{children:\"Automate Reporting\"})});export const richText103=/*#__PURE__*/e(t.Fragment,{children:/*#__PURE__*/e(\"p\",{children:\"Trigger PCI web application scans using Tenable, generate PDF reports, upload them to SharePoint, and share URLs via Slack or Teams. This automation enhances security by streamlining vulnerability management, improving collaboration, reducing manual tasks, and ensuring timely updates.\"})});export const richText104=/*#__PURE__*/n(t.Fragment,{children:[/*#__PURE__*/e(\"p\",{children:\"Manual Scan Configuration Time  \"}),/*#__PURE__*/e(\"p\",{children:\"Delayed Vulnerability Reporting  \"}),/*#__PURE__*/e(\"p\",{children:\"Inefficient Collaboration Processes\"})]});export const richText105=/*#__PURE__*/n(t.Fragment,{children:[/*#__PURE__*/e(\"p\",{children:\"Faster Scan Configuration  \"}),/*#__PURE__*/e(\"p\",{children:\"Real-Time Vulnerability Insights  \"}),/*#__PURE__*/e(\"p\",{children:\"Improved Team Collaboration\"})]});export const richText106=/*#__PURE__*/n(t.Fragment,{children:[/*#__PURE__*/e(\"p\",{children:/*#__PURE__*/n(\"span\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Scan Configuration on Tenable\"}),\": Tenable scans can be configured automatically, reducing the need for manual setup and ensuring consistent scan parameters. This automation minimizes errors and accelerates the initiation of security assessments.\"]})}),/*#__PURE__*/n(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Report Generation and Sharing:\"}),\" Generating and sharing PDF reports is automated, eliminating the manual compilation and distribution of scan results. This ensures timely delivery of insights to stakeholders and enhances the efficiency of reporting processes.\"]}),/*#__PURE__*/n(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Collaboration via Slack or Teams\"}),\": Sharing scan results through Slack or Teams is automated, facilitating immediate access to critical information within team communication channels. This integration improves collaboration and ensures that all team members are informed without delay.\"]})]});export const richText107=/*#__PURE__*/n(t.Fragment,{children:[/*#__PURE__*/n(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Tenable Web Application Scanning\"}),\": Tenable is used to configure and launch web application scans. It automates the scanning process, ensuring consistent security assessments and reducing manual setup time.\"]}),/*#__PURE__*/n(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Microsoft Graph Sites and Files\"}),\": These APIs facilitate uploading scan reports to SharePoint. They automate the storage and organization of reports, ensuring easy access and retrieval for team members.\"]}),/*#__PURE__*/n(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Slack\"}),\": Slack is the communication channel for sharing scan results. It provides immediate access to critical information, enhances team collaboration, and promptly informs all members.\"]})]});export const richText108=/*#__PURE__*/e(t.Fragment,{children:/*#__PURE__*/e(\"p\",{children:\"Automate Data Privacy\"})});export const richText109=/*#__PURE__*/e(t.Fragment,{children:/*#__PURE__*/e(\"p\",{children:\"Mindflow's automated reconnaissance identifies public company-linked S3 buckets using Google Custom Search and Grayhatwarfare. This process generates a report in Jira, enhancing security by detecting exposed assets and misconfigurations. It streamlines vulnerability management and asset management, ensuring compliance and operational efficiency.\"})});export const richText110=/*#__PURE__*/n(t.Fragment,{children:[/*#__PURE__*/e(\"p\",{children:\"Manual Asset Discovery  \"}),/*#__PURE__*/e(\"p\",{children:\"Delayed Threat Detection  \"}),/*#__PURE__*/e(\"p\",{children:\"Increased Security Workload\"})]});export const richText111=/*#__PURE__*/n(t.Fragment,{children:[/*#__PURE__*/e(\"p\",{children:\"Efficient Asset Discovery  \"}),/*#__PURE__*/e(\"p\",{children:\"Rapid Threat Detection  \"}),/*#__PURE__*/e(\"p\",{children:\"Reduced Security Workload\"})]});export const richText112=/*#__PURE__*/e(t.Fragment,{children:/*#__PURE__*/e(\"p\",{children:\"Reconnaissance for S3 Buckets: Publicly linked S3 buckets are identified using Google Custom Search and Grayhatwarfare. This task, traditionally requiring manual searches and checks, is automated to quickly detect potential exposures, reducing the risk of oversight and enhancing security posture.\\\\n\\\\nReport Generation in Jira: Findings from the reconnaissance are automatically compiled into a report and logged in Jira. This replaces manual report creation, ensuring consistent documentation and faster response times, while freeing up resources for more strategic tasks.\\\\n\\\\nCommunication via Teams: The process updates are communicated through Microsoft Teams, replacing fragmented email chains. This integration ensures that all stakeholders are informed in real-time, improving collaboration and decision-making efficiency.\"})});export const richText113=/*#__PURE__*/n(t.Fragment,{children:[/*#__PURE__*/e(\"p\",{children:/*#__PURE__*/n(\"span\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Google Custom Search\"}),\": In this use case, Google Custom Search performs targeted searches for publicly linked S3 buckets. It is the primary tool for gathering data on potential exposures, automating what would typically be a manual search process.\"]})}),/*#__PURE__*/e(\"p\",{children:/*#__PURE__*/n(\"span\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Grayhatwarfare\"}),\": Grayhatwarfare verifies the exposure status of identified S3 buckets. It is critical to confirm whether the buckets are publicly accessible, automate the validation process, and ensure accurate threat detection.\"]})}),/*#__PURE__*/e(\"p\",{children:/*#__PURE__*/n(\"span\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Jira\"}),\": Jira documents and manages the findings of the reconnaissance process. It automates the creation of detailed reports, providing a structured and efficient way to track security issues and streamline communication with relevant teams.\"]})}),/*#__PURE__*/n(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Microsoft Teams\"}),\": Microsoft Teams facilitates real-time communication of process updates. It ensures that all stakeholders are promptly informed, enhancing collaboration and decision-making by integrating updates into a familiar communication platform.\"]})]});export const richText114=/*#__PURE__*/e(t.Fragment,{children:/*#__PURE__*/e(\"p\",{children:\"Automate Incident Analysis\"})});export const richText115=/*#__PURE__*/e(t.Fragment,{children:/*#__PURE__*/e(\"p\",{children:\"Integrating Darktrace AI Analyst with Slack, Mindflow streamlines incident management by automating reviewing and acknowledging pending incidents. This process enhances network security by efficiently managing vulnerabilities and incidents, ensuring timely responses, and reducing manual intervention.\"})});export const richText116=/*#__PURE__*/n(t.Fragment,{children:[/*#__PURE__*/e(\"p\",{children:\"Manual Incident Review Time  \"}),/*#__PURE__*/e(\"p\",{children:\"Delayed Incident Response  \"}),/*#__PURE__*/e(\"p\",{children:\"Inconsistent Incident Acknowledgment\"})]});export const richText117=/*#__PURE__*/n(t.Fragment,{children:[/*#__PURE__*/e(\"p\",{children:\"Faster Incident Resolution  \"}),/*#__PURE__*/e(\"p\",{children:\"Consistent Incident Acknowledgment  \"}),/*#__PURE__*/e(\"p\",{children:\"Improved Team Collaboration\"})]});export const richText118=/*#__PURE__*/n(t.Fragment,{children:[/*#__PURE__*/e(\"p\",{children:/*#__PURE__*/n(\"span\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Incident Review and Acknowledgment\"}),\": Pending incidents are reviewed and acknowledged automatically, reducing the time and effort required for manual checks. This ensures timely responses and consistent handling of incidents, minimizes the risk of oversight, and enhances overall incident management efficiency.\"]})}),/*#__PURE__*/n(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Incident Notification via Slack\"}),\": Incident notifications are sent directly to Slack channels, ensuring that team members are promptly informed. This replaces manual communication methods, improving the speed and reliability of information dissemination and enabling faster decision-making.\"]}),/*#__PURE__*/n(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Incident Reporting with AI\"}),\": AI-generated reports provide detailed incident summaries, replacing manual report generation. This automation enhances the accuracy and speed of reporting, allowing teams to quickly understand incidents and take appropriate actions without the delays associated with manual report creation.\"]})]});export const richText119=/*#__PURE__*/n(t.Fragment,{children:[/*#__PURE__*/e(\"p\",{children:/*#__PURE__*/n(\"span\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Slack\"}),\": In this use case, Slack is the communication hub for incident notifications. It ensures that team members receive timely updates about incidents, facilitating quick responses and decision-making within a familiar platform.\"]})}),/*#__PURE__*/e(\"p\",{children:/*#__PURE__*/n(\"span\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Darktrace AI Analyst\"}),\": The Darktrace AI Analyst is responsible for detecting and analyzing incidents. It provides the intelligence needed to identify potential threats, allowing Mindflow to automate the review and acknowledgment process, reduce manual intervention, and enhance security posture.\"]})})]});export const richText120=/*#__PURE__*/e(t.Fragment,{children:/*#__PURE__*/e(\"p\",{children:\"Automate AI Meeting Summaries\"})});export const richText121=/*#__PURE__*/e(t.Fragment,{children:/*#__PURE__*/e(\"p\",{children:\"Use Mindflow to generate meeting summaries from Google Meet recordings. This automation extracts transcripts from Google Drive, creates summaries with AI, and sends them to attendees via Slack. Streamline meeting documentation with Google Drive, Google Calendar, and Slack integration to enhance productivity.\"})});export const richText122=/*#__PURE__*/n(t.Fragment,{children:[/*#__PURE__*/e(\"p\",{children:\"Manual Transcript Extraction  \"}),/*#__PURE__*/e(\"p\",{children:\"Delayed Meeting Summaries  \"}),/*#__PURE__*/e(\"p\",{children:\"Inefficient Communication Channels\"})]});export const richText123=/*#__PURE__*/n(t.Fragment,{children:[/*#__PURE__*/e(\"p\",{children:\"Streamlined Meeting Documentation  \"}),/*#__PURE__*/e(\"p\",{children:\"Faster Information Sharing  \"}),/*#__PURE__*/e(\"p\",{children:\"Improved Team Collaboration\"})]});export const richText124=/*#__PURE__*/n(t.Fragment,{children:[/*#__PURE__*/n(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Transcript Extraction from Google Drive\"}),\": Meeting transcripts are automatically extracted from Google Drive, reducing the need for manual retrieval and processing. This automation minimizes the risk of errors and accelerates the availability of meeting content for further use.\"]}),/*#__PURE__*/e(\"p\",{children:/*#__PURE__*/n(\"span\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Summary Generation with AI\"}),\": AI generates concise meeting summaries from transcripts. This task, which would typically require manual effort and time, is completed swiftly and accurately, ensuring that key points are captured and shared promptly.\"]})}),/*#__PURE__*/e(\"p\",{children:/*#__PURE__*/n(\"span\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Notification via Slack\"}),\": Summaries are sent to attendees through Slack, replacing manual email notifications. This integration ensures immediate and consistent communication, enhances team collaboration, and keeps everyone informed without delay.\"]})})]});export const richText125=/*#__PURE__*/n(t.Fragment,{children:[/*#__PURE__*/e(\"p\",{children:/*#__PURE__*/n(\"span\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Google Drive:\"}),\"\\xa0In this use case, Google Drive is responsible for accessing and retrieving meeting transcripts stored there. It facilitates the seamless extraction of content, which is essential for generating summaries and ensuring that meeting information is readily available for processing.\"]})}),/*#__PURE__*/n(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Mindflow AI Agent:\"}),\" The AI Agent transforms raw meeting transcripts into concise summaries. Analyzing the extracted content generates clear and actionable summaries, reducing the need for manual summarization and ensuring that essential information is highlighted and communicated effectively.\"]}),/*#__PURE__*/n(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Slack:\"}),\" Slack distributes the generated meeting summaries to attendees. By sending notifications through Slack, it ensures that team members receive timely updates on a platform they frequently use, enhancing communication and collaboration within the team.\"]})]});export const richText126=/*#__PURE__*/e(t.Fragment,{children:/*#__PURE__*/e(\"p\",{children:\"Automate Vulnerability Management\"})});export const richText127=/*#__PURE__*/e(t.Fragment,{children:/*#__PURE__*/e(\"p\",{children:\"Mindflow simplifies vulnerability management by automating the Known Exploited Vulnerabilities catalog collection from CISA. This information is uploaded to SharePoint using Microsoft Graph APIs, ensuring prompt updates and effective storage. Improve security posture by keeping an updated vulnerability database without manual effort.\"})});export const richText128=/*#__PURE__*/n(t.Fragment,{children:[/*#__PURE__*/e(\"p\",{children:\"Manual Data Retrieval Effort  \"}),/*#__PURE__*/e(\"p\",{children:\"Delayed Vulnerability Updates  \"}),/*#__PURE__*/e(\"p\",{children:\"Inconsistent Data Storage Practices\"})]});export const richText129=/*#__PURE__*/n(t.Fragment,{children:[/*#__PURE__*/e(\"p\",{children:\"Streamlined Data Retrieval Process  \"}),/*#__PURE__*/e(\"p\",{children:\"Timely Vulnerability Catalog Updates  \"}),/*#__PURE__*/e(\"p\",{children:\"Consistent Data Storage Management\"})]});export const richText130=/*#__PURE__*/n(t.Fragment,{children:[/*#__PURE__*/n(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Retrieving Vulnerability Data from CISA\"}),\": The latest Known Exploited Vulnerabilities catalog is fetched from CISA, a task that would otherwise require manual downloading and verification. This automation ensures that the most current data is always available, reducing the risk of outdated information impacting security decisions.\"]}),/*#__PURE__*/n(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Uploading Data to SharePoint\"}),\": The retrieved vulnerability data is automatically uploaded to SharePoint, eliminating the need for manual file transfers. This process ensures consistent data storage and easy access for team members, enhancing collaboration and reducing the potential for errors associated with manual uploads.\"]}),/*#__PURE__*/n(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Scheduling Regular Updates:\"}),\" The automation flow is triggered on a predefined schedule, ensuring regular updates without manual intervention. This task reduces the administrative burden on teams and guarantees that the vulnerability database remains current, supporting proactive security management.\"]})]});export const richText131=/*#__PURE__*/n(t.Fragment,{children:[/*#__PURE__*/e(\"p\",{children:/*#__PURE__*/n(\"span\",{children:[/*#__PURE__*/e(\"strong\",{children:\"CISA\"}),\": The CISA integration accesses the latest Known Exploited Vulnerabilities catalog in this use case. It is the primary source of vulnerability data, ensuring that the most recent information is retrieved for analysis and storage.\"]})}),/*#__PURE__*/e(\"p\",{children:/*#__PURE__*/n(\"span\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Microsoft Graph Sites:\"}),\"\\xa0This integration interacts with SharePoint to manage sites and drive information. It facilitates the identification of the correct storage locations for vulnerability data and ensures that files are uploaded to the appropriate SharePoint sites.\"]})}),/*#__PURE__*/n(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Microsoft Graph Files\"}),\": Microsoft Graph Files handles uploading the vulnerability data to SharePoint. It automates the file transfer process, ensuring that the data is consistently stored and easily accessible to team members, reducing the need for manual uploads.\"]})]});export const richText132=/*#__PURE__*/e(t.Fragment,{children:/*#__PURE__*/e(\"p\",{children:\"Automate PowerBI report exports and email distribution using Mindflow. Trigger exports on a schedule, refresh permissions, and retrieve reports from workspaces. Export reports in formats like .pptx or .pdf, loop until completion, and send via email. Streamline reporting and enhance productivity.\"})});export const richText133=/*#__PURE__*/n(t.Fragment,{children:[/*#__PURE__*/e(\"p\",{children:\"Manual Report Distribution  \"}),/*#__PURE__*/e(\"p\",{children:\"Time-Consuming Export Processes  \"}),/*#__PURE__*/e(\"p\",{children:\"Delayed Report Delivery\"})]});export const richText134=/*#__PURE__*/n(t.Fragment,{children:[/*#__PURE__*/e(\"p\",{children:\"Efficient Report Distribution  \"}),/*#__PURE__*/e(\"p\",{children:\"Faster Export Processes  \"}),/*#__PURE__*/e(\"p\",{children:\"Timely Report Delivery\"})]});export const richText135=/*#__PURE__*/n(t.Fragment,{children:[/*#__PURE__*/e(\"p\",{children:/*#__PURE__*/n(\"span\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Exporting PowerBI Reports\"}),\": Reports are exported from PowerBI to specified formats like .pptx or .pdf. Manual exporting involves repetitive steps and potential errors. Automation ensures accuracy and efficiency, reducing the time spent on manual exports.\"]})}),/*#__PURE__*/n(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Emailing Reports\"}),\": Reports are automatically attached to emails and sent to designated recipients. Manual emailing involves multiple steps and risks of missing recipients. Automation streamlines the process, ensuring timely and accurate distribution.\"]}),/*#__PURE__*/n(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Permission Refreshing\"}),\": User permissions are refreshed to ensure access to the latest reports. Manually updating permissions can lead to outdated access rights. Automation guarantees up-to-date permissions, enhancing security and access management.\"]})]});export const richText136=/*#__PURE__*/n(t.Fragment,{children:[/*#__PURE__*/n(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Microsoft PowerBI:\"}),\" In this use case, PowerBI generates and exports reports in specified formats. It serves as the data source, distributing necessary reports to stakeholders and eliminating manual report generation and export tasks.\"]}),/*#__PURE__*/e(\"p\",{children:/*#__PURE__*/n(\"span\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Microsoft Outlook:\"}),\"\\xa0We use Outlook in this flow to send the exported reports. It automates the process of attaching reports to emails and sending them to designated recipients, ensuring timely and accurate delivery without manual intervention.\"]})})]});export const richText137=/*#__PURE__*/e(t.Fragment,{children:/*#__PURE__*/e(\"p\",{children:\"Automate Network Security\"})});export const richText138=/*#__PURE__*/e(t.Fragment,{children:/*#__PURE__*/e(\"p\",{children:\"Continuous Network Vulnerability Monitoring enhances security by automating vulnerability detection and reporting. This workflow integrates Vulners, Shodan, Google Sheets, and Slack to provide SOC Analysts with real-time vulnerability data and alerts, enabling efficient network protection and proactive threat management.\"})});export const richText139=/*#__PURE__*/n(t.Fragment,{children:[/*#__PURE__*/e(\"p\",{children:\"Manual Vulnerability Tracking  \"}),/*#__PURE__*/e(\"p\",{children:\"Delayed Threat Response  \"}),/*#__PURE__*/e(\"p\",{children:\"Resource-Intensive Data Analysis\"})]});export const richText140=/*#__PURE__*/n(t.Fragment,{children:[/*#__PURE__*/e(\"p\",{children:\"Real-Time Vulnerability Alerts  \"}),/*#__PURE__*/e(\"p\",{children:\"Streamlined Data Management  \"}),/*#__PURE__*/e(\"p\",{children:\"Efficient Threat Mitigation\"})]});export const richText141=/*#__PURE__*/n(t.Fragment,{children:[/*#__PURE__*/n(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Vulnerability Detection and Reporting\"}),\": Continuous monitoring of network vulnerabilities is automated, reducing the need for manual tracking and analysis. This ensures timely detection and reporting of vulnerabilities, enhancing security posture and allowing teams to focus on strategic tasks rather than routine checks.\"]}),/*#__PURE__*/n(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Data Collection and Analysis\"}),\": Automated data gathering from Vulners and Shodan streamlines the process of collecting and analyzing vulnerability data. This eliminates the manual effort required to compile and interpret data, leading to faster insights and more informed decision-making.\"]}),/*#__PURE__*/n(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Alert and Notification Management\"}),\": Integration with Slack automates the alerting process, ensuring that SOC Analysts receive real-time notifications about critical vulnerabilities. This replaces manual alert systems, improving response times and promptly addressing potential threats\"]})]});export const richText142=/*#__PURE__*/n(t.Fragment,{children:[/*#__PURE__*/n(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Vulners\"}),\": In this use case, Vulners gathers vulnerability data from various sources. It plays a critical role in providing up-to-date information on potential threats, essential for maintaining network security. By integrating Vulners, Mindflow ensures that the latest vulnerability data is automatically collected and analyzed.