{
  "version": 3,
  "sources": ["ssg:https://framerusercontent.com/modules/v6qiqVdQy2sNMmWI9NF7/2g1pmlqd8ioOKRQBOKkc/SyBeQVkaI-4.js"],
  "sourcesContent": ["import{jsx as e,jsxs as o}from\"react/jsx-runtime\";import{Link as t}from\"framer\";import{motion as n}from\"framer-motion\";import*as i from\"react\";export const richText=/*#__PURE__*/o(i.Fragment,{children:[/*#__PURE__*/e(\"h3\",{children:\"Integration Overview\"}),/*#__PURE__*/e(\"p\",{children:\"SentinelOne is a cloud-based endpoint security platform that helps security and IT teams to protect information assets and accelerate incident response. Panther can collect, normalize, and monitor SentinelOne System Logs to help you identify suspicious activity in real time. Your normalized data is then retained to power future security investigations in a serverless data lake powered by Snowflake.\"}),/*#__PURE__*/e(\"h3\",{children:\"Use Cases for SentinelOne Logs\"}),/*#__PURE__*/e(\"p\",{children:\"Panther supports pulling both API Activity logs and Cloud Funnel Deep Visibility logs from SentinelOne. Common SIEM use cases for these log types include:\"}),/*#__PURE__*/o(\"ul\",{children:[/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/e(\"p\",{children:\"Gaining insights into DNS requests and activities across the network\"})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/e(\"p\",{children:\"Correlating activity, such as lateral movement and callbacks, with other threat indicators\"})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/e(\"p\",{children:\"Collecting valuable insights when endpoints exist beyond traditional perimeters\"})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/e(\"p\",{children:\"Uncovering organizational blind spots with full visibility into key assets on the network\"})})]}),/*#__PURE__*/e(\"h3\",{children:\"Onboarding SentinelOne with Panther\"}),/*#__PURE__*/e(\"p\",{children:\"Panther supports pulling Activities logs by pulling from the /web/api/v2.1/activities endpoint from SentinelOne's API, or by integrating with the SentinelOne Cloud Funnel. To set up a new SentinelOne Cloud Funnel source in Panther, users can simply send Deep Visibility logs to an AWS S3 Bucket, and add the S3 Bucket as a data source in Panther.\"}),/*#__PURE__*/e(\"p\",{children:\"To onboard SentinelOne API Activity Logs in Panther, users can create a SentinelOne Service User and API Token, create a new SentinelOne API Source in Panther, and configure the API source using Panther's console.\"}),/*#__PURE__*/o(\"p\",{children:[\"For more details on onboarding SentinelOne logs or for supported log schema, you can \",/*#__PURE__*/e(t,{href:\"https://docs.panther.com/data-onboarding/supported-logs/sentinel-one\",motionChild:!0,nodeId:\"SyBeQVkaI\",openInNewTab:!0,scopeId:\"contentManagement\",smoothScroll:!1,children:/*#__PURE__*/e(n.a,{children:\"view our SentinelOne documentation here\"})}),\".\"]}),/*#__PURE__*/e(\"h3\",{children:\"Parsing, Normalizing, & Analyzing Logs\"}),/*#__PURE__*/e(\"p\",{children:\"As Panther ingests SentinelOne audit logs, they are parsed, normalized, and stored in a Snowflake security data lake. This allows security teams to write detections, identify anomalies, and conduct investigations on logs in the context of days, weeks, or months of data.\"}),/*#__PURE__*/o(\"p\",{children:[\"Panther applies normalization fields to all log records, which standardizes names for attributes and allows you to correlate data across all log sources - not just SentinelOne. You can use Panther's various search tools - such as Data Explorer, Indicator Search, and Query Builder - to investigate your normalized logs for suspicious activity or vulnerabilities. For more on querying and searching normalized log data in Panther, \",/*#__PURE__*/e(t,{href:\"https://docs.panther.com/data-analytics\",motionChild:!0,nodeId:\"SyBeQVkaI\",openInNewTab:!0,scopeId:\"contentManagement\",smoothScroll:!1,children:/*#__PURE__*/e(n.a,{children:\"check out our documentation on Investigations & Search\"})}),\".\"]}),/*#__PURE__*/e(\"h3\",{children:\"Detection as Code\"}),/*#__PURE__*/e(\"p\",{children:\"With Panther, your team won't be confined to rigid detection rules as seen in most legacy SIEMs. Panther is architected around detection-as-code principles, giving you the ability to write Python to define detection logic and to integrate external systems like version control and CI/CD pipelines into your detection engineering processes. This results in powerful, flexible, and reusable scripting of detection logic for your security team.\"}),/*#__PURE__*/o(\"p\",{children:[\"A number of pre-built detections are available in Panther, offering users immediate value for monitoring common IoCs and threats. You can \",/*#__PURE__*/e(t,{href:\"https://panther.com/product/detection-coverage/#filter=sentinelone\",motionChild:!0,nodeId:\"SyBeQVkaI\",openInNewTab:!1,scopeId:\"contentManagement\",smoothScroll:!1,children:/*#__PURE__*/e(n.a,{children:\" explore our built-in detection coverage for SentinelOne logs here\"})}),\".\"]}),/*#__PURE__*/e(\"h3\",{children:\"Configuring Alerts\"}),/*#__PURE__*/o(\"p\",{children:[\"Panther generates alerts when your detection rules or policies are triggered, and integrates with a variety of \",/*#__PURE__*/e(t,{href:\"https://panther.com/integrations/alerts/\",motionChild:!0,nodeId:\"SyBeQVkaI\",openInNewTab:!1,scopeId:\"contentManagement\",smoothScroll:!1,children:/*#__PURE__*/e(n.a,{children:\" alert destinations\"})}),\" to allow for easy access and management of alerts for your security team. Alerts can also be sent to alert context or SOAR platforms for more remediation options.\"]}),/*#__PURE__*/e(\"p\",{children:\"Alerts are categorized under five different severity levels: Info, Low, Medium, High, and Critical. Security teams have the options to dynamically assign severity based on specific log event attributes.\"}),/*#__PURE__*/e(\"h3\",{children:\"Customer Support\"}),/*#__PURE__*/e(\"p\",{children:\"If you have any questions about configuring or monitoring SentinelOne logs in Panther, we're here to help. All customers have access to our technical support team via a dedicated Slack channel, email, or in-app messenger.\"}),/*#__PURE__*/o(\"p\",{children:[\"You can view our \",/*#__PURE__*/e(t,{href:\"https://docs.panther.com/data-onboarding/supported-logs/sentinel-one\",motionChild:!0,nodeId:\"SyBeQVkaI\",openInNewTab:!0,scopeId:\"contentManagement\",smoothScroll:!1,children:/*#__PURE__*/e(n.a,{children:\"detailed documentation on configuring and monitoring SentinelOne logs here\"})}),\", or customers can join \",/*#__PURE__*/e(t,{href:\"https://pnthr.io/community\",motionChild:!0,nodeId:\"SyBeQVkaI\",openInNewTab:!1,scopeId:\"contentManagement\",smoothScroll:!1,children:/*#__PURE__*/e(n.a,{children:\" the Panther Community\"})}),\" to share best practices or custom detections for monitoring SentinelOne.\"]}),/*#__PURE__*/e(\"h3\",{children:\"The Ideal SIEM Integration for SentinelOne\"}),/*#__PURE__*/e(\"p\",{children:\"With Panther, you don't have to accept limitations with SIEM detections, waste time and effort on operational overhead, or pay skyrocketing costs to keep up with the growth of cloud app data. Panther was founded by a team of veteran security practitioners who struggled with legacy SIEM challenges first-hand, and built an intuitive, cloud-native platform to solve them.\"}),/*#__PURE__*/o(\"p\",{children:[\"Panther is a cloud-native SIEM built for security operations at scale, offering powerful detection-as-code, intuitive security workflows, and actionable real-time alerts to keep up with the needs of today's security teams. For a powerful, practical, and scalable SIEM solution for SentinelOne,\\xac\u2020\",/*#__PURE__*/e(t,{href:\"https://panther.com/product/request-a-demo/\",motionChild:!0,nodeId:\"SyBeQVkaI\",openInNewTab:!1,scopeId:\"contentManagement\",smoothScroll:!1,children:/*#__PURE__*/e(n.a,{children:\"request a demo today\"})}),\".\\xac\u2020\"]})]});export const richText1=/*#__PURE__*/o(i.Fragment,{children:[/*#__PURE__*/e(\"h3\",{children:\"Integration Overview\"}),/*#__PURE__*/e(\"p\",{children:\"MongoDB Atlas provides organizations with an easy way to host and manage data in the cloud. Panther can collect, normalize, and monitor MongoDB Atlas logs to help you identify suspicious activity within your organization in real time. Your normalized data is then retained to power future security investigations in a data lake powered by the cloud-native data platform, Snowflake.\"}),/*#__PURE__*/e(\"h3\",{children:\"Use Cases for MongoDB Atlas Logs\"}),/*#__PURE__*/e(\"p\",{children:\"Panther can ingest MongoDB Atlas event logs by querying the MongoDB Atlas Administration API to fetch organization and project events. Some common SIEM use cases for MongoDB Atlas logs include:\"}),/*#__PURE__*/o(\"ul\",{children:[/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/e(\"p\",{children:\"Alerting on authentication failures that may indicate a brute force attack\"})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/e(\"p\",{children:\"Monitoring abnormally high usage or billing\"})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/e(\"p\",{children:\"Finding users without MFA enabled\"})})]}),/*#__PURE__*/e(\"h3\",{children:\"Onboarding MongoDB Atlas Logs in Panther\"}),/*#__PURE__*/e(\"p\",{children:\"Panther's integration for MongoDB Atlas is fast and simple to configure, allowing you to onboard MongoDB Atlas logs in just a few minutes. Simply select MongoDB Atlas from the list of log sources in the Panther console, generate an Access Key in MongoDB Atlas, and submit your key and credentials into the Panther setup menu.\"}),/*#__PURE__*/o(\"p\",{children:[\"For more details on onboarding MongoDB Atlas logs or for supported log schema, you can \",/*#__PURE__*/e(t,{href:\"https://docs.panther.com/data-onboarding/supported-logs/mongodb\",motionChild:!0,nodeId:\"SyBeQVkaI\",openInNewTab:!0,scopeId:\"contentManagement\",smoothScroll:!1,children:/*#__PURE__*/e(n.a,{children:\"view our MongoDB Atlas documentation here\"})}),\".\"]}),/*#__PURE__*/e(\"h3\",{children:\"Parsing, Normalizing, & Analyzing Logs\"}),/*#__PURE__*/e(\"p\",{children:\"As Panther ingests MongoDB Atlas logs, they are parsed, normalized, and stored in a Snowflake security data lake. This allows you to build detections, identify anomalies, and conduct investigations in the context of days, weeks, or months of data.\"}),/*#__PURE__*/o(\"p\",{children:[\"Panther applies normalization fields to your log records, standardizing names for attributes and empowering you to correlate data across all of your log sources. Panther's various search tools - such as Query Builder, Data Explorer, and Indicator Search - allow you to investigate your normalized logs for suspicious activity or vulnerabilities. For more information on searching logs, \",/*#__PURE__*/e(t,{href:\"https://docs.panther.com/data-analytics\",motionChild:!0,nodeId:\"SyBeQVkaI\",openInNewTab:!0,scopeId:\"contentManagement\",smoothScroll:!1,children:/*#__PURE__*/e(n.a,{children:\"check out our documentation on Investigations & Search\"})}),\".\"]}),/*#__PURE__*/e(\"h3\",{children:\"Easily Customizable Detections\"}),/*#__PURE__*/e(\"p\",{children:\"With Panther, you aren't confined to rigid detections as seen in many SIEM solutions. Panther is architected around detection-as-code principles, giving you the ability to write Python to define detection logic and to integrate external systems like version control and CI/CD pipelines into your detection engineering processes. This results in powerful, flexible, and reusable scripting of detections for your security team.\"}),/*#__PURE__*/e(\"h3\",{children:\"Configuring Alerts\"}),/*#__PURE__*/o(\"p\",{children:[\"Panther fires alerts when your detection rules or policies for MongoDB Atlas are triggered, and integrates with a variety of \",/*#__PURE__*/e(t,{href:\"https://panther.com/integrations/alerts/\",motionChild:!0,nodeId:\"SyBeQVkaI\",openInNewTab:!1,scopeId:\"contentManagement\",smoothScroll:!1,children:/*#__PURE__*/e(n.a,{children:\" alert destinations\"})}),\". Alerts can also be sent to alert context or SOAR platforms for more remediation options.\"]}),/*#__PURE__*/e(\"p\",{children:\"Alerts are categorized by five different severity levels: Info, Low, Medium, High, and Critical. Your security team has the ability to dynamically assign severity based on specific log event attributes.\"}),/*#__PURE__*/e(\"h3\",{children:\"Customer Support\"}),/*#__PURE__*/e(\"p\",{children:\"If you have any questions about configuring, querying, or monitoring MongoDB Atlas logs in Panther, our customer support team is here to help. All customers have access to support via a dedicated Slack channel, email, or in-app messenger.\"}),/*#__PURE__*/o(\"p\",{children:[\"You can view our \",/*#__PURE__*/e(t,{href:\"https://docs.panther.com/data-onboarding/supported-logs/mongodb\",motionChild:!0,nodeId:\"SyBeQVkaI\",openInNewTab:!0,scopeId:\"contentManagement\",smoothScroll:!1,children:/*#__PURE__*/e(n.a,{children:\"documentation on configuring and monitoring MongoDB Atlas logs here\"})}),\", or customers can sign up for \",/*#__PURE__*/e(t,{href:\"https://pnthr.io/community\",motionChild:!0,nodeId:\"SyBeQVkaI\",openInNewTab:!0,scopeId:\"contentManagement\",smoothScroll:!1,children:/*#__PURE__*/e(n.a,{children:\"the Panther Community\"})}),\" to share best practices or custom detections for MongoDB Atlas logs.\"]}),/*#__PURE__*/e(\"h3\",{children:\"The Ideal SIEM for MongoDB Atlas\"}),/*#__PURE__*/e(\"p\",{children:\"With Panther, your team doesn't have to waste time and resources on operational overhead, pay excessive costs to keep up with the growth of cloud app data or struggle with restrictive detection logic. Panther was founded by a team of security engineers who struggled with other SIEM solutions first-hand, and built an intuitive, cloud-native platform to solve them.\"}),/*#__PURE__*/o(\"p\",{children:[\"Panther is a cloud-native SIEM built for security operations at scale, offering flexible detection-as-code, intuitive security workflows, and actionable real-time alerts. If you're searching for a seamless SIEM platform for MongoDB Atlas, \",/*#__PURE__*/e(t,{href:\"https://panther.com/product/request-a-demo/\",motionChild:!0,nodeId:\"SyBeQVkaI\",openInNewTab:!1,scopeId:\"contentManagement\",smoothScroll:!1,children:/*#__PURE__*/e(n.a,{children:\" request a demo today\"})}),\".\"]})]});export const richText2=/*#__PURE__*/o(i.Fragment,{children:[/*#__PURE__*/e(\"h3\",{children:\"Integration Overview\"}),/*#__PURE__*/e(\"p\",{children:\"The Microsoft Graph API offers a single endpoint to provide access to data and insights across Microsoft cloud services. Panther can collect, normalize, and monitor Microsoft Graph logs to enable security alerts from Microsoft products, services, and partners. Your normalized log data is then retained to power future security investigations in a data lake powered by the cloud-native data platform, Snowflake.\"}),/*#__PURE__*/e(\"h3\",{children:\"Use Cases for Microsoft Graph Logs\"}),/*#__PURE__*/e(\"p\",{children:\"Panther has the ability to fetch Microsoft Graph Security Alert logs by querying the Microsoft Graph Security API, which allows users to obtain security alerts from various Microsoft Security products. Some common SIEM use cases for Microsoft Graph logs include monitoring for:\"}),/*#__PURE__*/o(\"ul\",{children:[/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/e(\"p\",{children:\"Security alerts and incidents detected by Microsoft Defender for Cloud\"})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/e(\"p\",{children:\"Risk policies triggered by Azure Active Directory Identity Protection\"})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/e(\"p\",{children:\"Alerts triggered by Microsoft Defender for Cloud Apps, Identity, and Endpoint\"})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/e(\"p\",{children:\"Alerts triggered by Azure Information Protection and Sentinel\"})})]}),/*#__PURE__*/e(\"h3\",{children:\"Onboarding Microsoft Graph Logs in Panther\"}),/*#__PURE__*/e(\"p\",{children:\"Panther's integration for Microsoft Graph is fast and easy to configure, allowing you to onboard Microsoft Graph logs in just a few minutes. Simply select Microsoft Graph from the list of log sources in the Panther console, create a new Application is Azure Active Directory, and submit your credentials into the Panther setup menu.\"}),/*#__PURE__*/o(\"p\",{children:[\"For more details on onboarding Microsoft Graph logs or for supported log schema, you can \",/*#__PURE__*/e(t,{href:\"https://docs.panther.com/data-onboarding/supported-logs/microsoftgraph\",motionChild:!0,nodeId:\"SyBeQVkaI\",openInNewTab:!0,scopeId:\"contentManagement\",smoothScroll:!1,children:/*#__PURE__*/e(n.a,{children:\"view our Microsoft Graph documentation here\"})}),\".\"]}),/*#__PURE__*/e(\"h3\",{children:\"Parsing, Normalizing, & Analyzing Logs\"}),/*#__PURE__*/e(\"p\",{children:\"As Panther ingests your log data, it is parsed, normalized, and stored in a Snowflake security data lake. This allows you to build detections, identify anomalies, and conduct investigations in the context of days, weeks, or months of data.\"}),/*#__PURE__*/o(\"p\",{children:[\"Panther then applies normalization fields to your logs, which standardizes names for attributes and empowers you to correlate data across all log sources. Panther's various search tools - such as Query Builder, Data Explorer, and Indicator Search - allow you to investigate your normalized logs for suspicious activity or vulnerabilities. For more information on searching logs, \",/*#__PURE__*/e(t,{href:\"https://docs.panther.com/data-analytics\",motionChild:!0,nodeId:\"SyBeQVkaI\",openInNewTab:!0,scopeId:\"contentManagement\",smoothScroll:!1,children:/*#__PURE__*/e(n.a,{children:\"check out our documentation on Investigations & Search\"})}),\".\"]}),/*#__PURE__*/e(\"h3\",{children:\"Built-in and Easily Customizable Detections\"}),/*#__PURE__*/o(\"p\",{children:[\"Pre-built detections for Microsoft Graph are available by default in Panther, offering users the ability to immediately monitor common IoCs and threats. You can \",/*#__PURE__*/e(t,{href:\"https://panther.com/product/detection-coverage/#filter=microsoftgraph\",motionChild:!0,nodeId:\"SyBeQVkaI\",openInNewTab:!1,scopeId:\"contentManagement\",smoothScroll:!1,children:/*#__PURE__*/e(n.a,{children:\" explore our built-in detection coverage for Microsoft Graph logs here\"})}),\".\"]}),/*#__PURE__*/e(\"p\",{children:\"With Panther, you aren't confined to rigid detections as seen in many SIEM solutions. Panther is architected around detection-as-code principles, giving you the ability to write Python to define detection logic and to integrate external systems like version control and CI/CD pipelines into your detection engineering processes. This results in powerful, flexible, and reusable scripting of detections for your security team.\"}),/*#__PURE__*/e(\"h3\",{children:\"Configuring Alerts\"}),/*#__PURE__*/o(\"p\",{children:[\"Panther generates alerts when your detection rules or policies for Microsoft Graph are triggered, and integrates with a variety of \",/*#__PURE__*/e(t,{href:\"https://panther.com/integrations/alerts/\",motionChild:!0,nodeId:\"SyBeQVkaI\",openInNewTab:!1,scopeId:\"contentManagement\",smoothScroll:!1,children:/*#__PURE__*/e(n.a,{children:\" alert destinations\"})}),\" to allow for intuitive management of any alerts. Alerts can also be sent to alert context or SOAR platforms for more remediation options.\"]}),/*#__PURE__*/e(\"p\",{children:\"Alerts are categorized by five different severity levels: Info, Low, Medium, High, and Critical. Your security team has the ability to dynamically assign severity based on specific log event attributes.\"}),/*#__PURE__*/e(\"h3\",{children:\"Customer Support\"}),/*#__PURE__*/e(\"p\",{children:\"If you have any questions about configuring or monitoring Microsoft Graph logs in Panther, our customer support team is here to help. All customers have access to support via a dedicated Slack channel, email, or in-app messenger.\"}),/*#__PURE__*/o(\"p\",{children:[\"You can view our \",/*#__PURE__*/e(t,{href:\"https://docs.panther.com/data-onboarding/supported-logs/microsoftgraph\",motionChild:!0,nodeId:\"SyBeQVkaI\",openInNewTab:!0,scopeId:\"contentManagement\",smoothScroll:!1,children:/*#__PURE__*/e(n.a,{children:\"documentation on configuring and monitoring Microsoft Graph logs here\"})}),\", or customers can sign up for \",/*#__PURE__*/e(t,{href:\"https://pnthr.io/community\",motionChild:!0,nodeId:\"SyBeQVkaI\",openInNewTab:!0,scopeId:\"contentManagement\",smoothScroll:!1,children:/*#__PURE__*/e(n.a,{children:\"the Panther Community\"})}),\" to share best practices or custom detections for Microsoft Graph logs.\"]}),/*#__PURE__*/e(\"h3\",{children:\"The Ideal SIEM for Microsoft Graph\"}),/*#__PURE__*/e(\"p\",{children:\"With Panther, your team doesn't have to waste time and resources on operational overhead, pay excessive costs to keep up with the growth of cloud app data or struggle with restrictive detection logic. Panther was founded by a team of security engineers who struggled with other SIEM solutions first-hand, and built an intuitive, cloud-native platform to solve them.\"}),/*#__PURE__*/o(\"p\",{children:[\"Panther is a cloud-native SIEM built for security operations at scale, offering flexible detection-as-code, intuitive security workflows, and actionable real-time alerts. If you're searching for a seamless SIEM platform for Microsoft Graph, \",/*#__PURE__*/e(t,{href:\"https://panther.com/product/request-a-demo/\",motionChild:!0,nodeId:\"SyBeQVkaI\",openInNewTab:!1,scopeId:\"contentManagement\",smoothScroll:!1,children:/*#__PURE__*/e(n.a,{children:\" request a demo today\"})}),\".\"]})]});export const richText3=/*#__PURE__*/o(i.Fragment,{children:[/*#__PURE__*/e(\"h3\",{children:\"Integration Overview\"}),/*#__PURE__*/e(\"p\",{children:\"Jamf Pro is a popular mobile device management solution that provides IT professionals with unified ecosystem management for Apple devices. Panther can collect, normalize, and monitor Jamf Pro logs to help you identify suspicious activity in real-time. Your normalized data is then retained to enable future security investigations in a serverless data lake powered by Snowflake.\"}),/*#__PURE__*/e(\"h3\",{children:\"Use Cases for Jamf Pro Logs\"}),/*#__PURE__*/e(\"p\",{children:\"Jamf Pro access logs contain information about Jamf Pro login events. This includes usernames, how your service responded to a request, timestamps, and more. Common security use cases for Jamf Pro logs include:\"}),/*#__PURE__*/o(\"ul\",{children:[/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/e(\"p\",{children:\"Monitoring Jamf Pro login events\"})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/e(\"p\",{children:\"Identifying any failed authentication or login attempts into Jamf Pro\"})})]}),/*#__PURE__*/e(\"h3\",{children:\"Onboarding Jamf Pro in Panther\"}),/*#__PURE__*/e(\"p\",{children:\"Panther's integration for Jamf Pro is simple and quick to configure, allowing you to onboard your logs in just a few minutes. Simply select Jamf Pro from the list of pre-defined log sources, set up data transport via an AWS S3 bucket, and configure Jamf Pro to push logs to your S3 bucket.\"}),/*#__PURE__*/o(\"p\",{children:[\"For more details on onboarding Jamf Pro logs or for supported log schema, you can \",/*#__PURE__*/e(t,{href:\"https://docs.panther.com/data-onboarding/supported-logs/jamfpro\",motionChild:!0,nodeId:\"SyBeQVkaI\",openInNewTab:!0,scopeId:\"contentManagement\",smoothScroll:!1,children:/*#__PURE__*/e(n.a,{children:\"view our Jamf Pro documentation here\"})}),\".\"]}),/*#__PURE__*/e(\"h3\",{children:\"Parsing, Normalizing, & Analyzing Jamf Pro Logs\"}),/*#__PURE__*/e(\"p\",{children:\"As Panther ingests your Jamf Pro audit logs, they are parsed, normalized, and stored in a Snowflake security data lake. This allows your security team to build detections, identify anomalies, and conduct investigations on Jamf Pro logs in the context of days, weeks, or months of data.\"}),/*#__PURE__*/o(\"p\",{children:[\"Panther applies normalization fields to all log records, which standardizes names for attributes and allows you to correlate data across all log sources - not just Jamf Pro. You can use Panther's various search tools - such as Data Explorer, Indicator Search, and Query Builder - to investigate your normalized logs for suspicious activity or vulnerabilities. For more on querying and searching normalized log data in Panther, \",/*#__PURE__*/e(t,{href:\"https://docs.panther.com/data-analytics\",motionChild:!0,nodeId:\"SyBeQVkaI\",openInNewTab:!0,scopeId:\"contentManagement\",smoothScroll:!1,children:/*#__PURE__*/e(n.a,{children:\"check out our documentation on Investigations & Search\"})}),\".\"]}),/*#__PURE__*/e(\"h3\",{children:\"Easily Customizable Detections\"}),/*#__PURE__*/e(\"p\",{children:\"With Panther, your team won't be confined to restrictive detection rules as seen in many SIEMs. Panther is built around detection-as-code principles, giving you the ability to write Python to define detection logic and to integrate external systems like version control and CI/CD pipelines into your detection engineering processes. This results in powerful, flexible, and reusable scripting of detection logic for your team.\"}),/*#__PURE__*/e(\"h3\",{children:\"Configuring Alerts\"}),/*#__PURE__*/o(\"p\",{children:[\"Panther fire alerts when your detection rules or policies are triggered, and integrates with a variety of \",/*#__PURE__*/e(t,{href:\"https://panther.com/integrations/alerts/\",motionChild:!0,nodeId:\"SyBeQVkaI\",openInNewTab:!1,scopeId:\"contentManagement\",smoothScroll:!1,children:/*#__PURE__*/e(n.a,{children:\" alert destinations\"})}),\" to allow for easy access and management of alerts for your security team. Alerts can also be sent to alert context or SOAR platforms for more remediation options.\"]}),/*#__PURE__*/e(\"p\",{children:\"Alerts are categorized under five severity levels: Info, Low, Medium, High, and Critical. Security teams have the options to dynamically designate severity based on specific log event attributes.\"}),/*#__PURE__*/e(\"h3\",{children:\"Customer Support\"}),/*#__PURE__*/e(\"p\",{children:\"If you have any questions about ingesting or monitoring Jamf Pro logs in Panther, we're here to help. All customers have access to our technical support team via a dedicated Slack channel, email, or in-app messenger.