{
  "version": 3,
  "sources": ["ssg:https://framerusercontent.com/modules/v6qiqVdQy2sNMmWI9NF7/2g1pmlqd8ioOKRQBOKkc/SyBeQVkaI-5.js"],
  "sourcesContent": ["import{jsx as e,jsxs as t}from\"react/jsx-runtime\";import{Link as o}from\"framer\";import{motion as n}from\"framer-motion\";import*as i from\"react\";export const richText=/*#__PURE__*/t(i.Fragment,{children:[/*#__PURE__*/e(\"p\",{children:\"Continuously audit and monitor EC2 Volume configurations and enforce security compliance as code with Panther.\"}),/*#__PURE__*/e(\"p\",{children:\"EBS volume is a durable, block-level storage device that you can attach to your EC2 instances. Use Panther to track real-time changes to your EC2 volume to ensure configurations meet your business requirements for security and compliance.\"}),/*#__PURE__*/t(\"p\",{children:[\"Monitoring EC2 Volume is critical for understanding the history of boot and data volumes and detecting suspicious activity. Use Panther's built in policies for \",/*#__PURE__*/e(o,{href:\"https://github.com/panther-labs/panther-analysis/tree/master/policies/aws_ec2_policies\",motionChild:!0,nodeId:\"SyBeQVkaI\",openInNewTab:!0,scopeId:\"contentManagement\",smoothScroll:!1,children:/*#__PURE__*/e(n.a,{children:\"continuous monitoring of EC2 Volume resources\"})}),\", or write your own detections in Python to fit your internal business use cases.\"]}),/*#__PURE__*/e(\"h4\",{children:\"Use Cases\"}),/*#__PURE__*/e(\"p\",{children:\"Common security use cases for EC2 Volume with Panther include:\"}),/*#__PURE__*/t(\"ul\",{children:[/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/e(\"p\",{children:\"Encrypt both the boot and data volumes of an EC2 instance\"})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/e(\"p\",{children:\"Encrypt the snapshot of an EC2 volume to protect against accidental data loss\"})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/e(\"p\",{children:\"Ensure that all EC2 volumes that contain CDE are encrypted\"})})]}),/*#__PURE__*/e(\"h4\",{children:\"How it Works\"}),/*#__PURE__*/e(\"p\",{children:\"The integration is simple and fast:\"}),/*#__PURE__*/t(\"ul\",{children:[/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/e(\"p\",{children:\"Connect your AWS account to Panther\"})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/e(\"p\",{children:\"A baseline scan is performed to identify all existing EC2 Volumes enabled in your AWS account(s)\"})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/e(\"p\",{children:\"Built-in detections identify security issues\"})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/e(\"p\",{children:\"Alerts will be sent if non-compliant security group exists\"})})]}),/*#__PURE__*/t(\"p\",{children:[\"Use Panther to search all AMI in an AWS account by name, view their compliance status, associated policies, and configured remediations. Learn more about using Panther to \",/*#__PURE__*/e(o,{href:\"https://panther.com/integrations/aws/\",motionChild:!0,nodeId:\"SyBeQVkaI\",openInNewTab:!1,scopeId:\"contentManagement\",smoothScroll:!1,children:/*#__PURE__*/e(n.a,{children:\"analyze your AWS logs for security insights\"})}),\".\"]})]});export const richText1=/*#__PURE__*/t(i.Fragment,{children:[/*#__PURE__*/e(\"p\",{children:\"Continuously audit and monitor EC2 Network ACL configurations and enforce security compliance as code with Panther.\"}),/*#__PURE__*/e(\"p\",{children:\"A network access control list (ACL) is an additional layer of security for your VPC that acts as a firewall for controlling traffic in and out of one or more subnets. Use Panther to track real-time changes to your network ACL to ensure configurations meet your business requirements for security and compliance.\"}),/*#__PURE__*/t(\"p\",{children:[\"Monitoring network ACL is critical for understanding the history of network traffic changes in your VPC and detecting suspicious activity. Use Panther's built in policies for \",/*#__PURE__*/e(o,{href:\"https://github.com/panther-labs/panther-analysis/tree/master/policies/aws_vpc_policies\",motionChild:!0,nodeId:\"SyBeQVkaI\",openInNewTab:!0,scopeId:\"contentManagement\",smoothScroll:!1,children:/*#__PURE__*/e(n.a,{children:\"continuous monitoring of network ACL resources\"})}),\", or write your own detections in Python to fit your internal business use cases.\"]}),/*#__PURE__*/e(\"h4\",{children:\"Use Cases\"}),/*#__PURE__*/e(\"p\",{children:\"Common security use cases for EC2 Network ACL with Panther include:\"}),/*#__PURE__*/t(\"ul\",{children:[/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/e(\"p\",{children:\"Ensure Network ACLs block the usage of ports typically associated with insecure or unencrypted protocol\"})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/e(\"p\",{children:\"Ensure network ACLs have some restrictions on outbound and inbound traffic.\"})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/e(\"p\",{children:\"Ensure SSH access is granted only from protected network CIDR ranges.\"})})]}),/*#__PURE__*/e(\"h4\",{children:\"How it Works\"}),/*#__PURE__*/e(\"p\",{children:\"The integration is simple and fast:\"}),/*#__PURE__*/t(\"ul\",{children:[/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/e(\"p\",{children:\"Connect your AWS account to Panther\"})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/e(\"p\",{children:\"A baseline scan is performed to identify all existing Network ACL in your VPC(s)\"})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/e(\"p\",{children:\"Built-in detections identify security issues\"})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/e(\"p\",{children:\"Alerts will be sent if non-compliant Network ACL exists\"})})]}),/*#__PURE__*/t(\"p\",{children:[\"Use Panther to search all Network ACLs in a VPC account by name, view their compliance status, associated policies, and configured remediations. Learn more about using Panther to \",/*#__PURE__*/e(o,{href:\"https://panther.com/integrations/aws/\",motionChild:!0,nodeId:\"SyBeQVkaI\",openInNewTab:!1,scopeId:\"contentManagement\",smoothScroll:!1,children:/*#__PURE__*/e(n.a,{children:\"analyze your AWS logs for security insights.\"})})]})]});export const richText2=/*#__PURE__*/t(i.Fragment,{children:[/*#__PURE__*/e(\"p\",{children:\"Continuously audit and monitor EC2 Security Group configurations and enforce security compliance as code with Panther.\"}),/*#__PURE__*/e(\"p\",{children:\"A security group acts as a virtual firewall for your EC2 instances to control incoming and outgoing traffic. Use Panther to track real-time changes to your security group to ensure configurations meet your business requirements for security and compliance.\"}),/*#__PURE__*/t(\"p\",{children:[\"Monitoring security group is critical for understanding the history of network traffic changes in your EC2 and detecting suspicious activity. Use Panther's built in policies for \",/*#__PURE__*/e(o,{href:\"https://github.com/panther-labs/panther-analysis/tree/master/policies/aws_vpc_policies\",motionChild:!0,nodeId:\"SyBeQVkaI\",openInNewTab:!0,scopeId:\"contentManagement\",smoothScroll:!1,children:/*#__PURE__*/e(n.a,{children:\"continuous monitoring of security group resources\"})}),\", or write your own detections in Python to fit your internal business use cases.\"]}),/*#__PURE__*/e(\"h4\",{children:\"Use Cases\"}),/*#__PURE__*/e(\"p\",{children:\"Common security use cases for EC2 Security Group with Panther include:\"}),/*#__PURE__*/t(\"ul\",{children:[/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/e(\"p\",{children:\"Ensure security groups have restrictive permission sets that both limit the total number of open ports, as well as limiting ports typically associated with insecure protocols.\"})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/e(\"p\",{children:\"Ensure security groups have restrictions on outbound and inbound traffic.\"})})]}),/*#__PURE__*/e(\"h4\",{children:\"How it Works\"}),/*#__PURE__*/e(\"p\",{children:\"The integration is simple and fast:\"}),/*#__PURE__*/t(\"ul\",{children:[/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/e(\"p\",{children:\"Connect your AWS account to Panther\"})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/e(\"p\",{children:\"A baseline scan is performed to identify all existing security group in your EC2 instances\"})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/e(\"p\",{children:\"Built-in detections identify security issues\"})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/e(\"p\",{children:\"Alerts will be sent if non-compliant security group exists\"})})]}),/*#__PURE__*/t(\"p\",{children:[\"Use Panther to search all security groups in an EC2 account by name, view their compliance status, associated policies, and configured remediations. Learn more about using Panther to \",/*#__PURE__*/e(o,{href:\"https://panther.com/integrations/aws/\",motionChild:!0,nodeId:\"SyBeQVkaI\",openInNewTab:!1,scopeId:\"contentManagement\",smoothScroll:!1,children:/*#__PURE__*/e(n.a,{children:\"analyze your AWS logs for security insights\"})}),\".\"]})]});export const richText3=/*#__PURE__*/t(i.Fragment,{children:[/*#__PURE__*/e(\"p\",{children:\"Enable your team's security alerting pipeline with Panther's PagerDuty integration.\"}),/*#__PURE__*/e(\"p\",{children:\"When your detections are triggered, Panther will send an alert to PagerDuty. Your team can then analyze the alert, begin an investigation, or remediate the vulnerability.\"}),/*#__PURE__*/e(\"p\",{children:\"PagerDuty is an ideal destination for high and critical severity alerts that require immediate action. With PagerDuty, you can review incident timelines, pertinent notes, and gain more control over your team's response.\"}),/*#__PURE__*/e(\"h4\",{children:\"How it Works\"}),/*#__PURE__*/t(\"ul\",{children:[/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/t(\"p\",{children:[\"Set up a new \",/*#__PURE__*/e(o,{href:\"https://docs.panther.com/destinations/pagerduty\",motionChild:!0,nodeId:\"SyBeQVkaI\",openInNewTab:!1,scopeId:\"contentManagement\",smoothScroll:!1,children:/*#__PURE__*/e(n.a,{children:\"PagerDuty Integration\"})})]})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/e(\"p\",{children:\"Configure PagerDuty as a Destination in Panther\"})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/e(\"p\",{children:\"Configure a specific rule to use this new destination or rely on the default mapping based on the severity\"})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/e(\"p\",{children:\"Sit back and monitor your activity!\"})})]}),/*#__PURE__*/t(\"p\",{children:[\"Learn how to \",/*#__PURE__*/e(o,{href:\"https://docs.panther.com/destinations/pagerduty\",motionChild:!0,nodeId:\"SyBeQVkaI\",openInNewTab:!1,scopeId:\"contentManagement\",smoothScroll:!1,children:/*#__PURE__*/e(n.a,{children:\"configure PagerDuty\"})}),\" as an alert destination in Panther.\"]})]});export const richText4=/*#__PURE__*/t(i.Fragment,{children:[/*#__PURE__*/e(\"p\",{children:\"Enable your team's automated security alerting pipeline with Panther's SNS integration.\"}),/*#__PURE__*/e(\"p\",{children:\"When your detections are triggered, Panther can use SNS to send programmatic alerts to downstream systems like email. Your team can then analyze the notification, begin an investigation, and remediate the vulnerability.\"}),/*#__PURE__*/e(\"h4\",{children:\"How it Works\"}),/*#__PURE__*/t(\"ul\",{children:[/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/t(\"p\",{children:[\"Set up a new or existing \",/*#__PURE__*/e(o,{href:\"https://docs.panther.com/destinations/sns\",motionChild:!0,nodeId:\"SyBeQVkaI\",openInNewTab:!1,scopeId:\"contentManagement\",smoothScroll:!1,children:/*#__PURE__*/e(n.a,{children:\"SNS Topic \"})})]})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/e(\"p\",{children:\"Configure SNS as a Destination in Panther\"})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/e(\"p\",{children:\"Configure a specific rule to use this new destination, or rely on the default mapping based on severity\"})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/e(\"p\",{children:\"Sit back and monitor your activity!\"})})]}),/*#__PURE__*/t(\"p\",{children:[\"Learn how to \",/*#__PURE__*/e(o,{href:\"https://docs.panther.com/destinations/sns\",motionChild:!0,nodeId:\"SyBeQVkaI\",openInNewTab:!1,scopeId:\"contentManagement\",smoothScroll:!1,children:/*#__PURE__*/e(n.a,{children:\"configure SNS\"})}),\" as an alert destination in Panther.\"]})]});export const richText5=/*#__PURE__*/t(i.Fragment,{children:[/*#__PURE__*/e(\"h3\",{children:\"Integration Overview\"}),/*#__PURE__*/e(\"p\",{children:\"Google Cloud Platform, or GCP, is a widely used suite of computing, networking, data, machine learning, storage, and management services provided by Google. Panther can collect, normalize, and monitor GCP logs to help you identify suspicious activity across your Google Cloud services in real time. Your normalized data is then retained to power future security investigations in a data lake powered by Snowflake.\"}),/*#__PURE__*/e(\"h3\",{children:\"Use Cases for GCP Logs\"}),/*#__PURE__*/e(\"p\",{children:\"Panther supports the ingestion of both GCP Audit and HTTP Load Balancer logs, which contain detailed events of activity inside of your cloud accounts. Common SIEM use cases for GCP logs include:\"}),/*#__PURE__*/t(\"ul\",{children:[/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/e(\"p\",{children:\"Monitoring for any IAM role or permission changes\"})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/e(\"p\",{children:\"Ensuring adversaries don't access data objects from improperly secured cloud storage\"})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/e(\"p\",{children:\"Detecting updates or deletions of Google cloud storage buckets\"})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/e(\"p\",{children:\"Checking if a Gmail account is being used instead of a corporate email\"})})]}),/*#__PURE__*/e(\"h3\",{children:\"Onboarding Google Cloud Logs in Panther\"}),/*#__PURE__*/e(\"p\",{children:\"Panther's integration makes it fast and easy to ingest Google Cloud logs. Simply select Google Cloud from the list of pre-defined log sources, select your preferred data transport method (AWS S3, AWS SQS, or Google Cloud Storage), and configure GCP to push logs to your data transport source.\"}),/*#__PURE__*/t(\"p\",{children:[\"For more details on onboarding GCP logs or for supported log schema, you can \",/*#__PURE__*/e(o,{href:\"https://docs.panther.com/data-onboarding/supported-logs/gcp\",motionChild:!0,nodeId:\"SyBeQVkaI\",openInNewTab:!0,scopeId:\"contentManagement\",smoothScroll:!1,children:/*#__PURE__*/e(n.a,{children:\"view our GCP documentation here\"})}),\".\"]}),/*#__PURE__*/e(\"h3\",{children:\"Parsing, Normalizing, & Analyzing GCP Logs\"}),/*#__PURE__*/e(\"p\",{children:\"As Panther ingests GCP logs, they are parsed, normalized, and stored in a Snowflake security data lake. This allows you to build detections, identify anomalies, and conduct investigations in the context of days, weeks, or months of data.\"}),/*#__PURE__*/t(\"p\",{children:[\"Panther applies normalization fields to all log records, which standardizes names for attributes and empowers users to correlate data across all of your log sources. Panther's intuitive search tools - such as Query Builder, Data Explorer, and Indicator Search - allow you to conduct investigations for suspicious activity or vulnerabilities. For more information on searching logs, \",/*#__PURE__*/e(o,{href:\"https://docs.panther.com/data-analytics\",motionChild:!0,nodeId:\"SyBeQVkaI\",openInNewTab:!0,scopeId:\"contentManagement\",smoothScroll:!1,children:/*#__PURE__*/e(n.a,{children:\"check out our documentation on Investigations & Search\"})}),\".