\"]}),/*#__PURE__*/n(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Shodan\"}),\": Shodan performs network queries to identify exposed devices and services. It helps detect potential vulnerabilities by scanning the network for open ports and services. This integration allows continuous network security monitoring and assessment, replacing manual scanning efforts.\"]}),/*#__PURE__*/n(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Google Sheets\"}),\": Google Sheets acts as a repository for storing and organizing vulnerability data. It provides a structured format for logging and reviewing vulnerability details, making it easier for SOC Analysts to access and analyze the information. This integration streamlines data management and reporting processes.\"]}),/*#__PURE__*/n(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Slack\"}),\": Slack is used for real-time communication and alerting. It sends notifications to SOC Analysts about detected vulnerabilities, ensuring they are informed promptly. By integrating Slack, Mindflow enhances the security team's responsiveness, enabling quick action on potential threats.\"]})]});export const richText143=/*#__PURE__*/e(t.Fragment,{children:/*#__PURE__*/e(\"p\",{children:\"Automate Remediation\"})});export const richText144=/*#__PURE__*/e(t.Fragment,{children:/*#__PURE__*/e(\"p\",{children:\"Mindflow streamlines cloud security by automating user account management in Microsoft Teams. It ingests user actions, formats remediation steps, and executes tasks like password resets and session wipes using Microsoft Graph, enhancing security and operational efficiency.\"})});export const richText145=/*#__PURE__*/n(t.Fragment,{children:[/*#__PURE__*/e(\"p\",{children:\"Manual User Account Management  \"}),/*#__PURE__*/e(\"p\",{children:\"Delayed Security Response  \"}),/*#__PURE__*/e(\"p\",{children:\"Increased Human Error Risk\"})]});export const richText146=/*#__PURE__*/n(t.Fragment,{children:[/*#__PURE__*/e(\"p\",{children:\"Faster Incident Resolution  \"}),/*#__PURE__*/e(\"p\",{children:\"Streamlined User Management  \"}),/*#__PURE__*/e(\"p\",{children:\"Reduced Security Risks\"})]});export const richText147=/*#__PURE__*/n(t.Fragment,{children:[/*#__PURE__*/n(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"User Account Management\"}),\": User accounts are managed through automated processes, reducing the need for manual intervention. This automation minimizes the risk of human error and accelerates the process, enhancing security and efficiency.\"]}),/*#__PURE__*/n(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Password Reset and Session Wipe\"}),\": Password resets and session wipes are executed automatically, ensuring immediate response to security incidents. This reduces downtime and potential security breaches compared to manual handling.\"]}),/*#__PURE__*/n(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Security Incident Response\"}),\": Automated response to security incidents ensures quick action, reducing the time to address potential threats. This proactive approach enhances overall security posture and operational efficiency.\"]})]});export const richText148=/*#__PURE__*/n(t.Fragment,{children:[/*#__PURE__*/n(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Microsoft Teams\"}),\": In this use case, Microsoft Teams is used to ingest user actions and initiate remediation. It acts as a communication hub, allowing team members to interact with the automation workflow seamlessly and efficiently.\"]}),/*#__PURE__*/n(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Microsoft Graph - Users\"}),\": Microsoft Graph interfaces with user accounts to perform actions like password resets and session wipes. It enables direct interaction with Microsoft services, automating tasks typically requiring manual intervention, thus enhancing security and operational efficiency.\"]})]});export const richText149=/*#__PURE__*/e(t.Fragment,{children:/*#__PURE__*/e(\"p\",{children:\"Detect and remediate suspicious download patterns in Google Drive using Google Workspace Admin tools. This workflow automates monitoring, alerting, and actioning of security risks like multiple sensitive file downloads, enhancing security posture and reducing manual log investigations with real-time insights and remediation capabilities.\"})});export const richText150=/*#__PURE__*/n(t.Fragment,{children:[/*#__PURE__*/e(\"p\",{children:\"Manual review of log files  \"}),/*#__PURE__*/e(\"p\",{children:\"Delayed threat detection responses  \"}),/*#__PURE__*/e(\"p\",{children:\"High risk of unnoticed anomalies  \"})]});export const richText151=/*#__PURE__*/n(t.Fragment,{children:[/*#__PURE__*/e(\"p\",{children:\"Real-time threat identification  \"}),/*#__PURE__*/e(\"p\",{children:\"Improved response efficiency  \"}),/*#__PURE__*/e(\"p\",{children:\"Enhanced data security compliance  \"})]});export const richText152=/*#__PURE__*/n(t.Fragment,{children:[/*#__PURE__*/n(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Monitoring Google Drive Events\"}),\": Continuous monitoring of Google Drive download activities is automated, identifying unusual patterns, such as multiple file downloads within a short timeframe. Manual monitoring often misses such patterns due to log volume, while automation ensures swift detection, reducing the risk of unnoticed data breaches.\"]}),/*#__PURE__*/n(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Event Triage and Risk Assessment\"}),\": Automated triage assesses flagged events for their severity by analyzing user activities and contextual data. Compared to manual assessments, this approach provides faster, more consistent evaluations, enabling security teams to focus on high-priority threats instead of repetitive reviews.\"]}),/*#__PURE__*/n(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Automated Remediation Actions\"}),\": Remedial actions, such as removing user access to Drive or notifying the security team, are triggered based on predefined criteria. Manual interventions are slower and prone to errors, while automation ensures timely and precise responses, minimizing potential damage from security incidents.\"]})]});export const richText153=/*#__PURE__*/n(t.Fragment,{children:[/*#__PURE__*/n(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Google Workspace Admin\"}),\": This tool is central to monitoring download activities across Drive. It provides access to event logs and user activities. It enables the workflow to identify suspicious patterns, such as multiple file downloads or unusual behavior that may indicate potential data security risks.\"]}),/*#__PURE__*/n(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Google Workspace Admin Directory\"}),\": The directory queries user details and contextual information when suspicious events are detected. It ensures accurate triage by linking download activities to specific user profiles, helping assess risks, and taking appropriate remediation actions.\"]}),/*#__PURE__*/n(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Google Sheets\"}),\": Google Sheets serves as a data repository for tracking and recording flagged download events. It enables the workflow to log activity details systematically, creating an easily accessible audit trail for review and compliance.\"]})]});export const richText154=/*#__PURE__*/e(t.Fragment,{children:/*#__PURE__*/e(\"p\",{children:\"Streamline phishing email investigations by automating the analysis of suspicious emails through integrated security tools. This workflow combines EmailRep for sender verification, URLScan and VirusTotal for attachment scanning, and AI-powered risk assessment, delivering results directly to Slack.\"})});export const richText155=/*#__PURE__*/n(t.Fragment,{children:[/*#__PURE__*/e(\"p\",{children:\"Time consuming manual email analysis\"}),/*#__PURE__*/e(\"p\",{children:\"Security tool integration complexities\"}),/*#__PURE__*/e(\"p\",{children:\"Risk of investigation errors\"})]});export const richText156=/*#__PURE__*/n(t.Fragment,{children:[/*#__PURE__*/e(\"p\",{children:\"Instant multi-tool email security \"}),/*#__PURE__*/e(\"p\",{children:\"Accelerated incident response\"}),/*#__PURE__*/e(\"p\",{children:\"AI-enhanced risk assessment\"})]});export const richText157=/*#__PURE__*/n(t.Fragment,{children:[/*#__PURE__*/n(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Email Reputation Assessment\"}),\": The workflow instantly checks the sender's reputation through EmailRep, replacing time-consuming manual verification processes. This automated assessment provides immediate insights into email legitimacy, helping security teams quickly identify potential threats.\"]}),/*#__PURE__*/n(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"URL and Attachment Analysis\"}),\": Suspicious URLs and attachments are automatically submitted to URLScan and VirusTotal for comprehensive security scanning. This parallel processing drastically reduces analysis time from hours to minutes, eliminating the need for manual tool switching and data entry.\"]}),/*#__PURE__*/n(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"AI-Powered Security Evaluation\"}),\": The integrated AI Agent performs real-time risk assessment of all collected security data, providing contextual analysis and threat scoring. This automated evaluation replaces subjective manual analysis, ensuring consistent and reliable threat assessment while reducing analyst fatigue.\"]}),/*#__PURE__*/n(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Results Communication\"}),\": Security findings are automatically consolidated and delivered to Slack, replacing manual report compilation and distribution. This immediate notification system ensures rapid response to threats and maintains clear communication channels across security teams.\"]})]});export const richText158=/*#__PURE__*/n(t.Fragment,{children:[/*#__PURE__*/n(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"EmailRep\"}),\": This reputation analysis service initially assesses email sender legitimacy and trustworthiness. It evaluates sender domains and addresses against known threat indicators, providing a first line of defense in identifying potentially malicious emails.\"]}),/*#__PURE__*/n(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"URLScan\"}),\": Operating as a specialized URL analysis service, URLScan examines suspicious links found in emails. It captures and analyzes webpage content, behaviors, and potential malicious indicators, helping identify phishing sites and web-based threats.\"]}),/*#__PURE__*/n(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"VirusTotal\"}),\": This comprehensive security service scans email attachments and URLs for malware and other threats. It leverages multiple antivirus engines and security tools to provide a thorough analysis of potential threats and offers detailed reports on file and URL safety.\"]}),/*#__PURE__*/n(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Slack\"}),\": As the communication endpoint, Slack receives and displays consolidated analysis results. It ensures security teams get immediate notifications about potential threats, enabling quick response to identified risks while maintaining clear communication channels.\"]}),/*#__PURE__*/n(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Mindflow AI Agent\"}),\": The AI Agent is an \",/*#__PURE__*/e(\"strong\",{children:\"autonomous\"}),\" analysis step that reviews all security tools' inputs and provides a comprehensive risk assessment. It evaluates combined results from EmailRep, URLScan, and VirusTotal to deliver contextual security insights and threat scoring.\"]})]});export const richText159=/*#__PURE__*/e(t.Fragment,{children:/*#__PURE__*/e(\"p\",{children:\"Triage email attachments for threats using Material Security and VirusTotal. This use case enhances email security by automating the identification and analysis of suspicious attachments, ensuring prompt and accurate threat detection.\"})});export const richText160=/*#__PURE__*/n(t.Fragment,{children:[/*#__PURE__*/e(\"p\",{children:\"Manual Attachment Analysis\"}),/*#__PURE__*/e(\"p\",{children:\"Delayed Threat Detection\"}),/*#__PURE__*/e(\"p\",{children:\"Higher Risk of Missing Threats\"})]});export const richText161=/*#__PURE__*/n(t.Fragment,{children:[/*#__PURE__*/e(\"p\",{children:\"Faster Threat Identification\"}),/*#__PURE__*/e(\"p\",{children:\"Enhanced Email Security\"}),/*#__PURE__*/e(\"p\",{children:\"Reduced Manual Effort\"})]});export const richText162=/*#__PURE__*/n(t.Fragment,{children:[/*#__PURE__*/n(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Receiving Event from Material Security\"}),\": Mindflow automates the reception of security events from Material Security. This eliminates the need for manual monitoring of security alerts, ensuring that important security events are promptly captured and processed without delay.\"]}),/*#__PURE__*/n(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Computing Case Details\"}),\": Mindflow automates the computation of details about case messages in Material Security. This task, which would typically involve manual data extraction and analysis, is streamlined, reducing the potential for human error and expediting the process of gathering necessary details.\"]}),/*#__PURE__*/n(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Extracting MessageID and Date\"}),\": Mindflow automates the extraction of MessageID and date from reports. This automation ensures that critical data points are accurately captured and ready for subsequent steps, significantly reducing the time spent on manual data entry and extraction.\"]}),/*#__PURE__*/n(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Retrieving Message Details\"}),\": Mindflow automatically retrieves detailed information about messages in Material Security. This replaces the manual effort of searching for and compiling message details, ensuring that all necessary information is available quickly and accurately.\"]}),/*#__PURE__*/n(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Getting Attachment Data\"}),\": Mindflow automates the retrieval of attachment data from messages. This ensures that all relevant attachments are identified and prepared for analysis, reducing the risk of missing important files and speeding up the process.\"]}),/*#__PURE__*/n(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Downloading and Unzipping Attachments\"}),\": Mindflow automates the download and extraction of attachments from Material Security. This task, which can be time-consuming when done manually, is handled efficiently, ensuring that files are ready for analysis without delay.\"]}),/*#__PURE__*/n(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Searching File Hash in VirusTotal\"}),\": Mindflow automates the submission of file hashes to VirusTotal for threat analysis. This ensures that files are quickly and accurately scanned for potential threats, providing timely insights into any security risks associated with the attachments.\"]})]});export const richText163=/*#__PURE__*/n(t.Fragment,{children:[/*#__PURE__*/n(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Material Security\"}),\": In this use case, Material Security is responsible for detecting and generating events related to email security threats. It provides detailed information about case messages, attachments, and potential risks. Mindflow leverages Material Security to automate the retrieval, computation, and analysis of security-related data, ensuring that threat detection is accurate and timely.\"]}),/*#__PURE__*/n(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"VirusTotal\"}),\": VirusTotal plays a critical role in analyzing the attachments extracted from emails. Once the attachments are downloaded and unzipped, their file hashes are sent to VirusTotal for comprehensive threat analysis. This automation enables rapid identification of malicious files, ensuring that potential threats are promptly detected and addressed.\"]})]});export const richText164=/*#__PURE__*/e(t.Fragment,{children:/*#__PURE__*/e(\"p\",{children:\"This use case performs bi-weekly scans of domain Mail Exchange servers for potential misconduct or abuse. By integrating MxToolbox, AbuseIPDB, IPInfo, and Slack aggregates and reports server information to Slack, enhancing monitoring and improving organizational security practices.\"})});export const richText165=/*#__PURE__*/n(t.Fragment,{children:[/*#__PURE__*/e(\"p\",{children:\"Time consuming remediation\"}),/*#__PURE__*/e(\"p\",{children:\"Inconsistent monitoring\"}),/*#__PURE__*/e(\"p\",{children:\"Delayed abuse detection\"})]});export const richText166=/*#__PURE__*/n(t.Fragment,{children:[/*#__PURE__*/e(\"p\",{children:\"Real-time abuse reports\"}),/*#__PURE__*/e(\"p\",{children:\"Consistent domain monitoring\"}),/*#__PURE__*/e(\"p\",{children:\"Enhanced security visibility\"})]});export const richText167=/*#__PURE__*/n(t.Fragment,{children:[/*#__PURE__*/n(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Domain Analysis:\"}),\" Mindflow automates the submission of a domain for analysis using MxToolbox. This replaces the manual task of domain verification, ensuring consistent and thorough checks without human error, saving time, and increasing accuracy.\"]}),/*#__PURE__*/n(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"IP Reputation Check\"}),\": By integrating with AbuseIPDB, Mindflow automates checking the reputation of IPs associated with the domain. This eliminates the need for manual cross-referencing of IP reputations, ensuring timely detection of potential threats and enhancing security.\"]}),/*#__PURE__*/n(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Information Aggregation\"}),\": Mindflow automates retrieving detailed information about the selected IPs using IPInfo. This replaces the tedious manual process of gathering IP data, ensuring comprehensive and up-to-date information is collected swiftly.\"]}),/*#__PURE__*/n(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Reporting to Slack\"}),\": Mindflow automates creating and delivering detailed reports to a Slack channel. This process, which includes aggregating domain and IP information and formatting it into a report, is done without manual intervention, ensuring timely and consistent communication of potential issues to the team.\"]})]});export const richText168=/*#__PURE__*/n(t.Fragment,{children:[/*#__PURE__*/n(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"MxToolbox\"}),\": MxToolbox is used to submit a domain for analysis and check the health and configuration of the domain's mail exchange (MX) records. This ensures that issues with the domain's email setup are identified and addressed promptly.\"]}),/*#__PURE__*/n(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"AbuseIPDB\"}),\": AbuseIPDB checks the reputation of IP addresses associated with the domain. This tool helps identify any IPs flagged for abusive behavior, providing crucial information for maintaining the security and integrity of the organization's network.\"]}),/*#__PURE__*/n(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"IPInfo\"}),\": IPInfo provides detailed information about the selected IP addresses, such as geographic location, ISP, etc. This comprehensive data is essential for understanding the context of each IP address and assessing potential risks.\"]}),/*#__PURE__*/n(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Slack\"}),\": Slack is used to deliver the final report, which includes aggregated information from MxToolbox, AbuseIPDB, and IPInfo. This ensures that the relevant team members are informed in real-time about the domain's status and any potential issues, facilitating prompt and coordinated responses.\"]})]});export const richText169=/*#__PURE__*/e(t.Fragment,{children:/*#__PURE__*/e(\"p\",{children:\"Check for new CISA vulnerabilities using Mindflow's automation. Integrate CISA, Tenable, Jira, and Microsoft Teams to identify, manage, and report vulnerabilities swiftly. This enhances security by ensuring timely awareness and resolution of potential threats.\"})});export const richText170=/*#__PURE__*/n(t.Fragment,{children:[/*#__PURE__*/e(\"p\",{children:\"Manual vulnerability checks\"}),/*#__PURE__*/e(\"p\",{children:\"Delayed threat response\"}),/*#__PURE__*/e(\"p\",{children:\"Inconsistent security reporting\"})]});export const richText171=/*#__PURE__*/n(t.Fragment,{children:[/*#__PURE__*/e(\"p\",{children:\"Timely vulnerability detection\"}),/*#__PURE__*/e(\"p\",{children:\"Streamlined threat management\"}),/*#__PURE__*/e(\"p\",{children:\"Efficient reporting\"})]});export const richText172=/*#__PURE__*/n(t.Fragment,{children:[/*#__PURE__*/n(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Retrieving Vulnerability Feed\"}),\": Using Mindflow, the CISA vulnerability feed is automatically retrieved through an HTTP request. This eliminates the need for manual retrieval, ensures timely and consistent updates, and enhances the efficiency and reliability of the vulnerability management process.\"]}),/*#__PURE__*/n(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Listing CVE Vulnerabilities Details\"}),\": Mindflow automates the task of fetching detailed CVE information from Tenable Vulnerability Management for each identified vulnerability. If done manually, this task would be time-consuming and prone to oversight. Automation ensures comprehensive and accurate vulnerability details, facilitating quicker and more informed decision-making.