\"}),/*#__PURE__*/o(\"p\",{children:[\"You can view our \",/*#__PURE__*/e(t,{href:\"https://docs.panther.com/data-onboarding/supported-logs/jamfpro\",motionChild:!0,nodeId:\"SyBeQVkaI\",openInNewTab:!0,scopeId:\"contentManagement\",smoothScroll:!1,children:/*#__PURE__*/e(n.a,{children:\"detailed documentation on configuring and monitoring Jamf Pro logs here\"})}),\", or customers can join \",/*#__PURE__*/e(t,{href:\"https://pnthr.io/community\",motionChild:!0,nodeId:\"SyBeQVkaI\",openInNewTab:!0,scopeId:\"contentManagement\",smoothScroll:!1,children:/*#__PURE__*/e(n.a,{children:\"the Panther Community\"})}),\" to share best practices or custom detections for monitoring Jamf Pro.\"]}),/*#__PURE__*/e(\"h3\",{children:\"Replacing Traditional SIEM for Jamf Pro\"}),/*#__PURE__*/e(\"p\",{children:\"With Panther, you don't have to waste precious time and effort on operational overhead, accept limitations with SIEM detections, or pay skyrocketing costs to keep up with the growth of your data. Panther was founded by a team of veteran security practitioners who struggled with legacy SIEM challenges first-hand, and built a scalable, cloud-native platform to solve them.\"}),/*#__PURE__*/o(\"p\",{children:[\"Panther is a cloud-native SIEM built for security operations at scale, offering powerful detection-as-code, intuitive security workflows, and actionable real-time alerts to keep up with the needs of today's security teams. For a powerful, practical, and scalable SIEM solution for Jamf Pro, \",/*#__PURE__*/e(t,{href:\"https://panther.com/product/request-a-demo/\",motionChild:!0,nodeId:\"SyBeQVkaI\",openInNewTab:!1,scopeId:\"contentManagement\",smoothScroll:!1,children:/*#__PURE__*/e(n.a,{children:\"request a demo today\"})}),\".\"]})]});export const richText4=/*#__PURE__*/o(i.Fragment,{children:[/*#__PURE__*/e(\"h3\",{children:\"Integration Overview\"}),/*#__PURE__*/e(\"p\",{children:\"Dropbox is a cloud storage service that allows individual users organizations to save and share files within online folders. Panther can collect, normalize, and monitor Dropbox logs to help you identify suspicious file-sharing activity in real time. Your normalized data is then retained to power future security investigations in a data lake powered by the cloud-native data platform, Snowflake.\"}),/*#__PURE__*/e(\"h3\",{children:\"Use Cases for Dropbox Audit Logs\"}),/*#__PURE__*/e(\"p\",{children:\"Panther has the ability to fetch and monitor Dropbox logs by querying the Dropbox Business API. Dropbox audit logs show various types of activity, including user sign-in, activity file editing, and sharing. Some common SIEM use cases for Dropbox logs include:\"}),/*#__PURE__*/o(\"ul\",{children:[/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/e(\"p\",{children:\"Identifying any suspicious super admin access or role changes\"})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/e(\"p\",{children:\"Monitoring for excessive bulk changes to files or folders\"})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/e(\"p\",{children:\"Detecting any automated policy modifications\"})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/e(\"p\",{children:\"Maintaining visibility over file, folder, and user change history\"})})]}),/*#__PURE__*/e(\"h3\",{children:\"Onboarding Dropbox Logs in Panther\"}),/*#__PURE__*/e(\"p\",{children:\"Panther's integration for Dropbox is fast and easy to configure, allowing you to onboard Dropbox logs in just a few minutes. Simply select Dropbox from the list of log sources in the Panther console, create a new App Key within the Dropbox Business API, and submit your key and credentials into the Panther setup menu.\"}),/*#__PURE__*/o(\"p\",{children:[\"For more details on onboarding Dropbox logs or for supported log schema, you can \",/*#__PURE__*/e(t,{href:\"https://docs.panther.com/data-onboarding/supported-logs/dropbox\",motionChild:!0,nodeId:\"SyBeQVkaI\",openInNewTab:!0,scopeId:\"contentManagement\",smoothScroll:!1,children:/*#__PURE__*/e(n.a,{children:\"view our Dropbox documentation here\"})}),\".\"]}),/*#__PURE__*/e(\"h3\",{children:\"Parsing, Normalizing, & Analyzing Logs\"}),/*#__PURE__*/e(\"p\",{children:\"As Panther ingests Dropbox logs, they are parsed, normalized, and stored in a Snowflake security data lake. This allows you to build detections, identify anomalies, and conduct investigations in the context of days, weeks, or months of data.\"}),/*#__PURE__*/o(\"p\",{children:[\"Panther applies normalization fields to any log records, which standardizes names for attributes and empowers you to correlate data across all of your log sources. Panther's various search tools allow you to investigate your normalized logs for suspicious activity or vulnerabilities. For more information on searching logs, \",/*#__PURE__*/e(t,{href:\"https://docs.panther.com/data-analytics\",motionChild:!0,nodeId:\"SyBeQVkaI\",openInNewTab:!0,scopeId:\"contentManagement\",smoothScroll:!1,children:/*#__PURE__*/e(n.a,{children:\"check out our documentation on Investigations & Search\"})}),\".\"]}),/*#__PURE__*/e(\"h3\",{children:\"Easily Customizable Detections\"}),/*#__PURE__*/e(\"p\",{children:\"With Panther, you aren't confined to rigid detections as seen in many SIEM solutions. Panther is architected around detection-as-code principles, giving you the ability to write Python to define detection logic and to integrate external systems like version control and CI/CD pipelines into your detection engineering processes. This results in powerful, flexible, and reusable scripting of detections for your security team.\"}),/*#__PURE__*/o(\"p\",{children:[\"A number of pre-built detections for Dropbox are available by default in Panther, offering users immediate value for monitoring common IoCs and threats. You can explore our built-in \",/*#__PURE__*/e(t,{href:\"https://panther.com/product/detection-coverage/#filter=dropbox\",motionChild:!0,nodeId:\"SyBeQVkaI\",openInNewTab:!1,scopeId:\"contentManagement\",smoothScroll:!1,children:/*#__PURE__*/e(n.a,{children:\"detection coverage for Dropbox logs here\"})}),\".\"]}),/*#__PURE__*/e(\"h3\",{children:\"Configuring Alerts\"}),/*#__PURE__*/o(\"p\",{children:[\"Panther generates alerts when your detection rules or policies for Dropbox are triggered, and integrates with a variety of \",/*#__PURE__*/e(t,{href:\"https://panther.com/integrations/alerts/\",motionChild:!0,nodeId:\"SyBeQVkaI\",openInNewTab:!1,scopeId:\"contentManagement\",smoothScroll:!1,children:/*#__PURE__*/e(n.a,{children:\" alert destinations \"})}),\" to allow for intuitive management of any alerts. Alerts can also be sent to alert context or SOAR platforms for more remediation options.\"]}),/*#__PURE__*/e(\"p\",{children:\"Alerts are categorized by five different severity levels: Info, Low, Medium, High, and Critical. Your security team has the ability to dynamically assign severity based on specific log event attributes.\"}),/*#__PURE__*/e(\"h3\",{children:\"Customer Support\"}),/*#__PURE__*/e(\"p\",{children:\"If you have any questions about configuring or monitoring Dropbox logs in Panther, our customer support team is here to help. All customers have access to support via a dedicated Slack channel, email, or in-app messenger.\"}),/*#__PURE__*/o(\"p\",{children:[\"You can view our \",/*#__PURE__*/e(t,{href:\"https://docs.panther.com/data-onboarding/supported-logs/dropbox\",motionChild:!0,nodeId:\"SyBeQVkaI\",openInNewTab:!0,scopeId:\"contentManagement\",smoothScroll:!1,children:/*#__PURE__*/e(n.a,{children:\"documentation on configuring and monitoring Dropbox logs here\"})}),\", or customers can sign up for \",/*#__PURE__*/e(t,{href:\"https://pnthr.io/community\",motionChild:!0,nodeId:\"SyBeQVkaI\",openInNewTab:!0,scopeId:\"contentManagement\",smoothScroll:!1,children:/*#__PURE__*/e(n.a,{children:\"the Panther Community\"})}),\" to share best practices or custom detections for Dropbox logs.\"]}),/*#__PURE__*/e(\"h3\",{children:\"Replacing Traditional SIEM for Dropbox\"}),/*#__PURE__*/e(\"p\",{children:\"With Panther, your team doesn't have to waste time and resources on operational overhead, pay excessive costs to keep up with the growth of cloud app data or struggle with restrictive detection logic. Panther was founded by a team of security engineers who struggled with other SIEM solutions first-hand, and built an intuitive, cloud-native platform to solve them.\\xac\u2020\"}),/*#__PURE__*/o(\"p\",{children:[\"Panther is a cloud-native SIEM built for security operations at scale, offering flexible detection-as-code, intuitive security workflows, and actionable real-time alerts. If you're searching for a seamless SIEM platform for Dropbox, \",/*#__PURE__*/e(t,{href:\"https://panther.com/product/request-a-demo/\",motionChild:!0,nodeId:\"SyBeQVkaI\",openInNewTab:!1,scopeId:\"contentManagement\",smoothScroll:!1,children:/*#__PURE__*/e(n.a,{children:\" request a demo today\"})}),\".\"]})]});export const richText5=/*#__PURE__*/o(i.Fragment,{children:[/*#__PURE__*/e(\"h3\",{children:\"Integration Overview\"}),/*#__PURE__*/e(\"p\",{children:\"Snyk is a developer security platform that enables development teams to secure their whole application from vulnerabilities. Panther can collect, normalize, and monitor Snyk audit logs to help you identify suspicious activity within your Snyk Organization in real time. Your normalized log data is then retained to power future security investigations in a data lake powered by the cloud-native data platform, Snowflake.\"}),/*#__PURE__*/e(\"h3\",{children:\"Use Cases for Snyk Audit Logs\"}),/*#__PURE__*/e(\"p\",{children:\"Snyk audit logs show various types of activity in an organization's Snyk account, such as user sign-in activity and changes to a user's role. Some common security use cases for Snyk logs include monitoring for:\"}),/*#__PURE__*/o(\"ul\",{children:[/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/e(\"p\",{children:\"User role changes\"})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/e(\"p\",{children:\"Changes to Snyk Group or Organization settings\"})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/e(\"p\",{children:\"Modifications to system or license policies\"})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/e(\"p\",{children:\"Creation, deletion, or modification of service accounts\"})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/e(\"p\",{children:\"Changes to SSO settings\"})})]}),/*#__PURE__*/e(\"h3\",{children:\"Onboarding Snyk Logs in Panther\"}),/*#__PURE__*/e(\"p\",{children:\"Panther has the ability to fetch Snyk audit logs by querying the Snyk Audit API. Setting Snyk up in Panther is fast and easy - you simply need to create a new Snyk log source within the Panther console, generate an API token in Snyk, and submit your key and credentials to Panther.\"}),/*#__PURE__*/o(\"p\",{children:[\"For more details on onboarding Snyk logs or for supported log schema, you can \",/*#__PURE__*/e(t,{href:\"https://docs.panther.com/data-onboarding/supported-logs/snyk-logs\",motionChild:!0,nodeId:\"SyBeQVkaI\",openInNewTab:!0,scopeId:\"contentManagement\",smoothScroll:!1,children:/*#__PURE__*/e(n.a,{children:\"view our Snyk documentation here\"})}),\".\"]}),/*#__PURE__*/e(\"h3\",{children:\"Parsing, Normalizing, & Analyzing\"}),/*#__PURE__*/e(\"p\",{children:\"As Panther ingests Snyk logs, they are parsed, normalized, and stored in a Snowflake security data lake. This allows you to write detections, identify anomalies, and conduct investigations in the context of days, weeks, or months of data.\"}),/*#__PURE__*/o(\"p\",{children:[\"Panther applies normalization fields to log records, which standardizes names for attributes and enables you to correlate data across all of your log sources. Panther's intuitive search tools - such as Query Builder, Data Explorer, and Indicator Search - allow you to investigate your normalized logs for suspicious activity or vulnerabilities. For more information on searching logs, \",/*#__PURE__*/e(t,{href:\"https://docs.panther.com/data-analytics\",motionChild:!0,nodeId:\"SyBeQVkaI\",openInNewTab:!0,scopeId:\"contentManagement\",smoothScroll:!1,children:/*#__PURE__*/e(n.a,{children:\"check out our documentation on Investigations & Search\"})}),\".\"]}),/*#__PURE__*/e(\"h3\",{children:\"Detection as Code\"}),/*#__PURE__*/e(\"p\",{children:\"With Panther, you aren't confined to restrictive detections as seen in many SIEM solutions. Panther is built around detection-as-code principles, giving you the ability to write Python to define detection logic and to integrate external systems like version control and CI/CD pipelines into your detection engineering processes. This results in powerful, flexible, and reusable scripting of detections for your security team.\"}),/*#__PURE__*/o(\"p\",{children:[\"Pre-built detections for Snyk are available by default in Panther, offering users immediate value for monitoring common IoCs and threats. You can \",/*#__PURE__*/e(t,{href:\"https://panther.com/product/detection-coverage/#filter=snyk\",motionChild:!0,nodeId:\"SyBeQVkaI\",openInNewTab:!1,scopeId:\"contentManagement\",smoothScroll:!1,children:/*#__PURE__*/e(n.a,{children:\" explore our built-in detection coverage for Snyk audit logs here\"})}),\".\"]}),/*#__PURE__*/e(\"h3\",{children:\"Configuring Alerts\"}),/*#__PURE__*/o(\"p\",{children:[\"Panther generates alerts when your detection rules or policies for Snyk are triggered, and integrates with a variety of \",/*#__PURE__*/e(t,{href:\"https://panther.com/integrations/alerts/\",motionChild:!0,nodeId:\"SyBeQVkaI\",openInNewTab:!1,scopeId:\"contentManagement\",smoothScroll:!1,children:/*#__PURE__*/e(n.a,{children:\" alert destinations \"})}),\" to allow for intuitive management of any alerts. Alerts can also be sent to alert context or SOAR platforms for more remediation options.\"]}),/*#__PURE__*/e(\"p\",{children:\"Alerts are categorized by five different severity levels: Info, Low, Medium, High, and Critical. Your security team has the ability to dynamically assign severity based on specific log event attributes.\"}),/*#__PURE__*/e(\"h3\",{children:\"Customer Support\"}),/*#__PURE__*/e(\"p\",{children:\"If you have any questions about onboarding or monitoring Snyk logs in Panther, our customer support team is here to help. All customers have access to support via a dedicated Slack channel, email, or in-app messenger.\"}),/*#__PURE__*/o(\"p\",{children:[\"You can view our \",/*#__PURE__*/e(t,{href:\"https://docs.panther.com/data-onboarding/supported-logs/snyk-logs\",motionChild:!0,nodeId:\"SyBeQVkaI\",openInNewTab:!0,scopeId:\"contentManagement\",smoothScroll:!1,children:/*#__PURE__*/e(n.a,{children:\"documentation on configuring and monitoring Snyk logs here\"})}),\", or customers can sign up for \",/*#__PURE__*/e(t,{href:\"https://pnthr.io/community\",motionChild:!0,nodeId:\"SyBeQVkaI\",openInNewTab:!0,scopeId:\"contentManagement\",smoothScroll:!1,children:/*#__PURE__*/e(n.a,{children:\"the Panther Community\"})}),\" to share best practices or custom detections for Snyk logs.\"]}),/*#__PURE__*/e(\"h3\",{children:\"The Ideal SIEM for Snyk\"}),/*#__PURE__*/e(\"p\",{children:\"With Panther, your team doesn't have to pay excessive costs to keep up with the growth of cloud app data, waste time and resources on operational overhead, or struggle with restrictive detection logic. Panther was founded by a team of security engineers who struggled with other SIEM solutions first-hand, and built an intuitive, cloud-native platform to solve them.\"}),/*#__PURE__*/o(\"p\",{children:[\"Panther is a cloud-native SIEM built for security operations at scale, offering flexible detection-as-code, intuitive security workflows, and actionable real-time alerts. For a powerful, practical, and scalable SIEM solution for Snyk, \",/*#__PURE__*/e(t,{href:\"https://panther.com/product/request-a-demo/\",motionChild:!0,nodeId:\"SyBeQVkaI\",openInNewTab:!1,scopeId:\"contentManagement\",smoothScroll:!1,children:/*#__PURE__*/e(n.a,{children:\" request a demo today\"})}),\".\"]})]});export const richText6=/*#__PURE__*/o(i.Fragment,{children:[/*#__PURE__*/e(\"h3\",{children:\"Integration Overview\"}),/*#__PURE__*/e(\"p\",{children:\"Zendesk is a cloud-based help desk management platform used by organizations to build customer service portals, knowledge bases, and online communities. Panther can collect, normalize, and monitor Zendesk logs to help you identify abnormal activity in real time. Your normalized log data is then retained to power future security investigations in a data lake powered by the cloud-native data platform, Snowflake.\"}),/*#__PURE__*/e(\"h3\",{children:\"Use Cases for Zendesk Audit Logs\"}),/*#__PURE__*/e(\"p\",{children:\"Zendesk audit logs show various changes in your Zendesk account, such as account changes, user changes, app changes, web widget changes, business rule changes, ticket deletions, and settings changes. Some common security use cases for Zendesk logs include monitoring for:\"}),/*#__PURE__*/o(\"ul\",{children:[/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/e(\"p\",{children:\"Account owner or user role changes\"})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/e(\"p\",{children:\"Abnormal ticket deletions\"})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/e(\"p\",{children:\"Creation of new API tokens\"})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/e(\"p\",{children:\"Changes to MFA settings\"})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/e(\"p\",{children:\"Creation, modification, and deletion of apps\"})})]}),/*#__PURE__*/e(\"h3\",{children:\"Onboarding Zendesk Logs in Panther\"}),/*#__PURE__*/e(\"p\",{children:\"Panther supports pulling logs directly from Zendesk. Panther can fetch Zendesk audit logs by querying the Zendesk Support API. Setting Zendesk up in Panther is fast and easy - you can choose between creating an OAuth App in your Zendesk account, generating an API token, or submitting your Zendesk Support Admin email and password for basic authentication.\"}),/*#__PURE__*/o(\"p\",{children:[\"For more details on onboarding Zendesk logs or for supported log schema, you can \",/*#__PURE__*/e(t,{href:\"https://docs.panther.com/data-onboarding/supported-logs/zendesk\",motionChild:!0,nodeId:\"SyBeQVkaI\",openInNewTab:!0,scopeId:\"contentManagement\",smoothScroll:!1,children:/*#__PURE__*/e(n.a,{children:\"view our Zendesk documentation here\"})}),\".\"]}),/*#__PURE__*/e(\"h3\",{children:\"Parsing, Normalizing, & Analyzing\"}),/*#__PURE__*/e(\"p\",{children:\"As Panther ingests Zendesk logs, they are parsed, normalized, and stored in a Snowflake security data lake. This allows you to write detections, identify anomalies, and conduct investigations in the context of days, weeks, or months of data.\"}),/*#__PURE__*/o(\"p\",{children:[\"Panther applies normalization fields to log records, which standardizes names for attributes and enables you to correlate data across all of your log sources. Panther's handy search tools - such as Query Builder, Data Explorer, and Indicator Search - allow you to investigate your normalized logs for suspicious activity or vulnerabilities. For more information on searching logs, \",/*#__PURE__*/e(t,{href:\"https://docs.panther.com/data-analytics\",motionChild:!0,nodeId:\"SyBeQVkaI\",openInNewTab:!0,scopeId:\"contentManagement\",smoothScroll:!1,children:/*#__PURE__*/e(n.a,{children:\"check out our documentation on Investigations & Search\"})}),\".\"]}),/*#__PURE__*/e(\"h3\",{children:\"Detection as Code\"}),/*#__PURE__*/e(\"p\",{children:\"With Panther, you aren't confined to restrictive detections as seen in many SIEM solutions. Panther is built around detection-as-code principles, giving you the ability to write Python to define detection logic and to integrate external systems like version control and CI/CD pipelines into your detection engineering processes. This results in powerful, flexible, and reusable scripting of detections for your security team.\"}),/*#__PURE__*/o(\"p\",{children:[\"Pre-built detections for Zendesk are available in Panther, offering you the ability to immediately monitor for common IoCs and threats. You can \",/*#__PURE__*/e(t,{href:\"https://panther.com/product/detection-coverage/#filter=zendesk\",motionChild:!0,nodeId:\"SyBeQVkaI\",openInNewTab:!1,scopeId:\"contentManagement\",smoothScroll:!1,children:/*#__PURE__*/e(n.a,{children:\" explore our built-in detection coverage for Zendesk logs here\"})}),\".\"]}),/*#__PURE__*/e(\"h3\",{children:\"Configuring Alerts\"}),/*#__PURE__*/o(\"p\",{children:[\"Panther generates alerts when your detection rules or policies for Zendesk are triggered, and integrates with a variety of \",/*#__PURE__*/e(t,{href:\"https://panther.com/integrations/alerts/\",motionChild:!0,nodeId:\"SyBeQVkaI\",openInNewTab:!1,scopeId:\"contentManagement\",smoothScroll:!1,children:/*#__PURE__*/e(n.a,{children:\" alert destinations \"})}),\" to allow for intuitive management of any alerts. Alerts can also be sent to alert context or SOAR platforms for more remediation options.\"]}),/*#__PURE__*/e(\"p\",{children:\"Alerts are categorized by five different severity levels: Info, Low, Medium, High, and Critical. Your security team has the ability to dynamically assign severity based on specific log event attributes.\"}),/*#__PURE__*/e(\"h3\",{children:\"Customer Support\"}),/*#__PURE__*/e(\"p\",{children:\"If you have any questions about onboarding or monitoring Zendesk logs in Panther, our customer support team is here to help. All customers have access to support via a dedicated Slack channel, email, or in-app messenger.\"}),/*#__PURE__*/o(\"p\",{children:[\"You can view our \",/*#__PURE__*/e(t,{href:\"https://docs.panther.com/data-onboarding/supported-logs/zendesk\",motionChild:!0,nodeId:\"SyBeQVkaI\",openInNewTab:!0,scopeId:\"contentManagement\",smoothScroll:!1,children:/*#__PURE__*/e(n.a,{children:\"documentation on configuring and monitoring Zendesk logs here\"})}),\", or customers can sign up for \",/*#__PURE__*/e(t,{href:\"https://pnthr.io/community\",motionChild:!0,nodeId:\"SyBeQVkaI\",openInNewTab:!0,scopeId:\"contentManagement\",smoothScroll:!1,children:/*#__PURE__*/e(n.a,{children:\"the Panther Community\"})}),\" to share best practices or custom detections for Zendesk logs.\"]}),/*#__PURE__*/e(\"h3\",{children:\"The Ideal SIEM for Zendesk\"}),/*#__PURE__*/e(\"p\",{children:\"With Panther, your team doesn't have to struggle with restrictive detection logic, pay excessive costs to keep up with the growth of cloud app data, or waste time and resources on operational overhead. Panther is built by a team of security engineers who struggled with other SIEM solutions first-hand, and built an intuitive, cloud-native platform to meet today's security needs.\"}),/*#__PURE__*/o(\"p\",{children:[\"Panther is a cloud-native SIEM built for security operations at scale, offering flexible detection-as-code, intuitive security workflows, and actionable real-time alerts. For a powerful, fast, and scalable SIEM solution for Zendesk, \",/*#__PURE__*/e(t,{href:\"https://panther.com/product/request-a-demo/\",motionChild:!0,nodeId:\"SyBeQVkaI\",openInNewTab:!1,scopeId:\"contentManagement\",smoothScroll:!1,children:/*#__PURE__*/e(n.a,{children:\" request a demo today\"})}),\".\"]})]});export const richText7=/*#__PURE__*/o(i.Fragment,{children:[/*#__PURE__*/e(\"h3\",{children:\"Integration Overview\"}),/*#__PURE__*/e(\"p\",{children:\"Asana is a project management SaaS platform that enables project and task management, collaboration, and productivity workflows for teams. Panther can collect, normalize, and monitor Asana logs to help you identify any suspicious activity in real time. Your normalized data is then retained to enable future security investigations in a serverless security data lake powered by Snowflake.\"}),/*#__PURE__*/e(\"h3\",{children:\"Use Cases for Asana Audit Logs\"}),/*#__PURE__*/e(\"p\",{children:\"Asana audit logs give visibility into key changes made by admins, critical access events and abnormal user activity. Common security use cases for Asana logs include monitoring for:\"}),/*#__PURE__*/o(\"ul\",{children:[/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/e(\"p\",{children:\"Creation or modification of admin roles or service accounts\"})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/e(\"p\",{children:\"Modifications to password requirements\"})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/e(\"p\",{children:\"New email domains added to an Asana workspace\"})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/e(\"p\",{children:\"Workspace org exports\"})})]}),/*#__PURE__*/e(\"h3\",{children:\"Onboarding Asana Logs in Panther\"}),/*#__PURE__*/o(\"p\",{children:[/*#__PURE__*/e(t,{href:\"https://asana.com/apps/panther\",motionChild:!0,nodeId:\"SyBeQVkaI\",openInNewTab:!0,scopeId:\"contentManagement\",smoothScroll:!1,children:/*#__PURE__*/e(n.a,{children:\"Panther's integration for Asana\"})}),\" is easy and quick to configure, allowing you to onboard logs in just a few minutes. Simply select Asana from the list of pre-defined log sources, enter basic Asana credentials, and copy a Service Access Token into the Panther console.\"]}),/*#__PURE__*/o(\"p\",{children:[\"For more details on onboarding Asana logs or for supported log schema, you can \",/*#__PURE__*/e(t,{href:\"https://docs.panther.com/data-onboarding/supported-logs/asana\",motionChild:!0,nodeId:\"SyBeQVkaI\",openInNewTab:!0,scopeId:\"contentManagement\",smoothScroll:!1,children:/*#__PURE__*/e(n.a,{children:\"view our Asana documentation here\"})}),\".\"]}),/*#__PURE__*/e(\"h3\",{children:\"Parsing, Normalizing, & Analyzing Asana Logs\"}),/*#__PURE__*/e(\"p\",{children:\"As Panther ingests Asana audit logs, they are parsed, normalized, and stored in a Snowflake security data lake. This allows your security team to write detections, identify anomalies, and conduct investigations on Asana logs in the context of days, weeks, or months of data.\"}),/*#__PURE__*/o(\"p\",{children:[\"Panther applies normalization fields to all log records, which standardizes names for attributes and empowers users to correlate data across all log sources - not just Asana. You can use Panther's various search tools - such as Data Explorer, Indicator Search, and Query Builder - to investigate your normalized logs for suspicious activity or vulnerabilities. For more information on searching log data, \",/*#__PURE__*/e(t,{href:\"https://docs.panther.com/data-analytics\",motionChild:!0,nodeId:\"SyBeQVkaI\",openInNewTab:!0,scopeId:\"contentManagement\",smoothScroll:!1,children:/*#__PURE__*/e(n.a,{children:\"check out our documentation on Investigations & Search\"})}),\".