{
  "version": 3,
  "sources": ["ssg:https://framerusercontent.com/modules/v6qiqVdQy2sNMmWI9NF7/2g1pmlqd8ioOKRQBOKkc/SyBeQVkaI-3.js"],
  "sourcesContent": ["import{jsx as e,jsxs as t}from\"react/jsx-runtime\";import{Link as o}from\"framer\";import{motion as n}from\"framer-motion\";import*as i from\"react\";export const richText=/*#__PURE__*/t(i.Fragment,{children:[/*#__PURE__*/e(\"h3\",{children:\"Integration Overview\"}),/*#__PURE__*/e(\"p\",{children:\"Docker is an open-source platform used to automate the management, deployment, and scaling of applications inside packages called containers. Panther can collect, normalize, and monitor Docker logs to provide complete visibility to your security team over Docker system-level events. Your normalized data is then retained to power future security investigations in a serverless data lake powered by Snowflake.\"}),/*#__PURE__*/e(\"h3\",{children:\"Use Cases for Docker Event Logs\"}),/*#__PURE__*/e(\"p\",{children:\"Panther offers native support for Docker Event logs, which capture system-level events relating to operations performed on containers, images, networks, volumes, and more. Common SIEM use cases for Docker logs include monitoring for:\"}),/*#__PURE__*/t(\"ul\",{children:[/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/e(\"p\",{children:\"Changes to your Docker system\"})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/e(\"p\",{children:\"Actions and their statuses performed in Docker\"})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/e(\"p\",{children:\"Activities within Docker containers\"})})]}),/*#__PURE__*/e(\"h3\",{children:\"Onboarding Docker Logs in Panther\"}),/*#__PURE__*/e(\"p\",{children:\"Panther's integration for Docker is easy to configure, allowing you to onboard your event logs in just a few minutes. You can simply select Docker Events from the list of log sources in the Panther console, and then configure a Fluent Bit file to forward your logs into Panther via an HTTP source.\"}),/*#__PURE__*/t(\"p\",{children:[\"For more detailed steps on onboarding Docker logs or for supported log schema, you can \",/*#__PURE__*/e(o,{href:\"https://docs.panther.com/data-onboarding/supported-logs/docker\",motionChild:!0,nodeId:\"SyBeQVkaI\",openInNewTab:!0,scopeId:\"contentManagement\",smoothScroll:!1,children:/*#__PURE__*/e(n.a,{children:\" view our Docker documentation here\"})}),\".\"]}),/*#__PURE__*/e(\"h3\",{children:\"Normalizing & Analyzing Docker Logs\"}),/*#__PURE__*/e(\"p\",{children:\"As Panther ingests Docker logs, they are parsed, normalized, and stored in a Snowflake security data lake. This empowers security teams to craft detections, identify anomalies, and conduct investigations on your data in the context of days, weeks, or months.\"}),/*#__PURE__*/t(\"p\",{children:[\"Panther's managed schema will apply normalization fields to your Docker logs, which standardize names for attributes and empower users to correlate and investigate data across all log types. For more on searching log data in Panther, \",/*#__PURE__*/e(o,{href:\"https://docs.panther.com/data-analytics\",motionChild:!0,nodeId:\"SyBeQVkaI\",openInNewTab:!0,scopeId:\"contentManagement\",smoothScroll:!1,children:/*#__PURE__*/e(n.a,{children:\" check out our documentation on Investigations & Search\"})}),\".\"]}),/*#__PURE__*/e(\"h3\",{children:\"Detection as Code\"}),/*#__PURE__*/e(\"p\",{children:\"With Panther, your team won't be confined to rigid detection rules as seen in many SIEM platforms. Panther is built with detection-as-code principles, giving you the ability to write Python to define detection logic and to integrate external systems like version control and CI/CD pipelines into your detection engineering workflows. This results in powerful, flexible, and reusable scripting of detections for your security team.\"}),/*#__PURE__*/e(\"h3\",{children:\"Configuring Alerts\"}),/*#__PURE__*/t(\"p\",{children:[\"Panther fires alerts when your detection rules or policies are triggered, and integrates with a variety of \",/*#__PURE__*/e(o,{href:\"https://panther.com/integrations/alerts/\",motionChild:!0,nodeId:\"SyBeQVkaI\",openInNewTab:!1,scopeId:\"contentManagement\",smoothScroll:!1,children:/*#__PURE__*/e(n.a,{children:\" alert destinations \"})}),\" to allow for easy access and management of any Docker alerts. Alerts can also be forwarded to alert context or SOAR platforms for more remediation options.\"]}),/*#__PURE__*/e(\"p\",{children:\"Alerts are categorized in five different severity levels: Info, Low, Medium, High, and Critical. Security teams have the options to dynamically assign severity based on specific log event attributes.\"}),/*#__PURE__*/e(\"h3\",{children:\"Customer Support\"}),/*#__PURE__*/e(\"p\",{children:\"If you have any questions about configuring or monitoring Docker logs in Panther, we're here to help. All customers have access to our technical support team via a dedicated Slack channel, email, or in-app messenger.\"}),/*#__PURE__*/t(\"p\",{children:[\"You can view our \",/*#__PURE__*/e(o,{href:\"https://docs.panther.com/data-onboarding/supported-logs/docker\",motionChild:!0,nodeId:\"SyBeQVkaI\",openInNewTab:!0,scopeId:\"contentManagement\",smoothScroll:!1,children:/*#__PURE__*/e(n.a,{children:\" documentation on configuring and monitoring Docker logs here\"})}),\", or customers can sign up for \",/*#__PURE__*/e(o,{href:\"https://pnthr.io/community\",motionChild:!0,nodeId:\"SyBeQVkaI\",openInNewTab:!0,scopeId:\"contentManagement\",smoothScroll:!1,children:/*#__PURE__*/e(n.a,{children:\" the Panther Community\"})}),\" to share best practices or custom detections for monitoring Docker.\"]}),/*#__PURE__*/e(\"h3\",{children:\"The Ideal SIEM Integration for Docker\"}),/*#__PURE__*/e(\"p\",{children:\"With Panther, security teams don't have to struggle with restrictive detection logic, waste time and resources on operational overhead, or pay skyrocketing costs to keep up with the growth of their organization's data. Panther was founded by a team of veteran security practitioners who struggled with legacy SIEM challenges first-hand, and built an intuitive, cloud-native platform to solve them.\"}),/*#__PURE__*/t(\"p\",{children:[\"Panther is a cloud-native SIEM built for security operations at scale, offering flexible detection-as-code, intuitive security workflows, and actionable real-time alerts to keep up with the needs of today's security teams. For a powerful, flexible, and scalable SIEM solution for Docker,\\xac\u2020\",/*#__PURE__*/e(o,{href:\"https://panther.com/product/request-a-demo/\",motionChild:!0,nodeId:\"SyBeQVkaI\",openInNewTab:!1,scopeId:\"contentManagement\",smoothScroll:!1,children:/*#__PURE__*/e(n.a,{children:\"request a demo\"})}),\"\\xac\u2020today.\"]})]});export const richText1=/*#__PURE__*/t(i.Fragment,{children:[/*#__PURE__*/e(\"h3\",{children:\"Integration Overview\"}),/*#__PURE__*/e(\"p\",{children:\"Netskope is a leading Security Service Edge (SSE) platform that provides visibility, threat protection, and real-time data tools for cloud services, websites, and apps. Panther can collect, normalize, and monitor Netskope logs to help you maximize visibility over your organization's cloud-based activities. Your normalized data is then retained to power future security investigations in a serverless data lake powered by Snowflake.\"}),/*#__PURE__*/e(\"h3\",{children:\"Use Cases for Netskope Audit Logs\"}),/*#__PURE__*/t(\"p\",{children:[\"Panther offers native support for \",/*#__PURE__*/e(o,{href:\"https://docs.netskope.com/en/netskope-help/integrations-439794/netskope-cloud-exchange/cloud-exchange-console/logging/\",motionChild:!0,nodeId:\"SyBeQVkaI\",openInNewTab:!0,scopeId:\"contentManagement\",smoothScroll:!1,children:/*#__PURE__*/e(n.a,{children:\" Netskope audit logs\"})}),\", which capture important events related to Netskope application activities, users, alerts, and other details. Common SIEM use cases for Netskope audit logs include:\"]}),/*#__PURE__*/t(\"ul\",{children:[/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/e(\"p\",{children:\"Corroborating cloud-based activity with other security data\"})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/e(\"p\",{children:\"Investigating incidents such as compromised credentials, malware, or anomalies\"})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/e(\"p\",{children:\"Monitoring changes to administrator accounts or settings\"})})]}),/*#__PURE__*/e(\"h3\",{children:\"Onboarding Netskope Logs in Panther\"}),/*#__PURE__*/e(\"p\",{children:\"Panther's integration for Netskope is simple to configure, allowing you to onboard logs in just a few minutes. You can select Netskope from the list of log sources in the Panther console, create API credentials in the Netskope Admin Console, and then submit those credentials into the Panther setup menu.\"}),/*#__PURE__*/t(\"p\",{children:[\"For more detailed steps on onboarding Netskope audit logs or for supported schema, you can \",/*#__PURE__*/e(o,{href:\"https://docs.panther.com/data-onboarding/supported-logs/netskope\",motionChild:!0,nodeId:\"SyBeQVkaI\",openInNewTab:!0,scopeId:\"contentManagement\",smoothScroll:!1,children:/*#__PURE__*/e(n.a,{children:\" view our Netskope documentation here\"})}),\".\"]}),/*#__PURE__*/e(\"h3\",{children:\"Normalizing & Analyzing Netskope Logs\"}),/*#__PURE__*/e(\"p\",{children:\"As Panther ingests Netskope logs, they are parsed, normalized, and stored in a Snowflake security data lake. This empowers security teams to craft detections, identify anomalies, and conduct investigations on logs in the context of days, weeks, or months of data.\"}),/*#__PURE__*/t(\"p\",{children:[\"Panther applies normalization fields to all log records, which standardizes names for attributes and empowers users to correlate and investigate data across all log types. For more on searching log data in Panther, \",/*#__PURE__*/e(o,{href:\"https://docs.panther.com/data-analytics\",motionChild:!0,nodeId:\"SyBeQVkaI\",openInNewTab:!0,scopeId:\"contentManagement\",smoothScroll:!1,children:/*#__PURE__*/e(n.a,{children:\" check out our documentation on Investigations & Search\"})}),\".\"]}),/*#__PURE__*/e(\"h3\",{children:\"Detection as Code\"}),/*#__PURE__*/e(\"p\",{children:\"With Panther, your team won't be confined to rigid detection rules as required by many SIEM platforms. Panther is built with detection-as-code principles, giving you the ability to write Python to define detection logic and to integrate external systems like version control and CI/CD pipelines into your detection engineering workflows. This results in powerful, flexible, and reusable scripting of detections for your security team.\"}),/*#__PURE__*/e(\"h3\",{children:\"Configuring Alerts\"}),/*#__PURE__*/t(\"p\",{children:[\"Panther fires alerts when your detection rules or policies are triggered, and integrates with a variety of \",/*#__PURE__*/e(o,{href:\"https://panther.com/integrations/alerts/\",motionChild:!0,nodeId:\"SyBeQVkaI\",openInNewTab:!1,scopeId:\"contentManagement\",smoothScroll:!1,children:/*#__PURE__*/e(n.a,{children:\" alert destinations \"})}),\" to allow for easy access and management of any Netskope alerts. Alerts can also be forwarded to alert context or SOAR platforms for more remediation options.\"]}),/*#__PURE__*/e(\"p\",{children:\"Alerts are categorized in five different severity levels: Info, Low, Medium, High, and Critical. Security teams have the options to dynamically assign severity based on specific log event attributes.\"}),/*#__PURE__*/e(\"h3\",{children:\"Customer Support\"}),/*#__PURE__*/e(\"p\",{children:\"If you have any questions about configuring or monitoring Netskope logs in Panther, we're here to help. All customers have access to our technical support team via a dedicated Slack channel, email, or in-app messenger.\"}),/*#__PURE__*/t(\"p\",{children:[\"You can view our \",/*#__PURE__*/e(o,{href:\"https://docs.panther.com/data-onboarding/supported-logs/netskope\",motionChild:!0,nodeId:\"SyBeQVkaI\",openInNewTab:!0,scopeId:\"contentManagement\",smoothScroll:!1,children:/*#__PURE__*/e(n.a,{children:\" documentation on configuring and monitoring Netskope logs here\"})}),\", or customers can sign up for \",/*#__PURE__*/e(o,{href:\"https://pnthr.io/community\",motionChild:!0,nodeId:\"SyBeQVkaI\",openInNewTab:!0,scopeId:\"contentManagement\",smoothScroll:!1,children:/*#__PURE__*/e(n.a,{children:\" the Panther Community\"})}),\" to share best practices or custom detections for monitoring Netskope.\"]}),/*#__PURE__*/e(\"h3\",{children:\"The Ideal SIEM Integration for Netskope\"}),/*#__PURE__*/e(\"p\",{children:\"With Panther, security teams don't have to struggle with restrictive detection logic, waste time and resources on operational overhead, or pay skyrocketing costs to keep up with the growth of cloud app data. Panther was founded by a team of veteran security practitioners who struggled with legacy SIEM challenges first-hand, and built an intuitive, cloud-native platform to solve them.\"}),/*#__PURE__*/t(\"p\",{children:[\"Panther is a cloud SIEM built for security operations at scale, offering flexible detection-as-code, intuitive security workflows, and actionable real-time alerts to keep up with the needs of today's security teams. For a powerful, flexible, and scalable SIEM integration for Netskope, \",/*#__PURE__*/e(o,{href:\"https://panther.com/product/request-a-demo/\",motionChild:!0,nodeId:\"SyBeQVkaI\",openInNewTab:!1,scopeId:\"contentManagement\",smoothScroll:!1,children:/*#__PURE__*/e(n.a,{children:\" request a demo today\"})}),\".\"]})]});export const richText2=/*#__PURE__*/t(i.Fragment,{children:[/*#__PURE__*/e(\"h3\",{children:\"Integration Overview\"}),/*#__PURE__*/e(\"p\",{children:\"Auditd, also known as Linux Audit Daemon, is a Linux Auditing System component that captures system events on Linux machines. Panther can collect, normalize, and monitor Auditd logs to help you maximize visibility over system-level activities in your Linux environment. Your normalized data is then retained to power future security investigations in a serverless data lake powered by Snowflake.\"}),/*#__PURE__*/e(\"h3\",{children:\"Use Cases for Auditd Logs\"}),/*#__PURE__*/e(\"p\",{children:\"Panther offers native support for Linux.Auditd logs, which collect audit log file records such as system calls, file access details, and security policy violations. Common security use cases for Auditd logs include:\"}),/*#__PURE__*/t(\"ul\",{children:[/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/e(\"p\",{children:\"Observing system-level activities and identifying unusual patterns\"})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/e(\"p\",{children:\"Detecting potential security violations or suspicious behaviors in your Linux systems\"})})]}),/*#__PURE__*/e(\"h3\",{children:\"Onboarding Auditd Logs in Panther\"}),/*#__PURE__*/e(\"p\",{children:\"Panther's integration for Auditd is simple to configure, allowing you to stream your logs in just a few minutes. You'll simply select Auditd from the list of log sources in the Panther console, and then create a Fluent Bit to forward your Auditd logs.\"}),/*#__PURE__*/t(\"p\",{children:[\"For more detailed steps on onboarding Auditd audit logs or for supported schema, you can \",/*#__PURE__*/e(o,{href:\"https://docs.panther.com/data-onboarding/supported-logs/auditd-logs\",motionChild:!0,nodeId:\"SyBeQVkaI\",openInNewTab:!0,scopeId:\"contentManagement\",smoothScroll:!1,children:/*#__PURE__*/e(n.a,{children:\" view our Auditd documentation here\"})}),\".\"]}),/*#__PURE__*/e(\"h3\",{children:\"Normalizing & Analyzing Auditd Logs\"}),/*#__PURE__*/e(\"p\",{children:\"As Panther ingests Auditd logs, they are parsed, normalized, and stored in a Snowflake security data lake. This empowers security teams to craft detections, identify anomalies, and conduct investigations on logs in the context of days, weeks, or months of data.\"}),/*#__PURE__*/t(\"p\",{children:[\"Panther applies normalization fields to all log records, which standardizes names for attributes and empowers users to correlate and investigate data across all log types. For more on searching log data in Panther, \",/*#__PURE__*/e(o,{href:\"https://docs.panther.com/data-analytics\",motionChild:!0,nodeId:\"SyBeQVkaI\",openInNewTab:!0,scopeId:\"contentManagement\",smoothScroll:!1,children:/*#__PURE__*/e(n.a,{children:\" check out our documentation on Investigations & Search\"})}),\".\"]}),/*#__PURE__*/e(\"h3\",{children:\"Detection as Code\"}),/*#__PURE__*/e(\"p\",{children:\"With Panther, your team won't be confined to rigid detection rules as required by many SIEM platforms. Panther is built with detection-as-code principles, giving you the ability to write Python to define detection logic and to integrate external systems like version control and CI/CD pipelines into your detection engineering workflows. This results in powerful, flexible, and reusable scripting of detections for your security team.\"}),/*#__PURE__*/e(\"h3\",{children:\"Configuring Alerts\"}),/*#__PURE__*/t(\"p\",{children:[\"Panther fires alerts when your detection rules or policies are triggered, and integrates with a variety of \",/*#__PURE__*/e(o,{href:\"https://panther.com/integrations/alerts/\",motionChild:!0,nodeId:\"SyBeQVkaI\",openInNewTab:!1,scopeId:\"contentManagement\",smoothScroll:!1,children:/*#__PURE__*/e(n.a,{children:\" alert destinations\"})}),\" to allow for easy review and management of any Auditd alerts. Alerts can also be forwarded to alert context or SOAR platforms for more remediation options.\"]}),/*#__PURE__*/e(\"p\",{children:\"Alerts are categorized in five different severity levels: Info, Low, Medium, High, and Critical. Security teams have the options to dynamically assign severity based on specific log event attributes.\"}),/*#__PURE__*/e(\"h3\",{children:\"Customer Support\"}),/*#__PURE__*/e(\"p\",{children:\"If you have any questions about configuring or monitoring Auditd logs in Panther, we're here to help. All customers have access to our technical support team via a dedicated Slack channel, email, or in-app messenger.\"}),/*#__PURE__*/t(\"p\",{children:[\"You can view our \",/*#__PURE__*/e(o,{href:\"https://docs.panther.com/data-onboarding/supported-logs/auditd-logs\",motionChild:!0,nodeId:\"SyBeQVkaI\",openInNewTab:!0,scopeId:\"contentManagement\",smoothScroll:!1,children:/*#__PURE__*/e(n.a,{children:\" documentation on configuring and monitoring Auditd logs here\"})}),\", or customers can sign up for \",/*#__PURE__*/e(o,{href:\"https://pnthr.io/community\",motionChild:!0,nodeId:\"SyBeQVkaI\",openInNewTab:!0,scopeId:\"contentManagement\",smoothScroll:!1,children:/*#__PURE__*/e(n.a,{children:\" the Panther Community\"})}),\" to share best practices or custom detections for monitoring Auditd.\"]}),/*#__PURE__*/e(\"h3\",{children:\"The Ideal SIEM for Auditd Logs\"}),/*#__PURE__*/e(\"p\",{children:\"With Panther, security teams don't have to struggle with restrictive detection logic, waste time and resources on operational overhead, or pay skyrocketing costs to keep up with the growth of their organization's data. Panther was founded by a team of veteran security practitioners who struggled with legacy SIEM challenges first-hand, and built an intuitive, cloud-native platform to solve them.\"}),/*#__PURE__*/t(\"p\",{children:[\"Panther is a cloud SIEM built for security operations at scale, offering flexible detection-as-code, intuitive security workflows, and actionable real-time alerts to keep up with the needs of today's security teams. For a powerful, flexible, and scalable SIEM solution for Auditd, \",/*#__PURE__*/e(o,{href:\"https://panther.com/product/request-a-demo/\",motionChild:!0,nodeId:\"SyBeQVkaI\",openInNewTab:!1,scopeId:\"contentManagement\",smoothScroll:!1,children:/*#__PURE__*/e(n.a,{children:\"request a demo\"})}),\" today.\"]})]});export const richText3=/*#__PURE__*/t(i.Fragment,{children:[/*#__PURE__*/e(\"h3\",{children:\"Integration Overview\"}),/*#__PURE__*/e(\"p\",{children:\"Heroku is a cloud Platform as a Service (PaaS) used by developers to deploy, manage, and scale applications. Panther can collect, normalize, and monitor Heroku logs to maximize visibility over your applications, app infrastructure, and relevant administrative actions. Your normalized data is then retained to power future security investigations in a serverless data lake powered by Snowflake.\"}),/*#__PURE__*/e(\"h3\",{children:\"Use Cases for Heroku Logs\"}),/*#__PURE__*/t(\"p\",{children:[\"Panther offers native support for \",/*#__PURE__*/e(o,{href:\"https://devcenter.heroku.com/articles/logging#runtime-logs\",motionChild:!0,nodeId:\"SyBeQVkaI\",openInNewTab:!0,scopeId:\"contentManagement\",smoothScroll:!1,children:/*#__PURE__*/e(n.a,{children:\" Heroku Runtime logs\"})}),\", which aggregate four categories of log events: App, System, API, and Add-on logs. These logs provide essential information, including the actor, timestamp, and details of a performed action. Common security use cases for these log types include:\"]}),/*#__PURE__*/t(\"ul\",{children:[/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/e(\"p\",{children:\"Monitoring for unauthorized access to sensitive information or unusual login behavior\"})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/e(\"p\",{children:\"Tracking changes made to important documents or databases to ensure accuracy and accountability\"})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/e(\"p\",{children:\"Investigating incidents or issues that arise within a workspace or database for effective resolution\"})})]}),/*#__PURE__*/e(\"h3\",{children:\"Onboarding Heroku Logs in Panther\"}),/*#__PURE__*/t(\"p\",{children:[\"Heroku Runtime logs are simple to onboard in Panther by streaming them directly via an HTTP source (webhook). To set up a Heroku Log data stream in Panther, you'll first create a new HTTP Source within the Panther console, and then create a \",/*#__PURE__*/e(o,{href:\"https://devcenter.heroku.com/articles/log-drains#https-drains\",motionChild:!0,nodeId:\"SyBeQVkaI\",openInNewTab:!0,scopeId:\"contentManagement\",smoothScroll:!1,children:/*#__PURE__*/e(n.a,{children:\" Heroku log drain \"})}),\" to connect the stream.\"]}),/*#__PURE__*/t(\"p\",{children:[\"For more detailed steps on onboarding Heroku Logs or for supported log schema, you can \",/*#__PURE__*/e(o,{href:\"https://docs.panther.com/data-onboarding/supported-logs/heroku\",motionChild:!0,nodeId:\"SyBeQVkaI\",openInNewTab:!0,scopeId:\"contentManagement\",smoothScroll:!1,children:/*#__PURE__*/e(n.a,{children:\" view our Heroku documentation here\"})}),\".\"]}),/*#__PURE__*/e(\"h3\",{children:\"Normalizing & Analyzing Heroku Logs\"}),/*#__PURE__*/e(\"p\",{children:\"As Panther ingests Heroku Logs, they are parsed, normalized, and stored in a Snowflake security data lake. This empowers security teams to craft detections, identify anomalies, and conduct investigations on logs in the context of days, weeks, or months of data.\"}),/*#__PURE__*/t(\"p\",{children:[\"Panther applies normalization fields to all log records, which standardizes names for attributes and empowers users to correlate and investigate data across all log types. For more on searching log data in Panther, \",/*#__PURE__*/e(o,{href:\"https://docs.panther.com/data-analytics\",motionChild:!0,nodeId:\"SyBeQVkaI\",openInNewTab:!0,scopeId:\"contentManagement\",smoothScroll:!1,children:/*#__PURE__*/e(n.a,{children:\" check out our documentation on Investigations & Search\"})}),\".\"]}),/*#__PURE__*/e(\"h3\",{children:\"Detection as Code\"}),/*#__PURE__*/e(\"p\",{children:\"With Panther, your team won't be confined to restrictive detection logic as seen in many SIEM platforms. Panther is built with detection-as-code principles, giving you the ability to write Python to define detections and to integrate external systems like version control and CI/CD pipelines into your detection engineering workflows. This results in powerful, flexible, and reusable scripting of detections for your security team.\"}),/*#__PURE__*/e(\"h3\",{children:\"Configuring Alerts\"}),/*#__PURE__*/t(\"p\",{children:[\"Panther fires alerts when your detection rules or policies are triggered, and integrates with a variety of \",/*#__PURE__*/e(o,{href:\"https://panther.com/integrations/alerts/\",motionChild:!0,nodeId:\"SyBeQVkaI\",openInNewTab:!1,scopeId:\"contentManagement\",smoothScroll:!1,children:/*#__PURE__*/e(n.a,{children:\" alert destinations\"})}),\" to allow for easy access and management of any Heroku alerts. Alerts can also be forwarded to alert context or SOAR platforms for more remediation options.\"]}),/*#__PURE__*/e(\"p\",{children:\"Alerts are categorized into five severity levels: Info, Low, Medium, High, and Critical. Security teams have the options to dynamically assign severity based on specific log event attributes.\"}),/*#__PURE__*/e(\"h3\",{children:\"Customer Support\"}),/*#__PURE__*/e(\"p\",{children:\"If you have any questions about configuring or monitoring Heroku logs in Panther, we're here to help. All customers have access to our technical support team via a dedicated Slack channel, email, or in-app messenger.