\"]}),/*#__PURE__*/n(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Checking Vulnerability Status\"}),\": Automating each vulnerability against Tenable's database streamlines the identification process, which would be labor-intensive if performed manually. Mindflow enhances the speed and accuracy of this critical security check, ensuring that vulnerabilities are promptly identified and addressed.\"]}),/*#__PURE__*/n(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Reporting to Security Team\"}),\": Mindflow automates creating and dispatching detailed vulnerability reports to the security team via Microsoft Teams. This replaces the manual compilation and communication of vulnerability data, ensuring immediate awareness and faster response times, thereby strengthening the overall security posture.\"]}),/*#__PURE__*/n(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Creating Jira Issues\"}),\": Automating the creation of Jira issues for each identified vulnerability ensures that all potential threats are logged and tracked systematically. This replaces the manual entry and tracking process, reducing administrative workload and ensuring no vulnerability is overlooked, thus enhancing the effectiveness of the remediation efforts.\"]})]});export const richText173=/*#__PURE__*/n(t.Fragment,{children:[/*#__PURE__*/n(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"CISA Vulnerability Database\"}),\": In this use case, the CISA Vulnerability Database is the primary source of vulnerability information. Mindflow retrieves the latest vulnerability feed from this database, identifying and addressing the most current threats.\"]}),/*#__PURE__*/n(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Tenable Vulnerability Management\"}),\": Tenable plays a critical role by providing detailed information on each vulnerability listed in the CISA feed. Mindflow uses Tenable to check for the existence and details of vulnerabilities, ensuring accurate and comprehensive vulnerability assessments.\"]}),/*#__PURE__*/n(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Atlassian Jira\"}),\": Jira is utilized to track and manage identified vulnerabilities. Mindflow automates the creation of Jira issues for each vulnerability, ensuring systematic tracking and management, which replaces the manual logging and monitoring process.\"]}),/*#__PURE__*/n(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Microsoft Teams\"}),\": Microsoft Teams is the communication platform for reporting identified vulnerabilities to the security team. Mindflow automates the generation and sending of detailed reports to Teams, ensuring timely and efficient communication, which enhances the team's response time and coordination.\"]})]});export const richText174=/*#__PURE__*/e(t.Fragment,{children:/*#__PURE__*/e(\"p\",{children:\"Automate Incident Management\"})});export const richText175=/*#__PURE__*/e(t.Fragment,{children:/*#__PURE__*/e(\"p\",{children:\"This use case streamlines the detection and response to honeytoken triggers in GitGuardian, integrating Jamf Pro, Slack, and VirusTotal for rapid threat assessment and remediation. It enhances security posture by automating incident investigation and response workflows.\"})});export const richText176=/*#__PURE__*/n(t.Fragment,{children:[/*#__PURE__*/e(\"p\",{children:\"Delayed Incident Response \"}),/*#__PURE__*/e(\"p\",{children:\"Manual Integration Process\"}),/*#__PURE__*/e(\"p\",{children:\"Increased Risk of Human Error\"}),/*#__PURE__*/e(\"p\",{children:/*#__PURE__*/e(\"br\",{className:\"trailing-break\"})})]});export const richText177=/*#__PURE__*/n(t.Fragment,{children:[/*#__PURE__*/e(\"p\",{children:\"Rapid Threat Detection and Response\"}),/*#__PURE__*/e(\"p\",{children:\"Seamless Integration\"}),/*#__PURE__*/e(\"p\",{children:\"Enhanced SecOps Productivity\"}),/*#__PURE__*/e(\"p\",{children:/*#__PURE__*/e(\"br\",{className:\"trailing-break\"})})]});export const richText178=/*#__PURE__*/n(t.Fragment,{children:[/*#__PURE__*/n(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Honeytoken Trigger Detection\"}),\": GitGuardian alerts are automatically processed, extracting crucial information about potential security breaches. This eliminates manual alert review, accelerating initial threat assessment and reducing the risk of overlooking critical incidents.\"]}),/*#__PURE__*/n(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Slack Notification and Triage\"}),\": Relevant team members are instantly notified via Slack, with extracted alert details presented for quick evaluation. This replaces time-consuming manual communication chains, enabling rapid collaborative decision-making on threat severity and necessary actions.\"]}),/*#__PURE__*/n(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Asset Inventory Check\"}),\": Jamf Pro is automatically queried to verify if the affected device is part of the organization's inventory. This eliminates manual cross-referencing of asset databases, speeds up the contextualization of the threat, and informs the response strategy.\"]}),/*#__PURE__*/n(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Malware Analysis\"}),\": Suspicious files are automatically submitted to VirusTotal for analysis, replacing manual uploads and interpretation of results. This integration provides swift insights into potential malware threats, enabling faster and more informed remediation decisions.\"]}),/*#__PURE__*/n(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Automated Remediation\"}),\": Based on the threat assessment, appropriate actions like resetting honeytokens or revoking access are automatically executed. This eliminates manual intervention in critical security tasks, ensuring consistent and prompt organizational threat mitigation.\"]})]});export const richText179=/*#__PURE__*/n(t.Fragment,{children:[/*#__PURE__*/n(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"GitGuardian\"}),\": Detects and alerts on honeytoken triggers, serving as the initial security tripwire. It provides crucial information about potential security breaches, enabling rapid identification of threats and initiating the automated response workflow.\"]}),/*#__PURE__*/n(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Slack is\"}),\" the primary communication channel for alert notifications and team collaboration. It facilitates quick dissemination of threat information, enables real-time discussion, and supports decision-making processes throughout the incident response lifecycle.\"]}),/*#__PURE__*/n(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Jamf Pro's\\xa0\"}),\"asset inventory information helps verify whether affected devices belong to the organization. This integration enables quick contextualization of threats by automatically cross-referencing device data with security alerts.\"]}),/*#__PURE__*/n(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"VirusTotal\"}),\": Performs automated malware analysis on suspicious files or indicators. It offers rapid threat intelligence, helping to determine the nature and severity of potential malware threats associated with the honeytoken trigger.\"]})]});export const richText180=/*#__PURE__*/e(t.Fragment,{children:/*#__PURE__*/e(\"p\",{children:\"Automate Access Management\"})});export const richText181=/*#__PURE__*/e(t.Fragment,{children:/*#__PURE__*/e(\"p\",{children:\"This use case automates the response to unusual login alerts Panther SIEM detects. It streamlines investigating potential security threats, notifying team members via Slack, checking IP reputations with AbuseIPDB, and managing user access in the Google Admin Directory.\"})});export const richText182=/*#__PURE__*/n(t.Fragment,{children:[/*#__PURE__*/e(\"p\",{children:\"Delayed Incident Response Times\"}),/*#__PURE__*/e(\"p\",{children:\"Manual IP Reputation Checks\"}),/*#__PURE__*/e(\"p\",{children:\"Time-Consuming User Access Management\"})]});export const richText183=/*#__PURE__*/n(t.Fragment,{children:[/*#__PURE__*/e(\"p\",{children:\"Accelerated Threat Investigation Process\"}),/*#__PURE__*/e(\"p\",{children:\"Streamlined Cross-Platform Communication\"}),/*#__PURE__*/e(\"p\",{children:\"Efficient User Access Control\"})]});export const richText184=/*#__PURE__*/n(t.Fragment,{children:[/*#__PURE__*/n(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Unusual Login Alert Processing\"}),\": Panther alerts are automatically processed, triggering immediate investigation and response actions. This replaces manual alert triage, reducing response times from hours to minutes and ensuring consistent handling of potential security threats.\"]}),/*#__PURE__*/n(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Slack Notification System\"}),\": Relevant team members are promptly notified via Slack about the unusual login event. This automated communication eliminates the need for manual updates, ensuring swift team awareness and collaboration on potential security incidents.\"]}),/*#__PURE__*/n(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"IP Reputation Check\"}),\": AbuseIPDB is automatically queried to assess the reputation of the IP address associated with the unusual login. This replaces time-consuming manual lookups, providing instant context for rapid decision-making on potential threats.\"]}),/*#__PURE__*/n(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"User Access Management\"}),\": Based on the investigation's results, the Google Admin Directory is automatically accessed to manage user permissions. This automation streamlines suspending or unsuspending user accounts, significantly reducing the time and potential for human error in access control.\"]})]});export const richText185=/*#__PURE__*/n(t.Fragment,{children:[/*#__PURE__*/n(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Panther\"}),\": In this use case, Panther is the initial alert system for detecting unusual login events. It triggers the workflow by sending alerts about potential security threats, enabling rapid response to suspicious activities.\"]}),/*#__PURE__*/n(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Slack\"}),\": Slack is the primary communication channel for notifying team members about the unusual login event. It ensures quick dissemination of critical information, facilitating immediate awareness and collaborative response among security teams.\"]}),/*#__PURE__*/n(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"AbuseIPDB\"}),\": AbuseIPDB is utilized to perform automated IP reputation checks. It provides crucial context about the IP address associated with the unusual login, helping to assess the potential threat level and inform decision-making quickly.\"]}),/*#__PURE__*/n(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Google Admin Directory\"}),\": Google Admin Directory is the central tool for managing user access in this workflow. It enables automated actions to modify user permissions, such as suspending or unsuspending accounts based on the investigation results and streamlining access control processes.\"]})]});export const richText186=/*#__PURE__*/e(t.Fragment,{children:/*#__PURE__*/e(\"p\",{children:\"This email security use case integrates Slack, VirusTotal, and EmailRep to automate threat detection in emails. This flow analyzes incoming emails for phishing threats, alerts the security team, and provides detailed risk assessments, enhancing security operations and response efficiency.\"})});export const richText187=/*#__PURE__*/n(t.Fragment,{children:[/*#__PURE__*/e(\"p\",{children:\"Manual Email Threat Analysis  \"}),/*#__PURE__*/e(\"p\",{children:\"Delayed Security Team Response  \"}),/*#__PURE__*/e(\"p\",{children:\"Inconsistent Threat Assessment\"})]});export const richText188=/*#__PURE__*/n(t.Fragment,{children:[/*#__PURE__*/e(\"p\",{children:\"Faster Threat Detection  \"}),/*#__PURE__*/e(\"p\",{children:\"Real-Time Security Alerts  \"}),/*#__PURE__*/e(\"p\",{children:\"Consistent Risk Assessments\"})]});export const richText189=/*#__PURE__*/n(t.Fragment,{children:[/*#__PURE__*/n(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Email Threat Detection\"}),\": Incoming emails are analyzed for phishing threats using VirusTotal and EmailRep Alpha. This automation replaces manual threat detection, reducing the time and effort required to identify potential threats and ensuring consistent and accurate assessments.\"]}),/*#__PURE__*/n(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Security Team Alerts\"}),\": Alerts are sent to the security team via Slack when a threat is detected. This replaces manual notification processes, ensuring immediate awareness and response to potential threats, enhancing the team's ability to act swiftly.\"]}),/*#__PURE__*/n(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Risk Assessment Reporting\"}),\": Detailed risk assessments are generated and shared with the team. This automation eliminates the need for manual report compilation, providing consistent and comprehensive insights into email threats, improving decision-making and response strategies.\"]})]});export const richText190=/*#__PURE__*/n(t.Fragment,{children:[/*#__PURE__*/n(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Slack\"}),\": In this use case, Slack is used to notify the security team of detected threats. It serves as the communication channel for real-time alerts, ensuring that the team is promptly informed and can take immediate action to mitigate risks.\"]}),/*#__PURE__*/n(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"VirusTotal\"}),\": VirusTotal is utilized to analyze incoming emails for potential phishing threats. It provides a comprehensive threat assessment by checking email content against a vast database of known threats, enhancing the accuracy and speed of threat detection.\"]}),/*#__PURE__*/n(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"EmailRep\"}),\": EmailRep evaluates the reputation of email senders and domains. It plays a critical role in identifying suspicious emails by providing insights into the credibility and trustworthiness of the email source, aiding in the decision-making process for threat response.\"]})]});export const richText191=/*#__PURE__*/e(t.Fragment,{children:/*#__PURE__*/e(\"p\",{children:\"Automate \"})});export const richText192=/*#__PURE__*/e(t.Fragment,{children:/*#__PURE__*/e(\"p\",{children:\"Continuous malicious email detection and remediation with Exchange enhances email security by automating threat identification and response. This workflow integrates Microsoft Graph, AlienVault OTX, MXtoolbox, and Glimps to detect, analyze, and remediate malicious emails, ensuring prompt threat management and improved security posture.\"})});export const richText193=/*#__PURE__*/n(t.Fragment,{children:[/*#__PURE__*/e(\"p\",{children:\"Manual Email Threat Detection \"}),/*#__PURE__*/e(\"p\",{children:\"Delayed Incident Response\"}),/*#__PURE__*/e(\"p\",{children:\"Resource-Intensive Email Analysis\"})]});export const richText194=/*#__PURE__*/n(t.Fragment,{children:[/*#__PURE__*/e(\"p\",{children:\"Real-Time Threat Detection\"}),/*#__PURE__*/e(\"p\",{children:\"Streamlined Email Analysis\"}),/*#__PURE__*/e(\"p\",{children:\"Faster Incident Response\"})]});export const richText195=/*#__PURE__*/n(t.Fragment,{children:[/*#__PURE__*/n(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"URL Analysis and Threat Detection\"}),\": URLs within emails are automatically extracted and analyzed using AlienVault OTX. This process, which would typically require manual checking and cross-referencing against threat intelligence databases, is streamlined, reducing the time and effort needed to identify potential threats.\"]}),/*#__PURE__*/n(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Email Header and Sender Verification\"}),\": The sender's email headers are checked against MXtoolbox to verify legitimacy and detect any blocklisted IPs. This automated verification replaces the manual process of checking sender credibility, enhancing accuracy and speed in identifying malicious senders.\"]}),/*#__PURE__*/n(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Attachment Analysis and Malware Detection\"}),\": Attachments are decoded and submitted to Glimps for malware analysis. Traditionally performed manually with significant time investment, this task is automated to ensure a quick and thorough examination, minimizing the risk of malware infiltration and improving overall security response times.\"]})]});export const richText196=/*#__PURE__*/n(t.Fragment,{children:[/*#__PURE__*/n(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Microsoft Graph\"}),\": In this use case, Microsoft Graph interfaces with Exchange to retrieve and manage email data. It is key in accessing email headers and message content, enabling automated analysis and response actions without manual intervention.\"]}),/*#__PURE__*/n(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"AlienVault OTX:\"}),\" AlienVault OTX analyzes URLs extracted from emails. It provides threat intelligence by checking URLs against known threat indicators, helping to identify potential malicious links quickly and accurately.\"]}),/*#__PURE__*/n(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"MXtoolbox\"}),\": MXtoolbox verifies the email sender's information. It checks the sender's IP against blocklists to detect suspicious activity, ensuring that only legitimate emails are processed further.\"]}),/*#__PURE__*/n(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"GLIMPS\"}),\": Glimps analyzes email attachments for malware. It decodes and examines attachments, providing a detailed analysis to detect any malicious content, thus enhancing the security of email communications.\"]})]});export const richText197=/*#__PURE__*/e(t.Fragment,{children:/*#__PURE__*/e(\"p\",{children:\"Automate GitHub Webhooks\"})});export const richText198=/*#__PURE__*/e(t.Fragment,{children:/*#__PURE__*/e(\"p\",{children:\"Mindflow orchestrates GitHub webhook management, automating notifications via Slack for events like repository, team, and organization actions to streamline development workflow monitoring and response.\"})});export const richText199=/*#__PURE__*/n(t.Fragment,{children:[/*#__PURE__*/e(\"p\",{children:\"Delayed Notification Processing\"}),/*#__PURE__*/e(\"p\",{children:\"Increased Manual Monitoring\"}),/*#__PURE__*/e(\"p\",{children:\"Higher Risk of Oversights\"})]});export const richText200=/*#__PURE__*/n(t.Fragment,{children:[/*#__PURE__*/e(\"p\",{children:\"Immediate Event Notifications\"}),/*#__PURE__*/e(\"p\",{children:\"Streamlined Workflow Responses\"}),/*#__PURE__*/e(\"p\",{children:\"Consistent Organizational Oversight\"})]});export const richText201=/*#__PURE__*/n(t.Fragment,{children:[/*#__PURE__*/e(\"p\",{children:\"Webhook Event Determination: Mindflow automates the identification of GitHub webhook events, a task that, if done manually, would involve constant monitoring and interpretation of incoming data. Automation allows for instant recognition and categorization of events, streamlining subsequent processes and ensuring no event is missed due to human oversight.\"}),/*#__PURE__*/e(\"p\",{children:\"Notification Messaging via Slack: Mindflow automates the dispatch of tailored messages to specific Slack channels based on the type of GitHub event. Manually, this would require an individual to interpret the webhook, draft a message, and choose the correct Slack channel, which is time-consuming and error-prone. Automation provides instant, accurate, and consistent communication to the relevant stakeholders.\"}),/*#__PURE__*/e(\"p\",{children:\"Actionable Responses to Events: Mindflow facilitates automatic responses to specific GitHub events, such as removing a user or changing repository settings, which would be manually intensive. Automation speeds up the response time, reduces the workload on personnel, and minimizes the risk of delayed or incorrect actions in response to GitHub events.≈\"})]});export const richText202=/*#__PURE__*/n(t.Fragment,{children:[/*#__PURE__*/e(\"p\",{children:\"GitHub: GitHub is the central platform in this use case that triggers webhooks for various events like repository actions or team updates. These webhooks are the stimuli that Mindflow uses to automate reactions to changes within the GitHub environment, which would otherwise require continuous manual surveillance.\"}),/*#__PURE__*/e(\"p\",{children:\"Slack: The communication platform Mindflow uses to send automated messages regarding GitHub events. These notifications, which would otherwise need to be manually composed and sent, are crucial for keeping teams informed and responsive to developments in real-time.\"})]});export const richText203=/*#__PURE__*/e(t.Fragment,{children:/*#__PURE__*/e(\"p\",{children:\"Automate Onboarding\"})});export const richText204=/*#__PURE__*/e(t.Fragment,{children:/*#__PURE__*/e(\"p\",{children:\"This use case streamlines employee onboarding by automating user account creation and provisioning across tools like Person.io, Okta, Slack, Microsoft Graph, and Jira. It enhances operational efficiency, reduces manual IAM tasks, and ensures security compliance with seamless integration into IAM and third-party tools.\"})});export const richText205=/*#__PURE__*/n(t.Fragment,{children:[/*#__PURE__*/e(\"p\",{children:\"Manual Onboarding Processes  \"}),/*#__PURE__*/e(\"p\",{children:\"Delayed Account Provisioning  \"}),/*#__PURE__*/e(\"p\",{children:\"Inconsistent Access Management\"})]});export const richText206=/*#__PURE__*/n(t.Fragment,{children:[/*#__PURE__*/e(\"p\",{children:\"Enhanced Onboarding Efficiency  \"}),/*#__PURE__*/e(\"p\",{children:\"Consistent Access Management  \"}),/*#__PURE__*/e(\"p\",{children:\"Improved Security Compliance\"})]});export const richText207=/*#__PURE__*/n(t.Fragment,{children:[/*#__PURE__*/n(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"User Onboarding Across Tools\"}),\": Employees are onboarded across Person.io, Okta, Slack, Microsoft Graph, and Jira. This replaces manual entry and coordination across platforms, reducing errors and saving time.