\"]}),/*#__PURE__*/e(\"h3\",{children:\"Built-In & Easily Customizable Detections\"}),/*#__PURE__*/o(\"p\",{children:[\"A number of pre-built detections for Asana are available by default in Panther, offering users immediate value for monitoring common IoCs and threats. You can \",/*#__PURE__*/e(t,{href:\"https://panther.com/product/detection-coverage/#filter=asana\",motionChild:!0,nodeId:\"SyBeQVkaI\",openInNewTab:!1,scopeId:\"contentManagement\",smoothScroll:!1,children:/*#__PURE__*/e(n.a,{children:\" explore our built-in detection coverage for Asana logs here\"})}),\".\"]}),/*#__PURE__*/e(\"p\",{children:\"With Panther, your team won't be confined to rigid detection logic as seen in many SIEM platforms. Panther is architected around detection-as-code principles, giving you the ability to write Python to define detections and to integrate external systems like version control and CI/CD pipelines into your detection engineering processes. This results in powerful, scalable, and reusable scripting of detection logic for your security team.\"}),/*#__PURE__*/e(\"h3\",{children:\"Configuring Alerts\"}),/*#__PURE__*/o(\"p\",{children:[\"Panther generates alerts when your detection rules or policies are triggered, and integrates with a variety of \",/*#__PURE__*/e(t,{href:\"https://panther.com/integrations/alerts/\",motionChild:!0,nodeId:\"SyBeQVkaI\",openInNewTab:!1,scopeId:\"contentManagement\",smoothScroll:!1,children:/*#__PURE__*/e(n.a,{children:\"alert destinations\"})}),\" to allow for easy access and management of any Asana alerts. Alerts can also be sent to alert context or SOAR platforms for more remediation options.\"]}),/*#__PURE__*/e(\"p\",{children:\"Alerts are grouped into five different severity levels: Info, Low, Medium, High, and Critical. Security teams have the ability to dynamically assign severity based on specific log event attributes.\"}),/*#__PURE__*/e(\"h3\",{children:\"Customer Support\"}),/*#__PURE__*/e(\"p\",{children:\"If you have any questions about configuring or monitoring Asana logs in Panther, our customer support team is here to help. All customers have access to support via a dedicated Slack channel, email, or in-app messenger.\"}),/*#__PURE__*/o(\"p\",{children:[\"You can view our \",/*#__PURE__*/e(t,{href:\"https://docs.panther.com/data-onboarding/supported-logs/asana\",motionChild:!0,nodeId:\"SyBeQVkaI\",openInNewTab:!0,scopeId:\"contentManagement\",smoothScroll:!1,children:/*#__PURE__*/e(n.a,{children:\"documentation on configuring and monitoring Asana logs here\"})}),\", or customers can sign up for \",/*#__PURE__*/e(t,{href:\"https://pnthr.io/community\",motionChild:!0,nodeId:\"SyBeQVkaI\",openInNewTab:!0,scopeId:\"contentManagement\",smoothScroll:!1,children:/*#__PURE__*/e(n.a,{children:\"the Panther Community \"})}),\" to share best practices or custom detections for Asana logs.\"]}),/*#__PURE__*/e(\"h3\",{children:\"Replacing Traditional SIEM for Asana Logs\"}),/*#__PURE__*/e(\"p\",{children:\"With Panther, your security team doesn't have to struggle with rigid detection logic, waste time and resources on operational overhead, or pay excessive costs to keep up with the growth of cloud app data. Panther was founded by a team of veteran security practitioners who struggled with today's SIEM challenges first-hand, and built an intuitive, cloud-native platform to solve them.\"}),/*#__PURE__*/o(\"p\",{children:[\"Panther is a cloud-native SIEM built for security operations at scale, offering flexible detection-as-code, intuitive security workflows, and actionable real-time alerts to keep up with the needs of today's security teams. For a strong, flexible, and scalable SIEM solution for Asana logs, \",/*#__PURE__*/e(t,{href:\"https://panther.com/product/request-a-demo/\",motionChild:!0,nodeId:\"SyBeQVkaI\",openInNewTab:!1,scopeId:\"contentManagement\",smoothScroll:!1,children:/*#__PURE__*/e(n.a,{children:\" request a demo today\"})}),\".\"]})]});export const richText8=/*#__PURE__*/o(i.Fragment,{children:[/*#__PURE__*/e(\"h3\",{children:\"Integration Overview\"}),/*#__PURE__*/e(\"p\",{children:\"Atlassian provides team collaboration software that helps teams organize, discuss, and complete shared work. Panther can collect, normalize, and monitor Atlassian logs to help you identify any suspicious activity within your organization in real time. Your normalized data is then retained to enable future security investigations in a serverless security data lake powered by Snowflake.\"}),/*#__PURE__*/e(\"h3\",{children:\"Use Cases for Atlassian Audit Logs\"}),/*#__PURE__*/e(\"p\",{children:\"Common security use cases for Atlassian logs include monitoring for:\"}),/*#__PURE__*/o(\"ul\",{children:[/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/e(\"p\",{children:\"Admin privilege escalations or admin role assignments\"})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/e(\"p\",{children:\"Changes to MFA or IAM policies\"})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/e(\"p\",{children:\"Brute force login attempts or impersonator logins\"})})]}),/*#__PURE__*/e(\"h3\",{children:\"Onboarding Atlassian Logs in Panther\"}),/*#__PURE__*/e(\"p\",{children:\"Panther's integration for Atlassian is simple and fast to configure, allowing you to onboard logs in just a few minutes. Simply generate an Atlassian API Key, select Atlassian from the list of log sources within the Panther console, and enter basic Atlassian credentials and your API Key.\"}),/*#__PURE__*/o(\"p\",{children:[\"Panther has the ability to fetch Atlassian audit logs by querying the Atlassian Organizations REST API. For more details on onboarding or for supported log schema, you can \",/*#__PURE__*/e(t,{href:\"https://docs.panther.com/data-onboarding/supported-logs/atlassian\",motionChild:!0,nodeId:\"SyBeQVkaI\",openInNewTab:!0,scopeId:\"contentManagement\",smoothScroll:!1,children:/*#__PURE__*/e(n.a,{children:\"view our Atlassian documentation here\"})}),\".\"]}),/*#__PURE__*/e(\"h3\",{children:\"Parse, Normalize, & Analyze\"}),/*#__PURE__*/e(\"p\",{children:\"As Panther ingests Atlassian audit logs, they are parsed, normalized, and stored in a Snowflake security data lake. This allows you to write detections, identify anomalies, and conduct investigations on Atlassian logs in the context of days, weeks, or months of data.\"}),/*#__PURE__*/o(\"p\",{children:[\"Panther applies normalization fields to all log records, which standardizes names for attributes and empowers users to correlate data across all of your log sources. You can then use various search tools - such as Data Explorer, Indicator Search, and Query Builder - to investigate your normalized logs for suspicious activity or vulnerabilities. For more information on searching log data, \",/*#__PURE__*/e(t,{href:\"https://docs.panther.com/data-analytics\",motionChild:!0,nodeId:\"SyBeQVkaI\",openInNewTab:!0,scopeId:\"contentManagement\",smoothScroll:!1,children:/*#__PURE__*/e(n.a,{children:\"check out our documentation on Investigations & Search\"})}),\".\"]}),/*#__PURE__*/e(\"h3\",{children:\"Built-In & Easily Customizable Detections\"}),/*#__PURE__*/o(\"p\",{children:[\"A number of pre-built detections for Atlassian are available by default in Panther, offering users immediate value for monitoring common IoCs and threats. You can \",/*#__PURE__*/e(t,{href:\"https://panther.com/product/detection-coverage/#filter=atlassian\",motionChild:!0,nodeId:\"SyBeQVkaI\",openInNewTab:!1,scopeId:\"contentManagement\",smoothScroll:!1,children:/*#__PURE__*/e(n.a,{children:\" explore our built-in detection coverage for Atlassian logs here\"})}),\".\"]}),/*#__PURE__*/e(\"p\",{children:\"Panther users aren't confined to restrictive detections as seen in many SIEM platforms. Panther is architected around detection-as-code principles, giving you the ability to write Python to define detection logic and to integrate external systems like version control and CI/CD pipelines into your detection engineering processes. This results in powerful, scalable, and reusable scripting of detections for your security team.\"}),/*#__PURE__*/e(\"h3\",{children:\"Configuring Alerts\"}),/*#__PURE__*/o(\"p\",{children:[\"Panther generates alerts when your detection rules or policies are triggered, and integrates with a variety of \",/*#__PURE__*/e(t,{href:\"https://panther.com/integrations/alerts/\",motionChild:!0,nodeId:\"SyBeQVkaI\",openInNewTab:!1,scopeId:\"contentManagement\",smoothScroll:!1,children:/*#__PURE__*/e(n.a,{children:\"alert destinations\"})}),\" to allow for easy access and management of any Atlassian alerts. Alerts can also be sent to alert context or SOAR platforms for more remediation options.\"]}),/*#__PURE__*/e(\"p\",{children:\"Alerts are categorized by five different severity levels: Info, Low, Medium, High, and Critical. Your team has the ability to dynamically assign severity based on specific log event attributes.\"}),/*#__PURE__*/e(\"h3\",{children:\"Customer Support\"}),/*#__PURE__*/e(\"p\",{children:\"If you have any questions about configuring or monitoring Atlassian logs in Panther, our customer support team is here to help. All customers have access to support via a dedicated Slack channel, email, or in-app messenger.\"}),/*#__PURE__*/o(\"p\",{children:[\"You can view our \",/*#__PURE__*/e(t,{href:\"https://docs.panther.com/data-onboarding/supported-logs/atlassian\",motionChild:!0,nodeId:\"SyBeQVkaI\",openInNewTab:!0,scopeId:\"contentManagement\",smoothScroll:!1,children:/*#__PURE__*/e(n.a,{children:\"documentation on configuring and monitoring Atlassian logs here\"})}),\", or customers can sign up for \",/*#__PURE__*/e(t,{href:\"https://pnthr.io/community\",motionChild:!0,nodeId:\"SyBeQVkaI\",openInNewTab:!0,scopeId:\"contentManagement\",smoothScroll:!1,children:/*#__PURE__*/e(n.a,{children:\"the Panther Community\"})}),\" to share best practices or custom detections for Atlassian logs.\"]}),/*#__PURE__*/e(\"h3\",{children:\"Replacing Traditional SIEM for Atlassian Logs\"}),/*#__PURE__*/e(\"p\",{children:\"With Panther, your security team doesn't have to struggle with rigid detection logic, waste time and resources on operational overhead, or pay excessive costs to keep up with the growth of cloud app data. Panther was founded by a team of security engineers who struggled with today's SIEM challenges first-hand, and built an intuitive, cloud-native platform to solve them.\"}),/*#__PURE__*/o(\"p\",{children:[\"Panther is a cloud-native SIEM built for security operations at scale, offering powerful detection-as-code, intuitive security workflows, and actionable real-time alerts to keep up with the needs of today's security teams. If you're searching for a seamless SIEM platform for Atlassian logs, \",/*#__PURE__*/e(t,{href:\"https://panther.com/product/request-a-demo/\",motionChild:!0,nodeId:\"SyBeQVkaI\",openInNewTab:!1,scopeId:\"contentManagement\",smoothScroll:!1,children:/*#__PURE__*/e(n.a,{children:\"request a demo today\"})}),\".\"]})]});export const richText9=/*#__PURE__*/o(i.Fragment,{children:[/*#__PURE__*/e(\"h3\",{children:\"Integration Overview\"}),/*#__PURE__*/e(\"p\",{children:\"1Password is a password management platform that helps to improve security, visibility, and control over how passwords and company data are protected. Panther can collect, normalize, and monitor 1Password logs to help you identify suspicious activity in real time. Your normalized data is then retained to power future security investigations in a serverless data lake powered by Snowflake.\"}),/*#__PURE__*/e(\"h3\",{children:\"Use Cases for 1Password Logs\"}),/*#__PURE__*/e(\"p\",{children:\"1Password event logs show various types of activity in a user's 1Password account, such as item usages and sign-in attempts. Common security use cases for monitoring 1Password logs include identifying:\"}),/*#__PURE__*/o(\"ul\",{children:[/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/e(\"p\",{children:\"Sign-in attempts from a user's 1Password account\"})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/e(\"p\",{children:\"Items in shared vaults that have been modified, accessed, or used\"})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/e(\"p\",{children:\"Unusual or undesirable 1Password account access\"})})]}),/*#__PURE__*/e(\"h3\",{children:\"Onboarding 1Password Logs in Panther\"}),/*#__PURE__*/e(\"p\",{children:\"Panther's integration for 1Password is easy and fast to configure, allowing you to onboard logs in just a few minutes. Simply generate an Access Token within 1Password, select 1Password from the list of pre-defined log sources in Panther, and provide basic credential information for your 1Password account.\"}),/*#__PURE__*/o(\"p\",{children:[\"For more detailed steps on onboarding 1Password logs or for supported log schema, you can \",/*#__PURE__*/e(t,{href:\"https://docs.panther.com/data-onboarding/supported-logs/1password\",motionChild:!0,nodeId:\"SyBeQVkaI\",openInNewTab:!0,scopeId:\"contentManagement\",smoothScroll:!1,children:/*#__PURE__*/e(n.a,{children:\"view our 1Password documentation here\"})}),\".\"]}),/*#__PURE__*/e(\"h3\",{children:\"Normalizing & Analyzing 1Password Logs\"}),/*#__PURE__*/e(\"p\",{children:\"As Panther ingests 1Password audit logs, they are parsed, normalized, and stored in a Snowflake security data lake. This allows security teams to craft detections, identify anomalies, and conduct investigations on logs in the context of days, weeks, or months of data.\"}),/*#__PURE__*/o(\"p\",{children:[\"Panther applies normalization fields to all log records, which standardizes names for attributes and empowers users to correlate data across all log sources - not just 1Password. Panther's search tools - Data Explorer, Indicator Search, and Query Builder - allow you to investigate your normalized logs for suspicious activity or vulnerabilities. For more on searching log data in Panther, \",/*#__PURE__*/e(t,{href:\"https://docs.panther.com/data-analytics\",motionChild:!0,nodeId:\"SyBeQVkaI\",openInNewTab:!0,scopeId:\"contentManagement\",smoothScroll:!1,children:/*#__PURE__*/e(n.a,{children:\"check out our documentation on Investigations & Search\"})}),\".\"]}),/*#__PURE__*/e(\"h3\",{children:\"Detection as Code\"}),/*#__PURE__*/e(\"p\",{children:\"With Panther, your team won't be confined to rigid detection rules as seen in most legacy SIEM platforms. Panther is built with detection-as-code principles, giving you the ability to write Python to define detection logic and to integrate external systems like version control and CI/CD pipelines into your detection engineering workflows. This results in powerful, flexible, and reusable scripting of detections for your security team.\"}),/*#__PURE__*/o(\"p\",{children:[\"A number of pre-built detections for 1Password are available by default in Panther, offering users immediate value for monitoring common IoCs and threats. You can \",/*#__PURE__*/e(t,{href:\"https://panther.com/product/detection-coverage/#filter=1password\",motionChild:!0,nodeId:\"SyBeQVkaI\",openInNewTab:!1,scopeId:\"contentManagement\",smoothScroll:!1,children:/*#__PURE__*/e(n.a,{children:\" explore our built-in detection coverage for 1Password logs here\"})}),\".\"]}),/*#__PURE__*/e(\"h3\",{children:\"Configuring Alerts\"}),/*#__PURE__*/o(\"p\",{children:[\"Panther fires alerts when your detection rules or policies are triggered, and integrates with a variety of \",/*#__PURE__*/e(t,{href:\"https://panther.com/integrations/alerts/\",motionChild:!0,nodeId:\"SyBeQVkaI\",openInNewTab:!1,scopeId:\"contentManagement\",smoothScroll:!1,children:/*#__PURE__*/e(n.a,{children:\"alert destinations\"})}),\" to allow for easy access and management of any 1Password alerts. Alerts can also be sent to alert context or SOAR platforms for more remediation options.\"]}),/*#__PURE__*/e(\"p\",{children:\"Alerts are grouped in five different severity levels: Info, Low, Medium, High, and Critical. Security teams have the options to dynamically assign severity based on specific log event attributes.\"}),/*#__PURE__*/e(\"h3\",{children:\"Customer Support\"}),/*#__PURE__*/e(\"p\",{children:\"If you have any questions about configuring or monitoring 1Password logs in Panther, we're here to help. All customers have access to our technical support team via a dedicated Slack channel, email, or in-app messenger.\"}),/*#__PURE__*/o(\"p\",{children:[\"You can view our \",/*#__PURE__*/e(t,{href:\"https://docs.panther.com/data-onboarding/supported-logs/1password\",motionChild:!0,nodeId:\"SyBeQVkaI\",openInNewTab:!0,scopeId:\"contentManagement\",smoothScroll:!1,children:/*#__PURE__*/e(n.a,{children:\"documentation on configuring and monitoring 1Password logs here \"})}),\" , or customers can sign up for \",/*#__PURE__*/e(t,{href:\"https://pnthr.io/community\",motionChild:!0,nodeId:\"SyBeQVkaI\",openInNewTab:!1,scopeId:\"contentManagement\",smoothScroll:!1,children:/*#__PURE__*/e(n.a,{children:\" the Panther Community \"})}),\" to share best practices or custom detections for monitoring 1Password.\"]}),/*#__PURE__*/e(\"h3\",{children:\"The Ideal SIEM for 1Password\"}),/*#__PURE__*/e(\"p\",{children:\"With Panther, security teams don't have to struggle with restrictive detection logic, waste time and resources on operational overhead, or pay skyrocketing costs to keep up with the growth of cloud app data. Panther was founded by a team of veteran security practitioners who struggled with legacy SIEM challenges first-hand, and built an intuitive, cloud-native platform to solve them.\"}),/*#__PURE__*/o(\"p\",{children:[\"Panther is a cloud-native SIEM built for security operations at scale, offering flexible detection-as-code, intuitive security workflows, and actionable real-time alerts to keep up with the needs of today's security teams. For a powerful, flexible, and scalable SIEM solution for 1Password, \",/*#__PURE__*/e(t,{href:\"https://panther.com/product/request-a-demo/\",motionChild:!0,nodeId:\"SyBeQVkaI\",openInNewTab:!1,scopeId:\"contentManagement\",smoothScroll:!1,children:/*#__PURE__*/e(n.a,{children:\"request a demo today\"})}),\".\"]})]});export const richText10=/*#__PURE__*/o(i.Fragment,{children:[/*#__PURE__*/e(\"h3\",{children:\"Integration Overview\"}),/*#__PURE__*/e(\"p\",{children:\"Zoom is a widely used cloud-based video conferencing platform used for video and audio conferencing, webinars, meeting recordings, and more. Panther can collect, normalize, and monitor Zoom logs to help you identify abnormal activity within your Zoom account in real time. Your normalized log data is then retained to power future security investigations in a data lake powered by the cloud-native data platform, Snowflake.\"}),/*#__PURE__*/e(\"h3\",{children:\"Use Cases for Zoom Audit Logs\"}),/*#__PURE__*/e(\"p\",{children:\"Zoom activity and operation logs show various types of activity in your company's Zoom account, such as changes made by admins on the account, specifically changes in the sections under Account Management, User Management, and Advanced. Some common security use cases for Zoom logs include monitoring for:\"}),/*#__PURE__*/o(\"ul\",{children:[/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/e(\"p\",{children:\"Changes to Account and Group settings\"})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/e(\"p\",{children:\"Changes in role and license assignments for users\"})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/e(\"p\",{children:\"Changes to subscriptions under Billing\"})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/e(\"p\",{children:\"Changes made to SSO configuration, including changes made by your SSO and SAML mapping configuration\"})})]}),/*#__PURE__*/e(\"h3\",{children:\"Onboarding Zoom Logs in Panther\"}),/*#__PURE__*/e(\"p\",{children:\"Panther can fetch Zoom operational and activity logs by querying various Zoom API endpoints. Setting Zoom up in Panther is fast and easy - simply select Zoom from the list of log sources in the Panther console, create a new OAuth2 App in Zoom, and submit your credentials into Panther.\"}),/*#__PURE__*/o(\"p\",{children:[\"For more details on onboarding Zoom logs or for supported log schema, you can \",/*#__PURE__*/e(t,{href:\"https://docs.panther.com/data-onboarding/supported-logs/zoom\",motionChild:!0,nodeId:\"SyBeQVkaI\",openInNewTab:!0,scopeId:\"contentManagement\",smoothScroll:!1,children:/*#__PURE__*/e(n.a,{children:\"view our Zoom documentation here\"})}),\".\"]}),/*#__PURE__*/e(\"h3\",{children:\"Parsing, Normalizing, & Analyzing\"}),/*#__PURE__*/e(\"p\",{children:\"As Panther ingests Zoom logs, they are parsed, normalized, and stored in a Snowflake security data lake. This allows you to build detections, identify anomalies, and conduct investigations in the context of days, weeks, or months of data.\"}),/*#__PURE__*/o(\"p\",{children:[\"Panther applies normalization fields to log records, which standardizes names for attributes and enables you to correlate data across all of your log sources. Panther's handy search tools - such as Query Builder, Data Explorer, and Indicator Search - allow you to investigate your normalized logs for suspicious activity or vulnerabilities. For more information on searching logs, \",/*#__PURE__*/e(t,{href:\"https://docs.panther.com/data-analytics\",motionChild:!0,nodeId:\"SyBeQVkaI\",openInNewTab:!0,scopeId:\"contentManagement\",smoothScroll:!1,children:/*#__PURE__*/e(n.a,{children:\"check out our documentation on Investigations & Search\"})}),\".\"]}),/*#__PURE__*/e(\"h3\",{children:\"Detection as Code\"}),/*#__PURE__*/e(\"p\",{children:\"With Panther, you aren\u201A\\xc4\\xf4t confined to restrictive detections as seen in many SIEM solutions. Panther is built around detection-as-code principles, giving you the ability to write Python to define detection logic and to integrate external systems like version control and CI/CD pipelines into your detection engineering processes. This results in powerful, flexible, and reusable scripting of detections for your security team.\"}),/*#__PURE__*/o(\"p\",{children:[\"Pre-built detections for Zoom are available in Panther, offering you the ability to immediately monitor for common IoCs and threats. You can \",/*#__PURE__*/e(t,{href:\"https://panther.com/product/detection-coverage/#filter=zoom\",motionChild:!0,nodeId:\"SyBeQVkaI\",openInNewTab:!1,scopeId:\"contentManagement\",smoothScroll:!1,children:/*#__PURE__*/e(n.a,{children:\" explore our built-in detection coverage for Zoom logs here\"})}),\".\"]}),/*#__PURE__*/e(\"h3\",{children:\"Configuring Alerts\"}),/*#__PURE__*/o(\"p\",{children:[\"Panther generates alerts when your detection rules or policies for Zoom are triggered, and integrates with a variety of \",/*#__PURE__*/e(t,{href:\"https://panther.com/integrations/alerts/\",motionChild:!0,nodeId:\"SyBeQVkaI\",openInNewTab:!1,scopeId:\"contentManagement\",smoothScroll:!1,children:/*#__PURE__*/e(n.a,{children:\" alert destinations \"})}),\" to allow for intuitive management of any alerts. Alerts can also be sent to alert context or SOAR platforms for more remediation options.\"]}),/*#__PURE__*/e(\"p\",{children:\"Alerts are categorized by five different severity levels: Info, Low, Medium, High, and Critical. Your security team has the ability to dynamically assign severity based on specific log event attributes.\"}),/*#__PURE__*/e(\"h3\",{children:\"Customer Support\"}),/*#__PURE__*/e(\"p\",{children:\"If you have any questions about onboarding or monitoring Zoom logs in Panther, our customer support team is here to help. All customers have access to support via a dedicated Slack channel, email, or in-app messenger.\"}),/*#__PURE__*/o(\"p\",{children:[\"You can view our \",/*#__PURE__*/e(t,{href:\"https://docs.panther.com/data-onboarding/supported-logs/zoom\",motionChild:!0,nodeId:\"SyBeQVkaI\",openInNewTab:!0,scopeId:\"contentManagement\",smoothScroll:!1,children:/*#__PURE__*/e(n.a,{children:\"documentation on configuring and monitoring Zoom logs here\"})}),\", or customers can sign up for \",/*#__PURE__*/e(t,{href:\"https://pnthr.io/community\",motionChild:!0,nodeId:\"SyBeQVkaI\",openInNewTab:!1,scopeId:\"contentManagement\",smoothScroll:!1,children:/*#__PURE__*/e(n.a,{children:\"the Panther Community\"})}),\" to share best practices or custom detections for Zoom logs.\"]}),/*#__PURE__*/e(\"h3\",{children:\"The Ideal SIEM for Zoom\"}),/*#__PURE__*/e(\"p\",{children:\"With Panther, your team doesn't have to pay excessive costs to keep up with the growth of cloud app data, struggle with restrictive detection logic, or waste time and resources on operational overhead. Panther is built by a team of security engineers who struggled with other SIEM solutions first-hand, and built an intuitive, cloud-native platform to meet today's security needs.\"}),/*#__PURE__*/o(\"p\",{children:[\"Panther is a cloud-native SIEM built for security operations at scale, offering flexible detection-as-code, intuitive security workflows, and actionable real-time alerts. For a powerful, fast, and scalable SIEM solution for Zoom, \",/*#__PURE__*/e(t,{href:\"https://panther.com/product/request-a-demo/\",motionChild:!0,nodeId:\"SyBeQVkaI\",openInNewTab:!1,scopeId:\"contentManagement\",smoothScroll:!1,children:/*#__PURE__*/e(n.a,{children:\" request a demo today\"})}),\".\"]})]});export const richText11=/*#__PURE__*/o(i.Fragment,{children:[/*#__PURE__*/e(\"h3\",{children:\"Integration Overview\"}),/*#__PURE__*/e(\"p\",{children:\"Salesforce is a cloud-based customer relationship management (CRM) platform used by organizations to manage sales operations, campaigns, and customer and prospect data. Panther can collect, normalize, and monitor Salesforce audit logs to help you identify suspicious activity in real time. Your normalized log data is then retained to power future security investigations in a data lake powered by the cloud-native data platform, Snowflake.\"}),/*#__PURE__*/e(\"h3\",{children:\"Use Cases for Salesforce Event Logs\"}),/*#__PURE__*/e(\"p\",{children:\"Panther has the ability to fetch Salesforce Event Monitoring logs, including Login, LoginAs, Logout, and URI log types. Some common SIEM use cases for Salesforce Event Monitoring logs include:\"}),/*#__PURE__*/o(\"ul\",{children:[/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/e(\"p\",{children:\"Monitoring suspicious login and logout events\"})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/e(\"p\",{children:\"Tracking Admin activity in privileged accounts and other user accounts.