\"]}),/*#__PURE__*/e(\"h3\",{children:\"Built-in and Easily Customizable Detections\"}),/*#__PURE__*/t(\"p\",{children:[\"Pre-built detections for GCP Audit and HTTP Load Balancer logs are available by default in Panther, offering users immediate value for monitoring common IoCs and threats. You can \",/*#__PURE__*/e(o,{href:\"https://panther.com/product/detection-coverage/#filter=gcp\",motionChild:!0,nodeId:\"SyBeQVkaI\",openInNewTab:!1,scopeId:\"contentManagement\",smoothScroll:!1,children:/*#__PURE__*/e(n.a,{children:\" explore our built-in detection coverage for GCP logs here\"})}),\".\"]}),/*#__PURE__*/e(\"p\",{children:\"With Panther, you aren't confined to restrictive detections like most legacy SIEM solutions. Panther is architected around detection-as-code principles, giving you the ability to write Python to define detection logic and to integrate external systems like version control and CI/CD pipelines into your detection engineering processes. This results in powerful, scalable, and reusable scripting of detections for your security team.\"}),/*#__PURE__*/e(\"h3\",{children:\"Configuring Alerts\"}),/*#__PURE__*/t(\"p\",{children:[\"Panther generates alerts when your detection rules or policies for GCP logs are triggered, and integrates with a variety of \",/*#__PURE__*/e(o,{href:\"https://panther.com/integrations/alerts/\",motionChild:!0,nodeId:\"SyBeQVkaI\",openInNewTab:!1,scopeId:\"contentManagement\",smoothScroll:!1,children:/*#__PURE__*/e(n.a,{children:\" alert destinations\"})}),\" to allow for intuitive management of any alerts. Alerts can also be sent to alert context or SOAR platforms for more remediation options.\"]}),/*#__PURE__*/e(\"p\",{children:\"Alerts are categorized by five severity levels: Info, Low, Medium, High, and Critical. Your security team has the ability to dynamically assign severity based on specific log event attributes.\"}),/*#__PURE__*/e(\"h3\",{children:\"Customer Support\"}),/*#__PURE__*/e(\"p\",{children:\"If you have any questions about configuring or monitoring GCP logs in Panther, our customer support team is here to help. All customers have access to support via a dedicated Slack channel, email, or in-app messenger.\"}),/*#__PURE__*/t(\"p\",{children:[\"You can view our \",/*#__PURE__*/e(o,{href:\"https://docs.panther.com/data-onboarding/supported-logs/gcp\",motionChild:!0,nodeId:\"SyBeQVkaI\",openInNewTab:!0,scopeId:\"contentManagement\",smoothScroll:!1,children:/*#__PURE__*/e(n.a,{children:\"documentation on configuring GCP logs here\"})}),\", or customers can sign up for \",/*#__PURE__*/e(o,{href:\"https://pnthr.io/community\",motionChild:!0,nodeId:\"SyBeQVkaI\",openInNewTab:!1,scopeId:\"contentManagement\",smoothScroll:!1,children:/*#__PURE__*/e(n.a,{children:\"the Panther Community\"})}),\" to share best practices or custom detections.\"]}),/*#__PURE__*/e(\"h3\",{children:\"The Ideal SIEM for GCP Logs\"}),/*#__PURE__*/e(\"p\",{children:\"With Panther, your team doesn't have to pay excessive costs to keep up with the growth of cloud app data, waste time and resources on operational overhead, or struggle with limited detection logic. Panther was founded by a team of security engineers who struggled with other SIEM solutions first-hand, and built an intuitive, cloud-native platform to solve them.\"}),/*#__PURE__*/t(\"p\",{children:[\"Panther is a cloud-native SIEM built for security operations at scale, offering powerful detection-as-code, intuitive security workflows, and actionable real-time alerts. If you're searching for an ideal SIEM solution for GCP, \",/*#__PURE__*/e(o,{href:\"https://panther.com/product/request-a-demo/\",motionChild:!0,nodeId:\"SyBeQVkaI\",openInNewTab:!1,scopeId:\"contentManagement\",smoothScroll:!1,children:/*#__PURE__*/e(n.a,{children:\" request a demo today\"})}),\".\"]})]});export const richText6=/*#__PURE__*/t(i.Fragment,{children:[/*#__PURE__*/e(\"h3\",{children:\"Integration Overview\"}),/*#__PURE__*/e(\"p\",{children:\"Syslog is a built-in Unix command-line utility that offers a standard way for quickly exchanging log information. Panther can collect, normalize, and monitor Syslog logs to help you identify suspicious activity in real time. Your normalized log data is then retained to power future security investigations in a data lake powered by the cloud-native data platform, Snowflake.\"}),/*#__PURE__*/e(\"h3\",{children:\"Use Cases for Syslog Logs\"}),/*#__PURE__*/e(\"p\",{children:\"Panther supports the ingestion of both RFC3164 (BSD-syslog messages) and RFC5424 log formats. Some common security use cases for these log types include:\"}),/*#__PURE__*/t(\"ul\",{children:[/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/e(\"p\",{children:\"Monitoring remote system access\"})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/e(\"p\",{children:\"Alerting on sensitive sudo commands\"})})]}),/*#__PURE__*/e(\"h3\",{children:\"Onboarding Syslog Logs in Panther\"}),/*#__PURE__*/e(\"p\",{children:\"Panther supports ingesting Syslog logs via common Data Transport options: Amazon Web Services (AWS) S3, SQS, and CloudWatch. Setting Syslog up in Panther is fast and easy - simply create a new Syslog log source within the Panther console, choose your preferred data transport method, and configure Syslog to push logs to your chosen data transport source.\"}),/*#__PURE__*/t(\"p\",{children:[\"For more details on onboarding Syslog logs or for supported log schema, you can \",/*#__PURE__*/e(o,{href:\"https://docs.panther.com/data-onboarding/supported-logs/syslog\",motionChild:!0,nodeId:\"SyBeQVkaI\",openInNewTab:!1,scopeId:\"contentManagement\",smoothScroll:!1,children:/*#__PURE__*/e(n.a,{children:\"view our Syslog documentation here\"})}),\".\"]}),/*#__PURE__*/e(\"h3\",{children:\"Parsing, Normalizing, & Analyzing\"}),/*#__PURE__*/e(\"p\",{children:\"As Panther ingests Syslog logs, they are parsed, normalized, and stored in a Snowflake security data lake. This allows you to write detections, identify anomalies, and conduct investigations in the context of days, weeks, or months of data.\"}),/*#__PURE__*/t(\"p\",{children:[\"Panther applies normalization fields to log records, which standardizes names for attributes and enables you to correlate data across all of your log sources. Panther's handy search tools - such as Query Builder, Data Explorer, and Indicator Search - allow you to investigate your normalized logs for suspicious activity or vulnerabilities. For more information on searching logs, \",/*#__PURE__*/e(o,{href:\"https://docs.panther.com/data-analytics\",motionChild:!0,nodeId:\"SyBeQVkaI\",openInNewTab:!0,scopeId:\"contentManagement\",smoothScroll:!1,children:/*#__PURE__*/e(n.a,{children:\"check out our documentation on Investigations & Search\"})}),\".\"]}),/*#__PURE__*/e(\"h3\",{children:\"Detection as Code\"}),/*#__PURE__*/e(\"p\",{children:\"With Panther, you aren't confined to rigid detections as seen in many SIEM solutions. Panther is built around detection-as-code principles, giving you the ability to write Python to define detection logic and to integrate external systems like version control and CI/CD pipelines into your detection engineering processes. This results in powerful, flexible, and reusable scripting of detections for your security team.\"}),/*#__PURE__*/e(\"h3\",{children:\"Configuring Alerts\"}),/*#__PURE__*/t(\"p\",{children:[\"Panther generates alerts when your detection rules or policies for Syslog are triggered, and integrates with a variety of \",/*#__PURE__*/e(o,{href:\"https://panther.com/integrations/alerts/\",motionChild:!0,nodeId:\"SyBeQVkaI\",openInNewTab:!1,scopeId:\"contentManagement\",smoothScroll:!1,children:/*#__PURE__*/e(n.a,{children:\" alert destinations \"})}),\" to allow for intuitive management of any alerts. Alerts can also be sent to alert context or SOAR platforms for more remediation options.\"]}),/*#__PURE__*/e(\"p\",{children:\"Alerts are grouped into five different severity levels: Info, Low, Medium, High, and Critical. Your security team has the ability to dynamically assign severity based on specific log event attributes.\"}),/*#__PURE__*/e(\"h3\",{children:\"Customer Support\"}),/*#__PURE__*/e(\"p\",{children:\"If you have any questions about onboarding or monitoring Syslog logs in Panther, our customer support team is here to help. All customers have access to support via a dedicated Slack channel, email, or in-app messenger.\"}),/*#__PURE__*/t(\"p\",{children:[\"You can view our \",/*#__PURE__*/e(o,{href:\"https://docs.panther.com/data-onboarding/supported-logs/syslog\",motionChild:!0,nodeId:\"SyBeQVkaI\",openInNewTab:!0,scopeId:\"contentManagement\",smoothScroll:!1,children:/*#__PURE__*/e(n.a,{children:\"documentation on configuring and monitoring Syslog logs here\"})}),\", or customers can sign up for \",/*#__PURE__*/e(o,{href:\"https://pnthr.io/community\",motionChild:!0,nodeId:\"SyBeQVkaI\",openInNewTab:!0,scopeId:\"contentManagement\",smoothScroll:!1,children:/*#__PURE__*/e(n.a,{children:\"the Panther Community\"})}),\" to share best practices or custom detections for Syslog logs.\"]}),/*#__PURE__*/e(\"h3\",{children:\"The Ideal SIEM for Syslog\"}),/*#__PURE__*/e(\"p\",{children:\"With Panther, your team doesn't have to pay excessive costs to keep up with the growth of cloud app data, waste time and resources on operational overhead, or struggle with restrictive detection logic. Panther was founded by a team of security engineers who struggled with other SIEM solutions first-hand, and built an intuitive, cloud-native platform to meet today's security needs.\"}),/*#__PURE__*/t(\"p\",{children:[\"Panther is a cloud-native SIEM built for security operations at scale, offering flexible detection-as-code, intuitive security workflows, and actionable real-time alerts. For a powerful, practical, and scalable SIEM solution for Syslog, \",/*#__PURE__*/e(o,{href:\"https://panther.com/product/request-a-demo/\",motionChild:!0,nodeId:\"SyBeQVkaI\",openInNewTab:!1,scopeId:\"contentManagement\",smoothScroll:!1,children:/*#__PURE__*/e(n.a,{children:\" request a demo today\"})}),\".\"]})]});export const richText7=/*#__PURE__*/t(i.Fragment,{children:[/*#__PURE__*/e(\"h3\",{children:\"Integration Overview\"}),/*#__PURE__*/e(\"p\",{children:\"Fluentd is an open-source data collector for unifying various application logs, network protocols, IoT devices, and other data sources. Panther can collect, normalize, and monitor Fluentd logs to help you identify suspicious activity in real time. Your normalized data is then retained to conduct future security investigations in a data lake powered by Snowflake.\"}),/*#__PURE__*/e(\"h3\",{children:\"Use Cases for Fluentd Logs\"}),/*#__PURE__*/e(\"p\",{children:\"Some common SIEM use cases for Fluentd logs include:\"}),/*#__PURE__*/t(\"ul\",{children:[/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/e(\"p\",{children:\"Filtering Kubernetes audit logs\"})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/e(\"p\",{children:\"Contextualizing application logs\"})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/e(\"p\",{children:\"Monitoring Syslog\"})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/e(\"p\",{children:\"Tailing log files on Linux machines\"})})]}),/*#__PURE__*/e(\"h3\",{children:\"Onboarding Fluentd Logs in Panther\"}),/*#__PURE__*/e(\"p\",{children:\"Panther's integration for Fluentd is simple and quick to configure, allowing you to onboard your logs in just a few minutes. Simply select Fluentd from the list of pre-defined log sources, select your preferred data transport method (AWS S3 or SQS), and configure Fluentd to push logs to your data transport source.\"}),/*#__PURE__*/t(\"p\",{children:[\"For more details on onboarding Fluentd logs or for supported log schema, you can \",/*#__PURE__*/e(o,{href:\"https://docs.panther.com/data-onboarding/supported-logs/fluentd\",motionChild:!0,nodeId:\"SyBeQVkaI\",openInNewTab:!0,scopeId:\"contentManagement\",smoothScroll:!1,children:/*#__PURE__*/e(n.a,{children:\"view our Fluentd documentation here\"})}),\".\"]}),/*#__PURE__*/e(\"h3\",{children:\"Parsing, Normalizing, & Analyzing Fluentd Logs\"}),/*#__PURE__*/e(\"p\",{children:\"As Panther ingests Fluentd logs, they are parsed, normalized, and stored in a Snowflake security data lake. This allows you to build detections, identify anomalies, and conduct investigations in the context of days, weeks, or months of data.\"}),/*#__PURE__*/t(\"p\",{children:[\"Panther applies normalization fields to all log records, which standardizes names for attributes and enables users to correlate data across all of your log sources. Panther's intuitive search features allow you to conduct investigations for suspicious activity or vulnerabilities. For more information on searching logs, \",/*#__PURE__*/e(o,{href:\"https://docs.panther.com/data-analytics\",motionChild:!0,nodeId:\"SyBeQVkaI\",openInNewTab:!0,scopeId:\"contentManagement\",smoothScroll:!1,children:/*#__PURE__*/e(n.a,{children:\"check out our documentation on Investigations & Search\"})}),\".\"]}),/*#__PURE__*/e(\"h3\",{children:\"Easily Customizable Detections\"}),/*#__PURE__*/e(\"p\",{children:\"With Panther, you aren't confined to restrictive detections as seen in many SIEM solutions. Panther is architected around detection-as-code principles, giving you the ability to write Python to define detection logic and to integrate external systems like version control and CI/CD pipelines into your detection engineering processes. This results in powerful, flexible, and reusable scripting of detection logic for your security team.\"}),/*#__PURE__*/e(\"h3\",{children:\"Configuring Alerts\"}),/*#__PURE__*/t(\"p\",{children:[\"Panther generates alerts when your detection rules or policies for Fluentd are triggered, and integrates with a variety of \",/*#__PURE__*/e(o,{href:\"https://panther.com/integrations/alerts/\",motionChild:!0,nodeId:\"SyBeQVkaI\",openInNewTab:!1,scopeId:\"contentManagement\",smoothScroll:!1,children:/*#__PURE__*/e(n.a,{children:\"alert destinations\"})}),\" to allow for intuitive management of any alerts. Alerts can also be sent to alert context or SOAR platforms for more remediation options.\"]}),/*#__PURE__*/e(\"p\",{children:\"Alerts are categorized into five severity levels: Info, Low, Medium, High, and Critical. Your security team has the ability to dynamically assign severity based on specific log event attributes.\"}),/*#__PURE__*/e(\"h3\",{children:\"Customer Support\"}),/*#__PURE__*/e(\"p\",{children:\"If you have any questions about configuring or monitoring Fluentd logs in Panther, our support team is here to help. All customers have access to support via a dedicated Slack channel, email, or in-app messenger.\"}),/*#__PURE__*/t(\"p\",{children:[\"You can view our \",/*#__PURE__*/e(o,{href:\"https://docs.panther.com/data-onboarding/supported-logs/fluentd\",motionChild:!0,nodeId:\"SyBeQVkaI\",openInNewTab:!0,scopeId:\"contentManagement\",smoothScroll:!1,children:/*#__PURE__*/e(n.a,{children:\"documentation on configuring Fluentd logs here\"})}),\", or customers can sign up for \",/*#__PURE__*/e(o,{href:\"https://pnthr.io/community\",motionChild:!0,nodeId:\"SyBeQVkaI\",openInNewTab:!0,scopeId:\"contentManagement\",smoothScroll:!1,children:/*#__PURE__*/e(n.a,{children:\"the Panther Community\"})}),\" to share best practices or custom detections.