\"]}),/*#__PURE__*/n(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Account Provisioning and Access Management\"}),\": User accounts are provisioned, and access rights are managed automatically. This ensures consistent access control and compliance, eliminating manual oversight and potential security gaps.\"]}),/*#__PURE__*/n(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Onboarding Ticket Creation in Siit\"}),\": An onboarding ticket is created in Siit for tracking and management. This automates the documentation process, ensuring all onboarding steps are recorded and accessible, enhancing transparency and accountability.\"]})]});export const richText208=/*#__PURE__*/n(t.Fragment,{children:[/*#__PURE__*/n(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Personio\"}),\": Personio is the initial data source for employee information, triggering the onboarding process. It provides essential employee details to initiate account creation and provisioning across various platforms.\"]}),/*#__PURE__*/n(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Okta\"}),\": Okta is used for identity and access management, ensuring new employees are assigned access rights and group memberships. It automates creating user accounts and managing access permissions, reducing manual intervention.\"]}),/*#__PURE__*/n(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Slack\"}),\": Slack is utilized for communication and notifications throughout the onboarding process. It keeps relevant stakeholders informed about the progress and completion of onboarding tasks, enhancing collaboration and transparency.\"]}),/*#__PURE__*/n(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Microsoft Graph\"}),\": Microsoft Graph interfaces with Microsoft services like \",/*#__PURE__*/e(\"strong\",{children:\"Teams\"}),\" to automate user account creation and license assignment. It streamlines the provisioning process, ensuring new employees access to necessary tools and resources.\"]}),/*#__PURE__*/n(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Jira\"}),\": Jira is used to track and manage the onboarding process. It provides a structured and transparent way to monitor each step, ensuring that all tasks are completed efficiently and stakeholders are informed.\"]}),/*#__PURE__*/n(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Siit\"}),\": Siit is responsible for creating and managing onboarding tickets. It documents the onboarding process, providing a centralized record of all actions taken and enhancing accountability and compliance.\"]})]});export const richText209=/*#__PURE__*/e(t.Fragment,{children:/*#__PURE__*/e(\"p\",{children:\"Automate Employee Offboarding\"})});export const richText210=/*#__PURE__*/e(t.Fragment,{children:/*#__PURE__*/e(\"p\",{children:\"Mindflow's offboarding automation streamlines employee departure processes across multiple platforms. This workflow suspends accounts, revokes access, and wipes sessions in Google Admin, Okta, Slack, BitWarden, and team-specific tools like HubSpot or GitHub, enhancing security and efficiency.\"})});export const richText211=/*#__PURE__*/n(t.Fragment,{children:[/*#__PURE__*/e(\"p\",{children:\"Manual Offboarding Prone to Errors\"}),/*#__PURE__*/e(\"p\",{children:\"Security Risks from Delayed Deprovisioning\"}),/*#__PURE__*/e(\"p\",{children:\"Time-Consuming Cross-Platform Account Management\"})]});export const richText212=/*#__PURE__*/n(t.Fragment,{children:[/*#__PURE__*/e(\"p\",{children:\"Instant Multi-System Account Deactivation\"}),/*#__PURE__*/e(\"p\",{children:\"Consistent Security Policy Enforcement\"}),/*#__PURE__*/e(\"p\",{children:\"Time Saved on Repetitive Tasks\"})]});export const richText213=/*#__PURE__*/n(t.Fragment,{children:[/*#__PURE__*/n(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"User Suspension and Deactivation\"}),\": Mindflow automatically suspends user accounts across multiple systems like Google Admin and Okta. This replaces the manual process of individually accessing each platform to deactivate accounts, significantly reducing the time taken and eliminating the risk of overlooking any accounts.\"]}),/*#__PURE__*/n(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Session Revocation and Wiping\"}),\": Active sessions are automatically terminated and wiped across platforms like Okta and Slack. This critical security step, often delayed or forgotten in manual processes, is executed instantly, enhancing the organization's security posture and reducing potential data breach risks.\"]}),/*#__PURE__*/n(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Team-Specific Tool Deprovisioning\"}),\": Based on the user's team, Mindflow automatically removes access from specific tools like HubSpot for sales or GitHub for engineering. This tailored approach ensures comprehensive offboarding across all relevant platforms, a task that's often inconsistent or incomplete when done manually.\"]})]});export const richText214=/*#__PURE__*/n(t.Fragment,{children:[/*#__PURE__*/n(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Google Admin Directory\"}),\": This tool is used to initiate the offboarding process by querying and suspending the user's account in Google Workspace. It plays a crucial role in identifying the user and starting the deprovisioning process across various platforms.\"]}),/*#__PURE__*/n(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Okta\"}),\": Okta is utilized to suspend the user's account and remove all active identity provider sessions. It ensures that the user's access to various integrated applications is immediately revoked, maintaining security across the organization's digital ecosystem.\"]}),/*#__PURE__*/n(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Slack\"}),\": Slack finds the user's Slack ID and wipe all valid sessions on all devices. This step is critical for preventing unauthorized access to company communications and data after the employee's departure.\"]}),/*#__PURE__*/n(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"BitWarden\"}),\": BitWarden is used to list all members and delete the departing employee's account. This ensures that the user no longer has access to shared passwords and sensitive information stored in the organization's password manager.\"]}),/*#__PURE__*/n(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"GitHub\"}),\": For users in the engineering team, GitHub integration removes the user from the organization's GitHub Enterprise account, preventing access to code repositories and development resources.\"]}),/*#__PURE__*/n(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"HubSpot Users\"}),\": For users in the sales team, HubSpot's API is utilized to remove the user from the CRM system, ensuring that customer data and sales information are protected.\"]})]});export const richText215=/*#__PURE__*/e(t.Fragment,{children:/*#__PURE__*/e(\"p\",{children:\"This use case enables temporary admin access on employees' devices using MDM tools like Jamf Pro and Slack. It enhances security by limiting the duration of admin privileges, automates access management, and ensures compliance with real-time notifications and automatic revocation.\"})});export const richText216=/*#__PURE__*/n(t.Fragment,{children:[/*#__PURE__*/e(\"p\",{children:\"Manual Admin Rights Management  \"}),/*#__PURE__*/e(\"p\",{children:\"Delayed Security Revocation  \"}),/*#__PURE__*/e(\"p\",{children:\"Increased Security Breach Risk\"})]});export const richText217=/*#__PURE__*/n(t.Fragment,{children:[/*#__PURE__*/e(\"p\",{children:\"Enhanced Security Compliance  \"}),/*#__PURE__*/e(\"p\",{children:\"Streamlined Access Management  \"}),/*#__PURE__*/e(\"p\",{children:\"Real-Time Notifications\"})]});export const richText218=/*#__PURE__*/n(t.Fragment,{children:[/*#__PURE__*/n(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Temporary Admin Access Granting\"}),\": Employees can request temporary admin rights on their devices through Slack, which are granted automatically using MDM tools like Jamf Pro. This process eliminates the need for manual approval and reduces the risk of prolonged admin access, enhancing security and efficiency.\"]}),/*#__PURE__*/n(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Automatic Revocation of Admin Rights\"}),\": Admin privileges are automatically revoked after a set duration, ensuring compliance and reducing security risks. This automation prevents the oversight of manual revocation, maintaining a secure environment without continuous monitoring.\"]}),/*#__PURE__*/n(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Real-Time Notifications\"}),\": Notifications are sent in real-time through Slack, informing all stakeholders of the status of admin access requests and revocations. This transparency reduces the need for manual follow-ups and enhances communication efficiency within the team.\"]})]});export const richText219=/*#__PURE__*/n(t.Fragment,{children:[/*#__PURE__*/n(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Slack\"}),\": In this use case, Slack acts as the communication platform where employees can request temporary admin rights. It is the interface for initiating the admin access workflow, providing a familiar and accessible channel for users to interact with the automation process.\"]}),/*#__PURE__*/n(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Jamf Pro\"}),\": Jamf Pro manages and enforces temporary admin rights on employees' devices. It handles the granting and revocation of admin privileges, ensuring access is controlled and compliant with security policies. This integration automates what would typically be a manual IT task, enhancing efficiency and security.\"]})]});export const richText220=/*#__PURE__*/e(t.Fragment,{children:/*#__PURE__*/e(\"p\",{children:\"Automate IAM\"})});export const richText221=/*#__PURE__*/e(t.Fragment,{children:/*#__PURE__*/e(\"p\",{children:\"With Mindflow, user accounts can be unlocked on Jamf Pro-managed devices. Request handling can be automated via Slack and Jamf Pro. Account unlocks can also be automated, and outcomes can be notified to users and teams to enhance efficiency. Seamless integration can streamline operations and improve user experience.\"})});export const richText222=/*#__PURE__*/n(t.Fragment,{children:[/*#__PURE__*/e(\"p\",{children:\"Manual Account Unlock Requests  \"}),/*#__PURE__*/e(\"p\",{children:\"Delayed User Access Restoration  \"}),/*#__PURE__*/e(\"p\",{children:\"Inconsistent Notification Processes\"})]});export const richText223=/*#__PURE__*/n(t.Fragment,{children:[/*#__PURE__*/e(\"p\",{children:\"Faster Account Unlocks  \"}),/*#__PURE__*/e(\"p\",{children:\"Consistent User Notifications  \"}),/*#__PURE__*/e(\"p\",{children:\"Streamlined Request Handling\"})]});export const richText224=/*#__PURE__*/n(t.Fragment,{children:[/*#__PURE__*/e(\"p\",{children:\"Device Unlock Requests: User account unlocks on Jamf Pro-managed devices are triggered automatically, reducing the need for manual intervention. This automation ensures swift response times and minimizes downtime for users, enhancing productivity and reducing frustration.\"}),/*#__PURE__*/e(\"p\",{children:\"Notification Management: Notifications are sent to users and teams regarding the status of unlock requests. This automation ensures consistent communication, reducing the risk of miscommunication and keeping all parties informed without manual follow-up.\"}),/*#__PURE__*/e(\"p\",{children:\"Decision Making for Unlocks: The decision to unlock accounts is automated based on predefined criteria, eliminating the need for manual decision-making. This streamlines the process, reduces human error, and ensures a consistent approach to account management.\"})]});export const richText225=/*#__PURE__*/n(t.Fragment,{children:[/*#__PURE__*/n(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Slack\"}),\": In this use case, Slack acts as the communication channel for initiating and managing device unlock requests. It allows users to submit requests and receive notifications about the status of their requests, providing a seamless interaction experience within a familiar platform.\"]}),/*#__PURE__*/e(\"p\",{children:/*#__PURE__*/n(\"span\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Jamf Pro\"}),\": Jamf Pro executes the device unlock commands. It interfaces directly with the managed devices to perform the unlock operation, automating what would typically require manual intervention by IT staff. Thus, it ensures efficiency and reduces response times.\"]})})]});export const richText226=/*#__PURE__*/e(t.Fragment,{children:/*#__PURE__*/e(\"p\",{children:\"Automate Alert Management\"})});export const richText227=/*#__PURE__*/e(t.Fragment,{children:/*#__PURE__*/e(\"p\",{children:\"Create subscriptions for new Microsoft Sentinel alerts to automate alert management. Schedule and manage alert subscriptions using Microsoft Graph Change Notifications, ensuring real-time updates via webhooks. This enhances incident response and maintains continuous monitoring without manual dashboard checks.\"})});export const richText228=/*#__PURE__*/n(t.Fragment,{children:[/*#__PURE__*/e(\"p\",{children:\"Manual Alert Monitoring  \"}),/*#__PURE__*/e(\"p\",{children:\"Delayed Incident Response  \"}),/*#__PURE__*/e(\"p\",{children:\"Dashboard Login Requirements\"})]});export const richText229=/*#__PURE__*/n(t.Fragment,{children:[/*#__PURE__*/e(\"p\",{children:\"Real-Time Alert Updates  \"}),/*#__PURE__*/e(\"p\",{children:\"Faster Incident Response  \"}),/*#__PURE__*/e(\"p\",{children:\"Continuous Monitoring\"})]});export const richText230=/*#__PURE__*/n(t.Fragment,{children:[/*#__PURE__*/n(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Subscription Creation for Alerts\"}),\": New subscriptions for Microsoft Sentinel alerts are created automatically. This replaces the manual setup process, ensuring alerts are monitored continuously without manual intervention, reducing the risk of missed alerts and improving response times.\"]}),/*#__PURE__*/n(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Real-Time Notifications\"}),\": Alerts are dispatched to a specified webhook URL, enabling immediate notification. This eliminates the need for manual alert checks, ensuring that teams receive timely updates and respond more quickly to incidents.\"]}),/*#__PURE__*/n(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Subscription Management and Renewal\"}),\": Existing subscriptions are updated with new expiration times, or new ones are created as needed. This task ensures ongoing alert monitoring without manual renewal processes, maintaining uninterrupted alert coverage and reducing administrative workload.\"]})]});export const richText231=/*#__PURE__*/n(t.Fragment,{children:[/*#__PURE__*/e(\"p\",{children:/*#__PURE__*/n(\"span\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Microsoft Graph Change Notifications\"}),\": This tool is central to managing alert subscriptions in Microsoft Sentinel. It handles subscription creation, updating, and renewal, ensuring alerts are continuously monitored and dispatched to the appropriate channels without manual intervention.\"]})}),/*#__PURE__*/n(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Microsoft Sentinel\"}),\": In this use case, Microsoft Sentinel is the source of security alerts. It generates alerts based on security events, which are then managed through automated subscriptions, ensuring that alerts are promptly addressed and monitored.\"]})]});export const richText232=/*#__PURE__*/e(t.Fragment,{children:/*#__PURE__*/e(\"p\",{children:\"Monitor employee mailboxes using Microsoft Graph API to receive real-time notifications for new emails. This automation enhances email security by ensuring continuous oversight and immediate alerts, reducing reliance on manual checks, and improving organizational email monitoring efficiency.\"})});export const richText233=/*#__PURE__*/n(t.Fragment,{children:[/*#__PURE__*/e(\"p\",{children:\"Manual Email Monitoring Effort  \"}),/*#__PURE__*/e(\"p\",{children:\"Delayed Threat Detection  \"}),/*#__PURE__*/e(\"p\",{children:\"Inconsistent Security Oversight\"})]});export const richText234=/*#__PURE__*/n(t.Fragment,{children:[/*#__PURE__*/e(\"p\",{children:\"Real-Time Email Monitoring  \"}),/*#__PURE__*/e(\"p\",{children:\"Immediate Threat Alerts  \"}),/*#__PURE__*/e(\"p\",{children:\"Consistent Security Management\"})]});export const richText235=/*#__PURE__*/n(t.Fragment,{children:[/*#__PURE__*/n(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Email Monitoring Setup:\"}),\" Microsoft Graph API configures Employee mailboxes to receive real-time notifications for new emails. This task, typically requiring manual setup and periodic checks, is streamlined to ensure continuous monitoring and immediate alerts, reducing the risk of missed threats.\"]}),/*#__PURE__*/e(\"p\",{children:/*#__PURE__*/n(\"span\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Subscription Management:\"}),\"\\xa0To maintain an up-to-date monitoring system, existing email subscriptions are automatically managed, including creation and deletion. This automation eliminates manual oversight and ensures that only relevant subscriptions are active, enhancing security and reducing administrative workload.\"]})}),/*#__PURE__*/n(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Notification Handling\"}),\": Incoming email notifications trigger automated workflows for further analysis. This replaces manual email checks and responses, allowing immediate threat detection and response, improving security posture and operational efficiency.\"]})]});export const richText236=/*#__PURE__*/e(t.Fragment,{children:/*#__PURE__*/n(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Microsoft Graph API: \"}),\"In this use case, Microsoft Graph API is pivotal for accessing and managing employee mailboxes. It facilitates the setup of real-time email notifications, ensuring that every new email is monitored without manual intervention, thus enhancing security and operational efficiency.\"]})});export const richText237=/*#__PURE__*/e(t.Fragment,{children:/*#__PURE__*/e(\"p\",{children:\"Automate PowerBI dataflows by refreshing mother and daughter datasets across workspaces. This process ensures up-to-date data for analysis, reduces manual tasks and enhances operational efficiency. Mindflow's orchestration streamlines refresh management, allowing seamless integration and scalability across PowerBI environments.\"})});export const richText238=/*#__PURE__*/n(t.Fragment,{children:[/*#__PURE__*/e(\"p\",{children:\"Manual Data Refresh Efforts  \"}),/*#__PURE__*/e(\"p\",{children:\"Delayed Data Availability  \"}),/*#__PURE__*/e(\"p\",{children:\"Inconsistent Data Updates\"})]});export const richText239=/*#__PURE__*/n(t.Fragment,{children:[/*#__PURE__*/e(\"p\",{children:\"Streamlined Data Refresh Process  \"}),/*#__PURE__*/e(\"p\",{children:\"Timely Data Availability  \"}),/*#__PURE__*/e(\"p\",{children:\"Consistent Data Updates\"})]});export const richText240=/*#__PURE__*/n(t.Fragment,{children:[/*#__PURE__*/e(\"p\",{children:/*#__PURE__*/n(\"span\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Data Refresh in PowerBI\"}),\": PowerBI automatically refreshes datasets, reducing the need for manual intervention. This ensures data is always current, minimizes the risk of outdated information, and enhances decision-making efficiency.\"]})}),/*#__PURE__*/n(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Permission Updates in PowerBI\"}),\": User permissions in PowerBI are refreshed automatically, ensuring users have the correct access levels. This reduces administrative overhead and prevents access issues that could delay data analysis.\"]}),/*#__PURE__*/n(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Sequential Dataflow Refresh\"}),\": The process of refreshing mother and daughter dataflows is automated, ensuring that dependent datasets are updated in the correct order. This eliminates manual tracking and coordination, reducing errors and ensuring data consistency across workspaces.\"]})]});export const richText241=/*#__PURE__*/e(t.Fragment,{children:/*#__PURE__*/n(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Microsoft PowerBI:\"}),\" In this use case, PowerBI is central to the automation process, handling data refreshes for both mother and daughter datasets. It ensures that data is updated across workspaces, reducing the need for manual refreshes and maintaining data integrity.\"]})});export const richText242=/*#__PURE__*/e(t.Fragment,{children:/*#__PURE__*/e(\"p\",{children:\"Automate AI Summaries\"})});export const richText243=/*#__PURE__*/e(t.Fragment,{children:/*#__PURE__*/e(\"p\",{children:\"Mindflow's Slack Recap Digest streamlines team communication by generating daily AI-driven summaries of public channel messages. This automation enhances productivity by keeping team members informed without manual effort, using Slack integration for seamless updates.