\"}),/*#__PURE__*/t(\"p\",{children:[\"You can view our \",/*#__PURE__*/e(o,{href:\"https://docs.panther.com/data-onboarding/supported-logs/heroku\",motionChild:!0,nodeId:\"SyBeQVkaI\",openInNewTab:!0,scopeId:\"contentManagement\",smoothScroll:!1,children:/*#__PURE__*/e(n.a,{children:\" documentation on configuring and monitoring Heroku Logs here\"})}),\", or customers can sign up for \",/*#__PURE__*/e(o,{href:\"https://pnthr.io/community\",motionChild:!0,nodeId:\"SyBeQVkaI\",openInNewTab:!0,scopeId:\"contentManagement\",smoothScroll:!1,children:/*#__PURE__*/e(n.a,{children:\" the Panther Community\"})}),\" to share best practices or custom detections for monitoring Heroku.\"]}),/*#__PURE__*/e(\"h3\",{children:\"The Ideal SIEM for Heroku Logs\"}),/*#__PURE__*/e(\"p\",{children:\"With Panther, you won't have to struggle with restrictive detection logic, waste time and resources on operational overhead, or pay skyrocketing costs as you scale up data ingestion. Panther was founded by a team of veteran security practitioners who struggled with legacy SIEM challenges first-hand, and built an intuitive platform to solve them.\"}),/*#__PURE__*/t(\"p\",{children:[\"Panther is a cloud-native SIEM built for security operations at scale, offering flexible detection-as-code, intuitive security workflows, and actionable real-time alerts to keep up with the needs of today's security teams. For a powerful, flexible, and scalable SIEM integration for Heroku,\\xac\u2020\",/*#__PURE__*/e(o,{href:\"https://panther.com/product/request-a-demo/\",motionChild:!0,nodeId:\"SyBeQVkaI\",openInNewTab:!1,scopeId:\"contentManagement\",smoothScroll:!1,children:/*#__PURE__*/e(n.a,{children:\"request a demo today\"})}),\".\\xac\u2020\"]})]});export const richText4=/*#__PURE__*/t(i.Fragment,{children:[/*#__PURE__*/e(\"h3\",{children:\"Integration Overview\"}),/*#__PURE__*/e(\"p\",{children:\"The Windows Event Log captures notification details for application, system, and security activities from Windows operating systems. Panther can collect, normalize, and monitor Windows Event Logs to help you audit security events, correlate data with other log types, or diagnose problems or trends on Windows machines. Your normalized data is then retained to power future security investigations in a serverless data lake powered by Snowflake.\"}),/*#__PURE__*/e(\"h3\",{children:\"Use Cases for Windows Event Logs\"}),/*#__PURE__*/e(\"p\",{children:\"There are five types of events captured by Windows Event Logs: errors, warnings, successful security access attempts, failed security access attempts, and information notifications. Common security use cases for monitoring Windows Event Logs include:\"}),/*#__PURE__*/t(\"ul\",{children:[/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/e(\"p\",{children:\"Monitoring user actions and system events using Sysmon\"})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/e(\"p\",{children:\"Identifying potential security breaches or suspicious behavior on your Windows machines\"})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/e(\"p\",{children:\"Corroborating Windows OS activity details with other data sources\"})})]}),/*#__PURE__*/e(\"h3\",{children:\"Onboarding Windows Event Logs in Panther\"}),/*#__PURE__*/e(\"p\",{children:\"Windows Event Log data can be streamed directly to Panther via HTTPS. To set up a Windows Event Log data stream in Panther, you'll first create a new HTTP Source within the Panther console, and then create a Fluent Bit configuration file to forward your Windows Event Log data.\"}),/*#__PURE__*/t(\"p\",{children:[\"For more detailed steps on onboarding Windows Event Logs or for supported log schema, you can \",/*#__PURE__*/e(o,{href:\"https://docs.panther.com/data-onboarding/supported-logs/windows-event-logs\",motionChild:!0,nodeId:\"SyBeQVkaI\",openInNewTab:!0,scopeId:\"contentManagement\",smoothScroll:!1,children:/*#__PURE__*/e(n.a,{children:\" view our Windows Event documentation here\"})}),\".\"]}),/*#__PURE__*/e(\"h3\",{children:\"Normalizing & Analyzing Windows Event Logs\"}),/*#__PURE__*/e(\"p\",{children:\"As Panther ingests Windows Event Logs, they are parsed, normalized, and stored in a Snowflake security data lake. This empowers security teams to craft detections, identify anomalies, and conduct investigations on logs in the context of days, weeks, or months of data.\"}),/*#__PURE__*/t(\"p\",{children:[\"Panther applies normalization fields to all log records, which standardizes names for attributes and empowers users to correlate and investigate data across all log types. For more on searching log data in Panther, \",/*#__PURE__*/e(o,{href:\"https://docs.panther.com/data-analytics\",motionChild:!0,nodeId:\"SyBeQVkaI\",openInNewTab:!0,scopeId:\"contentManagement\",smoothScroll:!1,children:/*#__PURE__*/e(n.a,{children:\" check out our documentation on Investigations & Search\"})}),\".\"]}),/*#__PURE__*/e(\"h3\",{children:\"Detection as Code\"}),/*#__PURE__*/e(\"p\",{children:\"With Panther, your team won't be confined to rigid detection rules as seen in many SIEM platforms. Panther is built with detection-as-code principles, giving you the ability to write Python to define detection logic and to integrate external systems like version control and CI/CD pipelines into your detection engineering workflows. This results in powerful, flexible, and reusable scripting of detections for your security team.\"}),/*#__PURE__*/e(\"h3\",{children:\"Configuring Alerts\"}),/*#__PURE__*/t(\"p\",{children:[\"Panther fires alerts when your detection rules or policies are triggered, and integrates with a variety of \",/*#__PURE__*/e(o,{href:\"https://panther.com/integrations/alerts/\",motionChild:!0,nodeId:\"SyBeQVkaI\",openInNewTab:!1,scopeId:\"contentManagement\",smoothScroll:!1,children:/*#__PURE__*/e(n.a,{children:\" alert destinations \"})}),\" to allow for easy access and management of any Windows Event Log alerts. Alerts can also be forwarded to alert context or SOAR platforms for more remediation options.\"]}),/*#__PURE__*/e(\"p\",{children:\"Alerts are categorized in five different severity levels: Info, Low, Medium, High, and Critical. Security teams have the options to dynamically assign severity based on specific log event attributes.\"}),/*#__PURE__*/e(\"h3\",{children:\"Customer Support\"}),/*#__PURE__*/e(\"p\",{children:\"If you have any questions about configuring or monitoring Windows Event Log data in Panther, we're here to help. All customers have access to our technical support team via a dedicated Slack channel, email, or in-app messenger.\"}),/*#__PURE__*/t(\"p\",{children:[\"You can view our \",/*#__PURE__*/e(o,{href:\"https://docs.panther.com/data-onboarding/supported-logs/windows-event-logs\",motionChild:!0,nodeId:\"SyBeQVkaI\",openInNewTab:!0,scopeId:\"contentManagement\",smoothScroll:!1,children:/*#__PURE__*/e(n.a,{children:\" documentation on configuring and monitoring Windows Event Logs here\"})}),\", or customers can sign up for \",/*#__PURE__*/e(o,{href:\"https://pnthr.io/community\",motionChild:!0,nodeId:\"SyBeQVkaI\",openInNewTab:!0,scopeId:\"contentManagement\",smoothScroll:!1,children:/*#__PURE__*/e(n.a,{children:\" the Panther Community\"})}),\" to share best practices or custom detections for monitoring Windows Event.\"]}),/*#__PURE__*/e(\"h3\",{children:\"The Ideal SIEM for Windows Event Logs\"}),/*#__PURE__*/e(\"p\",{children:\"With Panther, you won't have to struggle with restrictive detection logic, waste time and resources on operational overhead, or pay skyrocketing costs as you scale up data ingestion. Panther was founded by a team of veteran security practitioners who struggled with legacy SIEM challenges first-hand, and built an intuitive platform to solve them.\"}),/*#__PURE__*/t(\"p\",{children:[\"Panther is a cloud-native SIEM built for security operations at scale, offering flexible detection-as-code, intuitive security workflows, and actionable real-time alerts to keep up with the needs of today's security teams. For a powerful, flexible, and scalable SIEM solution for Windows Event Logs, \",/*#__PURE__*/e(o,{href:\"https://panther.com/product/request-a-demo/\",motionChild:!0,nodeId:\"SyBeQVkaI\",openInNewTab:!1,scopeId:\"contentManagement\",smoothScroll:!1,children:/*#__PURE__*/e(n.a,{children:\" request a demo today\"})}),\".\\xac\u2020\"]})]});export const richText5=/*#__PURE__*/t(i.Fragment,{children:[/*#__PURE__*/e(\"h3\",{children:\"Integration Overview\"}),/*#__PURE__*/e(\"p\",{children:\"Tailscale is a fast and reliable VPN service that provides secure remote access to shared resources through peer-to-peer mesh networks (called tailnets). Panther can collect, normalize, and monitor Tailscale logs to help you identify suspicious activity in real time. Your normalized data is then retained to power future security investigations in a serverless data lake powered by Snowflake.\"}),/*#__PURE__*/e(\"h3\",{children:\"Use Cases for Tailscale Logs\"}),/*#__PURE__*/t(\"p\",{children:[\"Panther offers native support for Tailscale's audit and network flow log types. \",/*#__PURE__*/e(o,{href:\"https://tailscale.com/kb/1203/audit-logging/\",motionChild:!0,nodeId:\"SyBeQVkaI\",openInNewTab:!0,scopeId:\"contentManagement\",smoothScroll:!1,children:/*#__PURE__*/e(n.a,{children:\" Tailscale audit logs \"})}),\" capture information and timestamps for user actions in your tailnet, while \",/*#__PURE__*/e(o,{href:\"https://tailscale.com/kb/1219/network-flow-logs/\",motionChild:!0,nodeId:\"SyBeQVkaI\",openInNewTab:!0,scopeId:\"contentManagement\",smoothScroll:!1,children:/*#__PURE__*/e(n.a,{children:\" network flow logs \"})}),\" help you understand which nodes connected to which other nodes, and when, on your Tailscale network. Common SIEM use cases for monitoring these log types include:\"]}),/*#__PURE__*/t(\"ul\",{children:[/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/e(\"p\",{children:\"Monitoring for any changes to Magic DNS settings\"})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/e(\"p\",{children:\"Detecting when HTTPS Certificate settings are disabled\"})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/e(\"p\",{children:\"Identifying when Machine Approval Requirement settings are disabled\"})})]}),/*#__PURE__*/e(\"h3\",{children:\"Onboarding Tailscale Logs in Panther\"}),/*#__PURE__*/e(\"p\",{children:\"Panther's integration for Tailscale is simple to configure, allowing you to onboard logs in just a few minutes. You'll first create a new log source in Panther, then create a new Log Stream in Tailscale and choose Panther from the list of destinations to send events to a Panther HTTP endpoint.\"}),/*#__PURE__*/t(\"p\",{children:[\"For more detailed steps on onboarding Tailscale logs or for supported log schema, you can \",/*#__PURE__*/e(o,{href:\"https://docs.panther.com/data-onboarding/supported-logs/tailscale\",motionChild:!0,nodeId:\"SyBeQVkaI\",openInNewTab:!0,scopeId:\"contentManagement\",smoothScroll:!1,children:/*#__PURE__*/e(n.a,{children:\" view our Tailscale documentation here\"})}),\".\"]}),/*#__PURE__*/e(\"h3\",{children:\"Normalizing & Analyzing Tailscale Logs\"}),/*#__PURE__*/e(\"p\",{children:\"As Panther ingests Tailscale logs, they are parsed, normalized, and stored in a Snowflake security data lake. This empowers security teams to craft detections, identify anomalies, and conduct investigations on logs in the context of days, weeks, or months of data.\"}),/*#__PURE__*/t(\"p\",{children:[\"Panther applies normalization fields to all log records, which standardizes names for attributes and empowers users to correlate and investigate data across all log types. For more on searching log data in Panther, \",/*#__PURE__*/e(o,{href:\"https://docs.panther.com/data-analytics\",motionChild:!0,nodeId:\"SyBeQVkaI\",openInNewTab:!0,scopeId:\"contentManagement\",smoothScroll:!1,children:/*#__PURE__*/e(n.a,{children:\" check out our documentation on Investigations & Search\"})}),\".\"]}),/*#__PURE__*/e(\"h3\",{children:\"Detection as Code\"}),/*#__PURE__*/e(\"p\",{children:\"With Panther, your team won't be confined to rigid detection rules as seen in many SIEM platforms. Panther is built with detection-as-code principles, giving you the ability to write Python to define detection logic and to integrate external systems like version control and CI/CD pipelines into your detection engineering workflows. This results in powerful, flexible, and reusable scripting of detections for your security team.\"}),/*#__PURE__*/t(\"p\",{children:[\"A number of pre-built detections for Tailscale are available by default in Panther, offering you the ability to immediately monitor your Tailscale network for common vulnerabilities. You can \",/*#__PURE__*/e(o,{href:\"https://panther.com/product/detection-coverage/#filter=tailscale\",motionChild:!0,nodeId:\"SyBeQVkaI\",openInNewTab:!1,scopeId:\"contentManagement\",smoothScroll:!1,children:/*#__PURE__*/e(n.a,{children:\" explore our built-in detection coverage for Tailscale logs here\"})}),\".\"]}),/*#__PURE__*/e(\"h3\",{children:\"Configuring Alerts\"}),/*#__PURE__*/t(\"p\",{children:[\"Panther fires alerts when your detection rules or policies are triggered, and integrates with a variety of \",/*#__PURE__*/e(o,{href:\"https://panther.com/integrations/alerts/\",motionChild:!0,nodeId:\"SyBeQVkaI\",openInNewTab:!1,scopeId:\"contentManagement\",smoothScroll:!1,children:/*#__PURE__*/e(n.a,{children:\" alert destinations \"})}),\" to allow for easy access and management of any Tailscale alerts. Alerts can also be forwarded to alert context or SOAR platforms for more remediation options.\"]}),/*#__PURE__*/e(\"p\",{children:\"Alerts are categorized in five different severity levels: Info, Low, Medium, High, and Critical. Security teams have the options to dynamically assign severity based on specific log event attributes.\"}),/*#__PURE__*/e(\"h3\",{children:\"Customer Support\"}),/*#__PURE__*/e(\"p\",{children:\"If you have any questions about configuring or monitoring Tailscale logs in Panther, we're here to help. All customers have access to our technical support team via a dedicated Slack channel, email, or in-app messenger.\"}),/*#__PURE__*/t(\"p\",{children:[\"You can view our \",/*#__PURE__*/e(o,{href:\"https://docs.panther.com/data-onboarding/supported-logs/tailscale\",motionChild:!0,nodeId:\"SyBeQVkaI\",openInNewTab:!0,scopeId:\"contentManagement\",smoothScroll:!1,children:/*#__PURE__*/e(n.a,{children:\" documentation on configuring and monitoring Tailscale logs here\"})}),\", or customers can sign up for \",/*#__PURE__*/e(o,{href:\"https://pnthr.io/community\",motionChild:!0,nodeId:\"SyBeQVkaI\",openInNewTab:!0,scopeId:\"contentManagement\",smoothScroll:!1,children:/*#__PURE__*/e(n.a,{children:\" the Panther Community\"})}),\" to share best practices or custom detections for monitoring Tailscale.\"]}),/*#__PURE__*/e(\"h3\",{children:\"Protect Your Tailscale Environment\"}),/*#__PURE__*/e(\"p\",{children:\"With Panther, security teams don't have to struggle with restrictive detection logic, waste time and resources on operational overhead, or pay skyrocketing costs to keep up with the growth of cloud app data. Panther was founded by a team of veteran security practitioners who struggled with legacy SIEM challenges first-hand, and built an intuitive, cloud-native platform to solve them.\"}),/*#__PURE__*/t(\"p\",{children:[\"Panther is a cloud-native SIEM built for security operations at scale, offering flexible detection-as-code, intuitive security workflows, and actionable real-time alerts to keep up with the needs of today's security teams. For a powerful, flexible, and scalable SIEM solution for Tailscale, \",/*#__PURE__*/e(o,{href:\"https://panther.com/product/request-a-demo/\",motionChild:!0,nodeId:\"SyBeQVkaI\",openInNewTab:!1,scopeId:\"contentManagement\",smoothScroll:!1,children:/*#__PURE__*/e(n.a,{children:\"request a demo today\"})}),\".\\xac\u2020\"]})]});export const richText6=/*#__PURE__*/t(i.Fragment,{children:[/*#__PURE__*/e(\"h3\",{children:\"Integration Overview\"}),/*#__PURE__*/e(\"p\",{children:\"Auth0 offers a secure and scalable solution for managing user identities, providing features like multi-factor authentication, passwordless login, and centralized identity management to protect against data breaches and unauthorized access. Panther can collect, normalize, and analyze Auth0 logs to help you identify suspicious activity in real time. Your normalized data is then retained to power future security investigations in a serverless data lake.\"}),/*#__PURE__*/e(\"h3\",{children:\"Use Cases for Auth0 Logs\"}),/*#__PURE__*/t(\"p\",{children:[/*#__PURE__*/e(o,{href:\"https://auth0.com/docs/deploy-monitor/logs\",motionChild:!0,nodeId:\"SyBeQVkaI\",openInNewTab:!0,scopeId:\"contentManagement\",smoothScroll:!1,children:/*#__PURE__*/e(n.a,{children:\" Auth0.Events are event logs \"})}),\" from the Auth0 log stream, and include details on events such as administrator actions, API operations, user authentications, various errors, and usage patterns. Some common security use cases for Auth0 logs include:\"]}),/*#__PURE__*/t(\"ul\",{children:[/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/e(\"p\",{children:\"Monitoring admin actions\"})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/e(\"p\",{children:\"Detecting potentially compromised login events\"})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/e(\"p\",{children:\"Monitoring changes to MFA settings\"})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/e(\"p\",{children:\"Identifying potential security threats such as brute-force attacks or account hijacking attempts\"})})]}),/*#__PURE__*/e(\"h3\",{children:\"Streaming Auth0 Logs into Panther\"}),/*#__PURE__*/e(\"p\",{children:\"Panther can ingest Auth0 tenant logs by configuring Auth0's log streaming service to post events to a Panther HTTP source. Simply select Auth0 from the list of log sources in the Panther console, create a new Log Stream in Auth0, and configure an HTTP source in Panther.\"}),/*#__PURE__*/t(\"p\",{children:[\"For more details on onboarding Auth0 logs or for supported log schema, you can \",/*#__PURE__*/e(o,{href:\"https://docs.panther.com/data-onboarding/supported-logs/auth0\",motionChild:!0,nodeId:\"SyBeQVkaI\",openInNewTab:!0,scopeId:\"contentManagement\",smoothScroll:!1,children:/*#__PURE__*/e(n.a,{children:\" view our Auth0 documentation here\"})}),\".\"]}),/*#__PURE__*/e(\"h3\",{children:\"Detection as Code\"}),/*#__PURE__*/e(\"p\",{children:\"With Panther, you aren\u2018t confined to rigid detections as seen in many SIEM solutions. Panther is architected around detection-as-code principles, giving you the ability to write Python to define detection logic and to integrate external systems like version control and CI/CD pipelines into your detection engineering processes. This results in powerful, flexible, and reusable scripting of detections for your security team.\"}),/*#__PURE__*/t(\"p\",{children:[\"A number of pre-built detections for Auth0 are available by default in Panther, offering users the ability to immediately monitor for common vulnerabilities and threats. You can explore our built-in \",/*#__PURE__*/e(o,{href:\"https://panther.com/product/detection-coverage/#filter=auth0\",motionChild:!0,nodeId:\"SyBeQVkaI\",openInNewTab:!1,scopeId:\"contentManagement\",smoothScroll:!1,children:/*#__PURE__*/e(n.a,{children:\" detection coverage for Auth0 logs here\"})}),\".\"]}),/*#__PURE__*/e(\"h3\",{children:\"Parsing, Normalizing, & Analyzing Logs\"}),/*#__PURE__*/e(\"p\",{children:\"As Panther ingests Auth0 logs, they are parsed, normalized, and stored in a Snowflake security data lake. This allows you to build detections, identify anomalies, and conduct investigations in the context of days, weeks, or months of data.\"}),/*#__PURE__*/t(\"p\",{children:[\"Panther applies normalization fields to any log records, which standardizes names for attributes and empowers you to correlate data across all of your log sources. Panther\u2019s search features allow you to investigate your normalized logs for suspicious activity or vulnerabilities. For more information on searching logs, \",/*#__PURE__*/e(o,{href:\"https://docs.panther.com/data-analytics\",motionChild:!0,nodeId:\"SyBeQVkaI\",openInNewTab:!0,scopeId:\"contentManagement\",smoothScroll:!1,children:/*#__PURE__*/e(n.a,{children:\" check out our documentation on Investigations & Search\"})}),\".\"]}),/*#__PURE__*/e(\"h3\",{children:\"Configuring Alerts\"}),/*#__PURE__*/t(\"p\",{children:[\"Panther generates alerts when your detection rules or policies for Auth0 are triggered, and integrates with a variety of \",/*#__PURE__*/e(o,{href:\"https://panther.com/integrations/alerts/\",motionChild:!0,nodeId:\"SyBeQVkaI\",openInNewTab:!1,scopeId:\"contentManagement\",smoothScroll:!1,children:/*#__PURE__*/e(n.a,{children:\" alert destinations \"})}),\" to allow for intuitive management of any alerts. Alerts can also be sent to alert context or SOAR platforms for more remediation options.\"]}),/*#__PURE__*/e(\"p\",{children:\"Alerts are categorized in five different severity levels: Info, Low, Medium, High, and Critical. Your security team has the ability to dynamically assign severity based on specific log event attributes.\"}),/*#__PURE__*/e(\"h3\",{children:\"Customer Support\"}),/*#__PURE__*/e(\"p\",{children:\"If you have any questions about configuring or monitoring Auth0 logs in Panther, our customer support team is here to help. All customers have access to support via a dedicated Slack channel, email, or in-app messenger.\"}),/*#__PURE__*/t(\"p\",{children:[\"You can view our \",/*#__PURE__*/e(o,{href:\"https://docs.panther.com/data-onboarding/supported-logs/auth0\",motionChild:!0,nodeId:\"SyBeQVkaI\",openInNewTab:!0,scopeId:\"contentManagement\",smoothScroll:!1,children:/*#__PURE__*/e(n.a,{children:\" documentation on configuring and monitoring Auth0 logs here \"})}),\" , or customers can sign up for \",/*#__PURE__*/e(o,{href:\"https://pnthr.io/community\",motionChild:!0,nodeId:\"SyBeQVkaI\",openInNewTab:!0,scopeId:\"contentManagement\",smoothScroll:!1,children:/*#__PURE__*/e(n.a,{children:\" the Panther Community \"})}),\" to share best practices or custom detections for Auth0 logs.\"]}),/*#__PURE__*/e(\"h3\",{children:\"The Ideal SIEM Solution for Auth0\"}),/*#__PURE__*/e(\"p\",{children:\"With Panther, your team doesn\u2018t have to waste time and resources on operational overhead, pay excessive costs to keep up with the growth of cloud app data or struggle with restrictive detection logic. Panther was founded by a team of security engineers who struggled with other SIEM solutions first-hand, and built an intuitive, cloud-native platform to solve them.\"}),/*#__PURE__*/t(\"p\",{children:[\"Panther is a cloud-native SIEM built for security operations at scale, offering flexible detection-as-code, intuitive security workflows, and actionable real-time alerts. If you\u2019re searching for a seamless SIEM platform for streaming and monitoring Auth0 logs, \",/*#__PURE__*/e(o,{href:\"https://panther.com/product/request-a-demo/\",motionChild:!0,nodeId:\"SyBeQVkaI\",openInNewTab:!1,scopeId:\"contentManagement\",smoothScroll:!1,children:/*#__PURE__*/e(n.a,{children:\" request a demo today\"})}),\".\"]})]});export const richText7=/*#__PURE__*/t(i.Fragment,{children:[/*#__PURE__*/e(\"h3\",{children:\"Integration Overview\"}),/*#__PURE__*/e(\"p\",{children:\"The AWS Application Load Balancer (ALB) is used to automatically distribute your application traffic across multiple targets, including EC2 instances, containers, and IP addresses. Panther can collect, normalize, and monitor AWS ALB logs to help you identify suspicious activity in real time. Your normalized data is then retained to power future security investigations in a serverless data lake powered by Snowflake.\"}),/*#__PURE__*/e(\"h3\",{children:\"Use Cases for AWS ALB Access Logs\"}),/*#__PURE__*/e(\"p\",{children:\"Access logs for AWS Application Load Balancer capture detailed information about requests sent to your load balancer. Each log contains details for the time the request was received, the client's IP address, request paths, latencies, and server responses. Common security use cases for ALB access logs include monitoring for:\"}),/*#__PURE__*/t(\"ul\",{children:[/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/e(\"p\",{children:\"IdP authentication failures or errors\"})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/e(\"p\",{children:\"Failed requests to a Lambda function\"})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/e(\"p\",{children:\"Errors encountered when forwarding requests to AWS WAF\"})})]}),/*#__PURE__*/e(\"h3\",{children:\"Onboarding Application Load Balancer Logs in Panther\"}),/*#__PURE__*/e(\"p\",{children:\"Panther's integration for AWS ALB is easy and fast to configure by using AWS S3 as a data transport. Simply select AWS ALB from the list of pre-defined log sources in Panther, select AWS S3 Bucket as your data transport method, and configure your S3 bucket to stream AWS ALB logs.