\"]}),/*#__PURE__*/e(\"h3\",{children:\"Replacing Traditional SIEM for Fluentd\"}),/*#__PURE__*/e(\"p\",{children:\"With Panther, your team doesn't have to waste time and resources on operational overhead, pay excessive costs to keep up with the growth of cloud app data or struggle with limited detection logic. Panther was founded by a team of security engineers who struggled with other SIEM solutions first-hand, and built an intuitive, cloud-native platform to solve them.\"}),/*#__PURE__*/t(\"p\",{children:[\"Panther is a cloud-native SIEM built for security operations at scale, offering powerful detection-as-code, intuitive security workflows, and actionable real-time alerts. If you're searching for an ideal SIEM solution for Fluentd, \",/*#__PURE__*/e(o,{href:\"https://panther.com/product/request-a-demo/\",motionChild:!0,nodeId:\"SyBeQVkaI\",openInNewTab:!1,scopeId:\"contentManagement\",smoothScroll:!1,children:/*#__PURE__*/e(n.a,{children:\" request a demo today\"})}),\".\"]})]});export const richText8=/*#__PURE__*/t(i.Fragment,{children:[/*#__PURE__*/e(\"h3\",{children:\"Integration Overview\"}),/*#__PURE__*/e(\"p\",{children:\"Zeek (formerly Bro) is a network analysis tool for security monitoring that converts raw network traffic into logs that summarize a broad range of network activity. Panther can collect, normalize, and monitor Zeek logs to help you identify suspicious activity in real time. Your normalized log data is then retained to power future security investigations in a data lake powered by the cloud-native data platform, Snowflake.\"}),/*#__PURE__*/e(\"h3\",{children:\"Use Cases for Zeek Logs\"}),/*#__PURE__*/e(\"p\",{children:\"Panther' integration supports ingestion and monitoring of more than a dozen Zeek log types. Some common security use cases for Zeek logs include:\"}),/*#__PURE__*/t(\"ul\",{children:[/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/e(\"p\",{children:\"Monitoring suspicious network traffic\"})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/e(\"p\",{children:\"Gaining a deep understanding of your network activity and discovering operational anomalies\"})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/e(\"p\",{children:\"Finding security threats hiding in protocols like DNS\"})})]}),/*#__PURE__*/e(\"h3\",{children:\"Onboarding Zeek Logs in Panther\"}),/*#__PURE__*/e(\"p\",{children:\"Panther supports ingesting Zeek logs via common Data Transport options: Amazon Web Services (AWS) S3 and SQS. Setting Zeek up in Panther is fast and easy - simply create a new Zeek log source within the Panther console, choose your preferred data transport method, and configure Zeek to push logs to your chosen data transport source.\"}),/*#__PURE__*/t(\"p\",{children:[\"For more details on onboarding Zeek logs or for supported log schema, you can \",/*#__PURE__*/e(o,{href:\"https://docs.panther.com/data-onboarding/supported-logs/zeek\",motionChild:!0,nodeId:\"SyBeQVkaI\",openInNewTab:!0,scopeId:\"contentManagement\",smoothScroll:!1,children:/*#__PURE__*/e(n.a,{children:\"view our Zeek documentation here\"})}),\".\"]}),/*#__PURE__*/e(\"h3\",{children:\"Parsing, Normalizing, & Analyzing\"}),/*#__PURE__*/e(\"p\",{children:\"As Panther ingests Zeek logs, they are parsed, normalized, and stored in a Snowflake security data lake. This allows you to write detections, identify anomalies, and conduct investigations in the context of days, weeks, or months of data.\"}),/*#__PURE__*/t(\"p\",{children:[\"Panther applies normalization fields to log records, which standardizes names for attributes and enables you to correlate data across all of your log sources. Panther's handy search tools - such as Query Builder, Data Explorer, and Indicator Search - allow you to investigate your normalized logs for suspicious activity or vulnerabilities. For more information on searching logs, \",/*#__PURE__*/e(o,{href:\"https://docs.panther.com/data-analytics\",motionChild:!0,nodeId:\"SyBeQVkaI\",openInNewTab:!0,scopeId:\"contentManagement\",smoothScroll:!1,children:/*#__PURE__*/e(n.a,{children:\"check out our documentation on Investigations & Search\"})}),\".\"]}),/*#__PURE__*/e(\"h3\",{children:\"Detection as Code\"}),/*#__PURE__*/e(\"p\",{children:\"With Panther, you aren't confined to restrictive detections as seen in many SIEM solutions. Panther is built around detection-as-code principles, giving you the ability to write Python to define detection logic and to integrate external systems like version control and CI/CD pipelines into your detection engineering processes. This results in powerful, flexible, and reusable scripting of detections for your security team.\"}),/*#__PURE__*/t(\"p\",{children:[\"Pre-built detections for Zeek are available in Panther, offering you the ability to immediately monitor for common IoCs and threats. You can \",/*#__PURE__*/e(o,{href:\"https://panther.com/product/detection-coverage/#filter=zeek\",motionChild:!0,nodeId:\"SyBeQVkaI\",openInNewTab:!1,scopeId:\"contentManagement\",smoothScroll:!1,children:/*#__PURE__*/e(n.a,{children:\" explore our built-in detection coverage for Zeek logs here\"})}),\".\"]}),/*#__PURE__*/e(\"h3\",{children:\"Configuring Alerts\"}),/*#__PURE__*/t(\"p\",{children:[\"Panther generates alerts when your detection rules or policies for Zeek are triggered, and integrates with a variety of \",/*#__PURE__*/e(o,{href:\"https://panther.com/integrations/alerts/\",motionChild:!0,nodeId:\"SyBeQVkaI\",openInNewTab:!1,scopeId:\"contentManagement\",smoothScroll:!1,children:/*#__PURE__*/e(n.a,{children:\" alert destinations \"})}),\" to allow for intuitive management of any alerts. Alerts can also be sent to alert context or SOAR platforms for more remediation options.\"]}),/*#__PURE__*/e(\"p\",{children:\"Alerts are categorized by five different severity levels: Info, Low, Medium, High, and Critical. Your security team has the ability to dynamically assign severity based on specific log event attributes.\"}),/*#__PURE__*/e(\"h3\",{children:\"Customer Support\"}),/*#__PURE__*/e(\"p\",{children:\"If you have any questions about onboarding or monitoring Zeek logs in Panther, our customer support team is here to help. All customers have access to support via a dedicated Slack channel, email, or in-app messenger.\"}),/*#__PURE__*/t(\"p\",{children:[\"You can view our \",/*#__PURE__*/e(o,{href:\"https://docs.panther.com/data-onboarding/supported-logs/zeek\",motionChild:!0,nodeId:\"SyBeQVkaI\",openInNewTab:!0,scopeId:\"contentManagement\",smoothScroll:!1,children:/*#__PURE__*/e(n.a,{children:\"documentation on configuring and monitoring Zeek logs here\"})}),\", or customers can sign up for \",/*#__PURE__*/e(o,{href:\"https://pnthr.io/community\",motionChild:!0,nodeId:\"SyBeQVkaI\",openInNewTab:!0,scopeId:\"contentManagement\",smoothScroll:!1,children:/*#__PURE__*/e(n.a,{children:\"the Panther Community\"})}),\" to share best practices or custom detections for Zeek logs.\"]}),/*#__PURE__*/e(\"h3\",{children:\"The Ideal SIEM for Zeek\"}),/*#__PURE__*/e(\"p\",{children:\"With Panther, your team doesn't have to struggle with restrictive detection logic, pay excessive costs to keep up with the growth of cloud app data, or waste time and resources on operational overhead. Panther is built by a team of security engineers who struggled with other SIEM solutions first-hand, and built an intuitive, cloud-native platform to meet today's security needs.\"}),/*#__PURE__*/t(\"p\",{children:[\"Panther is a cloud-native SIEM built for security operations at scale, offering flexible detection-as-code, intuitive security workflows, and actionable real-time alerts. For a powerful, fast, and scalable SIEM solution for Zeek, \",/*#__PURE__*/e(o,{href:\"https://panther.com/product/request-a-demo/\",motionChild:!0,nodeId:\"SyBeQVkaI\",openInNewTab:!1,scopeId:\"contentManagement\",smoothScroll:!1,children:/*#__PURE__*/e(n.a,{children:\" request a demo today\"})}),\".\"]})]});export const richText9=/*#__PURE__*/t(i.Fragment,{children:[/*#__PURE__*/e(\"h3\",{children:\"Integration Overview\"}),/*#__PURE__*/e(\"p\",{children:\"Cisco Umbrella is a secure web gateway that collects information about services, incidents, and threats on your network. Panther can collect, normalize, and monitor Cisco Umbrella logs to help you identify suspicious activity in real time. Your normalized data is then retained to power future security investigations in a data lake powered by AWS or the cloud-native data platform, Snowflake.\"}),/*#__PURE__*/e(\"h3\",{children:\"Use Cases for Cisco Umbrella Logs\"}),/*#__PURE__*/e(\"p\",{children:\"Panther supports the ingestion of Cloud Firewall, DNS, IP, and Proxy log types via Cisco Umbrella. Some common SIEM use cases for these log types include:\"}),/*#__PURE__*/t(\"ul\",{children:[/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/e(\"p\",{children:\"Monitoring for suspicious, malicious, or blocked domains\"})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/e(\"p\",{children:\"Identifying lookups to suspicious domains that may indicate a phishing attack\"})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/e(\"p\",{children:\"Detecting DNS requests to sites posing as SSO domains\"})})]}),/*#__PURE__*/e(\"h3\",{children:\"Onboarding Cisco Umbrella Logs in Panther\"}),/*#__PURE__*/e(\"p\",{children:\"Panther's integration for Cisco Umbrella is simple to configure, allowing you to onboard logs in just a few minutes. Simply select Cisco Umbrella from the list of log sources in the Panther console, choose your preferred data transport method, and configure Cisco Umbrella to push logs to your data transport source.\"}),/*#__PURE__*/t(\"p\",{children:[\"For more details on onboarding Cisco Umbrella logs or for supported log schema, you can \",/*#__PURE__*/e(o,{href:\"https://docs.panther.com/data-onboarding/supported-logs/ciscoumbrella\",motionChild:!0,nodeId:\"SyBeQVkaI\",openInNewTab:!0,scopeId:\"contentManagement\",smoothScroll:!1,children:/*#__PURE__*/e(n.a,{children:\"view our Cisco Umbrella documentation here\"})}),\".\"]}),/*#__PURE__*/e(\"h3\",{children:\"Parsing, Normalizing, & Analyzing\"}),/*#__PURE__*/e(\"p\",{children:\"As Panther ingests Cisco Umbrella logs, they are parsed, normalized, and stored in a Snowflake security data lake. This allows you to write detections, identify anomalies, and conduct investigations in the context of days, weeks, or months of data.\"}),/*#__PURE__*/t(\"p\",{children:[\"Panther applies normalization fields to all log records, which standardizes names for attributes and empowers users to correlate data across all of your log sources. You can then use Panther's various search tools - such as Query Builder, Data Explorer, and Indicator Search - to investigate your normalized logs for suspicious activity or vulnerabilities. For more information on searching logs, \",/*#__PURE__*/e(o,{href:\"https://docs.panther.com/data-analytics\",motionChild:!0,nodeId:\"SyBeQVkaI\",openInNewTab:!0,scopeId:\"contentManagement\",smoothScroll:!1,children:/*#__PURE__*/e(n.a,{children:\"check out our documentation on Investigations & Search\"})}),\".\"]}),/*#__PURE__*/e(\"h3\",{children:\"Built-in and Easily Customizable Detections\"}),/*#__PURE__*/t(\"p\",{children:[\"A number of pre-built detections for Cisco Umbrella are available by default in Panther, offering users immediate value for monitoring common IoCs and DNS threats. You can \",/*#__PURE__*/e(o,{href:\"https://panther.com/product/detection-coverage/#filter=CiscoUmbrella\",motionChild:!0,nodeId:\"SyBeQVkaI\",openInNewTab:!1,scopeId:\"contentManagement\",smoothScroll:!1,children:/*#__PURE__*/e(n.a,{children:\" explore our built-in detection coverage for Cisco Umbrella logs here\"})}),\".\"]}),/*#__PURE__*/e(\"p\",{children:\"With Panther, you aren't confined to restrictive detections as seen in most SIEM solutions. Panther is architected around detection-as-code principles, giving you the ability to write Python to define detection logic and to integrate external systems like version control and CI/CD pipelines into your detection engineering processes. This results in powerful, flexible, and reusable scripting of detections for your security team.\"}),/*#__PURE__*/e(\"h3\",{children:\"Configuring Alerts\"}),/*#__PURE__*/t(\"p\",{children:[\"Panther generates alerts when your detection rules or policies are triggered, and integrates with a variety of \",/*#__PURE__*/e(o,{href:\"https://panther.com/integrations/alerts/\",motionChild:!0,nodeId:\"SyBeQVkaI\",openInNewTab:!1,scopeId:\"contentManagement\",smoothScroll:!1,children:/*#__PURE__*/e(n.a,{children:\"alert destinations\"})}),\" to allow for intuitive management of any alerts. Alerts can also be sent to alert context or SOAR platforms for more remediation options.\"]}),/*#__PURE__*/e(\"p\",{children:\"Alerts are categorized by five different severity levels: Info, Low, Medium, High, and Critical. Your security team has the ability to dynamically assign severity based on specific log event attributes.\"}),/*#__PURE__*/e(\"h3\",{children:\"Customer Support\"}),/*#__PURE__*/e(\"p\",{children:\"If you have any questions about configuring or monitoring Cisco Umbrella logs in Panther, our customer support team is here to help. All customers have access to support via a dedicated Slack channel, email, or in-app messenger.\"}),/*#__PURE__*/t(\"p\",{children:[\"You can view our \",/*#__PURE__*/e(o,{href:\"https://docs.panther.com/data-onboarding/supported-logs/ciscoumbrella\",motionChild:!0,nodeId:\"SyBeQVkaI\",openInNewTab:!0,scopeId:\"contentManagement\",smoothScroll:!1,children:/*#__PURE__*/e(n.a,{children:\"documentation on configuring Cisco Umbrella logs here\"})}),\", or customers can sign up for \",/*#__PURE__*/e(o,{href:\"https://pnthr.io/community\",motionChild:!0,nodeId:\"SyBeQVkaI\",openInNewTab:!0,scopeId:\"contentManagement\",smoothScroll:!1,children:/*#__PURE__*/e(n.a,{children:\"the Panther Community\"})}),\" to share best practices or custom detections for Cisco Umbrella logs.\"]}),/*#__PURE__*/e(\"h3\",{children:\"Replacing Traditional SIEM for Cisco Umbrella\"}),/*#__PURE__*/e(\"p\",{children:\"With Panther, your team doesn't have to pay excessive costs to keep up with the growth of cloud app data, struggle with restrictive detection logic, or waste time and resources on operational overhead. Panther was founded by a team of security engineers who struggled with today's SIEM challenges first-hand, and built an intuitive, cloud-native platform to solve them.\"}),/*#__PURE__*/t(\"p\",{children:[\"Panther is a cloud-native SIEM built for security operations at scale, offering flexible detection-as-code, intuitive security workflows, and actionable real-time alerts. If you're searching for a seamless SIEM solution for Cisco Umbrella, \",/*#__PURE__*/e(o,{href:\"https://panther.com/product/request-a-demo/\",motionChild:!0,nodeId:\"SyBeQVkaI\",openInNewTab:!1,scopeId:\"contentManagement\",smoothScroll:!1,children:/*#__PURE__*/e(n.a,{children:\" request a demo today\"})}),\".\"]})]});export const richText10=/*#__PURE__*/t(i.Fragment,{children:[/*#__PURE__*/e(\"h3\",{children:\"Integration Overview\"}),/*#__PURE__*/e(\"p\",{children:\"Juniper is a widely used networking firewall solution and services gateway. Panther can collect, normalize, and monitor Juniper logs to help you identify suspicious network activity in real time. Your normalized data is then retained to enable future security investigations in a serverless data lake powered by Snowflake.