\"})});export const richText244=/*#__PURE__*/n(t.Fragment,{children:[/*#__PURE__*/e(\"p\",{children:\"Manual Message Compilation  \"}),/*#__PURE__*/e(\"p\",{children:\"Time-Consuming Updates  \"}),/*#__PURE__*/e(\"p\",{children:\"Missed Key Information\"})]});export const richText245=/*#__PURE__*/n(t.Fragment,{children:[/*#__PURE__*/e(\"p\",{children:\"Streamlined Communication Process  \"}),/*#__PURE__*/e(\"p\",{children:\"Faster Information Access  \"}),/*#__PURE__*/e(\"p\",{children:\"Improved Team Awareness\"})]});export const richText246=/*#__PURE__*/n(t.Fragment,{children:[/*#__PURE__*/n(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Daily Slack Message Recap\"}),\": AI generates summaries of daily Slack messages, reducing the need for manual review and compilation. This automation ensures consistent updates and saves time, allowing team members to focus on core tasks without missing important information.\"]}),/*#__PURE__*/n(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Summary Distribution\"}),\": Summaries are automatically distributed to relevant channels, ensuring that all team members receive updates without manual intervention. This enhances communication efficiency and ensures that everyone stays informed without the need for manual message forwarding.\"]}),/*#__PURE__*/n(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Channel Monitoring\"}),\": The system continuously monitors public Slack channels for new messages, eliminating the need for manual checks. This ensures that all relevant information is captured and included in daily summaries, improving team awareness and reducing the risk of missed updates.\"]})]});export const richText247=/*#__PURE__*/n(t.Fragment,{children:[/*#__PURE__*/e(\"p\",{children:/*#__PURE__*/n(\"span\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Slack\"}),\": In this use case, Slack is the primary platform for daily communication. It summarizes and distributes messages. By integrating with Slack, Mindflow captures all relevant public channel messages, ensuring that team updates are comprehensive and timely.\"]})}),/*#__PURE__*/e(\"p\",{children:/*#__PURE__*/n(\"span\",{children:[/*#__PURE__*/e(\"strong\",{children:\"AI Recap Agent\"}),\": The AI Recap Agent analyzes and summarizes Slack's daily messages. It processes the information to create concise summaries, reducing the need for manual review. This tool ensures team members receive clear and relevant updates without sifting through extensive message logs.\"]})})]});export const richText248=/*#__PURE__*/e(t.Fragment,{children:/*#__PURE__*/e(\"p\",{children:\"Mindflow streamlines the process of subscribing to Google Meet recordings folders. Integrating Google Admin Directory, Drive, IAM, and OAuth APIs automates weekly subscription renewals and notifications for new transcripts. This ensures efficient management and real-time updates, enhancing productivity and collaboration.\"})});export const richText249=/*#__PURE__*/n(t.Fragment,{children:[/*#__PURE__*/e(\"p\",{children:\"Manual Subscription Renewals  \"}),/*#__PURE__*/e(\"p\",{children:\"Delayed Transcript Notifications  \"}),/*#__PURE__*/e(\"p\",{children:\"Inefficient Meeting Management\"})]});export const richText250=/*#__PURE__*/n(t.Fragment,{children:[/*#__PURE__*/e(\"p\",{children:\"Real-time Transcript Notifications  \"}),/*#__PURE__*/e(\"p\",{children:\"Streamlined Meeting Management  \"}),/*#__PURE__*/e(\"p\",{children:\"Efficient Workflow Execution\"})]});export const richText251=/*#__PURE__*/n(t.Fragment,{children:[/*#__PURE__*/n(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Subscription Renewal for Meet Recordings\"}),\": The process of renewing subscriptions to Google Meet recordings folders is automated, eliminating the need for manual intervention. This ensures that all employees' folders are consistently updated, reducing the risk of missed notifications and saving time compared to manual checks.\"]}),/*#__PURE__*/e(\"p\",{children:/*#__PURE__*/n(\"span\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Real-time Notification Setup\"}),\": Notifications for new transcripts are set up to trigger automatically, ensuring immediate awareness of updates. This contrasts with manual monitoring, which can lead to delays and missed information. It enhances the team's responsiveness and collaboration.\"]})}),/*#__PURE__*/e(\"p\",{children:/*#__PURE__*/n(\"span\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Folder Monitoring and Event Handling\"}),\": The system automatically monitors Google Meet recordings folders for changes and redirects events to a secondary flow. This replaces manual folder checks and event management, providing a seamless and efficient way to handle updates and maintain accurate records.\"]})})]});export const richText252=/*#__PURE__*/n(t.Fragment,{children:[/*#__PURE__*/e(\"p\",{children:/*#__PURE__*/n(\"span\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Google Admin Directory:\"}),\"\\xa0This integration retrieves and manages user information within the domain. It is critical for accessing employee data, such as primary email addresses, which are essential for iterating through user accounts and managing subscriptions to Meet recordings folders.\"]})}),/*#__PURE__*/e(\"p\",{children:/*#__PURE__*/n(\"span\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Google Drive\"}),\": Google Drive interacts with the storage system where Meet recordings are saved. It facilitates the search and retrieval of folder IDs for the recordings, automates subscription renewals, and monitors events.\"]})}),/*#__PURE__*/e(\"p\",{children:/*#__PURE__*/n(\"span\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Google IAM\"}),\": Google IAM manages access and permissions. It ensures that the automation process has the necessary permissions to perform actions on behalf of users, such as accessing their Meet recordings folders and setting up notifications.\"]})}),/*#__PURE__*/e(\"p\",{children:/*#__PURE__*/n(\"span\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Google OAuth\"}),\": This API handles authentication and authorization, allowing the automation flow to access user data and perform actions securely on their behalf. It ensures the process complies with security protocols, maintaining user privacy and data integrity.\"]})})]});export const richText253=/*#__PURE__*/e(t.Fragment,{children:/*#__PURE__*/e(\"p\",{children:\"Detect suspicious logins and remediate threats using Google Sheets, Slack, and Google Admin Directory. This automation identifies unauthorized OAuth token deliveries, notifies ITSecOps, and revokes access if necessary, ensuring secure account management and efficient incident response.\"})});export const richText254=/*#__PURE__*/n(t.Fragment,{children:[/*#__PURE__*/e(\"p\",{children:\"Manual Incident Response Time  \"}),/*#__PURE__*/e(\"p\",{children:\"Delayed Threat Detection  \"}),/*#__PURE__*/e(\"p\",{children:\"Inconsistent Security Protocols\"})]});export const richText255=/*#__PURE__*/n(t.Fragment,{children:[/*#__PURE__*/e(\"p\",{children:\"Faster Incident Resolution  \"}),/*#__PURE__*/e(\"p\",{children:\"Proactive Threat Management  \"}),/*#__PURE__*/e(\"p\",{children:\"Streamlined Security Operations\"})]});export const richText256=/*#__PURE__*/n(t.Fragment,{children:[/*#__PURE__*/n(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Suspicious Login Detection\"}),\": The system identifies suspicious login attempts by analyzing OAuth token deliveries and comparing IP addresses. This process, which typically requires manual monitoring and analysis, is automated to ensure immediate detection and response, reducing the risk of unauthorized access.\"]}),/*#__PURE__*/n(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Notification and Decision Making\"}),\": Notifications are sent to ITSecOps through Slack, prompting a decision on whether to approve or revoke access. This replaces manual communication and decision-making processes, ensuring swift action and reducing the time to address potential threats.\"]}),/*#__PURE__*/n(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Access Revocation and Account Security\"}),\": Mindflow automatically revokes access tokens and enforces a password change if a login is deemed suspicious. This task, usually requiring manual intervention, is automated to enhance security and prevent unauthorized access, ensuring accounts are secured promptly.\"]})]});\nexport const __FramerMetadata__ = {\"exports\":{\"richText58\":{\"type\":\"variable\",\"annotations\":{\"framerContractVersion\":\"1\"}},\"richText64\":{\"type\":\"variable\",\"annotations\":{\"framerContractVersion\":\"1\"}},\"richText249\":{\"type\":\"variable\",\"annotations\":{\"framerContractVersion\":\"1\"}},\"richText111\":{\"type\":\"variable\",\"annotations\":{\"framerContractVersion\":\"1\"}},\"richText157\":{\"type\":\"variable\",\"annotations\":{\"framerContractVersion\":\"1\"}},\"richText244\":{\"type\":\"variable\",\"annotations\":{\"framerContractVersion\":\"1\"}},\"richText128\":{\"type\":\"variable\",\"annotations\":{\"framerContractVersion\":\"1\"}},\"richText10\":{\"type\":\"variable\",\"annotations\":{\"framerContractVersion\":\"1\"}},\"richText41\":{\"type\":\"variable\",\"annotations\":{\"framerContractVersion\":\"1\"}},\"richText17\":{\"type\":\"variable\",\"annotations\":{\"framerContractVersion\":\"1\"}},\"richText172\":{\"type\":\"variable\",\"annotations\":{\"framerContractVersion\":\"1\"}},\"richText192\":{\"type\":\"variable\",\"annotations\":{\"framerContractVersion\":\"1\"}},\"richText12\":{\"type\":\"variable\",\"annotations\":{\"framerContractVersion\":\"1\"}},\"richText245\":{\"type\":\"variable\",\"annotations\":{\"framerContractVersion\":\"1\"}},\"richText117\":{\"type\":\"variable\",\"annotations\":{\"framerContractVersion\":\"1\"}},\"richText169\":{\"type\":\"variable\",\"annotations\":{\"framerContractVersion\":\"1\"}},\"richText54\":{\"type\":\"variable\",\"annotations\":{\"framerContractVersion\":\"1\"}},\"richText74\":{\"type\":\"variable\",\"annotations\":{\"framerContractVersion\":\"1\"}},\"richText233\":{\"type\":\"variable\",\"annotations\":{\"framerContractVersion\":\"1\"}},\"richText39\":{\"type\":\"variable\",\"annotations\":{\"framerContractVersion\":\"1\"}},\"richText226\":{\"type\":\"variable\",\"annotations\":{\"framerContractVersion\":\"1\"}},\"richText90\":{\"type\":\"variable\",\"annotations\":{\"framerContractVersion\":\"1\"}},\"richText178\":{\"type\":\"variable\",\"annotations\":{\"framerContractVersion\":\"1\"}},\"richText50\":{\"type\":\"variable\",\"annotations\":{\"framerContractVersion\":\"1\"}},\"richText171\":{\"type\":\"variable\",\"annotations\":{\"framerContractVersion\":\"1\"}},\"richText118\":{\"type\":\"variable\",\"annotations\":{\"framerContractVersion\":\"1\"}},\"richText114\":{\"type\":\"variable\",\"annotations\":{\"framerContractVersion\":\"1\"}},\"richText161\":{\"type\":\"variable\",\"annotations\":{\"framerContractVersion\":\"1\"}},\"richText44\":{\"type\":\"variable\",\"annotations\":{\"framerContractVersion\":\"1\"}},\"richText256\":{\"type\":\"variable\",\"annotations\":{\"framerContractVersion\":\"1\"}},\"richText176\":{\"type\":\"variable\",\"annotations\":{\"framerContractVersion\":\"1\"}},\"richText110\":{\"type\":\"variable\",\"annotations\":{\"framerContractVersion\":\"1\"}},\"richText68\":{\"type\":\"variable\",\"annotations\":{\"framerContractVersion\":\"1\"}},\"richText162\":{\"type\":\"variable\",\"annotations\":{\"framerContractVersion\":\"1\"}},\"richText132\":{\"type\":\"variable\",\"annotations\":{\"framerContractVersion\":\"1\"}},\"richText211\":{\"type\":\"variable\",\"annotations\":{\"framerContractVersion\":\"1\"}},\"richText208\":{\"type\":\"variable\",\"annotations\":{\"framerContractVersion\":\"1\"}},\"richText185\":{\"type\":\"variable\",\"annotations\":{\"framerContractVersion\":\"1\"}},\"richText56\":{\"type\":\"variable\",\"annotations\":{\"framerContractVersion\":\"1\"}},\"richText119\":{\"type\":\"variable\",\"annotations\":{\"framerContractVersion\":\"1\"}},\"richText194\":{\"type\":\"variable\",\"annotations\":{\"framerContractVersion\":\"1\"}},\"richText200\":{\"type\":\"variable\",\"annotations\":{\"framerContractVersion\":\"1\"}},\"richText29\":{\"type\":\"variable\",\"annotations\":{\"framerContractVersion\":\"1\"}},\"richText152\":{\"type\":\"variable\",\"annotations\":{\"framerContractVersion\":\"1\"}},\"richText60\":{\"type\":\"variable\",\"annotations\":{\"framerContractVersion\":\"1\"}},\"richText23\":{\"type\":\"variable\",\"annotations\":{\"framerContractVersion\":\"1\"}},\"richText30\":{\"type\":\"variable\",\"annotations\":{\"framerContractVersion\":\"1\"}},\"richText221\":{\"type\":\"variable\",\"annotations\":{\"framerContractVersion\":\"1\"}},\"richText67\":{\"type\":\"variable\",\"annotations\":{\"framerContractVersion\":\"1\"}},\"richText2\":{\"type\":\"variable\",\"annotations\":{\"framerContractVersion\":\"1\"}},\"richText215\":{\"type\":\"variable\",\"annotations\":{\"framerContractVersion\":\"1\"}},\"richText28\":{\"type\":\"variable\",\"annotations\":{\"framerContractVersion\":\"1\"}},\"richText22\":{\"type\":\"variable\",\"annotations\":{\"framerContractVersion\":\"1\"}},\"richText38\":{\"type\":\"variable\",\"annotations\":{\"framerContractVersion\":\"1\"}},\"richText146\":{\"type\":\"variable\",\"annotations\":{\"framerContractVersion\":\"1\"}},\"richText92\":{\"type\":\"variable\",\"annotations\":{\"framerContractVersion\":\"1\"}},\"richText207\":{\"type\":\"variable\",\"annotations\":{\"framerContractVersion\":\"1\"}},\"richText228\":{\"type\":\"variable\",\"annotations\":{\"framerContractVersion\":\"1\"}},\"richText147\":{\"type\":\"variable\",\"annotations\":{\"framerContractVersion\":\"1\"}},\"richText122\":{\"type\":\"variable\",\"annotations\":{\"framerContractVersion\":\"1\"}},\"richText42\":{\"type\":\"variable\",\"annotations\":{\"framerContractVersion\":\"1\"}},\"richText149\":{\"type\":\"variable\",\"annotations\":{\"framerContractVersion\":\"1\"}},\"richText109\":{\"type\":\"variable\",\"annotations\":{\"framerContractVersion\":\"1\"}},\"richText24\":{\"type\":\"variable\",\"annotations\":{\"framerContractVersion\":\"1\"}},\"richText108\":{\"type\":\"variable\",\"annotations\":{\"framerContractVersion\":\"1\"}},\"richText165\":{\"type\":\"variable\",\"annotations\":{\"framerContractVersion\":\"1\"}},\"richText135\":{\"type\":\"variable\",\"annotations\":{\"framerContractVersion\":\"1\"}},\"richText201\":{\"type\":\"variable\",\"annotations\":{\"framerContractVersion\":\"1\"}},\"richText87\":{\"type\":\"variable\",\"annotations\":{\"framerContractVersion\":\"1\"}},\"richText116\":{\"type\":\"variable\",\"annotations\":{\"framerContractVersion\":\"1\"}},\"richText103\":{\"type\":\"variable\",\"annotations\":{\"framerContractVersion\":\"1\"}},\"richText254\":{\"type\":\"variable\",\"annotations\":{\"framerContractVersion\":\"1\"}},\"richText177\":{\"type\":\"variable\",\"annotations\":{\"framerContractVersion\":\"1\"}},\"richText106\":{\"type\":\"variable\",\"annotations\":{\"framerContractVersion\":\"1\"}},\"richText37\":{\"type\":\"variable\",\"annotations\":{\"framerContractVersion\":\"1\"}},\"richText112\":{\"type\":\"variable\",\"annotations\":{\"framerContractVersion\":\"1\"}},\"richText181\":{\"type\":\"variable\",\"annotations\":{\"framerContractVersion\":\"1\"}},\"richText80\":{\"type\":\"variable\",\"annotations\":{\"framerContractVersion\":\"1\"}},\"richText126\":{\"type\":\"variable\",\"annotations\":{\"framerContractVersion\":\"1\"}},\"richText193\":{\"type\":\"variable\",\"annotations\":{\"framerContractVersion\":\"1\"}},\"richText203\":{\"type\":\"variable\",\"annotations\":{\"framerContractVersion\":\"1\"}},\"richText26\":{\"type\":\"variable\",\"annotations\":{\"framerContractVersion\":\"1\"}},\"richText217\":{\"type\":\"variable\",\"annotations\":{\"framerContractVersion\":\"1\"}},\"richText89\":{\"type\":\"variable\",\"annotations\":{\"framerContractVersion\":\"1\"}},\"richText27\":{\"type\":\"variable\",\"annotations\":{\"framerContractVersion\":\"1\"}},\"richText113\":{\"type\":\"variable\",\"annotations\":{\"framerContractVersion\":\"1\"}},\"richText101\":{\"type\":\"variable\",\"annotations\":{\"framerContractVersion\":\"1\"}},\"richText9\":{\"type\":\"variable\",\"annotations\":{\"framerContractVersion\":\"1\"}},\"richText20\":{\"type\":\"variable\",\"annotations\":{\"framerContractVersion\":\"1\"}},\"richText155\":{\"type\":\"variable\",\"annotations\":{\"framerContractVersion\":\"1\"}},\"richText31\":{\"type\":\"variable\",\"annotations\":{\"framerContractVersion\":\"1\"}},\"richText148\":{\"type\":\"variable\",\"annotations\":{\"framerContractVersion\":\"1\"}},\"richText142\":{\"type\":\"variable\",\"annotations\":{\"framerContractVersion\":\"1\"}},\"richText210\":{\"type\":\"variable\",\"annotations\":{\"framerContractVersion\":\"1\"}},\"richText231\":{\"type\":\"variable\",\"annotations\":{\"framerContractVersion\":\"1\"}},\"richText81\":{\"type\":\"variable\",\"annotations\":{\"framerContractVersion\":\"1\"}},\"richText163\":{\"type\":\"variable\",\"annotations\":{\"framerContractVersion\":\"1\"}},\"richText46\":{\"type\":\"variable\",\"annotations\":{\"framerContractVersion\":\"1\"}},\"richText100\":{\"type\":\"variable\",\"annotations\":{\"framerContractVersion\":\"1\"}},\"richText158\":{\"type\":\"variable\",\"annotations\":{\"framerContractVersion\":\"1\"}},\"richText34\":{\"type\":\"variable\",\"annotations\":{\"framerContractVersion\":\"1\"}},\"richText175\":{\"type\":\"variable\",\"annotations\":{\"framerContractVersion\":\"1\"}},\"richText251\":{\"type\":\"variable\",\"annotations\":{\"framerContractVersion\":\"1\"}},\"richText121\":{\"type\":\"variable\",\"annotations\":{\"framerContractVersion\":\"1\"}},\"richText19\":{\"type\":\"variable\",\"annotations\":{\"framerContractVersion\":\"1\"}},\"richText214\":{\"type\":\"variable\",\"annotations\":{\"framerContractVersion\":\"1\"}},\"richText86\":{\"type\":\"variable\",\"annotations\":{\"framerContractVersion\":\"1\"}},\"richText197\":{\"type\":\"variable\",\"annotations\":{\"framerContractVersion\":\"1\"}},\"richText222\":{\"type\":\"variable\",\"annotations\":{\"framerContractVersion\":\"1\"}},\"richText40\":{\"type\":\"variable\",\"annotations\":{\"framerContractVersion\":\"1\"}},\"richText204\":{\"type\":\"variable\",\"annotations\":{\"framerContractVersion\":\"1\"}},\"richText32\":{\"type\":\"variable\",\"annotations\":{\"framerContractVersion\":\"1\"}},\"richText14\":{\"type\":\"variable\",\"annotations\":{\"framerContractVersion\":\"1\"}},\"richText102\":{\"type\":\"variable\",\"annotations\":{\"framerContractVersion\":\"1\"}},\"richText48\":{\"type\":\"variable\",\"annotations\":{\"framerContractVersion\":\"1\"}},\"richText127\":{\"type\":\"variable\",\"annotations\":{\"framerContractVersion\":\"1\"}},\"richText195\":{\"type\":\"variable\",\"annotations\":{\"framerContractVersion\":\"1\"}},\"richText240\":{\"type\":\"variable\",\"annotations\":{\"framerContractVersion\":\"1\"}},\"richText224\":{\"type\":\"variable\",\"annotations\":{\"framerContractVersion\":\"1\"}},\"richText36\":{\"type\":\"variable\",\"annotations\":{\"framerContractVersion\":\"1\"}},\"richText16\":{\"type\":\"variable\",\"annotations\":{\"framerContractVersion\":\"1\"}},\"richText140\":{\"type\":\"variable\",\"annotations\":{\"framerContractVersion\":\"1\"}},\"richText105\":{\"type\":\"variable\",\"annotations\":{\"framerContractVersion\":\"1\"}},\"richText125\":{\"type\":\"variable\",\"annotations\":{\"framerContractVersion\":\"1\"}},\"richText167\":{\"type\":\"variable\",\"annotations\":{\"framerContractVersion\":\"1\"}},\"richText189\":{\"type\":\"variable\",\"annotations\":{\"framerContractVersion\":\"1\"}},\"richText4\":{\"type\":\"variable\",\"annotations\":{\"framerContractVersion\":\"1\"}},\"richText206\":{\"type\":\"variable\",\"annotations\":{\"framerContractVersion\":\"1\"}},\"richText18\":{\"type\":\"variable\",\"annotations\":{\"framerContractVersion\":\"1\"}},\"richText115\":{\"type\":\"variable\",\"annotations\":{\"framerContractVersion\":\"1\"}},\"richText159\":{\"type\":\"variable\",\"annotations\":{\"framerContractVersion\":\"1\"}},\"richText45\":{\"type\":\"variable\",\"annotations\":{\"framerContractVersion\":\"1\"}},\"richText232\":{\"type\":\"variable\",\"annotations\":{\"framerContractVersion\":\"1\"}},\"richText43\":{\"type\":\"variable\",\"annotations\":{\"framerContractVersion\":\"1\"}},\"richText75\":{\"type\":\"variable\",\"annotations\":{\"framerContractVersion\":\"1\"}},\"richText235\":{\"type\":\"variable\",\"annotations\":{\"framerContractVersion\":\"1\"}},\"richText82\":{\"type\":\"variable\",\"annotations\":{\"framerContractVersion\":\"1\"}},\"richText55\":{\"type\":\"variable\",\"annotations\":{\"framerContractVersion\":\"1\"}},\"richText209\":{\"type\":\"variable\",\"annotations\":{\"framerContractVersion\":\"1\"}},\"richText151\":{\"type\":\"variable\",\"annotations\":{\"framerContractVersion\":\"1\"}},\"richText77\":{\"type\":\"variable\",\"annotations\":{\"framerContractVersion\":\"1\"}},\"richText123\":{\"type\":\"variable\",\"annotations\":{\"framerContractVersion\":\"1\"}},\"richText213\":{\"type\":\"variable\",\"annotations\":{\"framerContractVersion\":\"1\"}},\"richText93\":{\"type\":\"variable\",\"annotations\":{\"framerContractVersion\":\"1\"}},\"richText190\":{\"type\":\"variable\",\"annotations\":{\"framerContractVersion\":\"1\"}},\"richText13\":{\"type\":\"variable\",\"annotations\":{\"framerContractVersion\":\"1\"}},\"richText21\":{\"type\":\"variable\",\"annotations\":{\"framerContractVersion\":\"1\"}},\"richText51\":{\"type\":\"variable\",\"annotations\":{\"framerContractVersion\":\"1\"}},\"richText150\":{\"type\":\"variable\",\"annotations\":{\"framerContractVersion\":\"1\"}},\"richText219\":{\"type\":\"variable\",\"annotations\":{\"framerContractVersion\":\"1\"}},\"richText129\":{\"type\":\"variable\",\"annotations\":{\"framerContractVersion\":\"1\"}},\"richText227\":{\"type\":\"variable\",\"annotations\":{\"framerContractVersion\":\"1\"}},\"richText188\":{\"type\":\"variable\",\"annotations\":{\"framerContractVersion\":\"1\"}},\"richText11\":{\"type\":\"variable\",\"annotations\":{\"framerContractVersion\":\"1\"}},\"richText