\"}),/*#__PURE__*/t(\"p\",{children:[\"For more detailed steps on onboarding AWS ALB logs or for supported log schema, you can \",/*#__PURE__*/e(o,{href:\"https://docs.panther.com/data-onboarding/supported-logs/aws/alb\",motionChild:!0,nodeId:\"SyBeQVkaI\",openInNewTab:!0,scopeId:\"contentManagement\",smoothScroll:!1,children:/*#__PURE__*/e(n.a,{children:\"view our AWS ALB documentation here\"})}),\".\"]}),/*#__PURE__*/e(\"h3\",{children:\"Parsing, Normalizing, and Analyzing\"}),/*#__PURE__*/e(\"p\",{children:\"As Panther ingests AWS ALB audit logs, they are parsed, normalized, and stored in a Snowflake security data lake. This allows security teams to craft detections, identify anomalies, and conduct investigations on logs in the context of days, weeks, or months of data.\"}),/*#__PURE__*/t(\"p\",{children:[\"Panther applies normalization fields to all log records, which standardizes names for attributes and empowers users to correlate data across all log sources. Panther's search tools - Data Explorer, Indicator Search, and Query Builder - allow you to investigate your normalized logs for suspicious activity or vulnerabilities. For more on searching log data in Panther, \",/*#__PURE__*/e(o,{href:\"https://docs.panther.com/data-analytics\",motionChild:!0,nodeId:\"SyBeQVkaI\",openInNewTab:!0,scopeId:\"contentManagement\",smoothScroll:!1,children:/*#__PURE__*/e(n.a,{children:\"check out our documentation on Investigations & Search\"})}),\".\"]}),/*#__PURE__*/e(\"h3\",{children:\"Detection as Code\"}),/*#__PURE__*/e(\"p\",{children:\"With Panther, your team won't be confined to rigid detection rules as seen in most legacy SIEM platforms. Panther is built with detection-as-code principles, giving you the ability to write Python to define detection logic and to integrate external systems like version control and CI/CD pipelines into your detection engineering workflows. This results in powerful, flexible, and reusable scripting of detections for your security team.\"}),/*#__PURE__*/t(\"p\",{children:[\"A number of pre-built detections for AWS ALB are available by default in Panther, offering users immediate value for monitoring common IoCs and threats. You can \",/*#__PURE__*/e(o,{href:\"https://panther.com/product/detection-coverage/#filter=alb\",motionChild:!0,nodeId:\"SyBeQVkaI\",openInNewTab:!1,scopeId:\"contentManagement\",smoothScroll:!1,children:/*#__PURE__*/e(n.a,{children:\" explore our built-in detection coverage for AWS ALB logs here\"})}),\".\"]}),/*#__PURE__*/e(\"h3\",{children:\"Configuring Alerts\"}),/*#__PURE__*/e(\"p\",{children:\"Panther fires alerts when your detection rules or policies are triggered, and integrates with a variety of alert destinations to allow for easy access and management of any AWS ALB alerts. Alerts can also be sent to alert context or SOAR platforms for more remediation options.\"}),/*#__PURE__*/e(\"p\",{children:\"Alerts are grouped in five different severity levels: Info, Low, Medium, High, and Critical. Security teams have the options to dynamically assign severity based on specific log event attributes.\"}),/*#__PURE__*/e(\"h3\",{children:\"Customer Support\"}),/*#__PURE__*/e(\"p\",{children:\"If you have any questions about configuring or monitoring ALB access logs in Panther, we're here to help. All customers have access to our technical support team via a dedicated Slack channel, email, or in-app messenger.\"}),/*#__PURE__*/t(\"p\",{children:[\"You can view our \",/*#__PURE__*/e(o,{href:\"https://docs.panther.com/data-onboarding/supported-logs/aws/alb\",motionChild:!0,nodeId:\"SyBeQVkaI\",openInNewTab:!0,scopeId:\"contentManagement\",smoothScroll:!1,children:/*#__PURE__*/e(n.a,{children:\"documentation on configuring and monitoring AWS ALB logs here\"})}),\", or customers can sign up for \",/*#__PURE__*/e(o,{href:\"https://pnthr.io/community\",motionChild:!0,nodeId:\"SyBeQVkaI\",openInNewTab:!0,scopeId:\"contentManagement\",smoothScroll:!1,children:/*#__PURE__*/e(n.a,{children:\"the Panther Community\"})}),\" to share best practices or custom detections for monitoring your Application Load Balancer.\"]}),/*#__PURE__*/e(\"h3\",{children:\"The Ideal SIEM for AWS ALB\"}),/*#__PURE__*/e(\"p\",{children:\"With Panther, security teams don't have to struggle with restrictive detection logic, waste time and resources on operational overhead, or pay skyrocketing costs to keep up with the growth of cloud app data. Panther was founded by a team of veteran security practitioners who struggled with legacy SIEM challenges first-hand, and built an intuitive, cloud-native platform to solve them.\"}),/*#__PURE__*/t(\"p\",{children:[\"Panther is a cloud-native SIEM built for security operations at scale, offering flexible detection-as-code, intuitive security workflows, and actionable real-time alerts to keep up with the needs of today's security teams. For a powerful, flexible, and scalable SIEM solution for AWS ALB, \",/*#__PURE__*/e(o,{href:\"https://panther.com/product/request-a-demo/\",motionChild:!0,nodeId:\"SyBeQVkaI\",openInNewTab:!1,scopeId:\"contentManagement\",smoothScroll:!1,children:/*#__PURE__*/e(n.a,{children:\" request a demo today\"})}),\".\"]})]});export const richText8=/*#__PURE__*/t(i.Fragment,{children:[/*#__PURE__*/e(\"h3\",{children:\"Integration Overview\"}),/*#__PURE__*/e(\"p\",{children:\"Amazon Aurora is a fully managed relational database engine that is compatible with MySQL and PostgreSQL. Panther can collect, normalize, and monitor Aurora MySQL Relational Database Service (RDS) logs to help you identify suspicious activity in real time. Your normalized data is then retained to power future security investigations in a serverless data lake powered by Snowflake.\"}),/*#__PURE__*/e(\"h3\",{children:\"Use Cases for Aurora Audit Logs\"}),/*#__PURE__*/e(\"p\",{children:\"The AuroraMySQLAudit log is an RDS Aurora audit log containing context on database events such as connections, disconnections, and table queries. Common security use cases for Aurora audit logs include monitoring for:\"}),/*#__PURE__*/t(\"ul\",{children:[/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/e(\"p\",{children:\"Any unsuccessful connection attempts\"})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/e(\"p\",{children:\"Changes applied by privileged users and administrators\"})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/e(\"p\",{children:\"Failed queries due to permission errors\"})})]}),/*#__PURE__*/e(\"h3\",{children:\"Onboarding Aurora Logs in Panther\"}),/*#__PURE__*/e(\"p\",{children:\"Panther's integration for Aurora is easy and fast to configure through the use of AWS S3 as a data transport. Simply select AWS Aurora MySQL from the list of pre-defined log sources in Panther, select AWS S3 Bucket as your data transport method, and configure your S3 bucket to stream AWS Aurora logs.\"}),/*#__PURE__*/t(\"p\",{children:[\"For more detailed steps on onboarding Aurora audit logs or for supported log schema, you can \",/*#__PURE__*/e(o,{href:\"https://docs.panther.com/data-onboarding/supported-logs/aws/rds\",motionChild:!0,nodeId:\"SyBeQVkaI\",openInNewTab:!0,scopeId:\"contentManagement\",smoothScroll:!1,children:/*#__PURE__*/e(n.a,{children:\"view our AWS Aurora documentation here\"})}),\".\"]}),/*#__PURE__*/e(\"h3\",{children:\"Parsing, Normalizing, and Analyzing\"}),/*#__PURE__*/e(\"p\",{children:\"As Panther ingests Aurora audit logs, they are parsed, normalized, and stored in a Snowflake security data lake. This allows security teams to craft detections, identify anomalies, and conduct investigations on logs in the context of days, weeks, or months of data.\"}),/*#__PURE__*/t(\"p\",{children:[\"Panther applies normalization fields to all log records, which standardizes names for attributes and empowers users to correlate data across all log sources. Panther's search tools - Data Explorer, Indicator Search, and Query Builder - allow you to investigate your normalized logs for suspicious activity or vulnerabilities. For more on searching log data in Panther, \",/*#__PURE__*/e(o,{href:\"https://docs.panther.com/search\",motionChild:!0,nodeId:\"SyBeQVkaI\",openInNewTab:!0,scopeId:\"contentManagement\",smoothScroll:!1,children:/*#__PURE__*/e(n.a,{children:\"check out our documentation on Investigations & Search\"})}),\".\"]}),/*#__PURE__*/e(\"h3\",{children:\"Detection as Code\"}),/*#__PURE__*/e(\"p\",{children:\"With Panther, your team won't be confined to rigid detection rules as seen in most legacy SIEM platforms. Panther is built with detection-as-code principles, giving you the ability to write Python to define detection logic and to integrate external systems like version control and CI/CD pipelines into your detection engineering workflows. This results in powerful, flexible, and reusable scripting of detections for your security team.\"}),/*#__PURE__*/e(\"h3\",{children:\"Configuring Alerts\"}),/*#__PURE__*/e(\"p\",{children:\"Panther fires alerts when your detection rules or policies are triggered, and integrates with a variety of alert destinations to allow for easy access and management of any Aurora alerts. Alerts can also be sent to alert context or SOAR platforms for more remediation options.\"}),/*#__PURE__*/e(\"p\",{children:\"Alerts are categorized in five different severity levels: Info, Low, Medium, High, and Critical. Security teams have the options to dynamically assign severity based on specific log event attributes.\"}),/*#__PURE__*/e(\"h3\",{children:\"Customer Support\"}),/*#__PURE__*/e(\"p\",{children:\"If you have any questions about configuring or monitoring Aurora access logs in Panther, we're here to help. All customers have access to our technical support team via a dedicated Slack channel, email, or in-app messenger.\"}),/*#__PURE__*/t(\"p\",{children:[\"You can view our \",/*#__PURE__*/e(o,{href:\"https://docs.panther.com/data-onboarding/supported-logs/aws/rds\",motionChild:!0,nodeId:\"SyBeQVkaI\",openInNewTab:!0,scopeId:\"contentManagement\",smoothScroll:!1,children:/*#__PURE__*/e(n.a,{children:\"documentation on configuring and monitoring AWS Aurora logs here\"})}),\", or customers can sign up for \",/*#__PURE__*/e(o,{href:\"https://pnthr.io/community\",motionChild:!0,nodeId:\"SyBeQVkaI\",openInNewTab:!0,scopeId:\"contentManagement\",smoothScroll:!1,children:/*#__PURE__*/e(n.a,{children:\"the Panther Community\"})}),\" to share best practices or custom detections for monitoring your Aurora.\"]}),/*#__PURE__*/e(\"h3\",{children:\"The Ideal SIEM for Aurora\"}),/*#__PURE__*/e(\"p\",{children:\"With Panther, security teams don't have to struggle with restrictive detection logic, waste time and resources on operational overhead, or pay skyrocketing costs to keep up with the growth of cloud app data. Panther was founded by a team of veteran security practitioners who struggled with legacy SIEM challenges first-hand, and built an intuitive, cloud-native platform to solve them.\"}),/*#__PURE__*/t(\"p\",{children:[\"Panther is a cloud-native SIEM built for security operations at scale, offering flexible detection-as-code, intuitive security workflows, and actionable real-time alerts to keep up with the needs of today's security teams. For a powerful, flexible, and scalable SIEM solution for AWS Aurora, \",/*#__PURE__*/e(o,{href:\"https://panther.com/product/request-a-demo/\",motionChild:!0,nodeId:\"SyBeQVkaI\",openInNewTab:!1,scopeId:\"contentManagement\",smoothScroll:!1,children:/*#__PURE__*/e(n.a,{children:\"request a demo today\"})}),\".\"]})]});export const richText9=/*#__PURE__*/t(i.Fragment,{children:[/*#__PURE__*/e(\"h3\",{children:\"Integration Overview\"}),/*#__PURE__*/e(\"p\",{children:\"CloudTrail is an AWS service that monitors and records account activity across your AWS infrastructure, giving you visibility into user activity and event history. Panther can collect, normalize, and monitor CloudTrail logs to help you identify suspicious activity in real time. Your normalized data is then retained to power future security investigations in a serverless data lake powered by Snowflake.\"}),/*#__PURE__*/e(\"h3\",{children:\"Use Cases for AWS CloudTrail Logs\"}),/*#__PURE__*/e(\"p\",{children:\"AWS CloudTrail logs all API calls made within your AWS account and provides a detailed record of all activity, including who made the API call, the time it was made, and which resources were affected. Common security use cases for CloudTrail logs include:\"}),/*#__PURE__*/t(\"ul\",{children:[/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/e(\"p\",{children:\"Detecting any unauthorized API calls to your AWS account\"})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/e(\"p\",{children:\"Identifying any changes to IAM configurations or policies\"})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/e(\"p\",{children:\"Alerting for login activity without MFA or SAML\"})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/e(\"p\",{children:\"Monitoring for root account changes or activities\"})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/e(\"p\",{children:\"Analyzing any patterns or trends in your AWS environment\"})})]}),/*#__PURE__*/e(\"h3\",{children:\"Onboarding CloudTrail Logs in Panther\"}),/*#__PURE__*/e(\"p\",{children:\"Panther's integration for AWS CloudTrail is easy and fast to configure by using AWS S3 or CloudWatch logs as a data transport. Simply select AWS CloudTrail from the list of pre-defined log sources in Panther, and choose between the AWS S3 Bucket or CloudWatch Logs transport method to begin your setup.\"}),/*#__PURE__*/t(\"p\",{children:[\"For more detailed steps on onboarding AWS CloudTrail logs or for supported log schema, you can \",/*#__PURE__*/e(o,{href:\"https://docs.panther.com/data-onboarding/supported-logs/aws/cloudtrail\",motionChild:!0,nodeId:\"SyBeQVkaI\",openInNewTab:!0,scopeId:\"contentManagement\",smoothScroll:!1,children:/*#__PURE__*/e(n.a,{children:\"view our AWS CloudTrail documentation here\"})}),\".\"]}),/*#__PURE__*/e(\"h3\",{children:\"Parsing, Normalizing, and Analyzing\"}),/*#__PURE__*/e(\"p\",{children:\"As Panther ingests AWS CloudTrail audit logs, they are parsed, normalized, and stored in a Snowflake security data lake. This allows security teams to craft detections, identify anomalies, and conduct investigations on logs in the context of days, weeks, or months of data.\"}),/*#__PURE__*/t(\"p\",{children:[\"Panther applies normalization fields to all log records, which standardizes names for attributes and empowers users to correlate data across all log sources. Panther's search tools allow you to investigate your normalized logs for suspicious activity or vulnerabilities. For more on searching log data in Panther, \",/*#__PURE__*/e(o,{href:\"https://docs.panther.com/search\",motionChild:!0,nodeId:\"SyBeQVkaI\",openInNewTab:!0,scopeId:\"contentManagement\",smoothScroll:!1,children:/*#__PURE__*/e(n.a,{children:\"check out our documentation on Investigations & Search\"})}),\".\"]}),/*#__PURE__*/e(\"h3\",{children:\"Detection as Code\"}),/*#__PURE__*/e(\"p\",{children:\"With Panther, your team won't be confined to rigid detection rules as seen in most legacy SIEM platforms. Panther is built with detection-as-code principles, giving you the ability to write Python to define detection logic and to integrate external systems like version control and CI/CD pipelines into your detection engineering workflows. This results in powerful, flexible, and reusable scripting of detections for your security team.\"}),/*#__PURE__*/t(\"p\",{children:[\"A number of pre-built detections for AWS CloudTrail are available by default in Panther, offering users immediate value for monitoring common IoCs and threats. You can \",/*#__PURE__*/e(o,{href:\"https://panther.com/product/detection-coverage/#filter=cloudtrail\",motionChild:!0,nodeId:\"SyBeQVkaI\",openInNewTab:!1,scopeId:\"contentManagement\",smoothScroll:!1,children:/*#__PURE__*/e(n.a,{children:\" explore our built-in detection coverage for AWS CloudTrail logs here\"})}),\".\"]}),/*#__PURE__*/e(\"h3\",{children:\"Configuring Alerts\"}),/*#__PURE__*/t(\"p\",{children:[\"Panther fires alerts when your detection rules or policies are triggered, and integrates with a variety of \",/*#__PURE__*/e(o,{href:\"https://panther.com/integrations/alerts/\",motionChild:!0,nodeId:\"SyBeQVkaI\",openInNewTab:!1,scopeId:\"contentManagement\",smoothScroll:!1,children:/*#__PURE__*/e(n.a,{children:\" alert destinations\"})}),\" to allow for easy access and management of any CloudTrail alerts. Alerts can also be sent to alert context or SOAR platforms for more remediation options.\"]}),/*#__PURE__*/e(\"p\",{children:\"Alerts are grouped in five different severity levels: Info, Low, Medium, High, and Critical. Security teams have the options to dynamically assign severity based on specific log event attributes.\"}),/*#__PURE__*/e(\"h3\",{children:\"Customer Support\"}),/*#__PURE__*/e(\"p\",{children:\"If you have any questions about configuring or monitoring CloudTrail logs in Panther, we're here to help. All customers have access to our technical support team via a dedicated Slack channel, email, or in-app messenger.\"}),/*#__PURE__*/t(\"p\",{children:[\"You can view our \",/*#__PURE__*/e(o,{href:\"https://docs.panther.com/data-onboarding/supported-logs/aws/cloudtrail\",motionChild:!0,nodeId:\"SyBeQVkaI\",openInNewTab:!0,scopeId:\"contentManagement\",smoothScroll:!1,children:/*#__PURE__*/e(n.a,{children:\"documentation on configuring and monitoring AWS CloudTrail logs here\"})}),\", or customers can sign up for \",/*#__PURE__*/e(o,{href:\"https://pnthr.io/community\",motionChild:!0,nodeId:\"SyBeQVkaI\",openInNewTab:!0,scopeId:\"contentManagement\",smoothScroll:!1,children:/*#__PURE__*/e(n.a,{children:\"the Panther Community\"})}),\" to share best practices or custom detections for monitoring CloudTrail.\"]}),/*#__PURE__*/e(\"h3\",{children:\"The Ideal SIEM for CloudTrail\"}),/*#__PURE__*/e(\"p\",{children:\"With Panther, security teams don't have to pay skyrocketing costs to keep up with the volume of their CloudTrail data, struggle with restrictive detection logic, or waste time and resources on operational overhead. Panther was founded by a team of veteran security practitioners who struggled with legacy SIEM challenges first-hand, and built an intuitive, cloud-native platform to solve them.\"}),/*#__PURE__*/t(\"p\",{children:[\"Panther is a cloud-native SIEM built for security operations at scale, offering flexible detection-as-code, intuitive security workflows, and actionable real-time alerts to keep up with the needs of today's security teams. For a powerful, flexible, and scalable SIEM solution for AWS CloudTrail, \",/*#__PURE__*/e(o,{href:\"https://panther.com/product/request-a-demo/\",motionChild:!0,nodeId:\"SyBeQVkaI\",openInNewTab:!1,scopeId:\"contentManagement\",smoothScroll:!1,children:/*#__PURE__*/e(n.a,{children:\" request a demo today\"})}),\".\"]})]});export const richText10=/*#__PURE__*/t(i.Fragment,{children:[/*#__PURE__*/e(\"h3\",{children:\"Integration Overview\"}),/*#__PURE__*/e(\"p\",{children:\"AWS CloudWatch is a service provided by Amazon Web Services that allows you to monitor your AWS resources and applications in real-time. It provides metrics and logs that can be used to detect and diagnose issues within your environment, as well as to troubleshoot performance issues and optimize resource utilization. Panther can collect, normalize, and monitor CloudWatch logs to help you identify suspicious file-sharing activity in real time. Your normalized data is then retained to power future security investigations in a data lake powered by the cloud-native data platform, Snowflake.\"}),/*#__PURE__*/e(\"h3\",{children:\"Use Cases for CloudWatch Logs\"}),/*#__PURE__*/e(\"p\",{children:\"CloudWatch Event logs describe changes in AWS resources. Some common SIEM use cases for CloudWatch logs include:\"}),/*#__PURE__*/t(\"ul\",{children:[/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/e(\"p\",{children:\"Alerting when a matched event occurs in CloudWatch\"})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/e(\"p\",{children:\"Detecting any changes to security groups or network ACLs\"})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/e(\"p\",{children:\"Defining response workflows for potential security issues\"})})]}),/*#__PURE__*/e(\"h3\",{children:\"Onboarding CloudWatch Events Logs in Panther\"}),/*#__PURE__*/e(\"p\",{children:\"Panther supports ingesting CloudWatch Events logs using a variety of Data Transport options: AWS S3, AWS SQS, or via a direct CloudWatch integration. To pull CloudWatch logs into Panther, simply select AWS CloudWatch Events from the list of predefined log sources in Panther, and choose your preferred data transport method to begin setup.\"}),/*#__PURE__*/t(\"p\",{children:[\"For more details on onboarding CloudWatch logs or for supported log schema, you can \",/*#__PURE__*/e(o,{href:\"https://docs.panther.com/data-onboarding/supported-logs/aws/cloudwatch\",motionChild:!0,nodeId:\"SyBeQVkaI\",openInNewTab:!0,scopeId:\"contentManagement\",smoothScroll:!1,children:/*#__PURE__*/e(n.a,{children:\"view our CloudWatch documentation here\"})}),\". \"]}),/*#__PURE__*/e(\"h3\",{children:\"Parsing, Normalizing, & Analyzing Logs\"}),/*#__PURE__*/e(\"p\",{children:\"As Panther ingests CloudWatch logs, they are parsed, normalized, and stored in a Snowflake security data lake. This allows you to build detections, identify anomalies, and conduct investigations in the context of days, weeks, or months of data.\"}),/*#__PURE__*/t(\"p\",{children:[\"Panther applies normalization fields to any log records, which standardizes names for attributes and empowers you to correlate data across all of your log sources. Panther's search features allow you to investigate your normalized logs for suspicious activity or vulnerabilities. For more information on searching logs, \",/*#__PURE__*/e(o,{href:\"https://docs.panther.com/search\",motionChild:!0,nodeId:\"SyBeQVkaI\",openInNewTab:!0,scopeId:\"contentManagement\",smoothScroll:!1,children:/*#__PURE__*/e(n.a,{children:\"check out our documentation on Investigations & Search\"})}),\".\"]}),/*#__PURE__*/e(\"h3\",{children:\"Detection as Code\"}),/*#__PURE__*/e(\"p\",{children:\"With Panther, you aren't confined to rigid detections as seen in many SIEM solutions. Panther is architected around detection-as-code principles, giving you the ability to write Python to define detection logic and to integrate external systems like version control and CI/CD pipelines into your detection engineering processes. This results in powerful, flexible, and reusable scripting of detections for your security team.\"}),/*#__PURE__*/e(\"h3\",{children:\"Configuring Alerts\"}),/*#__PURE__*/t(\"p\",{children:[\"Panther generates alerts when your detection rules or policies for CloudWatch are triggered, and integrates with a variety of \",/*#__PURE__*/e(o,{href:\"https://panther.com/integrations/alerts/\",motionChild:!0,nodeId:\"SyBeQVkaI\",openInNewTab:!1,scopeId:\"contentManagement\",smoothScroll:!1,children:/*#__PURE__*/e(n.a,{children:\"alert destinations\"})}),\" to allow for intuitive management of any alerts. Alerts can also be sent to alert context or SOAR platforms for more remediation options.\"]}),/*#__PURE__*/e(\"p\",{children:\"Alerts are categorized by five different severity levels: Info, Low, Medium, High, and Critical. Your security team has the ability to dynamically assign severity based on specific log event attributes.\"}),/*#__PURE__*/e(\"h3\",{children:\"Customer Support\"}),/*#__PURE__*/e(\"p\",{children:\"If you have any questions about configuring or monitoring CloudWatch logs in Panther, our customer support team is here to help. All customers have access to support via a dedicated Slack channel, email, or in-app messenger.\"}),/*#__PURE__*/t(\"p\",{children:[\"You can view our \",/*#__PURE__*/e(o,{href:\"https://docs.panther.com/data-onboarding/supported-logs/aws/cloudwatch\",motionChild:!0,nodeId:\"SyBeQVkaI\",openInNewTab:!0,scopeId:\"contentManagement\",smoothScroll:!1,children:/*#__PURE__*/e(n.a,{children:\"documentation on configuring and monitoring CloudWatch logs here\"})}),\", or customers can sign up for \",/*#__PURE__*/e(o,{href:\"https://pnthr.io/community\",motionChild:!0,nodeId:\"SyBeQVkaI\",openInNewTab:!0,scopeId:\"contentManagement\",smoothScroll:!1,children:/*#__PURE__*/e(n.a,{children:\"the Panther Community\"})}),\" to share best practices or custom detections for CloudWatch logs.\"]}),/*#__PURE__*/e(\"h3\",{children:\"The Ideal SIEM for CloudWatch\"}),/*#__PURE__*/e(\"p\",{children:\"With Panther, your team doesn't have to waste time and resources on operational overhead, pay excessive costs to keep up with the growth of cloud app data, or struggle with restrictive detection logic. Panther was founded by a team of security engineers who struggled with other SIEM solutions first-hand, and built an intuitive, cloud-native platform to solve them.\"}),/*#__PURE__*/t(\"p\",{children:[\"Panther is a cloud-native SIEM built for security operations at scale, offering flexible detection-as-code, intuitive security workflows, and actionable real-time alerts. If you're searching for a seamless SIEM platform for CloudWatch logs and AWS environments, \",/*#__PURE__*/e(o,{href:\"https://panther.com/product/request-a-demo/\",motionChild:!0,nodeId:\"SyBeQVkaI\",openInNewTab:!1,scopeId:\"contentManagement\",smoothScroll:!1,children:/*#__PURE__*/e(n.a,{children:\" request a demo today\"})}),\".