\"}),/*#__PURE__*/e(\"h3\",{children:\"Use Cases for Juniper Logs\"}),/*#__PURE__*/e(\"p\",{children:\"Panther supports six types of log types for Juniper's WebApp Secure: Access, Security, Audit, Firewall, mws, and Postgres. Common security use cases for these log types include:\"}),/*#__PURE__*/t(\"ul\",{children:[/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/e(\"p\",{children:\"Monitoring suspicious network traffic\"})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/e(\"p\",{children:\"Detecting port scanning activity\"})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/e(\"p\",{children:\"Inspecting blocked domains\"})})]}),/*#__PURE__*/e(\"h3\",{children:\"Onboarding Juniper with Panther\"}),/*#__PURE__*/e(\"p\",{children:\"Panther's integration for Juniper is simple and quick to configure, allowing you to onboard your logs in just a few minutes. Simply select Juniper from the list of pre-defined log sources, select your preferred data transport method (AWS S3 or SQS), and configure Juniper to push logs to your data transport source.\"}),/*#__PURE__*/t(\"p\",{children:[\"For more details on onboarding Juniper logs or for supported log schema, you can \",/*#__PURE__*/e(o,{href:\"https://docs.panther.com/data-onboarding/supported-logs/juniper\",motionChild:!0,nodeId:\"SyBeQVkaI\",openInNewTab:!0,scopeId:\"contentManagement\",smoothScroll:!1,children:/*#__PURE__*/e(n.a,{children:\"view our Juniper documentation here\"})}),\".\"]}),/*#__PURE__*/e(\"h3\",{children:\"Parsing, Normalizing, & Analyzing Juniper Logs\"}),/*#__PURE__*/e(\"p\",{children:\"As Panther ingests your Juniper logs, they are parsed, normalized, and stored in a Snowflake security data lake. This allows your security team to build detections, identify anomalies, and conduct investigations on Juniper logs in the context of days, weeks, or months of data.\"}),/*#__PURE__*/t(\"p\",{children:[\"Panther applies normalization fields to all log records, which standardizes names for attributes and allows you to correlate data across all log sources. You can use Panther's various search tools - such as Data Explorer, Indicator Search, and Query Builder - to investigate your normalized logs for suspicious activity or vulnerabilities. For more on querying and searching normalized log data in Panther, \",/*#__PURE__*/e(o,{href:\"https://docs.panther.com/data-analytics\",motionChild:!0,nodeId:\"SyBeQVkaI\",openInNewTab:!0,scopeId:\"contentManagement\",smoothScroll:!1,children:/*#__PURE__*/e(n.a,{children:\"check out our documentation on Investigations & Search\"})}),\".\"]}),/*#__PURE__*/e(\"h3\",{children:\"Built-In & Easily Customizable Detections\"}),/*#__PURE__*/t(\"p\",{children:[\"A number of pre-built detections are available by default in Panther, offering users immediate value for monitoring common IoCs and threats. You can \",/*#__PURE__*/e(o,{href:\"https://panther.com/product/detection-coverage/#filter=juniper\",motionChild:!0,nodeId:\"SyBeQVkaI\",openInNewTab:!1,scopeId:\"contentManagement\",smoothScroll:!1,children:/*#__PURE__*/e(n.a,{children:\" explore our built-in detection coverage for Juniper logs here\"})}),\".\"]}),/*#__PURE__*/e(\"p\",{children:\"With Panther, your team won't be confined to restrictive detection rules as seen in other SIEM platforms. Panther is built around detection-as-code principles, giving you the ability to write Python to define detection logic and to integrate external systems like version control and CI/CD pipelines into your detection engineering processes. This results in powerful, flexible, and reusable scripting of detections for your team.\"}),/*#__PURE__*/e(\"h3\",{children:\"Configuring Alerts\"}),/*#__PURE__*/t(\"p\",{children:[\"Panther fire alerts when your detection rules or policies for Juniper are triggered, and integrates with a variety of \",/*#__PURE__*/e(o,{href:\"https://panther.com/integrations/alerts/\",motionChild:!0,nodeId:\"SyBeQVkaI\",openInNewTab:!1,scopeId:\"contentManagement\",smoothScroll:!1,children:/*#__PURE__*/e(n.a,{children:\" alert destinations\"})}),\" to allow for easy access and management of alerts for your security team. Alerts can also be sent to alert context or SOAR platforms for more remediation options.\"]}),/*#__PURE__*/e(\"p\",{children:\"Alerts are grouped into five different severity levels: Info, Low, Medium, High, and Critical. Security teams have the options to dynamically designate severity based on specific log event attributes.\"}),/*#__PURE__*/e(\"h3\",{children:\"Customer Support\"}),/*#__PURE__*/e(\"p\",{children:\"If you have any questions about ingesting or monitoring Juniper logs in Panther, we're here to help. All customers have access to our technical support team via a dedicated Slack channel, email, or in-app messenger.\"}),/*#__PURE__*/t(\"p\",{children:[\"You can view our \",/*#__PURE__*/e(o,{href:\"https://docs.panther.com/data-onboarding/supported-logs/juniper\",motionChild:!0,nodeId:\"SyBeQVkaI\",openInNewTab:!0,scopeId:\"contentManagement\",smoothScroll:!1,children:/*#__PURE__*/e(n.a,{children:\"detailed documentation on configuring and monitoring Juniper logs here\"})}),\", or customers can join \",/*#__PURE__*/e(o,{href:\"https://pnthr.io/community\",motionChild:!0,nodeId:\"SyBeQVkaI\",openInNewTab:!0,scopeId:\"contentManagement\",smoothScroll:!1,children:/*#__PURE__*/e(n.a,{children:\"the Panther Community\"})}),\" to share best practices or custom detections for monitoring Juniper.\"]}),/*#__PURE__*/e(\"h3\",{children:\"Replacing Traditional SIEM for Juniper Log Monitoring\"}),/*#__PURE__*/e(\"p\",{children:\"With Panther, you don't have to waste precious time and effort on operational overhead, struggle with restrictive detections, or pay skyrocketing costs to keep up with the growth of your data. Panther was founded by a team of veteran security practitioners who struggled with legacy SIEM challenges first-hand, and built a scalable, cloud-native platform to solve them.\"}),/*#__PURE__*/t(\"p\",{children:[\"Panther is a cloud-native SIEM built for security operations at scale, offering powerful detection-as-code, intuitive security workflows, and actionable real-time alerts to keep up with the needs of today's security teams. For a powerful, practical, and scalable SIEM solution for Juniper,\\xac\u2020\",/*#__PURE__*/e(o,{href:\"https://panther.com/product/request-a-demo/\",motionChild:!0,nodeId:\"SyBeQVkaI\",openInNewTab:!1,scopeId:\"contentManagement\",smoothScroll:!1,children:/*#__PURE__*/e(n.a,{children:\"request a demo today\"})}),\".\"]})]});export const richText11=/*#__PURE__*/t(i.Fragment,{children:[/*#__PURE__*/e(\"h3\",{children:\"Integration Overview\"}),/*#__PURE__*/e(\"p\",{children:\"Suricata is both an intrusion detection system (IDS) and intrusion prevention system (IPS) used for network security monitoring. Panther can collect, normalize, and monitor Suricata audit logs to help you identify suspicious network activity in real time. Your normalized log data is then retained to power future security investigations in a data lake powered by the cloud-native data platform, Snowflake.\"}),/*#__PURE__*/e(\"h3\",{children:\"Use Cases for Suricata Audit Logs\"}),/*#__PURE__*/e(\"p\",{children:\"Panther supports the easy ingestion of a variety of Suricata log types, including Alert, Anomaly, DHCP, DNS, FileInfo, Flow, HTTP, SSH, and TLS. Some common security use cases for Suricata logs include monitoring for:\"}),/*#__PURE__*/t(\"ul\",{children:[/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/e(\"p\",{children:\"Identify lookups to suspicious domains that could indicate a phishing attack\"})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/e(\"p\",{children:\"Monitor traffic on remote access services like SSH, RDP, and more\"})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/e(\"p\",{children:\"Inspect blocked domains\"})})]}),/*#__PURE__*/e(\"h3\",{children:\"Onboarding Suricata Logs in Panther\"}),/*#__PURE__*/e(\"p\",{children:\"Panther supports ingesting Suricata logs via common Data Transport options: Amazon Web Services (AWS) S3, SQS, and CloudWatch. Setting Suricata up in Panther is fast and easy - you simply need to create a new Suricata log source within the Panther console, choose your preferred data transport method, and configure Suricata to push logs to your data transport source.\"}),/*#__PURE__*/t(\"p\",{children:[\"For more details on onboarding Suricata logs or for supported log schema, you can \",/*#__PURE__*/e(o,{href:\"https://docs.panther.com/data-onboarding/supported-logs/suricata\",motionChild:!0,nodeId:\"SyBeQVkaI\",openInNewTab:!0,scopeId:\"contentManagement\",smoothScroll:!1,children:/*#__PURE__*/e(n.a,{children:\"view our Suricata documentation here\"})}),\".\"]}),/*#__PURE__*/e(\"h3\",{children:\"Parsing, Normalizing, & Analyzing\"}),/*#__PURE__*/e(\"p\",{children:\"As Panther ingests Suricata logs, they are parsed, normalized, and stored in a Snowflake security data lake. This allows you to write detections, identify anomalies, and conduct investigations in the context of days, weeks, or months of data.\"}),/*#__PURE__*/t(\"p\",{children:[\"Panther applies normalization fields to log records, which standardizes names for attributes and enables you to correlate data across all of your log sources. Panther's handy search tools - such as Query Builder, Data Explorer, and Indicator Search - allow you to investigate your normalized logs for suspicious activity or vulnerabilities. For more information on searching logs, \",/*#__PURE__*/e(o,{href:\"https://docs.panther.com/data-analytics\",motionChild:!0,nodeId:\"SyBeQVkaI\",openInNewTab:!0,scopeId:\"contentManagement\",smoothScroll:!1,children:/*#__PURE__*/e(n.a,{children:\"check out our documentation on Investigations & Search\"})}),\".\"]}),/*#__PURE__*/e(\"h3\",{children:\"Detection as Code\"}),/*#__PURE__*/e(\"p\",{children:\"With Panther, you aren't confined to restrictive detections as seen in many SIEM solutions. Panther is built around detection-as-code principles, giving you the ability to write Python to define detection logic and to integrate external systems like version control and CI/CD pipelines into your detection engineering processes. This results in powerful, flexible, and reusable scripting of detections for your security team.\"}),/*#__PURE__*/t(\"p\",{children:[\"Pre-built detections for Suricata are available by default in Panther, offering you the ability to immediately monitor for common IoCs and threats. You can \",/*#__PURE__*/e(o,{href:\"https://panther.com/product/detection-coverage/#filter=suricata\",motionChild:!0,nodeId:\"SyBeQVkaI\",openInNewTab:!1,scopeId:\"contentManagement\",smoothScroll:!1,children:/*#__PURE__*/e(n.a,{children:\" explore our built-in detection coverage for Suricata audit logs here\"})}),\".\"]}),/*#__PURE__*/e(\"h3\",{children:\"Configuring Alerts\"}),/*#__PURE__*/t(\"p\",{children:[\"Panther generates alerts when your detection rules or policies for Suricata are triggered, and integrates with a variety of \",/*#__PURE__*/e(o,{href:\"https://panther.com/integrations/alerts/\",motionChild:!0,nodeId:\"SyBeQVkaI\",openInNewTab:!1,scopeId:\"contentManagement\",smoothScroll:!1,children:/*#__PURE__*/e(n.a,{children:\" alert destinations \"})}),\" to allow for intuitive management of any alerts. Alerts can also be sent to alert context or SOAR platforms for more remediation options.\"]}),/*#__PURE__*/e(\"p\",{children:\"Alerts are categorized by five different severity levels: Info, Low, Medium, High, and Critical. Your security team has the ability to dynamically assign severity based on specific log event attributes.\"}),/*#__PURE__*/e(\"h3\",{children:\"Customer Support\"}),/*#__PURE__*/e(\"p\",{children:\"If you have any questions about onboarding or monitoring Suricata logs in Panther, our customer support team is here to help. All customers have access to support via a dedicated Slack channel, email, or in-app messenger.\"}),/*#__PURE__*/t(\"p\",{children:[\"You can view our \",/*#__PURE__*/e(o,{href:\"https://docs.panther.com/data-onboarding/supported-logs/suricata\",motionChild:!0,nodeId:\"SyBeQVkaI\",openInNewTab:!0,scopeId:\"contentManagement\",smoothScroll:!1,children:/*#__PURE__*/e(n.a,{children:\"documentation on configuring and monitoring Suricata logs here\"})}),\", or customers can sign up for \",/*#__PURE__*/e(o,{href:\"https://pnthr.io/community\",motionChild:!0,nodeId:\"SyBeQVkaI\",openInNewTab:!0,scopeId:\"contentManagement\",smoothScroll:!1,children:/*#__PURE__*/e(n.a,{children:\"the Panther Community\"})}),\" to share best practices or custom detections for Suricata logs.\"]}),/*#__PURE__*/e(\"h3\",{children:\"The Ideal SIEM for Suricata\"}),/*#__PURE__*/e(\"p\",{children:\"With Panther, your team doesn't have to pay excessive costs to keep up with the growth of cloud app data, waste time and resources on operational overhead, or struggle with restrictive detection logic. Panther was founded by a team of security engineers who struggled with other SIEM solutions first-hand, and built an intuitive, cloud-native platform to solve them.\"}),/*#__PURE__*/t(\"p\",{children:[\"Panther is a cloud-native SIEM built for security operations at scale, offering flexible detection-as-code, intuitive security workflows, and actionable real-time alerts. For a powerful, practical, and scalable SIEM solution for Suricata, \",/*#__PURE__*/e(o,{href:\"https://panther.com/product/request-a-demo/\",motionChild:!0,nodeId:\"SyBeQVkaI\",openInNewTab:!1,scopeId:\"contentManagement\",smoothScroll:!1,children:/*#__PURE__*/e(n.a,{children:\" request a demo today\"})}),\".\"]})]});export const richText12=/*#__PURE__*/t(i.Fragment,{children:[/*#__PURE__*/e(\"h3\",{children:\"Integration Overview\"}),/*#__PURE__*/e(\"p\",{children:\"Lacework is a cloud security platform for DevOps, workloads, and cloud containers, and includes an agent for collecting important host-based data. Panther can collect, normalize, and monitor Lacework logs to help you identify threats or suspicious activity in real time. Your normalized data is then retained to enable future security investigations in a serverless data lake powered by Snowflake.\"}),/*#__PURE__*/e(\"h3\",{children:\"Use Cases for Lacework Logs\"}),/*#__PURE__*/e(\"p\",{children:\"Panther supports more than 20 different types of Lacework logs. Common SIEM use cases for Lacework logs include:\"}),/*#__PURE__*/t(\"ul\",{children:[/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/e(\"p\",{children:\"Identifying containers and hosts not running Lacework\"})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/e(\"p\",{children:\"Monitoring for changed files in your environment\"})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/e(\"p\",{children:\"Detecting suspicious or malicious DNS queries\"})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/e(\"p\",{children:\"Investigating user details or login activity\"})})]}),/*#__PURE__*/e(\"h3\",{children:\"Onboarding Lacework with Panther\"}),/*#__PURE__*/e(\"p\",{children:\"Panther's integration for Lacework is simple and quick to configure, allowing you to onboard your logs in just a few minutes. Simply select Lacework from the list of pre-defined log sources, select your preferred data transport method (AWS S3 or SQS), and configure Lacework to push logs to your data transport source.\"}),/*#__PURE__*/t(\"p\",{children:[\"For more details on onboarding Lacework logs or for supported log schema, you can \",/*#__PURE__*/e(o,{href:\"https://docs.panther.com/data-onboarding/supported-logs/lacework\",motionChild:!0,nodeId:\"SyBeQVkaI\",openInNewTab:!0,scopeId:\"contentManagement\",smoothScroll:!1,children:/*#__PURE__*/e(n.a,{children:\"view our Lacework documentation here\"})}),\".