\"})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/e(\"p\",{children:\"Identifying any suspicious interactions with the web browser UI\"})})]}),/*#__PURE__*/e(\"h3\",{children:\"Onboarding Salesforce Logs in Panther\"}),/*#__PURE__*/e(\"p\",{children:\"Panther users are able to process Salesforce events by using Salesforce's Event Monitoring feature and creating an API key. To set up Salesforce in Panther, enable Event Monitoring in Salesforce, create an API User and Token, assign a Permission Set in Salesforce, and submit your credentials into the Panther setup menu.\"}),/*#__PURE__*/o(\"p\",{children:[\"For more details on onboarding Salesforce logs or for supported log schema, you can \",/*#__PURE__*/e(t,{href:\"https://docs.panther.com/data-onboarding/supported-logs/salesforce\",motionChild:!0,nodeId:\"SyBeQVkaI\",openInNewTab:!0,scopeId:\"contentManagement\",smoothScroll:!1,children:/*#__PURE__*/e(n.a,{children:\"view our Salesforce documentation here\"})}),\".\"]}),/*#__PURE__*/e(\"h3\",{children:\"Parsing, Normalizing, & Analyzing Logs\"}),/*#__PURE__*/e(\"p\",{children:\"As Panther ingests Salesforce event logs, they are parsed, normalized, and stored in a Snowflake security data lake. This allows you to write detections, identify anomalies, and conduct investigations in the context of days, weeks, or months of data.\"}),/*#__PURE__*/o(\"p\",{children:[\"Panther applies normalization fields to log records, which standardizes names for attributes and enables you to correlate data across all of your log sources. Panther's intuitive search tools - such as Query Builder, Data Explorer, and Indicator Search - allow you to investigate your normalized logs for suspicious activity or vulnerabilities. For more information on searching logs, \",/*#__PURE__*/e(t,{href:\"https://docs.panther.com/data-analytics\",motionChild:!0,nodeId:\"SyBeQVkaI\",openInNewTab:!0,scopeId:\"contentManagement\",smoothScroll:!1,children:/*#__PURE__*/e(n.a,{children:\"check out our documentation on Investigations & Search\"})}),\".\"]}),/*#__PURE__*/e(\"h3\",{children:\"Easily Customizable Detections\"}),/*#__PURE__*/e(\"p\",{children:\"With Panther, you aren't confined to restrictive detections as seen in many SIEM solutions. Panther is architected around detection-as-code principles, giving you the ability to write Python to define detection logic and to integrate external systems like version control and CI/CD pipelines into your detection engineering processes. This results in powerful, flexible, and reusable scripting of detections for your security team.\"}),/*#__PURE__*/e(\"h3\",{children:\"Configuring Alerts\"}),/*#__PURE__*/o(\"p\",{children:[\"Panther generates alerts when your detection rules or policies for Salesforce are triggered, and integrates with a variety of \",/*#__PURE__*/e(t,{href:\"https://panther.com/integrations/alerts/\",motionChild:!0,nodeId:\"SyBeQVkaI\",openInNewTab:!1,scopeId:\"contentManagement\",smoothScroll:!1,children:/*#__PURE__*/e(n.a,{children:\" alert destinations\"})}),\" to allow for intuitive management of any alerts. Alerts can also be sent to alert context or SOAR platforms for more remediation options.\"]}),/*#__PURE__*/e(\"p\",{children:\"Alerts are grouped into five different severity levels: Info, Low, Medium, High, and Critical. Your security team has the ability to dynamically assign severity based on specific log event attributes.\"}),/*#__PURE__*/e(\"h3\",{children:\"Customer Support\"}),/*#__PURE__*/e(\"p\",{children:\"If you have any questions about configuring or monitoring Salesforce logs in Panther, our customer support team is here to help. All customers have access to support via a dedicated Slack channel, email, or in-app messenger.\"}),/*#__PURE__*/o(\"p\",{children:[\"You can view our \",/*#__PURE__*/e(t,{href:\"https://docs.panther.com/data-onboarding/supported-logs/salesforce\",motionChild:!0,nodeId:\"SyBeQVkaI\",openInNewTab:!0,scopeId:\"contentManagement\",smoothScroll:!1,children:/*#__PURE__*/e(n.a,{children:\"documentation on configuring and monitoring Salesforce logs here\"})}),\", or customers can sign up for \",/*#__PURE__*/e(t,{href:\"https://pnthr.io/community\",motionChild:!0,nodeId:\"SyBeQVkaI\",openInNewTab:!0,scopeId:\"contentManagement\",smoothScroll:!1,children:/*#__PURE__*/e(n.a,{children:\"the Panther Community\"})}),\" to share best practices or custom detections for Salesforce logs.\"]}),/*#__PURE__*/e(\"h3\",{children:\"The Ideal SIEM for Salesforce\"}),/*#__PURE__*/e(\"p\",{children:\"With Panther, your team doesn't have to waste time and resources on operational overhead, pay excessive costs to keep up with the growth of cloud app data or struggle with restrictive detection logic. Panther was founded by a team of security engineers who struggled with other SIEM solutions first-hand, and built an intuitive, cloud-native platform to solve them.\"}),/*#__PURE__*/o(\"p\",{children:[\"Panther is a cloud-native SIEM built for security operations at scale, offering flexible detection-as-code, intuitive security workflows, and actionable real-time alerts. If you're searching for a seamless SIEM platform for SaaS apps like Salesforce, \",/*#__PURE__*/e(t,{href:\"https://panther.com/product/request-a-demo/\",motionChild:!0,nodeId:\"SyBeQVkaI\",openInNewTab:!1,scopeId:\"contentManagement\",smoothScroll:!1,children:/*#__PURE__*/e(n.a,{children:\" request a demo today\"})}),\".\"]})]});export const richText12=/*#__PURE__*/o(i.Fragment,{children:[/*#__PURE__*/e(\"h3\",{children:\"Integration Overview\"}),/*#__PURE__*/e(\"p\",{children:\"GitHub is a web-based software development platform used for version control, collaboration, bug tracking, software feature requests, continuous integration, and task management. Panther can collect, normalize, and monitor GitHub logs to help you identify any suspicious activity within your GitHub organization. Your normalized data is then retained to power future security investigations in a data lake powered by the cloud-native data platform, Snowflake.\"}),/*#__PURE__*/e(\"h3\",{children:\"Use Cases for GitHub Audit Logs\"}),/*#__PURE__*/e(\"p\",{children:\"GitHub audit logs give organization owners visibility into actions performed by members of their organization. These logs include details such as who performed the action, what the action was, and when it was performed. Some common SIEM use cases for Github logs include monitoring for:\"}),/*#__PURE__*/o(\"ul\",{children:[/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/e(\"p\",{children:\"New admin roles or downgrades of existing admins\"})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/e(\"p\",{children:\"Changes to IAM or MFA policies\"})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/e(\"p\",{children:\"Creation or transfer of GitHub repositories\"})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/e(\"p\",{children:\"Added or removed users in an organization, repository, or team\"})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/e(\"p\",{children:\"Access Key creation or uploads\"})})]}),/*#__PURE__*/e(\"h3\",{children:\"Onboarding GitHub Logs in Panther\"}),/*#__PURE__*/e(\"p\",{children:\"Setting up Panther's integration for GitHub is fast and convenient, with multiple ingestion methods available to you depending on your organization's GitHub account. For Organization accounts, Panther can ingest audit logs from GitHub by querying the GitHub API. For Enterprise accounts, Panther can leverage GitHub's audit log streaming feature via AWS S3 or Google Cloud Storage.\"}),/*#__PURE__*/o(\"p\",{children:[\"For more details on onboarding GitHub logs or for supported log schema, you can \",/*#__PURE__*/e(t,{href:\"https://docs.panther.com/data-onboarding/supported-logs/github\",motionChild:!0,nodeId:\"SyBeQVkaI\",openInNewTab:!0,scopeId:\"contentManagement\",smoothScroll:!1,children:/*#__PURE__*/e(n.a,{children:\"view our GitHub documentation here\"})}),\".\"]}),/*#__PURE__*/e(\"h3\",{children:\"Parsing, Normalizing, & Analyzing GitHub Logs\"}),/*#__PURE__*/e(\"p\",{children:\"As Panther ingests GitHub logs, they are parsed, normalized, and stored in a Snowflake security data lake. This allows you to build detections, identify anomalies, and conduct investigations in the context of days, weeks, or months of data.\"}),/*#__PURE__*/o(\"p\",{children:[\"Panther applies normalization fields to all log records, which standardizes names for attributes and empowers users to correlate data across all of your log sources. Panther's various search tools - such as Query Builder, Data Explorer, and Indicator Search - allow you to conduct investigations for suspicious activity or vulnerabilities. For more information on searching logs, \",/*#__PURE__*/e(t,{href:\"https://docs.panther.com/data-analytics\",motionChild:!0,nodeId:\"SyBeQVkaI\",openInNewTab:!0,scopeId:\"contentManagement\",smoothScroll:!1,children:/*#__PURE__*/e(n.a,{children:\"check out our documentation on Investigations & Search\"})}),\".\"]}),/*#__PURE__*/e(\"h3\",{children:\"Built-in and Easily Customizable Detections\"}),/*#__PURE__*/o(\"p\",{children:[\"Pre-built detections for GitHub audit logs are available by default in Panther, offering users immediate value for monitoring common IoCs and threats. You can \",/*#__PURE__*/e(t,{href:\"https://panther.com/product/detection-coverage/#filter=github\",motionChild:!0,nodeId:\"SyBeQVkaI\",openInNewTab:!1,scopeId:\"contentManagement\",smoothScroll:!1,children:/*#__PURE__*/e(n.a,{children:\" explore our built-in detection coverage for GitHub here\"})}),\".\"]}),/*#__PURE__*/e(\"p\",{children:\"With Panther, you aren't confined to restrictive detections as seen in many SIEM solutions. Panther is architected around detection-as-code principles, giving you the ability to write Python to define detection logic and to integrate external systems like version control and CI/CD pipelines into your detection engineering processes. This results in powerful, flexible, and reusable scripting of detections for your security team.\"}),/*#__PURE__*/e(\"h3\",{children:\"Configuring Alerts\"}),/*#__PURE__*/o(\"p\",{children:[\"Panther generates alerts when your detection rules or policies for GitHub are triggered, and integrates with a variety of \",/*#__PURE__*/e(t,{href:\"https://panther.com/integrations/alerts/\",motionChild:!0,nodeId:\"SyBeQVkaI\",openInNewTab:!1,scopeId:\"contentManagement\",smoothScroll:!1,children:/*#__PURE__*/e(n.a,{children:\" alert destinations\"})}),\" to allow for intuitive management of any alerts. Alerts can also be sent to alert context or SOAR platforms for more remediation options.\"]}),/*#__PURE__*/e(\"p\",{children:\"Alerts are categorized within five severity levels: Info, Low, Medium, High, and Critical. Your security team has the ability to dynamically assign severity based on specific log event attributes.\"}),/*#__PURE__*/e(\"h3\",{children:\"Customer Support\"}),/*#__PURE__*/e(\"p\",{children:\"If you have any questions about configuring or monitoring GitHub audit logs in Panther, our customer support team is here to help. All customers have access to support via a dedicated Slack channel, email, or in-app messenger.\"}),/*#__PURE__*/o(\"p\",{children:[\"You can view our \",/*#__PURE__*/e(t,{href:\"https://docs.panther.com/data-onboarding/supported-logs/github\",motionChild:!0,nodeId:\"SyBeQVkaI\",openInNewTab:!0,scopeId:\"contentManagement\",smoothScroll:!1,children:/*#__PURE__*/e(n.a,{children:\"documentation on configuring GitHub logs here\"})}),\", or customers can sign up for \",/*#__PURE__*/e(t,{href:\"https://pnthr.io/community\",motionChild:!0,nodeId:\"SyBeQVkaI\",openInNewTab:!0,scopeId:\"contentManagement\",smoothScroll:!1,children:/*#__PURE__*/e(n.a,{children:\"the Panther Community\"})}),\" to share best practices or custom detections.\"]}),/*#__PURE__*/e(\"h3\",{children:\"The Ideal SIEM for GitHub\"}),/*#__PURE__*/e(\"p\",{children:\"With Panther, your team doesn't have to waste time and resources on operational overhead, pay excessive costs to keep up with the growth of cloud app data or struggle with limited detection logic. Panther was founded by a team of security engineers who struggled with other SIEM solutions first-hand, and built an intuitive, cloud-native platform to solve them.\"}),/*#__PURE__*/o(\"p\",{children:[\"Panther is a cloud-native SIEM built for security operations at scale, offering powerful detection-as-code, intuitive security workflows, and actionable real-time alerts. If you're searching for a seamless SIEM platform for GitHub, \",/*#__PURE__*/e(t,{href:\"https://panther.com/product/request-a-demo/\",motionChild:!0,nodeId:\"SyBeQVkaI\",openInNewTab:!1,scopeId:\"contentManagement\",smoothScroll:!1,children:/*#__PURE__*/e(n.a,{children:\" request a demo today\"})}),\".\"]})]});export const richText13=/*#__PURE__*/o(i.Fragment,{children:[/*#__PURE__*/e(\"h3\",{children:\"Integration Overview\"}),/*#__PURE__*/e(\"p\",{children:\"Microsoft 365 and Office 365 are cloud-based collaboration and communication tools designed to support an organization's needs for reliability, user productivity, and security. Panther can collect, normalize, and monitor Microsoft 365 audit logs to help you identify suspicious activity in real time. Your normalized data is then retained to power future security investigations in a data lake powered by the cloud-native data platform, Snowflake.\"}),/*#__PURE__*/e(\"h3\",{children:\"Use Cases for Microsoft 365 Audit Logs\"}),/*#__PURE__*/e(\"p\",{children:\"Panther can pull audit logs from Microsoft's Office 365 Management Activity API, and will query the API every 5 minutes. Some common SIEM use cases for Microsoft 365 audit logs include:\"}),/*#__PURE__*/o(\"ul\",{children:[/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/e(\"p\",{children:\"Identifying any suspicious or brute force login attempt activity\"})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/e(\"p\",{children:\"Detecting any excessive or suspicious document creation, sharing, or deletion\"})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/e(\"p\",{children:\"Monitoring for disabled or modified MFA settings\"})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/e(\"p\",{children:\"Detecting the creation of email forwarding rules to external domains\"})})]}),/*#__PURE__*/e(\"h3\",{children:\"Onboarding Microsoft 365 Logs in Panther\"}),/*#__PURE__*/e(\"p\",{children:\"Panther's integration for Microsoft 365 is fast and easy to configure, allowing you to onboard Microsoft 365 logs in just a few minutes. Simply select Microsoft 365 from the list of log sources in the Panther console, create a new Application in Azure Active Directory, and submit your credentials into the Panther setup menu.\"}),/*#__PURE__*/o(\"p\",{children:[\"For more details on onboarding Microsoft 365 logs or for supported log schema, you can \",/*#__PURE__*/e(t,{href:\"https://docs.panther.com/data-onboarding/supported-logs/microsoft365\",motionChild:!0,nodeId:\"SyBeQVkaI\",openInNewTab:!0,scopeId:\"contentManagement\",smoothScroll:!1,children:/*#__PURE__*/e(n.a,{children:\"view our Microsoft 365 documentation here\"})}),\".\"]}),/*#__PURE__*/e(\"h3\",{children:\"Parsing, Normalizing, & Analyzing Logs\"}),/*#__PURE__*/e(\"p\",{children:\"As Panther ingests Microsoft 365 logs, they are parsed, normalized, and stored in a Snowflake security data lake. This allows you to write detections, identify anomalies, and conduct investigations in the context of days, weeks, or months of data.\"}),/*#__PURE__*/o(\"p\",{children:[\"Panther applies normalization fields to log records, which standardizes names for attributes and empowers you to correlate data across all of your log sources. Panther's intuitive search tools - such as Query Builder, Data Explorer, and Indicator Search - allow you to investigate your normalized logs for suspicious activity or vulnerabilities. For more information on searching logs, \",/*#__PURE__*/e(t,{href:\"https://docs.panther.com/data-analytics\",motionChild:!0,nodeId:\"SyBeQVkaI\",openInNewTab:!0,scopeId:\"contentManagement\",smoothScroll:!1,children:/*#__PURE__*/e(n.a,{children:\"check out our documentation on Investigations & Search\"})}),\".\"]}),/*#__PURE__*/e(\"h3\",{children:\"Built-in and Easily Customizable Detections\"}),/*#__PURE__*/o(\"p\",{children:[\"Pre-built detections for Microsoft 365 are available by default in Panther, offering users immediate value for monitoring common IoCs and threats. You can \",/*#__PURE__*/e(t,{href:\"https://panther.com/product/detection-coverage/#filter=microsoft365\",motionChild:!0,nodeId:\"SyBeQVkaI\",openInNewTab:!1,scopeId:\"contentManagement\",smoothScroll:!1,children:/*#__PURE__*/e(n.a,{children:\" explore our built-in detection coverage for Microsoft 365 logs here\"})}),\".\"]}),/*#__PURE__*/e(\"p\",{children:\"With Panther, you aren't confined to rigid detections as seen in most SIEM solutions. Panther is architected around detection-as-code principles, giving you the ability to write Python to define detection logic and to integrate external systems like version control and CI/CD pipelines into your detection engineering processes. This results in powerful, flexible, and reusable scripting of detections for your security team.\"}),/*#__PURE__*/e(\"h3\",{children:\"Configuring Alerts\"}),/*#__PURE__*/o(\"p\",{children:[\"Panther generates alerts when your detection rules or policies for Microsoft 365 are triggered, and integrates with a variety of \",/*#__PURE__*/e(t,{href:\"https://panther.com/integrations/alerts/\",motionChild:!0,nodeId:\"SyBeQVkaI\",openInNewTab:!1,scopeId:\"contentManagement\",smoothScroll:!1,children:/*#__PURE__*/e(n.a,{children:\" alert destinations\"})}),\" to allow for intuitive management of any alerts. Alerts can also be sent to alert context or SOAR platforms for more remediation options.\"]}),/*#__PURE__*/e(\"p\",{children:\"Alerts are categorized by five different severity levels: Info, Low, Medium, High, and Critical. Your security team has the ability to dynamically assign severity based on specific log event attributes.\"}),/*#__PURE__*/e(\"h3\",{children:\"Customer Support\"}),/*#__PURE__*/e(\"p\",{children:\"If you have any questions about configuring or monitoring Microsoft 365 logs in Panther, our customer support team is here to help. All customers have access to support via a dedicated Slack channel, email, or in-app messenger.\"}),/*#__PURE__*/o(\"p\",{children:[\"You can view our \",/*#__PURE__*/e(t,{href:\"https://docs.panther.com/data-onboarding/supported-logs/microsoft365\",motionChild:!0,nodeId:\"SyBeQVkaI\",openInNewTab:!0,scopeId:\"contentManagement\",smoothScroll:!1,children:/*#__PURE__*/e(n.a,{children:\"documentation on configuring and monitoring Microsoft 365 logs here\"})}),\", or customers can sign up for \",/*#__PURE__*/e(t,{href:\"https://pnthr.io/community\",motionChild:!0,nodeId:\"SyBeQVkaI\",openInNewTab:!0,scopeId:\"contentManagement\",smoothScroll:!1,children:/*#__PURE__*/e(n.a,{children:\"the Panther Community\"})}),\" to share best practices or custom detections for Microsoft 365 logs.\"]}),/*#__PURE__*/e(\"h3\",{children:\"The Ideal SIEM for Microsoft 365\"}),/*#__PURE__*/e(\"p\",{children:\"With Panther, your team doesn't have to waste time and resources on operational overhead, pay excessive costs to keep up with the growth of cloud app data or struggle with restrictive detection logic. Panther was founded by a team of security engineers who struggled with other SIEM solutions first-hand, and built an intuitive, cloud-native platform to solve them.\"}),/*#__PURE__*/o(\"p\",{children:[\"Panther is a cloud-native SIEM built for security operations at scale, offering flexible detection-as-code, intuitive security workflows, and actionable real-time alerts. If you're searching for a seamless SIEM platform for Microsoft 365, \",/*#__PURE__*/e(t,{href:\"https://panther.com/product/request-a-demo/\",motionChild:!0,nodeId:\"SyBeQVkaI\",openInNewTab:!1,scopeId:\"contentManagement\",smoothScroll:!1,children:/*#__PURE__*/e(n.a,{children:\" request a demo today\"})}),\".\"]})]});export const richText14=/*#__PURE__*/o(i.Fragment,{children:[/*#__PURE__*/e(\"h3\",{children:\"Integration Overview\"}),/*#__PURE__*/e(\"p\",{children:\"For many organizations, Slack is one of the most essential messaging apps used for important and sensitive communications. Panther can collect, normalize, and monitor Slack audit logs to help you identify suspicious activity within your Slack workspace in real time. Your normalized log data is then retained to power future security investigations in a data lake powered by the cloud-native data platform, Snowflake.\"}),/*#__PURE__*/e(\"h3\",{children:\"Use Cases for Slack Logs\"}),/*#__PURE__*/e(\"p\",{children:\"Panther can pull multiple log types directly from Slack via API queries, including Audit, Access, and Integration logs. Some common security use cases for Slack logs include:\"}),/*#__PURE__*/o(\"ul\",{children:[/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/e(\"p\",{children:\"Monitoring changes to EKM, MFA, or SSO settings\"})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/e(\"p\",{children:\"Alerting when a Slack organization is created or deleted\"})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/e(\"p\",{children:\"Detecting when Slack Apps are added, removed, or modified\"})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/e(\"p\",{children:\"Identifying when a potentially malicious file is shared\"})})]}),/*#__PURE__*/e(\"h3\",{children:\"Onboarding Slack Logs in Panther\"}),/*#__PURE__*/e(\"p\",{children:\"Panther is able to pull logs directly from Slack via API. The Slack Audit Log API is available to Slack customers with Enterprise plans, while the Access and Integration log APIs are available to all Slack paid plans. In order for Panther to access the Slack API, you simply need to create a new Slack log source within the Panther console, create a Slack App, and provide the app credentials to Panther.\"}),/*#__PURE__*/o(\"p\",{children:[\"For more details on onboarding Slack logs or for supported log schema, you can \",/*#__PURE__*/e(t,{href:\"https://docs.panther.com/data-onboarding/supported-logs/slack\",motionChild:!0,nodeId:\"SyBeQVkaI\",openInNewTab:!0,scopeId:\"contentManagement\",smoothScroll:!1,children:/*#__PURE__*/e(n.a,{children:\"view our Slack documentation here\"})}),\".\"]}),/*#__PURE__*/e(\"h3\",{children:\"Parsing, Normalizing, & Analyzing\"}),/*#__PURE__*/e(\"p\",{children:\"As Panther ingests Slack logs, they are parsed, normalized, and stored in a Snowflake security data lake. This allows you to write detections, identify anomalies, and conduct investigations in the context of days, weeks, or months of data.\"}),/*#__PURE__*/o(\"p\",{children:[\"Panther applies normalization fields to log records, which standardizes names for attributes and enables you to correlate data across all of your log sources. Panther's intuitive search tools - such as Query Builder, Data Explorer, and Indicator Search - allow you to investigate your normalized logs for suspicious activity or vulnerabilities. For more information on searching logs, \",/*#__PURE__*/e(t,{href:\"https://docs.panther.com/data-analytics\",motionChild:!0,nodeId:\"SyBeQVkaI\",openInNewTab:!0,scopeId:\"contentManagement\",smoothScroll:!1,children:/*#__PURE__*/e(n.a,{children:\"check out our documentation on Investigations & Search\"})}),\".\"]}),/*#__PURE__*/e(\"h3\",{children:\"Detection as Code\"}),/*#__PURE__*/e(\"p\",{children:\"With Panther, you aren't confined to restrictive detections as seen in many SIEM solutions. Panther is built around detection-as-code principles, giving you the ability to write Python to define detection logic and to integrate external systems like version control and CI/CD pipelines into your detection engineering processes. This results in powerful, flexible, and reusable scripting of detections for your security team.\"}),/*#__PURE__*/o(\"p\",{children:[\"Pre-built detections for Slack are available by default in Panther, offering users immediate value for monitoring common IoCs and threats. You can \",/*#__PURE__*/e(t,{href:\"https://panther.com/product/detection-coverage/#filter=slack\",motionChild:!0,nodeId:\"SyBeQVkaI\",openInNewTab:!1,scopeId:\"contentManagement\",smoothScroll:!1,children:/*#__PURE__*/e(n.a,{children:\"explore our built-in detection coverage for Slack audit logs here\"})}),\".\"]}),/*#__PURE__*/e(\"h3\",{children:\"Configuring Alerts\"}),/*#__PURE__*/o(\"p\",{children:[\"Panther generates alerts when your detection rules or policies for Slack are triggered, and integrates with a variety of \",/*#__PURE__*/e(t,{href:\"https://panther.com/integrations/alerts/\",motionChild:!0,nodeId:\"SyBeQVkaI\",openInNewTab:!1,scopeId:\"contentManagement\",smoothScroll:!1,children:/*#__PURE__*/e(n.a,{children:\" alert destinations \"})}),\" to allow for intuitive management of any alerts. Alerts can also be sent to alert context or SOAR platforms for more remediation options.\"]}),/*#__PURE__*/e(\"p\",{children:\"Alerts are categorized by five different severity levels: Info, Low, Medium, High, and Critical. Your security team has the ability to dynamically assign severity based on specific log event attributes.\"}),/*#__PURE__*/e(\"h3\",{children:\"Customer Support\"}),/*#__PURE__*/e(\"p\",{children:\"If you have any questions about configuring or monitoring Slack logs in Panther, our customer support team is here to help. All customers have access to support via a dedicated Slack channel, email, or in-app messenger.\"}),/*#__PURE__*/o(\"p\",{children:[\"You can view our \",/*#__PURE__*/e(t,{href:\"https://docs.panther.com/data-onboarding/supported-logs/slack\",motionChild:!0,nodeId:\"SyBeQVkaI\",openInNewTab:!0,scopeId:\"contentManagement\",smoothScroll:!1,children:/*#__PURE__*/e(n.a,{children:\"documentation on configuring and monitoring Slack logs here\"})}),\", or customers can sign up for \",/*#__PURE__*/e(t,{href:\"https://pnthr.io/community\",motionChild:!0,nodeId:\"SyBeQVkaI\",openInNewTab:!0,scopeId:\"contentManagement\",smoothScroll:!1,children:/*#__PURE__*/e(n.a,{children:\"the Panther Community\"})}),\" to share best practices or custom detections for Slack logs.\"]}),/*#__PURE__*/e(\"h3\",{children:\"The Ideal SIEM for Slack\"}),/*#__PURE__*/e(\"p\",{children:\"With Panther, your team doesn't have to waste time and resources on operational overhead, pay excessive costs to keep up with the growth of cloud app data or struggle with restrictive detection logic. Panther was founded by a team of security engineers who struggled with other SIEM solutions first-hand, and built an intuitive, cloud-native platform to solve them.