52\":{\"type\":\"variable\",\"annotations\":{\"framerContractVersion\":\"1\"}},\"richText85\":{\"type\":\"variable\",\"annotations\":{\"framerContractVersion\":\"1\"}},\"richText99\":{\"type\":\"variable\",\"annotations\":{\"framerContractVersion\":\"1\"}},\"richText173\":{\"type\":\"variable\",\"annotations\":{\"framerContractVersion\":\"1\"}},\"richText53\":{\"type\":\"variable\",\"annotations\":{\"framerContractVersion\":\"1\"}},\"richText182\":{\"type\":\"variable\",\"annotations\":{\"framerContractVersion\":\"1\"}},\"richText237\":{\"type\":\"variable\",\"annotations\":{\"framerContractVersion\":\"1\"}},\"richText198\":{\"type\":\"variable\",\"annotations\":{\"framerContractVersion\":\"1\"}},\"richText73\":{\"type\":\"variable\",\"annotations\":{\"framerContractVersion\":\"1\"}},\"richText66\":{\"type\":\"variable\",\"annotations\":{\"framerContractVersion\":\"1\"}},\"richText70\":{\"type\":\"variable\",\"annotations\":{\"framerContractVersion\":\"1\"}},\"richText95\":{\"type\":\"variable\",\"annotations\":{\"framerContractVersion\":\"1\"}},\"richText15\":{\"type\":\"variable\",\"annotations\":{\"framerContractVersion\":\"1\"}},\"richText153\":{\"type\":\"variable\",\"annotations\":{\"framerContractVersion\":\"1\"}},\"richText186\":{\"type\":\"variable\",\"annotations\":{\"framerContractVersion\":\"1\"}},\"richText35\":{\"type\":\"variable\",\"annotations\":{\"framerContractVersion\":\"1\"}},\"richText220\":{\"type\":\"variable\",\"annotations\":{\"framerContractVersion\":\"1\"}},\"richText218\":{\"type\":\"variable\",\"annotations\":{\"framerContractVersion\":\"1\"}},\"richText225\":{\"type\":\"variable\",\"annotations\":{\"framerContractVersion\":\"1\"}},\"richText\":{\"type\":\"variable\",\"annotations\":{\"framerContractVersion\":\"1\"}},\"richText196\":{\"type\":\"variable\",\"annotations\":{\"framerContractVersion\":\"1\"}},\"richText25\":{\"type\":\"variable\",\"annotations\":{\"framerContractVersion\":\"1\"}},\"richText57\":{\"type\":\"variable\",\"annotations\":{\"framerContractVersion\":\"1\"}},\"richText97\":{\"type\":\"variable\",\"annotations\":{\"framerContractVersion\":\"1\"}},\"richText7\":{\"type\":\"variable\",\"annotations\":{\"framerContractVersion\":\"1\"}},\"richText179\":{\"type\":\"variable\",\"annotations\":{\"framerContractVersion\":\"1\"}},\"richText6\":{\"type\":\"variable\",\"annotations\":{\"framerContractVersion\":\"1\"}},\"richText184\":{\"type\":\"variable\",\"annotations\":{\"framerContractVersion\":\"1\"}},\"richText71\":{\"type\":\"variable\",\"annotations\":{\"framerContractVersion\":\"1\"}},\"richText134\":{\"type\":\"variable\",\"annotations\":{\"framerContractVersion\":\"1\"}},\"richText76\":{\"type\":\"variable\",\"annotations\":{\"framerContractVersion\":\"1\"}},\"richText248\":{\"type\":\"variable\",\"annotations\":{\"framerContractVersion\":\"1\"}},\"richText255\":{\"type\":\"variable\",\"annotations\":{\"framerContractVersion\":\"1\"}},\"richText49\":{\"type\":\"variable\",\"annotations\":{\"framerContractVersion\":\"1\"}},\"richText212\":{\"type\":\"variable\",\"annotations\":{\"framerContractVersion\":\"1\"}},\"richText124\":{\"type\":\"variable\",\"annotations\":{\"framerContractVersion\":\"1\"}},\"richText191\":{\"type\":\"variable\",\"annotations\":{\"framerContractVersion\":\"1\"}},\"richText156\":{\"type\":\"variable\",\"annotations\":{\"framerContractVersion\":\"1\"}},\"richText96\":{\"type\":\"variable\",\"annotations\":{\"framerContractVersion\":\"1\"}},\"richText62\":{\"type\":\"variable\",\"annotations\":{\"framerContractVersion\":\"1\"}},\"richText78\":{\"type\":\"variable\",\"annotations\":{\"framerContractVersion\":\"1\"}},\"richText59\":{\"type\":\"variable\",\"annotations\":{\"framerContractVersion\":\"1\"}},\"richText1\":{\"type\":\"variable\",\"annotations\":{\"framerContractVersion\":\"1\"}},\"richText168\":{\"type\":\"variable\",\"annotations\":{\"framerContractVersion\":\"1\"}},\"richText236\":{\"type\":\"variable\",\"annotations\":{\"framerContractVersion\":\"1\"}},\"richText164\":{\"type\":\"variable\",\"annotations\":{\"framerContractVersion\":\"1\"}},\"richText144\":{\"type\":\"variable\",\"annotations\":{\"framerContractVersion\":\"1\"}},\"richText141\":{\"type\":\"variable\",\"annotations\":{\"framerContractVersion\":\"1\"}},\"richText160\":{\"type\":\"variable\",\"annotations\":{\"framerContractVersion\":\"1\"}},\"richText230\":{\"type\":\"variable\",\"annotations\":{\"framerContractVersion\":\"1\"}},\"richText253\":{\"type\":\"variable\",\"annotations\":{\"framerContractVersion\":\"1\"}},\"richText94\":{\"type\":\"variable\",\"annotations\":{\"framerContractVersion\":\"1\"}},\"richText252\":{\"type\":\"variable\",\"annotations\":{\"framerContractVersion\":\"1\"}},\"richText136\":{\"type\":\"variable\",\"annotations\":{\"framerContractVersion\":\"1\"}},\"richText65\":{\"type\":\"variable\",\"annotations\":{\"framerContractVersion\":\"1\"}},\"richText187\":{\"type\":\"variable\",\"annotations\":{\"framerContractVersion\":\"1\"}},\"richText61\":{\"type\":\"variable\",\"annotations\":{\"framerContractVersion\":\"1\"}},\"richText223\":{\"type\":\"variable\",\"annotations\":{\"framerContractVersion\":\"1\"}},\"richText83\":{\"type\":\"variable\",\"annotations\":{\"framerContractVersion\":\"1\"}},\"richText88\":{\"type\":\"variable\",\"annotations\":{\"framerContractVersion\":\"1\"}},\"richText238\":{\"type\":\"variable\",\"annotations\":{\"framerContractVersion\":\"1\"}},\"richText133\":{\"type\":\"variable\",\"annotations\":{\"framerContractVersion\":\"1\"}},\"richText154\":{\"type\":\"variable\",\"annotations\":{\"framerContractVersion\":\"1\"}},\"richText120\":{\"type\":\"variable\",\"annotations\":{\"framerContractVersion\":\"1\"}},\"richText202\":{\"type\":\"variable\",\"annotations\":{\"framerContractVersion\":\"1\"}},\"richText8\":{\"type\":\"variable\",\"annotations\":{\"framerContractVersion\":\"1\"}},\"richText131\":{\"type\":\"variable\",\"annotations\":{\"framerContractVersion\":\"1\"}},\"richText241\":{\"type\":\"variable\",\"annotations\":{\"framerContractVersion\":\"1\"}},\"richText33\":{\"type\":\"variable\",\"annotations\":{\"framerContractVersion\":\"1\"}},\"richText145\":{\"type\":\"variable\",\"annotations\":{\"framerContractVersion\":\"1\"}},\"richText216\":{\"type\":\"variable\",\"annotations\":{\"framerContractVersion\":\"1\"}},\"richText84\":{\"type\":\"variable\",\"annotations\":{\"framerContractVersion\":\"1\"}},\"richText239\":{\"type\":\"variable\",\"annotations\":{\"framerContractVersion\":\"1\"}},\"richText246\":{\"type\":\"variable\",\"annotations\":{\"framerContractVersion\":\"1\"}},\"richText130\":{\"type\":\"variable\",\"annotations\":{\"framerContractVersion\":\"1\"}},\"richText166\":{\"type\":\"variable\",\"annotations\":{\"framerContractVersion\":\"1\"}},\"richText72\":{\"type\":\"variable\",\"annotations\":{\"framerContractVersion\":\"1\"}},\"richText170\":{\"type\":\"variable\",\"annotations\":{\"framerContractVersion\":\"1\"}},\"richText107\":{\"type\":\"variable\",\"annotations\":{\"framerContractVersion\":\"1\"}},\"richText47\":{\"type\":\"variable\",\"annotations\":{\"framerContractVersion\":\"1\"}},\"richText138\":{\"type\":\"variable\",\"annotations\":{\"framerContractVersion\":\"1\"}},\"richText234\":{\"type\":\"variable\",\"annotations\":{\"framerContractVersion\":\"1\"}},\"richText69\":{\"type\":\"variable\",\"annotations\":{\"framerContractVersion\":\"1\"}},\"richText250\":{\"type\":\"variable\",\"annotations\":{\"framerContractVersion\":\"1\"}},\"richText3\":{\"type\":\"variable\",\"annotations\":{\"framerContractVersion\":\"1\"}},\"richText199\":{\"type\":\"variable\",\"annotations\":{\"framerContractVersion\":\"1\"}},\"richText247\":{\"type\":\"variable\",\"annotations\":{\"framerContractVersion\":\"1\"}},\"richText5\":{\"type\":\"variable\",\"annotations\":{\"framerContractVersion\":\"1\"}},\"richText243\":{\"type\":\"variable\",\"annotations\":{\"framerContractVersion\":\"1\"}},\"richText174\":{\"type\":\"variable\",\"annotations\":{\"framerContractVersion\":\"1\"}},\"richText91\":{\"type\":\"variable\",\"annotations\":{\"framerContractVersion\":\"1\"}},\"richText183\":{\"type\":\"variable\",\"annotations\":{\"framerContractVersion\":\"1\"}},\"richText98\":{\"type\":\"variable\",\"annotations\":{\"framerContractVersion\":\"1\"}},\"richText104\":{\"type\":\"variable\",\"annotations\":{\"framerContractVersion\":\"1\"}},\"richText137\":{\"type\":\"variable\",\"annotations\":{\"framerContractVersion\":\"1\"}},\"richText205\":{\"type\":\"variable\",\"annotations\":{\"framerContractVersion\":\"1\"}},\"richText139\":{\"type\":\"variable\",\"annotations\":{\"framerContractVersion\":\"1\"}},\"richText143\":{\"type\":\"variable\",\"annotations\":{\"framerContractVersion\":\"1\"}},\"richText79\":{\"type\":\"variable\",\"annotations\":{\"framerContractVersion\":\"1\"}},\"richText242\":{\"type\":\"variable\",\"annotations\":{\"framerContractVersion\":\"1\"}},\"richText229\":{\"type\":\"variable\",\"annotations\":{\"framerContractVersion\":\"1\"}},\"richText180\":{\"type\":\"variable\",\"annotations\":{\"framerContractVersion\":\"1\"}},\"richText63\":{\"type\":\"variable\",\"annotations\":{\"framerContractVersion\":\"1\"}},\"__FramerMetadata__\":{\"type\":\"variable\"}}}"],"mappings":"i5BAAuF,EAAsB,EAAA,EAAa,CAAC,SAAsB,EAAE,IAAI,CAAC,SAAS,WAAW,EAAE,EAAe,EAAuB,EAAA,EAAa,CAAC,SAAsB,EAAE,IAAI,CAAC,SAAS,sTAAsT,EAAE,EAAe,EAAuB,EAAA,EAAa,CAAC,SAAsB,EAAE,IAAI,CAAC,SAAS,CAAC,6BAA0C,EAAE,KAAK,EAAE,EAAE,iCAA8C,EAAE,KAAK,EAAE,EAAE,8BAA8B,CAAC,EAAE,EAAe,EAAuB,EAAA,EAAa,CAAC,SAAsB,EAAE,IAAI,CAAC,SAAS,CAAC,iCAA8C,EAAE,KAAK,EAAE,EAAE,iCAA8C,EAAE,KAAK,EAAE,EAAE,2BAA2B,CAAC,EAAE,EAAe,EAAuB,EAAA,EAAa,CAAC,SAAsB,EAAE,IAAI,CAAC,SAAS,40BAA40B,EAAE,EAAe,EAAuB,EAAA,EAAa,CAAC,SAAsB,EAAE,IAAI,CAAC,SAAS,i6BAAi6B,EAAE,EAAe,EAAuB,EAAA,EAAa,CAAC,SAAsB,EAAE,IAAI,CAAC,SAAS,+BAA+B,EAAE,EAAe,EAAuB,EAAA,EAAa,CAAC,SAAsB,EAAE,IAAI,CAAC,SAAS,4VAA4V,EAAE,EAAe,EAAuB,EAAA,EAAa,CAAC,SAAS,CAAc,EAAE,IAAI,CAAC,SAAS,iCAAiC,EAAe,EAAE,IAAI,CAAC,SAAS,4BAA4B,EAAe,EAAE,IAAI,CAAC,SAAS,6BAA6B,EAAE,CAAC,EAAe,EAAuB,EAAA,EAAa,CAAC,SAAS,CAAc,EAAE,IAAI,CAAC,SAAS,qCAAqC,EAAe,EAAE,IAAI,CAAC,SAAS,4BAA4B,EAAe,EAAE,IAAI,CAAC,SAAS,2BAA2B,EAAE,CAAC,EAAe,EAAwB,EAAA,EAAa,CAAC,SAAS,CAAc,EAAE,IAAI,CAAC,SAAsB,EAAE,OAAO,CAAC,SAAS,CAAc,EAAE,SAAS,CAAC,SAAS,6BAA6B,EAAE,iPAAiP,CAAC,EAAE,EAAe,EAAE,IAAI,CAAC,SAAS,CAAc,EAAE,SAAS,CAAC,SAAS,kCAAkC,EAAE,+PAA+P,CAAC,EAAe,EAAE,IAAI,CAAC,SAAS,CAAc,EAAE,SAAS,CAAC,SAAS,kCAAkC,EAAE,gQAAgQ,CAAC,EAAE,CAAC,EAAe,EAAwB,EAAA,EAAa,CAAC,SAAS,CAAc,EAAE,IAAI,CAAC,SAAS,CAAc,EAAE,SAAS,CAAC,SAAS,8BAA8B,EAAE,+PAA+P,CAAC,EAAe,EAAE,IAAI,CAAC,SAAsB,EAAE,OAAO,CAAC,SAAS,CAAc,EAAE,SAAS,CAAC,SAAS,SAAS,EAAE,8PAA8P,CAAC,EAAE,EAAe,EAAE,IAAI,CAAC,SAAS,CAAc,EAAE,SAAS,CAAC,SAAS,kBAAkB,EAAE,iPAAiP,CAAC,EAAe,EAAE,IAAI,CAAC,SAAsB,EAAE,OAAO,CAAC,SAAS,CAAc,EAAE,SAAS,CAAC,SAAS,gBAAgB,EAAE,kOAAkO,CAAC,EAAE,EAAe,EAAE,IAAI,CAAC,SAAS,CAAc,EAAE,SAAS,CAAC,SAAS,cAAc,EAAE,uOAAuO,CAAC,EAAE,CAAC,EAAe,EAAwB,EAAA,EAAa,CAAC,SAAsB,EAAE,IAAI,CAAC,SAAS,eAAe,EAAE,EAAe,EAAwB,EAAA,EAAa,CAAC,SAAS,CAAc,EAAE,IAAI,CAAC,SAAS,sCAAsC,EAAe,EAAE,IAAI,CAAC,SAAS,uCAAuC,EAAe,EAAE,IAAI,CAAC,SAAS,4CAA4C,EAAE,CAAC,EAAe,EAAwB,EAAA,EAAa,CAAC,SAAS,CAAc,EAAE,IAAI,CAAC,SAAS,mCAAmC,EAAe,EAAE,IAAI,CAAC,SAAS,iCAAiC,EAAe,EAAE,IAAI,CAAC,SAAS,+BAA+B,EAAE,CAAC,EAAe,EAAwB,EAAA,EAAa,CAAC,SAAS,CAAc,EAAE,IAAI,CAAC,SAAS,CAAc,EAAE,SAAS,CAAC,SAAS,qBAAqB,EAAE,iSAAiS,CAAC,EAAe,EAAE,IAAI,CAAC,SAAS,CAAc,EAAE,SAAS,CAAC,SAAS,iCAAiC,EAAE,oUAAoU,CAAC,EAAe,EAAE,IAAI,CAAC,SAAS,CAAc,EAAE,SAAS,CAAC,SAAS,gCAAgC,EAAE,0TAA0T,CAAC,EAAE,CAAC,EAAe,EAAwB,EAAA,EAAa,CAAC,SAAS,CAAc,EAAE,IAAI,CAAC,SAAS,CAAc,EAAE,SAAS,CAAC,SAAS,MAAM,EAAE,+TAA+T,CAAC,EAAe,EAAE,IAAI,CAAC,SAAS,CAAc,EAAE,SAAS,CAAC,SAAS,oBAAoB,EAAE,0RAA0R,CAAC,EAAE,CAAC,EAAe,EAAwB,EAAA,EAAa,CAAC,SAAsB,EAAE,IAAI,CAAC,SAAS,oBAAoB,EAAE,EAAe,EAAwB,EAAA,EAAa,CAAC,SAAsB,EAAE,IAAI,CAAC,SAAS,4UAA4U,EAAE,EAAe,EAAwB,EAAA,EAAa,CAAC,SAAsB,EAAE,IAAI,CAAC,SAAS,CAAC,kCAA+C,EAAE,KAAK,EAAE,EAAE,qCAAkD,EAAE,KAAK,EAAE,EAAE,8CAA8C,CAAC,EAAE,EAAe,EAAwB,EAAA,EAAa,CAAC,SAAsB,EAAE,IAAI,CAAC,SAAS,CAAC,iCAA8C,EAAE,KAAK,EAAE,EAAE,gCAA6C,EAAE,KAAK,EAAE,EAAE,uCAAuC,CAAC,EAAE,EAAe,EAAwB,EAAA,EAAa,CAAC,SAAS,CAAc,EAAE,IAAI,CAAC,SAAS,CAAc,EAAE,SAAS,CAAC,SAAS,uCAAuC,EAAE,iSAAiS,CAAC,EAAe,EAAE,IAAI,CAAC,SAAS,CAAc,EAAE,SAAS,CAAC,SAAS,iCAAiC,EAAE,+NAA+N,CAAC,EAAe,EAAE,IAAI,CAAC,SAAS,CAAc,EAAE,SAAS,CAAC,SAAS,+BAA+B,EAAE,gOAAgO,CAAC,EAAE,CAAC,EAAe,EAAwB,EAAA,EAAa,CAAC,SAAS,CAAc,EAAE,IAAI,CAAC,SAAS,CAAc,EAAE,SAAS,CAAC,SAAS,kBAAkB,EAAE,sSAAsS,CAAC,EAAe,EAAE,IAAI,CAAC,SAAS,CAAc,EAAE,SAAS,CAAC,SAAS,oCAAoC,EAAE,kQAAkQ,CAAC,EAAe,EAAE,IAAI,CAAC,SAAS,CAAc,EAAE,SAAS,CAAC,SAAS,oBAAoB,EAAE,yPAAyP,CAAC,EAAE,CAAC,EAAe,EAAwB,EAAA,EAAa,CAAC,SAAsB,EAAE,IAAI,CAAC,SAAS,yBAAyB,EAAE,EAAe,EAAwB,EAAA,EAAa,CAAC,SAAsB,EAAE,IAAI,CAAC,SAAS,wUAAwU,EAAE,EAAe,EAAwB,EAAA,EAAa,CAAC,SAAS,CAAc,EAAE,IAAI,CAAC,SAAS,6BAA6B,EAAe,EAAE,IAAI,CAAC,SAAS,4BAA4B,EAAe,EAAE,IAAI,CAAC,SAAS,gCAAgC,EAAE,CAAC,EAAe,EAAwB,EAAA,EAAa,CAAC,SAAS,CAAc,EAAE,IAAI,CAAC,SAAS,+BAA+B,EAAe,EAAE,IAAI,CAAC,SAAS,iCAAiC,EAAe,EAAE,IAAI,CAAC,SAAS,8BAA8B,EAAE,CAAC,EAAe,EAAwB,EAAA,EAAa,CAAC,SAAS,CAAc,EAAE,IAAI,CAAC,SAAS,CAAc,EAAE,SAAS,CAAC,SAAS,kCAAkC,EAAE,0QAA0Q,CAAC,EAAe,EAAE,IAAI,CAAC,SAAsB,EAAE,OAAO,CAAC,SAAS,CAAc,EAAE,SAAS,CAAC,SAAS,6BAA6B,EAAE,mPAAmP,CAAC,EAAE,EAAe,EAAE,IAAI,CAAC,SAAS,CAAc,EAAE,SAAS,CAAC,SAAS,iCAAiC,EAAE,yPAAyP,CAAC,EAAE,CAAC,EAAe,EAAwB,EAAA,EAAa,CAAC,SAAS,CAAc,EAAE,IAAI,CAAC,SAAS,CAAc,EAAE,SAAS,CAAC,SAAS,oBAAoB,EAAE,8OAA8O,CAAC,EAAe,EAAE,IAAI,CAAC,SAAsB,EAAE,OAAO,CAAC,SAAS,CAAc,EAAE,SAAS,CAAC,SAAS,0BAA0B,EAAE,8MAA8M,CAAC,EAAE,EAAe,EAAE,IAAI,CAAC,SAAsB,EAAE,OAAO,CAAC,SAAS,CAAc,EAAE,SAAS,CAAC,SAAS,kBAAkB,EAAE,yMAAyM,CAAC,EAAE,EAAe,EAAE,IAAI,CAAC,SAAS,CAAc,EAAE,SAAS,CAAC,SAAS,yBAAyB,EAAE,qNAAqN,CAAC,EAAE,CAAC,EAAe,EAAwB,EAAA,EAAa,CAAC,SAAsB,EAAE,IAAI,CAAC,SAAS,4BAA4B,EAAE,EAAe,EAAwB,EAAA,EAAa,CAAC,SAAsB,EAAE,IAAI,CAAC,SAAS,gVAAgV,EAAE,EAAe,EAAwB,EAAA,EAAa,CAAC,SAAS,CAAc,EAAE,IAAI,CAAC,SAAS,kCAAkC,EAAe,EAAE,IAAI,CAAC,SAAS,kCAAkC,EAAe,EAAE,IAAI,CAAC,SAAS,4BAA4B,EAAE,CAAC,EAAe,EAAwB,EAAA,EAAa,CAAC,SAAS,CAAc,EAAE,IAAI,CAAC,SAAS,0CAA0C,EAAe,EAAE,IAAI,CAAC,SAAS,+BAA+B,EAAe,EAAE,IAAI,CAAC,SAAS,6BAA6B,EAAE,CAAC,EAAe,EAAwB,EAAA,EAAa,CAAC,SAAS,CAAc,EAAE,IAAI,CAAC,SAAsB,EAAE,OAAO,CAAC,SAAS,CAAc,EAAE,SAAS,CAAC,SAAS,mBAAmB,EAAE,2PAA2P,CAAC,EAAE,EAAe,EAAE,IAAI,CAAC,SAAS,CAAc,EAAE,SAAS,CAAC,SAAS,sCAAsC,EAAE,6OAA6O,CAAC,EAAe,EAAE,IAAI,CAAC,SAAsB,EAAE,OAAO,CAAC,SAAS,CAAc,EAAE,SAAS,CAAC,SAAS,oCAAoC,EAAE,gQAAgQ,CAAC,EAAE,EAAE,CAAC,EAAe,EAAwB,EAAA,EAAa,CAAC,SAAS,CAAc,EAAE,IAAI,CAAC,SAAsB,EAAE,OAAO,CAAC,SAAS,CAAc,EAAE,SAAS,CAAC,SAAS,aAAa,EAAE,uQAAuQ,CAAC,EAAE,EAAe,EAAE,IAAI,CAAC,SAAsB,EAAE,OAAO,CAAC,SAAS,CAAc,EAAE,SAAS,CAAC,SAAS,gBAAgB,EAAE,8OAA8O,CAAC,EAAE,EAAE,CAAC,EAAe,EAAwB,EAAA,EAAa,CAAC,SAAsB,EAAE,IAAI,CAAC,SAAS,6BAA6B,EAAE,EAAe,EAAwB,EAAA,EAAa,CAAC,SAAsB,EAAE,IAAI,CAAC,SAAS,6VAA6V,EAAE,EAAe,EAAwB,EAAA,EAAa,CAAC,SAAS,CAAc,EAAE,IAAI,CAAC,SAAS,gCAAgC,EAAe,EAAE,IAAI,CAAC,SAAS,gCAAgC,EAAe,EAAE,IAAI,CAAC,SAAS,oCAAoC,EAAE,CAAC,EAAe,EAAwB,EAAA,EAAa,CAAC,SAAS,CAAc,EAAE,IAAI,CAAC,SAAS,4BAA4B,EAAe,EAAE,IAAI,CAAC,SAAS,+BAA+B,EAAe,EAAE,IAAI,CAAC,SAAS,0BAA0B,EAAE,CAAC,EAAe,EAAwB,EAAA,EAAa,CAAC,SAAS,CAAc,EAAE,IAAI,CAAC,SAAS,CAAc,EAAE,SAAS,CAAC,SAAS,4BAA4B,EAAE,2OAA2O,CAAC,EAAe,EAAE,IAAI,CAAC,SAAS,CAAc,EAAE,SAAS,CAAC,SAAS,eAAe,EAAE,6RAA6R,CAAC,EAAe,EAAE,IAAI,CAAC,SAAsB,EAAE,OAAO,CAAC,SAAS,CAAc,EAAE,SAAS,CAAC,SAAS,2BAA2B,EAAE,wQAAwQ,CAAC,EAAE,EAAE,CAAC,EAAe,EAAwB,EAAA,EAAa,CAAC,SAAsB,EAAE,IAAI,CAAC,SAAS,CAAc,EAAE,SAAS,CAAC,SAAS,iBAAiB,EAAE,2QAA2Q,CAAC,EAAE,EAAe,EAAwB,EAAA,EAAa,CAAC,SAAsB,EAAE,IAAI,CAAC,SAAS,0BAA0B,EAAE,EAAe,EAAwB,EAAA,EAAa,CAAC,SAAsB,EAAE,IAAI,CAAC,SAAS,2UAA2U,EAAE,EAAe,EAAwB,EAAA,EAAa,CAAC,SAAS,CAAc,EAAE,IAAI,CAAC,SAAS,oCAAoC,EAAe,EAAE,IAAI,CAAC,SAAS,gCAAgC,EAAe,EAAE,IAAI,CAAC,SAAS,wCAAwC,EAAE,CAAC,EAAe,EAAwB,EAAA,EAAa,CAAC,SAAS,CAAc,EAAE,IAAI,CAAC,SAAS,oCAAoC,EAAe,EAAE,IAAI,CAAC,SAAS,kCAAkC,EAAe,EAAE,IAAI,CAAC,SAAS,qCAAqC,EAAE,CAAC,EAAe,EAAwB,EAAA,EAAa,CAAC,SAAS,CAAc,EAAE,IAAI,CAAC,SAAsB,EAAE,OAAO,CAAC,SAAS,CAAc,EAAE,SAAS,CAAC,SAAS,8BAA8B,EAAE,8RAA8R,CAAC,EAAE,EAAe,EAAE,IAAI,CAAC,SAAS,CAAc,EAAE,SAAS,CAAC,SAAS,sBAAsB,EAAE,kUAAkU,CAAC,EAAe,EAAE,IAAI,CAAC,SAAsB,EAAE,OAAO,CAAC,SAAS,CAAc,EAAE,SAAS,CAAC,SAAS,kCAAkC,EAAE,0TAA0T,CAAC,EAAE,EAAE,CAAC,EAAe,EAAwB,EAAA,EAAa,CAAC,SAAS,CAAc,EAAE,IAAI,CAAC,SAAS,CAAc,EAAE,SAAS,CAAC,SAAS,kBAAkB,EAAE,iQAAiQ,CAAC,EAAe,EAAE,IAAI,CAAC,SAAS,CAAc,EAAE,SAAS,CAAC,SAAS,iBAAiB,EAAE,0RAA0R,CAAC,EAAe,EAAE,IAAI,CAAC,SAAS,CAAc,EAAE,SAAS,CAAC,SAAS,cAAc,EAAE,8OAA8O,CAAC,EAAe,EAAE,IAAI,CAAC,SAAS,CAAc,EAAE,SAAS,CAAC,SAAS,eAAe,EAAE,kPAAkP,CAAC,EAAe,EAAE,IAAI,CAAC,SAAS,CAAc,EAAE,SAAS,CAAC,SAAS,QAAQ,EAAE,mRAAmR,CAAC,EAAE,CAAC,EAAe,EAAwB,EAAA,EAAa,CAAC,SAAsB,EAAE,IAAI,CAAC,SAAS,8SAA8S,EAAE,EAAe,EAAwB,EAAA,EAAa,CAAC,SAAS,CAAc,EAAE,IAAI,CAAC,SAAS,oCAAoC,EAAe,EAAE,IAAI,CAAC,SAAS,6BAA6B,EAAe,EAAE,IAAI,CAAC,SAAS,kCAAkC,EAAE,CAAC,EAAe,GAAwB,EAAA,EAAa,CAAC,SAAS,CAAc,EAAE,IAAI,CAAC,SAAS,+BAA+B,EAAe,EAAE,IAAI,CAAC,SAAS,mCAAmC,EAAe,EAAE,IAAI,CAAC,SAAS,8BAA8B,EAAE,CAAC,EAAe,GAAwB,EAAA,EAAa,CAAC,SAAS,CAAc,EAAE,IAAI,CAAC,SAAS,CAAc,EAAE,SAAS,CAAC,SAAS,0BAA0B,EAAE,yTAAyT,CAAC,EAAe,EAAE,IAAI,CAAC,SAAS,CAAc,EAAE,SAAS,CAAC,SAAS,qCAAqC,EAAE,qRAAqR,CAAC,EAAe,EAAE,IAAI,CAAC,SAAS,CAAc,EAAE,SAAS,CAAC,SAAS,+CAA+C,EAAE,oTAAoT,CAAC,EAAE,CAAC,EAAe,GAAwB,EAAA,EAAa,CAAC,SAAS,CAAc,EAAE,IAAI,CAAC,SAAS,CAAc,EAAE,SAAS,CAAC,SAAS,0BAA0B,EAAE,mPAAmP,CAAC,EAAe,EAAE,IAAI,CAAC,SAAS,CAAc,EAAE,SAAS,CAAC,SAAS,gBAAgB,EAAE,mOAAmO,CAAC,EAAe,EAAE,IAAI,CAAC,SAAsB,EAAE,OAAO,CAAC,SAAS,CAAc,EAAE,SAAS,CAAC,SAAS,kBAAkB,EAAE,8PAA8P,CAAC,EAAE,EAAE,CAAC,EAAe,GAAwB,EAAA,EAAa,CAAC,SAAsB,EAAE,IAAI,CAAC,SAAS,+BAA+B,EAAE,EAAe,GAAwB,EAAA,EAAa,CAAC,SAAsB,EAAE,IAAI,CAAC,SAAS,mUAAmU,EAAE,EAAe,GAAwB,EAAA,EAAa,CAAC,SAAS,CAAc,EAAE,IAAI,CAAC,SAAS,4BAA4B,EAAe,EAAE,IAAI,CAAC,SAAS,4BAA4B,EAAe,EAAE,IAAI,CAAC,SAAS,mCAAmC,EAAE,CAAC,EAAe,GAAwB,EAAA,EAAa,CAAC,SAAS,CAAc,EAAE,IAAI,CAAC,SAAS,+BAA+B,EAAe,EAAE,IAAI,CAAC,SAAS,mCAAmC,EAAe,EAAE,IAAI,CAAC,SAAS,kCAAkC,EAAE,CAAC,EAAe,GAAwB,EAAA,EAAa,CAAC,SAAS,CAAc,EAAE,IAAI,CAAC,SAAS,CAAc,EAAE,SAAS,CAAC,SAAS,+BAA+B,EAAE,yRAAyR,CAAC,EAAe,EAAE,IAAI,CAAC,SAAsB,EAAE,OAAO,CAAC,SAAS,CAAc,EAAE,SAAS,CAAC,SAAS,qCAAqC,EAAE,iPAAiP,CAAC,EAAE,EAAe,EAAE,IAAI,CAAC,SAAS,CAAc,EAAE,SAAS,CAAC,SAAS,2BAA2B,EAAE,0RAA0R,CAAC,EAAE,CAAC,EAAe,GAAwB,EAAA,EAAa,CAAC,SAAS,CAAc,EAAE,IAAI,CAAC,SAAS,CAAc,EAAE,SAAS,CAAC,SAAS,2BAA2B,EAAE,2RAA2R,CAAC,EAAe,EAAE,IAAI,CAAC,SAAS,CAAc,EAAE,SAAS,CAAC,SAAS,kBAAkB,EAAE,kQAAkQ,CAAC,EAAe,EAAE,IAAI,CAAC,SAAS,CAAc,EAAE,SAAS,CAAC,SAAS,yBAAyB,EAAE,gOAAgO,CAAC,EAAE,CAAC,EAAe,GAAwB,EAAA,EAAa,CAAC,SAAsB,EAAE,IAAI,CAAC,SAAS,mTAAmT,EAAE,EAAe,GAAwB,EAAA,EAAa,CAAC,SAAS,CAAc,EAAE,IAAI,CAAC,SAAS,0BAA0B,EAAe,EAAE,IAAI,CAAC,SAAS,gCAAgC,EAAe,EAAE,IAAI,CAAC,SAAS,uCAAuC,EAAE,CAAC,EAAe,GAAwB,EAAA,EAAa,CAAC,SAAS,CAAc,EAAE,IAAI,CAAC,SAAS,+BAA+B,EAAe,EAAE,IAAI,CAAC,SAAS,6BAA6B,EAAe,EAAE,IAAI,CAAC,SAAS,+BAA+B,EAAE,CAAC,EAAe,GAAwB,EAAA,EAAa,CAAC,SAAS,CAAc,EAAE,IAAI,CAAC,SAAS,CAAc,EAAE,SAAS,CAAC,SAAS,mCAAmC,EAAE,qPAAqP,CAAC,EAAe,EAAE,IAAI,CAAC,SAAS,CAAc,EAAE,SAAS,CAAC,SAAS,0BAA0B,EAAE,wPAAwP,CAAC,EAAe,EAAE,IAAI,CAAC,SAAS,CAAc,EAAE,SAAS,CAAC,SAAS,+BAA+B,EAAE,mPAAmP,CAAC,EAAE,CAAC,EAAe,GAAwB,EAAA,EAAa,CAAC,SAAS,CAAc,EAAE,IAAI,CAAC,SAAsB,EAAE,OAAO,CAAC,SAAS,CAAc,EAAE,SAAS,CAAC,SAAS,SAAS,EAAE,wMAAwM,CAAC,EAAE,EAAe,EAAE,IAAI,CAAC,SAAsB,EAAE,OAAO,CAAC,SAAS,CAAc,EAAE,SAAS,CAAC,SAAS,QAAQ,EAAE,0MAA0M,CAAC,EAAE,EAAe,EAAE,IAAI,CAAC,SAAsB,EAAE,OAAO,CAAC,SAAS,CAAc,EAAE,SAAS,CAAC,SAAS,kBAAkB,EAAE,4NAA4N,CAAC,EAAE,EAAe,EAAE,IAAI,CAAC,SAAS,CAAc,EAAE,SAAS,CAAC,SAAS,aAAa,EAAE,uMAAuM,CAAC,EAAe,EAAE,IAAI,CAAC,SAAS,CAAc,EAAE,SAAS,CAAC,SAAS,OAAO,EAAE,gMAAgM,CAAC,EAAE,CAAC,EAAe,GAAwB,EAAA,EAAa,CAAC,SAAsB,EAAE,IAAI,CAAC,SAAS,4BAA4B,EAAE,EAAe,GAAwB,EAAA,EAAa,CAAC,SAAsB,EAAE,IAAI,CAAC,SAAS,+SAA+S,EAAE,EAAe,GAAwB,EAAA,EAAa,CAAC,SAAS,CAAc,EAAE,IAAI,CAAC,SAAS,sBAAsB,EAAe,EAAE,IAAI,CAAC,SAAS,+BAA+B,EAAe,EAAE,IAAI,CAAC,SAAS,qCAAqC,EAAE,CAAC,EAAe,GAAwB,EAAA,EAAa,CAAC,SAAS,CAAc,EAAE,IAAI,CAAC,SAAS,2BAA2B,EAAe,EAAE,IAAI,CAAC,SAAS,mCAAmC,EAAe,EAAE,IAAI,CAAC,SAAS,iCAAiC,EAAE,CAAC,EAAe,GAAwB,EAAA,EAAa,CAAC,SAAS,CAAc,EAAE,IAAI,CAAC,SAAS,CAAc,EAAE,SAAS,CAAC,SAAS,iCAAiC,EAAE,6PAA6P,CAAC,EAAe,EAAE,IAAI,CAAC,SAAS,CAAc,EAAE,SAAS,CAAC,SAAS,2BAA2B,EAAE,iOAAiO,CAAC,EAAe,EAAE,IAAI,CAAC,SAAS,CAAc,EAAE,SAAS,CAAC,SAAS,oCAAoC,EAAE,6RAA6R,CAAC,EAAE,CAAC,EAAe,GAAwB,EAAA,EAAa,CAAC,SAAS,CAAc,EAAE,IAAI,CAAC,SAAS,CAAc,EAAE,SAAS,CAAC,SAAS,sBAAsB,EAAE,uQAAuQ,CAAC,EAAe,EAAE,IAAI,CAAC,SAAS,CAAc,EAAE,SAAS,CAAC,SAAS,+BAA+B,EAAE,2OAA2O,CAAC,EAAe,EAAE,IAAI,CAAC,SAAS,CAAc,EAAE,SAAS,CAAC,SAAS,0BAA0B,EAAE,uQAAuQ,CAAC,EAAE,CAAC,EAAe,GAAwB,EAAA,EAAa,CAAC,SAAsB,EAAE,IAAI,CAAC,SAAS,0WAA0W,EAAE,EAAe,GAAwB,EAAA,EAAa,CAAC,SAAS,CAAc,EAAE,IAAI,CAAC,SAAS,+BAA+B,EAAe,EAAE,IAAI,CAAC,SAAS,4BAA4B,EAAe,EAAE,IAAI,CAAC,SAAS,6BAA6B,EAAE,CAAC,EAAe,GAAwB,EAAA,EAAa,CAAC,SAAS,CAAc,EAAE,IAAI,CAAC,SAAS,+BAA+B,EAAe,EAAE,IAAI,CAAC,SAAS,+BAA+B,EAAe,EAAE,IAAI,CAAC,SAAS,0BAA0B,EAAE,CAAC,EAAe,GAAwB,EAAA,EAAa,CAAC,SAAS,CAAc,EAAE,IAAI,CAAC,SAAS,CAAc,EAAE,SAAS,CAAC,SAAS,yBAAyB,EAAE,qPAAqP,CAAC,EAAe,EAAE,IAAI,CAAC,SAAS,CAAc,EAAE,SAAS,CAAC,SAAS,6BAA6B,EAAE,wPAAwP,CAAC,EAAe,EAAE,IAAI,CAAC,SAAS,CAAc,EAAE,SAAS,CAAC,SAAS,+BAA+B,EAAE,qOAAqO,CAAC,EAAE,CAAC,EAAe,GAAwB,EAAA,EAAa,CAAC,SAAS,CAAc,EAAE,IAAI,CAAC,SAAsB,EAAE,OAAO,CAAC,SAAS,CAAc,EAAE,SAAS,CAAC,SAAS,mBAAmB,EAAE,8QAA8Q,CAAC,EAAE,EAAe,EAAE,IAAI,CAAC,SAAS,CAAc,EAAE,SAAS,CAAC,SAAS,wBAAwB,EAAE,uNAAuN,CAAC,EAAe,EAAE,IAAI,CAAC,SAAS,CAAc,EAAE,SAAS,CAAC,SAAS,oBAAoB,EAAE,yPAAyP,CAAC,EAAE,CAAC,EAAe,GAAwB,EAAA,EAAa,CAAC,SAAsB,EAAE,IAAI,CAAC,SAAS,wSAAwS,EAAE,EAAe,GAAwB,EAAA,EAAa,CAAC,SAAS,CAAc,EAAE,IAAI,CAAC,SAAS,iCAAiC,EAAe,EAAE,IAAI,CAAC,SAAS,4BAA4B,EAAe,EAAE,IAAI,CAAC,SAAS,yCAAyC,EAAE,CAAC,EAAe,GAAwB,EAAA,EAAa,CAAC,SAAS,CAAc,EAAE,IAAI,CAAC,SAAS,+BAA+B,EAAe,EAAE,IAAI,CAAC,SAAS,mCAAmC,EAAe,EAAE,IAAI,CAAC,SAAS,4BAA4B,EAAE,CAAC,EAAe,GAAwB,EAAA,EAAa,CAAC,SAAS,CAAc,EAAE,IAAI,CAAC,SAAsB,EAAE,OAAO,CAAC,SAAS,CAAc,EAAE,SAAS,CAAC,SAAS,yBAAyB,EAAE,yRAAyR,CAAC,EAAE,EAAe,EAAE,IAAI,CAAC,SAAS,CAAc,EAAE,SAAS,CAAC,SAAS,2BAA2B,EAAE,mQAAmQ,CAAC,EAAe,EAAE,IAAI,CAAC,SAAS,CAAc,EAAE,SAAS,CAAC,SAAS,iCAAiC,EAAE,6RAA6R,CAAC,EAAE,CAAC,EAAe,GAAwB,EAAA,EAAa,CAAC,SAAS,CAAc,EAAE,IAAI,CAAC,SAAsB,EAAE,OAAO,CAAC,SAAS,CAAc,EAAE,SAAS,CAAC,SAAS,mBAAmB,EAAE,iOAAiO,CAAC,EAAE,EAAe,EAAE,IAAI,CAAC,SAAS,CAAc,EAAE,SAAS,CAAC,SAAS,0BAA0B,EAAe,EAAE,OAAO,CAAC,SAAS,kNAAkN,EAAE,CAAC,EAAe,EAAE,IAAI,CAAC,SAAS,CAAc,EAAE,SAAS,CAAC,SAAS,QAAQ,EAAE,qOAAqO,CAAC,EAAE,CAAC,EAAe,GAAwB,EAAA,EAAa,CAAC,SAAsB,EAAE,IAAI,CAAC,SAAS,6BAA6B,EAAE,EAAe,GAAwB,EAAA,EAAa,CAAC,SAAsB,EAAE,IAAI,CAAC,SAAS,8VAA8V,EAAE,EAAe,GAAwB,EAAA,EAAa,CAAC,SAAS,CAAc,EAAE,IAAI,CAAC,SAAS,sCAAsC,EAAe,EAAE,IAAI,CAAC,SAAS,8BAA8B,EAAe,EAAE,IAAI,CAAC,SAAS,wCAAwC,EAAE,CAAC,EAAe,GAAwB,EAAA,EAAa,CAAC,SAAS,CAAc,EAAE,IAAI,CAAC,SAAS,+BAA+B,EAAe,EAAE,IAAI,CAAC,SAAS,+BAA+B,EAAe,EAAE,IAAI,CAAC,SAAS,4BAA4B,EAAE,CAAC,EAAe,GAAwB,EAAA,EAAa,CAAC,SAAS,CAAc,EAAE,IAAI,CAAC,SAAS,CAAc,EAAE,SAAS,CAAC,SAAS,qCAAqC,EAAE,qOAAqO,CAAC,EAAe,EAAE,IAAI,CAAC,SAAS,CAAc,EAAE,SAAS,CAAC,SAAS,gCAAgC,EAAE,iQAAiQ,CAAC,EAAe,EAAE,IAAI,CAAC,SAAS,CAAc,EAAE,SAAS,CAAC,SAAS,+BAA+B,EAAE,mPAAmP,CAAC,EAAE,CAAC,EAAe,GAAwB,EAAA,EAAa,CAAC,SAAS,CAAc,EAAE,IAAI,CAAC,SAAsB,EAAE,OAAO,CAAC,SAAS,CAAc,EAAE,SAAS,CAAC,SAAS,oBAAoB,EAAE,mPAAmP,CAAC,EAAE,EAAe,EAAE,IAAI,CAAC,SAAsB,EAAE,OAAO,CAAC,SAAS,CAAc,EAAE,SAAS,CAAC,SAAS,kBAAkB,EAAE,sOAAsO,CAAC,EAAE,EAAe,EAAE,IAAI,CAAC,SAAS,CAAc,EAAE,SAAS,CAAC,SAAS,kBAAkB,EAAE,kPAAkP,CAAC,EAAE,CAAC,EAAe,GAAwB,EAAA,EAAa,CAAC,SAAsB,EAAE,IAAI,CAAC,SAAS,sVAAsV,EAAE,EAAe,GAAwB,EAAA,EAAa,CAAC,SAAS,CAAc,EAAE,IAAI,CAAC,SAAS,oCAAoC,EAAe,EAAE,IAAI,CAAC,SAAS,oCAAoC,EAAe,EAAE,IAAI,CAAC,SAAS,4CAA4C,EAAE,CAAC,EAAe,GAAwB,EAAA,EAAa,CAAC,SAAS,CAAc,EAAE,IAAI,CAAC,SAAS,+BAA+B,EAAe,EAAE,IAAI,CAAC,SAAS,+BAA+B,EAAe,EAAE,IAAI,CAAC,SAAS,mCAAmC,EAAE,CAAC,EAAe,GAAwB,EAAA,EAAa,CAAC,SAAS,CAAc,EAAE,IAAI,CAAC,SAAS,CAAc,EAAE,SAAS,CAAC,SAAS,mCAAmC,EAAE,mQAAmQ,CAAC,EAAe,EAAE,IAAI,CAAC,SAAS,CAAc,EAAE,SAAS,CAAC,SAAS,6BAA6B,EAAE,wRAAwR,CAAC,EAAe,EAAE,IAAI,CAAC,SAAsB,EAAE,OAAO,CAAC,SAAS,CAAc,EAAE,SAAS,CAAC,SAAS,yBAAyB,EAAE,0SAA0S,CAAC,EAAE,EAAE,CAAC,EAAe,GAAwB,EAAA,EAAa,CAAC,SAAS,CAAc,EAAE,IAAI,CAAC,SAAS,CAAc,EAAE,SAAS,CAAC,SAAS,uBAAuB,EAAE,mOAAmO,CAAC,EAAe,EAAE,IAAI,CAAC,SAAsB,EAAE,OAAO,CAAC,SAAS,CAAc,EAAE,SAAS,CAAC,SAAS,mCAAmC,EAAE,2MAA2M,CAAC,EAAE,EAAe,EAAE,IAAI,CAAC,SAAS,CAAc,EAAE,SAAS,CAAC,SAAS,qBAAqB,EAAE,gOAAgO,CAAC,EAAe,EAAE,IAAI,CAAC,SAAsB,EAAE,OAAO,CAAC,SAAS,CAAc,EAAE,SAAS,CAAC,SAAS,2BAA2B,EAAE,gNAAgN,CAAC,EAAE,EAAE,CAAC,EAAe,GAAwB,EAAA,EAAa,CAAC,SAAsB,EAAE,IAAI,CAAC,SAAS,+BAA+B,EAAE,EAAe,GAAwB,EAAA,EAAa,CAAC,SAAsB,EAAE,IAAI,CAAC,SAAS,2UAA2U,EAAE,EAAe,GAAwB,EAAA,EAAa,CAAC,SAAS,CAAc,EAAE,IAAI,CAAC,SAAS,oCAAoC,EAAe,EAAE,IAAI,CAAC,SAAS,oCAAoC,EAAe,EAAE,IAAI,CAAC,SAAS,8BAA8B,EAAE,CAAC,EAAe,GAAwB,EAAA,EAAa,CAAC,SAAS,CAAc,EAAE,IAAI,CAAC,SAAS,2BAA2B,EAAe,EAAE,IAAI,CAAC,SAAS,+BAA+B,EAAe,EAAE,IAAI,CAAC,SAAS,uBAAuB,EAAE,CAAC,EAAe,GAAwB,EAAA,EAAa,CAAC,SAAS,CAAc,EAAE,IAAI,CAAC,SAAS,CAAc,EAAE,SAAS,CAAC,SAAS,6BAA6B,EAAE,oQAAoQ,CAAC,EAAe,EAAE,IAAI,CAAC,SAAS,CAAc,EAAE,SAAS,CAAC,SAAS,iCAAiC,EAAE,wPAAwP,CAAC,EAAe,EAAE,IAAI,CAAC,SAAS,CAAc,EAAE,SAAS,CAAC,SAAS,mCAAmC,EAAE,sQAAsQ,CAAC,EAAE,CAAC,EAAe,GAAwB,EAAA,EAAa,CAAC,SAAS,CAAc,EAAE,IAAI,CAAC,SAAsB,EAAE,OAAO,CAAC,SAAS,CAAc,EAAE,SAAS,CAAC,SAAS,2BAA2B,EAAE,2MAA2M,CAAC,EAAE,EAAe,EAAE,IAAI,CAAC,SAAsB,EAAE,OAAO,CAAC,SAAS,CAAc,EAAE,SAAS,CAAC,SAAS,wBAAwB,EAAE,iNAAiN,CAAC,EAAE,EAAe,EAAE,IAAI,CAAC,SAAS,CAAc,EAAE,SAAS,CAAC,SAAS,kBAAkB,EAAE,6QAA6Q,CAAC,EAAE,CAAC,EAAe,GAAwB,EAAA,EAAa,CAAC,SAAsB,EAAE,IAAI,CAAC,SAAS,yBAAyB,EAAE,EAAe,GAAwB,EAAA,EAAa,CAAC,SAAsB,EAAE,IAAI,CAAC,SAAS,6VAA6V,EAAE,EAAe,GAAwB,EAAA,EAAa,CAAC,SAAS,CAAc,EAAE,IAAI,CAAC,SAAS,+BAA+B,EAAe,EAAE,IAAI,CAAC,SAAS,8BAA8B,EAAe,EAAE,IAAI,CAAC,SAAS,mCAAmC,EAAE,CAAC,EAAe,GAAwB,EAAA,EAAa,CAAC,SAAS,CAAc,EAAE,IAAI,CAAC,SAAS,+BAA+B,EAAe,EAAE,IAAI,CAAC,SAAS,iCAAiC,EAAe,EAAE,IAAI,CAAC,SAAS,8BAA8B,EAAE,CAAC,EAAe,GAAyB,EAAA,EAAa,CAAC,SAAS,CAAc,EAAE,IAAI,CAAC,SAAS,CAAc,EAAE,SAAS,CAAC,SAAS,6BAA6B,EAAE,4QAA4Q,CAAC,EAAe,EAAE,IAAI,CAAC,SAAS,CAAc,EAAE,SAAS,CAAC,SAAS,oBAAoB,EAAE,oQAAoQ,CAAC,EAAe,EAAE,IAAI,CAAC,SAAS,CAAc,EAAE,SAAS,CAAC,SAAS,qBAAqB,EAAE,qPAAqP,CAAC,EAAE,CAAC,EAAe,GAAyB,EAAA,EAAa,CAAC,SAAsB,EAAE,IAAI,CAAC,SAAS,CAAc,EAAE,SAAS,CAAC,SAAS,qBAAqB,EAAE,+QAA+Q,CAAC,EAAE,EAAe,GAAyB,EAAA,EAAa,CAAC,SAAsB,EAAE,IAAI,CAAC,SAAS,qBAAqB,EAAE,EAAe,GAAyB,EAAA,EAAa,CAAC,SAAsB,EAAE,IAAI,CAAC,SAAS,gSAAgS,EAAE,EAAe,GAAyB,EAAA,EAAa,CAAC,SAAS,CAAc,EAAE,IAAI,CAAC,SAAS,mCAAmC,EAAe,EAAE,IAAI,CAAC,SAAS,oCAAoC,EAAe,EAAE,IAAI,CAAC,SAAS,sCAAsC,EAAE,CAAC,EAAe,GAAyB,EAAA,EAAa,CAAC,SAAS,CAAc,EAAE,IAAI,CAAC,SAAS,8BAA8B,EAAe,EAAE,IAAI,CAAC,SAAS,qCAAqC,EAAe,EAAE,IAAI,CAAC,SAAS,8BAA8B,EAAE,CAAC,EAAe,GAAyB,EAAA,EAAa,CAAC,SAAS,CAAc,EAAE,IAAI,CAAC,SAAsB,EAAE,OAAO,CAAC,SAAS,CAAc,EAAE,SAAS,CAAC,SAAS,gCAAgC,EAAE,wNAAwN,CAAC,EAAE,EAAe,EAAE,IAAI,CAAC,SAAS,CAAc,EAAE,SAAS,CAAC,SAAS,iCAAiC,EAAE,sOAAsO,CAAC,EAAe,EAAE,IAAI,CAAC,SAAS,CAAc,EAAE,SAAS,CAAC,SAAS,mCAAmC,EAAE,8PAA8P,CAAC,EAAE,CAAC,EAAe,GAAyB,EAAA,EAAa,CAAC,SAAS,CAAc,EAAE,IAAI,CAAC,SAAS,CAAc,EAAE,SAAS,CAAC,SAAS,mCAAmC,EAAE,+KAA+K,CAAC,EAAe,EAAE,IAAI,CAAC,SAAS,CAAc,EAAE,SAAS,CAAC,SAAS,kCAAkC,EAAE,4KAA4K,CAAC,EAAe,EAAE,IAAI,CAAC,SAAS,CAAc,EAAE,SAAS,CAAC,SAAS,QAAQ,EAAE,sLAAsL,CAAC,EAAE,CAAC,EAAe,GAAyB,EAAA,EAAa,CAAC,SAAsB,EAAE,IAAI,CAAC,SAAS,wBAAwB,EAAE,EAAe,GAAyB,EAAA,EAAa,CAAC,SAAsB,EAAE,IAAI,CAAC,SAAS,8VAA8V,EAAE,EAAe,GAAyB,EAAA,EAAa,CAAC,SAAS,CAAc,EAAE,IAAI,CAAC,SAAS,2BAA2B,EAAe,EAAE,IAAI,CAAC,SAAS,6BAA6B,EAAe,EAAE,IAAI,CAAC,SAAS,8BAA8B,EAAE,CAAC,EAAe,GAAyB,EAAA,EAAa,CAAC,SAAS,CAAc,EAAE,IAAI,CAAC,SAAS,8BAA8B,EAAe,EAAE,IAAI,CAAC,SAAS,2BAA2B,EAAe,EAAE,IAAI,CAAC,SAAS,4BAA4B,EAAE,CAAC,EAAe,GAAyB,EAAA,EAAa,CAAC,SAAsB,EAAE,IAAI,CAAC,SAAS,m0BAAm0B,EAAE,EAAe,GAAyB,EAAA,EAAa,CAAC,SAAS,CAAc,EAAE,IAAI,CAAC,SAAsB,EAAE,OAAO,CAAC,SAAS,CAAc,EAAE,SAAS,CAAC,SAAS,uBAAuB,EAAE,oOAAoO,CAAC,EAAE,EAAe,EAAE,IAAI,CAAC,SAAsB,EAAE,OAAO,CAAC,SAAS,CAAc,EAAE,SAAS,CAAC,SAAS,iBAAiB,EAAE,wNAAwN,CAAC,EAAE,EAAe,EAAE,IAAI,CAAC,SAAsB,EAAE,OAAO,CAAC,SAAS,CAAc,EAAE,SAAS,CAAC,SAAS,OAAO,EAAE,8OAA8O,CAAC,EAAE,EAAe,EAAE,IAAI,CAAC,SAAS,CAAc,EAAE,SAAS,CAAC,SAAS,kBAAkB,EAAE,+OAA+O,CAAC,EAAE,CAAC,EAAe,GAAyB,EAAA,EAAa,CAAC,SAAsB,EAAE,IAAI,CAAC,SAAS,6BAA6B,EAAE,EAAe,GAAyB,EAAA,EAAa,CAAC,SAAsB,EAAE,IAAI,CAAC,SAAS,gTAAgT,EAAE,EAAe,GAAyB,EAAA,EAAa,CAAC,SAAS,CAAc,EAAE,IAAI,CAAC,SAAS,gCAAgC,EAAe,EAAE,IAAI,CAAC,SAAS,8BAA8B,EAAe,EAAE,IAAI,CAAC,SAAS,uCAAuC,EAAE,CAAC,EAAe,GAAyB,EAAA,EAAa,CAAC,SAAS,CAAc,EAAE,IAAI,CAAC,SAAS,+BAA+B,EAAe,EAAE,IAAI,CAAC,SAAS,uCAAuC,EAAe,EAAE,IAAI,CAAC,SAAS,8BAA8B,EAAE,CAAC,EAAe,GAAyB,EAAA,EAAa,CAAC,SAAS,CAAc,EAAE,IAAI,CAAC,SAAsB,EAAE,OAAO,CAAC,SAAS,CAAc,EAAE,SAAS,CAAC,SAAS,qCAAqC,EAAE,sRAAsR,CAAC,EAAE,EAAe,EAAE,IAAI,CAAC,SAAS,CAAc,EAAE,SAAS,CAAC,SAAS,kCAAkC,EAAE,oQAAoQ,CAAC,EAAe,EAAE,IAAI,CAAC,SAAS,CAAc,EAAE,SAAS,CAAC,SAAS,6BAA6B,EAAE,uSAAuS,CAAC,EAAE,CAAC,EAAe,GAAyB,EAAA,EAAa,CAAC,SAAS,CAAc,EAAE,IAAI,CAAC,SAAsB,EAAE,OAAO,CAAC,SAAS,CAAc,EAAE,SAAS,CAAC,SAAS,QAAQ,EAAE,mOAAmO,CAAC,EAAE,EAAe,EAAE,IAAI,CAAC,SAAsB,EAAE,OAAO,CAAC,SAAS,CAAc,EAAE,SAAS,CAAC,SAAS,uBAAuB,EAAE,qRAAqR,CAAC,EAAE,EAAE,CAAC,EAAe,GAAyB,EAAA,EAAa,CAAC,SAAsB,EAAE,IAAI,CAAC,SAAS,gCAAgC,EAAE,EAAe,GAAyB,EAAA,EAAa,CAAC,SAAsB,EAAE,IAAI,CAAC,SAAS,wTAAwT,EAAE,EAAe,GAAyB,EAAA,EAAa,CAAC,SAAS,CAAc,EAAE,IAAI,CAAC,SAAS,iCAAiC,EAAe,EAAE,IAAI,CAAC,SAAS,8BAA8B,EAAe,EAAE,IAAI,CAAC,SAAS,qCAAqC,EAAE,CAAC,EAAe,GAAyB,EAAA,EAAa,CAAC,SAAS,CAAc,EAAE,IAAI,CAAC,SAAS,sCAAsC,EAAe,EAAE,IAAI,CAAC,SAAS,+BAA+B,EAAe,EAAE,IAAI,CAAC,SAAS,8BAA8B,EAAE,CAAC,EAAe,GAAyB,EAAA,EAAa,CAAC,SAAS,CAAc,EAAE,IAAI,CAAC,SAAS,CAAc,EAAE,SAAS,CAAC,SAAS,0CAA0C,EAAE,gPAAgP,CAAC,EAAe,EAAE,IAAI,CAAC,SAAsB,EAAE,OAAO,CAAC,SAAS,CAAc,EAAE,SAAS,CAAC,SAAS,6BAA6B,EAAE,8NAA8N,CAAC,EAAE,EAAe,EAAE,IAAI,CAAC,SAAsB,EAAE,OAAO,CAAC,SAAS,CAAc,EAAE,SAAS,CAAC,SAAS,yBAAyB,EAAE,kOAAkO,CAAC,EAAE,EAAE,CAAC,EAAe,GAAyB,EAAA,EAAa,CAAC,SAAS,CAAc,EAAE,IAAI,CAAC,SAAsB,EAAE,OAAO,CAAC,SAAS,CAAc,EAAE,SAAS,CAAC,SAAS,gBAAgB,EAAE,6RAA6R,CAAC,EAAE,EAAe,EAAE,IAAI,CAAC,SAAS,CAAc,EAAE,SAAS,CAAC,SAAS,qBAAqB,EAAE,qRAAqR,CAAC,EAAe,EAAE,IAAI,CAAC,SAAS,CAAc,EAAE,SAAS,CAAC,SAAS,SAAS,EAAE,6PAA6P,CAAC,EAAE,CAAC,EAAe,GAAyB,EAAA,EAAa,CAAC,SAAsB,EAAE,IAAI,CAAC,SAAS,oCAAoC,EAAE,EAAe,GAAyB,EAAA,EAAa,CAAC,SAAsB,EAAE,IAAI,CAAC,SAAS,kVAAkV,EAAE,EAAe,GAAyB,EAAA,EAAa,CAAC,SAAS,CAAc,EAAE,IAAI,CAAC,SAAS,iCAAiC,EAAe,EAAE,IAAI,CAAC,SAAS,kCAAkC,EAAe,EAAE,IAAI,CAAC,SAAS,sCAAsC,EAAE,CAAC,EAAe,GAAyB,EAAA,EAAa,CAAC,SAAS,CAAc,EAAE,IAAI,CAAC,SAAS,uCAAuC,EAAe,EAAE,IAAI,CAAC,SAAS,yCAAyC,EAAe,EAAE,IAAI,CAAC,SAAS,qCAAqC,EAAE,CAAC,EAAe,GAAyB,EAAA,EAAa,CAAC,SAAS,CAAc,EAAE,IAAI,CAAC,SAAS,CAAc,EAAE,SAAS,CAAC,SAAS,0CAA0C,EAAE,sSAAsS,CAAC,EAAe,EAAE,IAAI,CAAC,SAAS,CAAc,EAAE,SAAS,CAAC,SAAS,+BAA+B,EAAE,2SAA2S,CAAC,EAAe,EAAE,IAAI,CAAC,SAAS,CAAc,EAAE,SAAS,CAAC,SAAS,8BAA8B,EAAE,mRAAmR,CAAC,EAAE,CAAC,EAAe,GAAyB,EAAA,EAAa,CAAC,SAAS,CAAc,EAAE,IAAI,CAAC,SAAsB,EAAE,OAAO,CAAC,SAAS,CAAc,EAAE,SAAS,CAAC,SAAS,OAAO,EAAE,wOAAwO,CAAC,EAAE,EAAe,EAAE,IAAI,CAAC,SAAsB,EAAE,OAAO,CAAC,SAAS,CAAc,EAAE,SAAS,CAAC,SAAS,yBAAyB,EAAE,2PAA2P,CAAC,EAAE,EAAe,EAAE,IAAI,CAAC,SAAS,CAAc,EAAE,SAAS,CAAC,SAAS,wBAAwB,EAAE,qPAAqP,CAAC,EAAE,CAAC,EAAe,GAAyB,EAAA,EAAa,CAAC,SAAsB,EAAE,IAAI,CAAC,SAAS,2SAA2S,EAAE,EAAe,GAAyB,EAAA,EAAa,CAAC,SAAS,CAAc,EAAE,IAAI,CAAC,SAAS,+BAA+B,EAAe,EAAE,IAAI,CAAC,SAAS,oCAAoC,EAAe,EAAE,IAAI,CAAC,SAAS,0BAA0B,EAAE,CAAC,EAAe,GAAyB,EAAA,EAAa,CAAC,SAAS,CAAc,EAAE,IAAI,CAAC,SAAS,kCAAkC,EAAe,EAAE,IAAI,CAAC,SAAS,4BAA4B,EAAe,EAAE,IAAI,CAAC,SAAS,yBAAyB,EAAE,CAAC,EAAe,GAAyB,EAAA,EAAa,CAAC,SAAS,CAAc,EAAE,IAAI,CAAC,SAAsB,EAAE,OAAO,CAAC,SAAS,CAAc,EAAE,SAAS,CAAC,SAAS,4BAA4B,EAAE,uOAAuO,CAAC,EAAE,EAAe,EAAE,IAAI,CAAC,SAAS,CAAc,EAAE,SAAS,CAAC,SAAS,mBAAmB,EAAE,4OAA4O,CAAC,EAAe,EAAE,IAAI,CAAC,SAAS,CAAc,EAAE,SAAS,CAAC,SAAS,wBAAwB,EAAE,qOAAqO,CAAC,EAAE,CAAC,EAAe,GAAyB,EAAA,EAAa,CAAC,SAAS,CAAc,EAAE,IAAI,CAAC,SAAS,CAAc,EAAE,SAAS,CAAC,SAAS,qBAAqB,EAAE,yNAAyN,CAAC,EAAe,EAAE,IAAI,CAAC,SAAsB,EAAE,OAAO,CAAC,SAAS,CAAc,EAAE,SAAS,CAAC,SAAS,qBAAqB,EAAE,sOAAsO,CAAC,EAAE,EAAE,CAAC,EAAe,GAAyB,EAAA,EAAa,CAAC,SAAsB,EAAE,IAAI,CAAC,SAAS,4BAA4B,EAAE,EAAe,GAAyB,EAAA,EAAa,CAAC,SAAsB,EAAE,IAAI,CAAC,SAAS,qUAAqU,EAAE,EAAe,GAAyB,EAAA,EAAa,CAAC,SAAS,CAAc,EAAE,IAAI,CAAC,SAAS,kCAAkC,EAAe,EAAE,IAAI,CAAC,SAAS,4BAA4B,EAAe,EAAE,IAAI,CAAC,SAAS,mCAAmC,EAAE,CAAC,EAAe,GAAyB,EAAA,EAAa,CAAC,SAAS,CAAc,EAAE,IAAI,CAAC,SAAS,mCAAmC,EAAe,EAAE,IAAI,CAAC,SAAS,gCAAgC,EAAe,EAAE,IAAI,CAAC,SAAS,8BAA8B,EAAE,CAAC,EAAe,GAAyB,EAAA,EAAa,CAAC,SAAS,CAAc,EAAE,IAAI,CAAC,SAAS,CAAc,EAAE,SAAS,CAAC,SAAS,wCAAwC,EAAE,6RAA6R,CAAC,EAAe,EAAE,IAAI,CAAC,SAAS,CAAc,EAAE,SAAS,CAAC,SAAS,+BAA+B,EAAE,qQAAqQ,CAAC,EAAe,EAAE,IAAI,CAAC,SAAS,CAAc,EAAE,SAAS,CAAC,SAAS,oCAAoC,EAAE,6PAA6P,CAAC,EAAE,CAAC,EAAe,EAAyB,EAAA,EAAa,CAAC,SAAS,CAAc,EAAE,IAAI,CAAC,SAAS,CAAc,EAAE,SAAS,CAAC,SAAS,UAAU,EAAE,mUAAmU,CAAC,EAAe,EAAE,IAAI,CAAC,SAAS,CAAc,EAAE,SAAS,CAAC,SAAS,SAAS,EAAE,+RAA+R,CAAC,EAAe,EAAE,IAAI,CAAC,SAAS,CAAc,EAAE,SAAS,CAAC,SAAS,gBAAgB,EAAE,sTAAsT,CAAC,EAAe,EAAE,IAAI,CAAC,SAAS,CAAc,EAAE,SAAS,CAAC,SAAS,QAAQ,EAAE,gSAAgS,CAAC,EAAE,CAAC,EAAe,GAAyB,EAAA,EAAa,CAAC,SAAsB,EAAE,IAAI,CAAC,SAAS,uBAAuB,EAAE,EAAe,GAAyB,EAAA,EAAa,CAAC,SAAsB,EAAE,IAAI,CAAC,SAAS,oRAAoR,EAAE,EAAe,GAAyB,EAAA,EAAa,CAAC,SAAS,CAAc,EAAE,IAAI,CAAC,SAAS,mCAAmC,EAAe,EAAE,IAAI,CAAC,SAAS,8BAA8B,EAAe,EAAE,IAAI,CAAC,SAAS,6BAA6B,EAAE,CAAC,EAAe,GAAyB,EAAA,EAAa,CAAC,SAAS,CAAc,EAAE,IAAI,CAAC,SAAS,+BAA+B,EAAe,EAAE,IAAI,CAAC,SAAS,gCAAgC,EAAe,EAAE,IAAI,CAAC,SAAS,yBAAyB,EAAE,CAAC,EAAe,GAAyB,EAAA,EAAa,CAAC,SAAS,CAAc,EAAE,IAAI,CAAC,SAAS,CAAc,EAAE,SAAS,CAAC,SAAS,0BAA0B,EAAE,wNAAwN,CAAC,EAAe,EAAE,IAAI,CAAC,SAAS,CAAc,EAAE,SAAS,CAAC,SAAS,kCAAkC,EAAE,wMAAwM,CAAC,EAAe,EAAE,IAAI,CAAC,SAAS,CAAc,EAAE,SAAS,CAAC,SAAS,6BAA6B,EAAE,yMAAyM,CAAC,EAAE,CAAC,EAAe,GAAyB,EAAA,EAAa,CAAC,SAAS,CAAc,EAAE,IAAI,CAAC,SAAS,CAAc,EAAE,SAAS,CAAC,SAAS,kBAAkB,EAAE,0NAA0N,CAAC,EAAe,EAAE,IAAI,CAAC,SAAS,CAAc,EAAE,SAAS,CAAC,SAAS,0BAA0B,EAAE,kRAAkR,CAAC,EAAE,CAAC,EAAe,GAAyB,EAAA,EAAa,CAAC,SAAsB,EAAE,IAAI,CAAC,SAAS,sVAAsV,EAAE,EAAe,GAAyB,EAAA,EAAa,CAAC,SAAS,CAAc,EAAE,IAAI,CAAC,SAAS,+BAA+B,EAAe,EAAE,IAAI,CAAC,SAAS,uCAAuC,EAAe,EAAE,IAAI,CAAC,SAAS,qCAAqC,EAAE,CAAC,EAAe,GAAyB,EAAA,EAAa,CAAC,SAAS,CAAc,EAAE,IAAI,CAAC,SAAS,oCAAoC,EAAe,EAAE,IAAI,CAAC,SAAS,iCAAiC,EAAe,EAAE,IAAI,CAAC,SAAS,sCAAsC,EAAE,CAAC,EAAe,GAAyB,EAAA,EAAa,CAAC,SAAS,CAAc,EAAE,IAAI,CAAC,SAAS,CAAc,EAAE,SAAS,CAAC,SAAS,iCAAiC,EAAE,4TAA4T,CAAC,EAAe,EAAE,IAAI,CAAC,SAAS,CAAc,EAAE,SAAS,CAAC,SAAS,mCAAmC,EAAE,uSAAuS,CAAC,EAAe,EAAE,IAAI,CAAC,SAAS,CAAc,EAAE,SAAS,CAAC,SAAS,gCAAgC,EAAE,ySAAyS,CAAC,EAAE,CAAC,EAAe,GAAyB,EAAA,EAAa,CAAC,SAAS,CAAc,EAAE,IAAI,CAAC,SAAS,CAAc,EAAE,SAAS,CAAC,SAAS,yBAAyB,EAAE,6RAA6R,CAAC,EAAe,EAAE,IAAI,CAAC,SAAS,CAAc,EAAE,SAAS,CAAC,SAAS,mCAAmC,EAAE,8PAA8P,CAAC,EAAe,EAAE,IAAI,CAAC,SAAS,CAAc,EAAE,SAAS,CAAC,SAAS,gBAAgB,EAAE,uOAAuO,CAAC,EAAE,CAAC,EAAe,GAAyB,EAAA,EAAa,CAAC,SAAsB,EAAE,IAAI,CAAC,SAAS,6SAA6S,EAAE,EAAe,GAAyB,EAAA,EAAa,CAAC,SAAS,CAAc,EAAE,IAAI,CAAC,SAAS,uCAAuC,EAAe,EAAE,IAAI,CAAC,SAAS,yCAAyC,EAAe,EAAE,IAAI,CAAC,SAAS,+BAA+B,EAAE,CAAC,EAAe,GAAyB,EAAA,EAAa,CAAC,SAAS,CAAc,EAAE,IAAI,CAAC,SAAS,qCAAqC,EAAe,EAAE,IAAI,CAAC,SAAS,gCAAgC,EAAe,EAAE,IAAI,CAAC,SAAS,8BAA8B,EAAE,CAAC,EAAe,GAAyB,EAAA,EAAa,CAAC,SAAS,CAAc,EAAE,IAAI,CAAC,SAAS,CAAc,EAAE,SAAS,CAAC,SAAS,8BAA8B,EAAE,4QAA4Q,CAAC,EAAe,EAAE,IAAI,CAAC,SAAS,CAAc,EAAE,SAAS,CAAC,SAAS,8BAA8B,EAAE,gRAAgR,CAAC,EAAe,EAAE,IAAI,CAAC,SAAS,CAAc,EAAE,SAAS,CAAC,SAAS,iCAAiC,EAAE,mSAAmS,CAAC,EAAe,EAAE,IAAI,CAAC,SAAS,CAAc,EAAE,SAAS,CAAC,SAAS,wBAAwB,EAAE,0QAA0Q,CAAC,EAAE,CAAC,EAAe,GAAyB,EAAA,EAAa,CAAC,SAAS,CAAc,EAAE,IAAI,CAAC,SAAS,CAAc,EAAE,SAAS,CAAC,SAAS,WAAW,EAAE,+PAA+P,CAAC,EAAe,EAAE,IAAI,CAAC,SAAS,CAAc,EAAE,SAAS,CAAC,SAAS,UAAU,EAAE,wPAAwP,CAAC,EAAe,EAAE,IAAI,CAAC,SAAS,CAAc,EAAE,SAAS,CAAC,SAAS,aAAa,EAAE,2QAA2Q,CAAC,EAAe,EAAE,IAAI,CAAC,SAAS,CAAc,EAAE,SAAS,CAAC,SAAS,QAAQ,EAAE,yQAAyQ,CAAC,EAAe,EAAE,IAAI,CAAC,SAAS,CAAc,EAAE,SAAS,CAAC,SAAS,oBAAoB,EAAE,wBAAqC,EAAE,SAAS,CAAC,SAAS,aAAa,EAAE,wOAAwO,CAAC,EAAE,CAAC,EAAe,GAAyB,EAAA,EAAa,CAAC,SAAsB,EAAE,IAAI,CAAC,SAAS,6OAA6O,EAAE,EAAe,GAAyB,EAAA,EAAa,CAAC,SAAS,CAAc,EAAE,IAAI,CAAC,SAAS,6BAA6B,EAAe,EAAE,IAAI,CAAC,SAAS,2BAA2B,EAAe,EAAE,IAAI,CAAC,SAAS,iCAAiC,EAAE,CAAC,EAAe,GAAyB,EAAA,EAAa,CAAC,SAAS,CAAc,EAAE,IAAI,CAAC,SAAS,+BAA+B,EAAe,EAAE,IAAI,CAAC,SAAS,0BAA0B,EAAe,EAAE,IAAI,CAAC,SAAS,wBAAwB,EAAE,CAAC,EAAe,GAAyB,EAAA,EAAa,CAAC,SAAS,CAAc,EAAE,IAAI,CAAC,SAAS,CAAc,EAAE,SAAS,CAAC,SAAS,yCAAyC,EAAE,8OAA8O,CAAC,EAAe,EAAE,IAAI,CAAC,SAAS,CAAc,EAAE,SAAS,CAAC,SAAS,yBAAyB,EAAE,4RAA4R,CAAC,EAAe,EAAE,IAAI,CAAC,SAAS,CAAc,EAAE,SAAS,CAAC,SAAS,gCAAgC,EAAE,+PAA+P,CAAC,EAAe,EAAE,IAAI,CAAC,SAAS,CAAc,EAAE,SAAS,CAAC,SAAS,6BAA6B,EAAE,4PAA4P,CAAC,EAAe,EAAE,IAAI,CAAC,SAAS,CAAc,EAAE,SAAS,CAAC,SAAS,0BAA0B,EAAE,sOAAsO,CAAC,EAAe,EAAE,IAAI,CAAC,SAAS,CAAc,EAAE,SAAS,CAAC,SAAS,wCAAwC,EAAE,uOAAuO,CAAC,EAAe,EAAE,IAAI,CAAC,SAAS,CAAc,EAAE,SAAS,CAAC,SAAS,oCAAoC,EAAE,6PAA6P,CAAC,EAAE,CAAC,EAAe,GAAyB,EAAA,EAAa,CAAC,SAAS,CAAc,EAAE,IAAI,CAAC,SAAS,CAAc,EAAE,SAAS,CAAC,SAAS,oBAAoB,EAAE,iYAAiY,CAAC,EAAe,EAAE,IAAI,CAAC,SAAS,CAAc,EAAE,SAAS,CAAC,SAAS,aAAa,EAAE,6VAA6V,CAAC,EAAE,CAAC,EAAe,GAAyB,EAAA,EAAa,CAAC,SAAsB,EAAE,IAAI,CAAC,SAAS,6RAA6R,EAAE,EAAe,GAAyB,EAAA,EAAa,CAAC,SAAS,CAAc,EAAE,IAAI,CAAC,SAAS,6BAA6B,EAAe,EAAE,IAAI,CAAC,SAAS,0BAA0B,EAAe,EAAE,IAAI,CAAC,SAAS,0BAA0B,EAAE,CAAC,EAAe,GAAyB,EAAA,EAAa,CAAC,SAAS,CAAc,EAAE,IAAI,CAAC,SAAS,0BAA0B,EAAe,EAAE,IAAI,CAAC,SAAS,+BAA+B,EAAe,EAAE,IAAI,CAAC,SAAS,+BAA+B,EAAE,CAAC,EAAe,GAAyB,EAAA,EAAa,CAAC,SAAS,CAAc,EAAE,IAAI,CAAC,SAAS,CAAc,EAAE,SAAS,CAAC,SAAS,mBAAmB,EAAE,wOAAwO,CAAC,EAAe,EAAE,IAAI,CAAC,SAAS,CAAc,EAAE,SAAS,CAAC,SAAS,sBAAsB,EAAE,iQAAiQ,CAAC,EAAe,EAAE,IAAI,CAAC,SAAS,CAAc,EAAE,SAAS,CAAC,SAAS,0BAA0B,EAAE,mOAAmO,CAAC,EAAe,EAAE,IAAI,CAAC,SAAS,CAAc,EAAE,SAAS,CAAC,SAAS,qBAAqB,EAAE,2SAA2S,CAAC,EAAE,CAAC,EAAe,GAAyB,EAAA,EAAa,CAAC,SAAS,CAAc,EAAE,IAAI,CAAC,SAAS,CAAc,EAAE,SAAS,CAAC,SAAS,YAAY,EAAE,uOAAuO,CAAC,EAAe,EAAE,IAAI,CAAC,SAAS,CAAc,EAAE,SAAS,CAAC,SAAS,YAAY,EAAE,uPAAuP,CAAC,EAAe,EAAE,IAAI,CAAC,SAAS,CAAc,EAAE,SAAS,CAAC,SAAS,SAAS,EAAE,sOAAsO,CAAC,EAAe,EAAE,IAAI,CAAC,SAAS,CAAc,EAAE,SAAS,CAAC,SAAS,QAAQ,EAAE,qSAAqS,CAAC,EAAE,CAAC,EAAe,GAAyB,EAAA,EAAa,CAAC,SAAsB,EAAE,IAAI,CAAC,SAAS,uQAAuQ,EAAE,EAAe,GAAyB,EAAA,EAAa,CAAC,SAAS,CAAc,EAAE,IAAI,CAAC,SAAS,8BAA8B,EAAe,EAAE,IAAI,CAAC,SAAS,0BAA0B,EAAe,EAAE,IAAI,CAAC,SAAS,kCAAkC,EAAE,CAAC,EAAe,GAAyB,EAAA,EAAa,CAAC,SAAS,CAAc,EAAE,IAAI,CAAC,SAAS,iCAAiC,EAAe,EAAE,IAAI,CAAC,SAAS,gCAAgC,EAAe,EAAE,IAAI,CAAC,SAAS,sBAAsB,EAAE,CAAC,EAAe,GAAyB,EAAA,EAAa,CAAC,SAAS,CAAc,EAAE,IAAI,CAAC,SAAS,CAAc,EAAE,SAAS,CAAC,SAAS,gCAAgC,EAAE,+QAA+Q,CAAC,EAAe,EAAE,IAAI,CAAC,SAAS,CAAc,EAAE,SAAS,CAAC,SAAS,sCAAsC,EAAE,uVAAuV,CAAC,EAAe,EAAE,IAAI,CAAC,SAAS,CAAc,EAAE,SAAS,CAAC,SAAS,gCAAgC,EAAE,0SAA0S,CAAC,EAAe,EAAE,IAAI,CAAC,SAAS,CAAc,EAAE,SAAS,CAAC,SAAS,6BAA6B,EAAE,mTAAmT,CAAC,EAAe,EAAE,IAAI,CAAC,SAAS,CAAc,EAAE,SAAS,CAAC,SAAS,uBAAuB,EAAE,uVAAuV,CAAC,EAAE,CAAC,EAAe,GAAyB,EAAA,EAAa,CAAC,SAAS,CAAc,EAAE,IAAI,CAAC,SAAS,CAAc,EAAE,SAAS,CAAC,SAAS,8BAA8B,EAAE,oOAAoO,CAAC,EAAe,EAAE,IAAI,CAAC,SAAS,CAAc,EAAE,SAAS,CAAC,SAAS,mCAAmC,EAAE,mQAAmQ,CAAC,EAAe,EAAE,IAAI,CAAC,SAAS,CAAc,EAAE,SAAS,CAAC,SAAS,iBAAiB,EAAE,mPAAmP,CAAC,EAAe,EAAE,IAAI,CAAC,SAAS,CAAc,EAAE,SAAS,CAAC,SAAS,kBAAkB,EAAE,oSAAoS,CAAC,EAAE,CAAC,EAAe,GAAyB,EAAA,EAAa,CAAC,SAAsB,EAAE,IAAI,CAAC,SAAS,+BAA+B,EAAE,EAAe,GAAyB,EAAA,EAAa,CAAC,SAAsB,EAAE,IAAI,CAAC,SAAS,iRAAiR,EAAE,EAAe,GAAyB,EAAA,EAAa,CAAC,SAAS,CAAc,EAAE,IAAI,CAAC,SAAS,6BAA6B,EAAe,EAAE,IAAI,CAAC,SAAS,6BAA6B,EAAe,EAAE,IAAI,CAAC,SAAS,gCAAgC,EAAe,EAAE,IAAI,CAAC,SAAsB,EAAE,KAAK,CAAC,UAAU,iBAAiB,EAAE,EAAE,CAAC,EAAe,GAAyB,EAAA,EAAa,CAAC,SAAS,CAAc,EAAE,IAAI,CAAC,SAAS,sCAAsC,EAAe,EAAE,IAAI,CAAC,SAAS,uBAAuB,EAAe,EAAE,IAAI,CAAC,SAAS,+BAA+B,EAAe,EAAE,IAAI,CAAC,SAAsB,EAAE,KAAK,CAAC,UAAU,iBAAiB,EAAE,EAAE,CAAC,EAAe,GAAyB,EAAA,EAAa,CAAC,SAAS,CAAc,EAAE,IAAI,CAAC,SAAS,CAAc,EAAE,SAAS,CAAC,SAAS,+BAA+B,EAAE,2PAA2P,CAAC,EAAe,EAAE,IAAI,CAAC,SAAS,CAAc,EAAE,SAAS,CAAC,SAAS,gCAAgC,EAAE,0QAA0Q,CAAC,EAAe,EAAE,IAAI,CAAC,SAAS,CAAc,EAAE,SAAS,CAAC,SAAS,wBAAwB,EAAE,+PAA+P,CAAC,EAAe,EAAE,IAAI,CAAC,SAAS,CAAc,EAAE,SAAS,CAAC,SAAS,mBAAmB,EAAE,uQAAuQ,CAAC,EAAe,EAAE,IAAI,CAAC,SAAS,CAAc,EAAE,SAAS,CAAC,SAAS,wBAAwB,EAAE,mQAAmQ,CAAC,EAAE,CAAC,EAAe,GAAyB,EAAA,EAAa,CAAC,SAAS,CAAc,EAAE,IAAI,CAAC,SAAS,CAAc,EAAE,SAAS,CAAC,SAAS,cAAc,EAAE,qPAAqP,CAAC,EAAe,EAAE,IAAI,CAAC,SAAS,CAAc,EAAE,SAAS,CAAC,SAAS,WAAW,EAAE,gQAAgQ,CAAC,EAAe,EAAE,IAAI,CAAC,SAAS,CAAc,EAAE,SAAS,CAAC,SAAS,iBAAiB,EAAE,iOAAiO,CAAC,EAAe,EAAE,IAAI,CAAC,SAAS,CAAc,EAAE,SAAS,CAAC,SAAS,aAAa,EAAE,kOAAkO,CAAC,EAAE,CAAC,EAAe,GAAyB,EAAA,EAAa,CAAC,SAAsB,EAAE,IAAI,CAAC,SAAS,6BAA6B,EAAE,EAAe,GAAyB,EAAA,EAAa,CAAC,SAAsB,EAAE,IAAI,CAAC,SAAS,gRAAgR,EAAE,EAAe,GAAyB,EAAA,EAAa,CAAC,SAAS,CAAc,EAAE,IAAI,CAAC,SAAS,kCAAkC,EAAe,EAAE,IAAI,CAAC,SAAS,8BAA8B,EAAe,EAAE,IAAI,CAAC,SAAS,wCAAwC,EAAE,CAAC,EAAe,GAAyB,EAAA,EAAa,CAAC,SAAS,CAAc,EAAE,IAAI,CAAC,SAAS,2CAA2C,EAAe,EAAE,IAAI,CAAC,SAAS,2CAA2C,EAAe,EAAE,IAAI,CAAC,SAAS,gCAAgC,EAAE,CAAC,EAAe,GAAyB,EAAA,EAAa,CAAC,SAAS,CAAc,EAAE,IAAI,CAAC,SAAS,CAAc,EAAE,SAAS,CAAC,SAAS,iCAAiC,EAAE,0PAA0P,CAAC,EAAe,EAAE,IAAI,CAAC,SAAS,CAAc,EAAE,SAAS,CAAC,SAAS,4BAA4B,EAAE,+OAA+O,CAAC,EAAe,EAAE,IAAI,CAAC,SAAS,CAAc,EAAE,SAAS,CAAC,SAAS,sBAAsB,EAAE,4OAA4O,CAAC,EAAe,EAAE,IAAI,CAAC,SAAS,CAAc,EAAE,SAAS,CAAC,SAAS,yBAAyB,EAAE,kRAAkR,CAAC,EAAE,CAAC,EAAe,GAAyB,EAAA,EAAa,CAAC,SAAS,CAAc,EAAE,IAAI,CAAC,SAAS,CAAc,EAAE,SAAS,CAAC,SAAS,UAAU,EAAE,6NAA6N,CAAC,EAAe,EAAE,IAAI,CAAC,SAAS,CAAc,EAAE,SAAS,CAAC,SAAS,QAAQ,EAAE,mPAAmP,CAAC,EAAe,EAAE,IAAI,CAAC,SAAS,CAAc,EAAE,SAAS,CAAC,SAAS,YAAY,EAAE,0OAA0O,CAAC,EAAe,EAAE,IAAI,CAAC,SAAS,CAAc,EAAE,SAAS,CAAC,SAAS,yBAAyB,EAAE,6QAA6Q,CAAC,EAAE,CAAC,EAAe,GAAyB,EAAA,EAAa,CAAC,SAAsB,EAAE,IAAI,CAAC,SAAS,oSAAoS,EAAE,EAAe,GAAyB,EAAA,EAAa,CAAC,SAAS,CAAc,EAAE,IAAI,CAAC,SAAS,iCAAiC,EAAe,EAAE,IAAI,CAAC,SAAS,mCAAmC,EAAe,EAAE,IAAI,CAAC,SAAS,iCAAiC,EAAE,CAAC,EAAe,GAAyB,EAAA,EAAa,CAAC,SAAS,CAAc,EAAE,IAAI,CAAC,SAAS,4BAA4B,EAAe,EAAE,IAAI,CAAC,SAAS,8BAA8B,EAAe,EAAE,IAAI,CAAC,SAAS,8BAA8B,EAAE,CAAC,EAAe,GAAyB,EAAA,EAAa,CAAC,SAAS,CAAc,EAAE,IAAI,CAAC,SAAS,CAAc,EAAE,SAAS,CAAC,SAAS,yBAAyB,EAAE,mQAAmQ,CAAC,EAAe,EAAE,IAAI,CAAC,SAAS,CAAc,EAAE,SAAS,CAAC,SAAS,uBAAuB,EAAE,wOAAwO,CAAC,EAAe,EAAE,IAAI,CAAC,SAAS,CAAc,EAAE,SAAS,CAAC,SAAS,4BAA4B,EAAE,gQAAgQ,CAAC,EAAE,CAAC,EAAe,GAAyB,EAAA,EAAa,CAAC,SAAS,CAAc,EAAE,IAAI,CAAC,SAAS,CAAc,EAAE,SAAS,CAAC,SAAS,QAAQ,EAAE,+OAA+O,CAAC,EAAe,EAAE,IAAI,CAAC,SAAS,CAAc,EAAE,SAAS,CAAC,SAAS,aAAa,EAAE,8PAA8P,CAAC,EAAe,EAAE,IAAI,CAAC,SAAS,CAAc,EAAE,SAAS,CAAC,SAAS,WAAW,EAAE,6QAA6Q,CAAC,EAAE,CAAC,EAAe,GAAyB,EAAA,EAAa,CAAC,SAAsB,EAAE,IAAI,CAAC,SAAS,YAAY,EAAE,EAAe,GAAyB,EAAA,EAAa,CAAC,SAAsB,EAAE,IAAI,CAAC,SAAS,oVAAoV,EAAE,EAAe,GAAyB,EAAA,EAAa,CAAC,SAAS,CAAc,EAAE,IAAI,CAAC,SAAS,iCAAiC,EAAe,EAAE,IAAI,CAAC,SAAS,4BAA4B,EAAe,EAAE,IAAI,CAAC,SAAS,oCAAoC,EAAE,CAAC,EAAe,GAAyB,EAAA,EAAa,CAAC,SAAS,CAAc,EAAE,IAAI,CAAC,SAAS,6BAA6B,EAAe,EAAE,IAAI,CAAC,SAAS,6BAA6B,EAAe,EAAE,IAAI,CAAC,SAAS,2BAA2B,EAAE,CAAC,EAAe,GAAyB,EAAA,EAAa,CAAC,SAAS,CAAc,EAAE,IAAI,CAAC,SAAS,CAAc,EAAE,SAAS,CAAC,SAAS,oCAAoC,EAAE,kSAAkS,CAAC,EAAe,EAAE,IAAI,CAAC,SAAS,CAAc,EAAE,SAAS,CAAC,SAAS,uCAAuC,EAAE,yQAAyQ,CAAC,EAAe,EAAE,IAAI,CAAC,SAAS,CAAc,EAAE,SAAS,CAAC,SAAS,4CAA4C,EAAE,2SAA2S,CAAC,EAAE,CAAC,EAAe,GAAyB,EAAA,EAAa,CAAC,SAAS,CAAc,EAAE,IAAI,CAAC,SAAS,CAAc,EAAE,SAAS,CAAC,SAAS,kBAAkB,EAAE,0OAA0O,CAAC,EAAe,EAAE,IAAI,CAAC,SAAS,CAAc,EAAE,SAAS,CAAC,SAAS,kBAAkB,EAAE,+MAA+M,CAAC,EAAe,EAAE,IAAI,CAAC,SAAS,CAAc,EAAE,SAAS,CAAC,SAAS,YAAY,EAAE,+LAA+L,CAAC,EAAe,EAAE,IAAI,CAAC,SAAS,CAAc,EAAE,SAAS,CAAC,SAAS,SAAS,EAAE,4MAA4M,CAAC,EAAE,CAAC,EAAe,GAAyB,EAAA,EAAa,CAAC,SAAsB,EAAE,IAAI,CAAC,SAAS,2BAA2B,EAAE,EAAe,GAAyB,EAAA,EAAa,CAAC,SAAsB,EAAE,IAAI,CAAC,SAAS,6MAA6M,EAAE,EAAe,GAAyB,EAAA,EAAa,CAAC,SAAS,CAAc,EAAE,IAAI,CAAC,SAAS,kCAAkC,EAAe,EAAE,IAAI,CAAC,SAAS,8BAA8B,EAAe,EAAE,IAAI,CAAC,SAAS,4BAA4B,EAAE,CAAC,EAAe,GAAyB,EAAA,EAAa,CAAC,SAAS,CAAc,EAAE,IAAI,CAAC,SAAS,gCAAgC,EAAe,EAAE,IAAI,CAAC,SAAS,iCAAiC,EAAe,EAAE,IAAI,CAAC,SAAS,sCAAsC,EAAE,CAAC,EAAe,GAAyB,EAAA,EAAa,CAAC,SAAS,CAAc,EAAE,IAAI,CAAC,SAAS,uWAAuW,EAAe,EAAE,IAAI,CAAC,SAAS,8ZAA8Z,EAAe,EAAE,IAAI,CAAC,SAAS,mWAAmW,EAAE,CAAC,EAAe,GAAyB,EAAA,EAAa,CAAC,SAAS,CAAc,EAAE,IAAI,CAAC,SAAS,6TAA6T,EAAe,EAAE,IAAI,CAAC,SAAS,4QAA4Q,EAAE,CAAC,EAAe,GAAyB,EAAA,EAAa,CAAC,SAAsB,EAAE,IAAI,CAAC,SAAS,sBAAsB,EAAE,EAAe,GAAyB,EAAA,EAAa,CAAC,SAAsB,EAAE,IAAI,CAAC,SAAS,kUAAkU,EAAE,EAAe,GAAyB,EAAA,EAAa,CAAC,SAAS,CAAc,EAAE,IAAI,CAAC,SAAS,gCAAgC,EAAe,EAAE,IAAI,CAAC,SAAS,iCAAiC,EAAe,EAAE,IAAI,CAAC,SAAS,iCAAiC,EAAE,CAAC,EAAe,GAAyB,EAAA,EAAa,CAAC,SAAS,CAAc,EAAE,IAAI,CAAC,SAAS,mCAAmC,EAAe