\"]}),/*#__PURE__*/e(\"h3\",{children:\"Parsing, Normalizing, & Analyzing Lacework Logs\"}),/*#__PURE__*/e(\"p\",{children:\"As Panther ingests your Lacework logs, they are parsed, normalized, and stored in a Snowflake security data lake. This allows your security team to build detections, identify anomalies, and conduct investigations on Lacework logs in the context of days, weeks, or months of data.\"}),/*#__PURE__*/t(\"p\",{children:[\"Panther applies normalization fields to all log records, which standardizes names for attributes and allows you to correlate data across all log sources. You can use Panther's various search tools - such as Data Explorer, Indicator Search, and Query Builder - to investigate your normalized logs for suspicious activity or vulnerabilities. For more on querying and searching normalized log data in Panther, \",/*#__PURE__*/e(o,{href:\"https://docs.panther.com/data-analytics\",motionChild:!0,nodeId:\"SyBeQVkaI\",openInNewTab:!0,scopeId:\"contentManagement\",smoothScroll:!1,children:/*#__PURE__*/e(n.a,{children:\"check out our documentation on Investigations & Search\"})}),\".\"]}),/*#__PURE__*/e(\"h3\",{children:\"Easily Customizable Detections\"}),/*#__PURE__*/e(\"p\",{children:\"With Panther, your team won't be confined to restrictive detection rules as seen in other SIEM platforms. Panther is built around detection-as-code principles, giving you the ability to write Python to define detection logic and to integrate external systems like version control and CI/CD pipelines into your detection engineering processes. This results in powerful, flexible, and reusable scripting of detections for your team.\"}),/*#__PURE__*/e(\"h3\",{children:\"Configuring Alerts\"}),/*#__PURE__*/t(\"p\",{children:[\"Panther fire alerts when your detection rules or policies for Lacework are triggered, and integrates with a variety of \",/*#__PURE__*/e(o,{href:\"https://panther.com/integrations/alerts/\",motionChild:!0,nodeId:\"SyBeQVkaI\",openInNewTab:!1,scopeId:\"contentManagement\",smoothScroll:!1,children:/*#__PURE__*/e(n.a,{children:\" alert destinations\"})}),\" to allow for easy access and management of alerts for your security team. Alerts can also be sent to alert context or SOAR platforms for more remediation options.\"]}),/*#__PURE__*/e(\"p\",{children:\"Alerts are grouped into five different severity levels: Info, Low, Medium, High, and Critical. Security teams have the options to dynamically designate severity based on specific log event attributes.\"}),/*#__PURE__*/e(\"h3\",{children:\"Customer Support\"}),/*#__PURE__*/e(\"p\",{children:\"If you have any questions about ingesting or monitoring Lacework logs in Panther, we're here to help. All customers have access to our technical support team via a dedicated Slack channel, email, or in-app messenger.\"}),/*#__PURE__*/t(\"p\",{children:[\"You can view our \",/*#__PURE__*/e(o,{href:\"https://docs.panther.com/data-onboarding/supported-logs/lacework\",motionChild:!0,nodeId:\"SyBeQVkaI\",openInNewTab:!0,scopeId:\"contentManagement\",smoothScroll:!1,children:/*#__PURE__*/e(n.a,{children:\"detailed documentation on configuring and monitoring Lacework logs here\"})}),\", or customers can join \",/*#__PURE__*/e(o,{href:\"https://pnthr.io/community\",motionChild:!0,nodeId:\"SyBeQVkaI\",openInNewTab:!0,scopeId:\"contentManagement\",smoothScroll:!1,children:/*#__PURE__*/e(n.a,{children:\"the Panther Community\"})}),\" to share best practices or custom detections for monitoring Lacework.\"]}),/*#__PURE__*/e(\"h3\",{children:\"The Ideal SIEM for Lacework\"}),/*#__PURE__*/e(\"p\",{children:\"With Panther, you don't have to waste precious time and effort on operational overhead, struggle with restrictive detections, or pay skyrocketing costs to keep up with the growth of your data. Panther was founded by a team of veteran security practitioners who struggled with legacy SIEM challenges first-hand, and built a scalable, cloud-native platform to solve them.\"}),/*#__PURE__*/t(\"p\",{children:[\"Panther is a cloud-native SIEM built for security operations at scale, offering powerful detection-as-code, intuitive security workflows, and actionable real-time alerts to keep up with the needs of today's security teams. For a powerful, practical, and scalable SIEM solution for Lacework, \",/*#__PURE__*/e(o,{href:\"https://panther.com/product/request-a-demo/\",motionChild:!0,nodeId:\"SyBeQVkaI\",openInNewTab:!1,scopeId:\"contentManagement\",smoothScroll:!1,children:/*#__PURE__*/e(n.a,{children:\"request a demo today\"})}),\".\"]})]});export const richText13=/*#__PURE__*/t(i.Fragment,{children:[/*#__PURE__*/e(\"h3\",{children:\"Integration Overview\"}),/*#__PURE__*/e(\"p\",{children:\"Teleport is an open-source access platform used by DevSecOps teams for SSH, Kubernetes, databases, and internal web applications. Panther can collect, normalize, and monitor Teleport logs to help you identify suspicious activity in real time. Your normalized log data is then retained to power future security investigations in a data lake powered by the cloud-native data platform, Snowflake.\"}),/*#__PURE__*/e(\"h3\",{children:\"Use Cases for Teleport Audit Logs\"}),/*#__PURE__*/e(\"p\",{children:\"Panther supports the ingestion of Gravitational.TeleportAudit logs, which record events like successful user logins along with metadata like remote IP addresses, timestamps, and session IDs. Some common security use cases for Teleport audit logs include:\"}),/*#__PURE__*/t(\"ul\",{children:[/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/e(\"p\",{children:\"Investigating high-volumes of failed logins\"})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/e(\"p\",{children:\"Monitoring commands and arguments executed on hosts\"})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/e(\"p\",{children:\"Analyzing network connections initiated by users or scheduled jobs\"})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/e(\"p\",{children:\"Detecting when network scans or suspicious commands are executed\"})})]}),/*#__PURE__*/e(\"h3\",{children:\"Onboarding Teleport Logs in Panther\"}),/*#__PURE__*/e(\"p\",{children:\"Panther supports ingesting Teleport logs via common Data Transport options: Amazon Web Services (AWS) S3 and SQS. Setting Teleport up in Panther is fast and easy - simply create a new Teleport log source within the Panther console, choose your preferred data transport method, and configure Teleport to push logs to your chosen data transport source.\"}),/*#__PURE__*/t(\"p\",{children:[\"For more details on onboarding Teleport logs or for supported log schema, you can \",/*#__PURE__*/e(o,{href:\"https://docs.panther.com/data-onboarding/supported-logs/teleport\",motionChild:!0,nodeId:\"SyBeQVkaI\",openInNewTab:!0,scopeId:\"contentManagement\",smoothScroll:!1,children:/*#__PURE__*/e(n.a,{children:\"view our Teleport documentation here\"})}),\".\"]}),/*#__PURE__*/e(\"h3\",{children:\"Parsing, Normalizing, & Analyzing\"}),/*#__PURE__*/e(\"p\",{children:\"As Panther ingests Teleport logs, they are parsed, normalized, and stored in a Snowflake security data lake. This allows you to write detections, identify anomalies, and conduct investigations in the context of days, weeks, or months of data.\"}),/*#__PURE__*/t(\"p\",{children:[\"Panther applies normalization fields to log records, which standardizes names for attributes and enables you to correlate data across all of your log sources. Panther's handy search tools - such as Query Builder, Data Explorer, and Indicator Search - allow you to investigate your normalized logs for suspicious activity or vulnerabilities. For more information on searching logs, \",/*#__PURE__*/e(o,{href:\"https://docs.panther.com/data-analytics\",motionChild:!0,nodeId:\"SyBeQVkaI\",openInNewTab:!0,scopeId:\"contentManagement\",smoothScroll:!1,children:/*#__PURE__*/e(n.a,{children:\"check out our documentation on Investigations & Search\"})}),\".\"]}),/*#__PURE__*/e(\"h3\",{children:\"Detection as Code\"}),/*#__PURE__*/e(\"p\",{children:\"With Panther, you aren't confined to rigid detections as seen in many SIEM solutions. Panther is built around detection-as-code principles, giving you the ability to write Python to define detection logic and to integrate external systems like version control and CI/CD pipelines into your detection engineering processes. This results in powerful, flexible, and reusable scripting of detections for your security team.\"}),/*#__PURE__*/t(\"p\",{children:[\"Pre-built detections for Teleport are available in Panther, offering you the ability to immediately monitor for common IoCs and threats. You can \",/*#__PURE__*/e(o,{href:\"https://panther.com/product/detection-coverage/#filter=teleport\",motionChild:!0,nodeId:\"SyBeQVkaI\",openInNewTab:!1,scopeId:\"contentManagement\",smoothScroll:!1,children:/*#__PURE__*/e(n.a,{children:\" explore our built-in detection coverage for Teleport logs here\"})}),\".\"]}),/*#__PURE__*/e(\"h3\",{children:\"Configuring Alerts\"}),/*#__PURE__*/t(\"p\",{children:[\"Panther generates alerts when your detection rules or policies for Teleport are triggered, and integrates with a variety of \",/*#__PURE__*/e(o,{href:\"https://panther.com/integrations/alerts/\",motionChild:!0,nodeId:\"SyBeQVkaI\",openInNewTab:!1,scopeId:\"contentManagement\",smoothScroll:!1,children:/*#__PURE__*/e(n.a,{children:\" alert destinations \"})}),\" to allow for intuitive management of any alerts. Alerts can also be sent to alert context or SOAR platforms for more remediation options.\"]}),/*#__PURE__*/e(\"p\",{children:\"Alerts are grouped into five different severity levels: Info, Low, Medium, High, and Critical. Your security team has the ability to dynamically assign severity based on specific log event attributes.\"}),/*#__PURE__*/e(\"h3\",{children:\"Customer Support\"}),/*#__PURE__*/e(\"p\",{children:\"If you have any questions about onboarding or monitoring Teleport logs in Panther, our customer support team is here to help. All customers have access to support via a dedicated Slack channel, email, or in-app messenger.\"}),/*#__PURE__*/t(\"p\",{children:[\"You can view our \",/*#__PURE__*/e(o,{href:\"https://docs.panther.com/data-onboarding/supported-logs/teleport\",motionChild:!0,nodeId:\"SyBeQVkaI\",openInNewTab:!0,scopeId:\"contentManagement\",smoothScroll:!1,children:/*#__PURE__*/e(n.a,{children:\"documentation on configuring and monitoring Teleport logs here\"})}),\", or customers can sign up for \",/*#__PURE__*/e(o,{href:\"https://pnthr.io/community\",motionChild:!0,nodeId:\"SyBeQVkaI\",openInNewTab:!1,scopeId:\"contentManagement\",smoothScroll:!1,children:/*#__PURE__*/e(n.a,{children:\" the Panther Community\"})}),\" to share best practices or custom detections for Teleport logs.\"]}),/*#__PURE__*/e(\"h3\",{children:\"The Ideal SIEM for Teleport\"}),/*#__PURE__*/e(\"p\",{children:\"With Panther, your team doesn't have to pay excessive costs to keep up with the growth of cloud app data, waste time and resources on operational overhead, or struggle with restrictive detection logic. Panther was founded by a team of security engineers who struggled with other SIEM solutions first-hand, and built an intuitive, cloud-native platform to meet today's security needs.\"}),/*#__PURE__*/t(\"p\",{children:[\"Panther is a cloud-native SIEM built for security operations at scale, offering flexible detection-as-code, intuitive security workflows, and actionable real-time alerts. For a powerful, practical, and scalable SIEM solution for Teleport, \",/*#__PURE__*/e(o,{href:\"https://panther.com/product/request-a-demo/\",motionChild:!0,nodeId:\"SyBeQVkaI\",openInNewTab:!1,scopeId:\"contentManagement\",smoothScroll:!1,children:/*#__PURE__*/e(n.a,{children:\" request a demo today\"})}),\".\"]})]});export const richText14=/*#__PURE__*/t(i.Fragment,{children:[/*#__PURE__*/e(\"h3\",{children:\"Integration Overview\"}),/*#__PURE__*/e(\"p\",{children:\"Apache is a widely used, open-source, cross-platform web server that allows users to deploy websites to the internet. Panther can collect, normalize, and monitor Apache logs to help you identify suspicious activity in real time. Your normalized data is then retained to conduct future security investigations in a serverless security data lake powered by Snowflake.\"}),/*#__PURE__*/e(\"h3\",{children:\"Use Cases for Apache Logs\"}),/*#__PURE__*/e(\"p\",{children:\"Apache access logs store information about events that occurred on your Apache web server. Common security use cases for Apache access logs include:\"}),/*#__PURE__*/t(\"ul\",{children:[/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/e(\"p\",{children:\"Monitoring access to sensitive web application endpoints\"})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/e(\"p\",{children:\"Investigating and tracing visitor and customer activity\"})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/e(\"p\",{children:\"Identifying SQL injection or other attempted exploits\"})})]}),/*#__PURE__*/e(\"h3\",{children:\"Onboarding Apache Logs in Panther\"}),/*#__PURE__*/e(\"p\",{children:\"Panther's integration for Apache is simple and fast to configure, allowing you to onboard logs in just a few minutes. Simply select Apache from the list of pre-defined log sources, select your preferred data transport method, and configure Apache to push logs to your data transport source.\"}),/*#__PURE__*/t(\"p\",{children:[\"For more details on onboarding Apache logs or for supported log schema, you can \",/*#__PURE__*/e(o,{href:\"https://docs.panther.com/data-onboarding/supported-logs/apache\",motionChild:!0,nodeId:\"SyBeQVkaI\",openInNewTab:!0,scopeId:\"contentManagement\",smoothScroll:!1,children:/*#__PURE__*/e(n.a,{children:\"view our Apache documentation here\"})}),\".\"]}),/*#__PURE__*/e(\"h3\",{children:\"Parsing, Normalizing, & Analyzing Apache Logs\"}),/*#__PURE__*/e(\"p\",{children:\"As Panther ingests Apache access logs, they are parsed, normalized, and stored in a Snowflake security data lake. This allows security teams to write detections, identify anomalies, and conduct investigations on logs in the context of days, weeks, or months of data.\"}),/*#__PURE__*/t(\"p\",{children:[\"Panther applies normalization fields to all log records, which standardizes names for attributes and empowers users to correlate data across all log sources - not just Apache. Panther's search tools - Data Explorer, Indicator Search, and Query Builder - allow you to investigate your normalized logs for suspicious activity or vulnerabilities. For more guidance on searching log data in Panther, \",/*#__PURE__*/e(o,{href:\"https://docs.panther.com/data-analytics\",motionChild:!0,nodeId:\"SyBeQVkaI\",openInNewTab:!0,scopeId:\"contentManagement\",smoothScroll:!1,children:/*#__PURE__*/e(n.a,{children:\"check out our documentation on Investigations & Search\"})}),\" .\"]}),/*#__PURE__*/e(\"h3\",{children:\"Built-In & Easily Customizable Detections\"}),/*#__PURE__*/t(\"p\",{children:[\"A number of pre-built detections are available by default in Panther, offering users immediate value for monitoring common IoCs and threats. You can \",/*#__PURE__*/e(o,{href:\"https://panther.com/product/detection-coverage/#filter=apache\",motionChild:!0,nodeId:\"SyBeQVkaI\",openInNewTab:!1,scopeId:\"contentManagement\",smoothScroll:!1,children:/*#__PURE__*/e(n.a,{children:\" explore our built-in detection coverage for Apache logs here\"})}),\".\"]}),/*#__PURE__*/e(\"p\",{children:\"With Panther, your team won't be confined to restrictive detection rules as seen in many SIEM platforms. Panther is built with detection-as-code principles, giving you the ability to write Python to define detection logic and to integrate external systems like version control and CI/CD pipelines into your detection engineering processes. This results in powerful, flexible, and reusable scripting of detection logic for your security team.