\"}),/*#__PURE__*/o(\"p\",{children:[\"Panther is a cloud-native SIEM built for security operations at scale, offering flexible detection-as-code, intuitive security workflows, and actionable real-time alerts. For a powerful, practical, and scalable SIEM solution for Slack, \",/*#__PURE__*/e(t,{href:\"https://panther.com/product/request-a-demo/\",motionChild:!0,nodeId:\"SyBeQVkaI\",openInNewTab:!1,scopeId:\"contentManagement\",smoothScroll:!1,children:/*#__PURE__*/e(n.a,{children:\" request a demo today\"})}),\".\"]})]});export const richText15=/*#__PURE__*/o(i.Fragment,{children:[/*#__PURE__*/e(\"p\",{children:\"Kickoff automated remediation workflows using Panther's Tines integration. With Panther and Tines, you can power better security outcomes across your organization and build a robust, end-to-end security pipeline using Python, SQL, and drag and drop automation workflows.\"}),/*#__PURE__*/e(\"p\",{children:\"When your detections are triggered, Panther will send an alert to Tines. Tines will then initiate an automated response workflow that will check malicious activity and take necessary steps\\xac\u2020to improve the security of your organization.\"}),/*#__PURE__*/e(\"h4\",{children:\"How it Works\"}),/*#__PURE__*/e(\"p\",{children:\"The integration is simple and fast:\"}),/*#__PURE__*/o(\"ul\",{children:[/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/e(\"p\",{children:\"Configure a webhook destination in Panther to send your alert to Tines\"})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/e(\"p\",{children:\"Trigger alerts based on issue severity, or configure specific detections to use this as an alert destination\"})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/e(\"p\",{children:\"Sit back and monitor the activity!\"})})]}),/*#__PURE__*/o(\"p\",{children:[\"Watch our \",/*#__PURE__*/e(t,{href:\"https://panther.com/webinars/security-automation-panther-tines/\",motionChild:!0,nodeId:\"SyBeQVkaI\",openInNewTab:!1,scopeId:\"contentManagement\",smoothScroll:!1,children:/*#__PURE__*/e(n.a,{children:\"on demand webinar\"})}),\" to learn how you can automate detection and response with Panther and Tines.\"]})]});export const richText16=/*#__PURE__*/o(i.Fragment,{children:[/*#__PURE__*/e(\"h3\",{children:\"Integration Overview\"}),/*#__PURE__*/e(\"p\",{children:\"Duo Security provides a suite of multi-factor authentication (MFA), single sign-on (SSO), remote access, and access control products to improve organizations\u201A\\xc4\\xf4 security and productivity. Panther can collect, normalize, and monitor Duo logs to help you identify suspicious activity in real time. Your normalized data is then retained to inform future security investigations in a data lake powered by the cloud-native data platform, Snowflake.\"}),/*#__PURE__*/e(\"h3\",{children:\"Use Cases for Duo Logs\"}),/*#__PURE__*/e(\"p\",{children:\"Panther can support multiple Duo log types, including Authentication, Administrator, Telephony, and Offline Enrollment logs. Some common SIEM use cases for these log types include:\"}),/*#__PURE__*/o(\"ul\",{children:[/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/e(\"p\",{children:\"Monitoring unexpected behavior from users with administrative permissions in Duo\"})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/e(\"p\",{children:\"Alerting when new administrators are created or admin policies are updated\"})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/e(\"p\",{children:\"Identifying when MFA bypass codes are created, used, or viewed\"})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/e(\"p\",{children:\"Detecting suspicious visits and logins from offline devices\"})})]}),/*#__PURE__*/e(\"h3\",{children:\"Onboarding Duo Logs in Panther\"}),/*#__PURE__*/e(\"p\",{children:\"Panther's integration for Duo is fast and easy to configure via the Duo API. Simply select Duo from the list of log sources in the Panther console, create an Admin API application in the Duo Admin Panel, and submit your API key and credentials in the Panther setup menu.\"}),/*#__PURE__*/o(\"p\",{children:[\"For more details on onboarding Duo logs or for supported log schema, you can \",/*#__PURE__*/e(t,{href:\"https://docs.panther.com/data-onboarding/supported-logs/duo\",motionChild:!0,nodeId:\"SyBeQVkaI\",openInNewTab:!0,scopeId:\"contentManagement\",smoothScroll:!1,children:/*#__PURE__*/e(n.a,{children:\"view our Duo documentation here\"})}),\".\"]}),/*#__PURE__*/e(\"h3\",{children:\"Parsing, Normalizing, & Analyzing Duo Logs\"}),/*#__PURE__*/e(\"p\",{children:\"As Panther ingests Duo logs, they are parsed, normalized, and stored in a Snowflake security data lake. This allows you to build detections, identify anomalies, and conduct investigations using days, weeks, or months of data.\"}),/*#__PURE__*/o(\"p\",{children:[\"Panther applies normalization fields to all log records, which standardizes names for attributes and empowers users to correlate data across all log sources - not just Duo. Panther's powerful search tools allow you to conduct investigations for suspicious activity or vulnerabilities. For more information on searching logs, \",/*#__PURE__*/e(t,{href:\"https://docs.panther.com/data-analytics\",motionChild:!0,nodeId:\"SyBeQVkaI\",openInNewTab:!0,scopeId:\"contentManagement\",smoothScroll:!1,children:/*#__PURE__*/e(n.a,{children:\"check out our documentation on Investigations & Search\"})}),\".\"]}),/*#__PURE__*/e(\"h3\",{children:\"Detection as Code\"}),/*#__PURE__*/e(\"p\",{children:\"With Panther, you aren't confined to restrictive detections as seen in many SIEM solutions. Panther is architected around detection-as-code principles, giving you the ability to write Python to define detection logic and to integrate systems like CI/CD pipelines into your detection engineering processes. This results in powerful, flexible, and reusable scripting of detections for your security team.\"}),/*#__PURE__*/o(\"p\",{children:[\"Pre-built detections for Duo are available by default in Panther, offering users immediate value for monitoring common IoCs and threats. You can \",/*#__PURE__*/e(t,{href:\"https://panther.com/product/detection-coverage/#filter=duo\",motionChild:!0,nodeId:\"SyBeQVkaI\",openInNewTab:!1,scopeId:\"contentManagement\",smoothScroll:!1,children:/*#__PURE__*/e(n.a,{children:\" explore our built-in detection coverage for Duo logs here\"})}),\".\"]}),/*#__PURE__*/e(\"h3\",{children:\"Configuring Alerts\"}),/*#__PURE__*/o(\"p\",{children:[\"Panther generates alerts when your detection rules or policies for Duo are triggered, and integrates with a variety of \",/*#__PURE__*/e(t,{href:\"https://panther.com/integrations/alerts/\",motionChild:!0,nodeId:\"SyBeQVkaI\",openInNewTab:!1,scopeId:\"contentManagement\",smoothScroll:!1,children:/*#__PURE__*/e(n.a,{children:\"alert destinations\"})}),\" to allow for intuitive management of any alerts. Alerts can also be sent to task management or SOAR platforms for more remediation options.\"]}),/*#__PURE__*/e(\"p\",{children:\"Alerts are categorized within five severity levels: Info, Low, Medium, High, and Critical. Your security team has the ability to dynamically assign severity based on specific log event attributes.\"}),/*#__PURE__*/e(\"h3\",{children:\"Customer Support\"}),/*#__PURE__*/e(\"p\",{children:\"If you have any questions about configuring or monitoring Duo logs in Panther, our customer support team is here to help. All customers have access to support via a dedicated Slack channel, email, or in-app messenger.\"}),/*#__PURE__*/o(\"p\",{children:[\"You can view our \",/*#__PURE__*/e(t,{href:\"https://docs.panther.com/data-onboarding/supported-logs/duo\",motionChild:!0,nodeId:\"SyBeQVkaI\",openInNewTab:!0,scopeId:\"contentManagement\",smoothScroll:!1,children:/*#__PURE__*/e(n.a,{children:\"documentation on configuring Duo logs here\"})}),\", or customers can sign up for \",/*#__PURE__*/e(t,{href:\"https://pnthr.io/community\",motionChild:!0,nodeId:\"SyBeQVkaI\",openInNewTab:!0,scopeId:\"contentManagement\",smoothScroll:!1,children:/*#__PURE__*/e(n.a,{children:\"the Panther Community\"})}),\" to share best practices or custom detections.\"]}),/*#__PURE__*/e(\"h3\",{children:\"Replacing Traditional SIEM for Duo\"}),/*#__PURE__*/e(\"p\",{children:\"With Panther, your team doesn't have to waste time and resources on operational overhead, pay excessive costs to keep up with the growth of cloud app data or struggle with limited detection logic. Panther was founded by a team of security engineers who struggled with other SIEM solutions first-hand, and built an intuitive, cloud-native platform to solve them.\"}),/*#__PURE__*/o(\"p\",{children:[\"Panther is a cloud-native SIEM built for security operations at scale, offering powerful detection-as-code, intuitive security workflows, and actionable real-time alerts. If you're searching for a seamless SIEM platform for Duo,\\xac\u2020\",/*#__PURE__*/e(t,{href:\"https://panther.com/product/request-a-demo/\",motionChild:!0,nodeId:\"SyBeQVkaI\",openInNewTab:!1,scopeId:\"contentManagement\",smoothScroll:!1,children:/*#__PURE__*/e(n.a,{children:\"request a demo today\"})}),\".\"]})]});export const richText17=/*#__PURE__*/o(i.Fragment,{children:[/*#__PURE__*/e(\"h3\",{children:\"Integration Overview\"}),/*#__PURE__*/e(\"p\",{children:\"Sophos Central offers a unified console for managing Sophos products and lets you administer security settings across networks, endpoints, and clouds. Panther can collect, normalize, and analyze event and alert data from Sophos to help you identify suspicious activity in real-time. Your normalized data is then retained to power future security investigations in a serverless data lake powered by the cloud-native data platform, Snowflake.\"}),/*#__PURE__*/e(\"h3\",{children:\"Use Cases for Sophos Logs\"}),/*#__PURE__*/e(\"p\",{children:\"Panther supports Sophos Central logs, which capture event and alert details from Sophos. Common SIEM use cases for monitoring these log types include:\"}),/*#__PURE__*/o(\"ul\",{children:[/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/e(\"p\",{children:\"Alerts for malware, ransomware, exploit, virus, and PUA detection\"})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/e(\"p\",{children:\"Notifications for blocked network or web traffic, such as known malicious or spam websites\"})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/e(\"p\",{children:\"Notifications for endpoint policy violations and data loss prevention events\"})})]}),/*#__PURE__*/e(\"h3\",{children:\"Onboarding Sophos with Panther\"}),/*#__PURE__*/e(\"p\",{children:\"Panther supports ingesting Sophos logs via common Data Transport options: Amazon Web Services (AWS) S3 and SQS. To set up Sophos Central logs in Panther, users can simply choose Sophos from the list of log sources in the Panther console, configure your preferred data transport mechanism (AWS S3 or SQS), and configure Sophos to push logs to your chosen data transport source.\"}),/*#__PURE__*/o(\"p\",{children:[\"For more details on onboarding Sophos logs or for supported log schema, you can \",/*#__PURE__*/e(t,{href:\"https://docs.panther.com/data-onboarding/supported-logs/sophos\",motionChild:!0,nodeId:\"SyBeQVkaI\",openInNewTab:!0,scopeId:\"contentManagement\",smoothScroll:!1,children:/*#__PURE__*/e(n.a,{children:\"view our Sophos documentation here\"})}),\".\"]}),/*#__PURE__*/e(\"h3\",{children:\"Parsing, Normalizing, & Analyzing\"}),/*#__PURE__*/e(\"p\",{children:\"As Panther ingests Sophos audit logs, they are parsed, normalized, and stored in a Snowflake security data lake. This allows security teams to write detections, identify anomalies, and conduct investigations on logs in the context of days, weeks, or months of data.\"}),/*#__PURE__*/o(\"p\",{children:[\"Panther applies normalization fields to all log records, which standardizes names for attributes and allows you to correlate data across all log sources - not just Sophos. You can use Panther's various search tools - such as Data Explorer, Indicator Search, and Query Builder - to investigate your normalized logs for suspicious activity or vulnerabilities. For more on querying and searching normalized log data in Panther, \",/*#__PURE__*/e(t,{href:\"https://docs.panther.com/data-analytics\",motionChild:!0,nodeId:\"SyBeQVkaI\",openInNewTab:!0,scopeId:\"contentManagement\",smoothScroll:!1,children:/*#__PURE__*/e(n.a,{children:\"check out our documentation on Investigations & Search\"})}),\".\"]}),/*#__PURE__*/e(\"h3\",{children:\"Detection as Code\"}),/*#__PURE__*/e(\"p\",{children:\"With Panther, your team won't be confined to restrictive detection rules as seen in most legacy SIEMs. Panther is architected around detection-as-code principles, giving you the ability to write Python to define detection logic and to integrate external systems like version control and CI/CD pipelines into your detection engineering processes. This results in powerful, flexible, and reusable scripting of detection logic for your security team.\"}),/*#__PURE__*/e(\"h3\",{children:\"Configuring Alerts\"}),/*#__PURE__*/o(\"p\",{children:[\"Panther generates alerts when your detection rules or policies for Sophos are triggered, and integrates with a variety of \",/*#__PURE__*/e(t,{href:\"https://panther.com/integrations/alerts/\",motionChild:!0,nodeId:\"SyBeQVkaI\",openInNewTab:!1,scopeId:\"contentManagement\",smoothScroll:!1,children:/*#__PURE__*/e(n.a,{children:\" alert destinations \"})}),\" to allow for easy access and management of alerts for your security team. Alerts can also be sent to alert context or SOAR platforms for more remediation options.\"]}),/*#__PURE__*/e(\"p\",{children:\"Alerts are grouped into five different severity levels: Info, Low, Medium, High, and Critical. Security teams have the options to dynamically assign severity based on specific log event attributes.\"}),/*#__PURE__*/e(\"h3\",{children:\"Customer Support\"}),/*#__PURE__*/e(\"p\",{children:\"If you have any questions about configuring or monitoring Sophos logs in Panther, we're here to help. All customers have access to our technical support team via a dedicated Slack channel, email, or in-app messenger.\"}),/*#__PURE__*/o(\"p\",{children:[\"You can view our \",/*#__PURE__*/e(t,{href:\"https://docs.panther.com/data-onboarding/supported-logs/sophos\",motionChild:!0,nodeId:\"SyBeQVkaI\",openInNewTab:!0,scopeId:\"contentManagement\",smoothScroll:!1,children:/*#__PURE__*/e(n.a,{children:\"detailed documentation on configuring and monitoring Sophos logs here\"})}),\", or customers can join \",/*#__PURE__*/e(t,{href:\"https://pnthr.io/community\",motionChild:!0,nodeId:\"SyBeQVkaI\",openInNewTab:!0,scopeId:\"contentManagement\",smoothScroll:!1,children:/*#__PURE__*/e(n.a,{children:\"the Panther Community\"})}),\" to share best practices or custom detections for monitoring Sophos.\"]}),/*#__PURE__*/e(\"h3\",{children:\"The Ideal SIEM Integration for Sophos\"}),/*#__PURE__*/e(\"p\",{children:\"With Panther, you don't have to accept limitations with SIEM detections, waste time and effort on operational overhead, or pay skyrocketing costs to keep up with the growth of cloud app data.\"}),/*#__PURE__*/o(\"p\",{children:[\"Panther is a cloud-native SIEM built for security operations at scale, offering powerful detection-as-code, intuitive security workflows, and actionable real-time alerts to keep up with the needs of today's security teams. For a powerful, practical, and scalable SIEM platform for Sophos, \",/*#__PURE__*/e(t,{href:\"https://panther.com/product/request-a-demo/\",motionChild:!0,nodeId:\"SyBeQVkaI\",openInNewTab:!1,scopeId:\"contentManagement\",smoothScroll:!1,children:/*#__PURE__*/e(n.a,{children:\" request a demo today\"})}),\".\"]})]});export const richText18=/*#__PURE__*/o(i.Fragment,{children:[/*#__PURE__*/e(\"p\",{children:\"Kickoff automations and customize your incident response workflows using Panther's Custom Webhook alert destination. With Custom Webhooks, you can send your Panther alert data to any third-party application that accepts a JSON payload.\"}),/*#__PURE__*/e(\"h4\",{children:\"How it Works\"}),/*#__PURE__*/e(\"p\",{children:\"The integration is simple and fast:\"}),/*#__PURE__*/o(\"ul\",{children:[/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/e(\"p\",{children:\"Configure a custom webhook in Panther to send your alerts to a third-party service that accepts an HTTP POST request containing a JSON payload\"})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/e(\"p\",{children:\"Trigger alerts based on issue severity, or configure specific detections to use this as an alert destination\"})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/e(\"p\",{children:\"Sit back and monitor your activity!\"})})]}),/*#__PURE__*/o(\"p\",{children:[\"Learn \",/*#__PURE__*/e(t,{href:\"https://docs.panther.com/destinations/custom_webhook\",motionChild:!0,nodeId:\"SyBeQVkaI\",openInNewTab:!1,scopeId:\"contentManagement\",smoothScroll:!1,children:/*#__PURE__*/e(n.a,{children:\"how to send \"})}),\"Panther alerts to third-party services using custom Webhooks.\"]})]});export const richText19=/*#__PURE__*/o(i.Fragment,{children:[/*#__PURE__*/e(\"h3\",{children:\"Integration Overview\"}),/*#__PURE__*/e(\"p\",{children:\"Fastly is an edge cloud platform that provides organizations with CDN, image optimization, video and streaming, cloud security, and load balancing services. Panther can collect, normalize, and monitor Fastly logs to help you identify suspicious activity in real time. Your normalized data is then retained to power future security investigations in a data lake powered by Snowflake.\"}),/*#__PURE__*/e(\"h3\",{children:\"Use Cases for Fastly Logs\"}),/*#__PURE__*/e(\"p\",{children:\"Fastly access logs contain information for each request made by a client, handled by the Fastly CDN. This includes the files that are accessed, how your service responded to a request, what browser a client is using, the IP address of clients, and more. Common SIEM use cases for Fastly logs include:\"}),/*#__PURE__*/o(\"ul\",{children:[/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/e(\"p\",{children:\"Tracking user behavior and identifying patterns of suspicious activity\"})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/e(\"p\",{children:\"Detecting bot traffic or spotting anomalies in user patterns\"})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/e(\"p\",{children:\"Monitoring for activity that might indicate a DDoS attack\"})})]}),/*#__PURE__*/e(\"h3\",{children:\"Onboarding Fastly Logs in Panther\"}),/*#__PURE__*/e(\"p\",{children:\"Panther's integration for Fastly is fast and easy to configure via the Fastly API. Simply select Fastly from the list of log sources in the Panther console, create an Admin API application in the Fastly Admin Panel, and submit your API key and credentials in the Panther setup menu.\"}),/*#__PURE__*/o(\"p\",{children:[\"For more details on onboarding Fastly logs or for supported log schema, you can \",/*#__PURE__*/e(t,{href:\"https://docs.panther.com/data-onboarding/supported-logs/fastly\",motionChild:!0,nodeId:\"SyBeQVkaI\",openInNewTab:!0,scopeId:\"contentManagement\",smoothScroll:!1,children:/*#__PURE__*/e(n.a,{children:\"view our Fastly documentation here\"})}),\".\"]}),/*#__PURE__*/e(\"h3\",{children:\"Parsing, Normalizing, & Analyzing Fastly Logs\"}),/*#__PURE__*/e(\"p\",{children:\"As Panther ingests Fastly logs, they are parsed, normalized, and stored in a Snowflake security data lake. This allows you to build detections, identify anomalies, and conduct investigations in the context of days, weeks, or months of data.\"}),/*#__PURE__*/o(\"p\",{children:[\"Panther applies normalization fields to all log records, which standardizes names for attributes and empowers users to correlate data across all of your log sources - not just Fastly. Panther's various search tools - such as Query Builder, Data Explorer, and Indicator Search - allow you to conduct investigations for suspicious activity or vulnerabilities. For more information on searching logs, \",/*#__PURE__*/e(t,{href:\"https://docs.panther.com/data-analytics\",motionChild:!0,nodeId:\"SyBeQVkaI\",openInNewTab:!0,scopeId:\"contentManagement\",smoothScroll:!1,children:/*#__PURE__*/e(n.a,{children:\"check out our documentation on Investigations & Search\"})}),\".\"]}),/*#__PURE__*/e(\"h3\",{children:\"Built-in and Easily Customizable Detections\"}),/*#__PURE__*/o(\"p\",{children:[\"Pre-built detections for Fastly are available by default in Panther, offering users immediate value for monitoring common IoCs and threats. You can \",/*#__PURE__*/e(t,{href:\"https://panther.com/product/detection-coverage/#filter=fastly\",motionChild:!0,nodeId:\"SyBeQVkaI\",openInNewTab:!1,scopeId:\"contentManagement\",smoothScroll:!1,children:/*#__PURE__*/e(n.a,{children:\" explore our built-in detection coverage for Fastly logs here\"})}),\".\"]}),/*#__PURE__*/e(\"p\",{children:\"With Panther, you aren't confined to restrictive detections as seen in many SIEM solutions. Panther is architected around detection-as-code principles, giving you the ability to write Python to define detection logic and to integrate external systems like version control and CI/CD pipelines into your detection engineering processes. This results in powerful, flexible, and reusable scripting of detections for your security team.\"}),/*#__PURE__*/e(\"h3\",{children:\"Configuring Alerts\"}),/*#__PURE__*/o(\"p\",{children:[\"Panther generates alerts when your detection rules or policies for Fastly are triggered, and integrates with a variety of \",/*#__PURE__*/e(t,{href:\"https://panther.com/integrations/alerts/\",motionChild:!0,nodeId:\"SyBeQVkaI\",openInNewTab:!1,scopeId:\"contentManagement\",smoothScroll:!1,children:/*#__PURE__*/e(n.a,{children:\"alert destinations\"})}),\" to allow for intuitive management of any alerts. Alerts can also be sent to alert context or SOAR platforms for more remediation options.\"]}),/*#__PURE__*/e(\"p\",{children:\"Alerts are categorized within five severity levels: Info, Low, Medium, High, and Critical. Your security team has the ability to dynamically assign severity based on specific log event attributes.\"}),/*#__PURE__*/e(\"h3\",{children:\"Customer Support\"}),/*#__PURE__*/e(\"p\",{children:\"If you have any questions about configuring or monitoring Fastly logs in Panther, our customer support team is here to help. All customers have access to support via a dedicated Slack channel, email, or in-app messenger.\"}),/*#__PURE__*/o(\"p\",{children:[\"You can view our \",/*#__PURE__*/e(t,{href:\"https://docs.panther.com/data-onboarding/supported-logs/fastly\",motionChild:!0,nodeId:\"SyBeQVkaI\",openInNewTab:!0,scopeId:\"contentManagement\",smoothScroll:!1,children:/*#__PURE__*/e(n.a,{children:\"documentation on configuring Fastly logs here\"})}),\", or customers can sign up for \",/*#__PURE__*/e(t,{href:\"https://pnthr.io/community\",motionChild:!0,nodeId:\"SyBeQVkaI\",openInNewTab:!0,scopeId:\"contentManagement\",smoothScroll:!1,children:/*#__PURE__*/e(n.a,{children:\"the Panther Community\"})}),\" to share best practices or custom detections.\"]}),/*#__PURE__*/e(\"h3\",{children:\"Replacing Traditional SIEM for Fastly\"}),/*#__PURE__*/e(\"p\",{children:\"With Panther, your team doesn't have to waste time and resources on operational overhead, pay excessive costs to keep up with the growth of cloud app data or struggle with limited detection logic. Panther was founded by a team of security engineers who struggled with other SIEM solutions first-hand, and built an intuitive, cloud-native platform to solve them.\"}),/*#__PURE__*/o(\"p\",{children:[\"Panther is a cloud-native SIEM built for security operations at scale, offering powerful detection-as-code, intuitive security workflows, and actionable real-time alerts. If you're searching for an ideal SIEM solution for Fastly, \",/*#__PURE__*/e(t,{href:\"https://panther.com/product/request-a-demo/\",motionChild:!0,nodeId:\"SyBeQVkaI\",openInNewTab:!1,scopeId:\"contentManagement\",smoothScroll:!1,children:/*#__PURE__*/e(n.a,{children:\" request a demo today\"})}),\".\"]})]});export const richText20=/*#__PURE__*/o(i.Fragment,{children:[/*#__PURE__*/e(\"h3\",{children:\"Integration Overview\"}),/*#__PURE__*/e(\"p\",{children:\"Cloudflare is a global network of servers and provides reverse proxy services to improve the security, performance, and reliability of an organization's web traffic. Panther can collect, normalize, and monitor Cloudflare logs to help you identify suspicious activity in real time. Your normalized data is then retained to power future security investigations in a data lake powered by the cloud-native data platform, Snowflake.\"}),/*#__PURE__*/e(\"h3\",{children:\"Use Cases for Cloudflare Logs\"}),/*#__PURE__*/e(\"p\",{children:\"Panther supports multiple Cloudflare log types, including audit, HTTP request, firewall, and Spectrum logs. Some common SIEM use cases for these log types include:\"}),/*#__PURE__*/o(\"ul\",{children:[/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/e(\"p\",{children:\"Monitoring for malicious or blocked IP activity\"})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/e(\"p\",{children:\"Detecting high volumes of likely automated HTTP requests\"})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/e(\"p\",{children:\"Tracking and analyzing user behaviors such as visits or logins\"})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/e(\"p\",{children:\"Troubleshooting server failures and redirects in your code\"})})]}),/*#__PURE__*/e(\"h3\",{children:\"Onboarding Cloudflare Logs in Panther\"}),/*#__PURE__*/e(\"p\",{children:\"Panther's integration for Cloudflare is simple to configure, allowing you to onboard logs in just a few minutes. Simply select Cloudflare from the list of log sources in the Panther console, create an AWS S3 bucket for Cloudflare logs, and configure Cloudflare's Logpush service to stream logs to the S3 bucket.\"}),/*#__PURE__*/o(\"p\",{children:[\"For more details on onboarding Cloudflare logs or for supported log schema, you can \",/*#__PURE__*/e(t,{href:\"https://docs.panther.com/data-onboarding/supported-logs/cloudflare\",motionChild:!0,nodeId:\"SyBeQVkaI\",openInNewTab:!0,scopeId:\"contentManagement\",smoothScroll:!1,children:/*#__PURE__*/e(n.a,{children:\"view our Cloudflare documentation here\"})}),\".