\"]})]});export const richText11=/*#__PURE__*/t(i.Fragment,{children:[/*#__PURE__*/e(\"h3\",{children:\"Integration Overview\"}),/*#__PURE__*/e(\"p\",{children:\"AWS Config is a service provided by Amazon Web Services that allows you to assess, audit, and evaluate the configuration of your AWS resources. Panther can collect, normalize, and monitor Config logs to help you identify suspicious activity in real time. Your normalized data is then retained to power future security investigations in a serverless data lake powered by Snowflake.\"}),/*#__PURE__*/e(\"h3\",{children:\"Use Cases for AWS Config Logs\"}),/*#__PURE__*/e(\"p\",{children:\"AWS Config logs record and evaluate snapshots of the configurations of your AWS resources. Common security use cases for Config logs include:\"}),/*#__PURE__*/t(\"ul\",{children:[/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/e(\"p\",{children:\"Monitoring for resource compliance\"})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/e(\"p\",{children:\"Detecting any changes to configurations\"})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/e(\"p\",{children:\"Triggering alerts when resources are out of compliance\"})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/e(\"p\",{children:\"Using AWS Config to simplify compliance auditing and reporting\"})})]}),/*#__PURE__*/e(\"h3\",{children:\"Onboarding Config Logs in Panther\"}),/*#__PURE__*/e(\"p\",{children:\"Panther supports ingesting AWS Config logs via AWS S3. To pull Config logs into Panther, simply select AWS Config from the list of predefined log sources in Panther, and configure an S3 bucket for your data transport.\"}),/*#__PURE__*/t(\"p\",{children:[\"For more detailed steps on onboarding AWS Config logs or for supported log schema, you can \",/*#__PURE__*/e(o,{href:\"https://docs.panther.com/data-onboarding/supported-logs/aws/config\",motionChild:!0,nodeId:\"SyBeQVkaI\",openInNewTab:!0,scopeId:\"contentManagement\",smoothScroll:!1,children:/*#__PURE__*/e(n.a,{children:\"view our AWS Config documentation here\"})}),\".\"]}),/*#__PURE__*/e(\"h3\",{children:\"Parsing, Normalizing, and Analyzing\"}),/*#__PURE__*/e(\"p\",{children:\"As Panther ingests AWS Config logs, they are parsed, normalized, and stored in a Snowflake security data lake. This allows security teams to write detections, detect anomalies, and conduct investigations on logs in the context of days, weeks, or months of data.\"}),/*#__PURE__*/t(\"p\",{children:[\"Panther applies normalization fields to all log records, which standardizes names for attributes and empowers users to correlate data across all log types. Panther's search tools allow you to investigate your normalized logs for suspicious activity or vulnerabilities. For more on searching log data in Panther, \",/*#__PURE__*/e(o,{href:\"https://docs.panther.com/search\",motionChild:!0,nodeId:\"SyBeQVkaI\",openInNewTab:!0,scopeId:\"contentManagement\",smoothScroll:!1,children:/*#__PURE__*/e(n.a,{children:\"check out our documentation on Investigations & Search\"})}),\".\"]}),/*#__PURE__*/e(\"h3\",{children:\"Detection as Code\"}),/*#__PURE__*/e(\"p\",{children:\"With Panther, your team won't be confined to rigid detection rules as seen in most legacy SIEM platforms. Panther is built with detection-as-code principles, allowing you to use Python to define detection logic and to integrate external systems like version control and CI/CD pipelines into your detection engineering workflows. This results in powerful, flexible, and reusable scripting of detections for your security team.\"}),/*#__PURE__*/e(\"h3\",{children:\"Configuring Alerts\"}),/*#__PURE__*/t(\"p\",{children:[\"Panther fires alerts when your detection rules or policies are triggered, and integrates with a variety of \",/*#__PURE__*/e(o,{href:\"https://panther.com/integrations/alerts/\",motionChild:!0,nodeId:\"SyBeQVkaI\",openInNewTab:!1,scopeId:\"contentManagement\",smoothScroll:!1,children:/*#__PURE__*/e(n.a,{children:\" alert destinations \"})}),\" to allow for easy access and management of any Config alerts. Alerts can also be sent to alert context or SOAR platforms for more remediation options.\"]}),/*#__PURE__*/e(\"p\",{children:\"Alerts are categorized in five different severity levels: Info, Low, Medium, High, and Critical. Security teams have the options to dynamically assign severity level based on specific log event attributes.\"}),/*#__PURE__*/e(\"h3\",{children:\"Customer Support\"}),/*#__PURE__*/e(\"p\",{children:\"If you have any questions about configuring or monitoring Config logs in Panther, we're here to help. All customers have access to our technical support team via a dedicated Slack channel, email, or in-app messenger.\"}),/*#__PURE__*/t(\"p\",{children:[\"You can view our \",/*#__PURE__*/e(o,{href:\"https://docs.panther.com/data-onboarding/supported-logs/aws/config\",motionChild:!0,nodeId:\"SyBeQVkaI\",openInNewTab:!0,scopeId:\"contentManagement\",smoothScroll:!1,children:/*#__PURE__*/e(n.a,{children:\"documentation on configuring and monitoring AWS Config logs here\"})}),\", or customers can sign up for \",/*#__PURE__*/e(o,{href:\"https://pnthr.io/community\",motionChild:!0,nodeId:\"SyBeQVkaI\",openInNewTab:!0,scopeId:\"contentManagement\",smoothScroll:!1,children:/*#__PURE__*/e(n.a,{children:\"the Panther Community\"})}),\" to share best practices or custom detections for monitoring Config.\"]}),/*#__PURE__*/e(\"h3\",{children:\"The Ideal SIEM for AWS\"}),/*#__PURE__*/e(\"p\",{children:\"With Panther, security teams don't have to pay skyrocketing costs to keep up with cloud data volume, struggle with restrictive detection logic, or waste time and resources on operational overhead. Panther was founded by a team of veteran security practitioners who struggled with legacy SIEM challenges first-hand, and built an intuitive, cloud-native platform to solve them.\"}),/*#__PURE__*/t(\"p\",{children:[\"Panther is a cloud-native SIEM built for security operations at scale, offering flexible detection-as-code, intuitive security workflows, and actionable real-time alerts to keep up with the needs of today's security teams. For a powerful, flexible, and scalable SIEM solution for your AWS environment, \",/*#__PURE__*/e(o,{href:\"https://panther.com/product/request-a-demo/\",motionChild:!0,nodeId:\"SyBeQVkaI\",openInNewTab:!1,scopeId:\"contentManagement\",smoothScroll:!1,children:/*#__PURE__*/e(n.a,{children:\" request a demo today\"})}),\".\"]}),/*#__PURE__*/e(\"p\",{children:\"\\xa0\"})]});export const richText12=/*#__PURE__*/t(i.Fragment,{children:[/*#__PURE__*/e(\"h3\",{children:\"Integration Overview\"}),/*#__PURE__*/e(\"p\",{children:\"AWS Elastic Kubernetes Service (EKS) is a managed Kubernetes service that allows you to easily deploy, manage, and scale containerized applications using Kubernetes. Using EKS, you can run Kubernetes on AWS without the need to manage your own Kubernetes control plane or worker nodes. Panther can collect, normalize, and monitor EKS logs to help you identify suspicious activity in real time. Your normalized data is then retained to power future security investigations in a serverless data lake powered by Snowflake.\"}),/*#__PURE__*/e(\"h3\",{children:\"Use Cases for EKS Audit Logs\"}),/*#__PURE__*/e(\"p\",{children:\"EKS audit logs provide a record of the individual users, administrators, or system components that have affected your cluster. Common security use cases for EKS logs include:\"}),/*#__PURE__*/t(\"ul\",{children:[/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/e(\"p\",{children:\"Detecting any unauthorized access attempts within your Kubernetes environment\"})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/e(\"p\",{children:\"Triggering alerts when resources are out of compliance\"})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/e(\"p\",{children:\"Using AWS EKS to simplify compliance auditing and reporting\"})})]}),/*#__PURE__*/e(\"h3\",{children:\"Onboarding EKS Logs in Panther\"}),/*#__PURE__*/e(\"p\",{children:\"Panther supports ingesting AWS EKS logs via AWS S3. To pull EKS logs into Panther, you\u2018ll need to enable EKS control plane logging in AWS to direct your EKS logs to CloudWatch logs, and then configure a Kinesis Data Firehose to transport them to a S3 bucket.\"}),/*#__PURE__*/t(\"p\",{children:[\"For more detailed steps on onboarding AWS EKS logs or for supported log schema, you can \",/*#__PURE__*/e(o,{href:\"https://docs.panther.com/data-onboarding/supported-logs/aws/eks\",motionChild:!0,nodeId:\"SyBeQVkaI\",openInNewTab:!0,scopeId:\"contentManagement\",smoothScroll:!1,children:/*#__PURE__*/e(n.a,{children:\"view our AWS EKS documentation here\"})}),\".\"]}),/*#__PURE__*/e(\"h3\",{children:\"Parsing, Normalizing, and Analyzing\"}),/*#__PURE__*/e(\"p\",{children:\"As Panther ingests AWS EKS logs, they are parsed, normalized, and stored in a Snowflake security data lake. This allows security teams to write detections, detect anomalies, and conduct investigations on logs in the context of days, weeks, or months of data.\"}),/*#__PURE__*/t(\"p\",{children:[\"Panther applies normalization fields to all log records, which standardizes names for attributes and empowers users to correlate data across all log types. Panther\u2019s search tools empower you to investigate your normalized logs for suspicious activity or vulnerabilities. For more on searching log data in Panther, \",/*#__PURE__*/e(o,{href:\"https://docs.panther.com/search\",motionChild:!0,nodeId:\"SyBeQVkaI\",openInNewTab:!0,scopeId:\"contentManagement\",smoothScroll:!1,children:/*#__PURE__*/e(n.a,{children:\"check out our documentation on Investigations & Search\"})}),\".\"]}),/*#__PURE__*/e(\"h3\",{children:\"Detection as Code\"}),/*#__PURE__*/e(\"p\",{children:\"With Panther, your team won\u2018t be confined to rigid detection rules as seen in most legacy SIEM platforms. Panther is built with detection-as-code principles, allowing you to use Python to define detection logic and to integrate external systems like version control and CI/CD pipelines into your detection engineering workflows. This results in powerful, flexible, and reusable scripting of detections for your security team.\"}),/*#__PURE__*/t(\"p\",{children:[\"Pre-built detections for EKS logs are available by default in Panther, offering users immediate value for monitoring common IoCs and threats. You can \",/*#__PURE__*/e(o,{href:\"https://panther.com/product/detection-coverage/#filter=eks\",motionChild:!0,nodeId:\"SyBeQVkaI\",openInNewTab:!1,scopeId:\"contentManagement\",smoothScroll:!1,children:/*#__PURE__*/e(n.a,{children:\" explore our built-in detection coverage for EKS here\"})}),\".\"]}),/*#__PURE__*/e(\"h3\",{children:\"Configuring Alerts\"}),/*#__PURE__*/t(\"p\",{children:[\"Panther fires alerts when your detection rules or policies are triggered, and integrates with a variety of \",/*#__PURE__*/e(o,{href:\"https://panther.com/integrations/alerts/\",motionChild:!0,nodeId:\"SyBeQVkaI\",openInNewTab:!1,scopeId:\"contentManagement\",smoothScroll:!1,children:/*#__PURE__*/e(n.a,{children:\" alert destinations\"})}),\" to allow for easy access and management of any EKS alerts. Alerts can also be sent to alert context or SOAR platforms for more remediation options.\"]}),/*#__PURE__*/e(\"p\",{children:\"Alerts are categorized within five different severity levels: Info, Low, Medium, High, and Critical. Security teams have the option to dynamically assign severity level based on specific log event attributes.\"}),/*#__PURE__*/e(\"h3\",{children:\"Customer Support\"}),/*#__PURE__*/e(\"p\",{children:\"If you have any questions about configuring or monitoring EKS logs in Panther, we\u2019re here to help. All customers have access to our technical support team via a dedicated Slack channel, email, or in-app messenger.\"}),/*#__PURE__*/t(\"p\",{children:[\"You can view our \",/*#__PURE__*/e(o,{href:\"https://docs.panther.com/data-onboarding/supported-logs/aws/eks\",motionChild:!0,nodeId:\"SyBeQVkaI\",openInNewTab:!0,scopeId:\"contentManagement\",smoothScroll:!1,children:/*#__PURE__*/e(n.a,{children:\"documentation on EKS and monitoring AWS EKS logs here\"})}),\", or customers can sign up for \",/*#__PURE__*/e(o,{href:\"https://pnthr.io/community\",motionChild:!0,nodeId:\"SyBeQVkaI\",openInNewTab:!0,scopeId:\"contentManagement\",smoothScroll:!1,children:/*#__PURE__*/e(n.a,{children:\"the Panther Community\"})}),\" to share best practices or custom detections for monitoring EKS.\"]}),/*#__PURE__*/e(\"h3\",{children:\"The Ideal SIEM for AWS EKS\"}),/*#__PURE__*/e(\"p\",{children:\"With Panther, security teams don\u2018t have to pay skyrocketing costs to keep up with cloud data volume, struggle with restrictive detection logic, or waste time and resources on operational overhead. Panther was founded by a team of veteran security practitioners who struggled with legacy SIEM challenges first-hand, and built an intuitive, cloud-native platform to solve them.\"}),/*#__PURE__*/t(\"p\",{children:[\"Panther is a cloud-native SIEM built for security operations at scale, offering flexible detection-as-code, intuitive security workflows, and actionable real-time alerts to keep up with the needs of today\u2019s security teams. For a powerful, flexible, and scalable SIEM solution for AWS EKS, \",/*#__PURE__*/e(o,{href:\"https://panther.com/product/request-a-demo/\",motionChild:!0,nodeId:\"SyBeQVkaI\",openInNewTab:!1,scopeId:\"contentManagement\",smoothScroll:!1,children:/*#__PURE__*/e(n.a,{children:\" request a demo today\"})}),\".\"]})]});export const richText13=/*#__PURE__*/t(i.Fragment,{children:[/*#__PURE__*/e(\"h3\",{children:\"Integration Overview\"}),/*#__PURE__*/e(\"p\",{children:\"AWS GuardDuty is a threat detection service provided by Amazon Web Services that continuously monitors your AWS environment for malicious activity and unauthorized behavior. GuardDuty integrates with other AWS services, such as AWS CloudTrail and AWS VPC Flow Logs, to provide a comprehensive view of your security posture. Panther can collect, normalize, and monitor GuardDuty logs to help you identify suspicious activity in real time. Your normalized data is then retained to power future security investigations in a serverless data lake powered by Snowflake.\"}),/*#__PURE__*/e(\"h3\",{children:\"Use Cases for GuardDuty Logs\"}),/*#__PURE__*/e(\"p\",{children:\"GuardDuty logs (referred to as \u201Cfindings\u201D) record information about unexpected behavior in your AWS environment, which AWS resources were involved, when this activity occurred, and other information. These findings are categorized as high severity, medium severity, or low severity. Some common security use cases for GuardDuty logs include monitoring for:\"}),/*#__PURE__*/t(\"ul\",{children:[/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/e(\"p\",{children:\"Compromised credentials\"})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/e(\"p\",{children:\"Unusual API activity\"})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/e(\"p\",{children:\"Unauthorized access attempts\"})})]}),/*#__PURE__*/e(\"h3\",{children:\"Onboarding GuardDuty Logs in Panther\"}),/*#__PURE__*/e(\"p\",{children:\"Panther users can ingest GuardDuty logs by choosing one of three available Data Transport options: AWS S3, AWS SQS or Amazon EventBridge. To pull GuardDuty logs into Panther, simply select AWS GuardDuty from the list of predefined log sources and choose your preferred data transport method.\"}),/*#__PURE__*/t(\"p\",{children:[\"For more detailed steps on onboarding AWS GuardDuty logs or for supported log schema, you can \",/*#__PURE__*/e(o,{href:\"https://docs.panther.com/data-onboarding/supported-logs/aws/guardduty\",motionChild:!0,nodeId:\"SyBeQVkaI\",openInNewTab:!0,scopeId:\"contentManagement\",smoothScroll:!1,children:/*#__PURE__*/e(n.a,{children:\"view our AWS GuardDuty documentation here\"})}),\".\"]}),/*#__PURE__*/e(\"h3\",{children:\"Parsing, Normalizing, and Analyzing\"}),/*#__PURE__*/e(\"p\",{children:\"As Panther ingests AWS GuardDuty logs, they are parsed, normalized, and stored in a Snowflake security data lake. This allows security teams to write detections, detect anomalies, and conduct investigations on logs in the context of days, weeks, or months of data.\"}),/*#__PURE__*/t(\"p\",{children:[\"Panther applies normalization fields to all log records, which standardizes names for attributes and empowers users to correlate data across all log types. Panther\u2018s search tools empower you to investigate your normalized logs for suspicious activity or vulnerabilities. For more on searching log data in Panther, \",/*#__PURE__*/e(o,{href:\"https://docs.panther.com/search\",motionChild:!0,nodeId:\"SyBeQVkaI\",openInNewTab:!0,scopeId:\"contentManagement\",smoothScroll:!1,children:/*#__PURE__*/e(n.a,{children:\"check out our documentation on Investigations & Search\"})}),\".\"]}),/*#__PURE__*/e(\"h3\",{children:\"Detection as Code\"}),/*#__PURE__*/e(\"p\",{children:\"With Panther, your team won't be confined to restrictive detection rules as seen in most SIEM platforms. Panther is built with detection-as-code principles, allowing you to use Python to define detection logic and to integrate external systems like version control and CI/CD pipelines into your detection engineering workflows. This results in powerful, flexible, and reusable scripting of detections for your security team.\"}),/*#__PURE__*/t(\"p\",{children:[\"Pre-built detections for GuardDuty logs are available by default in Panther, offering users immediate value for monitoring common IoCs and threats. You can \",/*#__PURE__*/e(o,{href:\"https://panther.com/product/detection-coverage/#filter=guardduty\",motionChild:!0,nodeId:\"SyBeQVkaI\",openInNewTab:!1,scopeId:\"contentManagement\",smoothScroll:!1,children:/*#__PURE__*/e(n.a,{children:\" explore our built-in detection coverage for GuardDuty here\"})}),\".\"]}),/*#__PURE__*/e(\"h3\",{children:\"Configuring Alerts\"}),/*#__PURE__*/t(\"p\",{children:[\"Panther fires alerts when your detection rules or policies are triggered, and integrates with a variety of \",/*#__PURE__*/e(o,{href:\"https://panther.com/integrations/alerts/\",motionChild:!0,nodeId:\"SyBeQVkaI\",openInNewTab:!1,scopeId:\"contentManagement\",smoothScroll:!1,children:/*#__PURE__*/e(n.a,{children:\" alert destinations\"})}),\" to allow for easy access and management of any GuardDuty alerts. Alerts can also be sent to alert context or SOAR platforms for more remediation options.\"]}),/*#__PURE__*/e(\"p\",{children:\"Alerts are categorized within five different severity levels: Info, Low, Medium, High, and Critical. Security teams have the option to dynamically assign severity level based on specific log event attributes.\"}),/*#__PURE__*/e(\"h3\",{children:\"Customer Support\"}),/*#__PURE__*/e(\"p\",{children:\"If you have any questions about configuring or monitoring GuardDuty logs in Panther, we're here to help. All customers have access to our technical support team via a dedicated Slack channel, email, or in-app messenger.\"}),/*#__PURE__*/t(\"p\",{children:[\"You can view our \",/*#__PURE__*/e(o,{href:\"https://docs.panther.com/data-onboarding/supported-logs/aws/guardduty\",motionChild:!0,nodeId:\"SyBeQVkaI\",openInNewTab:!0,scopeId:\"contentManagement\",smoothScroll:!1,children:/*#__PURE__*/e(n.a,{children:\"documentation on GuardDuty and monitoring AWS GuardDuty logs here\"})}),\", or customers can sign up for \",/*#__PURE__*/e(o,{href:\"https://pnthr.io/community\",motionChild:!0,nodeId:\"SyBeQVkaI\",openInNewTab:!0,scopeId:\"contentManagement\",smoothScroll:!1,children:/*#__PURE__*/e(n.a,{children:\"the Panther Community\"})}),\" to share best practices or custom detections for monitoring GuardDuty.\"]}),/*#__PURE__*/e(\"h3\",{children:\"The Ideal SIEM for AWS Environments\"}),/*#__PURE__*/e(\"p\",{children:\"With Panther, security teams don't have to pay skyrocketing costs to keep up with cloud data volume, struggle with restrictive detection logic, or waste time and resources on operational overhead. Panther was founded by a team of veteran security practitioners who struggled with legacy SIEM challenges first-hand, and built an intuitive, cloud-native platform to solve them.\"}),/*#__PURE__*/t(\"p\",{children:[\"Panther is a cloud-native SIEM built for security operations at scale, offering flexible detection-as-code, intuitive security workflows, and actionable real-time alerts to keep up with the needs of today's security teams. For a powerful, flexible, and scalable SIEM solution for AWS environments, \",/*#__PURE__*/e(o,{href:\"https://panther.com/product/request-a-demo/\",motionChild:!0,nodeId:\"SyBeQVkaI\",openInNewTab:!1,scopeId:\"contentManagement\",smoothScroll:!1,children:/*#__PURE__*/e(n.a,{children:\" request a demo today\"})}),\".\"]})]});export const richText14=/*#__PURE__*/t(i.Fragment,{children:[/*#__PURE__*/e(\"h3\",{children:\"Integration Overview\"}),/*#__PURE__*/e(\"p\",{children:\"S3 Server Access Logging is a feature provided by Amazon Web Services that allows you to log all requests made to your S3 bucket. This can be useful for monitoring and troubleshooting purposes, as well as for compliance and auditing. Panther can collect, normalize, and monitor S3 logs to help you identify suspicious activity in real time. Your normalized data is then retained to power future security investigations in a serverless data lake powered by Snowflake.\"}),/*#__PURE__*/e(\"h3\",{children:\"Use Cases for S3 Access Logs\"}),/*#__PURE__*/e(\"p\",{children:\"AWS S3 Server Access Logging provides detailed information about each request, including the time it was made, the requester's IP address, and the object accessed. Some common security use cases for S3 access logs include:\"}),/*#__PURE__*/t(\"ul\",{children:[/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/e(\"p\",{children:\"Detecting unauthorized access attempts or suspicious activity within your S3 bucket\"})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/e(\"p\",{children:\"Monitoring for HTTP (unencrypted) access to objects in an S3 bucket\"})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/e(\"p\",{children:\"Validating that proper IAM entities are accessing sensitive data buckets\"})})]}),/*#__PURE__*/e(\"h3\",{children:\"Onboarding S3 Logs in Panther\"}),/*#__PURE__*/e(\"p\",{children:\"Panther supports ingesting AWS S3 logs via an S3 bucket. To pull S3 logs into Panther, simply select AWS S3 Server Access from the list of predefined log sources in Panther, and set up an S3 bucket in the Panther Console to stream data from your AWS account.\"}),/*#__PURE__*/t(\"p\",{children:[\"For more detailed steps on onboarding AWS S3 logs or for supported log schema, you can \",/*#__PURE__*/e(o,{href:\"https://docs.panther.com/data-onboarding/supported-logs/aws/s3\",motionChild:!0,nodeId:\"SyBeQVkaI\",openInNewTab:!0,scopeId:\"contentManagement\",smoothScroll:!1,children:/*#__PURE__*/e(n.a,{children:\"view our AWS S3 documentation here\"})}),\".\"]}),/*#__PURE__*/e(\"h3\",{children:\"Parsing, Normalizing, and Analyzing\"}),/*#__PURE__*/e(\"p\",{children:\"As Panther ingests AWS S3 logs, they are parsed, normalized, and stored in a Snowflake security data lake. This allows security teams to write detections, detect anomalies, and conduct investigations on logs in the context of days, weeks, or months of data.\"}),/*#__PURE__*/t(\"p\",{children:[\"Panther applies normalization fields to all log records, which standardizes names for attributes and empowers users to correlate data across all log types. Panther's search tools empower you to investigate your normalized logs for suspicious activity or vulnerabilities. For more on searching log data in Panther, \",/*#__PURE__*/e(o,{href:\"https://docs.panther.com/search\",motionChild:!0,nodeId:\"SyBeQVkaI\",openInNewTab:!0,scopeId:\"contentManagement\",smoothScroll:!1,children:/*#__PURE__*/e(n.a,{children:\"check out our documentation on Investigations & Search\"})}),\".\"]}),/*#__PURE__*/e(\"h3\",{children:\"Detection as Code\"}),/*#__PURE__*/e(\"p\",{children:\"With Panther, your team won't be confined to restrictive detection rules as seen in most SIEM platforms. Panther is built with detection-as-code principles, allowing you to use Python to define detection logic and to integrate external systems like version control and CI/CD pipelines into your detection engineering workflows. This results in powerful, flexible, and reusable scripting of detections for your security team.\"}),/*#__PURE__*/t(\"p\",{children:[\"Pre-built detections for S3 server access logs are available by default in Panther, offering users immediate value for monitoring common IoCs and threats. You can \",/*#__PURE__*/e(o,{href:\"https://panther.com/product/detection-coverage/#filter=s3serveraccess\",motionChild:!0,nodeId:\"SyBeQVkaI\",openInNewTab:!1,scopeId:\"contentManagement\",smoothScroll:!1,children:/*#__PURE__*/e(n.a,{children:\" explore our built-in detection coverage for S3 here\"})}),\".