\"}),/*#__PURE__*/e(\"h3\",{children:\"Configuring Alerts\"}),/*#__PURE__*/t(\"p\",{children:[\"Panther generates alerts when your detection rules or policies are triggered, and integrates with a variety of \",/*#__PURE__*/e(o,{href:\"https://panther.com/integrations/alerts/\",motionChild:!0,nodeId:\"SyBeQVkaI\",openInNewTab:!1,scopeId:\"contentManagement\",smoothScroll:!1,children:/*#__PURE__*/e(n.a,{children:\"alert destinations\"})}),\" to allow for easy access and management of any Apache alerts. Alerts can also be sent to alert context or SOAR platforms for more remediation options.\"]}),/*#__PURE__*/e(\"p\",{children:\"Alerts are categorized by five different severity levels: Info, Low, Medium, High, and Critical. Security teams have the ability to dynamically assign severity based on specific log event attributes.\"}),/*#__PURE__*/e(\"h3\",{children:\"Customer Support\"}),/*#__PURE__*/e(\"p\",{children:\"If you have any questions about configuring or monitoring Apache logs in Panther, our customer support team is here to help. All customers have access to support via a dedicated Slack channel, email, or in-app messenger.\"}),/*#__PURE__*/t(\"p\",{children:[\"You can view our \",/*#__PURE__*/e(o,{href:\"https://docs.panther.com/data-onboarding/supported-logs/apache\",motionChild:!0,nodeId:\"SyBeQVkaI\",openInNewTab:!0,scopeId:\"contentManagement\",smoothScroll:!1,children:/*#__PURE__*/e(n.a,{children:\"documentation on configuring and monitoring Apache logs here\"})}),\", or customers can sign up for \",/*#__PURE__*/e(o,{href:\"https://pnthr.io/community\",motionChild:!0,nodeId:\"SyBeQVkaI\",openInNewTab:!0,scopeId:\"contentManagement\",smoothScroll:!1,children:/*#__PURE__*/e(n.a,{children:\"the Panther Community\"})}),\" to share best practices or custom detections for monitoring Apache.\"]}),/*#__PURE__*/e(\"h3\",{children:\"Replacing Traditional SIEM for Apache Log Monitoring\"}),/*#__PURE__*/e(\"p\",{children:\"With Panther, your security team doesn't have to struggle with rigid detection logic, waste time and resources on operational overhead, or pay excessive costs to keep up with the growth of cloud app data. Panther was founded by a team of veteran security practitioners who struggled with today's SIEM challenges first-hand, and built an intuitive, cloud-native platform to solve them.\"}),/*#__PURE__*/t(\"p\",{children:[\"Panther is a cloud-native SIEM built for security operations at scale, offering flexible detection-as-code, intuitive security workflows, and actionable real-time alerts to keep up with the needs of today's security teams. For a strong, flexible, and scalable SIEM solution for Apache, \",/*#__PURE__*/e(o,{href:\"https://panther.com/product/request-a-demo/\",motionChild:!0,nodeId:\"SyBeQVkaI\",openInNewTab:!1,scopeId:\"contentManagement\",smoothScroll:!1,children:/*#__PURE__*/e(n.a,{children:\" request a demo today\"})}),\".\"]})]});export const richText15=/*#__PURE__*/t(i.Fragment,{children:[/*#__PURE__*/e(\"h3\",{children:\"Integration Overview\"}),/*#__PURE__*/e(\"p\",{children:\"GitLab provides a web-based Git-repository platform with wiki, issue-tracking, and continuous integration and continuous deployment (CI/CD) functionality. Panther can collect, normalize, and monitor GitLab logs to help you identify suspicious activity within your GitLab environment in real time. Your normalized data is then retained to power future security investigations in a data lake powered by the cloud-native data platform, Snowflake.\"}),/*#__PURE__*/e(\"h3\",{children:\"Use Cases for GitLab Audit & API Logs\"}),/*#__PURE__*/e(\"p\",{children:\"Panther is able to ingest both GitLab API and Audit logs, which track important events, including who performed a related action and when. Some common SIEM use cases for these log types include:\"}),/*#__PURE__*/t(\"ul\",{children:[/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/e(\"p\",{children:\"Monitoring changes to group or project settings\"})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/e(\"p\",{children:\"Identifying any failed requests from GitLab to Git repositories\"})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/e(\"p\",{children:\"Monitoring API requests and information about integration activities\"})})]}),/*#__PURE__*/e(\"h3\",{children:\"Onboarding GitLab Logs in Panther\"}),/*#__PURE__*/e(\"p\",{children:\"Panther's integration for GitLab is fast and easy to configure, allowing you to onboard GitLab logs in just a few minutes. Simply select GitLab from the list of pre-defined log sources, select your preferred data transport method (AWS S3 or SQS), and configure GitLab to push logs to your data transport source.\"}),/*#__PURE__*/t(\"p\",{children:[\"For more details on onboarding GitLab logs or for supported log schema, you can \",/*#__PURE__*/e(o,{href:\"https://docs.panther.com/data-onboarding/supported-logs/gitlab\",motionChild:!0,nodeId:\"SyBeQVkaI\",openInNewTab:!0,scopeId:\"contentManagement\",smoothScroll:!1,children:/*#__PURE__*/e(n.a,{children:\"view our GitLab documentation here\"})}),\".\"]}),/*#__PURE__*/e(\"h3\",{children:\"Parsing, Normalizing, & Analyzing Logs\"}),/*#__PURE__*/e(\"p\",{children:\"As Panther ingests GitLab logs, they are parsed, normalized, and stored in a Snowflake security data lake. This allows you to build detections, identify anomalies, and conduct investigations in the context of days, weeks, or months of data.\"}),/*#__PURE__*/t(\"p\",{children:[\"Panther applies normalization fields to all log records, which standardizes names for attributes and empowers users to correlate data across all of your log sources. Panther's various search tools - such as Query Builder, Data Explorer, and Indicator Search - allow you to investigate your normalized logs for suspicious activity or vulnerabilities. For more information on searching logs, \",/*#__PURE__*/e(o,{href:\"https://docs.panther.com/data-analytics\",motionChild:!0,nodeId:\"SyBeQVkaI\",openInNewTab:!0,scopeId:\"contentManagement\",smoothScroll:!1,children:/*#__PURE__*/e(n.a,{children:\"check out our documentation on Investigations & Search\"})}),\".\"]}),/*#__PURE__*/e(\"h3\",{children:\"Built-in and Easily Customizable Detections\"}),/*#__PURE__*/e(\"p\",{children:\"With Panther, you aren't confined to restrictive detections as seen in many SIEM solutions. Panther is architected around detection-as-code principles, giving you the ability to write Python to build detection logic and to integrate external systems like version control and CI/CD pipelines into your detection engineering processes. This results in powerful, flexible, and reusable scripting of detections for your security team.\"}),/*#__PURE__*/e(\"h3\",{children:\"Configuring Alerts\"}),/*#__PURE__*/t(\"p\",{children:[\"Panther generates alerts when your detection rules or policies for GitLab are triggered, and integrates with a variety of \",/*#__PURE__*/e(o,{href:\"https://panther.com/integrations/alerts/\",motionChild:!0,nodeId:\"SyBeQVkaI\",openInNewTab:!1,scopeId:\"contentManagement\",smoothScroll:!1,children:/*#__PURE__*/e(n.a,{children:\"alert destinations\"})}),\" to allow for intuitive management of any alerts. Alerts can also be sent to alert context or SOAR platforms for more remediation options.\"]}),/*#__PURE__*/e(\"p\",{children:\"Alerts are categorized by five different severity levels: Info, Low, Medium, High, and Critical. Your security team has the ability to dynamically assign severity based on specific log event attributes.\"}),/*#__PURE__*/e(\"h3\",{children:\"Customer Support\"}),/*#__PURE__*/e(\"p\",{children:\"If you have any questions about configuring or monitoring GitLab logs in Panther, our customer support team is here to help. All customers have access to support via a dedicated Slack channel, email, or in-app messenger.\"}),/*#__PURE__*/t(\"p\",{children:[\"You can view our \",/*#__PURE__*/e(o,{href:\"https://docs.panther.com/data-onboarding/supported-logs/gitlab\",motionChild:!0,nodeId:\"SyBeQVkaI\",openInNewTab:!1,scopeId:\"contentManagement\",smoothScroll:!1,children:/*#__PURE__*/e(n.a,{children:\" documentation on configuring and monitoring GitLab logs here \"})}),\" , or customers can sign up for \",/*#__PURE__*/e(o,{href:\"https://pnthr.io/community\",motionChild:!0,nodeId:\"SyBeQVkaI\",openInNewTab:!1,scopeId:\"contentManagement\",smoothScroll:!1,children:/*#__PURE__*/e(n.a,{children:\" the Panther Community \"})}),\" to share best practices or custom detections for GitLab logs.\"]}),/*#__PURE__*/e(\"h3\",{children:\"Replacing Traditional SIEM for GitLab\"}),/*#__PURE__*/e(\"p\",{children:\"With Panther, your team doesn't have to waste time and resources on operational overhead, pay excessive costs to keep up with the growth of cloud app data, or struggle with restrictive detection logic. Panther was founded by a team of security engineers who struggled with other SIEM solutions first-hand, and built an intuitive, cloud-native platform to solve them.\"}),/*#__PURE__*/t(\"p\",{children:[\"Panther is a cloud-native SIEM built for security operations at scale, offering flexible detection-as-code, intuitive security workflows, and actionable real-time alerts. If you're searching for a seamless SIEM platform for GitLab, \",/*#__PURE__*/e(o,{href:\"https://panther.com/product/request-a-demo/\",motionChild:!0,nodeId:\"SyBeQVkaI\",openInNewTab:!1,scopeId:\"contentManagement\",smoothScroll:!1,children:/*#__PURE__*/e(n.a,{children:\" request a demo today\"})}),\".\"]})]});export const richText16=/*#__PURE__*/t(i.Fragment,{children:[/*#__PURE__*/e(\"h3\",{children:\"Integration Overview\"}),/*#__PURE__*/e(\"p\",{children:\"Okta provides a trusted access management platform to secure every identity within an organization's workforce or customer base. Panther can collect, normalize, and monitor Okta System Logs to help you identify suspicious activity in real time. Your normalized data is then retained to power future security investigations in a serverless data lake powered by Snowflake.\"}),/*#__PURE__*/e(\"h3\",{children:\"Use Cases for Okta Logs\"}),/*#__PURE__*/t(\"p\",{children:[\"The \",/*#__PURE__*/e(o,{href:\"https://developer.okta.com/docs/reference/api/system-log/\",motionChild:!0,nodeId:\"SyBeQVkaI\",openInNewTab:!0,scopeId:\"contentManagement\",smoothScroll:!1,children:/*#__PURE__*/e(n.a,{children:\"Okta System Log\"})}),\" records system events within your Okta instance and provides an audit trail to help users understand platform activity. Common security use cases for monitoring Okta logs include:\"]}),/*#__PURE__*/t(\"ul\",{children:[/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/e(\"p\",{children:\"Reviewing admin actions\"})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/e(\"p\",{children:\"Detecting potentially compromised login events\"})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/e(\"p\",{children:\"Identifying baseline user activity\"})})]}),/*#__PURE__*/e(\"h3\",{children:\"Onboarding Okta with Panther\"}),/*#__PURE__*/e(\"p\",{children:\"Panther's integration for Okta is easy and fast to configure, allowing you to onboard system logs in just a few minutes. Simply select Okta from the list of pre-defined log sources, provide domain information for your Okta instance, and submit an Okta API token to the Panther console.\"}),/*#__PURE__*/t(\"p\",{children:[\"Once the log source setup process is complete, Panther will fetch Okta events by querying the \",/*#__PURE__*/e(o,{href:\"https://developer.okta.com/docs/reference/api/system-log/\",motionChild:!0,nodeId:\"SyBeQVkaI\",openInNewTab:!0,scopeId:\"contentManagement\",smoothScroll:!1,children:/*#__PURE__*/e(n.a,{children:\"Okta System Log API\"})}),\". Panther will query the System Log API every 1 minute. For more details on onboarding Okta logs or for supported log schema, you can \",/*#__PURE__*/e(o,{href:\"https://docs.panther.com/data-onboarding/supported-logs/okta\",motionChild:!0,nodeId:\"SyBeQVkaI\",openInNewTab:!0,scopeId:\"contentManagement\",smoothScroll:!1,children:/*#__PURE__*/e(n.a,{children:\"view our Okta documentation here\"})}),\".\"]}),/*#__PURE__*/e(\"h3\",{children:\"Parsing, Normalizing, & Analyzing Okta Logs\"}),/*#__PURE__*/e(\"p\",{children:\"As Panther ingests Okta audit logs, they are parsed, normalized, and stored in a Snowflake security data lake. This allows security teams to write detections, identify anomalies, and conduct investigations on logs in the context of days, weeks, or months of data.\"}),/*#__PURE__*/t(\"p\",{children:[\"Panther applies normalization fields to all log records, which standardizes names for attributes and allows you to correlate data across all log sources - not just Okta. You can use Panther's various search tools - such as Data Explorer, Indicator Search, and Query Builder - to investigate your normalized logs for suspicious activity or vulnerabilities. For more on querying and searching normalized log data in Panther, \",/*#__PURE__*/e(o,{href:\"https://docs.panther.com/data-analytics\",motionChild:!0,nodeId:\"SyBeQVkaI\",openInNewTab:!0,scopeId:\"contentManagement\",smoothScroll:!1,children:/*#__PURE__*/e(n.a,{children:\"check out our documentation on Investigations & Search\"})}),\".\"]}),/*#__PURE__*/e(\"h3\",{children:\"Easily Customizable Detections\"}),/*#__PURE__*/e(\"p\",{children:\"With Panther, your team won't be confined to rigid detection rules as seen in most legacy SIEMs. Panther is architected around detection-as-code principles, giving you the ability to write Python to define detection logic and to integrate external systems like version control and CI/CD pipelines into your detection engineering processes. This results in powerful, flexible, and reusable scripting of detection logic for your security team.\"}),/*#__PURE__*/t(\"p\",{children:[\"A number of pre-built detections are available by default in Panther, offering users immediate value for monitoring common IoCs and threats. You can \",/*#__PURE__*/e(o,{href:\"https://panther.com/product/detection-coverage/#filter=okta\",motionChild:!0,nodeId:\"SyBeQVkaI\",openInNewTab:!1,scopeId:\"contentManagement\",smoothScroll:!1,children:/*#__PURE__*/e(n.a,{children:\" explore our built-in detection coverage for Okta logs here\"})}),\".\"]}),/*#__PURE__*/e(\"h3\",{children:\"Configuring Alerts\"}),/*#__PURE__*/t(\"p\",{children:[\"Panther generates alerts when your detection rules or policies are triggered, and integrates with a variety of \",/*#__PURE__*/e(o,{href:\"https://panther.com/integrations/alerts/\",motionChild:!0,nodeId:\"SyBeQVkaI\",openInNewTab:!1,scopeId:\"contentManagement\",smoothScroll:!1,children:/*#__PURE__*/e(n.a,{children:\" alert destinations\"})}),\" to allow for easy access and management of alerts for your security team. Alerts can also be sent to alert context or SOAR platforms for more remediation options.\"]}),/*#__PURE__*/e(\"p\",{children:\"Alerts are categorized by different severity levels: Info, Low, Medium, High, and Critical. Security teams have the options to dynamically assign severity based on specific log event attributes.\"}),/*#__PURE__*/e(\"h3\",{children:\"Customer Support\"}),/*#__PURE__*/e(\"p\",{children:\"If you have any questions about configuring or monitoring Okta logs in Panther, we're here to help. All customers have access to our technical support team via a dedicated Slack channel, email, or in-app messenger.