\"]}),/*#__PURE__*/e(\"h3\",{children:\"Parsing, Normalizing, & Analyzing\"}),/*#__PURE__*/e(\"p\",{children:\"As Panther ingests Cloudflare logs, they are parsed, normalized, and stored in a Snowflake security data lake. This allows you to write detections, identify anomalies, and conduct investigations in the context of days, weeks, or months of data.\"}),/*#__PURE__*/o(\"p\",{children:[\"Panther applies normalization fields to all log records, which standardizes names for attributes and empowers users to correlate data across all of your log sources - not just Cloudflare. You can then use Panther's various search tools - such as Query Builder, Data Explorer, and Indicator Search - to investigate your normalized logs for suspicious activity or vulnerabilities. For more information on searching logs, \",/*#__PURE__*/e(t,{href:\"https://docs.panther.com/data-analytics\",motionChild:!0,nodeId:\"SyBeQVkaI\",openInNewTab:!0,scopeId:\"contentManagement\",smoothScroll:!1,children:/*#__PURE__*/e(n.a,{children:\"check out our documentation on Investigations & Search\"})}),\".\"]}),/*#__PURE__*/e(\"h3\",{children:\"Built-in and Easily Customizable Detections\"}),/*#__PURE__*/o(\"p\",{children:[\"A number of pre-built detections for Cloudflare are available by default in Panther, offering users immediate value for monitoring common IoCs and threats. You can \",/*#__PURE__*/e(t,{href:\"https://panther.com/product/detection-coverage/#filter=cloudflare\",motionChild:!0,nodeId:\"SyBeQVkaI\",openInNewTab:!1,scopeId:\"contentManagement\",smoothScroll:!1,children:/*#__PURE__*/e(n.a,{children:\" explore our built-in detection coverage for Cloudflare logs here\"})}),\".\"]}),/*#__PURE__*/e(\"p\",{children:\"With Panther, you aren't confined to restrictive detections as seen in many SIEM solutions. Panther is architected around detection-as-code principles, giving you the ability to write Python to define detection logic and to integrate external systems like version control and CI/CD pipelines into your detection engineering processes. This results in powerful, flexible, and reusable scripting of detections for your security team.\"}),/*#__PURE__*/e(\"h3\",{children:\"Configuring Alerts\"}),/*#__PURE__*/o(\"p\",{children:[\"Panther generates alerts when your detection rules or policies for Cloudflare are triggered, and integrates with a variety of \",/*#__PURE__*/e(t,{href:\"https://panther.com/integrations/alerts/\",motionChild:!0,nodeId:\"SyBeQVkaI\",openInNewTab:!1,scopeId:\"contentManagement\",smoothScroll:!1,children:/*#__PURE__*/e(n.a,{children:\"alert destinations\"})}),\" to allow for intuitive management of any alerts. Alerts can also be sent to alert context or SOAR platforms for more remediation options.\"]}),/*#__PURE__*/e(\"p\",{children:\"Alerts are categorized by five different severity levels: Info, Low, Medium, High, and Critical. Your security team has the ability to dynamically assign severity based on specific log event attributes.\"}),/*#__PURE__*/e(\"h3\",{children:\"Customer Support\"}),/*#__PURE__*/e(\"p\",{children:\"If you have any questions about configuring or monitoring Cloudflare logs in Panther, our customer support team is here to help. All customers have access to support via a dedicated Slack channel, email, or in-app messenger.\"}),/*#__PURE__*/o(\"p\",{children:[\"You can view our \",/*#__PURE__*/e(t,{href:\"https://docs.panther.com/data-onboarding/supported-logs/cloudflare\",motionChild:!0,nodeId:\"SyBeQVkaI\",openInNewTab:!0,scopeId:\"contentManagement\",smoothScroll:!1,children:/*#__PURE__*/e(n.a,{children:\"documentation on configuring and monitoring Cloudflare logs here\"})}),\", or customers can sign up for \",/*#__PURE__*/e(t,{href:\"https://pnthr.io/community\",motionChild:!0,nodeId:\"SyBeQVkaI\",openInNewTab:!0,scopeId:\"contentManagement\",smoothScroll:!1,children:/*#__PURE__*/e(n.a,{children:\"the Panther Community\"})}),\" to share best practices or custom detections for Cloudflare logs.\"]}),/*#__PURE__*/e(\"h3\",{children:\"The Ideal SIEM Integration for Cloudflare\"}),/*#__PURE__*/e(\"p\",{children:\"With Panther, your team doesn't have to pay excessive costs to keep up with the growth of cloud security data, struggle with restrictive detection logic, or waste time and resources on operational overhead. Panther was founded by a team of security engineers who struggled with other SIEM solutions first-hand, and built an intuitive, cloud-native platform to solve them.\"}),/*#__PURE__*/o(\"p\",{children:[\"Panther is a cloud-native SIEM built for security operations at scale, offering flexible detection-as-code, intuitive security workflows, and actionable real-time alerts. If you're searching for a seamless SIEM platform for Cloudflare, \",/*#__PURE__*/e(t,{href:\"https://panther.com/product/request-a-demo/\",motionChild:!0,nodeId:\"SyBeQVkaI\",openInNewTab:!1,scopeId:\"contentManagement\",smoothScroll:!1,children:/*#__PURE__*/e(n.a,{children:\" request a demo today\"})}),\".\"]})]});export const richText21=/*#__PURE__*/o(i.Fragment,{children:[/*#__PURE__*/e(\"h3\",{children:\"Integration Overview\"}),/*#__PURE__*/e(\"p\",{children:\"CrowdStrike is a SaaS protection platform for endpoint security and threat intelligence. Panther can collect, normalize, and monitor CrowdStrike logs to help you identify suspicious activity in real time. Your normalized data is then retained to power future security investigations in a data lake powered by the cloud-native data platform, Snowflake.\"}),/*#__PURE__*/e(\"h3\",{children:\"Use Cases for CrowdStrike Logs\"}),/*#__PURE__*/e(\"p\",{children:\"Panther supports ingestion and monitoring of CrowdStrike FDREvent logs along with more than a dozen legacy log types. Some common SIEM use cases for CrowdStrike logs include:\"}),/*#__PURE__*/o(\"ul\",{children:[/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/e(\"p\",{children:\"Monitoring endpoint processes for suspicious activity such as credential dumping or syslog tampering\"})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/e(\"p\",{children:\"Identifying any logins or authentication events from unmanaged devices\"})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/e(\"p\",{children:\"Tracking suspicious connections and DNS lookups\"})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/e(\"p\",{children:\"Detecting large zip file creation and exfiltration attempts\"})})]}),/*#__PURE__*/e(\"h3\",{children:\"Onboarding CrowdStrike Logs in Panther\"}),/*#__PURE__*/e(\"p\",{children:\"Panther's SIEM integration for CrowdStrike is simple to configure by integrating with the CrowdStrike Falcon Data Replication (FDR). Simply select CrowdStrike from the list of log sources in the Panther console, create an API Key and credentials in CrowdStrike FDR, and submit your credentials into the Panther setup menu.\"}),/*#__PURE__*/o(\"p\",{children:[\"For more details on onboarding CrowdStrike logs or for supported log schema, you can \",/*#__PURE__*/e(t,{href:\"https://docs.panther.com/data-onboarding/supported-logs/crowdstrike\",motionChild:!0,nodeId:\"SyBeQVkaI\",openInNewTab:!0,scopeId:\"contentManagement\",smoothScroll:!1,children:/*#__PURE__*/e(n.a,{children:\"view our CrowdStrike documentation here\"})}),\".\"]}),/*#__PURE__*/e(\"h3\",{children:\"Parsing, Normalizing, & Analyzing Logs\"}),/*#__PURE__*/e(\"p\",{children:\"As Panther ingests CrowdStrike logs, they are parsed, normalized, and stored in a Snowflake security data lake. This allows you to write detections, identify anomalies, and conduct investigations in the context of days, weeks, or months of data.\"}),/*#__PURE__*/o(\"p\",{children:[\"Panther applies normalization fields to all log records, which standardizes names for attributes and empowers users to correlate data across all of your log sources. Panther's various search tools - such as Query Builder, Data Explorer, and Indicator Search - allow you to investigate your normalized logs for suspicious activity or vulnerabilities. For more information on searching logs, \",/*#__PURE__*/e(t,{href:\"https://docs.panther.com/data-analytics\",motionChild:!0,nodeId:\"SyBeQVkaI\",openInNewTab:!0,scopeId:\"contentManagement\",smoothScroll:!1,children:/*#__PURE__*/e(n.a,{children:\"check out our documentation on Investigations & Search\"})}),\".\"]}),/*#__PURE__*/e(\"h3\",{children:\"Built-in and Easily Customizable Detections\"}),/*#__PURE__*/o(\"p\",{children:[\"A number of pre-built detections for CrowdStrike are available by default in Panther, offering users immediate value for monitoring common IoCs and threats. You can \",/*#__PURE__*/e(t,{href:\"https://panther.com/product/detection-coverage/#filter=crowdstrike\",motionChild:!0,nodeId:\"SyBeQVkaI\",openInNewTab:!1,scopeId:\"contentManagement\",smoothScroll:!1,children:/*#__PURE__*/e(n.a,{children:\" explore our built-in detection coverage for CrowdStrike logs here\"})}),\".\"]}),/*#__PURE__*/e(\"p\",{children:\"With Panther, you aren't confined to restrictive detections as seen in many SIEM solutions. Panther is architected around detection-as-code principles, giving you the ability to write Python to define detection logic and to integrate external systems like version control and CI/CD pipelines into your detection engineering processes. This results in powerful, scalable, and reusable scripting of detections for your security team.\"}),/*#__PURE__*/e(\"h3\",{children:\"Configuring Alerts\"}),/*#__PURE__*/o(\"p\",{children:[\"Panther generates alerts when your detection rules or policies for CrowdStrike are triggered, and integrates with a variety of \",/*#__PURE__*/e(t,{href:\"https://panther.com/integrations/alerts/\",motionChild:!0,nodeId:\"SyBeQVkaI\",openInNewTab:!1,scopeId:\"contentManagement\",smoothScroll:!1,children:/*#__PURE__*/e(n.a,{children:\" alert destinations\"})}),\" to allow for intuitive management of any alerts. Alerts can also be sent to alert context or SOAR platforms for more remediation options.\"]}),/*#__PURE__*/e(\"p\",{children:\"Alerts are categorized by five different severity levels: Info, Low, Medium, High, and Critical. Your security team has the ability to dynamically assign severity based on specific log event attributes.\"}),/*#__PURE__*/e(\"h3\",{children:\"Customer Support\"}),/*#__PURE__*/e(\"p\",{children:\"If you have any questions about configuring or monitoring CrowdStrike logs in Panther, our customer support team is here to help. All customers have access to support via a dedicated Slack channel, email, or in-app messenger.\"}),/*#__PURE__*/o(\"p\",{children:[\"You can view our \",/*#__PURE__*/e(t,{href:\"https://docs.panther.com/data-onboarding/supported-logs/crowdstrike\",motionChild:!0,nodeId:\"SyBeQVkaI\",openInNewTab:!0,scopeId:\"contentManagement\",smoothScroll:!1,children:/*#__PURE__*/e(n.a,{children:\"documentation on configuring and monitoring CrowdStrike logs here\"})}),\", or customers can sign up for \",/*#__PURE__*/e(t,{href:\"https://pnthr.io/community\",motionChild:!0,nodeId:\"SyBeQVkaI\",openInNewTab:!0,scopeId:\"contentManagement\",smoothScroll:!1,children:/*#__PURE__*/e(n.a,{children:\"the Panther Community\"})}),\" to share best practices or custom detections for CrowdStrike logs.\"]}),/*#__PURE__*/e(\"h3\",{children:\"The Ideal SIEM for CrowdStrike\"}),/*#__PURE__*/e(\"p\",{children:\"With Panther, your team doesn't have to waste time and resources on operational overhead, pay excessive costs to keep up with the growth of cloud app data or struggle with restrictive detection logic. Panther was founded by a team of security engineers who struggled with other SIEM solutions first-hand, and built an intuitive, cloud-native platform to solve them.\"}),/*#__PURE__*/o(\"p\",{children:[\"Panther is a cloud-native SIEM built for security operations at scale, offering flexible detection-as-code, intuitive security workflows, and actionable real-time alerts. If you're searching for a seamless SIEM platform for CrowdStrike, \",/*#__PURE__*/e(t,{href:\"https://panther.com/product/request-a-demo/\",motionChild:!0,nodeId:\"SyBeQVkaI\",openInNewTab:!1,scopeId:\"contentManagement\",smoothScroll:!1,children:/*#__PURE__*/e(n.a,{children:\"request a demo today\"})}),\".\"]})]});export const richText22=/*#__PURE__*/o(i.Fragment,{children:[/*#__PURE__*/e(\"p\",{children:\"Continuously audit and monitor EC2 Instance configurations and enforce security compliance as code with Panther.\"}),/*#__PURE__*/e(\"p\",{children:\"Amazon EC2 provides different instance types to enable you to choose the CPU, memory, storage, and networking capacity that you need to run your applications. Use Panther to track real-time changes to your EC2 instances to ensure configurations meet your business requirements for security and compliance.\"}),/*#__PURE__*/o(\"p\",{children:[\"Monitoring EC2 is critical for understanding the history of EC2 metrics changes and detecting suspicious activity. Use Panther's built in policies for \",/*#__PURE__*/e(t,{href:\"https://github.com/panther-labs/panther-analysis/tree/master/policies/aws_ec2_policies\",motionChild:!0,nodeId:\"SyBeQVkaI\",openInNewTab:!0,scopeId:\"contentManagement\",smoothScroll:!1,children:/*#__PURE__*/e(n.a,{children:\"continuous monitoring of EC2 instances\"})}),\", or write your own detections in Python to fit your internal business use cases.\"]}),/*#__PURE__*/e(\"h4\",{children:\"Use Cases\"}),/*#__PURE__*/e(\"p\",{children:\"Common security use cases for EC2 Instance with Panther include:\"}),/*#__PURE__*/o(\"ul\",{children:[/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/e(\"p\",{children:\"Check if given EC2 Instance is running in an approved VPC\"})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/e(\"p\",{children:\"Check if an EC2 Instance is running with an approved tenancy option - dedicated, host, and default.\"})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/e(\"p\",{children:\"Ensure that an EC2 instance is running on one of the approved instance types.\"})})]}),/*#__PURE__*/e(\"h4\",{children:\"How it Works\"}),/*#__PURE__*/e(\"p\",{children:\"The integration is simple and fast:\"}),/*#__PURE__*/o(\"ul\",{children:[/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/e(\"p\",{children:\"Connect your AWS account to Panther\"})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/e(\"p\",{children:\"A baseline scan is performed to identify all existing EC2 Instances enabled in your AWS account(s)\"})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/e(\"p\",{children:\"Built-in detections identify security issues\"})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/e(\"p\",{children:\"Alerts will be sent if non-compliant security group exists\"})})]}),/*#__PURE__*/o(\"p\",{children:[\"Use Panther to search all EC2 Instances in an AWS account by name, view their compliance status, associated policies, and configured remediations. Learn more about using Panther to \",/*#__PURE__*/e(t,{href:\"https://panther.com/integrations/aws/\",motionChild:!0,nodeId:\"SyBeQVkaI\",openInNewTab:!1,scopeId:\"contentManagement\",smoothScroll:!1,children:/*#__PURE__*/e(n.a,{children:\"analyze your AWS logs for security insights\"})}),\".\"]})]});export const richText23=/*#__PURE__*/o(i.Fragment,{children:[/*#__PURE__*/e(\"p\",{children:\"Continuously audit and monitor EC2 AMI configurations and enforce security compliance as code with Panther.\"}),/*#__PURE__*/e(\"p\",{children:\"Amazon Machine Image (AMI) provides the information required to launch an EC2 instance. You must specify an AMI when you launch an instance. Use Panther to track real-time changes to your AMI instances to ensure configurations meet your business requirements for security and compliance.\"}),/*#__PURE__*/o(\"p\",{children:[\"Monitoring AMI is critical to check which AWS accounts can use AMI to launch instances. Use Panther's built in policies for \",/*#__PURE__*/e(t,{href:\"https://github.com/panther-labs/panther-analysis/tree/master/policies/aws_ec2_policies\",motionChild:!0,nodeId:\"SyBeQVkaI\",openInNewTab:!0,scopeId:\"contentManagement\",smoothScroll:!1,children:/*#__PURE__*/e(n.a,{children:\"continuous monitoring of AMI instances\"})}),\", or write your own detections in Python to fit your internal business use cases.\"]}),/*#__PURE__*/e(\"h4\",{children:\"Use Cases\"}),/*#__PURE__*/e(\"p\",{children:\"Common security use cases for EC2 AMI with Panther include:\"}),/*#__PURE__*/o(\"ul\",{children:[/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/e(\"p\",{children:\"Check if AWS EC2 AMI's are launched only on approved dedicated hosts\"})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/e(\"p\",{children:\"Ensures that the EC2 instance was launched with a tenancy approved for its AMI\"})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/e(\"p\",{children:\"Ensure that EC2 instance is running with an instance type approved for its AMI\"})})]}),/*#__PURE__*/e(\"h4\",{children:\"How it Works\"}),/*#__PURE__*/e(\"p\",{children:\"The integration is simple and fast:\"}),/*#__PURE__*/o(\"ul\",{children:[/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/e(\"p\",{children:\"Connect your AWS account to Panther\"})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/e(\"p\",{children:\"A baseline scan is performed to identify all existing AMI in your AWS account(s)\"})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/e(\"p\",{children:\"Built-in detections identify security issues\"})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/e(\"p\",{children:\"Alerts will be sent if non-compliant security group exists\"})})]}),/*#__PURE__*/o(\"p\",{children:[\"Use Panther to search all AMI in an AWS account by name, view their compliance status, associated policies, and configured remediations. Learn more about using Panther to \",/*#__PURE__*/e(t,{href:\"https://panther.com/integrations/aws/\",motionChild:!0,nodeId:\"SyBeQVkaI\",openInNewTab:!1,scopeId:\"contentManagement\",smoothScroll:!1,children:/*#__PURE__*/e(n.a,{children:\"analyze your AWS logs for security insights\"})}),\".\"]})]});\nexport const __FramerMetadata__ = {\"exports\":{\"richText\":{\"type\":\"variable\",\"annotations\":{\"framerContractVersion\":\"1\"}},\"richText3\":{\"type\":\"variable\",\"annotations\":{\"framerContractVersion\":\"1\"}},\"richText11\":{\"type\":\"variable\",\"annotations\":{\"framerContractVersion\":\"1\"}},\"richText23\":{\"type\":\"variable\",\"annotations\":{\"framerContractVersion\":\"1\"}},\"richText9\":{\"type\":\"variable\",\"annotations\":{\"framerContractVersion\":\"1\"}},\"richText8\":{\"type\":\"variable\",\"annotations\":{\"framerContractVersion\":\"1\"}},\"richText19\":{\"type\":\"variable\",\"annotations\":{\"framerContractVersion\":\"1\"}},\"richText21\":{\"type\":\"variable\",\"annotations\":{\"framerContractVersion\":\"1\"}},\"richText22\":{\"type\":\"variable\",\"annotations\":{\"framerContractVersion\":\"1\"}},\"richText13\":{\"type\":\"variable\",\"annotations\":{\"framerContractVersion\":\"1\"}},\"richText6\":{\"type\":\"variable\",\"annotations\":{\"framerContractVersion\":\"1\"}},\"richText2\":{\"type\":\"variable\",\"annotations\":{\"framerContractVersion\":\"1\"}},\"richText7\":{\"type\":\"variable\",\"annotations\":{\"framerContractVersion\":\"1\"}},\"richText5\":{\"type\":\"variable\",\"annotations\":{\"framerContractVersion\":\"1\"}},\"richText1\":{\"type\":\"variable\",\"annotations\":{\"framerContractVersion\":\"1\"}},\"richText17\":{\"type\":\"variable\",\"annotations\":{\"framerContractVersion\":\"1\"}},\"richText16\":{\"type\":\"variable\",\"annotations\":{\"framerContractVersion\":\"1\"}},\"richText20\":{\"type\":\"variable\",\"annotations\":{\"framerContractVersion\":\"1\"}},\"richText10\":{\"type\":\"variable\",\"annotations\":{\"framerContractVersion\":\"1\"}},\"richText14\":{\"type\":\"variable\",\"annotations\":{\"framerContractVersion\":\"1\"}},\"richText4\":{\"type\":\"variable\",\"annotations\":{\"framerContractVersion\":\"1\"}},\"richText12\":{\"type\":\"variable\",\"annotations\":{\"framerContractVersion\":\"1\"}},\"richText15\":{\"type\":\"variable\",\"annotations\":{\"framerContractVersion\":\"1\"}},\"richText18\":{\"type\":\"variable\",\"annotations\":{\"framerContractVersion\":\"1\"}},\"__FramerMetadata__\":{\"type\":\"variable\"}}}"],
  "mappings": "+LAAsJ,IAAMA,EAAsBC,EAAIC,EAAS,CAAC,SAAS,CAAcC,EAAE,KAAK,CAAC,SAAS,sBAAsB,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,mZAAmZ,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,gCAAgC,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,4JAA4J,CAAC,EAAeF,EAAE,KAAK,CAAC,SAAS,CAAcE,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBA,EAAE,IAAI,CAAC,SAAS,sEAAsE,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBA,EAAE,IAAI,CAAC,SAAS,4FAA4F,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBA,EAAE,IAAI,CAAC,SAAS,iFAAiF,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBA,EAAE,IAAI,CAAC,SAAS,2FAA2F,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,qCAAqC,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,4VAA4V,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,uNAAuN,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,CAAC,wFAAqGE,EAAEC,EAAE,CAAC,KAAK,uEAAuE,YAAY,GAAG,OAAO,YAAY,aAAa,GAAG,QAAQ,oBAAoB,aAAa,GAAG,SAAsBD,EAAEE,EAAE,EAAE,CAAC,SAAS,yCAAyC,CAAC,CAAC,CAAC,EAAE,GAAG,CAAC,CAAC,EAAeF,EAAE,KAAK,CAAC,SAAS,wCAAwC,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,gRAAgR,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,CAAC,ibAA8bE,EAAEC,EAAE,CAAC,KAAK,0CAA0C,YAAY,GAAG,OAAO,YAAY,aAAa,GAAG,QAAQ,oBAAoB,aAAa,GAAG,SAAsBD,EAAEE,EAAE,EAAE,CAAC,SAAS,wDAAwD,CAAC,CAAC,CAAC,EAAE,GAAG,CAAC,CAAC,EAAeF,EAAE,KAAK,CAAC,SAAS,mBAAmB,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,2bAA2b,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,CAAC,6IAA0JE,EAAEC,EAAE,CAAC,KAAK,qEAAqE,YAAY,GAAG,OAAO,YAAY,aAAa,GAAG,QAAQ,oBAAoB,aAAa,GAAG,SAAsBD,EAAEE,EAAE,EAAE,CAAC,SAAS,oEAAoE,CAAC,CAAC,CAAC,EAAE,GAAG,CAAC,CAAC,EAAeF,EAAE,KAAK,CAAC,SAAS,oBAAoB,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,CAAC,kHAA+HE,EAAEC,EAAE,CAAC,KAAK,2CAA2C,YAAY,GAAG,OAAO,YAAY,aAAa,GAAG,QAAQ,oBAAoB,aAAa,GAAG,SAAsBD,EAAEE,EAAE,EAAE,CAAC,SAAS,qBAAqB,CAAC,CAAC,CAAC,EAAE,qKAAqK,CAAC,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,4MAA4M,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,kBAAkB,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,+NAA+N,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,CAAC,oBAAiCE,EAAEC,EAAE,CAAC,KAAK,uEAAuE,YAAY,GAAG,OAAO,YAAY,aAAa,GAAG,QAAQ,oBAAoB,aAAa,GAAG,SAAsBD,EAAEE,EAAE,EAAE,CAAC,SAAS,4EAA4E,CAAC,CAAC,CAAC,EAAE,2BAAwCF,EAAEC,EAAE,CAAC,KAAK,6BAA6B,YAAY,GAAG,OAAO,YAAY,aAAa,GAAG,QAAQ,oBAAoB,aAAa,GAAG,SAAsBD,EAAEE,EAAE,EAAE,CAAC,SAAS,wBAAwB,CAAC,CAAC,CAAC,EAAE,2EAA2E,CAAC,CAAC,EAAeF,EAAE,KAAK,CAAC,SAAS,4CAA4C,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,oXAAoX,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,CAAC,kTAA0TE,EAAEC,EAAE,CAAC,KAAK,8CAA8C,YAAY,GAAG,OAAO,YAAY,aAAa,GAAG,QAAQ,oBAAoB,aAAa,GAAG,SAAsBD,EAAEE,EAAE,EAAE,CAAC,SAAS,sBAAsB,CAAC,CAAC,CAAC,EAAE,aAAQ,CAAC,CAAC,CAAC,CAAC,CAAC,EAAeC,EAAuBL,EAAIC,EAAS,CAAC,SAAS,CAAcC,EAAE,KAAK,CAAC,SAAS,sBAAsB,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,+XAA+X,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,kCAAkC,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,mMAAmM,CAAC,EAAeF,EAAE,KAAK,CAAC,SAAS,CAAcE,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBA,EAAE,IAAI,CAAC,SAAS,4EAA4E,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBA,EAAE,IAAI,CAAC,SAAS,6CAA6C,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBA,EAAE,IAAI,CAAC,SAAS,mCAAmC,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,0CAA0C,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,uUAAuU,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,CAAC,0FAAuGE,EAAEC,EAAE,CAAC,KAAK,kEAAkE,YAAY,GAAG,OAAO,YAAY,aAAa,GAAG,QAAQ,oBAAoB,aAAa,GAAG,SAAsBD,EAAEE,EAAE,EAAE,CAAC,SAAS,2CAA2C,CAAC,CAAC,CAAC,EAAE,GAAG,CAAC,CAAC,EAAeF,EAAE,KAAK,CAAC,SAAS,wCAAwC,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,yPAAyP,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,CAAC,qYAAkZE,EAAEC,EAAE,CAAC,KAAK,0CAA0C,YAAY,GAAG,OAAO,YAAY,aAAa,GAAG,QAAQ,oBAAoB,aAAa,GAAG,SAAsBD,EAAEE,EAAE,EAAE,CAAC,SAAS,wDAAwD,CAAC,CAAC,CAAC,EAAE,GAAG,CAAC,CAAC,EAAeF,EAAE,KAAK,CAAC,SAAS,gCAAgC,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,2aAA2a,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,oBAAoB,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,CAAC,gIAA6IE,EAAEC,EAAE,CAAC,KAAK,2CAA2C,YAAY,GAAG,OAAO,YAAY,aAAa,GAAG,QAAQ,oBAAoB,aAAa,GAAG,SAAsBD,EAAEE,EAAE,EAAE,CAAC,SAAS,qBAAqB,CAAC,CAAC,CAAC,EAAE,4FAA4F,CAAC,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,4MAA4M,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,kBAAkB,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,gPAAgP,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,CAAC,oBAAiCE,EAAEC,EAAE,CAAC,KAAK,kEAAkE,YAAY,GAAG,OAAO,YAAY,aAAa,GAAG,QAAQ,oBAAoB,aAAa,GAAG,SAAsBD,EAAEE,EAAE,EAAE,CAAC,SAAS,qEAAqE,CAAC,CAAC,CAAC,EAAE,kCAA+CF,EAAEC,EAAE,CAAC,KAAK,6BAA6B,YAAY,GAAG,OAAO,YAAY,aAAa,GAAG,QAAQ,oBAAoB,aAAa,GAAG,SAAsBD,EAAEE,EAAE,EAAE,CAAC,SAAS,uBAAuB,CAAC,CAAC,CAAC,EAAE,uEAAuE,CAAC,CAAC,EAAeF,EAAE,KAAK,CAAC,SAAS,kCAAkC,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,+WAA+W,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,CAAC,kPAA+PE,EAAEC,EAAE,CAAC,KAAK,8CAA8C,YAAY,GAAG,OAAO,YAAY,aAAa,GAAG,QAAQ,oBAAoB,aAAa,GAAG,SAAsBD,EAAEE,EAAE,EAAE,CAAC,SAAS,uBAAuB,CAAC,CAAC,CAAC,EAAE,GAAG,CAAC,CAAC,CAAC,CAAC,CAAC,EAAeE,EAAuBN,EAAIC,EAAS,CAAC,SAAS,CAAcC,EAAE,KAAK,CAAC,SAAS,sBAAsB,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,6ZAA6Z,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,oCAAoC,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,uRAAuR,CAAC,EAAeF,EAAE,KAAK,CAAC,SAAS,CAAcE,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBA,EAAE,IAAI,CAAC,SAAS,wEAAwE,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBA,EAAE,IAAI,CAAC,SAAS,uEAAuE,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBA,EAAE,IAAI,CAAC,SAAS,+EAA+E,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBA,EAAE,IAAI,CAAC,SAAS,+DAA+D,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,4CAA4C,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,8UAA8U,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,CAAC,4FAAyGE,EAAEC,EAAE,CAAC,KAAK,yEAAyE,YAAY,GAAG,OAAO,YAAY,aAAa,GAAG,QAAQ,oBAAoB,aAAa,GAAG,SAAsBD,EAAEE,EAAE,EAAE,CAAC,SAAS,6CAA6C,CAAC,CAAC,CAAC,EAAE,GAAG,CAAC,CAAC,EAAeF,EAAE,KAAK,CAAC,SAAS,wCAAwC,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,iPAAiP,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,CAAC,8XAA2YE,EAAEC,EAAE,CAAC,KAAK,0CAA0C,YAAY,GAAG,OAAO,YAAY,aAAa,GAAG,QAAQ,oBAAoB,aAAa,GAAG,SAAsBD,EAAEE,EAAE,EAAE,CAAC,SAAS,wDAAwD,CAAC,CAAC,CAAC,EAAE,GAAG,CAAC,CAAC,EAAeF,EAAE,KAAK,CAAC,SAAS,6CAA6C,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,CAAC,oKAAiLE,EAAEC,EAAE,CAAC,KAAK,wEAAwE,YAAY,GAAG,OAAO,YAAY,aAAa,GAAG,QAAQ,oBAAoB,aAAa,GAAG,SAAsBD,EAAEE,EAAE,EAAE,CAAC,SAAS,wEAAwE,CAAC,CAAC,CAAC,EAAE,GAAG,CAAC,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,2aAA2a,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,oBAAoB,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,CAAC,sIAAmJE,EAAEC,EAAE,CAAC,KAAK,2CAA2C,YAAY,GAAG,OAAO,YAAY,aAAa,GAAG,QAAQ,oBAAoB,aAAa,GAAG,SAAsBD,EAAEE,EAAE,EAAE,CAAC,SAAS,qBAAqB,CAAC,CAAC,CAAC,EAAE,4IAA4I,CAAC,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,4MAA4M,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,kBAAkB,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,uOAAuO,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,CAAC,oBAAiCE,EAAEC,EAAE,CAAC,KAAK,yEAAyE,YAAY,GAAG,OAAO,YAAY,aAAa,GAAG,QAAQ,oBAAoB,aAAa,GAAG,SAAsBD,EAAEE,EAAE,EAAE,CAAC,SAAS,uEAAuE,CAAC,CAAC,CAAC,EAAE,kCAA+CF,EAAEC,EAAE,CAAC,KAAK,6BAA6B,YAAY,GAAG,OAAO,YAAY,aAAa,GAAG,QAAQ,oBAAoB,aAAa,GAAG,SAAsBD,EAAEE,EAAE,EAAE,CAAC,SAAS,uBAAuB,CAAC,CAAC,CAAC,EAAE,yEAAyE,CAAC,CAAC,EAAeF,EAAE,KAAK,CAAC,SAAS,oCAAoC,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,+WAA+W,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,CAAC,oPAAiQE,EAAEC,EAAE,CAAC,KAAK,8CAA8C,YAAY,GAAG,OAAO,YAAY,aAAa,GAAG,QAAQ,oBAAoB,aAAa,GAAG,SAAsBD,EAAEE,EAAE,EAAE,CAAC,SAAS,uBAAuB,CAAC,CAAC,CAAC,EAAE,GAAG,CAAC,CAAC,CAAC,CAAC,CAAC,EAAeG,EAAuBP,EAAIC,EAAS,CAAC,SAAS,CAAcC,EAAE,KAAK,CAAC,SAAS,sBAAsB,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,6XAA6X,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,6BAA6B,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,oNAAoN,CAAC,EAAeF,EAAE,KAAK,CAAC,SAAS,CAAcE,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBA,EAAE,IAAI,CAAC,SAAS,kCAAkC,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBA,EAAE,IAAI,CAAC,SAAS,uEAAuE,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,gCAAgC,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,mSAAmS,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,CAAC,qFAAkGE,EAAEC,EAAE,CAAC,KAAK,kEAAkE,YAAY,GAAG,OAAO,YAAY,aAAa,GAAG,QAAQ,oBAAoB,aAAa,GAAG,SAAsBD,EAAEE,EAAE,EAAE,CAAC,SAAS,sCAAsC,CAAC,CAAC,CAAC,EAAE,GAAG,CAAC,CAAC,EAAeF,EAAE,KAAK,CAAC,SAAS,iDAAiD,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,+RAA+R,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,CAAC,8aAA2bE,EAAEC,EAAE,CAAC,KAAK,0CAA0C,YAAY,GAAG,OAAO,YAAY,aAAa,GAAG,QAAQ,oBAAoB,aAAa,GAAG,SAAsBD,EAAEE,EAAE,EAAE,CAAC,SAAS,wDAAwD,CAAC,CAAC,CAAC,EAAE,GAAG,CAAC,CAAC,EAAeF,EAAE,KAAK,CAAC,SAAS,gCAAgC,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,2aAA2a,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,oBAAoB,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,CAAC,6GAA0HE,EAAEC,EAAE,CAAC,KAAK,2CAA2C,YAAY,GAAG,OAAO,YAAY,aAAa,GAAG,QAAQ,oBAAoB,aAAa,GAAG,SAAsBD,EAAEE,EAAE,EAAE,CAAC,SAAS,qBAAqB,CAAC,CAAC,CAAC,EAAE,qKAAqK,CAAC,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,qMAAqM,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,kBAAkB,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,0NAA0N,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,CAAC,oBAAiCE,EAAEC,EAAE,CAAC,KAAK,kEAAkE,YAAY,GAAG,OAAO,YAAY,aAAa,GAAG,QAAQ,oBAAoB,aAAa,GAAG,SAAsBD,EAAEE,EAAE,EAAE,CAAC,SAAS,yEAAyE,CAAC,CAAC,CAAC,EAAE,2BAAwCF,EAAEC,EAAE,CAAC,KAAK,6BAA6B,YAAY,GAAG,OAAO,YAAY,aAAa,GAAG,QAAQ,oBAAoB,aAAa,GAAG,SAAsBD,EAAEE,EAAE,EAAE,CAAC,SAAS,uBAAuB,CAAC,CAAC,CAAC,EAAE,wEAAwE,CAAC,CAAC,EAAeF,EAAE,KAAK,CAAC,SAAS,yCAAyC,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,sXAAsX,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,CAAC,sSAAmTE,EAAEC,EAAE,CAAC,KAAK,8CAA8C,YAAY,GAAG,OAAO,YAAY,aAAa,GAAG,QAAQ,oBAAoB,aAAa,GAAG,SAAsBD,EAAEE,EAAE,EAAE,CAAC,SAAS,sBAAsB,CAAC,CAAC,CAAC,EAAE,GAAG,CAAC,CAAC,CAAC,CAAC,CAAC,EAAeI,EAAuBR,EAAIC,EAAS,CAAC,SAAS,CAAcC,EAAE,KAAK,CAAC,SAAS,sBAAsB,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,8YAA8Y,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,kCAAkC,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,qQAAqQ,CAAC,EAAeF,EAAE,KAAK,CAAC,SAAS,CAAcE,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBA,EAAE,IAAI,CAAC,SAAS,+DAA+D,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBA,EAAE,IAAI,CAAC,SAAS,2DAA2D,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBA,EAAE,IAAI,CAAC,SAAS,8CAA8C,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBA,EAAE,IAAI,CAAC,SAAS,mEAAmE,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,oCAAoC,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,gUAAgU,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,CAAC,oFAAiGE,EAAEC,EAAE,CAAC,KAAK,kEAAkE,YAAY,GAAG,OAAO,YAAY,aAAa,GAAG,QAAQ,oBAAoB,aAAa,GAAG,SAAsBD,EAAEE,EAAE,EAAE,CAAC,SAAS,qCAAqC,CAAC,CAAC,CAAC,EAAE,GAAG,CAAC,CAAC,EAAeF,EAAE,KAAK,CAAC,SAAS,wCAAwC,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,mPAAmP,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,CAAC,wUAAqVE,EAAEC,EAAE,CAAC,KAAK,0CAA0C,YAAY,GAAG,OAAO,YAAY,aAAa,GAAG,QAAQ,oBAAoB,aAAa,GAAG,SAAsBD,EAAEE,EAAE,EAAE,CAAC,SAAS,wDAAwD,CAAC,CAAC,CAAC,EAAE,GAAG,CAAC,CAAC,EAAeF,EAAE,KAAK,CAAC,SAAS,gCAAgC,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,2aAA2a,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,CAAC,yLAAsME,EAAEC,EAAE,CAAC,KAAK,iEAAiE,YAAY,GAAG,OAAO,YAAY,aAAa,GAAG,QAAQ,oBAAoB,aAAa,GAAG,SAAsBD,EAAEE,EAAE,EAAE,CAAC,SAAS,0CAA0C,CAAC,CAAC,CAAC,EAAE,GAAG,CAAC,CAAC,EAAeF,EAAE,KAAK,CAAC,SAAS,oBAAoB,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,CAAC,8HAA2IE,EAAEC,EAAE,CAAC,KAAK,2CAA2C,YAAY,GAAG,OAAO,YAAY,aAAa,GAAG,QAAQ,oBAAoB,aAAa,GAAG,SAAsBD,EAAEE,EAAE,EAAE,CAAC,SAAS,sBAAsB,CAAC,CAAC,CAAC,EAAE,4IAA4I,CAAC,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,4MAA4M,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,kBAAkB,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,+NAA+N,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,CAAC,oBAAiCE,EAAEC,EAAE,CAAC,KAAK,kEAAkE,YAAY,GAAG,OAAO,YAAY,aAAa,GAAG,QAAQ,oBAAoB,aAAa,GAAG,SAAsBD,EAAEE,EAAE,EAAE,CAAC,SAAS,+DAA+D,CAAC,CAAC,CAAC,EAAE,kCAA+CF,EAAEC,EAAE,CAAC,KAAK,6BAA6B,YAAY,GAAG,OAAO,YAAY,aAAa,GAAG,QAAQ,oBAAoB,aAAa,GAAG,SAAsBD,EAAEE,EAAE,EAAE,CAAC,SAAS,uBAAuB,CAAC,CAAC,CAAC,EAAE,iEAAiE,CAAC,CAAC,EAAeF,EAAE,KAAK,CAAC,SAAS,wCAAwC,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,yXAAoX,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,CAAC,4OAAyPE,EAAEC,EAAE,CAAC,KAAK,8CAA8C,YAAY,GAAG,OAAO,YAAY,aAAa,GAAG,QAAQ,oBAAoB,aAAa,GAAG,SAAsBD,EAAEE,EAAE,EAAE,CAAC,SAAS,uBAAuB,CAAC,CAAC,CAAC,EAAE,GAAG,CAAC,CAAC,CAAC,CAAC,CAAC,EAAeK,EAAuBT,EAAIC,EAAS,CAAC,SAAS,CAAcC,EAAE,KAAK,CAAC,SAAS,sBAAsB,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,saAAsa,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,+BAA+B,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,oNAAoN,CAAC,EAAeF,EAAE,KAAK,CAAC,SAAS,CAAcE,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBA,EAAE,IAAI,CAAC,SAAS,mBAAmB,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBA,EAAE,IAAI,CAAC,SAAS,gDAAgD,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBA,EAAE,IAAI,CAAC,SAAS,6CAA6C,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBA,EAAE,IAAI,CAAC,SAAS,yDAAyD,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBA,EAAE,IAAI,CAAC,SAAS,yBAAyB,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,iCAAiC,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,2RAA2R,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,CAAC,iFAA8FE,EAAEC,EAAE,CAAC,KAAK,oEAAoE,YAAY,GAAG,OAAO,YAAY,aAAa,GAAG,QAAQ,oBAAoB,aAAa,GAAG,SAAsBD,EAAEE,EAAE,EAAE,CAAC,SAAS,kCAAkC,CAAC,CAAC,CAAC,EAAE,GAAG,CAAC,CAAC,EAAeF,EAAE,KAAK,CAAC,SAAS,mCAAmC,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,gPAAgP,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,CAAC,oYAAiZE,EAAEC,EAAE,CAAC,KAAK,0CAA0C,YAAY,GAAG,OAAO,YAAY,aAAa,GAAG,QAAQ,oBAAoB,aAAa,GAAG,SAAsBD,EAAEE,EAAE,EAAE,CAAC,SAAS,wDAAwD,CAAC,CAAC,CAAC,EAAE,GAAG,CAAC,CAAC,EAAeF,EAAE,KAAK,CAAC,SAAS,mBAAmB,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,2aAA2a,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,CAAC,qJAAkKE,EAAEC,EAAE,CAAC,KAAK,8DAA8D,YAAY,GAAG,OAAO,YAAY,aAAa,GAAG,QAAQ,oBAAoB,aAAa,GAAG,SAAsBD,EAAEE,EAAE,EAAE,CAAC,SAAS,mEAAmE,CAAC,CAAC,CAAC,EAAE,GAAG,CAAC,CAAC,EAAeF,EAAE,KAAK,CAAC,SAAS,oBAAoB,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,CAAC,2HAAwIE,EAAEC,EAAE,CAAC,KAAK,2CAA2C,YAAY,GAAG,OAAO,YAAY,aAAa,GAAG,QAAQ,oBAAoB,aAAa,GAAG,SAAsBD,EAAEE,EAAE,EAAE,CAAC,SAAS,sBAAsB,CAAC,CAAC,CAAC,EAAE,4IAA4I,CAAC,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,4MAA4M,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,kBAAkB,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,2NAA2N,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,CAAC,oBAAiCE,EAAEC,EAAE,CAAC,KAAK,oEAAoE,YAAY,GAAG,OAAO,YAAY,aAAa,GAAG,QAAQ,oBAAoB,aAAa,GAAG,SAAsBD,EAAEE,EAAE,EAAE,CAAC,SAAS,4DAA4D,CAAC,CAAC,CAAC,EAAE,kCAA+CF,EAAEC,EAAE,CAAC,KAAK,6BAA6B,YAAY,GAAG,OAAO,YAAY,aAAa,GAAG,QAAQ,oBAAoB,aAAa,GAAG,SAAsBD,EAAEE,EAAE,EAAE,CAAC,SAAS,uBAAuB,CAAC,CAAC,CAAC,EAAE,8DAA8D,CAAC,CAAC,EAAeF,EAAE,KAAK,CAAC,SAAS,yBAAyB,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,gXAAgX,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,CAAC,8OAA2PE,EAAEC,EAAE,CAAC,KAAK,8CAA8C,YAAY,GAAG,OAAO,YAAY,aAAa,GAAG,QAAQ,oBAAoB,aAAa,GAAG,SAAsBD,EAAEE,EAAE,EAAE,CAAC,SAAS,uBAAuB,CAAC,CAAC,CAAC,EAAE,GAAG,CAAC,CAAC,CAAC,CAAC,CAAC,EAAeM,EAAuBV,EAAIC,EAAS,CAAC,SAAS,CAAcC,EAAE,KAAK,CAAC,SAAS,sBAAsB,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,+ZAA+Z,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,kCAAkC,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,iRAAiR,CAAC,EAAeF,EAAE,KAAK,CAAC,SAAS,CAAcE,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBA,EAAE,IAAI,CAAC,SAAS,oCAAoC,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBA,EAAE,IAAI,CAAC,SAAS,2BAA2B,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBA,EAAE,IAAI,CAAC,SAAS,4BAA4B,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBA,EAAE,IAAI,CAAC,SAAS,yBAAyB,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBA,EAAE,IAAI,CAAC,SAAS,8CAA8C,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,oCAAoC,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,sWAAsW,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,CAAC,oFAAiGE,EAAEC,EAAE,CAAC,KAAK,kEAAkE,YAAY,GAAG,OAAO,YAAY,aAAa,GAAG,QAAQ,oBAAoB,aAAa,GAAG,SAAsBD,EAAEE,EAAE,EAAE,CAAC,SAAS,qCAAqC,CAAC,CAAC,CAAC,EAAE,GAAG,CAAC,CAAC,EAAeF,EAAE,KAAK,CAAC,SAAS,mCAAmC,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,mPAAmP,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,CAAC,gYAA6YE,EAAEC,EAAE,CAAC,KAAK,0CAA0C,YAAY,GAAG,OAAO,YAAY,aAAa,GAAG,QAAQ,oBAAoB,aAAa,GAAG,SAAsBD,EAAEE,EAAE,EAAE,CAAC,SAAS,wDAAwD,CAAC,CAAC,CAAC,EAAE,GAAG,CAAC,CAAC,EAAeF,EAAE,KAAK,CAAC,SAAS,mBAAmB,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,2aAA2a,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,CAAC,mJAAgKE,EAAEC,EAAE,CAAC,KAAK,iEAAiE,YAAY,GAAG,OAAO,YAAY,aAAa,GAAG,QAAQ,oBAAoB,aAAa,GAAG,SAAsBD,EAAEE,EAAE,EAAE,CAAC,SAAS,gEAAgE,CAAC,CAAC,CAAC,EAAE,GAAG,CAAC,CAAC,EAAeF,EAAE,KAAK,CAAC,SAAS,oBAAoB,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,CAAC,8HAA2IE,EAAEC,EAAE,CAAC,KAAK,2CAA2C,YAAY,GAAG,OAAO,YAAY,aAAa,GAAG,QAAQ,oBAAoB,aAAa,GAAG,SAAsBD,EAAEE,EAAE,EAAE,CAAC,SAAS,sBAAsB,CAAC,CAAC,CAAC,EAAE,4IAA4I,CAAC,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,4MAA4M,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,kBAAkB,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,8NAA8N,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,CAAC,oBAAiCE,EAAEC,EAAE,CAAC,KAAK,kEAAkE,YAAY,GAAG,OAAO,YAAY,aAAa,GAAG,QAAQ,oBAAoB,aAAa,GAAG,SAAsBD,EAAEE,EAAE,EAAE,CAAC,SAAS,+DAA+D,CAAC,CAAC,CAAC,EAAE,kCAA+CF,EAAEC,EAAE,CAAC,KAAK,6BAA6B,YAAY,GAAG,OAAO,YAAY,aAAa,GAAG,QAAQ,oBAAoB,aAAa,GAAG,SAAsBD,EAAEE,EAAE,EAAE,CAAC,SAAS,uBAAuB,CAAC,CAAC,CAAC,EAAE,iEAAiE,CAAC,CAAC,EAAeF,EAAE,KAAK,CAAC,SAAS,4BAA4B,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,8XAA8X,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,CAAC,4OAAyPE,EAAEC,EAAE,CAAC,KAAK,8CAA8C,YAAY,GAAG,OAAO,YAAY,aAAa,GAAG,QAAQ,oBAAoB,aAAa,GAAG,SAAsBD,EAAEE,EAAE,EAAE,CAAC,SAAS,uBAAuB,CAAC,CAAC,CAAC,EAAE,GAAG,CAAC,CAAC,CAAC,CAAC,CAAC,EAAeO,EAAuBX,EAAIC,EAAS,CAAC,SAAS,CAAcC,EAAE,KAAK,CAAC,SAAS,sBAAsB,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,sYAAsY,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,gCAAgC,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,uLAAuL,CAAC,EAAeF,EAAE,KAAK,CAAC,SAAS,CAAcE,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBA,EAAE,IAAI,CAAC,SAAS,6DAA6D,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBA,EAAE,IAAI,CAAC,SAAS,wCAAwC,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBA,EAAE,IAAI,CAAC,SAAS,+CAA+C,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBA,EAAE,IAAI,CAAC,SAAS,uBAAuB,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,kCAAkC,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAEC,EAAE,CAAC,KAAK,iCAAiC,YAAY,GAAG,OAAO,YAAY,aAAa,GAAG,QAAQ,oBAAoB,aAAa,GAAG,SAAsBD,EAAEE,EAAE,EAAE,CAAC,SAAS,iCAAiC,CAAC,CAAC,CAAC,EAAE,6OAA6O,CAAC,CAAC,EAAeJ,EAAE,IAAI,CAAC,SAAS,CAAC,kFAA+FE,EAAEC,EAAE,CAAC,KAAK,gEAAgE,YAAY,GAAG,OAAO,YAAY,aAAa,GAAG,QAAQ,oBAAoB,aAAa,GAAG,SAAsBD,EAAEE,EAAE,EAAE,CAAC,SAAS,mCAAmC,CAAC,CAAC,CAAC,EAAE,GAAG,CAAC,CAAC,EAAeF,EAAE,KAAK,CAAC,SAAS,8CAA8C,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,oRAAoR,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,CAAC,wZAAqaE,EAAEC,EAAE,CAAC,KAAK,0CAA0C,YAAY,GAAG,OAAO,YAAY,aAAa,GAAG,QAAQ,oBAAoB,aAAa,GAAG,SAAsBD,EAAEE,EAAE,EAAE,CAAC,SAAS,wDAAwD,CAAC,CAAC,CAAC,EAAE,GAAG,CAAC,CAAC,EAAeF,EAAE,KAAK,CAAC,SAAS,2CAA2C,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,CAAC,kKAA+KE,EAAEC,EAAE,CAAC,KAAK,+DAA+D,YAAY,GAAG,OAAO,YAAY,aAAa,GAAG,QAAQ,oBAAoB,aAAa,GAAG,SAAsBD,EAAEE,EAAE,EAAE,CAAC,SAAS,8DAA8D,CAAC,CAAC,CAAC,EAAE,GAAG,CAAC,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,wbAAwb,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,oBAAoB,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,CAAC,kHAA+HE,EAAEC,EAAE,CAAC,KAAK,2CAA2C,YAAY,GAAG,OAAO,YAAY,aAAa,GAAG,QAAQ,oBAAoB,aAAa,GAAG,SAAsBD,EAAEE,EAAE,EAAE,CAAC,SAAS,oBAAoB,CAAC,CAAC,CAAC,EAAE,wJAAwJ,CAAC,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,uMAAuM,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,kBAAkB,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,6NAA6N,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,CAAC,oBAAiCE,EAAEC,EAAE,CAAC,KAAK,gEAAgE,YAAY,GAAG,OAAO,YAAY,aAAa,GAAG,QAAQ,oBAAoB,aAAa,GAAG,SAAsBD,EAAEE,EAAE,EAAE,CAAC,SAAS,6DAA6D,CAAC,CAAC,CAAC,EAAE,kCAA+CF,EAAEC,EAAE,CAAC,KAAK,6BAA6B,YAAY,GAAG,OAAO,YAAY,aAAa,GAAG,QAAQ,oBAAoB,aAAa,GAAG,SAAsBD,EAAEE,EAAE,EAAE,CAAC,SAAS,wBAAwB,CAAC,CAAC,CAAC,EAAE,+DAA+D,CAAC,CAAC,EAAeF,EAAE,KAAK,CAAC,SAAS,2CAA2C,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,kYAAkY,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,CAAC,qSAAkTE,EAAEC,EAAE,CAAC,KAAK,8CAA8C,YAAY,GAAG,OAAO,YAAY,aAAa,GAAG,QAAQ,oBAAoB,aAAa,GAAG,SAAsBD,EAAEE,EAAE,EAAE,CAAC,SAAS,uBAAuB,CAAC,CAAC,CAAC,EAAE,GAAG,CAAC,CAAC,CAAC,CAAC,CAAC,EAAeQ,EAAuBZ,EAAIC,EAAS,CAAC,SAAS,CAAcC,EAAE,KAAK,CAAC,SAAS,sBAAsB,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,qYAAqY,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,oCAAoC,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,sEAAsE,CAAC,EAAeF,EAAE,KAAK,CAAC,SAAS,CAAcE,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBA,EAAE,IAAI,CAAC,SAAS,uDAAuD,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBA,EAAE,IAAI,CAAC,SAAS,gCAAgC,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBA,EAAE,IAAI,CAAC,SAAS,mDAAmD,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,sCAAsC,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,kSAAkS,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,CAAC,+KAA4LE,EAAEC,EAAE,CAAC,KAAK,oEAAoE,YAAY,GAAG,OAAO,YAAY,aAAa,GAAG,QAAQ,oBAAoB,aAAa,GAAG,SAAsBD,EAAEE,EAAE,EAAE,CAAC,SAAS,uCAAuC,CAAC,CAAC,CAAC,EAAE,GAAG,CAAC,CAAC,EAAeF,EAAE,KAAK,CAAC,SAAS,6BAA6B,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,6QAA6Q,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,CAAC,0YAAuZE,EAAEC,EAAE,CAAC,KAAK,0CAA0C,YAAY,GAAG,OAAO,YAAY,aAAa,GAAG,QAAQ,oBAAoB,aAAa,GAAG,SAAsBD,EAAEE,EAAE,EAAE,CAAC,SAAS,wDAAwD,CAAC,CAAC,CAAC,EAAE,GAAG,CAAC,CAAC,EAAeF,EAAE,KAAK,CAAC,SAAS,2CAA2C,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,CAAC,sKAAmLE,EAAEC,EAAE,CAAC,KAAK,mEAAmE,YAAY,GAAG,OAAO,YAAY,aAAa,GAAG,QAAQ,oBAAoB,aAAa,GAAG,SAAsBD,EAAEE,EAAE,EAAE,CAAC,SAAS,kEAAkE,CAAC,CAAC,CAAC,EAAE,GAAG,CAAC,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,6aAA6a,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,oBAAoB,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,CAAC,kHAA+HE,EAAEC,EAAE,CAAC,KAAK,2CAA2C,YAAY,GAAG,OAAO,YAAY,aAAa,GAAG,QAAQ,oBAAoB,aAAa,GAAG,SAAsBD,EAAEE,EAAE,EAAE,CAAC,SAAS,oBAAoB,CAAC,CAAC,CAAC,EAAE,4JAA4J,CAAC,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,mMAAmM,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,kBAAkB,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,iOAAiO,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,CAAC,oBAAiCE,EAAEC,EAAE,CAAC,KAAK,oEAAoE,YAAY,GAAG,OAAO,YAAY,aAAa,GAAG,QAAQ,oBAAoB,aAAa,GAAG,SAAsBD,EAAEE,EAAE,EAAE,CAAC,SAAS,iEAAiE,CAAC,CAAC,CAAC,EAAE,kCAA+CF,EAAEC,EAAE,CAAC,KAAK,6BAA6B,YAAY,GAAG,OAAO,YAAY,aAAa,GAAG,QAAQ,oBAAoB,aAAa,GAAG,SAAsBD,EAAEE,EAAE,EAAE,CAAC,SAAS,uBAAuB,CAAC,CAAC,CAAC,EAAE,mEAAmE,CAAC,CAAC,EAAeF,EAAE,KAAK,CAAC,SAAS,+CAA+C,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,sXAAsX,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,CAAC,uSAAoTE,EAAEC,EAAE,CAAC,KAAK,8CAA8C,YAAY,GAAG,OAAO,YAAY,aAAa,GAAG,QAAQ,oBAAoB,aAAa,GAAG,SAAsBD,EAAEE,EAAE,EAAE,CAAC,SAAS,sBAAsB,CAAC,CAAC,CAAC,EAAE,GAAG,CAAC,CAAC,CAAC,CAAC,CAAC,EAAeS,EAAuBb,EAAIC,EAAS,CAAC,SAAS,CAAcC,EAAE,KAAK,CAAC,SAAS,sBAAsB,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,wYAAwY,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,8BAA8B,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,2MAA2M,CAAC,EAAeF,EAAE,KAAK,CAAC,SAAS,CAAcE,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBA,EAAE,IAAI,CAAC,SAAS,kDAAkD,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBA,EAAE,IAAI,CAAC,SAAS,mEAAmE,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBA,EAAE,IAAI,CAAC,SAAS,iDAAiD,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,sCAAsC,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,qTAAqT,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,CAAC,6FAA0GE,EAAEC,EAAE,CAAC,KAAK,oEAAoE,YAAY,GAAG,OAAO,YAAY,aAAa,GAAG,QAAQ,oBAAoB,aAAa,GAAG,SAAsBD,EAAEE,EAAE,EAAE,CAAC,SAAS,uCAAuC,CAAC,CAAC,CAAC,EAAE,GAAG,CAAC,CAAC,EAAeF,EAAE,KAAK,CAAC,SAAS,wCAAwC,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,8QAA8Q,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,CAAC,yYAAsZE,EAAEC,EAAE,CAAC,KAAK,0CAA0C,YAAY,GAAG,OAAO,YAAY,aAAa,GAAG,QAAQ,oBAAoB,aAAa,GAAG,SAAsBD,EAAEE,EAAE,EAAE,CAAC,SAAS,wDAAwD,CAAC,CAAC,CAAC,EAAE,GAAG,CAAC,CAAC,EAAeF,EAAE,KAAK,CAAC,SAAS,mBAAmB,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,ubAAub,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,CAAC,sKAAmLE,EAAEC,EAAE,CAAC,KAAK,mEAAmE,YAAY,GAAG,OAAO,YAAY,aAAa,GAAG,QAAQ,oBAAoB,aAAa,GAAG,SAAsBD,EAAEE,EAAE,EAAE,CAAC,SAAS,kEAAkE,CAAC,CAAC,CAAC,EAAE,GAAG,CAAC,CAAC,EAAeF,EAAE,KAAK,CAAC,SAAS,oBAAoB,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,CAAC,8GAA2HE,EAAEC,EAAE,CAAC,KAAK,2CAA2C,YAAY,GAAG,OAAO,YAAY,aAAa,GAAG,QAAQ,oBAAoB,aAAa,GAAG,SAAsBD,EAAEE,EAAE,EAAE,CAAC,SAAS,oBAAoB,CAAC,CAAC,CAAC,EAAE,4JAA4J,CAAC,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,qMAAqM,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,kBAAkB,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,6NAA6N,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,CAAC,oBAAiCE,EAAEC,EAAE,CAAC,KAAK,oEAAoE,YAAY,GAAG,OAAO,YAAY,aAAa,GAAG,QAAQ,oBAAoB,aAAa,GAAG,SAAsBD,EAAEE,EAAE,EAAE,CAAC,SAAS,kEAAkE,CAAC,CAAC,CAAC,EAAE,mCAAgDF,EAAEC,EAAE,CAAC,KAAK,6BAA6B,YAAY,GAAG,OAAO,YAAY,aAAa,GAAG,QAAQ,oBAAoB,aAAa,GAAG,SAAsBD,EAAEE,EAAE,EAAE,CAAC,SAAS,yBAAyB,CAAC,CAAC,CAAC,EAAE,yEAAyE,CAAC,CAAC,EAAeF,EAAE,KAAK,CAAC,SAAS,8BAA8B,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,oYAAoY,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,CAAC,sSAAmTE,EAAEC,EAAE,CAAC,KAAK,8CAA8C,YAAY,GAAG,OAAO,YAAY,aAAa,GAAG,QAAQ,oBAAoB,aAAa,GAAG,SAAsBD,EAAEE,EAAE,EAAE,CAAC,SAAS,sBAAsB,CAAC,CAAC,CAAC,EAAE,GAAG,CAAC,CAAC,CAAC,CAAC,CAAC,EAAeU,EAAwBd,EAAIC,EAAS,CAAC,SAAS,CAAcC,EAAE,KAAK,CAAC,SAAS,sBAAsB,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,yaAAya,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,+BAA+B,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,mTAAmT,CAAC,EAAeF,EAAE,KAAK,CAAC,SAAS,CAAcE,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBA,EAAE,IAAI,CAAC,SAAS,uCAAuC,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBA,EAAE,IAAI,CAAC,SAAS,mDAAmD,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBA,EAAE,IAAI,CAAC,SAAS,wCAAwC,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBA,EAAE,IAAI,CAAC,SAAS,sGAAsG,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,iCAAiC,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,+RAA+R,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,CAAC,iFAA8FE,EAAEC,EAAE,CAAC,KAAK,+DAA+D,YAAY,GAAG,OAAO,YAAY,aAAa,GAAG,QAAQ,oBAAoB,aAAa,GAAG,SAAsBD,EAAEE,EAAE,EAAE,CAAC,SAAS,kCAAkC,CAAC,CAAC,CAAC,EAAE,GAAG,CAAC,CAAC,EAAeF,EAAE,KAAK,CAAC,SAAS,mCAAmC,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,gPAAgP,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,CAAC,gYAA6YE,EAAEC,EAAE,CAAC,KAAK,0CAA0C,YAAY,GAAG,OAAO,YAAY,aAAa,GAAG,QAAQ,oBAAoB,aAAa,GAAG,SAAsBD,EAAEE,EAAE,EAAE,CAAC,SAAS,wDAAwD,CAAC,CAAC,CAAC,EAAE,GAAG,CAAC,CAAC,EAAeF,EAAE,KAAK,CAAC,SAAS,mBAAmB,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,wbAAmb,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,CAAC,gJAA6JE,EAAEC,EAAE,CAAC,KAAK,8DAA8D,YAAY,GAAG,OAAO,YAAY,aAAa,GAAG,QAAQ,oBAAoB,aAAa,GAAG,SAAsBD,EAAEE,EAAE,EAAE,CAAC,SAAS,6DAA6D,CAAC,CAAC,CAAC,EAAE,GAAG,CAAC,CAAC,EAAeF,EAAE,KAAK,CAAC,SAAS,oBAAoB,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,CAAC,2HAAwIE,EAAEC,EAAE,CAAC,KAAK,2CAA2C,YAAY,GAAG,OAAO,YAAY,aAAa,GAAG,QAAQ,oBAAoB,aAAa,GAAG,SAAsBD,EAAEE,EAAE,EAAE,CAAC,SAAS,sBAAsB,CAAC,CAAC,CAAC,EAAE,4IAA4I,CAAC,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,4MAA4M,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,kBAAkB,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,2NAA2N,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,CAAC,oBAAiCE,EAAEC,EAAE,CAAC,KAAK,+DAA+D,YAAY,GAAG,OAAO,YAAY,aAAa,GAAG,QAAQ,oBAAoB,aAAa,GAAG,SAAsBD,EAAEE,EAAE,EAAE,CAAC,SAAS,4DAA4D,CAAC,CAAC,CAAC,EAAE,kCAA+CF,EAAEC,EAAE,CAAC,KAAK,6BAA6B,YAAY,GAAG,OAAO,YAAY,aAAa,GAAG,QAAQ,oBAAoB,aAAa,GAAG,SAAsBD,EAAEE,EAAE,EAAE,CAAC,SAAS,uBAAuB,CAAC,CAAC,CAAC,EAAE,8DAA8D,CAAC,CAAC,EAAeF,EAAE,KAAK,CAAC,SAAS,yBAAyB,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,8XAA8X,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,CAAC,yOAAsPE,EAAEC,EAAE,CAAC,KAAK,8CAA8C,YAAY,GAAG,OAAO,YAAY,aAAa,GAAG,QAAQ,oBAAoB,aAAa,GAAG,SAAsBD,EAAEE,EAAE,EAAE,CAAC,SAAS,uBAAuB,CAAC,CAAC,CAAC,EAAE,GAAG,CAAC,CAAC,CAAC,CAAC,CAAC,EAAeW,EAAwBf,EAAIC,EAAS,CAAC,SAAS,CAAcC,EAAE,KAAK,CAAC,SAAS,sBAAsB,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,0bAA0b,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,qCAAqC,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,kMAAkM,CAAC,EAAeF,EAAE,KAAK,CAAC,SAAS,CAAcE,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBA,EAAE,IAAI,CAAC,SAAS,+CAA+C,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBA,EAAE,IAAI,CAAC,SAAS,yEAAyE,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBA,EAAE,IAAI,CAAC,SAAS,iEAAiE,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,uCAAuC,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,mUAAmU,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,CAAC,uFAAoGE,EAAEC,EAAE,CAAC,KAAK,qEAAqE,YAAY,GAAG,OAAO,YAAY,aAAa,GAAG,QAAQ,oBAAoB,aAAa,GAAG,SAAsBD,EAAEE,EAAE,EAAE,CAAC,SAAS,wCAAwC,CAAC,CAAC,CAAC,EAAE,GAAG,CAAC,CAAC,EAAeF,EAAE,KAAK,CAAC,SAAS,wCAAwC,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,4PAA4P,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,CAAC,oYAAiZE,EAAEC,EAAE,CAAC,KAAK,0CAA0C,YAAY,GAAG,OAAO,YAAY,aAAa,GAAG,QAAQ,oBAAoB,aAAa,GAAG,SAAsBD,EAAEE,EAAE,EAAE,CAAC,SAAS,wDAAwD,CAAC,CAAC,CAAC,EAAE,GAAG,CAAC,CAAC,EAAeF,EAAE,KAAK,CAAC,SAAS,gCAAgC,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,ibAAib,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,oBAAoB,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,CAAC,iIAA8IE,EAAEC,EAAE,CAAC,KAAK,2CAA2C,YAAY,GAAG,OAAO,YAAY,aAAa,GAAG,QAAQ,oBAAoB,aAAa,GAAG,SAAsBD,EAAEE,EAAE,EAAE,CAAC,SAAS,qBAAqB,CAAC,CAAC,CAAC,EAAE,4IAA4I,CAAC,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,0MAA0M,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,kBAAkB,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,kOAAkO,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,CAAC,oBAAiCE,EAAEC,EAAE,CAAC,KAAK,qEAAqE,YAAY,GAAG,OAAO,YAAY,aAAa,GAAG,QAAQ,oBAAoB,aAAa,GAAG,SAAsBD,EAAEE,EAAE,EAAE,CAAC,SAAS,kEAAkE,CAAC,CAAC,CAAC,EAAE,kCAA+CF,EAAEC,EAAE,CAAC,KAAK,6BAA6B,YAAY,GAAG,OAAO,YAAY,aAAa,GAAG,QAAQ,oBAAoB,aAAa,GAAG,SAAsBD,EAAEE,EAAE,EAAE,CAAC,SAAS,uBAAuB,CAAC,CAAC,CAAC,EAAE,oEAAoE,CAAC,CAAC,EAAeF,EAAE,KAAK,CAAC,SAAS,+BAA+B,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,+WAA+W,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,CAAC,8PAA2QE,EAAEC,EAAE,CAAC,KAAK,8CAA8C,YAAY,GAAG,OAAO,YAAY,aAAa,GAAG,QAAQ,oBAAoB,aAAa,GAAG,SAAsBD,EAAEE,EAAE,EAAE,CAAC,SAAS,uBAAuB,CAAC,CAAC,CAAC,EAAE,GAAG,CAAC,CAAC,CAAC,CAAC,CAAC,EAAeY,EAAwBhB,EAAIC,EAAS,CAAC,SAAS,CAAcC,EAAE,KAAK,CAAC,SAAS,sBAAsB,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,6cAA6c,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,iCAAiC,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,gSAAgS,CAAC,EAAeF,EAAE,KAAK,CAAC,SAAS,CAAcE,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBA,EAAE,IAAI,CAAC,SAAS,kDAAkD,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBA,EAAE,IAAI,CAAC,SAAS,gCAAgC,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBA,EAAE,IAAI,CAAC,SAAS,6CAA6C,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBA,EAAE,IAAI,CAAC,SAAS,gEAAgE,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBA,EAAE,IAAI,CAAC,SAAS,gCAAgC,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,mCAAmC,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,+XAA+X,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,CAAC,mFAAgGE,EAAEC,EAAE,CAAC,KAAK,iEAAiE,YAAY,GAAG,OAAO,YAAY,aAAa,GAAG,QAAQ,oBAAoB,aAAa,GAAG,SAAsBD,EAAEE,EAAE,EAAE,CAAC,SAAS,oCAAoC,CAAC,CAAC,CAAC,EAAE,GAAG,CAAC,CAAC,EAAeF,EAAE,KAAK,CAAC,SAAS,+CAA+C,