\"]}),/*#__PURE__*/e(\"h3\",{children:\"Configuring Alerts\"}),/*#__PURE__*/t(\"p\",{children:[\"Panther fires alerts when your detection rules or policies are triggered, and integrates with a variety of \",/*#__PURE__*/e(o,{href:\"https://panther.com/integrations/alerts/\",motionChild:!0,nodeId:\"SyBeQVkaI\",openInNewTab:!1,scopeId:\"contentManagement\",smoothScroll:!1,children:/*#__PURE__*/e(n.a,{children:\" alert destinations \"})}),\" to allow for easy access and management of any S3 alerts. Alerts can also be sent to alert context or SOAR platforms for more remediation options.\"]}),/*#__PURE__*/e(\"p\",{children:\"Alerts are categorized within five different severity levels: Info, Low, Medium, High, and Critical. Security teams have the option to dynamically assign severity level based on specific log event attributes.\"}),/*#__PURE__*/e(\"h3\",{children:\"Customer Support\"}),/*#__PURE__*/e(\"p\",{children:\"If you have any questions about configuring or monitoring S3 logs in Panther, we're here to help. All customers have access to our technical support team via a dedicated Slack channel, email, or in-app messenger.\"}),/*#__PURE__*/t(\"p\",{children:[\"You can view our \",/*#__PURE__*/e(o,{href:\"https://docs.panther.com/data-onboarding/supported-logs/aws/s3\",motionChild:!0,nodeId:\"SyBeQVkaI\",openInNewTab:!0,scopeId:\"contentManagement\",smoothScroll:!1,children:/*#__PURE__*/e(n.a,{children:\"documentation on S3 and monitoring AWS S3 logs here\"})}),\", or customers can sign up for \",/*#__PURE__*/e(o,{href:\"https://pnthr.io/community\",motionChild:!0,nodeId:\"SyBeQVkaI\",openInNewTab:!0,scopeId:\"contentManagement\",smoothScroll:!1,children:/*#__PURE__*/e(n.a,{children:\"the Panther Community\"})}),\" to share best practices or custom detections for monitoring S3.\"]}),/*#__PURE__*/e(\"h3\",{children:\"The Ideal SIEM for AWS\"}),/*#__PURE__*/e(\"p\",{children:\"With Panther, security teams don't have to pay skyrocketing costs to keep up with cloud data volume, struggle with restrictive detection logic, or waste time and resources on operational overhead. Panther was founded by a team of veteran security practitioners who struggled with legacy SIEM challenges first-hand, and built an intuitive, cloud-native platform to solve them.\"}),/*#__PURE__*/t(\"p\",{children:[\"Panther is a cloud-native SIEM built for security operations at scale, offering flexible detection-as-code, intuitive security workflows, and actionable real-time alerts to keep up with the needs of today's security teams. For a powerful, flexible, and scalable SIEM solution for AWS environments, \",/*#__PURE__*/e(o,{href:\"https://panther.com/product/request-a-demo/\",motionChild:!0,nodeId:\"SyBeQVkaI\",openInNewTab:!1,scopeId:\"contentManagement\",smoothScroll:!1,children:/*#__PURE__*/e(n.a,{children:\" request a demo today\"})}),\".\"]})]});export const richText15=/*#__PURE__*/t(i.Fragment,{children:[/*#__PURE__*/e(\"h3\",{children:\"Integration Overview\"}),/*#__PURE__*/e(\"p\",{children:\"AWS Transit Gateway (also referred to as TGW) is a service provided by Amazon Web Services that enables you to connect multiple VPCs and on-premises networks together using a central hub. AWS Transit Gateway Flow Logs capture information about the IP traffic flowing through your transit gateway. Panther can collect, normalize, and monitor these logs to help you identify any suspicious activity in real time. Your normalized data is then retained to enable future security investigations in a serverless data lake powered by Snowflake.\"}),/*#__PURE__*/e(\"h3\",{children:\"Use Cases for Transit Gateway Flow Logs\"}),/*#__PURE__*/e(\"p\",{children:\"AWS Transit Gateway Flow Logs can capture information about source and destination IP addresses, ports, protocols, and packets and bytes transferred for each flow. Some common security use cases for Transit Gateway logs include:\"}),/*#__PURE__*/t(\"ul\",{children:[/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/e(\"p\",{children:\"Monitoring traffic between VPCs and on-premises networks to detect unauthorized access attempts or suspicious activity\"})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/e(\"p\",{children:\"Analyzing traffic patterns and trends to optimize resource utilization and identify potential security threats\"})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/e(\"p\",{children:\"Identifying and troubleshooting issues with network connectivity or routing\"})})]}),/*#__PURE__*/e(\"h3\",{children:\"Onboarding Transit Gateway Logs in Panther\"}),/*#__PURE__*/e(\"p\",{children:\"To pull Transit Gateway logs into Panther, you need to set up an S3 bucket in the Panther Console to stream data from your AWS account. Simply select AWS Transit Gateway Flow from the list of predefined log sources in Panther, and configure an S3 bucket for data transport.\"}),/*#__PURE__*/t(\"p\",{children:[\"For more detailed steps on onboarding Transit Gateway Flow Logs or for supported log schema, you can \",/*#__PURE__*/e(o,{href:\"https://docs.panther.com/data-onboarding/supported-logs/aws/transit-gateway\",motionChild:!0,nodeId:\"SyBeQVkaI\",openInNewTab:!0,scopeId:\"contentManagement\",smoothScroll:!1,children:/*#__PURE__*/e(n.a,{children:\"view our AWS Transit Gateway documentation here\"})}),\".\"]}),/*#__PURE__*/e(\"h3\",{children:\"Parsing, Normalizing, and Analyzing\"}),/*#__PURE__*/e(\"p\",{children:\"As Panther ingests TGW Flow Logs, they are parsed, normalized, and stored in a Snowflake security data lake. This allows security teams to write detections, detect anomalies, and conduct investigations on logs in the context of days, weeks, or months of data.\"}),/*#__PURE__*/t(\"p\",{children:[\"Panther applies normalization fields to all log records, which standardizes names for attributes and enables the correlation of data across all logs. Panther's search tools empower you to investigate your normalized logs for suspicious activity or vulnerabilities. For more on searching log data in Panther, \",/*#__PURE__*/e(o,{href:\"https://docs.panther.com/search\",motionChild:!0,nodeId:\"SyBeQVkaI\",openInNewTab:!0,scopeId:\"contentManagement\",smoothScroll:!1,children:/*#__PURE__*/e(n.a,{children:\"check out our documentation on Investigations & Search\"})}),\".\"]}),/*#__PURE__*/e(\"h3\",{children:\"Detection as Code\"}),/*#__PURE__*/e(\"p\",{children:\"With Panther, your team won't be confined to restrictive detection rules or proprietary coding languages as seen in many SIEM tools. Panther is built with detection-as-code principles, allowing you to use Python to define detection logic and to integrate external systems like version control and CI/CD pipelines into your detection engineering workflows. This results in powerful, flexible, and reusable scripting of detections for your security team.\"}),/*#__PURE__*/e(\"h3\",{children:\"Configuring Alerts\"}),/*#__PURE__*/t(\"p\",{children:[\"Panther fires alerts when your detection rules or policies are triggered, and integrates with a variety of \",/*#__PURE__*/e(o,{href:\"https://panther.com/integrations/alerts/\",motionChild:!0,nodeId:\"SyBeQVkaI\",openInNewTab:!1,scopeId:\"contentManagement\",smoothScroll:!1,children:/*#__PURE__*/e(n.a,{children:\" alert destinations \"})}),\" to allow for easy access and management of any Transit Gateway alerts. Alerts can also be sent to alert context or SOAR platforms for more remediation options.\"]}),/*#__PURE__*/e(\"p\",{children:\"Alerts are grouped within five different severity levels: Info, Low, Medium, High, and Critical. Security teams have the option to dynamically assign severity level based on specific log event attributes.\"}),/*#__PURE__*/e(\"h3\",{children:\"Customer Support\"}),/*#__PURE__*/e(\"p\",{children:\"If you have any questions about configuring or monitoring Transit Gateway Flow Logs in Panther, we're here to help. All customers have access to our technical support team via a dedicated Slack channel, email, or in-app messenger.\"}),/*#__PURE__*/t(\"p\",{children:[\"You can view our \",/*#__PURE__*/e(o,{href:\"https://docs.panther.com/data-onboarding/supported-logs/aws/transit-gateway\",motionChild:!0,nodeId:\"SyBeQVkaI\",openInNewTab:!0,scopeId:\"contentManagement\",smoothScroll:!1,children:/*#__PURE__*/e(n.a,{children:\"documentation on configuring and monitoring AWS Transit Gateway logs here\"})}),\", or customers can sign up for \",/*#__PURE__*/e(o,{href:\"https://pnthr.io/community\",motionChild:!0,nodeId:\"SyBeQVkaI\",openInNewTab:!0,scopeId:\"contentManagement\",smoothScroll:!1,children:/*#__PURE__*/e(n.a,{children:\"the Panther Community\"})}),\" to share best practices or custom detections.\"]}),/*#__PURE__*/e(\"h3\",{children:\"The Ideal SIEM for AWS Environments\"}),/*#__PURE__*/e(\"p\",{children:\"With Panther, security teams don't have to pay skyrocketing costs to keep up with cloud data volume, struggle with restrictive detection logic, or waste time and resources on operational overhead. Panther was founded by a team of veteran security practitioners who struggled with legacy SIEM challenges first-hand, and built an intuitive, cloud-native platform to solve them.\"}),/*#__PURE__*/t(\"p\",{children:[\"Panther is a cloud-native SIEM built for security operations at scale, offering flexible detection-as-code, intuitive security workflows, and actionable real-time alerts to keep up with the needs of today's security teams. For a powerful, flexible, and scalable SIEM solution for AWS environments, \",/*#__PURE__*/e(o,{href:\"https://panther.com/product/request-a-demo/\",motionChild:!0,nodeId:\"SyBeQVkaI\",openInNewTab:!1,scopeId:\"contentManagement\",smoothScroll:!1,children:/*#__PURE__*/e(n.a,{children:\" request a demo today\"})}),\".\"]})]});export const richText16=/*#__PURE__*/t(i.Fragment,{children:[/*#__PURE__*/e(\"h3\",{children:\"Integration Overview\"}),/*#__PURE__*/e(\"p\",{children:\"AWS VPC (Virtual Private Cloud) is a service provided by Amazon Web Services that allows you to create a private network within the AWS cloud. With AWS VPC, you can create your own virtual network topology, including subnets, routing tables, and network gateways. Panther can collect, normalize, and monitor VPC logs to help you identify suspicious activity in real time. Your normalized data is then retained to power future security investigations in a serverless data lake powered by Snowflake.\"}),/*#__PURE__*/e(\"h3\",{children:\"Use Cases for VPC Flow & DNS Logs\"}),/*#__PURE__*/e(\"p\",{children:\"Panther supports the ingestion of both AWS.VPCDns and AWS.VPCFlow log types. Some common security use cases for these logs include:\"}),/*#__PURE__*/t(\"ul\",{children:[/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/e(\"p\",{children:\"Monitoring remote logins and flagging administrative activity such as SSH and RDP\"})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/e(\"p\",{children:\"Detecting suspicious activity such as port scanning, network enumeration attempts, and data exfiltration\"})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/e(\"p\",{children:\"Examining threat patterns and generating reports of risky behaviors or non-compliant protocols\"})})]}),/*#__PURE__*/e(\"h3\",{children:\"Onboarding VPC Logs in Panther\"}),/*#__PURE__*/e(\"p\",{children:\"Panther supports ingesting VPC logs via an AWS S3 bucket. To pull VPC logs into Panther, simply select AWS VPC from the list of predefined log sources in Panther, and configure an S3 bucket for data transport.\"}),/*#__PURE__*/t(\"p\",{children:[\"For more detailed steps on onboarding AWS VPC logs or for supported log schema, you can \",/*#__PURE__*/e(o,{href:\"https://docs.panther.com/data-onboarding/supported-logs/aws/vpc\",motionChild:!0,nodeId:\"SyBeQVkaI\",openInNewTab:!0,scopeId:\"contentManagement\",smoothScroll:!1,children:/*#__PURE__*/e(n.a,{children:\"view our AWS VPC documentation here\"})}),\".\"]}),/*#__PURE__*/e(\"h3\",{children:\"Parsing, Normalizing, and Analyzing\"}),/*#__PURE__*/e(\"p\",{children:\"As Panther ingests VPC logs, they are parsed, normalized, and stored in a Snowflake security data lake. This allows security teams to write detections, detect anomalies, and conduct investigations on logs in the context of days, weeks, or months of data.\"}),/*#__PURE__*/t(\"p\",{children:[\"Panther applies normalization fields to all log records, which standardizes names for attributes and empowers users to correlate data across all log types. Panther's search tools empower you to investigate your normalized logs for suspicious activity or vulnerabilities. For more on searching log data in Panther, \",/*#__PURE__*/e(o,{href:\"https://docs.panther.com/search\",motionChild:!0,nodeId:\"SyBeQVkaI\",openInNewTab:!0,scopeId:\"contentManagement\",smoothScroll:!1,children:/*#__PURE__*/e(n.a,{children:\"check out our documentation on Investigations & Search\"})}),\".\"]}),/*#__PURE__*/e(\"h3\",{children:\"Detection as Code\"}),/*#__PURE__*/e(\"p\",{children:\"With Panther, your team won't be confined to restrictive detection rules as seen in most SIEM platforms. Panther is built with detection-as-code principles, allowing you to use Python to define detection logic and to integrate external systems like version control and CI/CD pipelines into your detection engineering workflows. This results in powerful, flexible, and reusable scripting of detections for your security team.\"}),/*#__PURE__*/t(\"p\",{children:[\"Pre-built detections for VPC logs are available by default in Panther, offering users immediate value for monitoring common IoCs and threats. You can \",/*#__PURE__*/e(o,{href:\"https://panther.com/product/detection-coverage/#filter=aws.vpc\",motionChild:!0,nodeId:\"SyBeQVkaI\",openInNewTab:!1,scopeId:\"contentManagement\",smoothScroll:!1,children:/*#__PURE__*/e(n.a,{children:\" explore our built-in detection coverage for VPC DNS and Flow Logs here\"})}),\".\"]}),/*#__PURE__*/e(\"h3\",{children:\"Configuring Alerts\"}),/*#__PURE__*/t(\"p\",{children:[\"Panther fires alerts when your detection rules or policies are triggered, and integrates with a variety of \",/*#__PURE__*/e(o,{href:\"https://panther.com/integrations/alerts/\",motionChild:!0,nodeId:\"SyBeQVkaI\",openInNewTab:!1,scopeId:\"contentManagement\",smoothScroll:!1,children:/*#__PURE__*/e(n.a,{children:\" alert destinations \"})}),\" to allow for easy access and management of any alerts. Alerts can also be sent to alert context or SOAR platforms for more remediation options.\"]}),/*#__PURE__*/e(\"p\",{children:\"Alerts are categorized within five different severity levels: Info, Low, Medium, High, and Critical. Security teams have the option to dynamically assign severity level based on specific log event attributes.\"}),/*#__PURE__*/e(\"h3\",{children:\"Customer Support\"}),/*#__PURE__*/e(\"p\",{children:\"If you have any questions about configuring or monitoring VPC logs in Panther, we're here to help. All customers have access to our technical support team via a dedicated Slack channel, email, or in-app messenger.\"}),/*#__PURE__*/t(\"p\",{children:[\"You can view our \",/*#__PURE__*/e(o,{href:\"https://docs.panther.com/data-onboarding/supported-logs/aws/vpc\",motionChild:!0,nodeId:\"SyBeQVkaI\",openInNewTab:!0,scopeId:\"contentManagement\",smoothScroll:!1,children:/*#__PURE__*/e(n.a,{children:\"documentation on configuring and monitoring AWS VPC logs here\"})}),\", or customers can sign up for \",/*#__PURE__*/e(o,{href:\"https://pnthr.io/community\",motionChild:!0,nodeId:\"SyBeQVkaI\",openInNewTab:!0,scopeId:\"contentManagement\",smoothScroll:!1,children:/*#__PURE__*/e(n.a,{children:\"the Panther Community\"})}),\" to share best practices or custom detections for monitoring VPC logs.\"]}),/*#__PURE__*/e(\"h3\",{children:\"The Ideal SIEM for AWS Environments\"}),/*#__PURE__*/e(\"p\",{children:\"With Panther, security teams don't have to pay skyrocketing costs to keep up with cloud data volume, struggle with rigid detection logic, or waste resources on operational overhead. Panther was founded by a team of veteran security practitioners who struggled with legacy SIEM challenges first-hand, and built an intuitive, cloud-native platform to solve them.\"}),/*#__PURE__*/t(\"p\",{children:[\"Panther is a cloud-native SIEM built for security operations at scale, offering flexible detection-as-code, intuitive security workflows, and actionable real-time alerts to keep up with the needs of today's security teams. For a powerful, flexible, and scalable SIEM solution for VPC Flow and DNS logs, \",/*#__PURE__*/e(o,{href:\"https://panther.com/product/request-a-demo/\",motionChild:!0,nodeId:\"SyBeQVkaI\",openInNewTab:!0,scopeId:\"contentManagement\",smoothScroll:!1,children:/*#__PURE__*/e(n.a,{children:\"request a demo today\"})}),\".\"]})]});export const richText17=/*#__PURE__*/t(i.Fragment,{children:[/*#__PURE__*/e(\"h3\",{children:\"Integration Overview\"}),/*#__PURE__*/e(\"p\",{children:\"Web Access Firewall (WAF) is a service provided by Amazon Web Services that allows you to control how your protected resources respond to HTTP(S) web requests. This is done by creating Access Control Lists (ACLs), which can define rules to allow or deny traffic to and from your AWS resources, such as EC2 instances, subnets, or VPCs. Panther can collect, normalize, and monitor WAF Web ACL logs to help you identify suspicious activity in real time. Your normalized data is then retained to power future security investigations in a serverless data lake powered by Snowflake.\"}),/*#__PURE__*/e(\"h3\",{children:\"Use Cases for WAF Web ACL Logs\"}),/*#__PURE__*/e(\"p\",{children:\"WAF Web ACL logs capture web access control list (ACL) traffic information, including when AWS WAF received a web request, detailed information about the request, and any details about the ACL rules that were matched. Some common security use cases for these logs include:\"}),/*#__PURE__*/t(\"ul\",{children:[/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/e(\"p\",{children:\"Investigating any web requests blocked, terminated, or matched by ACL rules\"})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/e(\"p\",{children:\"Monitoring traffic and rule matches to validate and tune ACL rules and rule groups\"})})]}),/*#__PURE__*/e(\"h3\",{children:\"Onboarding WAF Logs in Panther\"}),/*#__PURE__*/e(\"p\",{children:\"Panther supports ingesting WAF logs via an AWS S3 bucket. To pull WAF logs into Panther, simply select AWS WAF Web ACL from the list of predefined log sources in Panther, and configure an S3 bucket for data transport.\"}),/*#__PURE__*/t(\"p\",{children:[\"For more detailed steps on onboarding AWS WAF logs or for supported log schema, you can \",/*#__PURE__*/e(o,{href:\"https://docs.panther.com/data-onboarding/supported-logs/aws/waf\",motionChild:!0,nodeId:\"SyBeQVkaI\",openInNewTab:!0,scopeId:\"contentManagement\",smoothScroll:!1,children:/*#__PURE__*/e(n.a,{children:\"view our AWS WAF documentation here\"})}),\".\"]}),/*#__PURE__*/e(\"h3\",{children:\"Parsing, Normalizing, and Analyzing\"}),/*#__PURE__*/e(\"p\",{children:\"As Panther ingests WAF logs, they are parsed, normalized, and stored in a Snowflake security data lake. This allows security teams to write detections, detect anomalies, and conduct investigations on logs in the context of days, weeks, or months of data.\"}),/*#__PURE__*/t(\"p\",{children:[\"Panther applies normalization fields to all log records, which standardizes names for attributes and empowers users to correlate data across all log types. Panther's search tools empower you to investigate your normalized logs for suspicious activity or vulnerabilities. For more on searching log data in Panther, \",/*#__PURE__*/e(o,{href:\"https://docs.panther.com/search\",motionChild:!0,nodeId:\"SyBeQVkaI\",openInNewTab:!0,scopeId:\"contentManagement\",smoothScroll:!1,children:/*#__PURE__*/e(n.a,{children:\"check out our documentation on Investigations & Search\"})}),\".\"]}),/*#__PURE__*/e(\"h3\",{children:\"Detection as Code\"}),/*#__PURE__*/e(\"p\",{children:\"With Panther, your team won\u2018t be confined to restrictive detection rules as seen in most SIEM platforms. Panther is built with detection-as-code principles, allowing you to use Python to define detection logic and to integrate external systems like version control and CI/CD pipelines into your detection engineering workflows. This results in powerful, flexible, and reusable scripting of detections for your security team.\"}),/*#__PURE__*/e(\"h3\",{children:\"Configuring Alerts\"}),/*#__PURE__*/t(\"p\",{children:[\"Panther fires alerts when your detection rules or policies are triggered, and integrates with a variety of \",/*#__PURE__*/e(o,{href:\"https://panther.com/integrations/alerts/\",motionChild:!0,nodeId:\"SyBeQVkaI\",openInNewTab:!1,scopeId:\"contentManagement\",smoothScroll:!1,children:/*#__PURE__*/e(n.a,{children:\" alert destinations\"})}),\" to allow for easy access and management of any alerts. Alerts can also be sent to alert context or SOAR platforms for more remediation options.\"]}),/*#__PURE__*/e(\"p\",{children:\"Alerts are grouped within five different severity levels: Info, Low, Medium, High, and Critical. Security teams have the option to dynamically assign severity level based on specific log event attributes.\"}),/*#__PURE__*/e(\"h3\",{children:\"Customer Support\"}),/*#__PURE__*/e(\"p\",{children:\"If you have any questions about configuring or monitoring WAF logs in Panther, we're here to help. All customers have access to our technical support team via a dedicated Slack channel, email, or in-app messenger.\"}),/*#__PURE__*/t(\"p\",{children:[\"You can view our \",/*#__PURE__*/e(o,{href:\"https://docs.panther.com/data-onboarding/supported-logs/aws/waf\",motionChild:!0,nodeId:\"SyBeQVkaI\",openInNewTab:!0,scopeId:\"contentManagement\",smoothScroll:!1,children:/*#__PURE__*/e(n.a,{children:\"documentation on configuring and monitoring AWS WAF logs here\"})}),\", or customers can sign up for \",/*#__PURE__*/e(o,{href:\"https://pnthr.io/community\",motionChild:!0,nodeId:\"SyBeQVkaI\",openInNewTab:!0,scopeId:\"contentManagement\",smoothScroll:!1,children:/*#__PURE__*/e(n.a,{children:\"the Panther Community\"})}),\" to share best practices or custom detections.\"]}),/*#__PURE__*/e(\"h3\",{children:\"The Ideal SIEM for AWS WAF Logs\"}),/*#__PURE__*/e(\"p\",{children:\"With Panther, security teams don't have to pay skyrocketing costs to keep up with cloud data volume, struggle with restrictive detection logic, or waste resources on operational overhead. Panther was founded by a team of veteran security practitioners who struggled with legacy SIEM challenges first-hand, and built an intuitive, cloud-native platform to solve them.\"}),/*#__PURE__*/t(\"p\",{children:[\"Panther is a cloud-native SIEM built for security operations at scale, offering flexible detection-as-code, intuitive security workflows, and actionable real-time alerts to keep up with the needs of today's security teams. For a powerful, flexible, and scalable SIEM solution for AWS environments, \",/*#__PURE__*/e(o,{href:\"https://panther.com/product/request-a-demo/\",motionChild:!0,nodeId:\"SyBeQVkaI\",openInNewTab:!1,scopeId:\"contentManagement\",smoothScroll:!1,children:/*#__PURE__*/e(n.a,{children:\" request a demo today\"})}),\".\"]})]});export const richText18=/*#__PURE__*/t(i.Fragment,{children:[/*#__PURE__*/e(\"h3\",{children:\"Integration Overview\"}),/*#__PURE__*/e(\"p\",{children:\"Tines is a no-code platform that allows organizations to build and maintain automated workflows and repetitive processes. Panther can collect, normalize, and monitor Tines logs to help you identify suspicious activity within your Tines tenant in real time. Your normalized log data is then retained to power future security investigations in a data lake powered by the cloud-native data platform, Snowflake.\"}),/*#__PURE__*/e(\"h3\",{children:\"Use Cases for Tines Logs\"}),/*#__PURE__*/e(\"p\",{children:\"Tines audit logs are automatically captured any time a user changes a piece of data within your tenant. Some common security use cases for Tines audit logs include:\"}),/*#__PURE__*/t(\"ul\",{children:[/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/e(\"p\",{children:\"Detecting the creation or deletion of API keys\"})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/e(\"p\",{children:\"Identifying any changes to SSO settings\"})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/e(\"p\",{children:\"Monitoring for excessive changes to Actions, Spotlight reports, or Stories\"})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/e(\"p\",{children:\"Alerting when users are deleted, edited, or added\"})})]}),/*#__PURE__*/e(\"h3\",{children:\"Onboarding Tines Logs in Panther\"}),/*#__PURE__*/e(\"p\",{children:\"Panther can fetch Tines logs by querying the Tines API. Specifically, Panther pulls Tines Audit logs, by querying the Audit logs API. Setting Tines up in Panther is fast and easy - simply create a new Tines log source within the Panther console, generate an API key in Tines, and submit your key and credentials into Panther.