\"}),/*#__PURE__*/t(\"p\",{children:[\"You can view our \",/*#__PURE__*/e(o,{href:\"https://docs.panther.com/data-onboarding/supported-logs/okta\",motionChild:!0,nodeId:\"SyBeQVkaI\",openInNewTab:!0,scopeId:\"contentManagement\",smoothScroll:!1,children:/*#__PURE__*/e(n.a,{children:\"detailed documentation on configuring and monitoring Okta logs here\"})}),\", or customers can join \",/*#__PURE__*/e(o,{href:\"https://pnthr.io/community\",motionChild:!0,nodeId:\"SyBeQVkaI\",openInNewTab:!0,scopeId:\"contentManagement\",smoothScroll:!1,children:/*#__PURE__*/e(n.a,{children:\"the Panther Community\"})}),\" to share best practices or custom detections for monitoring Okta.\"]}),/*#__PURE__*/e(\"h3\",{children:\"Replacing Traditional SIEM for Okta Log Monitoring\"}),/*#__PURE__*/e(\"p\",{children:\"With Panther, you don't have to accept limitations with SIEM detections, waste time and effort on operational overhead, or pay skyrocketing costs to keep up with the growth of cloud app data. Panther was founded by a team of veteran security practitioners who struggled with legacy SIEM challenges first-hand, and built an intuitive, cloud-native platform to solve them.\"}),/*#__PURE__*/t(\"p\",{children:[\"Panther is a cloud-native SIEM built for security operations at scale, offering powerful detection-as-code, intuitive security workflows, and actionable real-time alerts to keep up with the needs of today's security teams. For a powerful, practical, and scalable SIEM solution for Okta, \",/*#__PURE__*/e(o,{href:\"https://panther.com/product/request-a-demo/\",motionChild:!0,nodeId:\"SyBeQVkaI\",openInNewTab:!1,scopeId:\"contentManagement\",smoothScroll:!1,children:/*#__PURE__*/e(n.a,{children:\" request a demo today\"})}),\".\"]})]});export const richText17=/*#__PURE__*/t(i.Fragment,{children:[/*#__PURE__*/e(\"h3\",{children:\"Integration Overview\"}),/*#__PURE__*/e(\"p\",{children:\"OneLogin is a widely used single sign-on and identity management platform that provides organizations with a single destination to manage and access all apps. Panther can collect, normalize, and monitor OneLogin audit logs to help you identify suspicious activity in real time. Your normalized log data is then retained to power future security investigations in a data lake powered by the cloud-native data platform, Snowflake.\"}),/*#__PURE__*/e(\"h3\",{children:\"Use Cases for OneLogin Event Logs\"}),/*#__PURE__*/e(\"p\",{children:\"Panther can pull OneLogin Event logs, which contain details about common event elements including accounts, users, apps, devices, policies, and more. Some common SIEM use cases for OneLogin event logs include:\"}),/*#__PURE__*/t(\"ul\",{children:[/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/e(\"p\",{children:\"Monitoring failed or high-risk login attempts\"})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/e(\"p\",{children:\"Alerting when admin roles are assigned or modified\"})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/e(\"p\",{children:\"Detecting when multiple accounts are deleted or modified\"})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/e(\"p\",{children:\"Ensuring password data is not being improperly shared or accessed\"})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/e(\"p\",{children:\"Tracking third-party app authorizations to more tightly enforce data access policies\"})})]}),/*#__PURE__*/e(\"h3\",{children:\"Onboarding OneLogin Logs in Panther\"}),/*#__PURE__*/e(\"p\",{children:\"Panther is able to process OneLogin events through OneLogin's integration with Amazon EventBridge. This allows Panther to process OneLogin logs in a scalable and reliable, low latency manner. To set up OneLogin in Panther, simply select OneLogin from the list of log sources in the Panther console, configure a new event webhook in OneLogin using Amazon EventBridge, and submit your credentials into the Panther setup menu.\"}),/*#__PURE__*/t(\"p\",{children:[\"For more details on onboarding OneLogin logs or for supported log schema, you can \",/*#__PURE__*/e(o,{href:\"https://docs.panther.com/data-onboarding/supported-logs/onelogin\",motionChild:!0,nodeId:\"SyBeQVkaI\",openInNewTab:!0,scopeId:\"contentManagement\",smoothScroll:!1,children:/*#__PURE__*/e(n.a,{children:\"view our OneLogin documentation here\"})}),\".\"]}),/*#__PURE__*/e(\"h3\",{children:\"Parsing, Normalizing, & Analyzing Logs\"}),/*#__PURE__*/e(\"p\",{children:\"As Panther ingests OneLogin logs, they are parsed, normalized, and stored in a Snowflake security data lake. This allows you to write detections, identify anomalies, and conduct investigations in the context of days, weeks, or months of data.\"}),/*#__PURE__*/t(\"p\",{children:[\"Panther applies normalization fields to log records, which standardizes names for attributes and enables you to correlate data across all of your log sources. Panther's intuitive search tools - such as Query Builder, Data Explorer, and Indicator Search - allow you to investigate your normalized logs for suspicious activity or vulnerabilities. For more information on searching logs, \",/*#__PURE__*/e(o,{href:\"https://docs.panther.com/data-analytics\",motionChild:!0,nodeId:\"SyBeQVkaI\",openInNewTab:!0,scopeId:\"contentManagement\",smoothScroll:!1,children:/*#__PURE__*/e(n.a,{children:\"check out our documentation on Investigations & Search\"})}),\".\"]}),/*#__PURE__*/e(\"h3\",{children:\"Detection as Code\"}),/*#__PURE__*/e(\"p\",{children:\"With Panther, you aren't confined to restrictive detections as seen in many SIEM solutions. Panther is architected around detection-as-code principles, giving you the ability to write Python to define detection logic and to integrate external systems like version control and CI/CD pipelines into your detection engineering processes. This results in powerful, flexible, and reusable scripting of detections for your security team.\"}),/*#__PURE__*/t(\"p\",{children:[\"Pre-built detections for OneLogin are available in Panther, offering users immediate value for monitoring common IoCs and threats. You can \",/*#__PURE__*/e(o,{href:\"https://panther.com/product/detection-coverage/#filter=onelogin\",motionChild:!0,nodeId:\"SyBeQVkaI\",openInNewTab:!1,scopeId:\"contentManagement\",smoothScroll:!1,children:/*#__PURE__*/e(n.a,{children:\" explore our built-in detection coverage for OneLogin logs here\"})}),\".\"]}),/*#__PURE__*/e(\"h3\",{children:\"Configuring Alerts\"}),/*#__PURE__*/t(\"p\",{children:[\"Panther generates alerts when your detection rules or policies for OneLogin are triggered, and integrates with a variety of \",/*#__PURE__*/e(o,{href:\"https://panther.com/integrations/alerts/\",motionChild:!0,nodeId:\"SyBeQVkaI\",openInNewTab:!1,scopeId:\"contentManagement\",smoothScroll:!1,children:/*#__PURE__*/e(n.a,{children:\" alert destinations\"})}),\" to allow for intuitive management of any alerts. Alerts can also be sent to alert context or SOAR platforms for more remediation options.\"]}),/*#__PURE__*/e(\"p\",{children:\"Alerts are categorized by five different severity levels: Info, Low, Medium, High, and Critical. Your security team has the ability to dynamically assign severity based on specific log event attributes.\"}),/*#__PURE__*/e(\"h3\",{children:\"Customer Support\"}),/*#__PURE__*/e(\"p\",{children:\"If you have any questions about configuring or monitoring OneLogin logs in Panther, our customer support team is here to help. All customers have access to support via a dedicated Slack channel, email, or in-app messenger.\"}),/*#__PURE__*/t(\"p\",{children:[\"You can view our \",/*#__PURE__*/e(o,{href:\"https://docs.panther.com/data-onboarding/supported-logs/onelogin\",motionChild:!0,nodeId:\"SyBeQVkaI\",openInNewTab:!0,scopeId:\"contentManagement\",smoothScroll:!1,children:/*#__PURE__*/e(n.a,{children:\"documentation on configuring and monitoring OneLogin logs here\"})}),\", or customers can sign up for \",/*#__PURE__*/e(o,{href:\"https://pnthr.io/community\",motionChild:!0,nodeId:\"SyBeQVkaI\",openInNewTab:!0,scopeId:\"contentManagement\",smoothScroll:!1,children:/*#__PURE__*/e(n.a,{children:\"the Panther Community\"})}),\" to share best practices or custom detections for OneLogin logs.\"]}),/*#__PURE__*/e(\"h3\",{children:\"The Ideal SIEM for OneLogin\"}),/*#__PURE__*/e(\"p\",{children:\"With Panther, your team doesn't have to waste time and resources on operational overhead, pay excessive costs to keep up with the growth of cloud app data or struggle with restrictive detection logic. Panther was founded by a team of security engineers who struggled with other SIEM solutions first-hand, and built an intuitive, cloud-native platform to solve them.\"}),/*#__PURE__*/t(\"p\",{children:[\"Panther is a cloud-native SIEM built for security operations at scale, offering flexible detection-as-code, intuitive security workflows, and actionable real-time alerts. If you're searching for a seamless SIEM platform for OneLogin, \",/*#__PURE__*/e(o,{href:\"https://panther.com/product/request-a-demo/\",motionChild:!0,nodeId:\"SyBeQVkaI\",openInNewTab:!1,scopeId:\"contentManagement\",smoothScroll:!1,children:/*#__PURE__*/e(n.a,{children:\" request a demo today\"})}),\".\"]})]});export const richText18=/*#__PURE__*/t(i.Fragment,{children:[/*#__PURE__*/e(\"h3\",{children:\"Integration Overview\"}),/*#__PURE__*/e(\"p\",{children:\"Google Workspace (formerly known as G Suite) is a popular suite of cloud-based tools used for email, data storage, file sharing, collaboration, virtual meetings, and more. Panther can collect, normalize, and monitor Google Workspace logs to help you identify suspicious activity within your organization in real time. Your normalized data is then retained to power future security investigations in a data lake powered by the cloud-native data platform, Snowflake.\"}),/*#__PURE__*/e(\"h3\",{children:\"Use Cases for Google Workspace Logs\"}),/*#__PURE__*/e(\"p\",{children:\"Panther has the ability to fetch and monitor G Suite Activity Event and Report log types. Some common SIEM use cases for these logs include monitoring for:\"}),/*#__PURE__*/t(\"ul\",{children:[/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/e(\"p\",{children:\"Changes to verification, authentication, or password policies\"})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/e(\"p\",{children:\"Modifications to organization or application settings\"})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/e(\"p\",{children:\"Suspicious or non-approved login or device activity\"})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/e(\"p\",{children:\"Excessive file sharing, deletions, or downloads\"})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/e(\"p\",{children:\"New applications added to your organization's workspace\"})})]}),/*#__PURE__*/e(\"h3\",{children:\"Onboarding Google Workspace Logs in Panther\"}),/*#__PURE__*/e(\"p\",{children:\"Panther's integration for Google Workspace is fast and easy to configure, allowing you to onboard your logs in just a few minutes by querying the Google Workspace Reports API. Simply select Google Workspace from the list of log sources in the Panther console, create a new app in Google Cloud, enable API, and submit your credentials into the Panther setup menu.\"}),/*#__PURE__*/t(\"p\",{children:[\"For more details on onboarding Google Workspace logs or for supported log schema, you can \",/*#__PURE__*/e(o,{href:\"https://docs.panther.com/data-onboarding/supported-logs/googleworkspace\",motionChild:!0,nodeId:\"SyBeQVkaI\",openInNewTab:!0,scopeId:\"contentManagement\",smoothScroll:!1,children:/*#__PURE__*/e(n.a,{children:\"view our Google Workspace documentation here\"})}),\".\"]}),/*#__PURE__*/e(\"h3\",{children:\"Parsing, Normalizing, & Analyzing Logs\"}),/*#__PURE__*/e(\"p\",{children:\"As Panther ingests Google Workspace logs, they are parsed, normalized, and stored in a Snowflake security data lake. This allows you to build detections, identify anomalies, and conduct investigations in the context of days, weeks, or months of data.\"}),/*#__PURE__*/t(\"p\",{children:[\"Panther applies normalization fields to all log records, which standardizes names for attributes and empowers users to correlate data across all of your log sources. Panther's various search tools - such as Query Builder, Data Explorer, and Indicator Search - allow you to investigate your normalized logs for suspicious activity or vulnerabilities. For more information on searching logs, \",/*#__PURE__*/e(o,{href:\"https://docs.panther.com/data-analytics\",motionChild:!0,nodeId:\"SyBeQVkaI\",openInNewTab:!0,scopeId:\"contentManagement\",smoothScroll:!1,children:/*#__PURE__*/e(n.a,{children:\"check out our documentation on Investigations & Search\"})}),\".\"]}),/*#__PURE__*/e(\"h3\",{children:\"Built-in and Easily Customizable Detections\"}),/*#__PURE__*/t(\"p\",{children:[\"Dozens of pre-built detections for Google Workspace are available by default in Panther, offering users immediate value for monitoring common IoCs and threats. You can \",/*#__PURE__*/e(o,{href:\"https://panther.com/product/detection-coverage/#filter=gsuite\",motionChild:!0,nodeId:\"SyBeQVkaI\",openInNewTab:!1,scopeId:\"contentManagement\",smoothScroll:!1,children:/*#__PURE__*/e(n.a,{children:\" explore our built-in detection coverage for Google Workspace logs here\"})}),\".\"]}),/*#__PURE__*/e(\"p\",{children:\"With Panther, you aren't confined to rigid detections as seen in many SIEM solutions. Panther is architected around detection-as-code principles, giving you the ability to write Python to define detection logic and to integrate external systems like version control and CI/CD pipelines into your detection engineering processes. This results in powerful, flexible, and reusable scripting of detections for your security team.\"}),/*#__PURE__*/e(\"h3\",{children:\"Configuring Alerts\"}),/*#__PURE__*/t(\"p\",{children:[\"Panther generates alerts when your detection rules or policies for Google Workspace are triggered, and integrates with a variety of \",/*#__PURE__*/e(o,{href:\"https://panther.com/integrations/alerts/\",motionChild:!0,nodeId:\"SyBeQVkaI\",openInNewTab:!1,scopeId:\"contentManagement\",smoothScroll:!1,children:/*#__PURE__*/e(n.a,{children:\"alert destinations\"})}),\" to allow for intuitive management of any alerts. Alerts can also be sent to alert context or SOAR platforms for more remediation options.\"]}),/*#__PURE__*/e(\"p\",{children:\"Alerts are categorized by five different severity levels: Info, Low, Medium, High, and Critical. Your security team has the ability to dynamically assign severity based on specific log event attributes.\"}),/*#__PURE__*/e(\"h3\",{children:\"Customer Support\"}),/*#__PURE__*/e(\"p\",{children:\"If you have any questions about configuring or monitoring G Suite logs in Panther, our customer support team is here to help. All customers have access to support via a dedicated Slack channel, email, or in-app messenger.\"}),/*#__PURE__*/t(\"p\",{children:[\"You can view our \",/*#__PURE__*/e(o,{href:\"https://docs.panther.com/data-onboarding/supported-logs/googleworkspace\",motionChild:!0,nodeId:\"SyBeQVkaI\",openInNewTab:!0,scopeId:\"contentManagement\",smoothScroll:!1,children:/*#__PURE__*/e(n.a,{children:\"documentation on configuring and monitoring Google Workspace logs here\"})}),\", or customers can sign up for \",/*#__PURE__*/e(o,{href:\"https://pnthr.io/community\",motionChild:!0,nodeId:\"SyBeQVkaI\",openInNewTab:!0,scopeId:\"contentManagement\",smoothScroll:!1,children:/*#__PURE__*/e(n.a,{children:\"the Panther Community\"})}),\" to share best practices or custom detections for Google Workspace logs.