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,kPAAkP,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,CAAC,+XAA4YE,EAAEC,EAAE,CAAC,KAAK,0CAA0C,YAAY,GAAG,OAAO,YAAY,aAAa,GAAG,QAAQ,oBAAoB,aAAa,GAAG,SAAsBD,EAAEE,EAAE,EAAE,CAAC,SAAS,wDAAwD,CAAC,CAAC,CAAC,EAAE,GAAG,CAAC,CAAC,EAAeF,EAAE,KAAK,CAAC,SAAS,6CAA6C,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,CAAC,kKAA+KE,EAAEC,EAAE,CAAC,KAAK,gEAAgE,YAAY,GAAG,OAAO,YAAY,aAAa,GAAG,QAAQ,oBAAoB,aAAa,GAAG,SAAsBD,EAAEE,EAAE,EAAE,CAAC,SAAS,0DAA0D,CAAC,CAAC,CAAC,EAAE,GAAG,CAAC,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,ibAAib,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,oBAAoB,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,CAAC,6HAA0IE,EAAEC,EAAE,CAAC,KAAK,2CAA2C,YAAY,GAAG,OAAO,YAAY,aAAa,GAAG,QAAQ,oBAAoB,aAAa,GAAG,SAAsBD,EAAEE,EAAE,EAAE,CAAC,SAAS,qBAAqB,CAAC,CAAC,CAAC,EAAE,4IAA4I,CAAC,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,sMAAsM,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,kBAAkB,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,oOAAoO,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,CAAC,oBAAiCE,EAAEC,EAAE,CAAC,KAAK,iEAAiE,YAAY,GAAG,OAAO,YAAY,aAAa,GAAG,QAAQ,oBAAoB,aAAa,GAAG,SAAsBD,EAAEE,EAAE,EAAE,CAAC,SAAS,+CAA+C,CAAC,CAAC,CAAC,EAAE,kCAA+CF,EAAEC,EAAE,CAAC,KAAK,6BAA6B,YAAY,GAAG,OAAO,YAAY,aAAa,GAAG,QAAQ,oBAAoB,aAAa,GAAG,SAAsBD,EAAEE,EAAE,EAAE,CAAC,SAAS,uBAAuB,CAAC,CAAC,CAAC,EAAE,gDAAgD,CAAC,CAAC,EAAeF,EAAE,KAAK,CAAC,SAAS,2BAA2B,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,2WAA2W,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,CAAC,2OAAwPE,EAAEC,EAAE,CAAC,KAAK,8CAA8C,YAAY,GAAG,OAAO,YAAY,aAAa,GAAG,QAAQ,oBAAoB,aAAa,GAAG,SAAsBD,EAAEE,EAAE,EAAE,CAAC,SAAS,uBAAuB,CAAC,CAAC,CAAC,EAAE,GAAG,CAAC,CAAC,CAAC,CAAC,CAAC,EAAea,EAAwBjB,EAAIC,EAAS,CAAC,SAAS,CAAcC,EAAE,KAAK,CAAC,SAAS,sBAAsB,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,icAAic,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,wCAAwC,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,2LAA2L,CAAC,EAAeF,EAAE,KAAK,CAAC,SAAS,CAAcE,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBA,EAAE,IAAI,CAAC,SAAS,kEAAkE,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBA,EAAE,IAAI,CAAC,SAAS,+EAA+E,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBA,EAAE,IAAI,CAAC,SAAS,kDAAkD,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBA,EAAE,IAAI,CAAC,SAAS,sEAAsE,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,0CAA0C,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,wUAAwU,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,CAAC,0FAAuGE,EAAEC,EAAE,CAAC,KAAK,uEAAuE,YAAY,GAAG,OAAO,YAAY,aAAa,GAAG,QAAQ,oBAAoB,aAAa,GAAG,SAAsBD,EAAEE,EAAE,EAAE,CAAC,SAAS,2CAA2C,CAAC,CAAC,CAAC,EAAE,GAAG,CAAC,CAAC,EAAeF,EAAE,KAAK,CAAC,SAAS,wCAAwC,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,yPAAyP,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,CAAC,qYAAkZE,EAAEC,EAAE,CAAC,KAAK,0CAA0C,YAAY,GAAG,OAAO,YAAY,aAAa,GAAG,QAAQ,oBAAoB,aAAa,GAAG,SAAsBD,EAAEE,EAAE,EAAE,CAAC,SAAS,wDAAwD,CAAC,CAAC,CAAC,EAAE,GAAG,CAAC,CAAC,EAAeF,EAAE,KAAK,CAAC,SAAS,6CAA6C,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,CAAC,8JAA2KE,EAAEC,EAAE,CAAC,KAAK,sEAAsE,YAAY,GAAG,OAAO,YAAY,aAAa,GAAG,QAAQ,oBAAoB,aAAa,GAAG,SAAsBD,EAAEE,EAAE,EAAE,CAAC,SAAS,sEAAsE,CAAC,CAAC,CAAC,EAAE,GAAG,CAAC,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,2aAA2a,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,oBAAoB,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,CAAC,oIAAiJE,EAAEC,EAAE,CAAC,KAAK,2CAA2C,YAAY,GAAG,OAAO,YAAY,aAAa,GAAG,QAAQ,oBAAoB,aAAa,GAAG,SAAsBD,EAAEE,EAAE,EAAE,CAAC,SAAS,qBAAqB,CAAC,CAAC,CAAC,EAAE,4IAA4I,CAAC,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,4MAA4M,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,kBAAkB,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,qOAAqO,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,CAAC,oBAAiCE,EAAEC,EAAE,CAAC,KAAK,uEAAuE,YAAY,GAAG,OAAO,YAAY,aAAa,GAAG,QAAQ,oBAAoB,aAAa,GAAG,SAAsBD,EAAEE,EAAE,EAAE,CAAC,SAAS,qEAAqE,CAAC,CAAC,CAAC,EAAE,kCAA+CF,EAAEC,EAAE,CAAC,KAAK,6BAA6B,YAAY,GAAG,OAAO,YAAY,aAAa,GAAG,QAAQ,oBAAoB,aAAa,GAAG,SAAsBD,EAAEE,EAAE,EAAE,CAAC,SAAS,uBAAuB,CAAC,CAAC,CAAC,EAAE,uEAAuE,CAAC,CAAC,EAAeF,EAAE,KAAK,CAAC,SAAS,kCAAkC,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,+WAA+W,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,CAAC,kPAA+PE,EAAEC,EAAE,CAAC,KAAK,8CAA8C,YAAY,GAAG,OAAO,YAAY,aAAa,GAAG,QAAQ,oBAAoB,aAAa,GAAG,SAAsBD,EAAEE,EAAE,EAAE,CAAC,SAAS,uBAAuB,CAAC,CAAC,CAAC,EAAE,GAAG,CAAC,CAAC,CAAC,CAAC,CAAC,EAAec,EAAwBlB,EAAIC,EAAS,CAAC,SAAS,CAAcC,EAAE,KAAK,CAAC,SAAS,sBAAsB,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,maAAma,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,0BAA0B,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,gLAAgL,CAAC,EAAeF,EAAE,KAAK,CAAC,SAAS,CAAcE,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBA,EAAE,IAAI,CAAC,SAAS,iDAAiD,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBA,EAAE,IAAI,CAAC,SAAS,0DAA0D,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBA,EAAE,IAAI,CAAC,SAAS,2DAA2D,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBA,EAAE,IAAI,CAAC,SAAS,yDAAyD,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,kCAAkC,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,sZAAsZ,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,CAAC,kFAA+FE,EAAEC,EAAE,CAAC,KAAK,gEAAgE,YAAY,GAAG,OAAO,YAAY,aAAa,GAAG,QAAQ,oBAAoB,aAAa,GAAG,SAAsBD,EAAEE,EAAE,EAAE,CAAC,SAAS,mCAAmC,CAAC,CAAC,CAAC,EAAE,GAAG,CAAC,CAAC,EAAeF,EAAE,KAAK,CAAC,SAAS,mCAAmC,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,iPAAiP,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,CAAC,oYAAiZE,EAAEC,EAAE,CAAC,KAAK,0CAA0C,YAAY,GAAG,OAAO,YAAY,aAAa,GAAG,QAAQ,oBAAoB,aAAa,GAAG,SAAsBD,EAAEE,EAAE,EAAE,CAAC,SAAS,wDAAwD,CAAC,CAAC,CAAC,EAAE,GAAG,CAAC,CAAC,EAAeF,EAAE,KAAK,CAAC,SAAS,mBAAmB,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,2aAA2a,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,CAAC,sJAAmKE,EAAEC,EAAE,CAAC,KAAK,+DAA+D,YAAY,GAAG,OAAO,YAAY,aAAa,GAAG,QAAQ,oBAAoB,aAAa,GAAG,SAAsBD,EAAEE,EAAE,EAAE,CAAC,SAAS,mEAAmE,CAAC,CAAC,CAAC,EAAE,GAAG,CAAC,CAAC,EAAeF,EAAE,KAAK,CAAC,SAAS,oBAAoB,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,CAAC,4HAAyIE,EAAEC,EAAE,CAAC,KAAK,2CAA2C,YAAY,GAAG,OAAO,YAAY,aAAa,GAAG,QAAQ,oBAAoB,aAAa,GAAG,SAAsBD,EAAEE,EAAE,EAAE,CAAC,SAAS,sBAAsB,CAAC,CAAC,CAAC,EAAE,4IAA4I,CAAC,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,4MAA4M,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,kBAAkB,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,6NAA6N,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,CAAC,oBAAiCE,EAAEC,EAAE,CAAC,KAAK,gEAAgE,YAAY,GAAG,OAAO,YAAY,aAAa,GAAG,QAAQ,oBAAoB,aAAa,GAAG,SAAsBD,EAAEE,EAAE,EAAE,CAAC,SAAS,6DAA6D,CAAC,CAAC,CAAC,EAAE,kCAA+CF,EAAEC,EAAE,CAAC,KAAK,6BAA6B,YAAY,GAAG,OAAO,YAAY,aAAa,GAAG,QAAQ,oBAAoB,aAAa,GAAG,SAAsBD,EAAEE,EAAE,EAAE,CAAC,SAAS,uBAAuB,CAAC,CAAC,CAAC,EAAE,+DAA+D,CAAC,CAAC,EAAeF,EAAE,KAAK,CAAC,SAAS,0BAA0B,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,+WAA+W,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,CAAC,+OAA4PE,EAAEC,EAAE,CAAC,KAAK,8CAA8C,YAAY,GAAG,OAAO,YAAY,aAAa,GAAG,QAAQ,oBAAoB,aAAa,GAAG,SAAsBD,EAAEE,EAAE,EAAE,CAAC,SAAS,uBAAuB,CAAC,CAAC,CAAC,EAAE,GAAG,CAAC,CAAC,CAAC,CAAC,CAAC,EAAee,EAAwBnB,EAAIC,EAAS,CAAC,SAAS,CAAcC,EAAE,IAAI,CAAC,SAAS,gRAAgR,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,qPAAgP,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,cAAc,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,qCAAqC,CAAC,EAAeF,EAAE,KAAK,CAAC,SAAS,CAAcE,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBA,EAAE,IAAI,CAAC,SAAS,wEAAwE,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBA,EAAE,IAAI,CAAC,SAAS,8GAA8G,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBA,EAAE,IAAI,CAAC,SAAS,oCAAoC,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,CAAC,aAA0BE,EAAEC,EAAE,CAAC,KAAK,kEAAkE,YAAY,GAAG,OAAO,YAAY,aAAa,GAAG,QAAQ,oBAAoB,aAAa,GAAG,SAAsBD,EAAEE,EAAE,EAAE,CAAC,SAAS,mBAAmB,CAAC,CAAC,CAAC,EAAE,+EAA+E,CAAC,CAAC,CAAC,CAAC,CAAC,EAAegB,EAAwBpB,EAAIC,EAAS,CAAC,SAAS,CAAcC,EAAE,KAAK,CAAC,SAAS,sBAAsB,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,wcAAmc,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,wBAAwB,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,sLAAsL,CAAC,EAAeF,EAAE,KAAK,CAAC,SAAS,CAAcE,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBA,EAAE,IAAI,CAAC,SAAS,kFAAkF,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBA,EAAE,IAAI,CAAC,SAAS,4EAA4E,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBA,EAAE,IAAI,CAAC,SAAS,gEAAgE,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBA,EAAE,IAAI,CAAC,SAAS,6DAA6D,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,gCAAgC,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,gRAAgR,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,CAAC,gFAA6FE,EAAEC,EAAE,CAAC,KAAK,8DAA8D,YAAY,GAAG,OAAO,YAAY,aAAa,GAAG,QAAQ,oBAAoB,aAAa,GAAG,SAAsBD,EAAEE,EAAE,EAAE,CAAC,SAAS,iCAAiC,CAAC,CAAC,CAAC,EAAE,GAAG,CAAC,CAAC,EAAeF,EAAE,KAAK,CAAC,SAAS,4CAA4C,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,mOAAmO,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,CAAC,wUAAqVE,EAAEC,EAAE,CAAC,KAAK,0CAA0C,YAAY,GAAG,OAAO,YAAY,aAAa,GAAG,QAAQ,oBAAoB,aAAa,GAAG,SAAsBD,EAAEE,EAAE,EAAE,CAAC,SAAS,wDAAwD,CAAC,CAAC,CAAC,EAAE,GAAG,CAAC,CAAC,EAAeF,EAAE,KAAK,CAAC,SAAS,mBAAmB,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,oZAAoZ,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,CAAC,oJAAiKE,EAAEC,EAAE,CAAC,KAAK,6DAA6D,YAAY,GAAG,OAAO,YAAY,aAAa,GAAG,QAAQ,oBAAoB,aAAa,GAAG,SAAsBD,EAAEE,EAAE,EAAE,CAAC,SAAS,4DAA4D,CAAC,CAAC,CAAC,EAAE,GAAG,CAAC,CAAC,EAAeF,EAAE,KAAK,CAAC,SAAS,oBAAoB,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,CAAC,0HAAuIE,EAAEC,EAAE,CAAC,KAAK,2CAA2C,YAAY,GAAG,OAAO,YAAY,aAAa,GAAG,QAAQ,oBAAoB,aAAa,GAAG,SAAsBD,EAAEE,EAAE,EAAE,CAAC,SAAS,oBAAoB,CAAC,CAAC,CAAC,EAAE,8IAA8I,CAAC,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,sMAAsM,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,kBAAkB,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,2NAA2N,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,CAAC,oBAAiCE,EAAEC,EAAE,CAAC,KAAK,8DAA8D,YAAY,GAAG,OAAO,YAAY,aAAa,GAAG,QAAQ,oBAAoB,aAAa,GAAG,SAAsBD,EAAEE,EAAE,EAAE,CAAC,SAAS,4CAA4C,CAAC,CAAC,CAAC,EAAE,kCAA+CF,EAAEC,EAAE,CAAC,KAAK,6BAA6B,YAAY,GAAG,OAAO,YAAY,aAAa,GAAG,QAAQ,oBAAoB,aAAa,GAAG,SAAsBD,EAAEE,EAAE,EAAE,CAAC,SAAS,uBAAuB,CAAC,CAAC,CAAC,EAAE,gDAAgD,CAAC,CAAC,EAAeF,EAAE,KAAK,CAAC,SAAS,oCAAoC,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,2WAA2W,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,CAAC,iPAAyPE,EAAEC,EAAE,CAAC,KAAK,8CAA8C,YAAY,GAAG,OAAO,YAAY,aAAa,GAAG,QAAQ,oBAAoB,aAAa,GAAG,SAAsBD,EAAEE,EAAE,EAAE,CAAC,SAAS,sBAAsB,CAAC,CAAC,CAAC,EAAE,GAAG,CAAC,CAAC,CAAC,CAAC,CAAC,EAAeiB,EAAwBrB,EAAIC,EAAS,CAAC,SAAS,CAAcC,EAAE,KAAK,CAAC,SAAS,sBAAsB,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,0bAA0b,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,2BAA2B,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,wJAAwJ,CAAC,EAAeF,EAAE,KAAK,CAAC,SAAS,CAAcE,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBA,EAAE,IAAI,CAAC,SAAS,mEAAmE,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBA,EAAE,IAAI,CAAC,SAAS,4FAA4F,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBA,EAAE,IAAI,CAAC,SAAS,8EAA8E,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,gCAAgC,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,0XAA0X,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,CAAC,mFAAgGE,EAAEC,EAAE,CAAC,KAAK,iEAAiE,YAAY,GAAG,OAAO,YAAY,aAAa,GAAG,QAAQ,oBAAoB,aAAa,GAAG,SAAsBD,EAAEE,EAAE,EAAE,CAAC,SAAS,oCAAoC,CAAC,CAAC,CAAC,EAAE,GAAG,CAAC,CAAC,EAAeF,EAAE,KAAK,CAAC,SAAS,mCAAmC,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,2QAA2Q,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,CAAC,4aAAybE,EAAEC,EAAE,CAAC,KAAK,0CAA0C,YAAY,GAAG,OAAO,YAAY,aAAa,GAAG,QAAQ,oBAAoB,aAAa,GAAG,SAAsBD,EAAEE,EAAE,EAAE,CAAC,SAAS,wDAAwD,CAAC,CAAC,CAAC,EAAE,GAAG,CAAC,CAAC,EAAeF,EAAE,KAAK,CAAC,SAAS,mBAAmB,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,icAAic,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,oBAAoB,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,CAAC,6HAA0IE,EAAEC,EAAE,CAAC,KAAK,2CAA2C,YAAY,GAAG,OAAO,YAAY,aAAa,GAAG,QAAQ,oBAAoB,aAAa,GAAG,SAAsBD,EAAEE,EAAE,EAAE,CAAC,SAAS,sBAAsB,CAAC,CAAC,CAAC,EAAE,qKAAqK,CAAC,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,uMAAuM,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,kBAAkB,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,0NAA0N,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,CAAC,oBAAiCE,EAAEC,EAAE,CAAC,KAAK,iEAAiE,YAAY,GAAG,OAAO,YAAY,aAAa,GAAG,QAAQ,oBAAoB,aAAa,GAAG,SAAsBD,EAAEE,EAAE,EAAE,CAAC,SAAS,uEAAuE,CAAC,CAAC,CAAC,EAAE,2BAAwCF,EAAEC,EAAE,CAAC,KAAK,6BAA6B,YAAY,GAAG,OAAO,YAAY,aAAa,GAAG,QAAQ,oBAAoB,aAAa,GAAG,SAAsBD,EAAEE,EAAE,EAAE,CAAC,SAAS,uBAAuB,CAAC,CAAC,CAAC,EAAE,sEAAsE,CAAC,CAAC,EAAeF,EAAE,KAAK,CAAC,SAAS,uCAAuC,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,iMAAiM,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,CAAC,oSAAiTE,EAAEC,EAAE,CAAC,KAAK,8CAA8C,YAAY,GAAG,OAAO,YAAY,aAAa,GAAG,QAAQ,oBAAoB,aAAa,GAAG,SAAsBD,EAAEE,EAAE,EAAE,CAAC,SAAS,uBAAuB,CAAC,CAAC,CAAC,EAAE,GAAG,CAAC,CAAC,CAAC,CAAC,CAAC,EAAekB,EAAwBtB,EAAIC,EAAS,CAAC,SAAS,CAAcC,EAAE,IAAI,CAAC,SAAS,6OAA6O,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,cAAc,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,qCAAqC,CAAC,EAAeF,EAAE,KAAK,CAAC,SAAS,CAAcE,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBA,EAAE,IAAI,CAAC,SAAS,gJAAgJ,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBA,EAAE,IAAI,CAAC,SAAS,8GAA8G,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBA,EAAE,IAAI,CAAC,SAAS,qCAAqC,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,CAAC,SAAsBE,EAAEC,EAAE,CAAC,KAAK,uDAAuD,YAAY,GAAG,OAAO,YAAY,aAAa,GAAG,QAAQ,oBAAoB,aAAa,GAAG,SAAsBD,EAAEE,EAAE,EAAE,CAAC,SAAS,cAAc,CAAC,CAAC,CAAC,EAAE,+DAA+D,CAAC,CAAC,CAAC,CAAC,CAAC,EAAemB,EAAwBvB,EAAIC,EAAS,CAAC,SAAS,CAAcC,EAAE,KAAK,CAAC,SAAS,sBAAsB,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,gYAAgY,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,2BAA2B,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,8SAA8S,CAAC,EAAeF,EAAE,KAAK,CAAC,SAAS,CAAcE,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBA,EAAE,IAAI,CAAC,SAAS,wEAAwE,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBA,EAAE,IAAI,CAAC,SAAS,8DAA8D,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBA,EAAE,IAAI,CAAC,SAAS,2DAA2D,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,mCAAmC,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,4RAA4R,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,CAAC,mFAAgGE,EAAEC,EAAE,CAAC,KAAK,iEAAiE,YAAY,GAAG,OAAO,YAAY,aAAa,GAAG,QAAQ,oBAAoB,aAAa,GAAG,SAAsBD,EAAEE,EAAE,EAAE,CAAC,SAAS,oCAAoC,CAAC,CAAC,CAAC,EAAE,GAAG,CAAC,CAAC,EAAeF,EAAE,KAAK,CAAC,SAAS,+CAA+C,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,kPAAkP,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,CAAC,iZAA8ZE,EAAEC,EAAE,CAAC,KAAK,0CAA0C,YAAY,GAAG,OAAO,YAAY,aAAa,GAAG,QAAQ,oBAAoB,aAAa,GAAG,SAAsBD,EAAEE,EAAE,EAAE,CAAC,SAAS,wDAAwD,CAAC,CAAC,CAAC,EAAE,GAAG,CAAC,CAAC,EAAeF,EAAE,KAAK,CAAC,SAAS,6CAA6C,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,CAAC,uJAAoKE,EAAEC,EAAE,CAAC,KAAK,gEAAgE,YAAY,GAAG,OAAO,YAAY,aAAa,GAAG,QAAQ,oBAAoB,aAAa,GAAG,SAAsBD,EAAEE,EAAE,EAAE,CAAC,SAAS,+DAA+D,CAAC,CAAC,CAAC,EAAE,GAAG,CAAC,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,ibAAib,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,oBAAoB,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,CAAC,6HAA0IE,EAAEC,EAAE,CAAC,KAAK,2CAA2C,YAAY,GAAG,OAAO,YAAY,aAAa,GAAG,QAAQ,oBAAoB,aAAa,GAAG,SAAsBD,EAAEE,EAAE,EAAE,CAAC,SAAS,oBAAoB,CAAC,CAAC,CAAC,EAAE,4IAA4I,CAAC,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,sMAAsM,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,kBAAkB,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,8NAA8N,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,CAAC,oBAAiCE,EAAEC,EAAE,CAAC,KAAK,iEAAiE,YAAY,GAAG,OAAO,YAAY,aAAa,GAAG,QAAQ,oBAAoB,aAAa,GAAG,SAAsBD,EAAEE,EAAE,EAAE,CAAC,SAAS,+CAA+C,CAAC,CAAC,CAAC,EAAE,kCAA+CF,EAAEC,EAAE,CAAC,KAAK,6BAA6B,YAAY,GAAG,OAAO,YAAY,aAAa,GAAG,QAAQ,oBAAoB,aAAa,GAAG,SAAsBD,EAAEE,EAAE,EAAE,CAAC,SAAS,uBAAuB,CAAC,CAAC,CAAC,EAAE,gDAAgD,CAAC,CAAC,EAAeF,EAAE,KAAK,CAAC,SAAS,uCAAuC,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,2WAA2W,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,CAAC,yOAAsPE,EAAEC,EAAE,CAAC,KAAK,8CAA8C,YAAY,GAAG,OAAO,YAAY,aAAa,GAAG,QAAQ,oBAAoB,aAAa,GAAG,SAAsBD,EAAEE,EAAE,EAAE,CAAC,SAAS,uBAAuB,CAAC,CAAC,CAAC,EAAE,GAAG,CAAC,CAAC,CAAC,CAAC,CAAC,EAAeoB,EAAwBxB,EAAIC,EAAS,CAAC,SAAS,CAAcC,EAAE,KAAK,CAAC,SAAS,sBAAsB,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,6aAA6a,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,+BAA+B,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,qKAAqK,CAAC,EAAeF,EAAE,KAAK,CAAC,SAAS,CAAcE,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBA,EAAE,IAAI,CAAC,SAAS,iDAAiD,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBA,EAAE,IAAI,CAAC,SAAS,0DAA0D,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBA,EAAE,IAAI,CAAC,SAAS,gEAAgE,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBA,EAAE,IAAI,CAAC,SAAS,4DAA4D,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,uCAAuC,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,yTAAyT,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,CAAC,uFAAoGE,EAAEC,EAAE,CAAC,KAAK,qEAAqE,YAAY,GAAG,OAAO,YAAY,aAAa,GAAG,QAAQ,oBAAoB,aAAa,GAAG,SAAsBD,EAAEE,EAAE,EAAE,CAAC,SAAS,wCAAwC,CAAC,CAAC,CAAC,EAAE,GAAG,CAAC,CAAC,EAAeF,EAAE,KAAK,CAAC,SAAS,mCAAmC,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,sPAAsP,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,CAAC,saAAmbE,EAAEC,EAAE,CAAC,KAAK,0CAA0C,YAAY,GAAG,OAAO,YAAY,aAAa,GAAG,QAAQ,oBAAoB,aAAa,GAAG,SAAsBD,EAAEE,EAAE,EAAE,CAAC,SAAS,wDAAwD,CAAC,CAAC,CAAC,EAAE,GAAG,CAAC,CAAC,EAAeF,EAAE,KAAK,CAAC,SAAS,6CAA6C,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,CAAC,uKAAoLE,EAAEC,EAAE,CAAC,KAAK,oEAAoE,YAAY,GAAG,OAAO,YAAY,aAAa,GAAG,QAAQ,oBAAoB,aAAa,GAAG,SAAsBD,EAAEE,EAAE,EAAE,CAAC,SAAS,mEAAmE,CAAC,CAAC,CAAC,EAAE,GAAG,CAAC,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,ibAAib,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,oBAAoB,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,CAAC,iIAA8IE,EAAEC,EAAE,CAAC,KAAK,2CAA2C,YAAY,GAAG,OAAO,YAAY,aAAa,GAAG,QAAQ,oBAAoB,aAAa,GAAG,SAAsBD,EAAEE,EAAE,EAAE,CAAC,SAAS,oBAAoB,CAAC,CAAC,CAAC,EAAE,4IAA4I,CAAC,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,4MAA4M,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,kBAAkB,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,kOAAkO,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,CAAC,oBAAiCE,EAAEC,EAAE,CAAC,KAAK,qEAAqE,YAAY,GAAG,OAAO,YAAY,aAAa,GAAG,QAAQ,oBAAoB,aAAa,GAAG,SAAsBD,EAAEE,EAAE,EAAE,CAAC,SAAS,kEAAkE,CAAC,CAAC,CAAC,EAAE,kCAA+CF,EAAEC,EAAE,CAAC,KAAK,6BAA6B,YAAY,GAAG,OAAO,YAAY,aAAa,GAAG,QAAQ,oBAAoB,aAAa,GAAG,SAAsBD,EAAEE,EAAE,EAAE,CAAC,SAAS,uBAAuB,CAAC,CAAC,CAAC,EAAE,oEAAoE,CAAC,CAAC,EAAeF,EAAE,KAAK,CAAC,SAAS,2CAA2C,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,qXAAqX,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,CAAC,+OAA4PE,EAAEC,EAAE,CAAC,KAAK,8CAA8C,YAAY,GAAG,OAAO,YAAY,aAAa,GAAG,QAAQ,oBAAoB,aAAa,GAAG,SAAsBD,EAAEE,EAAE,EAAE,CAAC,SAAS,uBAAuB,CAAC,CAAC,CAAC,EAAE,GAAG,CAAC,CAAC,CAAC,CAAC,CAAC,EAAeqB,EAAwBzB,EAAIC,EAAS,CAAC,SAAS,CAAcC,EAAE,KAAK,CAAC,SAAS,sBAAsB,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,iWAAiW,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,gCAAgC,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,gLAAgL,CAAC,EAAeF,EAAE,KAAK,CAAC,SAAS,CAAcE,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBA,EAAE,IAAI,CAAC,SAAS,sGAAsG,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBA,EAAE,IAAI,CAAC,SAAS,wEAAwE,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBA,EAAE,IAAI,CAAC,SAAS,iDAAiD,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBA,EAAE,IAAI,CAAC,SAAS,6DAA6D,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,wCAAwC,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,oUAAoU,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,CAAC,wFAAqGE,EAAEC,EAAE,CAAC,KAAK,sEAAsE,YAAY,GAAG,OAAO,YAAY,aAAa,GAAG,QAAQ,oBAAoB,aAAa,GAAG,SAAsBD,EAAEE,EAAE,EAAE,CAAC,SAAS,yCAAyC,CAAC,CAAC,CAAC,EAAE,GAAG,CAAC,CAAC,EAAeF,EAAE,KAAK,CAAC,SAAS,wCAAwC,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,uPAAuP,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,CAAC,yYAAsZE,EAAEC,EAAE,CAAC,KAAK,0CAA0C,YAAY,GAAG,OAAO,YAAY,aAAa,GAAG,QAAQ,oBAAoB,aAAa,GAAG,SAAsBD,EAAEE,EAAE,EAAE,CAAC,SAAS,wDAAwD,CAAC,CAAC,CAAC,EAAE,GAAG,CAAC,CAAC,EAAeF,EAAE,KAAK,CAAC,SAAS,6CAA6C,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,CAAC,wKAAqLE,EAAEC,EAAE,CAAC,KAAK,qEAAqE,YAAY,GAAG,OAAO,YAAY,aAAa,GAAG,QAAQ,oBAAoB,aAAa,GAAG,SAAsBD,EAAEE,EAAE,EAAE,CAAC,SAAS,oEAAoE,CAAC,CAAC,CAAC,EAAE,GAAG,CAAC,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,ibAAib,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,oBAAoB,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,CAAC,kIAA+IE,EAAEC,EAAE,CAAC,KAAK,2CAA2C,YAAY,GAAG,OAAO,YAAY,aAAa,GAAG,QAAQ,oBAAoB,aAAa,GAAG,SAAsBD,EAAEE,EAAE,EAAE,CAAC,SAAS,qBAAqB,CAAC,CAAC,CAAC,EAAE,4IAA4I,CAAC,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,4MAA4M,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,kBAAkB,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,mOAAmO,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,CAAC,oBAAiCE,EAAEC,EAAE,CAAC,KAAK,sEAAsE,YAAY,GAAG,OAAO,YAAY,aAAa,GAAG,QAAQ,oBAAoB,aAAa,GAAG,SAAsBD,EAAEE,EAAE,EAAE,CAAC,SAAS,mEAAmE,CAAC,CAAC,CAAC,EAAE,kCAA+CF,EAAEC,EAAE,CAAC,KAAK,6BAA6B,YAAY,GAAG,OAAO,YAAY,aAAa,GAAG,QAAQ,oBAAoB,aAAa,GAAG,SAAsBD,EAAEE,EAAE,EAAE,CAAC,SAAS,uBAAuB,CAAC,CAAC,CAAC,EAAE,qEAAqE,CAAC,CAAC,EAAeF,EAAE,KAAK,CAAC,SAAS,gCAAgC,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,+WAA+W,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,CAAC,gPAA6PE,EAAEC,EAAE,CAAC,KAAK,8CAA8C,YAAY,GAAG,OAAO,YAAY,aAAa,GAAG,QAAQ,oBAAoB,aAAa,GAAG,SAAsBD,EAAEE,EAAE,EAAE,CAAC,SAAS,sBAAsB,CAAC,CAAC,CAAC,EAAE,GAAG,CAAC,CAAC,CAAC,CAAC,CAAC,EAAesB,EAAwB1B,EAAIC,EAAS,CAAC,SAAS,CAAcC,EAAE,IAAI,CAAC,SAAS,kHAAkH,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,mTAAmT,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,CAAC,0JAAuKE,EAAEC,EAAE,CAAC,KAAK,yFAAyF,YAAY,GAAG,OAAO,YAAY,aAAa,GAAG,QAAQ,oBAAoB,aAAa,GAAG,SAAsBD,EAAEE,EAAE,EAAE,CAAC,SAAS,wCAAwC,CAAC,CAAC,CAAC,EAAE,mFAAmF,CAAC,CAAC,EAAeF,EAAE,KAAK,CAAC,SAAS,WAAW,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,kEAAkE,CAAC,EAAeF,EAAE,KAAK,CAAC,SAAS,CAAcE,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBA,EAAE,IAAI,CAAC,SAAS,2DAA2D,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBA,EAAE,IAAI,CAAC,SAAS,qGAAqG,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBA,EAAE,IAAI,CAAC,SAAS,+EAA+E,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,cAAc,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,qCAAqC,CAAC,EAAeF,EAAE,KAAK,CAAC,SAAS,CAAcE,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBA,EAAE,IAAI,CAAC,SAAS,qCAAqC,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBA,EAAE,IAAI,CAAC,SAAS,oGAAoG,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBA,EAAE,IAAI,CAAC,SAAS,8CAA8C,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBA,EAAE,IAAI,CAAC,SAAS,4DAA4D,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,CAAC,wLAAqME,EAAEC,EAAE,CAAC,KAAK,wCAAwC,YAAY,GAAG,OAAO,YAAY,aAAa,GAAG,QAAQ,oBAAoB,aAAa,GAAG,SAAsBD,EAAEE,EAAE,EAAE,CAAC,SAAS,6CAA6C,CAAC,CAAC,CAAC,EAAE,GAAG,CAAC,CAAC,CAAC,CAAC,CAAC,EAAeuB,EAAwB3B,EAAIC,EAAS,CAAC,SAAS,CAAcC,EAAE,IAAI,CAAC,SAAS,6GAA6G,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,iSAAiS,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,CAAC,+HAA4IE,EAAEC,EAAE,CAAC,KAAK,yFAAyF,YAAY,GAAG,OAAO,YAAY,aAAa,GAAG,QAAQ,oBAAoB,aAAa,GAAG,SAAsBD,EAAEE,EAAE,EAAE,CAAC,SAAS,wCAAwC,CAAC,CAAC,CAAC,EAAE,mFAAmF,CAAC,CAAC,EAAeF,EAAE,KAAK,CAAC,SAAS,WAAW,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,6DAA6D,CAAC,EAAeF,EAAE,KAAK,CAAC,SAAS,CAAcE,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBA,EAAE,IAAI,CAAC,SAAS,sEAAsE,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBA,EAAE,IAAI,CAAC,SAAS,gFAAgF,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBA,EAAE,IAAI,CAAC,SAAS,gFAAgF,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,cAAc,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,qCAAqC,CAAC,EAAeF,EAAE,KAAK,CAAC,SAAS,CAAcE,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBA,EAAE,IAAI,CAAC,SAAS,qCAAqC,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBA,EAAE,IAAI,CAAC,SAAS,kFAAkF,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBA,EAAE,IAAI,CAAC,SAAS,8CAA8C,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBA,EAAE,IAAI,CAAC,SAAS,4DAA4D,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,CAAC,8KAA2LE,EAAEC,EAAE,CAAC,KAAK,wCAAwC,YAAY,GAAG,OAAO,YAAY,aAAa,GAAG,QAAQ,oBAAoB,aAAa,GAAG,SAAsBD,EAAEE,EAAE,EAAE,CAAC,SAAS,6CAA6C,CAAC,CAAC,CAAC,EAAE,GAAG,CAAC,CAAC,CAAC,CAAC,CAAC,EACx3iJwB,EAAqB,CAAC,QAAU,CAAC,SAAW,CAAC,KAAO,WAAW,YAAc,CAAC,sBAAwB,GAAG,CAAC,EAAE,UAAY,CAAC,KAAO,WAAW,YAAc,CAAC,sBAAwB,GAAG,CAAC,EAAE,WAAa,CAAC,KAAO,WAAW,YAAc,CAAC,sBAAwB,GAAG,CAAC,EAAE,WAAa,CAAC,KAAO,WAAW,YAAc,CAAC,sBAAwB,GAAG,CAAC,EAAE,UAAY,CAAC,KAAO,WAAW,YAAc,CAAC,sBAAwB,GAAG,CAAC,EAAE,UAAY,CAAC,KAAO,WAAW,YAAc,CAAC,sBAAwB,GAAG,CAAC,EAAE,WAAa,CAAC,KAAO,WAAW,YAAc,CAAC,sBAAwB,GAAG,CAAC,EAAE,WAAa,CAAC,KAAO,WAAW,YAAc,CAAC,sBAAwB,GAAG,CAAC,EAAE,WAAa,CAAC,KAAO,WAAW,YAAc,CAAC,sBAAwB,GAAG,CAAC,EAAE,WAAa,CAAC,KAAO,WAAW,YAAc,CAAC,sBAAwB,GAAG,CAAC,EAAE,UAAY,CAAC,KAAO,WAAW,YAAc,CAAC,sBAAwB,GAAG,CAAC,EAAE,UAAY,CAAC,KAAO,WAAW,YAAc,CAAC,sBAAwB,GAAG,CAAC,EAAE,UAAY,CAAC,KAAO,WAAW,YAAc,CAAC,sBAAwB,GAAG,CAAC,EAAE,UAAY,CAAC,KAAO,WAAW,YAAc,CAAC,sBAAwB,GAAG,CAAC,EAAE,UAAY,CAAC,KAAO,WAAW,YAAc,CAAC,sBAAwB,GAAG,CAAC,EAAE,WAAa,CAAC,KAAO,WAAW,YAAc,CAAC,sBAAwB,GAAG,CAAC,EAAE,WAAa,CAAC,KAAO,WAAW,YAAc,CAAC,sBAAwB,GAAG,CAAC,EAAE,WAAa,CAAC,KAAO,WAAW,YAAc,CAAC,sBAAwB,GAAG,CAAC,EAAE,WAAa,CAAC,KAAO,WAAW,YAAc,CAAC,sBAAwB,GAAG,CAAC,EAAE,WAAa,CAAC,KAAO,WAAW,YAAc,CAAC,sBAAwB,GAAG,CAAC,EAAE,UAAY,CAAC,KAAO,WAAW,YAAc,CAAC,sBAAwB,GAAG,CAAC,EAAE,WAAa,CAAC,KAAO,WAAW,YAAc,CAAC,sBAAwB,GAAG,CAAC,EAAE,WAAa,CAAC,KAAO,WAAW,YAAc,CAAC,sBAAwB,GAAG,CAAC,EAAE,WAAa,CAAC,KAAO,WAAW,YAAc,CAAC,sBAAwB,GAAG,CAAC,EAAE,mBAAqB,CAAC,KAAO,UAAU,CAAC,CAAC",
  "names": ["richText", "u", "x", "p", "Link", "motion", "richText1", "richText2", "richText3", "richText4", "richText5", "richText6", "richText7", "richText8", "richText9", "richText10", "richText11", "richText12", "richText13", "richText14", "richText15", "richText16", "richText17", "richText18", "richText19", "richText20", "richText21", "richText22", "richText23", "__FramerMetadata__"]
}