\"}),/*#__PURE__*/t(\"p\",{children:[\"For more details on onboarding Tines logs or for supported log schema, you can \",/*#__PURE__*/e(o,{href:\"https://docs.panther.com/data-onboarding/supported-logs/tines\",motionChild:!0,nodeId:\"SyBeQVkaI\",openInNewTab:!0,scopeId:\"contentManagement\",smoothScroll:!1,children:/*#__PURE__*/e(n.a,{children:\"view our Tines documentation here\"})}),\".\"]}),/*#__PURE__*/e(\"h3\",{children:\"Parsing, Normalizing, & Analyzing\"}),/*#__PURE__*/e(\"p\",{children:\"As Panther ingests Tines logs, they are parsed, normalized, and stored in a Snowflake security data lake. This allows you to write detections, identify anomalies, and conduct investigations in the context of days, weeks, or months of data.\"}),/*#__PURE__*/t(\"p\",{children:[\"Panther applies normalization fields to log records, which standardizes names for attributes and enables you to correlate data across all of your log sources. Panther\u2019s handy search tools - such as Query Builder, Data Explorer, and Indicator Search - allow you to investigate your normalized logs for suspicious activity or vulnerabilities. For more information on searching logs, \",/*#__PURE__*/e(o,{href:\"https://docs.panther.com/data-analytics\",motionChild:!0,nodeId:\"SyBeQVkaI\",openInNewTab:!0,scopeId:\"contentManagement\",smoothScroll:!1,children:/*#__PURE__*/e(n.a,{children:\"check out our documentation on Investigations & Search\"})}),\".\"]}),/*#__PURE__*/e(\"h3\",{children:\"Detection as Code\"}),/*#__PURE__*/e(\"p\",{children:\"With Panther, you aren\u2018t confined to rigid detections as seen in many SIEM solutions. Panther is built around detection-as-code principles, giving you the ability to write Python to define detection logic and to integrate external systems like version control and CI/CD pipelines into your detection engineering processes. This results in powerful, flexible, and reusable scripting of detections for your security team.\"}),/*#__PURE__*/t(\"p\",{children:[\"Pre-built detections for Tines are available in Panther, offering you the ability to immediately monitor for common IoCs and threats. You can \",/*#__PURE__*/e(o,{href:\"https://panther.com/product/detection-coverage/#filter=tines\",motionChild:!0,nodeId:\"SyBeQVkaI\",openInNewTab:!1,scopeId:\"contentManagement\",smoothScroll:!1,children:/*#__PURE__*/e(n.a,{children:\" explore our built-in detection coverage for Tines logs here\"})}),\".\"]}),/*#__PURE__*/e(\"h3\",{children:\"Configuring Alerts\"}),/*#__PURE__*/t(\"p\",{children:[\"Panther generates alerts when your detection rules or policies for Tines are triggered, and integrates with a variety of \",/*#__PURE__*/e(o,{href:\"https://panther.com/integrations/alerts/\",motionChild:!0,nodeId:\"SyBeQVkaI\",openInNewTab:!1,scopeId:\"contentManagement\",smoothScroll:!1,children:/*#__PURE__*/e(n.a,{children:\" alert destinations \"})}),\" to allow for intuitive management of any alerts. Alerts can also be sent to alert context or SOAR platforms for more remediation options.\"]}),/*#__PURE__*/e(\"p\",{children:\"Alerts are grouped into five different severity levels: Info, Low, Medium, High, and Critical. Your security team has the ability to dynamically assign severity based on specific log event attributes.\"}),/*#__PURE__*/e(\"h3\",{children:\"Customer Support\"}),/*#__PURE__*/e(\"p\",{children:\"If you have any questions about onboarding or monitoring Tines logs in Panther, our customer support team is here to help. All customers have access to support via a dedicated Slack channel, email, or in-app messenger.\"}),/*#__PURE__*/t(\"p\",{children:[\"You can view our \",/*#__PURE__*/e(o,{href:\"https://docs.panther.com/data-onboarding/supported-logs/tines\",motionChild:!0,nodeId:\"SyBeQVkaI\",openInNewTab:!0,scopeId:\"contentManagement\",smoothScroll:!1,children:/*#__PURE__*/e(n.a,{children:\"documentation on configuring and monitoring Tines logs here\"})}),\", or customers can sign up for \",/*#__PURE__*/e(o,{href:\"https://pnthr.io/community\",motionChild:!0,nodeId:\"SyBeQVkaI\",openInNewTab:!0,scopeId:\"contentManagement\",smoothScroll:!1,children:/*#__PURE__*/e(n.a,{children:\"the Panther Community\"})}),\" to share best practices or custom detections for Tines logs.\"]}),/*#__PURE__*/e(\"h3\",{children:\"The Ideal SIEM for Tines\"}),/*#__PURE__*/e(\"p\",{children:\"With Panther, your team doesn\u2019t have to pay excessive costs to keep up with the growth of cloud app data, waste time and resources on operational overhead, or struggle with restrictive detection logic. Panther was founded by a team of security engineers who struggled with other SIEM solutions first-hand, and built an intuitive, cloud-native platform to meet today\u2018s security needs.\"}),/*#__PURE__*/t(\"p\",{children:[\"Panther is a cloud-native SIEM built for security operations at scale, offering flexible detection-as-code, intuitive security workflows, and actionable real-time alerts. For a powerful, practical, and scalable SIEM solution for Tines, \",/*#__PURE__*/e(o,{href:\"https://panther.com/product/request-a-demo/\",motionChild:!0,nodeId:\"SyBeQVkaI\",openInNewTab:!1,scopeId:\"contentManagement\",smoothScroll:!1,children:/*#__PURE__*/e(n.a,{children:\" request a demo today\"})}),\".\"]})]});export const richText19=/*#__PURE__*/t(i.Fragment,{children:[/*#__PURE__*/e(\"h3\",{children:\"Integration Overview\"}),/*#__PURE__*/e(\"p\",{children:\"Bitwarden is an integrated, open-source password management solution for individuals and business organizations. Panther can collect, normalize, and monitor Bitwarden logs to help you identify any suspicious activity within your organization in real time. Your normalized data is then retained to conduct future security investigations in a serverless security data lake powered by Snowflake.\"}),/*#__PURE__*/e(\"h3\",{children:\"Use Cases for Bitwarden Event Logs\"}),/*#__PURE__*/e(\"p\",{children:\"Bitwarden event logs show various types of activity in a user's Bitwarden account, such as item usages or sign-in attempts. Common security use cases for Bitwarden logs include monitoring for:\"}),/*#__PURE__*/t(\"ul\",{children:[/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/e(\"p\",{children:\"User events such as login attempts and password changes\"})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/e(\"p\",{children:\"Item events such as creating and deleting items\"})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/e(\"p\",{children:\"Organization and Group event changes\"})})]}),/*#__PURE__*/e(\"h3\",{children:\"Onboarding Bitwarden Logs in Panther\"}),/*#__PURE__*/e(\"p\",{children:\"Panther\u2018s integration for Bitwarden is fast and easy to configure, allowing you to onboard logs in just a few minutes. Simply select Bitwarden from the list of log sources within the Panther console, fetch your API key from Bitwarden, and enter basic credentials and your API Key into Panther.\"}),/*#__PURE__*/t(\"p\",{children:[\"For more details on onboarding or for supported log schema, you can \",/*#__PURE__*/e(o,{href:\"https://docs.panther.com/data-onboarding/supported-logs/bitwarden-logs\",motionChild:!0,nodeId:\"SyBeQVkaI\",openInNewTab:!0,scopeId:\"contentManagement\",smoothScroll:!1,children:/*#__PURE__*/e(n.a,{children:\"view our Bitwarden documentation here\"})}),\".\"]}),/*#__PURE__*/e(\"h3\",{children:\"Parse, Normalize, & Analyze\"}),/*#__PURE__*/e(\"p\",{children:\"As Panther ingests Bitwarden event logs, they are parsed, normalized, and stored in a Snowflake security data lake. This allows you to write detections, identify anomalies, and conduct investigations in the context of days, weeks, or months of data.\"}),/*#__PURE__*/t(\"p\",{children:[\"Panther applies normalization fields to all log records, which standardizes names for attributes and empowers users to correlate data across all of your log sources. You can then use various search tools - such as Data Explorer, Indicator Search, and Query Builder - to investigate your normalized logs for suspicious activity or vulnerabilities. For more information on searching log data, \",/*#__PURE__*/e(o,{href:\"https://docs.panther.com/data-analytics\",motionChild:!0,nodeId:\"SyBeQVkaI\",openInNewTab:!0,scopeId:\"contentManagement\",smoothScroll:!1,children:/*#__PURE__*/e(n.a,{children:\"check out our documentation on Investigations & Search\"})}),\".\"]}),/*#__PURE__*/e(\"h3\",{children:\"Easily Customizable Detections\"}),/*#__PURE__*/e(\"p\",{children:\"Panther users aren\u2019t confined to restrictive detections as seen in many SIEM platforms. Panther is architected around detection-as-code principles, giving you the ability to write Python to define detection logic and to integrate external systems like version control and CI/CD pipelines into your detection engineering processes. This results in powerful, scalable, and reusable scripting of detections for your security team.\"}),/*#__PURE__*/e(\"h3\",{children:\"Configuring Alerts\"}),/*#__PURE__*/t(\"p\",{children:[\"Panther generates alerts when your detection rules or policies are triggered, and integrates with a variety of \",/*#__PURE__*/e(o,{href:\"https://panther.com/integrations/alerts/\",motionChild:!0,nodeId:\"SyBeQVkaI\",openInNewTab:!1,scopeId:\"contentManagement\",smoothScroll:!1,children:/*#__PURE__*/e(n.a,{children:\"alert destinations\"})}),\" to allow for easy access and management of any Bitwarden alerts. Alerts can also be sent to alert context or SOAR platforms for more remediation options.\"]}),/*#__PURE__*/e(\"p\",{children:\"Alerts are grouped into five different severity levels: Info, Low, Medium, High, and Critical. Your team has the ability to dynamically assign severity based on specific log event attributes.\"}),/*#__PURE__*/e(\"h3\",{children:\"Customer Support\"}),/*#__PURE__*/e(\"p\",{children:\"If you have any questions about configuring or monitoring Bitwarden logs in Panther, our customer support team is here to help. All customers have access to support via a dedicated Slack channel, email, or in-app messenger.\"}),/*#__PURE__*/t(\"p\",{children:[\"You can view our \",/*#__PURE__*/e(o,{href:\"https://docs.panther.com/data-onboarding/supported-logs/bitwarden-logs\",motionChild:!0,nodeId:\"SyBeQVkaI\",openInNewTab:!0,scopeId:\"contentManagement\",smoothScroll:!1,children:/*#__PURE__*/e(n.a,{children:\"documentation on configuring and monitoring Bitwarden logs here\"})}),\", or customers can sign up for \",/*#__PURE__*/e(o,{href:\"https://pnthr.io/community\",motionChild:!0,nodeId:\"SyBeQVkaI\",openInNewTab:!0,scopeId:\"contentManagement\",smoothScroll:!1,children:/*#__PURE__*/e(n.a,{children:\"the Panther Community\"})}),\" to share best practices or custom detections for Bitwarden logs.\"]}),/*#__PURE__*/e(\"h3\",{children:\"Replacing Traditional SIEM for Bitwarden Logs\"}),/*#__PURE__*/e(\"p\",{children:\"With Panther, your team doesn\u2019t have to struggle with restrictive detection logic, waste time and resources on operational overhead, or pay excessive costs to keep up with the growth of cloud app data. Panther was founded by a team of security engineers who struggled with today\u2018s SIEM challenges first-hand, and built an intuitive, cloud-native platform to solve them.\"}),/*#__PURE__*/t(\"p\",{children:[\"Panther is a cloud-native SIEM built for security operations at scale, offering flexible detection-as-code, intuitive security workflows, and actionable real-time alerts to keep up with the needs of today\u2019s security teams. If you\u2018re searching for a seamless SIEM platform for Bitwarden logs, \",/*#__PURE__*/e(o,{href:\"https://panther.com/product/request-a-demo/\",motionChild:!0,nodeId:\"SyBeQVkaI\",openInNewTab:!1,scopeId:\"contentManagement\",smoothScroll:!1,children:/*#__PURE__*/e(n.a,{children:\"request a demo today\"})}),\".\"]})]});export const richText20=/*#__PURE__*/t(i.Fragment,{children:[/*#__PURE__*/e(\"h3\",{children:\"Integration Overview\"}),/*#__PURE__*/e(\"p\",{children:\"Sysdig is a cloud security platform that offers extensive monitoring of cloud infrastructure for vulnerabilities, configuration issues, and suspicious activity. Panther can collect, normalize, and monitor Sysdig audit logs to help you identify suspicious platform activity in real time. Your normalized log data is then retained to power future security investigations in a data lake powered by the cloud-native data platform, Snowflake.\"}),/*#__PURE__*/e(\"h3\",{children:\"Use Cases for Sysdig Audit Logs\"}),/*#__PURE__*/e(\"p\",{children:\"Panther specifically monitors Sysdig Platform Audit events for auditing and reporting on the use of the Sysdig platform itself. Some common security use cases for Sysdig logs include:\"}),/*#__PURE__*/t(\"ul\",{children:[/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/e(\"p\",{children:\"Detecting any suspicious activity within your Sysdig instance\"})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/e(\"p\",{children:\"Monitoring the creation, modification, or deletion of policies\"})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/e(\"p\",{children:\"Investigating any user access changes\"})})]}),/*#__PURE__*/e(\"h3\",{children:\"Onboarding Sysdig Logs in Panther\"}),/*#__PURE__*/e(\"p\",{children:\"Panther can pull audit logs directly from Sysdig by querying the Sysdig Audit REST API. Setting Sysdig up in Panther is fast and easy - you simply need to create a new Sysdig log source within the Panther console, create a Secure API Key in Sysdig, and submit your key and credentials into Panther.\"}),/*#__PURE__*/t(\"p\",{children:[\"For more details on onboarding Sysdig logs or for supported log schema, you can \",/*#__PURE__*/e(o,{href:\"https://docs.panther.com/data-onboarding/supported-logs/sysdig\",motionChild:!0,nodeId:\"SyBeQVkaI\",openInNewTab:!0,scopeId:\"contentManagement\",smoothScroll:!1,children:/*#__PURE__*/e(n.a,{children:\"view our Sysdig documentation here\"})}),\".\"]}),/*#__PURE__*/e(\"h3\",{children:\"Parsing, Normalizing, & Analyzing\"}),/*#__PURE__*/e(\"p\",{children:\"As Panther ingests Sysdig logs, they are parsed, normalized, and stored in a Snowflake security data lake. This allows you to write detections, identify anomalies, and conduct investigations in the context of days, weeks, or months of data.\"}),/*#__PURE__*/t(\"p\",{children:[\"Panther applies normalization fields to log records, which standardizes names for attributes and enables you to correlate data across all of your log sources. Panther\u2019s handy search tools - such as Query Builder, Data Explorer, and Indicator Search - allow you to investigate your normalized logs for suspicious activity or vulnerabilities. For more information on searching logs, \",/*#__PURE__*/e(o,{href:\"https://docs.panther.com/data-analytics\",motionChild:!0,nodeId:\"SyBeQVkaI\",openInNewTab:!0,scopeId:\"contentManagement\",smoothScroll:!1,children:/*#__PURE__*/e(n.a,{children:\"check out our documentation on Investigations & Search\"})}),\".\"]}),/*#__PURE__*/e(\"h3\",{children:\"Detection as Code\"}),/*#__PURE__*/e(\"p\",{children:\"With Panther, you aren't confined to restrictive detections as seen in many SIEM solutions. Panther is built around detection-as-code principles, giving you the ability to write Python to define detection logic and to integrate external systems like version control and CI/CD pipelines into your detection engineering processes. This results in powerful, flexible, and reusable scripting of detections for your security team.\"}),/*#__PURE__*/e(\"h3\",{children:\"Configuring Alerts\"}),/*#__PURE__*/t(\"p\",{children:[\"Panther generates alerts when your detection rules or policies for Sysdig are triggered, and integrates with a variety of \",/*#__PURE__*/e(o,{href:\"https://panther.com/integrations/alerts/\",motionChild:!0,nodeId:\"SyBeQVkaI\",openInNewTab:!1,scopeId:\"contentManagement\",smoothScroll:!1,children:/*#__PURE__*/e(n.a,{children:\" alert destinations \"})}),\" to allow for intuitive management of any alerts. Alerts can also be sent to alert context or SOAR platforms for more remediation options.\"]}),/*#__PURE__*/e(\"p\",{children:\"Alerts are categorized by five different severity levels: Info, Low, Medium, High, and Critical. Your security team has the ability to dynamically assign severity based on specific log event attributes.\"}),/*#__PURE__*/e(\"h3\",{children:\"Customer Support\"}),/*#__PURE__*/e(\"p\",{children:\"If you have any questions about onboarding or monitoring Sysdig logs in Panther, our customer support team is here to help. All customers have access to support via a dedicated Slack channel, email, or in-app messenger.\"}),/*#__PURE__*/t(\"p\",{children:[\"You can view our \",/*#__PURE__*/e(o,{href:\"https://docs.panther.com/data-onboarding/supported-logs/sysdig\",motionChild:!0,nodeId:\"SyBeQVkaI\",openInNewTab:!0,scopeId:\"contentManagement\",smoothScroll:!1,children:/*#__PURE__*/e(n.a,{children:\"documentation on configuring and monitoring Sysdig logs here\"})}),\", or customers can sign up for \",/*#__PURE__*/e(o,{href:\"https://pnthr.io/community\",motionChild:!0,nodeId:\"SyBeQVkaI\",openInNewTab:!1,scopeId:\"contentManagement\",smoothScroll:!1,children:/*#__PURE__*/e(n.a,{children:\"the Panther Community\"})}),\" to share best practices or custom detections for Sysdig logs.\"]}),/*#__PURE__*/e(\"h3\",{children:\"The Ideal SIEM for Sysdig\"}),/*#__PURE__*/e(\"p\",{children:\"With Panther, your team doesn\u2019t have to pay excessive costs to keep up with the growth of cloud app data, waste time and resources on operational overhead, or struggle with restrictive detection logic. Panther was founded by a team of security engineers who struggled with other SIEM solutions first-hand, and built an intuitive, cloud-native platform to solve them.\"}),/*#__PURE__*/t(\"p\",{children:[\"Panther is a cloud-native SIEM built for security operations at scale, offering flexible detection-as-code, intuitive security workflows, and actionable real-time alerts. For a powerful, practical, and scalable SIEM solution for Sysdig, \",/*#__PURE__*/e(o,{href:\"https://panther.com/product/request-a-demo/\",motionChild:!0,nodeId:\"SyBeQVkaI\",openInNewTab:!1,scopeId:\"contentManagement\",smoothScroll:!1,children:/*#__PURE__*/e(n.a,{children:\" request a demo today\"})}),\".\"]})]});\nexport const __FramerMetadata__ = {\"exports\":{\"richText4\":{\"type\":\"variable\",\"annotations\":{\"framerContractVersion\":\"1\"}},\"richText1\":{\"type\":\"variable\",\"annotations\":{\"framerContractVersion\":\"1\"}},\"richText18\":{\"type\":\"variable\",\"annotations\":{\"framerContractVersion\":\"1\"}},\"richText7\":{\"type\":\"variable\",\"annotations\":{\"framerContractVersion\":\"1\"}},\"richText12\":{\"type\":\"variable\",\"annotations\":{\"framerContractVersion\":\"1\"}},\"richText6\":{\"type\":\"variable\",\"annotations\":{\"framerContractVersion\":\"1\"}},\"richText8\":{\"type\":\"variable\",\"annotations\":{\"framerContractVersion\":\"1\"}},\"richText20\":{\"type\":\"variable\",\"annotations\":{\"framerContractVersion\":\"1\"}},\"richText5\":{\"type\":\"variable\",\"annotations\":{\"framerContractVersion\":\"1\"}},\"richText10\":{\"type\":\"variable\",\"annotations\":{\"framerContractVersion\":\"1\"}},\"richText15\":{\"type\":\"variable\",\"annotations\":{\"framerContractVersion\":\"1\"}},\"richText14\":{\"type\":\"variable\",\"annotations\":{\"framerContractVersion\":\"1\"}},\"richText11\":{\"type\":\"variable\",\"annotations\":{\"framerContractVersion\":\"1\"}},\"richText13\":{\"type\":\"variable\",\"annotations\":{\"framerContractVersion\":\"1\"}},\"richText16\":{\"type\":\"variable\",\"annotations\":{\"framerContractVersion\":\"1\"}},\"richText17\":{\"type\":\"variable\",\"annotations\":{\"framerContractVersion\":\"1\"}},\"richText3\":{\"type\":\"variable\",\"annotations\":{\"framerContractVersion\":\"1\"}},\"richText19\":{\"type\":\"variable\",\"annotations\":{\"framerContractVersion\":\"1\"}},\"richText2\":{\"type\":\"variable\",\"annotations\":{\"framerContractVersion\":\"1\"}},\"richText9\":{\"type\":\"variable\",\"annotations\":{\"framerContractVersion\":\"1\"}},\"richText\":{\"type\":\"variable\",\"annotations\":{\"framerContractVersion\":\"1\"}},\"__FramerMetadata__\":{\"type\":\"variable\"}}}"],
  "mappings": "+LAAsJ,IAAMA,EAAsBC,EAAIC,EAAS,CAAC,SAAS,CAAcC,EAAE,KAAK,CAAC,SAAS,sBAAsB,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,2ZAA2Z,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,iCAAiC,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,2OAA2O,CAAC,EAAeF,EAAE,KAAK,CAAC,SAAS,CAAcE,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBA,EAAE,IAAI,CAAC,SAAS,+BAA+B,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBA,EAAE,IAAI,CAAC,SAAS,gDAAgD,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBA,EAAE,IAAI,CAAC,SAAS,qCAAqC,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,mCAAmC,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,2SAA2S,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,CAAC,0FAAuGE,EAAEC,EAAE,CAAC,KAAK,iEAAiE,YAAY,GAAG,OAAO,YAAY,aAAa,GAAG,QAAQ,oBAAoB,aAAa,GAAG,SAAsBD,EAAEE,EAAE,EAAE,CAAC,SAAS,qCAAqC,CAAC,CAAC,CAAC,EAAE,GAAG,CAAC,CAAC,EAAeF,EAAE,KAAK,CAAC,SAAS,qCAAqC,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,oQAAoQ,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,CAAC,6OAA0PE,EAAEC,EAAE,CAAC,KAAK,0CAA0C,YAAY,GAAG,OAAO,YAAY,aAAa,GAAG,QAAQ,oBAAoB,aAAa,GAAG,SAAsBD,EAAEE,EAAE,EAAE,CAAC,SAAS,yDAAyD,CAAC,CAAC,CAAC,EAAE,GAAG,CAAC,CAAC,EAAeF,EAAE,KAAK,CAAC,SAAS,mBAAmB,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,gbAAgb,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,oBAAoB,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,CAAC,8GAA2HE,EAAEC,EAAE,CAAC,KAAK,2CAA2C,YAAY,GAAG,OAAO,YAAY,aAAa,GAAG,QAAQ,oBAAoB,aAAa,GAAG,SAAsBD,EAAEE,EAAE,EAAE,CAAC,SAAS,sBAAsB,CAAC,CAAC,CAAC,EAAE,8JAA8J,CAAC,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,yMAAyM,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,kBAAkB,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,0NAA0N,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,CAAC,oBAAiCE,EAAEC,EAAE,CAAC,KAAK,iEAAiE,YAAY,GAAG,OAAO,YAAY,aAAa,GAAG,QAAQ,oBAAoB,aAAa,GAAG,SAAsBD,EAAEE,EAAE,EAAE,CAAC,SAAS,+DAA+D,CAAC,CAAC,CAAC,EAAE,kCAA+CF,EAAEC,EAAE,CAAC,KAAK,6BAA6B,YAAY,GAAG,OAAO,YAAY,aAAa,GAAG,QAAQ,oBAAoB,aAAa,GAAG,SAAsBD,EAAEE,EAAE,EAAE,CAAC,SAAS,wBAAwB,CAAC,CAAC,CAAC,EAAE,sEAAsE,CAAC,CAAC,EAAeF,EAAE,KAAK,CAAC,SAAS,uCAAuC,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,+YAA+Y,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,CAAC,4SAAoTE,EAAEC,EAAE,CAAC,KAAK,8CAA8C,YAAY,GAAG,OAAO,YAAY,aAAa,GAAG,QAAQ,oBAAoB,aAAa,GAAG,SAAsBD,EAAEE,EAAE,EAAE,CAAC,SAAS,gBAAgB,CAAC,CAAC,CAAC,EAAE,kBAAa,CAAC,CAAC,CAAC,CAAC,CAAC,EAAeC,EAAuBL,EAAIC,EAAS,CAAC,SAAS,CAAcC,EAAE,KAAK,CAAC,SAAS,sBAAsB,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,mbAAmb,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,mCAAmC,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,CAAC,qCAAkDE,EAAEC,EAAE,CAAC,KAAK,yHAAyH,YAAY,GAAG,OAAO,YAAY,aAAa,GAAG,QAAQ,oBAAoB,aAAa,GAAG,SAAsBD,EAAEE,EAAE,EAAE,CAAC,SAAS,sBAAsB,CAAC,CAAC,CAAC,EAAE,uKAAuK,CAAC,CAAC,EAAeJ,EAAE,KAAK,CAAC,SAAS,CAAcE,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBA,EAAE,IAAI,CAAC,SAAS,6DAA6D,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBA,EAAE,IAAI,CAAC,SAAS,gFAAgF,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBA,EAAE,IAAI,CAAC,SAAS,0DAA0D,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,qCAAqC,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,kTAAkT,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,CAAC,8FAA2GE,EAAEC,EAAE,CAAC,KAAK,mEAAmE,YAAY,GAAG,OAAO,YAAY,aAAa,GAAG,QAAQ,oBAAoB,aAAa,GAAG,SAAsBD,EAAEE,EAAE,EAAE,CAAC,SAAS,uCAAuC,CAAC,CAAC,CAAC,EAAE,GAAG,CAAC,CAAC,EAAeF,EAAE,KAAK,CAAC,SAAS,uCAAuC,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,yQAAyQ,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,CAAC,0NAAuOE,EAAEC,EAAE,CAAC,KAAK,0CAA0C,YAAY,GAAG,OAAO,YAAY,aAAa,GAAG,QAAQ,oBAAoB,aAAa,GAAG,SAAsBD,EAAEE,EAAE,EAAE,CAAC,SAAS,yDAAyD,CAAC,CAAC,CAAC,EAAE,GAAG,CAAC,CAAC,EAAeF,EAAE,KAAK,CAAC,SAAS,mBAAmB,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,obAAob,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,oBAAoB,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,CAAC,8GAA2HE,EAAEC,EAAE,CAAC,KAAK,2CAA2C,YAAY,GAAG,OAAO,YAAY,aAAa,GAAG,QAAQ,oBAAoB,aAAa,GAAG,SAAsBD,EAAEE,EAAE,EAAE,CAAC,SAAS,sBAAsB,CAAC,CAAC,CAAC,EAAE,gKAAgK,CAAC,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,yMAAyM,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,kBAAkB,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,4NAA4N,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,CAAC,oBAAiCE,EAAEC,EAAE,CAAC,KAAK,mEAAmE,YAAY,GAAG,OAAO,YAAY,aAAa,GAAG,QAAQ,oBAAoB,aAAa,GAAG,SAAsBD,EAAEE,EAAE,EAAE,CAAC,SAAS,iEAAiE,CAAC,CAAC,CAAC,EAAE,kCAA+CF,EAAEC,EAAE,CAAC,KAAK,6BAA6B,YAAY,GAAG,OAAO,YAAY,aAAa,GAAG,QAAQ,oBAAoB,aAAa,GAAG,SAAsBD,EAAEE,EAAE,EAAE,CAAC,SAAS,wBAAwB,CAAC,CAAC,CAAC,EAAE,wEAAwE,CAAC,CAAC,EAAeF,EAAE,KAAK,CAAC,SAAS,yCAAyC,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,oYAAoY,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,CAAC,iSAA8SE,EAAEC,EAAE,CAAC,KAAK,8CAA8C,YAAY,GAAG,OAAO,YAAY,aAAa,GAAG,QAAQ,oBAAoB,aAAa,GAAG,SAAsBD,EAAEE,EAAE,EAAE,CAAC,SAAS,uBAAuB,CAAC,CAAC,CAAC,EAAE,GAAG,CAAC,CAAC,CAAC,CAAC,CAAC,EAAeE,EAAuBN,EAAIC,EAAS,CAAC,SAAS,CAAcC,EAAE,KAAK,CAAC,SAAS,sBAAsB,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,6YAA6Y,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,2BAA2B,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,yNAAyN,CAAC,EAAeF,EAAE,KAAK,CAAC,SAAS,CAAcE,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBA,EAAE,IAAI,CAAC,SAAS,oEAAoE,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBA,EAAE,IAAI,CAAC,SAAS,uFAAuF,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,mCAAmC,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,6PAA6P,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,CAAC,4FAAyGE,EAAEC,EAAE,CAAC,KAAK,sEAAsE,YAAY,GAAG,OAAO,YAAY,aAAa,GAAG,QAAQ,oBAAoB,aAAa,GAAG,SAAsBD,EAAEE,EAAE,EAAE,CAAC,SAAS,qCAAqC,CAAC,CAAC,CAAC,EAAE,GAAG,CAAC,CAAC,EAAeF,EAAE,KAAK,CAAC,SAAS,qCAAqC,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,uQAAuQ,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,CAAC,0NAAuOE,EAAEC,EAAE,CAAC,KAAK,0CAA0C,YAAY,GAAG,OAAO,YAAY,aAAa,GAAG,QAAQ,oBAAoB,aAAa,GAAG,SAAsBD,EAAEE,EAAE,EAAE,CAAC,SAAS,yDAAyD,CAAC,CAAC,CAAC,EAAE,GAAG,CAAC,CAAC,EAAeF,EAAE,KAAK,CAAC,SAAS,mBAAmB,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,obAAob,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,oBAAoB,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,CAAC,8GAA2HE,EAAEC,EAAE,CAAC,KAAK,2CAA2C,YAAY,GAAG,OAAO,YAAY,aAAa,GAAG,QAAQ,oBAAoB,aAAa,GAAG,SAAsBD,EAAEE,EAAE,EAAE,CAAC,SAAS,qBAAqB,CAAC,CAAC,CAAC,EAAE,8JAA8J,CAAC,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,yMAAyM,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,kBAAkB,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,0NAA0N,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,CAAC,oBAAiCE,EAAEC,EAAE,CAAC,KAAK,sEAAsE,YAAY,GAAG,OAAO,YAAY,aAAa,GAAG,QAAQ,oBAAoB,aAAa,GAAG,SAAsBD,EAAEE,EAAE,EAAE,CAAC,SAAS,+DAA+D,CAAC,CAAC,CAAC,EAAE,kCAA+CF,EAAEC,EAAE,CAAC,KAAK,6BAA6B,YAAY,GAAG,OAAO,YAAY,aAAa,GAAG,QAAQ,oBAAoB,aAAa,GAAG,SAAsBD,EAAEE,EAAE,EAAE,CAAC,SAAS,wBAAwB,CAAC,CAAC,CAAC,EAAE,sEAAsE,CAAC,CAAC,EAAeF,EAAE,KAAK,CAAC,SAAS,gCAAgC,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,+YAA+Y,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,CAAC,4RAAySE,EAAEC,EAAE,CAAC,KAAK,8CAA8C,YAAY,GAAG,OAAO,YAAY,aAAa,GAAG,QAAQ,oBAAoB,aAAa,GAAG,SAAsBD,EAAEE,EAAE,EAAE,CAAC,SAAS,gBAAgB,CAAC,CAAC,CAAC,EAAE,SAAS,CAAC,CAAC,CAAC,CAAC,CAAC,EAAeG,EAAuBP,EAAIC,EAAS,CAAC,SAAS,CAAcC,EAAE,KAAK,CAAC,SAAS,sBAAsB,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,4YAA4Y,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,2BAA2B,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,CAAC,qCAAkDE,EAAEC,EAAE,CAAC,KAAK,6DAA6D,YAAY,GAAG,OAAO,YAAY,aAAa,GAAG,QAAQ,oBAAoB,aAAa,GAAG,SAAsBD,EAAEE,EAAE,EAAE,CAAC,SAAS,sBAAsB,CAAC,CAAC,CAAC,EAAE,yPAAyP,CAAC,CAAC,EAAeJ,EAAE,KAAK,CAAC,SAAS,CAAcE,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBA,EAAE,IAAI,CAAC,SAAS,uFAAuF,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBA,EAAE,IAAI,CAAC,SAAS,iGAAiG,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBA,EAAE,IAAI,CAAC,SAAS,sGAAsG,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,mCAAmC,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,CAAC,oPAAiQE,EAAEC,EAAE,CAAC,KAAK,gEAAgE,YAAY,GAAG,OAAO,YAAY,aAAa,GAAG,QAAQ,oBAAoB,aAAa,GAAG,SAAsBD,EAAEE,EAAE,EAAE,CAAC,SAAS,oBAAoB,CAAC,CAAC,CAAC,EAAE,yBAAyB,CAAC,CAAC,EAAeJ,EAAE,IAAI,CAAC,SAAS,CAAC,0FAAuGE,EAAEC,EAAE,CAAC,KAAK,iEAAiE,YAAY,GAAG,OAAO,YAAY,aAAa,GAAG,QAAQ,oBAAoB,aAAa,GAAG,SAAsBD,EAAEE,EAAE,EAAE,CAAC,SAAS,qCAAqC,CAAC,CAAC,CAAC,EAAE,GAAG,CAAC,CAAC,EAAeF,EAAE,KAAK,CAAC,SAAS,qCAAqC,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,uQAAuQ,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,CAAC,0NAAuOE,EAAEC,EAAE,CAAC,KAAK,0CAA0C,YAAY,GAAG,OAAO,YAAY,aAAa,GAAG,QAAQ,oBAAoB,aAAa,GAAG,SAAsBD,EAAEE,EAAE,EAAE,CAAC,SAAS,yDAAyD,CAAC,CAAC,CAAC,EAAE,GAAG,CAAC,CAAC,EAAeF,EAAE,KAAK,CAAC,SAAS,mBAAmB,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,ibAAib,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,oBAAoB,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,CAAC,8GAA2HE,EAAEC,EAAE,CAAC,KAAK,2CAA2C,YAAY,GAAG,OAAO,YAAY,aAAa,GAAG,QAAQ,oBAAoB,aAAa,GAAG,SAAsBD,EAAEE,EAAE,EAAE,CAAC,SAAS,qBAAqB,CAAC,CAAC,CAAC,EAAE,8JAA8J,CAAC,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,iMAAiM,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,kBAAkB,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,0NAA0N,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,CAAC,oBAAiCE,EAAEC,EAAE,CAAC,KAAK,iEAAiE,YAAY,GAAG,OAAO,YAAY,aAAa,GAAG,QAAQ,oBAAoB,aAAa,GAAG,SAAsBD,EAAEE,EAAE,EAAE,CAAC,SAAS,+DAA+D,CAAC,CAAC,CAAC,EAAE,kCAA+CF,EAAEC,EAAE,CAAC,KAAK,6BAA6B,YAAY,GAAG,OAAO,YAAY,aAAa,GAAG,QAAQ,oBAAoB,aAAa,GAAG,SAAsBD,EAAEE,EAAE,EAAE,CAAC,SAAS,wBAAwB,CAAC,CAAC,CAAC,EAAE,sEAAsE,CAAC,CAAC,EAAeF,EAAE,KAAK,CAAC,SAAS,gCAAgC,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,6VAA6V,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,CAAC,+SAAuTE,EAAEC,EAAE,CAAC,KAAK,8CAA8C,YAAY,GAAG,OAAO,YAAY,aAAa,GAAG,QAAQ,oBAAoB,aAAa,GAAG,SAAsBD,EAAEE,EAAE,EAAE,CAAC,SAAS,sBAAsB,CAAC,CAAC,CAAC,EAAE,aAAQ,CAAC,CAAC,CAAC,CAAC,CAAC,EAAeI,EAAuBR,EAAIC,EAAS,CAAC,SAAS,CAAcC,EAAE,KAAK,CAAC,SAAS,sBAAsB,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,+bAA+b,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,kCAAkC,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,4PAA4P,CAAC,EAAeF,EAAE,KAAK,CAAC,SAAS,CAAcE,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBA,EAAE,IAAI,CAAC,SAAS,wDAAwD,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBA,EAAE,IAAI,CAAC,SAAS,yFAAyF,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBA,EAAE,IAAI,CAAC,SAAS,mEAAmE,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,0CAA0C,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,uRAAuR,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,CAAC,iGAA8GE,EAAEC,EAAE,CAAC,KAAK,6EAA6E,YAAY,GAAG,OAAO,YAAY,aAAa,GAAG,QAAQ,oBAAoB,aAAa,GAAG,SAAsBD,EAAEE,EAAE,EAAE,CAAC,SAAS,4CAA4C,CAAC,CAAC,CAAC,EAAE,GAAG,CAAC,CAAC,EAAeF,EAAE,KAAK,CAAC,SAAS,4CAA4C,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,8QAA8Q,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,CAAC,0NAAuOE,EAAEC,EAAE,CAAC,KAAK,0CAA0C,YAAY,GAAG,OAAO,YAAY,aAAa,GAAG,QAAQ,oBAAoB,aAAa,GAAG,SAAsBD,EAAEE,EAAE,EAAE,CAAC,SAAS,yDAAyD,CAAC,CAAC,CAAC,EAAE,GAAG,CAAC,CAAC,EAAeF,EAAE,KAAK,CAAC,SAAS,mBAAmB,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,gbAAgb,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,oBAAoB,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,CAAC,8GAA2HE,EAAEC,EAAE,CAAC,KAAK,2CAA2C,YAAY,GAAG,OAAO,YAAY,aAAa,GAAG,QAAQ,oBAAoB,aAAa,GAAG,SAAsBD,EAAEE,EAAE,EAAE,CAAC,SAAS,sBAAsB,CAAC,CAAC,CAAC,EAAE,yKAAyK,CAAC,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,yMAAyM,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,kBAAkB,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,qOAAqO,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,CAAC,oBAAiCE,EAAEC,EAAE,CAAC,KAAK,6EAA6E,YAAY,GAAG,OAAO,YAAY,aAAa,GAAG,QAAQ,oBAAoB,aAAa,GAAG,SAAsBD,EAAEE,EAAE,EAAE,CAAC,SAAS,sEAAsE,CAAC,CAAC,CAAC,EAAE,kCAA+CF,EAAEC,EAAE,CAAC,KAAK,6BAA6B,YAAY,GAAG,OAAO,YAAY,aAAa,GAAG,QAAQ,oBAAoB,aAAa,GAAG,SAAsBD,EAAEE,EAAE,EAAE,CAAC,SAAS,wBAAwB,CAAC,CAAC,CAAC,EAAE,6EAA6E,CAAC,CAAC,EAAeF,EAAE,KAAK,CAAC,SAAS,uCAAuC,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,6VAA6V,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,CAAC,+SAA4TE,EAAEC,EAAE,CAAC,KAAK,8CAA8C,YAAY,GAAG,OAAO,YAAY,aAAa,GAAG,QAAQ,oBAAoB,aAAa,GAAG,SAAsBD,EAAEE,EAAE,EAAE,CAAC,SAAS,uBAAuB,CAAC,CAAC,CAAC,EAAE,aAAQ,CAAC,CAAC,CAAC,CAAC,CAAC,EAAeK,EAAuBT,EAAIC,EAAS,CAAC,SAAS,CAAcC,EAAE,KAAK,CAAC,SAAS,sBAAsB,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,2YAA2Y,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,8BAA8B,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,CAAC,mFAAgGE,EAAEC,EAAE,CAAC,KAAK,+CAA+C,YAAY,GAAG,OAAO,YAAY,aAAa,GAAG,QAAQ,oBAAoB,aAAa,GAAG,SAAsBD,EAAEE,EAAE,EAAE,CAAC,SAAS,wBAAwB,CAAC,CAAC,CAAC,EAAE,+EAA4FF,EAAEC,EAAE,CAAC,KAAK,mDAAmD,YAAY,GAAG,OAAO,YAAY,aAAa,GAAG,QAAQ,oBAAoB,aAAa,GAAG,SAAsBD,EAAEE,EAAE,EAAE,CAAC,SAAS,qBAAqB,CAAC,CAAC,CAAC,EAAE,qKAAqK,CAAC,CAAC,EAAeJ,EAAE,KAAK,CAAC,SAAS,CAAcE,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBA,EAAE,IAAI,CAAC,SAAS,kDAAkD,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBA,EAAE,IAAI,CAAC,SAAS,wDAAwD,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBA,EAAE,IAAI,CAAC,SAAS,qEAAqE,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,sCAAsC,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,wSAAwS,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,CAAC,6FAA0GE,EAAEC,EAAE,CAAC,KAAK,oEAAoE,YAAY,GAAG,OAAO,YAAY,aAAa,GAAG,QAAQ,oBAAoB,aAAa,GAAG,SAAsBD,EAAEE,EAAE,EAAE,CAAC,SAAS,wCAAwC,CAAC,CAAC,CAAC,EAAE,GAAG,CAAC,CAAC,EAAeF,EAAE,KAAK,CAAC,SAAS,wCAAwC,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,0QAA0Q,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,CAAC,0NAAuOE,EAAEC,EAAE,CAAC,KAAK,0CAA0C,YAAY,GAAG,OAAO,YAAY,aAAa,GAAG,QAAQ,oBAAoB,aAAa,GAAG,SAAsBD,EAAEE,EAAE,EAAE,CAAC,SAAS,yDAAyD,CAAC,CAAC,CAAC,EAAE,GAAG,CAAC,CAAC,EAAeF,EAAE,KAAK,CAAC,SAAS,mBAAmB,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,gbAAgb,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,CAAC,kMAA+ME,EAAEC,EAAE,CAAC,KAAK,mEAAmE,YAAY,GAAG,OAAO,YAAY,aAAa,GAAG,QAAQ,oBAAoB,aAAa,GAAG,SAAsBD,EAAEE,EAAE,EAAE,CAAC,SAAS,kEAAkE,CAAC,CAAC,CAAC,EAAE,GAAG,CAAC,CAAC,EAAeF,EAAE,KAAK,CAAC,SAAS,oBAAoB,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,CAAC,8GAA2HE,EAAEC,EAAE,CAAC,KAAK,2CAA2C,YAAY,GAAG,OAAO,YAAY,aAAa,GAAG,QAAQ,oBAAoB,aAAa,GAAG,SAAsBD,EAAEE,EAAE,EAAE,CAAC,SAAS,sBAAsB,CAAC,CAAC,CAAC,EAAE,iKAAiK,CAAC,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,yMAAyM,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,kBAAkB,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,6NAA6N,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,CAAC,oBAAiCE,EAAEC,EAAE,CAAC,KAAK,oEAAoE,YAAY,GAAG,OAAO,YAAY,aAAa,GAAG,QAAQ,oBAAoB,aAAa,GAAG,SAAsBD,EAAEE,EAAE,EAAE,CAAC,SAAS,kEAAkE,CAAC,CAAC,CAAC,EAAE,kCAA+CF,EAAEC,EAAE,CAAC,KAAK,6BAA6B,YAAY,GAAG,OAAO,YAAY,aAAa,GAAG,QAAQ,oBAAoB,aAAa,GAAG,SAAsBD,EAAEE,EAAE,EAAE,CAAC,SAAS,wBAAwB,CAAC,CAAC,CAAC,EAAE,yEAAyE,CAAC,CAAC,EAAeF,EAAE,KAAK,CAAC,SAAS,oCAAoC,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,oYAAoY,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,CAAC,sSAAmTE,EAAEC,EAAE,CAAC,KAAK,8CAA8C,YAAY,GAAG,OAAO,YAAY,aAAa,GAAG,QAAQ,oBAAoB,aAAa,GAAG,SAAsBD,EAAEE,EAAE,EAAE,CAAC,SAAS,sBAAsB,CAAC,CAAC,CAAC,EAAE,aAAQ,CAAC,CAAC,CAAC,CAAC,CAAC,EAAeM,EAAuBV,EAAIC,EAAS,CAAC,SAAS,CAAcC,EAAE,KAAK,CAAC,SAAS,sBAAsB,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,ycAAyc,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,0BAA0B,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAEC,EAAE,CAAC,KAAK,6CAA6C,YAAY,GAAG,OAAO,YAAY,aAAa,GAAG,QAAQ,oBAAoB,aAAa,GAAG,SAAsBD,EAAEE,EAAE,EAAE,CAAC,SAAS,+BAA+B,CAAC,CAAC,CAAC,EAAE,2NAA2N,CAAC,CAAC,EAAeJ,EAAE,KAAK,CAAC,SAAS,CAAcE,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBA,EAAE,IAAI,CAAC,SAAS,0BAA0B,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBA,EAAE,IAAI,CAAC,SAAS,gDAAgD,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBA,EAAE,IAAI,CAAC,SAAS,oCAAoC,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBA,EAAE,IAAI,CAAC,SAAS,kGAAkG,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,mCAAmC,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,gRAAgR,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,CAAC,kFAA+FE,EAAEC,EAAE,CAAC,KAAK,gEAAgE,YAAY,GAAG,OAAO,YAAY,aAAa,GAAG,QAAQ,oBAAoB,aAAa,GAAG,SAAsBD,EAAEE,EAAE,EAAE,CAAC,SAAS,oCAAoC,CAAC,CAAC,CAAC,EAAE,GAAG,CAAC,CAAC,EAAeF,EAAE,KAAK,CAAC,SAAS,mBAAmB,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,gbAA2a,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,CAAC,0MAAuNE,EAAEC,EAAE,CAAC,KAAK,+DAA+D,YAAY,GAAG,OAAO,YAAY,aAAa,GAAG,QAAQ,oBAAoB,aAAa,GAAG,SAAsBD,EAAEE,EAAE,EAAE,CAAC,SAAS,yCAAyC,CAAC,CAAC,CAAC,EAAE,GAAG,CAAC,CAAC,EAAeF,EAAE,KAAK,CAAC,SAAS,wCAAwC,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,iPAAiP,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,CAAC,wUAAgVE,EAAEC,EAAE,CAAC,KAAK,0CAA0C,YAAY,GAAG,OAAO,YAAY,aAAa,GAAG,QAAQ,oBAAoB,aAAa,GAAG,SAAsBD,EAAEE,EAAE,EAAE,CAAC,SAAS,yDAAyD,CAAC,CAAC,CAAC,EAAE,GAAG,CAAC,CAAC,EAAeF,EAAE,KAAK,CAAC,SAAS,oBAAoB,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,CAAC,4HAAyIE,EAAEC,EAAE,CAAC,KAAK,2CAA2C,YAAY,GAAG,OAAO,YAAY,aAAa,GAAG,QAAQ,oBAAoB,aAAa,GAAG,SAAsBD,EAAEE,EAAE,EAAE,CAAC,SAAS,sBAAsB,CAAC,CAAC,CAAC,EAAE,4IAA4I,CAAC,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,4MAA4M,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,kBAAkB,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,6NAA6N,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,CAAC,oBAAiCE,EAAEC,EAAE,CAAC,KAAK,gEAAgE,YAAY,GAAG,OAAO,YAAY,aAAa,GAAG,QAAQ,oBAAoB,aAAa,GAAG,SAAsBD,EAAEE,EAAE,EAAE,CAAC,SAAS,+DAA+D,CAAC,CAAC,CAAC,EAAE,mCAAgDF,EAAEC,EAAE,CAAC,KAAK,6BAA6B,YAAY,GAAG,OAAO,YAAY,aAAa,GAAG,QAAQ,oBAAoB,aAAa,GAAG,SAAsBD,EAAEE,EAAE,EAAE,CAAC,SAAS,yBAAyB,CAAC,CAAC,CAAC,EAAE,+DAA+D,CAAC,CAAC,EAAeF,EAAE,KAAK,CAAC,SAAS,mCAAmC,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,oXAA+W,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,CAAC,6QAAqRE,EAAEC,EAAE,CAAC,KAAK,8CAA8C,YAAY,GAAG,OAAO,YAAY,aAAa,GAAG,QAAQ,oBAAoB,aAAa,GAAG,SAAsBD,EAAEE,EAAE,EAAE,CAAC,SAAS,uBAAuB,CAAC,CAAC,CAAC,EAAE,GAAG,CAAC,CAAC,CAAC,CAAC,CAAC,EAAeO,EAAuBX,EAAIC,EAAS,CAAC,SAAS,CAAcC,EAAE,KAAK,CAAC,SAAS,sBAAsB,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,oaAAoa,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,mCAAmC,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,uUAAuU,CAAC,EAAeF,EAAE,KAAK,CAAC,SAAS,CAAcE,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBA,EAAE,IAAI,CAAC,SAAS,uCAAuC,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBA,EAAE,IAAI,CAAC,SAAS,sCAAsC,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBA,EAAE,IAAI,CAAC,SAAS,wDAAwD,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,sDAAsD,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,0RAA0R,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,CAAC,2FAAwGE,EAAEC,EAAE,CAAC,KAAK,kEAAkE,YAAY,GAAG,OAAO,YAAY,aAAa,GAAG,QAAQ,oBAAoB,aAAa,GAAG,SAAsBD,EAAEE,EAAE,EAAE,CAAC,SAAS,qCAAqC,CAAC,CAAC,CAAC,EAAE,GAAG,CAAC,CAAC,EAAeF,EAAE,KAAK,CAAC,SAAS,qCAAqC,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,4QAA4Q,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,CAAC,oXAAiYE,EAAEC,EAAE,CAAC,KAAK,0CAA0C,YAAY,GAAG,OAAO,YAAY,aAAa,GAAG,QAAQ,oBAAoB,aAAa,GAAG,SAAsBD,EAAEE,EAAE,EAAE,CAAC,SAAS,wDAAwD,CAAC,CAAC,CAAC,EAAE,GAAG,CAAC,CAAC,EAAeF,EAAE,KAAK,CAAC,SAAS,mBAAmB,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,ubAAub,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,CAAC,oKAAiLE,EAAEC,EAAE,CAAC,KAAK,6DAA6D,YAAY,GAAG,OAAO,YAAY,aAAa,GAAG,QAAQ,oBAAoB,aAAa,GAAG,SAAsBD,EAAEE,EAAE,EAAE,CAAC,SAAS,gEAAgE,CAAC,CAAC,CAAC,EAAE,GAAG,CAAC,CAAC,EAAeF,EAAE,KAAK,CAAC,SAAS,oBAAoB,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,uRAAuR,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,qMAAqM,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,kBAAkB,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,8NAA8N,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,CAAC,oBAAiCE,EAAEC,EAAE,CAAC,KAAK,kEAAkE,YAAY,GAAG,OAAO,YAAY,aAAa,GAAG,QAAQ,oBAAoB,aAAa,GAAG,SAAsBD,EAAEE,EAAE,EAAE,CAAC,SAAS,+DAA+D,CAAC,CAAC,CAAC,EAAE,kCAA+CF,EAAEC,EAAE,CAAC,KAAK,6BAA6B,YAAY,GAAG,OAAO,YAAY,aAAa,GAAG,QAAQ,oBAAoB,aAAa,GAAG,SAAsBD,EAAEE,EAAE,EAAE,CAAC,SAAS,uBAAuB,CAAC,CAAC,CAAC,EAAE,8FAA8F,CAAC,CAAC,EAAeF,EAAE,KAAK,CAAC,SAAS,4BAA4B,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,oYAAoY,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,CAAC,oSAAiTE,EAAEC,EAAE,CAAC,KAAK,8CAA8C,YAAY,GAAG,OAAO,YAAY,aAAa,GAAG,QAAQ,oBAAoB,aAAa,GAAG,SAAsBD,EAAEE,EAAE,EAAE,CAAC,SAAS,uBAAuB,CAAC,CAAC,CAAC,EAAE,GAAG,CAAC,CAAC,CAAC,CAAC,CAAC,EAAeQ,EAAuBZ,EAAIC,EAAS,CAAC,SAAS,CAAcC,EAAE,KAAK,CAAC,SAAS,sBAAsB,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,gYAAgY,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,iCAAiC,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,2NAA2N,CAAC,EAAeF,EAAE,KAAK,CAAC,SAAS,CAAcE,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBA,EAAE,IAAI,CAAC,SAAS,sCAAsC,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBA,EAAE,IAAI,CAAC,SAAS,wDAAwD,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBA,EAAE,IAAI,CAAC,SAAS,yCAAyC,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,mCAAmC,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,+SAA+S,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,CAAC,gGAA6GE,EAAEC,EAAE,CAAC,KAAK,kEAAkE,YAAY,GAAG,OAAO,YAAY,aAAa,GAAG,QAAQ,oBAAoB,aAAa,GAAG,SAAsBD,EAAEE,EAAE,EAAE,CAAC,SAAS,wCAAwC,CAAC,CAAC,CAAC,EAAE,GAAG,CAAC,CAAC,EAAeF,EAAE,KAAK,CAAC,SAAS,qCAAqC,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,2QAA2Q,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,CAAC,oXAAiYE,EAAEC,EAAE,CAAC,KAAK,kCAAkC,YAAY,GAAG,OAAO,YAAY,aAAa,GAAG,QAAQ,oBAAoB,aAAa,GAAG,SAAsBD,EAAEE,EAAE,EAAE,CAAC,SAAS,wDAAwD,CAAC,CAAC,CAAC,EAAE,GAAG,CAAC,CAAC,EAAeF,EAAE,KAAK,CAAC,SAAS,mBAAmB,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,ubAAub,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,oBAAoB,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,sRAAsR,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,yMAAyM,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,kBAAkB,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,iOAAiO,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,CAAC,oBAAiCE,EAAEC,EAAE,CAAC,KAAK,kEAAkE,YAAY,GAAG,OAAO,YAAY,aAAa,GAAG,QAAQ,oBAAoB,aAAa,GAAG,SAAsBD,EAAEE,EAAE,EAAE,CAAC,SAAS,kEAAkE,CAAC,CAAC,CAAC,EAAE,kCAA+CF,EAAEC,EAAE,CAAC,KAAK,6BAA6B,YAAY,GAAG,OAAO,YAAY,aAAa,GAAG,QAAQ,oBAAoB,aAAa,GAAG,SAAsBD,EAAEE,EAAE,EAAE,CAAC,SAAS,uBAAuB,CAAC,CAAC,CAAC,EAAE,2EAA2E,CAAC,CAAC,EAAeF,EAAE,KAAK,CAAC,SAAS,2BAA2B,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,oYAAoY,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,CAAC,uSAAoTE,EAAEC,EAAE,CAAC,KAAK,8CAA8C,YAAY,GAAG,OAAO,YAAY,aAAa,GAAG,QAAQ,oBAAoB,aAAa,GAAG,SAAsBD,EAAEE,EAAE,EAAE,CAAC,SAAS,sBAAsB,CAAC,CAAC,CAAC,EAAE,GAAG,CAAC,CAAC,CAAC,CAAC,CAAC,EAAeS,EAAuBb,EAAIC,EAAS,CAAC,SAAS,CAAcC,EAAE,KAAK,CAAC,SAAS,sBAAsB,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,sZAAsZ,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,mCAAmC,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,iQAAiQ,CAAC,EAAeF,EAAE,KAAK,CAAC,SAAS,CAAcE,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBA,EAAE,IAAI,CAAC,SAAS,0DAA0D,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBA,EAAE,IAAI,CAAC,SAAS,2DAA2D,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBA,EAAE,IAAI,CAAC,SAAS,iDAAiD,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBA,EAAE,IAAI,CAAC,SAAS,mDAAmD,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBA,EAAE,IAAI,CAAC,SAAS,0DAA0D,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,uCAAuC,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,gTAAgT,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,CAAC,kGAA+GE,EAAEC,EAAE,CAAC,KAAK,yEAAyE,YAAY,GAAG,OAAO,YAAY,aAAa,GAAG,QAAQ,oBAAoB,aAAa,GAAG,SAAsBD,EAAEE,EAAE,EAAE,CAAC,SAAS,4CAA4C,CAAC,CAAC,CAAC,EAAE,GAAG,CAAC,CAAC,EAAeF,EAAE,KAAK,CAAC,SAAS,qCAAqC,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,mRAAmR,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,CAAC,6TAA0UE,EAAEC,EAAE,CAAC,KAAK,kCAAkC,YAAY,GAAG,OAAO,YAAY,aAAa,GAAG,QAAQ,oBAAoB,aAAa,GAAG,SAAsBD,EAAEE,EAAE,EAAE,CAAC,SAAS,wDAAwD,CAAC,CAAC,CAAC,EAAE,GAAG,CAAC,CAAC,EAAeF,EAAE,KAAK,CAAC,SAAS,mBAAmB,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,ubAAub,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,CAAC,2KAAwLE,EAAEC,EAAE,CAAC,KAAK,oEAAoE,YAAY,GAAG,OAAO,YAAY,aAAa,GAAG,QAAQ,oBAAoB,aAAa,GAAG,SAAsBD,EAAEE,EAAE,EAAE,CAAC,SAAS,uEAAuE,CAAC,CAAC,CAAC,EAAE,GAAG,CAAC,CAAC,EAAeF,EAAE,KAAK,CAAC,SAAS,oBAAoB,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,CAAC,8GAA2HE,EAAEC,EAAE,CAAC,KAAK,2CAA2C,YAAY,GAAG,OAAO,YAAY,aAAa,GAAG,QAAQ,oBAAoB,aAAa,GAAG,SAAsBD,EAAEE,EAAE,EAAE,CAAC,SAAS,qBAAqB,CAAC,CAAC,CAAC,EAAE,6JAA6J,CAAC,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,qMAAqM,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,kBAAkB,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,8NAA8N,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,CAAC,oBAAiCE,EAAEC,EAAE,CAAC,KAAK,yEAAyE,YAAY,GAAG,OAAO,YAAY,aAAa,GAAG,QAAQ,oBAAoB,aAAa,GAAG,SAAsBD,EAAEE,EAAE,EAAE,CAAC,SAAS,sEAAsE,CAAC,CAAC,CAAC,EAAE,kCAA+CF,EAAEC,EAAE,CAAC,KAAK,6BAA6B,YAAY,GAAG,OAAO,YAAY,aAAa,GAAG,QAAQ,oBAAoB,aAAa,GAAG,SAAsBD,EAAEE,EAAE,EAAE,CAAC,SAAS,uBAAuB,CAAC,CAAC,CAAC,EAAE,0EAA0E,CAAC,CAAC,EAAeF,EAAE,KAAK,CAAC,SAAS,+BAA+B,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,2YAA2Y,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,CAAC,2SAAwTE,EAAEC,EAAE,CAAC,KAAK,8CAA8C,YAAY,GAAG,OAAO,YAAY,aAAa,GAAG,QAAQ,oBAAoB,aAAa,GAAG,SAAsBD,EAAEE,EAAE,EAAE,CAAC,SAAS,uBAAuB,CAAC,CAAC,CAAC,EAAE,GAAG,CAAC,CAAC,CAAC,CAAC,CAAC,EAAeU,EAAwBd,EAAIC,EAAS,CAAC,SAAS,CAAcC,EAAE,KAAK,CAAC,SAAS,sBAAsB,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,mlBAAmlB,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,+BAA+B,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,kHAAkH,CAAC,EAAeF,EAAE,KAAK,CAAC,SAAS,CAAcE,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBA,EAAE,IAAI,CAAC,SAAS,oDAAoD,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBA,EAAE,IAAI,CAAC,SAAS,0DAA0D,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBA,EAAE,IAAI,CAAC,SAAS,2DAA2D,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,8CAA8C,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,qVAAqV,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,CAAC,uFAAoGE,EAAEC,EAAE,CAAC,KAAK,yEAAyE,YAAY,GAAG,OAAO,YAAY,aAAa,GAAG,QAAQ,oBAAoB,aAAa,GAAG,SAAsBD,EAAEE,EAAE,EAAE,CAAC,SAAS,wCAAwC,CAAC,CAAC,CAAC,EAAE,IAAI,CAAC,CAAC,EAAeF,EAAE,KAAK,CAAC,SAAS,wCAAwC,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,sPAAsP,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,CAAC,mUAAgVE,EAAEC,EAAE,CAAC,KAAK,kCAAkC,YAAY,GAAG,OAAO,YAAY,aAAa,GAAG,QAAQ,oBAAoB,aAAa,GAAG,SAAsBD,EAAEE,EAAE,EAAE,CAAC,SAAS,wDAAwD,CAAC,CAAC,CAAC,EAAE,GAAG,CAAC,CAAC,EAAeF,EAAE,KAAK,CAAC,SAAS,mBAAmB,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,2aAA2a,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,oBAAoB,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,CAAC,iIAA8IE,EAAEC,EAAE,CAAC,KAAK,2CAA2C,YAAY,GAAG,OAAO,YAAY,aAAa,GAAG,QAAQ,oBAAoB,aAAa,GAAG,SAAsBD,EAAEE,EAAE,EAAE,CAAC,SAAS,oBAAoB,CAAC,CAAC,CAAC,EAAE,4IAA4I,CAAC,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,4MAA4M,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,kBAAkB,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,kOAAkO,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,CAAC,oBAAiCE,EAAEC,EAAE,CAAC,KAAK,yEAAyE,YAAY,GAAG,OAAO,YAAY,aAAa,GAAG,QAAQ,oBAAoB,aAAa,GAAG,SAAsBD,EAAEE,EAAE,EAAE,CAAC,SAAS,kEAAkE,CAAC,CAAC,CAAC,EAAE,kCAA+CF,EAAEC,EAAE,CAAC,KAAK,6BAA6B,YAAY,GAAG,OAAO,YAAY,aAAa,GAAG,QAAQ,oBAAoB,aAAa,GAAG,SAAsBD,EAAEE,EAAE,EAAE,CAAC,SAAS,uBAAuB,CAAC,CAAC,CAAC,EAAE,oEAAoE,CAAC,CAAC,EAAeF,EAAE,KAAK,CAAC,SAAS,+BAA+B,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,gXAAgX,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,CAAC,yQAAsRE,EAAEC,EAAE,CAAC,KAAK,8CAA8C,YAAY,GAAG,OAAO,YAAY,aAAa,GAAG,QAAQ,oBAAoB,aAAa,GAAG,SAAsBD,EAAEE,EAAE,EAAE,CAAC,SAAS,uBAAuB,CAAC,CAAC,CAAC,EAAE,GAAG,CAAC,CAAC,CAAC,CAAC,CAAC,EAAeW,EAAwBf,EAAIC,EAAS,CAAC,SAAS,CAAcC,EAAE,KAAK,CAAC,SAAS,sBAAsB,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,8XAA8X,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,+BAA+B,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,+IAA+I,CAAC,EAAeF,EAAE,KAAK,CAAC,SAAS,CAAcE,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBA,EAAE,IAAI,CAAC,SAAS,oCAAoC,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBA,EAAE,IAAI,CAAC,SAAS,yCAAyC,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBA,EAAE,IAAI,CAAC,SAAS,wDAAwD,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBA,EAAE,IAAI,CAAC,SAAS,gEAAgE,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,mCAAmC,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,2NAA2N,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,CAAC,8FAA2GE,EAAEC,EAAE,CAAC,KAAK,qEAAqE,YAAY,GAAG,OAAO,YAAY,aAAa,GAAG,QAAQ,oBAAoB,aAAa,GAAG,SAAsBD,EAAEE,EAAE,EAAE,CAAC,SAAS,wCAAwC,CAAC,CAAC,CAAC,EAAE,GAAG,CAAC,CAAC,EAAeF,EAAE,KAAK,CAAC,SAAS,qCAAqC,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,uQAAuQ,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,CAAC,2TAAwUE,EAAEC,EAAE,CAAC,KAAK,kCAAkC,YAAY,GAAG,OAAO,YAAY,aAAa,GAAG,QAAQ,oBAAoB,aAAa,GAAG,SAAsBD,EAAEE,EAAE,EAAE,CAAC,SAAS,wDAAwD,CAAC,CAAC,CAAC,EAAE,GAAG,CAAC,CAAC,EAAeF,EAAE,KAAK,CAAC,SAAS,mBAAmB,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,2aAA2a,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,oBAAoB,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,CAAC,8GAA2HE,EAAEC,EAAE,CAAC,KAAK,2CAA2C,YAAY,GAAG,OAAO,YAAY,aAAa,GAAG,QAAQ,oBAAoB,aAAa,GAAG,SAAsBD,EAAEE,EAAE,EAAE,CAAC,SAAS,sBAAsB,CAAC,CAAC,CAAC,EAAE,yJAAyJ,CAAC,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,+MAA+M,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,kBAAkB,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,0NAA0N,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