,EAAE,IAAI,CAAC,SAAS,iCAAiC,EAAe,EAAE,IAAI,CAAC,SAAS,+BAA+B,EAAE,CAAC,EAAe,GAAyB,EAAA,EAAa,CAAC,SAAS,CAAc,EAAE,IAAI,CAAC,SAAS,CAAc,EAAE,SAAS,CAAC,SAAS,+BAA+B,EAAE,qLAAqL,CAAC,EAAe,EAAE,IAAI,CAAC,SAAS,CAAc,EAAE,SAAS,CAAC,SAAS,6CAA6C,EAAE,iMAAiM,CAAC,EAAe,EAAE,IAAI,CAAC,SAAS,CAAc,EAAE,SAAS,CAAC,SAAS,qCAAqC,EAAE,yNAAyN,CAAC,EAAE,CAAC,EAAe,GAAyB,EAAA,EAAa,CAAC,SAAS,CAAc,EAAE,IAAI,CAAC,SAAS,CAAc,EAAE,SAAS,CAAC,SAAS,WAAW,EAAE,oNAAoN,CAAC,EAAe,EAAE,IAAI,CAAC,SAAS,CAAc,EAAE,SAAS,CAAC,SAAS,OAAO,EAAE,iOAAiO,CAAC,EAAe,EAAE,IAAI,CAAC,SAAS,CAAc,EAAE,SAAS,CAAC,SAAS,QAAQ,EAAE,sOAAsO,CAAC,EAAe,EAAE,IAAI,CAAC,SAAS,CAAc,EAAE,SAAS,CAAC,SAAS,kBAAkB,EAAE,6DAA0E,EAAE,SAAS,CAAC,SAAS,QAAQ,EAAE,sKAAsK,CAAC,EAAe,EAAE,IAAI,CAAC,SAAS,CAAc,EAAE,SAAS,CAAC,SAAS,OAAO,EAAE,iNAAiN,CAAC,EAAe,EAAE,IAAI,CAAC,SAAS,CAAc,EAAE,SAAS,CAAC,SAAS,OAAO,EAAE,4MAA4M,CAAC,EAAE,CAAC,EAAe,GAAyB,EAAA,EAAa,CAAC,SAAsB,EAAE,IAAI,CAAC,SAAS,gCAAgC,EAAE,EAAe,GAAyB,EAAA,EAAa,CAAC,SAAsB,EAAE,IAAI,CAAC,SAAS,wSAAwS,EAAE,EAAe,GAAyB,EAAA,EAAa,CAAC,SAAS,CAAc,EAAE,IAAI,CAAC,SAAS,qCAAqC,EAAe,EAAE,IAAI,CAAC,SAAS,6CAA6C,EAAe,EAAE,IAAI,CAAC,SAAS,mDAAmD,EAAE,CAAC,EAAe,GAAyB,EAAA,EAAa,CAAC,SAAS,CAAc,EAAE,IAAI,CAAC,SAAS,4CAA4C,EAAe,EAAE,IAAI,CAAC,SAAS,yCAAyC,EAAe,EAAE,IAAI,CAAC,SAAS,iCAAiC,EAAE,CAAC,EAAe,GAAyB,EAAA,EAAa,CAAC,SAAS,CAAc,EAAE,IAAI,CAAC,SAAS,CAAc,EAAE,SAAS,CAAC,SAAS,mCAAmC,EAAE,mSAAmS,CAAC,EAAe,EAAE,IAAI,CAAC,SAAS,CAAc,EAAE,SAAS,CAAC,SAAS,gCAAgC,EAAE,6RAA6R,CAAC,EAAe,EAAE,IAAI,CAAC,SAAS,CAAc,EAAE,SAAS,CAAC,SAAS,oCAAoC,EAAE,qSAAqS,CAAC,EAAE,CAAC,EAAe,GAAyB,EAAA,EAAa,CAAC,SAAS,CAAc,EAAE,IAAI,CAAC,SAAS,CAAc,EAAE,SAAS,CAAC,SAAS,yBAAyB,EAAE,+OAA+O,CAAC,EAAe,EAAE,IAAI,CAAC,SAAS,CAAc,EAAE,SAAS,CAAC,SAAS,OAAO,EAAE,oQAAoQ,CAAC,EAAe,EAAE,IAAI,CAAC,SAAS,CAAc,EAAE,SAAS,CAAC,SAAS,QAAQ,EAAE,4MAA4M,CAAC,EAAe,EAAE,IAAI,CAAC,SAAS,CAAc,EAAE,SAAS,CAAC,SAAS,YAAY,EAAE,oOAAoO,CAAC,EAAe,EAAE,IAAI,CAAC,SAAS,CAAc,EAAE,SAAS,CAAC,SAAS,SAAS,EAAE,gMAAgM,CAAC,EAAe,EAAE,IAAI,CAAC,SAAS,CAAc,EAAE,SAAS,CAAC,SAAS,gBAAgB,EAAE,oKAAoK,CAAC,EAAE,CAAC,EAAe,GAAyB,EAAA,EAAa,CAAC,SAAsB,EAAE,IAAI,CAAC,SAAS,4RAA4R,EAAE,EAAe,GAAyB,EAAA,EAAa,CAAC,SAAS,CAAc,EAAE,IAAI,CAAC,SAAS,mCAAmC,EAAe,EAAE,IAAI,CAAC,SAAS,gCAAgC,EAAe,EAAE,IAAI,CAAC,SAAS,iCAAiC,EAAE,CAAC,EAAe,GAAyB,EAAA,EAAa,CAAC,SAAS,CAAc,EAAE,IAAI,CAAC,SAAS,iCAAiC,EAAe,EAAE,IAAI,CAAC,SAAS,kCAAkC,EAAe,EAAE,IAAI,CAAC,SAAS,0BAA0B,EAAE,CAAC,EAAe,GAAyB,EAAA,EAAa,CAAC,SAAS,CAAc,EAAE,IAAI,CAAC,SAAS,CAAc,EAAE,SAAS,CAAC,SAAS,kCAAkC,EAAE,wRAAwR,CAAC,EAAe,EAAE,IAAI,CAAC,SAAS,CAAc,EAAE,SAAS,CAAC,SAAS,uCAAuC,EAAE,mPAAmP,CAAC,EAAe,EAAE,IAAI,CAAC,SAAS,CAAc,EAAE,SAAS,CAAC,SAAS,0BAA0B,EAAE,0PAA0P,CAAC,EAAE,CAAC,EAAe,GAAyB,EAAA,EAAa,CAAC,SAAS,CAAc,EAAE,IAAI,CAAC,SAAS,CAAc,EAAE,SAAS,CAAC,SAAS,QAAQ,EAAE,gRAAgR,CAAC,EAAe,EAAE,IAAI,CAAC,SAAS,CAAc,EAAE,SAAS,CAAC,SAAS,WAAW,EAAE,wTAAwT,CAAC,EAAE,CAAC,EAAe,GAAyB,EAAA,EAAa,CAAC,SAAsB,EAAE,IAAI,CAAC,SAAS,eAAe,EAAE,EAAe,GAAyB,EAAA,EAAa,CAAC,SAAsB,EAAE,IAAI,CAAC,SAAS,gUAAgU,EAAE,EAAe,GAAyB,EAAA,EAAa,CAAC,SAAS,CAAc,EAAE,IAAI,CAAC,SAAS,mCAAmC,EAAe,EAAE,IAAI,CAAC,SAAS,oCAAoC,EAAe,EAAE,IAAI,CAAC,SAAS,sCAAsC,EAAE,CAAC,EAAe,GAAyB,EAAA,EAAa,CAAC,SAAS,CAAc,EAAE,IAAI,CAAC,SAAS,2BAA2B,EAAe,EAAE,IAAI,CAAC,SAAS,kCAAkC,EAAe,EAAE,IAAI,CAAC,SAAS,+BAA+B,EAAE,CAAC,EAAe,GAAyB,EAAA,EAAa,CAAC,SAAS,CAAc,EAAE,IAAI,CAAC,SAAS,mRAAmR,EAAe,EAAE,IAAI,CAAC,SAAS,iQAAiQ,EAAe,EAAE,IAAI,CAAC,SAAS,uQAAuQ,EAAE,CAAC,EAAe,GAAyB,EAAA,EAAa,CAAC,SAAS,CAAc,EAAE,IAAI,CAAC,SAAS,CAAc,EAAE,SAAS,CAAC,SAAS,QAAQ,EAAE,2RAA2R,CAAC,EAAe,EAAE,IAAI,CAAC,SAAsB,EAAE,OAAO,CAAC,SAAS,CAAc,EAAE,SAAS,CAAC,SAAS,WAAW,EAAE,oQAAoQ,CAAC,EAAE,EAAE,CAAC,EAAe,GAAyB,EAAA,EAAa,CAAC,SAAsB,EAAE,IAAI,CAAC,SAAS,4BAA4B,EAAE,EAAe,GAAyB,EAAA,EAAa,CAAC,SAAsB,EAAE,IAAI,CAAC,SAAS,yTAAyT,EAAE,EAAe,GAAyB,EAAA,EAAa,CAAC,SAAS,CAAc,EAAE,IAAI,CAAC,SAAS,4BAA4B,EAAe,EAAE,IAAI,CAAC,SAAS,8BAA8B,EAAe,EAAE,IAAI,CAAC,SAAS,+BAA+B,EAAE,CAAC,EAAe,GAAyB,EAAA,EAAa,CAAC,SAAS,CAAc,EAAE,IAAI,CAAC,SAAS,4BAA4B,EAAe,EAAE,IAAI,CAAC,SAAS,6BAA6B,EAAe,EAAE,IAAI,CAAC,SAAS,wBAAwB,EAAE,CAAC,EAAe,GAAyB,EAAA,EAAa,CAAC,SAAS,CAAc,EAAE,IAAI,CAAC,SAAS,CAAc,EAAE,SAAS,CAAC,SAAS,mCAAmC,EAAE,gQAAgQ,CAAC,EAAe,EAAE,IAAI,CAAC,SAAS,CAAc,EAAE,SAAS,CAAC,SAAS,0BAA0B,EAAE,2NAA2N,CAAC,EAAe,EAAE,IAAI,CAAC,SAAS,CAAc,EAAE,SAAS,CAAC,SAAS,sCAAsC,EAAE,iQAAiQ,CAAC,EAAE,CAAC,EAAe,GAAyB,EAAA,EAAa,CAAC,SAAS,CAAc,EAAE,IAAI,CAAC,SAAsB,EAAE,OAAO,CAAC,SAAS,CAAc,EAAE,SAAS,CAAC,SAAS,uCAAuC,EAAE,4PAA4P,CAAC,EAAE,EAAe,EAAE,IAAI,CAAC,SAAS,CAAc,EAAE,SAAS,CAAC,SAAS,qBAAqB,EAAE,4OAA4O,CAAC,EAAE,CAAC,EAAe,GAAyB,EAAA,EAAa,CAAC,SAAsB,EAAE,IAAI,CAAC,SAAS,uSAAuS,EAAE,EAAe,GAAyB,EAAA,EAAa,CAAC,SAAS,CAAc,EAAE,IAAI,CAAC,SAAS,mCAAmC,EAAe,EAAE,IAAI,CAAC,SAAS,6BAA6B,EAAe,EAAE,IAAI,CAAC,SAAS,kCAAkC,EAAE,CAAC,EAAe,GAAyB,EAAA,EAAa,CAAC,SAAS,CAAc,EAAE,IAAI,CAAC,SAAS,+BAA+B,EAAe,EAAE,IAAI,CAAC,SAAS,4BAA4B,EAAe,EAAE,IAAI,CAAC,SAAS,iCAAiC,EAAE,CAAC,EAAe,GAAyB,EAAA,EAAa,CAAC,SAAS,CAAc,EAAE,IAAI,CAAC,SAAS,CAAc,EAAE,SAAS,CAAC,SAAS,0BAA0B,EAAE,mRAAmR,CAAC,EAAe,EAAE,IAAI,CAAC,SAAsB,EAAE,OAAO,CAAC,SAAS,CAAc,EAAE,SAAS,CAAC,SAAS,2BAA2B,EAAE,0SAA0S,CAAC,EAAE,EAAe,EAAE,IAAI,CAAC,SAAS,CAAc,EAAE,SAAS,CAAC,SAAS,wBAAwB,EAAE,6OAA6O,CAAC,EAAE,CAAC,EAAe,GAAyB,EAAA,EAAa,CAAC,SAAsB,EAAE,IAAI,CAAC,SAAS,CAAc,EAAE,SAAS,CAAC,SAAS,wBAAwB,EAAE,yRAAyR,CAAC,EAAE,EAAe,GAAyB,EAAA,EAAa,CAAC,SAAsB,EAAE,IAAI,CAAC,SAAS,4UAA4U,EAAE,EAAe,GAAyB,EAAA,EAAa,CAAC,SAAS,CAAc,EAAE,IAAI,CAAC,SAAS,gCAAgC,EAAe,EAAE,IAAI,CAAC,SAAS,8BAA8B,EAAe,EAAE,IAAI,CAAC,SAAS,4BAA4B,EAAE,CAAC,EAAe,GAAyB,EAAA,EAAa,CAAC,SAAS,CAAc,EAAE,IAAI,CAAC,SAAS,qCAAqC,EAAe,EAAE,IAAI,CAAC,SAAS,6BAA6B,EAAe,EAAE,IAAI,CAAC,SAAS,0BAA0B,EAAE,CAAC,EAAe,GAAyB,EAAA,EAAa,CAAC,SAAS,CAAc,EAAE,IAAI,CAAC,SAAsB,EAAE,OAAO,CAAC,SAAS,CAAc,EAAE,SAAS,CAAC,SAAS,0BAA0B,EAAE,mNAAmN,CAAC,EAAE,EAAe,EAAE,IAAI,CAAC,SAAS,CAAc,EAAE,SAAS,CAAC,SAAS,gCAAgC,EAAE,4MAA4M,CAAC,EAAe,EAAE,IAAI,CAAC,SAAS,CAAc,EAAE,SAAS,CAAC,SAAS,8BAA8B,EAAE,gQAAgQ,CAAC,EAAE,CAAC,EAAe,GAAyB,EAAA,EAAa,CAAC,SAAsB,EAAE,IAAI,CAAC,SAAS,CAAc,EAAE,SAAS,CAAC,SAAS,qBAAqB,EAAE,4PAA4P,CAAC,EAAE,EAAe,GAAyB,EAAA,EAAa,CAAC,SAAsB,EAAE,IAAI,CAAC,SAAS,wBAAwB,EAAE,EAAe,GAAyB,EAAA,EAAa,CAAC,SAAsB,EAAE,IAAI,CAAC,SAAS,+QAA+Q,EAAE,EAAe,GAAyB,EAAA,EAAa,CAAC,SAAS,CAAc,EAAE,IAAI,CAAC,SAAS,+BAA+B,EAAe,EAAE,IAAI,CAAC,SAAS,2BAA2B,EAAe,EAAE,IAAI,CAAC,SAAS,yBAAyB,EAAE,CAAC,EAAe,GAAyB,EAAA,EAAa,CAAC,SAAS,CAAc,EAAE,IAAI,CAAC,SAAS,sCAAsC,EAAe,EAAE,IAAI,CAAC,SAAS,8BAA8B,EAAe,EAAE,IAAI,CAAC,SAAS,0BAA0B,EAAE,CAAC,EAAe,GAAyB,EAAA,EAAa,CAAC,SAAS,CAAc,EAAE,IAAI,CAAC,SAAS,CAAc,EAAE,SAAS,CAAC,SAAS,4BAA4B,EAAE,wPAAwP,CAAC,EAAe,EAAE,IAAI,CAAC,SAAS,CAAc,EAAE,SAAS,CAAC,SAAS,uBAAuB,EAAE,8QAA8Q,CAAC,EAAe,EAAE,IAAI,CAAC,SAAS,CAAc,EAAE,SAAS,CAAC,SAAS,qBAAqB,EAAE,+QAA+Q,CAAC,EAAE,CAAC,EAAe,GAAyB,EAAA,EAAa,CAAC,SAAS,CAAc,EAAE,IAAI,CAAC,SAAsB,EAAE,OAAO,CAAC,SAAS,CAAc,EAAE,SAAS,CAAC,SAAS,QAAQ,EAAE,iQAAiQ,CAAC,EAAE,EAAe,EAAE,IAAI,CAAC,SAAsB,EAAE,OAAO,CAAC,SAAS,CAAc,EAAE,SAAS,CAAC,SAAS,iBAAiB,EAAE,wRAAwR,CAAC,EAAE,EAAE,CAAC,EAAe,GAAyB,EAAA,EAAa,CAAC,SAAsB,EAAE,IAAI,CAAC,SAAS,qUAAqU,EAAE,EAAe,GAAyB,EAAA,EAAa,CAAC,SAAS,CAAc,EAAE,IAAI,CAAC,SAAS,iCAAiC,EAAe,EAAE,IAAI,CAAC,SAAS,qCAAqC,EAAe,EAAE,IAAI,CAAC,SAAS,iCAAiC,EAAE,CAAC,EAAe,GAAyB,EAAA,EAAa,CAAC,SAAS,CAAc,EAAE,IAAI,CAAC,SAAS,uCAAuC,EAAe,EAAE,IAAI,CAAC,SAAS,mCAAmC,EAAe,EAAE,IAAI,CAAC,SAAS,+BAA+B,EAAE,CAAC,EAAe,GAAyB,EAAA,EAAa,CAAC,SAAS,CAAc,EAAE,IAAI,CAAC,SAAS,CAAc,EAAE,SAAS,CAAC,SAAS,2CAA2C,EAAE,gSAAgS,CAAC,EAAe,EAAE,IAAI,CAAC,SAAsB,EAAE,OAAO,CAAC,SAAS,CAAc,EAAE,SAAS,CAAC,SAAS,+BAA+B,EAAE,qQAAqQ,CAAC,EAAE,EAAe,EAAE,IAAI,CAAC,SAAsB,EAAE,OAAO,CAAC,SAAS,CAAc,EAAE,SAAS,CAAC,SAAS,uCAAuC,EAAE,4QAA4Q,CAAC,EAAE,EAAE,CAAC,EAAe,GAAyB,EAAA,EAAa,CAAC,SAAS,CAAc,EAAE,IAAI,CAAC,SAAsB,EAAE,OAAO,CAAC,SAAS,CAAc,EAAE,SAAS,CAAC,SAAS,0BAA0B,EAAE,6QAA6Q,CAAC,EAAE,EAAe,EAAE,IAAI,CAAC,SAAsB,EAAE,OAAO,CAAC,SAAS,CAAc,EAAE,SAAS,CAAC,SAAS,eAAe,EAAE,oNAAoN,CAAC,EAAE,EAAe,EAAE,IAAI,CAAC,SAAsB,EAAE,OAAO,CAAC,SAAS,CAAc,EAAE,SAAS,CAAC,SAAS,aAAa,EAAE,yOAAyO,CAAC,EAAE,EAAe,EAAE,IAAI,CAAC,SAAsB,EAAE,OAAO,CAAC,SAAS,CAAc,EAAE,SAAS,CAAC,SAAS,eAAe,EAAE,4PAA4P,CAAC,EAAE,EAAE,CAAC,EAAe,GAAyB,EAAA,EAAa,CAAC,SAAsB,EAAE,IAAI,CAAC,SAAS,iSAAiS,EAAE,EAAe,GAAyB,EAAA,EAAa,CAAC,SAAS,CAAc,EAAE,IAAI,CAAC,SAAS,kCAAkC,EAAe,EAAE,IAAI,CAAC,SAAS,6BAA6B,EAAe,EAAE,IAAI,CAAC,SAAS,kCAAkC,EAAE,CAAC,EAAe,GAAyB,EAAA,EAAa,CAAC,SAAS,CAAc,EAAE,IAAI,CAAC,SAAS,+BAA+B,EAAe,EAAE,IAAI,CAAC,SAAS,gCAAgC,EAAe,EAAE,IAAI,CAAC,SAAS,kCAAkC,EAAE,CAAC,EAAe,GAAyB,EAAA,EAAa,CAAC,SAAS,CAAc,EAAE,IAAI,CAAC,SAAS,CAAc,EAAE,SAAS,CAAC,SAAS,6BAA6B,EAAE,8RAA8R,CAAC,EAAe,EAAE,IAAI,CAAC,SAAS,CAAc,EAAE,SAAS,CAAC,SAAS,mCAAmC,EAAE,+PAA+P,CAAC,EAAe,EAAE,IAAI,CAAC,SAAS,CAAc,EAAE,SAAS,CAAC,SAAS,yCAAyC,EAAE,6QAA6Q,CAAC,EAAE,CAAC,EACj6pJ,EAAqB,CAAC,QAAU,CAAC,WAAa,CAAC,KAAO,WAAW,YAAc,CAAC,sBAAwB,IAAI,CAAC,CAAC,WAAa,CAAC,KAAO,WAAW,YAAc,CAAC,sBAAwB,IAAI,CAAC,CAAC,YAAc,CAAC,KAAO,WAAW,YAAc,CAAC,sBAAwB,IAAI,CAAC,CAAC,YAAc,CAAC,KAAO,WAAW,YAAc,CAAC,sBAAwB,IAAI,CAAC,CAAC,YAAc,CAAC,KAAO,WAAW,YAAc,CAAC,sBAAwB,IAAI,CAAC,CAAC,YAAc,CAAC,KAAO,WAAW,YAAc,CAAC,sBAAwB,IAAI,CAAC,CAAC,YAAc,CAAC,KAAO,WAAW,YAAc,CAAC,sBAAwB,IAAI,CAAC,CAAC,WAAa,CAAC,KAAO,WAAW,YAAc,CAAC,sBAAwB,IAAI,CAAC,CAAC,WAAa,CAAC,KAAO,WAAW,YAAc,CAAC,sBAAwB,IAAI,CAAC,CAAC,WAAa,CAAC,KAAO,WAAW,YAAc,CAAC,sBAAwB,IAAI,CAAC,CAAC,YAAc,CAAC,KAAO,WAAW,YAAc,CAAC,sBAAwB,IAAI,CAAC,CAAC,YAAc,CAAC,KAAO,WAAW,YAAc,CAAC,sBAAwB,IAAI,CAAC,CAAC,WAAa,CAAC,KAAO,WAAW,YAAc,CAAC,sBAAwB,IAAI,CAAC,CAAC,YAAc,CAAC,KAAO,WAAW,YAAc,CAAC,sBAAwB,IAAI,CAAC,CAAC,YAAc,CAAC,KAAO,WAAW,YAAc,CAAC,sBAAwB,IAAI,CAAC,CAAC,YAAc,CAAC,KAAO,WAAW,YAAc,CAAC,sBAAwB,IAAI,CAAC,CAAC,WAAa,CAAC,KAAO,WAAW,YAAc,CAAC,sBAAwB,IAAI,CAAC,CAAC,WAAa,CAAC,KAAO,WAAW,YAAc,CAAC,sBAAwB,IAAI,CAAC,CAAC,YAAc,CAAC,KAAO,WAAW,YAAc,CAAC,sBAAwB,IAAI,CAAC,CAAC,WAAa,CAAC,KAAO,WAAW,YAAc,CAAC,sBAAwB,IAAI,CAAC,CAAC,YAAc,CAAC,KAAO,WAAW,YAAc,CAAC,sBAAwB,IAAI,CAAC,CAAC,WAAa,CAAC,KAAO,WAAW,YAAc,CAAC,sBAAwB,IAAI,CAAC,CAAC,YAAc,CAAC,KAAO,WAAW,YAAc,CAAC,sBAAwB,IAAI,CAAC,CAAC,WAAa,CAAC,KAAO,WAAW,YAAc,CAAC,sBAAwB,IAAI,CAAC,CAAC,YAAc,CAAC,KAAO,WAAW,YAAc,CAAC,sBAAwB,IAAI,CAAC,CAAC,YAAc,CAAC,KAAO,WAAW,YAAc,CAAC,sBAAwB,IAAI,CAAC,CAAC,YAAc,CAAC,KAAO,WAAW,YAAc,CAAC,sBAAwB,IAAI,CAAC,CAAC,YAAc,CAAC,KAAO,WAAW,YAAc,CAAC,sBAAwB,IAAI,CAAC,CAAC,WAAa,CAAC,KAAO,WAAW,YAAc,CAAC,sBAAwB,IAAI,CAAC,CAAC,YAAc,CAAC,KAAO,WAAW,YAAc,CAAC,sBAAwB,IAAI,CAAC,CAAC,YAAc,CAAC,KAAO,WAAW,YAAc,CAAC,sBAAwB,IAAI,CAAC,CAAC,YAAc,CAAC,KAAO,WAAW,YAAc,CAAC,sBAAwB,IAAI,CAAC,CAAC,WAAa,CAAC,KAAO,WAAW,YAAc,CAAC,sBAAwB,IAAI,CAAC,CAAC,YAAc,CAAC,KAAO,WAAW,YAAc,CAAC,sBAAwB,IAAI,CAAC,CAAC,YAAc,CAAC,KAAO,WAAW,YAAc,CAAC,sBAAwB,IAAI,CAAC,CAAC,YAAc,CAAC,KAAO,WAAW,YAAc,CAAC,sBAAwB,IAAI,CAAC,CAAC,YAAc,CAAC,KAAO,WAAW,YAAc,CAAC,sBAAwB,IAAI,CAAC,CAAC,YAAc,CAAC,KAAO,WAAW,YAAc,CAAC,sBAAwB,IAAI,CAAC,CAAC,WAAa,CAAC,KAAO,WAAW,YAAc,CAAC,sBAAwB,IAAI,CAAC,CAAC,YAAc,CAAC,KAAO,WAAW,YAAc,CAAC,sBAAwB,IAAI,CAAC,CAAC,YAAc,CAAC,KAAO,WAAW,YAAc,CAAC,sBAAwB,IAAI,CAAC,CAAC,YAAc,CAAC,KAAO,WAAW,YAAc,CAAC,sBAAwB,IAAI,CAAC,CAAC,WAAa,CAAC,KAAO,WAAW,YAAc,CAAC,sBAAwB,IAAI,CAAC,CAAC,YAAc,CAAC,KAAO,WAAW,YAAc,CAAC,sBAAwB,IAAI,CAAC,CAAC,WAAa,CAAC,KAAO,WAAW,YAAc,CAAC,sBAAwB,IAAI,CAAC,CAAC,WAAa,CAAC,KAAO,WAAW,YAAc,CAAC,sBAAwB,IAAI,CAAC,CAAC,WAAa,CAAC,KAAO,WAAW,YAAc,CAAC,sBAAwB,IAAI,CAAC,CAAC,YAAc,CAAC,KAAO,WAAW,YAAc,CAAC,sBAAwB,IAAI,CAAC,CAAC,WAAa,CAAC,KAAO,WAAW,YAAc,CAAC,sBAAwB,IAAI,CAAC,CAAC,UAAY,CAAC,KAAO,WAAW,YAAc,CAAC,sBAAwB,IAAI,CAAC,CAAC,YAAc,CAAC,KAAO,WAAW,YAAc,CAAC,sBAAwB,IAAI,CAAC,CAAC,WAAa,CAAC,KAAO,WAAW,YAAc,CAAC,sBAAwB,IAAI,CAAC,CAAC,WAAa,CAAC,KAAO,WAAW,YAAc,CAAC,sBAAwB,IAAI,CAAC,CAAC,WAAa,CAAC,KAAO,WAAW,YAAc,CAAC,sBAAwB,IAAI,CAAC,CAAC,YAAc,CAAC,KAAO,WAAW,YAAc,CAAC,sBAAwB,IAAI,CAAC,CAAC,WAAa,CAAC,KAAO,WAAW,YAAc,CAAC,sBAAwB,IAAI,CAAC,CAAC,YAAc,CAAC,KAAO,WAAW,YAAc,CAAC,sBAAwB,IAAI,CAAC,CAAC,YAAc,CAAC,KAAO,WAAW,YAAc,CAAC,sBAAwB,IAAI,CAAC,CAAC,YAAc,CAAC,KAAO,WAAW,YAAc,CAAC,sBAAwB,IAAI,CAAC,CAAC,YAAc,CAAC,KAAO,WAAW,YAAc,CAAC,sBAAwB,IAAI,CAAC,CAAC,WAAa,CAAC,KAAO,WAAW,YAAc,CAAC,sBAAwB,IAAI,CAAC,CAAC,YAAc,CAAC,KAAO,WAAW,YAAc,CAAC,sBAAwB,IAAI,CAAC,CAAC,YAAc,CAAC,KAAO,WAAW,YAAc,CAAC,sBAAwB,IAAI,CAAC,CAAC,WAAa,CAAC,KAAO,WAAW,YAAc,CAAC,sBAAwB,IAAI,CAAC,CAAC,YAAc,CAAC,KAAO,WAAW,YAAc,CAAC,sBAAwB,IAAI,CAAC,CAAC,YAAc,CAAC,KAAO,WAAW,YAAc,CAAC,sBAAwB,IAAI,CAAC,CAAC,YAAc,CAAC,KAAO,WAAW,YAAc,CAAC,sBAAwB,IAAI,CAAC,CAAC,YAAc,CAAC,KAAO,WAAW,YAAc,CAAC,sBAAwB,IAAI,CAAC,CAAC,WAAa,CAAC,KAAO,WAAW,YAAc,CAAC,sBAAwB,IAAI,CAAC,CAAC,YAAc,CAAC,KAAO,WAAW,YAAc,CAAC,sBAAwB,IAAI,CAAC,CAAC,YAAc,CAAC,KAAO,WAAW,YAAc,CAAC,sBAAwB,IAAI,CAAC,CAAC,YAAc,CAAC,KAAO,WAAW,YAAc,CAAC,sBAAwB,IAAI,CAAC,CAAC,YAAc,CAAC,KAAO,WAAW,YAAc,CAAC,sBAAwB,IAAI,CAAC,CAAC,YAAc,CAAC,KAAO,WAAW,YAAc,CAAC,sBAAwB,IAAI,CAAC,CAAC,WAAa,CAAC,KAAO,WAAW,YAAc,CAAC,sBAAwB,IAAI,CAAC,CAAC,YAAc,CAAC,KAAO,WAAW,YAAc,CAAC,sBAAwB,IAAI,CAAC,CAAC,YAAc,CAAC,KAAO,WAAW,YAAc,CAAC,sBAAwB,IAAI,CAAC,CAAC,WAAa,CAAC,KAAO,WAAW,YAAc,CAAC,sBAAwB,IAAI,CAAC,CAAC,YAAc,CAAC,KAAO,WAAW,YAAc,CAAC,sBAAwB,IAAI,CAAC,CAAC,YAAc,CAAC,KAAO,WAAW,YAAc,CAAC,sBAAwB,IAAI,CAAC,CAAC,YAAc,CAAC,KAAO,WAAW,YAAc,CAAC,sBAAwB,IAAI,CAAC,CAAC,WAAa,CAAC,KAAO,WAAW,YAAc,CAAC,sBAAwB,IAAI,CAAC,CAAC,YAAc,CAAC,KAAO,WAAW,YAAc,CAAC,sBAAwB,IAAI,CAAC,CAAC,WAAa,CAAC,KAAO,WAAW,YAAc,CAAC,sBAAwB,IAAI,CAAC,CAAC,WAAa,CAAC,KAAO,WAAW,YAAc,CAAC,sBAAwB,IAAI,CAAC,CAAC,YAAc,CAAC,KAAO,WAAW,YAAc,CAAC,sBAAwB,IAAI,CAAC,CAAC,YAAc,CAAC,KAAO,WAAW,YAAc,CAAC,sBAAwB,IAAI,CAAC,CAAC,UAAY,CAAC,KAAO,WAAW,YAAc,CAAC,sBAAwB,IAAI,CAAC,CAAC,WAAa,CAAC,KAAO,WAAW,YAAc,CAAC,sBAAwB,IAAI,CAAC,CAAC,YAAc,CAAC,KAAO,WAAW,YAAc,CAAC,sBAAwB,IAAI,CAAC,CAAC,WAAa,CAAC,KAAO,WAAW,YAAc,CAAC,sBAAwB,IAAI,CAAC,CAAC,YAAc,CAAC,KAAO,WAAW,YAAc,CAAC,sBAAwB,IAAI,CAAC,CAAC,YAAc,CAAC,KAAO,WAAW,YAAc,CAAC,sBAAwB,IAAI,CAAC,CAAC,YAAc,CAAC,KAAO,WAAW,YAAc,CAAC,sBAAwB,IAAI,CAAC,CAAC,YAAc,CAAC,KAAO,WAAW,YAAc,CAAC,sBAAwB,IAAI,CAAC,CAAC,WAAa,CAAC,KAAO,WAAW,YAAc,CAAC,sBAAwB,IAAI,CAAC,CAAC,YAAc,CAAC,KAAO,WAAW,YAAc,CAAC,sBAAwB,IAAI,CAAC,CAAC,WAAa,CAAC,KAAO,WAAW,YAAc,CAAC,sBAAwB,IAAI,CAAC,CAAC,YAAc,CAAC,KAAO,WAAW,YAAc,CAAC,sBAAwB,IAAI,CAAC,CAAC,YAAc,CAAC,KAAO,WAAW,YAAc,CAAC,sBAAwB,IAAI,CAAC,CAAC,WAAa,CAAC,KAAO,WAAW,YAAc,CAAC,sBAAwB,IAAI,CAAC,CAAC,YAAc,CAAC,KAAO,WAAW,YAAc,CAAC,sBAAwB,IAAI,CAAC,CAAC,YAAc,CAAC,KAAO,WAAW,YAAc,CAAC,sBAAwB,IAAI,CAAC,CAAC,YAAc,CAAC,KAAO,WAAW,YAAc,CAAC,sBAAwB,IAAI,CAAC,CAAC,WAAa,CAAC,KAAO,WAAW,YAAc,CAAC,sBAAwB,IAAI,CAAC,CAAC,YAAc,CAAC,KAAO,WAAW,YAAc,CAAC,sBAAwB,IAAI,CAAC,CAAC,WAAa,CAAC,KAAO,WAAW,YAAc,CAAC,sBAAwB,IAAI,CAAC,CAAC,YAAc,CAAC,KAAO,WAAW,YAAc,CAAC,sBAAwB,IAAI,CAAC,CAAC,YAAc,CAAC,KAAO,WAAW,YAAc,CAAC,sBAAwB,IAAI,CAAC,CAAC,WAAa,CAAC,KAAO,WAAW,YAAc,CAAC,sBAAwB,IAAI,CAAC,CAAC,YAAc,CAAC,KAAO,WAAW,YAAc,CAAC,sBAAwB,IAAI,CAAC,CAAC,WAAa,CAAC,KAAO,WAAW,YAAc,CAAC,sBAAwB,IAAI,CAAC,CAAC,WAAa,CAAC,KAAO,WAAW,YAAc,CAAC,sBAAwB,IAAI,CAAC,CAAC,YAAc,CAAC,KAAO,WAAW,YAAc,CAAC,sBAAwB,IAAI,CAAC,CAAC,WAAa,CAAC,KAAO,WAAW,YAAc,CAAC,sBAAwB,IAAI,CAAC,CAAC,YAAc,CAAC,KAAO,WAAW,YAAc,CAAC,sBAAwB,IAAI,CAAC,CAAC,YAAc,CAAC,KAAO,WAAW,YAAc,CAAC,sBAAwB,IAAI,CAAC,CAAC,YAAc,CAAC,KAAO,WAAW,YAAc,CAAC,sBAAwB,IAAI,CAAC,CAAC,YAAc,CAAC,KAAO,WAAW,YAAc,CAAC,sBAAwB,IAAI,CAAC,CAAC,WAAa,CAAC,KAAO,WAAW,YAAc,CAAC,sBAAwB,IAAI,CAAC,CAAC,WAAa,CAAC,KAAO,WAAW,YAAc,CAAC,sBAAwB,IAAI,CAAC,CAAC,YAAc,CAAC,KAAO,WAAW,YAAc,CAAC,sBAAwB,IAAI,CAAC,CAAC,YAAc,CAAC,KAAO,WAAW,YAAc,CAAC,sBAAwB,IAAI,CAAC,CAAC,YAAc,CAAC,KAAO,WAAW,YAAc,CAAC,sBAAwB,IAAI,CAAC,CAAC,YAAc,CAAC,KAAO,WAAW,YAAc,CAAC,sBAAwB,IAAI,CAAC,CAAC,YAAc,CAAC,KAAO,WAAW,YAAc,CAAC,sBAAwB,IAAI,CAAC,CAAC,UAAY,CAAC,KAAO,WAAW,YAAc,CAAC,sBAAwB,IAAI,CAAC,CAAC,YAAc,CAAC,KAAO,WAAW,YAAc,CAAC,sBAAwB,IAAI,CAAC,CAAC,WAAa,CAAC,KAAO,WAAW,YAAc,CAAC,sBAAwB,IAAI,CAAC,CAAC,YAAc,CAAC,KAAO,WAAW,YAAc,CAAC,sBAAwB,IAAI,CAAC,CAAC,YAAc,CAAC,KAAO,WAAW,YAAc,CAAC,sBAAwB,IAAI,CAAC,CAAC,WAAa,CAAC,KAAO,WAAW,YAAc,CAAC,sBAAwB,IAAI,CAAC,CAAC,YAAc,CAAC,KAAO,WAAW,YAAc,CAAC,sBAAwB,IAAI,CAAC,CAAC,WAAa,CAAC,KAAO,WAAW,YAAc,CAAC,sBAAwB,IAAI,CAAC,CAAC,WAAa,CAAC,KAAO,WAAW,YAAc,CAAC,sBAAwB,IAAI,CAAC,CAAC,YAAc,CAAC,KAAO,WAAW,YAAc,CAAC,sBAAwB,IAAI,CAAC,CAAC,WAAa,CAAC,KAAO,WAAW,YAAc,CAAC,sBAAwB,IAAI,CAAC,CAAC,WAAa,CAAC,KAAO,WAAW,YAAc,CAAC,sBAAwB,IAAI,CAAC,CAAC,YAAc,CAAC,KAAO,WAAW,YAAc,CAAC,sBAAwB,IAAI,CAAC,CAAC,YAAc,CAAC,KAAO,WAAW,YAAc,CAAC,sBAAwB,IAAI,CAAC,CAAC,WAAa,CAAC,KAAO,WAAW,YAAc,CAAC,sBAAwB,IAAI,CAAC,CAAC,YAAc,CAAC,KAAO,WAAW,YAAc,CAAC,sBAAwB,IAAI,CAAC,CAAC,YAAc,CAAC,KAAO,WAAW,YAAc,CAAC,sBAAwB,IAAI,CAAC,CAAC,WAAa,CAAC,KAAO,WAAW,YAAc,CAAC,sBAAwB,IAAI,CAAC,CAAC,YAAc,CAAC,KAAO,WAAW,YAAc,CAAC,sBAAwB,IAAI,CAAC,CAAC,WAAa,CAAC,KAAO,WAAW,YAAc,CAAC,sBAAwB,IAAI,CAAC,CAAC,WAAa,CAAC,KAAO,WAAW,YAAc,CAAC,sBAAwB,IAAI,CAAC,CAAC,WAAa,CAAC,KAAO,WAAW,YAAc,CAAC,sBAAwB,IAAI,CAAC,CAAC,YAAc,CAAC,KAAO,WAAW,YAAc,CAAC,sBAAwB,IAAI,CAAC,CAAC,YAAc,CAAC,KAAO,WAAW,YAAc,CAAC,sBAAwB,IAAI,CAAC,CAAC,YAAc,CAAC,KAAO,WAAW,YAAc,CAAC,sBAAwB,IAAI,CAAC,CAAC,YAAc,CAAC,KAAO,WAAW,YAAc,CAAC,sBAAwB,IAAI,CAAC,CAAC,YAAc,CAAC,KAAO,WAAW,YAAc,CAAC,sBAAwB,IAAI,CAAC,CAAC,WAAa,CAAC,KAAO,WAAW,YAAc,CAAC,sBAAwB,IAAI,CAAC,CAAC,WAAa,CAAC,KAAO,WAAW,YAAc,CAAC,sBAAwB,IAAI,CAAC,CAAC,WAAa,CAAC,KAAO,WAAW,YAAc,CAAC,sBAAwB,IAAI,CAAC,CAAC,WAAa,CAAC,KAAO,WAAW,YAAc,CAAC,sBAAwB,IAAI,CAAC,CAAC,YAAc,CAAC,KAAO,WAAW,YAAc,CAAC,sBAAwB,IAAI,CAAC,CAAC,WAAa,CAAC,KAAO,WAAW,YAAc,CAAC,sBAAwB,IAAI,CAAC,CAAC,YAAc,CAAC,KAAO,WAAW,YAAc,CAAC,sBAAwB,IAAI,CAAC,CAAC,YAAc,CAAC,KAAO,WAAW,YAAc,CAAC,sBAAwB,IAAI,CAAC,CAAC,YAAc,CAAC,KAAO,WAAW,YAAc,CAAC,sBAAwB,IAAI,CAAC,CAAC,WAAa,CAAC,KAAO,WAAW,YAAc,CAAC,sBAAwB,IAAI,CAAC,CAAC,WAAa,CAAC,KAAO,WAAW,YAAc,CAAC,sBAAwB,IAAI,CAAC,CAAC,WAAa,CAAC,KAAO,WAAW,YAAc,CAAC,sBAAwB,IAAI,CAAC,CAAC,WAAa,CAAC,KAAO,WAAW,YAAc,CAAC,sBAAwB,IAAI,CAAC,CAAC,WAAa,CAAC,KAAO,WAAW,YAAc,CAAC,sBAAwB,IAAI,CAAC,CAAC,YAAc,CAAC,KAAO,WAAW,YAAc,CAAC,sBAAwB,IAAI,CAAC,CAAC,YAAc,CAAC,KAAO,WAAW,YAAc,CAAC,sBAAwB,IAAI,CAAC,CAAC,WAAa,CAAC,KAAO,WAAW,YAAc,CAAC,sBAAwB,IAAI,CAAC,CAAC,YAAc,CAAC,KAAO,WAAW,YAAc,CAAC,sBAAwB,IAAI,CAAC,CAAC,YAAc,CAAC,KAAO,WAAW,YAAc,CAAC,sBAAwB,IAAI,CAAC,CAAC,YAAc,CAAC,KAAO,WAAW,YAAc,CAAC,sBAAwB,IAAI,CAAC,CAAC,SAAW,CAAC,KAAO,WAAW,YAAc,CAAC,sBAAwB,IAAI,CAAC,CAAC,YAAc,CAAC,KAAO,WAAW,YAAc,CAAC,sBAAwB,IAAI,CAAC,CAAC,WAAa,CAAC,KAAO,WAAW,YAAc,CAAC,sBAAwB,IAAI,CAAC,CAAC,WAAa,CAAC,KAAO,WAAW,YAAc,CAAC,sBAAwB,IAAI,CAAC,CAAC,WAAa,CAAC,KAAO,WAAW,YAAc,CAAC,sBAAwB,IAAI,CAAC,CAAC,UAAY,CAAC,KAAO,WAAW,YAAc,CAAC,sBAAwB,IAAI,CAAC,CAAC,YAAc,CAAC,KAAO,WAAW,YAAc,CAAC,sBAAwB,IAAI,CAAC,CAAC,UAAY,CAAC,KAAO,WAAW,YAAc,CAAC,sBAAwB,IAAI,CAAC,CAAC,YAAc,CAAC,KAAO,WAAW,YAAc,CAAC,sBAAwB,IAAI,CAAC,CAAC,WAAa,CAAC,KAAO,WAAW,YAAc,CAAC,sBAAwB,IAAI,CAAC,CAAC,YAAc,CAAC,KAAO,WAAW,YAAc,CAAC,sBAAwB,IAAI,CAAC,CAAC,WAAa,CAAC,KAAO,WAAW,YAAc,CAAC,sBAAwB,IAAI,CAAC,CAAC,YAAc,CAAC,KAAO,WAAW,YAAc,CAAC,sBAAwB,IAAI,CAAC,CAAC,YAAc,CAAC,KAAO,WAAW,YAAc,CAAC,sBAAwB,IAAI,CAAC,CAAC,WAAa,CAAC,KAAO,WAAW,YAAc,CAAC,sBAAwB,IAAI,CAAC,CAAC,YAAc,CAAC,KAAO,WAAW,YAAc,CAAC,sBAAwB,IAAI,CAAC,CAAC,YAAc,CAAC,KAAO,WAAW,YAAc,CAAC,sBAAwB,IAAI,CAAC,CAAC,YAAc,CAAC,KAAO,WAAW,YAAc,CAAC,sBAAwB,IAAI,CAAC,CAAC,YAAc,CAAC,KAAO,WAAW,YAAc,CAAC,sBAAwB,IAAI,CAAC,CAAC,WAAa,CAAC,KAAO,WAAW,YAAc,CAAC,sBAAwB,IAAI,CAAC,CAAC,WAAa,CAAC,KAAO,WAAW,YAAc,CAAC,sBAAwB,IAAI,CAAC,CAAC,WAAa,CAAC,KAAO,WAAW,YAAc,CAAC,sBAAwB,IAAI,CAAC,CAAC,WAAa,CAAC,KAAO,WAAW,YAAc,CAAC,sBAAwB,IAAI,CAAC,CAAC,UAAY,CAAC,KAAO,WAAW,YAAc,CAAC,sBAAwB,IAAI,CAAC,CAAC,YAAc,CAAC,KAAO,WAAW,YAAc,CAAC,sBAAwB,IAAI,CAAC,CAAC,YAAc,CAAC,KAAO,WAAW,YAAc,CAAC,sBAAwB,IAAI,CAAC,CAAC,YAAc,CAAC,KAAO,WAAW,YAAc,CAAC,sBAAwB,IAAI,CAAC,CAAC,YAAc,CAAC,KAAO,WAAW,YAAc,CAAC,sBAAwB,IAAI,CAAC,CAAC,YAAc,CAAC,KAAO,WAAW,YAAc,CAAC,sBAAwB,IAAI,CAAC,CAAC,YAAc,CAAC,KAAO,WAAW,YAAc,CAAC,sBAAwB,IAAI,CAAC,CAAC,YAAc,CAAC,KAAO,WAAW,YAAc,CAAC,sBAAwB,IAAI,CAAC,CAAC,YAAc,CAAC,KAAO,WAAW,YAAc,CAAC,sBAAwB,IAAI,CAAC,CAAC,WAAa,CAAC,KAAO,WAAW,YAAc,CAAC,sBAAwB,IAAI,CAAC,CAAC,YAAc,CAAC,KAAO,WAAW,YAAc,CAAC,sBAAwB,IAAI,CAAC,CAAC,YAAc,CAAC,KAAO,WAAW,YAAc,CAAC,sBAAwB,IAAI,CAAC,CAAC,WAAa,CAAC,KAAO,WAAW,YAAc,CAAC,sBAAwB,IAAI,CAAC,CAAC,YAAc,CAAC,KAAO,WAAW,YAAc,CAAC,sBAAwB,IAAI,CAAC,CAAC,WAAa,CAAC,KAAO,WAAW,YAAc,CAAC,sBAAwB,IAAI,CAAC,CAAC,YAAc,CAAC,KAAO,WAAW,YAAc,CAAC,sBAAwB,IAAI,CAAC,CAAC,WAAa,CAAC,KAAO,WAAW,YAAc,CAAC,sBAAwB,IAAI,CAAC,CAAC,WAAa,CAAC,KAAO,WAAW,YAAc,CAAC,sBAAwB,IAAI,CAAC,CAAC,YAAc,CAAC,KAAO,WAAW,YAAc,CAAC,sBAAwB,IAAI,CAAC,CAAC,YAAc,CAAC,KAAO,WAAW,YAAc,CAAC,sBAAwB,IAAI,CAAC,CAAC,YAAc,CAAC,KAAO,WAAW,YAAc,CAAC,sBAAwB,IAAI,CAAC,CAAC,YAAc,CAAC,KAAO,WAAW,YAAc,CAAC,sBAAwB,IAAI,CAAC,CAAC,YAAc,CAAC,KAAO,WAAW,YAAc,CAAC,sBAAwB,IAAI,CAAC,CAAC,UAAY,CAAC,KAAO,WAAW,YAAc,CAAC,sBAAwB,IAAI,CAAC,CAAC,YAAc,CAAC,KAAO,WAAW,YAAc,CAAC,sBAAwB,IAAI,CAAC,CAAC,YAAc,CAAC,KAAO,WAAW,YAAc,CAAC,sBAAwB,IAAI,CAAC,CAAC,WAAa,CAAC,KAAO,WAAW,YAAc,CAAC,sBAAwB,IAAI,CAAC,CAAC,YAAc,CAAC,KAAO,WAAW,YAAc,CAAC,sBAAwB,IAAI,CAAC,CAAC,YAAc,CAAC,KAAO,WAAW,YAAc,CAAC,sBAAwB,IAAI,CAAC,CAAC,WAAa,CAAC,KAAO,WAAW,YAAc,CAAC,sBAAwB,IAAI,CAAC,CAAC,YAAc,CAAC,KAAO,WAAW,YAAc,CAAC,sBAAwB,IAAI,CAAC,CAAC,YAAc,CAAC,KAAO,WAAW,YAAc,CAAC,sBAAwB,IAAI,CAAC,CAAC,YAAc,CAAC,KAAO,WAAW,YAAc,CAAC,sBAAwB,IAAI,CAAC,CAAC,YAAc,CAAC,KAAO,WAAW,YAAc,CAAC,sBAAwB,IAAI,CAAC,CAAC,WAAa,CAAC,KAAO,WAAW,YAAc,CAAC,sBAAwB,IAAI,CAAC,CAAC,YAAc,CAAC,KAAO,WAAW,YAAc,CAAC,sBAAwB,IAAI,CAAC,CAAC,YAAc,CAAC,KAAO,WAAW,YAAc,CAAC,sBAAwB,IAAI,CAAC,CAAC,WAAa,CAAC,KAAO,WAAW,YAAc,CAAC,sBAAwB,IAAI,CAAC,CAAC,YAAc,CAAC,KAAO,WAAW,YAAc,CAAC,sBAAwB,IAAI,CAAC,CAAC,YAAc,CAAC,KAAO,WAAW,YAAc,CAAC,sBAAwB,IAAI,CAAC,CAAC,WAAa,CAAC,KAAO,WAAW,YAAc,CAAC,sBAAwB,IAAI,CAAC,CAAC,YAAc,CAAC,KAAO,WAAW,YAAc,CAAC,sBAAwB,IAAI,CAAC,CAAC,UAAY,CAAC,KAAO,WAAW,YAAc,CAAC,sBAAwB,IAAI,CAAC,CAAC,YAAc,CAAC,KAAO,WAAW,YAAc,CAAC,sBAAwB,IAAI,CAAC,CAAC,YAAc,CAAC,KAAO,WAAW,YAAc,CAAC,sBAAwB,IAAI,CAAC,CAAC,UAAY,CAAC,KAAO,WAAW,YAAc,CAAC,sBAAwB,IAAI,CAAC,CAAC,YAAc,CAAC,KAAO,WAAW,YAAc,CAAC,sBAAwB,IAAI,CAAC,CAAC,YAAc,CAAC,KAAO,WAAW,YAAc,CAAC,sBAAwB,IAAI,CAAC,CAAC,WAAa,CAAC,KAAO,WAAW,YAAc,CAAC,sBAAwB,IAAI,CAAC,CAAC,YAAc,CAAC,KAAO,WAAW,YAAc,CAAC,sBAAwB,IAAI,CAAC,CAAC,WAAa,CAAC,KAAO,WAAW,YAAc,CAAC,sBAAwB,IAAI,CAAC,CAAC,YAAc,CAAC,KAAO,WAAW,YAAc,CAAC,sBAAwB,IAAI,CAAC,CAAC,YAAc,CAAC,KAAO,WAAW,YAAc,CAAC,sBAAwB,IAAI,CAAC,CAAC,YAAc,CAAC,KAAO,WAAW,YAAc,CAAC,sBAAwB,IAAI,CAAC,CAAC,YAAc,CAAC,KAAO,WAAW,YAAc,CAAC,sBAAwB,IAAI,CAAC,CAAC,YAAc,CAAC,KAAO,WAAW,YAAc,CAAC,sBAAwB,IAAI,CAAC,CAAC,WAAa,CAAC,KAAO,WAAW,YAAc,CAAC,sBAAwB,IAAI,CAAC,CAAC,YAAc,CAAC,KAAO,WAAW,YAAc,CAAC,sBAAwB,IAAI,CAAC,CAAC,YAAc,CAAC,KAAO,WAAW,YAAc,CAAC,sBAAwB,IAAI,CAAC,CAAC,YAAc,CAAC,KAAO,WAAW,YAAc,CAAC,sBAAwB,IAAI,CAAC,CAAC,WAAa,CAAC,KAAO,WAAW,YAAc,CAAC,sBAAwB,IAAI,CAAC,CAAC,mBAAqB,CAAC,KAAO,WAAW,CAAC,CAAC"}