,CAAC,oBAAiCE,EAAEC,EAAE,CAAC,KAAK,qEAAqE,YAAY,GAAG,OAAO,YAAY,aAAa,GAAG,QAAQ,oBAAoB,aAAa,GAAG,SAAsBD,EAAEE,EAAE,EAAE,CAAC,SAAS,kEAAkE,CAAC,CAAC,CAAC,EAAE,kCAA+CF,EAAEC,EAAE,CAAC,KAAK,6BAA6B,YAAY,GAAG,OAAO,YAAY,aAAa,GAAG,QAAQ,oBAAoB,aAAa,GAAG,SAAsBD,EAAEE,EAAE,EAAE,CAAC,SAAS,uBAAuB,CAAC,CAAC,CAAC,EAAE,sEAAsE,CAAC,CAAC,EAAeF,EAAE,KAAK,CAAC,SAAS,wBAAwB,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,yXAAyX,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,CAAC,iTAA8TE,EAAEC,EAAE,CAAC,KAAK,8CAA8C,YAAY,GAAG,OAAO,YAAY,aAAa,GAAG,QAAQ,oBAAoB,aAAa,GAAG,SAAsBD,EAAEE,EAAE,EAAE,CAAC,SAAS,uBAAuB,CAAC,CAAC,CAAC,EAAE,GAAG,CAAC,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,MAAM,CAAC,CAAC,CAAC,CAAC,EAAec,EAAwBhB,EAAIC,EAAS,CAAC,SAAS,CAAcC,EAAE,KAAK,CAAC,SAAS,sBAAsB,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,wgBAAwgB,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,8BAA8B,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,gLAAgL,CAAC,EAAeF,EAAE,KAAK,CAAC,SAAS,CAAcE,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBA,EAAE,IAAI,CAAC,SAAS,+EAA+E,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBA,EAAE,IAAI,CAAC,SAAS,wDAAwD,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBA,EAAE,IAAI,CAAC,SAAS,6DAA6D,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,gCAAgC,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,yQAAoQ,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,CAAC,2FAAwGE,EAAEC,EAAE,CAAC,KAAK,kEAAkE,YAAY,GAAG,OAAO,YAAY,aAAa,GAAG,QAAQ,oBAAoB,aAAa,GAAG,SAAsBD,EAAEE,EAAE,EAAE,CAAC,SAAS,qCAAqC,CAAC,CAAC,CAAC,EAAE,GAAG,CAAC,CAAC,EAAeF,EAAE,KAAK,CAAC,SAAS,qCAAqC,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,oQAAoQ,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,CAAC,kUAA0UE,EAAEC,EAAE,CAAC,KAAK,kCAAkC,YAAY,GAAG,OAAO,YAAY,aAAa,GAAG,QAAQ,oBAAoB,aAAa,GAAG,SAAsBD,EAAEE,EAAE,EAAE,CAAC,SAAS,wDAAwD,CAAC,CAAC,CAAC,EAAE,GAAG,CAAC,CAAC,EAAeF,EAAE,KAAK,CAAC,SAAS,mBAAmB,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,gbAA2a,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,CAAC,yJAAsKE,EAAEC,EAAE,CAAC,KAAK,6DAA6D,YAAY,GAAG,OAAO,YAAY,aAAa,GAAG,QAAQ,oBAAoB,aAAa,GAAG,SAAsBD,EAAEE,EAAE,EAAE,CAAC,SAAS,uDAAuD,CAAC,CAAC,CAAC,EAAE,GAAG,CAAC,CAAC,EAAeF,EAAE,KAAK,CAAC,SAAS,oBAAoB,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,CAAC,8GAA2HE,EAAEC,EAAE,CAAC,KAAK,2CAA2C,YAAY,GAAG,OAAO,YAAY,aAAa,GAAG,QAAQ,oBAAoB,aAAa,GAAG,SAAsBD,EAAEE,EAAE,EAAE,CAAC,SAAS,qBAAqB,CAAC,CAAC,CAAC,EAAE,sJAAsJ,CAAC,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,kNAAkN,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,kBAAkB,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,4NAAuN,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,CAAC,oBAAiCE,EAAEC,EAAE,CAAC,KAAK,kEAAkE,YAAY,GAAG,OAAO,YAAY,aAAa,GAAG,QAAQ,oBAAoB,aAAa,GAAG,SAAsBD,EAAEE,EAAE,EAAE,CAAC,SAAS,uDAAuD,CAAC,CAAC,CAAC,EAAE,kCAA+CF,EAAEC,EAAE,CAAC,KAAK,6BAA6B,YAAY,GAAG,OAAO,YAAY,aAAa,GAAG,QAAQ,oBAAoB,aAAa,GAAG,SAAsBD,EAAEE,EAAE,EAAE,CAAC,SAAS,uBAAuB,CAAC,CAAC,CAAC,EAAE,mEAAmE,CAAC,CAAC,EAAeF,EAAE,KAAK,CAAC,SAAS,4BAA4B,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,8XAAyX,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,CAAC,ySAAiTE,EAAEC,EAAE,CAAC,KAAK,8CAA8C,YAAY,GAAG,OAAO,YAAY,aAAa,GAAG,QAAQ,oBAAoB,aAAa,GAAG,SAAsBD,EAAEE,EAAE,EAAE,CAAC,SAAS,uBAAuB,CAAC,CAAC,CAAC,EAAE,GAAG,CAAC,CAAC,CAAC,CAAC,CAAC,EAAea,EAAwBjB,EAAIC,EAAS,CAAC,SAAS,CAAcC,EAAE,KAAK,CAAC,SAAS,sBAAsB,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,qjBAAqjB,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,8BAA8B,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,gXAAsW,CAAC,EAAeF,EAAE,KAAK,CAAC,SAAS,CAAcE,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBA,EAAE,IAAI,CAAC,SAAS,yBAAyB,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBA,EAAE,IAAI,CAAC,SAAS,sBAAsB,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBA,EAAE,IAAI,CAAC,SAAS,8BAA8B,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,sCAAsC,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,qSAAqS,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,CAAC,iGAA8GE,EAAEC,EAAE,CAAC,KAAK,wEAAwE,YAAY,GAAG,OAAO,YAAY,aAAa,GAAG,QAAQ,oBAAoB,aAAa,GAAG,SAAsBD,EAAEE,EAAE,EAAE,CAAC,SAAS,2CAA2C,CAAC,CAAC,CAAC,EAAE,GAAG,CAAC,CAAC,EAAeF,EAAE,KAAK,CAAC,SAAS,qCAAqC,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,0QAA0Q,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,CAAC,kUAA0UE,EAAEC,EAAE,CAAC,KAAK,kCAAkC,YAAY,GAAG,OAAO,YAAY,aAAa,GAAG,QAAQ,oBAAoB,aAAa,GAAG,SAAsBD,EAAEE,EAAE,EAAE,CAAC,SAAS,wDAAwD,CAAC,CAAC,CAAC,EAAE,GAAG,CAAC,CAAC,EAAeF,EAAE,KAAK,CAAC,SAAS,mBAAmB,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,0aAA0a,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,CAAC,+JAA4KE,EAAEC,EAAE,CAAC,KAAK,mEAAmE,YAAY,GAAG,OAAO,YAAY,aAAa,GAAG,QAAQ,oBAAoB,aAAa,GAAG,SAAsBD,EAAEE,EAAE,EAAE,CAAC,SAAS,6DAA6D,CAAC,CAAC,CAAC,EAAE,GAAG,CAAC,CAAC,EAAeF,EAAE,KAAK,CAAC,SAAS,oBAAoB,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,CAAC,8GAA2HE,EAAEC,EAAE,CAAC,KAAK,2CAA2C,YAAY,GAAG,OAAO,YAAY,aAAa,GAAG,QAAQ,oBAAoB,aAAa,GAAG,SAAsBD,EAAEE,EAAE,EAAE,CAAC,SAAS,qBAAqB,CAAC,CAAC,CAAC,EAAE,4JAA4J,CAAC,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,kNAAkN,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,kBAAkB,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,6NAA6N,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,CAAC,oBAAiCE,EAAEC,EAAE,CAAC,KAAK,wEAAwE,YAAY,GAAG,OAAO,YAAY,aAAa,GAAG,QAAQ,oBAAoB,aAAa,GAAG,SAAsBD,EAAEE,EAAE,EAAE,CAAC,SAAS,mEAAmE,CAAC,CAAC,CAAC,EAAE,kCAA+CF,EAAEC,EAAE,CAAC,KAAK,6BAA6B,YAAY,GAAG,OAAO,YAAY,aAAa,GAAG,QAAQ,oBAAoB,aAAa,GAAG,SAAsBD,EAAEE,EAAE,EAAE,CAAC,SAAS,uBAAuB,CAAC,CAAC,CAAC,EAAE,yEAAyE,CAAC,CAAC,EAAeF,EAAE,KAAK,CAAC,SAAS,qCAAqC,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,yXAAyX,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,CAAC,6SAA0TE,EAAEC,EAAE,CAAC,KAAK,8CAA8C,YAAY,GAAG,OAAO,YAAY,aAAa,GAAG,QAAQ,oBAAoB,aAAa,GAAG,SAAsBD,EAAEE,EAAE,EAAE,CAAC,SAAS,uBAAuB,CAAC,CAAC,CAAC,EAAE,GAAG,CAAC,CAAC,CAAC,CAAC,CAAC,EAAec,EAAwBlB,EAAIC,EAAS,CAAC,SAAS,CAAcC,EAAE,KAAK,CAAC,SAAS,sBAAsB,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,odAAod,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,8BAA8B,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,gOAAgO,CAAC,EAAeF,EAAE,KAAK,CAAC,SAAS,CAAcE,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBA,EAAE,IAAI,CAAC,SAAS,qFAAqF,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBA,EAAE,IAAI,CAAC,SAAS,qEAAqE,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBA,EAAE,IAAI,CAAC,SAAS,0EAA0E,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,+BAA+B,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,oQAAoQ,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,CAAC,0FAAuGE,EAAEC,EAAE,CAAC,KAAK,iEAAiE,YAAY,GAAG,OAAO,YAAY,aAAa,GAAG,QAAQ,oBAAoB,aAAa,GAAG,SAAsBD,EAAEE,EAAE,EAAE,CAAC,SAAS,oCAAoC,CAAC,CAAC,CAAC,EAAE,GAAG,CAAC,CAAC,EAAeF,EAAE,KAAK,CAAC,SAAS,qCAAqC,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,mQAAmQ,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,CAAC,6TAA0UE,EAAEC,EAAE,CAAC,KAAK,kCAAkC,YAAY,GAAG,OAAO,YAAY,aAAa,GAAG,QAAQ,oBAAoB,aAAa,GAAG,SAAsBD,EAAEE,EAAE,EAAE,CAAC,SAAS,wDAAwD,CAAC,CAAC,CAAC,EAAE,GAAG,CAAC,CAAC,EAAeF,EAAE,KAAK,CAAC,SAAS,mBAAmB,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,0aAA0a,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,CAAC,sKAAmLE,EAAEC,EAAE,CAAC,KAAK,wEAAwE,YAAY,GAAG,OAAO,YAAY,aAAa,GAAG,QAAQ,oBAAoB,aAAa,GAAG,SAAsBD,EAAEE,EAAE,EAAE,CAAC,SAAS,sDAAsD,CAAC,CAAC,CAAC,EAAE,GAAG,CAAC,CAAC,EAAeF,EAAE,KAAK,CAAC,SAAS,oBAAoB,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,CAAC,8GAA2HE,EAAEC,EAAE,CAAC,KAAK,2CAA2C,YAAY,GAAG,OAAO,YAAY,aAAa,GAAG,QAAQ,oBAAoB,aAAa,GAAG,SAAsBD,EAAEE,EAAE,EAAE,CAAC,SAAS,sBAAsB,CAAC,CAAC,CAAC,EAAE,qJAAqJ,CAAC,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,kNAAkN,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,kBAAkB,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,sNAAsN,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,CAAC,oBAAiCE,EAAEC,EAAE,CAAC,KAAK,iEAAiE,YAAY,GAAG,OAAO,YAAY,aAAa,GAAG,QAAQ,oBAAoB,aAAa,GAAG,SAAsBD,EAAEE,EAAE,EAAE,CAAC,SAAS,qDAAqD,CAAC,CAAC,CAAC,EAAE,kCAA+CF,EAAEC,EAAE,CAAC,KAAK,6BAA6B,YAAY,GAAG,OAAO,YAAY,aAAa,GAAG,QAAQ,oBAAoB,aAAa,GAAG,SAAsBD,EAAEE,EAAE,EAAE,CAAC,SAAS,uBAAuB,CAAC,CAAC,CAAC,EAAE,kEAAkE,CAAC,CAAC,EAAeF,EAAE,KAAK,CAAC,SAAS,wBAAwB,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,yXAAyX,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,CAAC,6SAA0TE,EAAEC,EAAE,CAAC,KAAK,8CAA8C,YAAY,GAAG,OAAO,YAAY,aAAa,GAAG,QAAQ,oBAAoB,aAAa,GAAG,SAAsBD,EAAEE,EAAE,EAAE,CAAC,SAAS,uBAAuB,CAAC,CAAC,CAAC,EAAE,GAAG,CAAC,CAAC,CAAC,CAAC,CAAC,EAAee,EAAwBnB,EAAIC,EAAS,CAAC,SAAS,CAAcC,EAAE,KAAK,CAAC,SAAS,sBAAsB,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,2hBAA2hB,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,yCAAyC,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,sOAAsO,CAAC,EAAeF,EAAE,KAAK,CAAC,SAAS,CAAcE,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBA,EAAE,IAAI,CAAC,SAAS,wHAAwH,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBA,EAAE,IAAI,CAAC,SAAS,gHAAgH,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBA,EAAE,IAAI,CAAC,SAAS,6EAA6E,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,4CAA4C,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,mRAAmR,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,CAAC,wGAAqHE,EAAEC,EAAE,CAAC,KAAK,8EAA8E,YAAY,GAAG,OAAO,YAAY,aAAa,GAAG,QAAQ,oBAAoB,aAAa,GAAG,SAAsBD,EAAEE,EAAE,EAAE,CAAC,SAAS,iDAAiD,CAAC,CAAC,CAAC,EAAE,GAAG,CAAC,CAAC,EAAeF,EAAE,KAAK,CAAC,SAAS,qCAAqC,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,qQAAqQ,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,CAAC,uTAAoUE,EAAEC,EAAE,CAAC,KAAK,kCAAkC,YAAY,GAAG,OAAO,YAAY,aAAa,GAAG,QAAQ,oBAAoB,aAAa,GAAG,SAAsBD,EAAEE,EAAE,EAAE,CAAC,SAAS,wDAAwD,CAAC,CAAC,CAAC,EAAE,GAAG,CAAC,CAAC,EAAeF,EAAE,KAAK,CAAC,SAAS,mBAAmB,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,scAAsc,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,oBAAoB,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,CAAC,8GAA2HE,EAAEC,EAAE,CAAC,KAAK,2CAA2C,YAAY,GAAG,OAAO,YAAY,aAAa,GAAG,QAAQ,oBAAoB,aAAa,GAAG,SAAsBD,EAAEE,EAAE,EAAE,CAAC,SAAS,sBAAsB,CAAC,CAAC,CAAC,EAAE,kKAAkK,CAAC,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,8MAA8M,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,kBAAkB,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,wOAAwO,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,CAAC,oBAAiCE,EAAEC,EAAE,CAAC,KAAK,8EAA8E,YAAY,GAAG,OAAO,YAAY,aAAa,GAAG,QAAQ,oBAAoB,aAAa,GAAG,SAAsBD,EAAEE,EAAE,EAAE,CAAC,SAAS,2EAA2E,CAAC,CAAC,CAAC,EAAE,kCAA+CF,EAAEC,EAAE,CAAC,KAAK,6BAA6B,YAAY,GAAG,OAAO,YAAY,aAAa,GAAG,QAAQ,oBAAoB,aAAa,GAAG,SAAsBD,EAAEE,EAAE,EAAE,CAAC,SAAS,uBAAuB,CAAC,CAAC,CAAC,EAAE,gDAAgD,CAAC,CAAC,EAAeF,EAAE,KAAK,CAAC,SAAS,qCAAqC,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,yXAAyX,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,CAAC,6SAA0TE,EAAEC,EAAE,CAAC,KAAK,8CAA8C,YAAY,GAAG,OAAO,YAAY,aAAa,GAAG,QAAQ,oBAAoB,aAAa,GAAG,SAAsBD,EAAEE,EAAE,EAAE,CAAC,SAAS,uBAAuB,CAAC,CAAC,CAAC,EAAE,GAAG,CAAC,CAAC,CAAC,CAAC,CAAC,EAAegB,EAAwBpB,EAAIC,EAAS,CAAC,SAAS,CAAcC,EAAE,KAAK,CAAC,SAAS,sBAAsB,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,mfAAmf,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,mCAAmC,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,qIAAqI,CAAC,EAAeF,EAAE,KAAK,CAAC,SAAS,CAAcE,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBA,EAAE,IAAI,CAAC,SAAS,mFAAmF,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBA,EAAE,IAAI,CAAC,SAAS,0GAA0G,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBA,EAAE,IAAI,CAAC,SAAS,gGAAgG,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,gCAAgC,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,mNAAmN,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,CAAC,2FAAwGE,EAAEC,EAAE,CAAC,KAAK,kEAAkE,YAAY,GAAG,OAAO,YAAY,aAAa,GAAG,QAAQ,oBAAoB,aAAa,GAAG,SAAsBD,EAAEE,EAAE,EAAE,CAAC,SAAS,qCAAqC,CAAC,CAAC,CAAC,EAAE,GAAG,CAAC,CAAC,EAAeF,EAAE,KAAK,CAAC,SAAS,qCAAqC,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,gQAAgQ,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,CAAC,6TAA0UE,EAAEC,EAAE,CAAC,KAAK,kCAAkC,YAAY,GAAG,OAAO,YAAY,aAAa,GAAG,QAAQ,oBAAoB,aAAa,GAAG,SAAsBD,EAAEE,EAAE,EAAE,CAAC,SAAS,wDAAwD,CAAC,CAAC,CAAC,EAAE,GAAG,CAAC,CAAC,EAAeF,EAAE,KAAK,CAAC,SAAS,mBAAmB,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,0aAA0a,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,CAAC,yJAAsKE,EAAEC,EAAE,CAAC,KAAK,iEAAiE,YAAY,GAAG,OAAO,YAAY,aAAa,GAAG,QAAQ,oBAAoB,aAAa,GAAG,SAAsBD,EAAEE,EAAE,EAAE,CAAC,SAAS,yEAAyE,CAAC,CAAC,CAAC,EAAE,GAAG,CAAC,CAAC,EAAeF,EAAE,KAAK,CAAC,SAAS,oBAAoB,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,CAAC,8GAA2HE,EAAEC,EAAE,CAAC,KAAK,2CAA2C,YAAY,GAAG,OAAO,YAAY,aAAa,GAAG,QAAQ,oBAAoB,aAAa,GAAG,SAAsBD,EAAEE,EAAE,EAAE,CAAC,SAAS,sBAAsB,CAAC,CAAC,CAAC,EAAE,kJAAkJ,CAAC,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,kNAAkN,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,kBAAkB,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,uNAAuN,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,CAAC,oBAAiCE,EAAEC,EAAE,CAAC,KAAK,kEAAkE,YAAY,GAAG,OAAO,YAAY,aAAa,GAAG,QAAQ,oBAAoB,aAAa,GAAG,SAAsBD,EAAEE,EAAE,EAAE,CAAC,SAAS,+DAA+D,CAAC,CAAC,CAAC,EAAE,kCAA+CF,EAAEC,EAAE,CAAC,KAAK,6BAA6B,YAAY,GAAG,OAAO,YAAY,aAAa,GAAG,QAAQ,oBAAoB,aAAa,GAAG,SAAsBD,EAAEE,EAAE,EAAE,CAAC,SAAS,uBAAuB,CAAC,CAAC,CAAC,EAAE,wEAAwE,CAAC,CAAC,EAAeF,EAAE,KAAK,CAAC,SAAS,qCAAqC,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,0WAA0W,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,CAAC,kTAA+TE,EAAEC,EAAE,CAAC,KAAK,8CAA8C,YAAY,GAAG,OAAO,YAAY,aAAa,GAAG,QAAQ,oBAAoB,aAAa,GAAG,SAAsBD,EAAEE,EAAE,EAAE,CAAC,SAAS,sBAAsB,CAAC,CAAC,CAAC,EAAE,GAAG,CAAC,CAAC,CAAC,CAAC,CAAC,EAAeiB,EAAwBrB,EAAIC,EAAS,CAAC,SAAS,CAAcC,EAAE,KAAK,CAAC,SAAS,sBAAsB,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,kkBAAkkB,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,gCAAgC,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,kRAAkR,CAAC,EAAeF,EAAE,KAAK,CAAC,SAAS,CAAcE,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBA,EAAE,IAAI,CAAC,SAAS,6EAA6E,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBA,EAAE,IAAI,CAAC,SAAS,oFAAoF,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,gCAAgC,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,2NAA2N,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,CAAC,2FAAwGE,EAAEC,EAAE,CAAC,KAAK,kEAAkE,YAAY,GAAG,OAAO,YAAY,aAAa,GAAG,QAAQ,oBAAoB,aAAa,GAAG,SAAsBD,EAAEE,EAAE,EAAE,CAAC,SAAS,qCAAqC,CAAC,CAAC,CAAC,EAAE,GAAG,CAAC,CAAC,EAAeF,EAAE,KAAK,CAAC,SAAS,qCAAqC,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,gQAAgQ,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,CAAC,6TAA0UE,EAAEC,EAAE,CAAC,KAAK,kCAAkC,YAAY,GAAG,OAAO,YAAY,aAAa,GAAG,QAAQ,oBAAoB,aAAa,GAAG,SAAsBD,EAAEE,EAAE,EAAE,CAAC,SAAS,wDAAwD,CAAC,CAAC,CAAC,EAAE,GAAG,CAAC,CAAC,EAAeF,EAAE,KAAK,CAAC,SAAS,mBAAmB,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,+aAA0a,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,oBAAoB,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,CAAC,8GAA2HE,EAAEC,EAAE,CAAC,KAAK,2CAA2C,YAAY,GAAG,OAAO,YAAY,aAAa,GAAG,QAAQ,oBAAoB,aAAa,GAAG,SAAsBD,EAAEE,EAAE,EAAE,CAAC,SAAS,qBAAqB,CAAC,CAAC,CAAC,EAAE,kJAAkJ,CAAC,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,8MAA8M,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,kBAAkB,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,uNAAuN,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,CAAC,oBAAiCE,EAAEC,EAAE,CAAC,KAAK,kEAAkE,YAAY,GAAG,OAAO,YAAY,aAAa,GAAG,QAAQ,oBAAoB,aAAa,GAAG,SAAsBD,EAAEE,EAAE,EAAE,CAAC,SAAS,+DAA+D,CAAC,CAAC,CAAC,EAAE,kCAA+CF,EAAEC,EAAE,CAAC,KAAK,6BAA6B,YAAY,GAAG,OAAO,YAAY,aAAa,GAAG,QAAQ,oBAAoB,aAAa,GAAG,SAAsBD,EAAEE,EAAE,EAAE,CAAC,SAAS,uBAAuB,CAAC,CAAC,CAAC,EAAE,gDAAgD,CAAC,CAAC,EAAeF,EAAE,KAAK,CAAC,SAAS,iCAAiC,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,gXAAgX,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,CAAC,6SAA0TE,EAAEC,EAAE,CAAC,KAAK,8CAA8C,YAAY,GAAG,OAAO,YAAY,aAAa,GAAG,QAAQ,oBAAoB,aAAa,GAAG,SAAsBD,EAAEE,EAAE,EAAE,CAAC,SAAS,uBAAuB,CAAC,CAAC,CAAC,EAAE,GAAG,CAAC,CAAC,CAAC,CAAC,CAAC,EAAekB,EAAwBtB,EAAIC,EAAS,CAAC,SAAS,CAAcC,EAAE,KAAK,CAAC,SAAS,sBAAsB,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,yZAAyZ,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,0BAA0B,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,sKAAsK,CAAC,EAAeF,EAAE,KAAK,CAAC,SAAS,CAAcE,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBA,EAAE,IAAI,CAAC,SAAS,gDAAgD,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBA,EAAE,IAAI,CAAC,SAAS,yCAAyC,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBA,EAAE,IAAI,CAAC,SAAS,4EAA4E,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBA,EAAE,IAAI,CAAC,SAAS,mDAAmD,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,kCAAkC,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,uUAAuU,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,CAAC,kFAA+FE,EAAEC,EAAE,CAAC,KAAK,gEAAgE,YAAY,GAAG,OAAO,YAAY,aAAa,GAAG,QAAQ,oBAAoB,aAAa,GAAG,SAAsBD,EAAEE,EAAE,EAAE,CAAC,SAAS,mCAAmC,CAAC,CAAC,CAAC,EAAE,GAAG,CAAC,CAAC,EAAeF,EAAE,KAAK,CAAC,SAAS,mCAAmC,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,iPAAiP,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,CAAC,qYAA6YE,EAAEC,EAAE,CAAC,KAAK,0CAA0C,YAAY,GAAG,OAAO,YAAY,aAAa,GAAG,QAAQ,oBAAoB,aAAa,GAAG,SAAsBD,EAAEE,EAAE,EAAE,CAAC,SAAS,wDAAwD,CAAC,CAAC,CAAC,EAAE,GAAG,CAAC,CAAC,EAAeF,EAAE,KAAK,CAAC,SAAS,mBAAmB,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,0aAAqa,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,CAAC,iJAA8JE,EAAEC,EAAE,CAAC,KAAK,+DAA+D,YAAY,GAAG,OAAO,YAAY,aAAa,GAAG,QAAQ,oBAAoB,aAAa,GAAG,SAAsBD,EAAEE,EAAE,EAAE,CAAC,SAAS,8DAA8D,CAAC,CAAC,CAAC,EAAE,GAAG,CAAC,CAAC,EAAeF,EAAE,KAAK,CAAC,SAAS,oBAAoB,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,CAAC,4HAAyIE,EAAEC,EAAE,CAAC,KAAK,2CAA2C,YAAY,GAAG,OAAO,YAAY,aAAa,GAAG,QAAQ,oBAAoB,aAAa,GAAG,SAAsBD,EAAEE,EAAE,EAAE,CAAC,SAAS,sBAAsB,CAAC,CAAC,CAAC,EAAE,4IAA4I,CAAC,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,0MAA0M,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,kBAAkB,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,4NAA4N,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,CAAC,oBAAiCE,EAAEC,EAAE,CAAC,KAAK,gEAAgE,YAAY,GAAG,OAAO,YAAY,aAAa,GAAG,QAAQ,oBAAoB,aAAa,GAAG,SAAsBD,EAAEE,EAAE,EAAE,CAAC,SAAS,6DAA6D,CAAC,CAAC,CAAC,EAAE,kCAA+CF,EAAEC,EAAE,CAAC,KAAK,6BAA6B,YAAY,GAAG,OAAO,YAAY,aAAa,GAAG,QAAQ,oBAAoB,aAAa,GAAG,SAAsBD,EAAEE,EAAE,EAAE,CAAC,SAAS,uBAAuB,CAAC,CAAC,CAAC,EAAE,+DAA+D,CAAC,CAAC,EAAeF,EAAE,KAAK,CAAC,SAAS,0BAA0B,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,2YAAiY,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,CAAC,+OAA4PE,EAAEC,EAAE,CAAC,KAAK,8CAA8C,YAAY,GAAG,OAAO,YAAY,aAAa,GAAG,QAAQ,oBAAoB,aAAa,GAAG,SAAsBD,EAAEE,EAAE,EAAE,CAAC,SAAS,uBAAuB,CAAC,CAAC,CAAC,EAAE,GAAG,CAAC,CAAC,CAAC,CAAC,CAAC,EAAemB,EAAwBvB,EAAIC,EAAS,CAAC,SAAS,CAAcC,EAAE,KAAK,CAAC,SAAS,sBAAsB,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,0YAA0Y,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,oCAAoC,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,kMAAkM,CAAC,EAAeF,EAAE,KAAK,CAAC,SAAS,CAAcE,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBA,EAAE,IAAI,CAAC,SAAS,yDAAyD,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBA,EAAE,IAAI,CAAC,SAAS,iDAAiD,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBA,EAAE,IAAI,CAAC,SAAS,sCAAsC,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,sCAAsC,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,4SAAuS,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,CAAC,uEAAoFE,EAAEC,EAAE,CAAC,KAAK,yEAAyE,YAAY,GAAG,OAAO,YAAY,aAAa,GAAG,QAAQ,oBAAoB,aAAa,GAAG,SAAsBD,EAAEE,EAAE,EAAE,CAAC,SAAS,uCAAuC,CAAC,CAAC,CAAC,EAAE,GAAG,CAAC,CAAC,EAAeF,EAAE,KAAK,CAAC,SAAS,6BAA6B,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,2PAA2P,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,CAAC,0YAAuZE,EAAEC,EAAE,CAAC,KAAK,0CAA0C,YAAY,GAAG,OAAO,YAAY,aAAa,GAAG,QAAQ,oBAAoB,aAAa,GAAG,SAAsBD,EAAEE,EAAE,EAAE,CAAC,SAAS,wDAAwD,CAAC,CAAC,CAAC,EAAE,GAAG,CAAC,CAAC,EAAeF,EAAE,KAAK,CAAC,SAAS,gCAAgC,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,kbAA6a,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,oBAAoB,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,CAAC,kHAA+HE,EAAEC,EAAE,CAAC,KAAK,2CAA2C,YAAY,GAAG,OAAO,YAAY,aAAa,GAAG,QAAQ,oBAAoB,aAAa,GAAG,SAAsBD,EAAEE,EAAE,EAAE,CAAC,SAAS,oBAAoB,CAAC,CAAC,CAAC,EAAE,4JAA4J,CAAC,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,iMAAiM,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,kBAAkB,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,iOAAiO,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,CAAC,oBAAiCE,EAAEC,EAAE,CAAC,KAAK,yEAAyE,YAAY,GAAG,OAAO,YAAY,aAAa,GAAG,QAAQ,oBAAoB,aAAa,GAAG,SAAsBD,EAAEE,EAAE,EAAE,CAAC,SAAS,iEAAiE,CAAC,CAAC,CAAC,EAAE,kCAA+CF,EAAEC,EAAE,CAAC,KAAK,6BAA6B,YAAY,GAAG,OAAO,YAAY,aAAa,GAAG,QAAQ,oBAAoB,aAAa,GAAG,SAAsBD,EAAEE,EAAE,EAAE,CAAC,SAAS,uBAAuB,CAAC,CAAC,CAAC,EAAE,mEAAmE,CAAC,CAAC,EAAeF,EAAE,KAAK,CAAC,SAAS,+CAA+C,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,6XAAmX,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,CAAC,iTAAoTE,EAAEC,EAAE,CAAC,KAAK,8CAA8C,YAAY,GAAG,OAAO,YAAY,aAAa,GAAG,QAAQ,oBAAoB,aAAa,GAAG,SAAsBD,EAAEE,EAAE,EAAE,CAAC,SAAS,sBAAsB,CAAC,CAAC,CAAC,EAAE,GAAG,CAAC,CAAC,CAAC,CAAC,CAAC,EAAeoB,EAAwBxB,EAAIC,EAAS,CAAC,SAAS,CAAcC,EAAE,KAAK,CAAC,SAAS,sBAAsB,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,ubAAub,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,iCAAiC,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,yLAAyL,CAAC,EAAeF,EAAE,KAAK,CAAC,SAAS,CAAcE,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBA,EAAE,IAAI,CAAC,SAAS,+DAA+D,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBA,EAAE,IAAI,CAAC,SAAS,gEAAgE,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBA,EAAE,IAAI,CAAC,SAAS,uCAAuC,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,mCAAmC,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,4SAA4S,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,CAAC,mFAAgGE,EAAEC,EAAE,CAAC,KAAK,iEAAiE,YAAY,GAAG,OAAO,YAAY,aAAa,GAAG,QAAQ,oBAAoB,aAAa,GAAG,SAAsBD,EAAEE,EAAE,EAAE,CAAC,SAAS,oCAAoC,CAAC,CAAC,CAAC,EAAE,GAAG,CAAC,CAAC,EAAeF,EAAE,KAAK,CAAC,SAAS,mCAAmC,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,kPAAkP,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,CAAC,qYAA6YE,EAAEC,EAAE,CAAC,KAAK,0CAA0C,YAAY,GAAG,OAAO,YAAY,aAAa,GAAG,QAAQ,oBAAoB,aAAa,GAAG,SAAsBD,EAAEE,EAAE,EAAE,CAAC,SAAS,wDAAwD,CAAC,CAAC,CAAC,EAAE,GAAG,CAAC,CAAC,EAAeF,EAAE,KAAK,CAAC,SAAS,mBAAmB,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,2aAA2a,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,oBAAoB,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,CAAC,6HAA0IE,EAAEC,EAAE,CAAC,KAAK,2CAA2C,YAAY,GAAG,OAAO,YAAY,aAAa,GAAG,QAAQ,oBAAoB,aAAa,GAAG,SAAsBD,EAAEE,EAAE,EAAE,CAAC,SAAS,sBAAsB,CAAC,CAAC,CAAC,EAAE,4IAA4I,CAAC,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,4MAA4M,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,kBAAkB,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,6NAA6N,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,CAAC,oBAAiCE,EAAEC,EAAE,CAAC,KAAK,iEAAiE,YAAY,GAAG,OAAO,YAAY,aAAa,GAAG,QAAQ,oBAAoB,aAAa,GAAG,SAAsBD,EAAEE,EAAE,EAAE,CAAC,SAAS,8DAA8D,CAAC,CAAC,CAAC,EAAE,kCAA+CF,EAAEC,EAAE,CAAC,KAAK,6BAA6B,YAAY,GAAG,OAAO,YAAY,aAAa,GAAG,QAAQ,oBAAoB,aAAa,GAAG,SAAsBD,EAAEE,EAAE,EAAE,CAAC,SAAS,uBAAuB,CAAC,CAAC,CAAC,EAAE,gEAAgE,CAAC,CAAC,EAAeF,EAAE,KAAK,CAAC,SAAS,2BAA2B,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,qXAAgX,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,CAAC,gPAA6PE,EAAEC,EAAE,CAAC,KAAK,8CAA8C,YAAY,GAAG,OAAO,YAAY,aAAa,GAAG,QAAQ,oBAAoB,aAAa,GAAG,SAAsBD,EAAEE,EAAE,EAAE,CAAC,SAAS,uBAAuB,CAAC,CAAC,CAAC,EAAE,GAAG,CAAC,CAAC,CAAC,CAAC,CAAC,EACz90IqB,EAAqB,CAAC,QAAU,CAAC,UAAY,CAAC,KAAO,WAAW,YAAc,CAAC,sBAAwB,GAAG,CAAC,EAAE,UAAY,CAAC,KAAO,WAAW,YAAc,CAAC,sBAAwB,GAAG,CAAC,EAAE,WAAa,CAAC,KAAO,WAAW,YAAc,CAAC,sBAAwB,GAAG,CAAC,EAAE,UAAY,CAAC,KAAO,WAAW,YAAc,CAAC,sBAAwB,GAAG,CAAC,EAAE,WAAa,CAAC,KAAO,WAAW,YAAc,CAAC,sBAAwB,GAAG,CAAC,EAAE,UAAY,CAAC,KAAO,WAAW,YAAc,CAAC,sBAAwB,GAAG,CAAC,EAAE,UAAY,CAAC,KAAO,WAAW,YAAc,CAAC,sBAAwB,GAAG,CAAC,EAAE,WAAa,CAAC,KAAO,WAAW,YAAc,CAAC,sBAAwB,GAAG,CAAC,EAAE,UAAY,CAAC,KAAO,WAAW,YAAc,CAAC,sBAAwB,GAAG,CAAC,EAAE,WAAa,CAAC,KAAO,WAAW,YAAc,CAAC,sBAAwB,GAAG,CAAC,EAAE,WAAa,CAAC,KAAO,WAAW,YAAc,CAAC,sBAAwB,GAAG,CAAC,EAAE,WAAa,CAAC,KAAO,WAAW,YAAc,CAAC,sBAAwB,GAAG,CAAC,EAAE,WAAa,CAAC,KAAO,WAAW,YAAc,CAAC,sBAAwB,GAAG,CAAC,EAAE,WAAa,CAAC,KAAO,WAAW,YAAc,CAAC,sBAAwB,GAAG,CAAC,EAAE,WAAa,CAAC,KAAO,WAAW,YAAc,CAAC,sBAAwB,GAAG,CAAC,EAAE,WAAa,CAAC,KAAO,WAAW,YAAc,CAAC,sBAAwB,GAAG,CAAC,EAAE,UAAY,CAAC,KAAO,WAAW,YAAc,CAAC,sBAAwB,GAAG,CAAC,EAAE,WAAa,CAAC,KAAO,WAAW,YAAc,CAAC,sBAAwB,GAAG,CAAC,EAAE,UAAY,CAAC,KAAO,WAAW,YAAc,CAAC,sBAAwB,GAAG,CAAC,EAAE,UAAY,CAAC,KAAO,WAAW,YAAc,CAAC,sBAAwB,GAAG,CAAC,EAAE,SAAW,CAAC,KAAO,WAAW,YAAc,CAAC,sBAAwB,GAAG,CAAC,EAAE,mBAAqB,CAAC,KAAO,UAAU,CAAC,CAAC",
  "names": ["richText", "u", "x", "p", "Link", "motion", "richText1", "richText2", "richText3", "richText4", "richText5", "richText6", "richText7", "richText8", "richText9", "richText10", "richText11", "richText12", "richText13", "richText14", "richText15", "richText16", "richText17", "richText18", "richText19", "richText20", "__FramerMetadata__"]
}