\"]}),/*#__PURE__*/e(\"h3\",{children:\"The Ideal SIEM for Google Workspace\"}),/*#__PURE__*/e(\"p\",{children:\"With Panther, your team doesn't have to waste time and resources on operational overhead, pay excessive costs to keep up with the growth of cloud app data or struggle with restrictive detection logic. Panther was founded by a team of security engineers who struggled with other SIEM solutions first-hand, and built an intuitive, cloud-native platform to solve them.\"}),/*#__PURE__*/t(\"p\",{children:[\"Panther is a cloud-native SIEM built for security operations at scale, offering flexible detection-as-code, intuitive security workflows, and actionable real-time alerts. If you're searching for a seamless SIEM platform for your Google Workspace applications, \",/*#__PURE__*/e(o,{href:\"https://panther.com/product/request-a-demo/\",motionChild:!0,nodeId:\"SyBeQVkaI\",openInNewTab:!1,scopeId:\"contentManagement\",smoothScroll:!1,children:/*#__PURE__*/e(n.a,{children:\" request a demo today\"})}),\".\"]})]});export const richText19=/*#__PURE__*/t(i.Fragment,{children:[/*#__PURE__*/e(\"h3\",{children:\"Integration Overview\"}),/*#__PURE__*/e(\"p\",{children:\"Box develops cloud-based content management, collaboration, and sharing tools and provides businesses with a single place to manage, secure, share, and govern content. Panther can collect, normalize, and monitor Box logs to help you identify any suspicious activity within your organization in real time. Your normalized data is then retained to conduct future security investigations in a serverless security data lake powered by Snowflake.\"}),/*#__PURE__*/e(\"h3\",{children:\"Use Cases for Box Logs\"}),/*#__PURE__*/e(\"p\",{children:\"Box event logs show various types of activity in an organization's Box account, such as permission changes, login activity, or files uploaded, shared, or downloaded. Common security use cases for Box logs include monitoring for:\"}),/*#__PURE__*/t(\"ul\",{children:[/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/e(\"p\",{children:\"New, untrusted, or anomalous login attempts\"})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/e(\"p\",{children:\"Malicious content uploads or transfers\"})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/e(\"p\",{children:\"Excessive folder permission changes or downloads\"})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/t(\"p\",{children:[/*#__PURE__*/e(o,{href:\"https://www.box.com/shield\",motionChild:!0,nodeId:\"SyBeQVkaI\",openInNewTab:!0,scopeId:\"contentManagement\",smoothScroll:!1,children:/*#__PURE__*/e(n.a,{children:\"Box Shield\"})}),\" triggers and alerts\"]})})]}),/*#__PURE__*/e(\"h3\",{children:\"Onboarding Box Logs in Panther\"}),/*#__PURE__*/e(\"p\",{children:\"Panther's integration for Box is simple to configure, allowing you to onboard logs in just a few minutes. Simply select Box from the list of log sources within the Panther console, create a new Box App within the Box Developer Console, and enter your Box credentials into Panther.\"}),/*#__PURE__*/t(\"p\",{children:[\"Panther can pull audit events from the \",/*#__PURE__*/e(o,{href:\"https://developer.box.com/reference/get-events/\",motionChild:!0,nodeId:\"SyBeQVkaI\",openInNewTab:!0,scopeId:\"contentManagement\",smoothScroll:!1,children:/*#__PURE__*/e(n.a,{children:\"Box Events API \"})}),\" every 60 seconds for real-time detection. For more details on onboarding Box logs or for supported log schema, you can \",/*#__PURE__*/e(o,{href:\"https://docs.panther.com/data-onboarding/supported-logs/box\",motionChild:!0,nodeId:\"SyBeQVkaI\",openInNewTab:!0,scopeId:\"contentManagement\",smoothScroll:!1,children:/*#__PURE__*/e(n.a,{children:\"view our Box documentation here\"})}),\".\"]}),/*#__PURE__*/e(\"h3\",{children:\"Parsing, Normalizing, & Analyzing\"}),/*#__PURE__*/e(\"p\",{children:\"As Panther ingests Box event logs, they are parsed, normalized, and stored in a Snowflake security data lake. This allows you to write detections, identify anomalies, and conduct investigations in the context of days, weeks, or months of data.\"}),/*#__PURE__*/t(\"p\",{children:[\"Panther applies normalization fields to all log records, which standardizes names for attributes and empowers users to correlate data across all of your log sources - not just Box. You can then use Panther's various search tools - such as Query Builder, Data Explorer, and Indicator Search - to investigate your normalized logs for suspicious activity or vulnerabilities. For more information on searching log data, \",/*#__PURE__*/e(o,{href:\"https://docs.panther.com/data-analytics\",motionChild:!0,nodeId:\"SyBeQVkaI\",openInNewTab:!0,scopeId:\"contentManagement\",smoothScroll:!1,children:/*#__PURE__*/e(n.a,{children:\"check out our documentation on Investigations & Search\"})}),\".\"]}),/*#__PURE__*/e(\"h3\",{children:\"Built-in and Easily Customizable Detections\"}),/*#__PURE__*/t(\"p\",{children:[\"A number of pre-built detections for Box are available by default in Panther, offering users immediate value for monitoring common IoCs and threats. You can \",/*#__PURE__*/e(o,{href:\"https://panther.com/product/detection-coverage/#filter=box\",motionChild:!0,nodeId:\"SyBeQVkaI\",openInNewTab:!1,scopeId:\"contentManagement\",smoothScroll:!1,children:/*#__PURE__*/e(n.a,{children:\" explore our built-in detection coverage for Box logs here\"})}),\".\"]}),/*#__PURE__*/e(\"p\",{children:\"With Panther, you aren't confined to restrictive detections as seen in many SIEM platforms. Panther is architected around detection-as-code principles, giving you the ability to write Python to define detection logic and to integrate external systems like version control and CI/CD pipelines into your detection engineering processes. This results in powerful, flexible, and reusable scripting of detections for your security team.\"}),/*#__PURE__*/e(\"h3\",{children:\"Configuring Alerts\"}),/*#__PURE__*/t(\"p\",{children:[\"Panther generates alerts when your detection rules or policies are triggered, and integrates with a variety of \",/*#__PURE__*/e(o,{href:\"https://panther.com/integrations/alerts/\",motionChild:!0,nodeId:\"SyBeQVkaI\",openInNewTab:!1,scopeId:\"contentManagement\",smoothScroll:!1,children:/*#__PURE__*/e(n.a,{children:\"alert destinations\"})}),\" to allow for easy access and management of alerts. Alerts can also be sent to alert context or SOAR platforms for more remediation options.\"]}),/*#__PURE__*/e(\"p\",{children:\"Alerts are grouped into five different severity levels: Info, Low, Medium, High, and Critical. Your team has the ability to dynamically assign severity based on specific log event attributes.\"}),/*#__PURE__*/e(\"h3\",{children:\"Customer Support\"}),/*#__PURE__*/e(\"p\",{children:\"If you have any questions about configuring or monitoring Box logs in Panther, our customer support team is here to help. All customers have access to support via a dedicated Slack channel, email, or in-app messenger.\"}),/*#__PURE__*/t(\"p\",{children:[\"You can view our \",/*#__PURE__*/e(o,{href:\"https://docs.panther.com/data-onboarding/supported-logs/box\",motionChild:!0,nodeId:\"SyBeQVkaI\",openInNewTab:!0,scopeId:\"contentManagement\",smoothScroll:!1,children:/*#__PURE__*/e(n.a,{children:\"documentation on configuring and monitoring Box logs here\"})}),\", or customers can sign up for \",/*#__PURE__*/e(o,{href:\"https://pnthr.io/community\",motionChild:!0,nodeId:\"SyBeQVkaI\",openInNewTab:!0,scopeId:\"contentManagement\",smoothScroll:!1,children:/*#__PURE__*/e(n.a,{children:\"the Panther Community\"})}),\" to share best practices or custom detections for Box logs.\"]}),/*#__PURE__*/e(\"h3\",{children:\"Replacing Traditional SIEM for Box Logs\"}),/*#__PURE__*/e(\"p\",{children:\"With Panther, your team doesn't have to pay excessive costs to keep up with the growth of cloud app data, struggle with rigid detection logic, or waste time and resources on operational overhead. Panther was founded by a team of security engineers who struggled with today's SIEM challenges first-hand, and built an intuitive, cloud-native platform to solve them.\"}),/*#__PURE__*/t(\"p\",{children:[\"Panther is a cloud-native SIEM built for security operations at scale, offering flexible detection-as-code, intuitive security workflows, and actionable real-time alerts. If you're searching for a seamless SIEM platform for Box logs, \",/*#__PURE__*/e(o,{href:\"https://panther.com/product/request-a-demo/\",motionChild:!0,nodeId:\"SyBeQVkaI\",openInNewTab:!1,scopeId:\"contentManagement\",smoothScroll:!1,children:/*#__PURE__*/e(n.a,{children:\"request a demo today\"})}),\".\"]})]});export const richText20=/*#__PURE__*/t(i.Fragment,{children:[/*#__PURE__*/t(\"p\",{children:[\"Perform robust security investigations against a well-structured data lake powered by \",/*#__PURE__*/e(o,{href:\"https://snowflake.com\",motionChild:!0,nodeId:\"SyBeQVkaI\",openInNewTab:!1,scopeId:\"contentManagement\",smoothScroll:!1,children:/*#__PURE__*/e(n.a,{children:\"Snowflake\"})}),\", the industry's most advanced cloud-data platform.\"]}),/*#__PURE__*/e(\"p\",{children:\"With Panther's Snowflake integration, you can collect normalized security data in your Snowflake for affordable long-term retention. A Snowflake powered security data lake offers cloud-first organizations affordable long-term storage, a rich ecosystem of integrations, and massively scalable infrastructure to power investigations against years of data.\"}),/*#__PURE__*/e(\"h4\",{children:\"Use Cases\"}),/*#__PURE__*/e(\"p\",{children:\"With Panther and Snowflake, you can:\"}),/*#__PURE__*/t(\"ul\",{children:[/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/e(\"p\",{children:\"Collect terabytes of normalized security data in Snowflake for affordable, long-term retention\"})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/e(\"p\",{children:\"Scale up your warehouse with the click of a button when you need to query months or years of data during an investigation\"})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/e(\"p\",{children:\"Join Panther data (e.g. alerts) with other data sources in your Snowflake in a single interface to assess the security posture of your organization.\"})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/e(\"p\",{children:\"Take advantage of Snowflake's rich ecosystem of integrations to gain new insights from your security data.\"})})]}),/*#__PURE__*/e(\"h4\",{children:\"How it Works\"}),/*#__PURE__*/e(\"p\",{children:\"Panther uses Snowpipe to send data to your Snowflake cluster. The integration is fast and streamlined:\"}),/*#__PURE__*/t(\"ul\",{children:[/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/e(\"p\",{children:\"Configure the Panther with an AWS Secret for access\"})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/e(\"p\",{children:\"Configure Panther to ingest data into Snowflake\"})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/e(\"p\",{children:\"Update permissions and query data in Snowflake from Panther!\"})})]}),/*#__PURE__*/t(\"p\",{children:[\"Learn how to configure your \",/*#__PURE__*/e(o,{href:\"https://docs.panther.com/system-configuration/snowflake-setup\",motionChild:!0,nodeId:\"SyBeQVkaI\",openInNewTab:!1,scopeId:\"contentManagement\",smoothScroll:!1,children:/*#__PURE__*/e(n.a,{children:\"security data lake in Snowflake\"})}),\".\"]})]});export const richText21=/*#__PURE__*/t(i.Fragment,{children:[/*#__PURE__*/e(\"p\",{children:\"Continuously audit your AWS CloudTrail configurations and enforce security compliance as code with Panther.\"}),/*#__PURE__*/e(\"p\",{children:\"CloudTrail collects information from security, audit, VPC flow logs, and even API calls to monitor and log account activity continuously. Use Panther to track real-time changes to your CloudTrail to ensure configurations meet your business requirements for security and compliance.\"}),/*#__PURE__*/t(\"p\",{children:[\"Enabling CloudTrail is critical for understanding the history of account changes and detecting suspicious activity. Use Panther's built in policies for \",/*#__PURE__*/e(o,{href:\"https://github.com/panther-labs/panther-analysis/tree/master/policies/aws_cloudtrail_policies\",motionChild:!0,nodeId:\"SyBeQVkaI\",openInNewTab:!0,scopeId:\"contentManagement\",smoothScroll:!1,children:/*#__PURE__*/e(n.a,{children:\"continuous monitoring of CloudTrail resources\"})}),\", or write your own detections in Python to fit your internal business use cases.\"]}),/*#__PURE__*/e(\"h4\",{children:\"Use Cases\"}),/*#__PURE__*/e(\"p\",{children:\"Panther enables the following use-cases with this data:\"}),/*#__PURE__*/t(\"ul\",{children:[/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/e(\"p\",{children:\"Analyze and keep track of changes to infrastructure (e.g., ACL changes)\"})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/e(\"p\",{children:\"Receive real-time alerts to suspicious activity\"})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/e(\"p\",{children:\"Ingest all your CloudTrail data in one place and gain insights into your CloudTrails logging activity using S3\"})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/e(\"p\",{children:\"Ensure the most secure configuration possible\"})})]}),/*#__PURE__*/e(\"h4\",{children:\"How it Works\"}),/*#__PURE__*/e(\"p\",{children:\"The integration is simple and fast:\"}),/*#__PURE__*/t(\"ul\",{children:[/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/e(\"p\",{children:\"Connect your AWS account to Panther\"})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/e(\"p\",{children:\"A baseline scan is performed to identify all existing CloudTrails in your account(s)\"})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/e(\"p\",{children:\"Built-in detections identify security issues\"})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/e(\"p\",{children:\"Alerts will be sent if non-compliant CloudTrails exist\"})})]}),/*#__PURE__*/e(\"p\",{children:\"Use Panther to search all CloudTrails in an account by name, view their compliance status, associated policies, and configured remediations.\"}),/*#__PURE__*/e(\"h4\",{children:\"CloudTrail Log Analysis\"}),/*#__PURE__*/t(\"p\",{children:[\"Panther can also collect, normalize, and analyze your CloudTrail logs to detect suspicious activity in real time. Learn more about using Panther to \",/*#__PURE__*/e(o,{href:\"https://panther.com/integrations/aws/\",motionChild:!0,nodeId:\"SyBeQVkaI\",openInNewTab:!1,scopeId:\"contentManagement\",smoothScroll:!1,children:/*#__PURE__*/e(n.a,{children:\"analyze your AWS logs for security insights\"})}),\".\"]})]});export const richText22=/*#__PURE__*/t(i.Fragment,{children:[/*#__PURE__*/e(\"p\",{children:\"Continuously audit your AWS S3 configurations and enforce security compliance as code with Panther.\"}),/*#__PURE__*/e(\"p\",{children:\"S3 is a robust and scalable object storage service offered by AWS. Use Panther to track real-time changes to your S3 buckets to ensure configurations meet your business requirements for security and compliance.\"}),/*#__PURE__*/t(\"p\",{children:[\"Monitoring S3 is critical for understanding the history of bucket changes and detecting suspicious activity. Use Panther's built in policies for \",/*#__PURE__*/e(o,{href:\"https://github.com/panther-labs/panther-analysis/tree/master/policies/aws_s3_policies\",motionChild:!0,nodeId:\"SyBeQVkaI\",openInNewTab:!0,scopeId:\"contentManagement\",smoothScroll:!1,children:/*#__PURE__*/e(n.a,{children:\"continuous monitoring of S3 resources\"})}),\", or write your own detections in Python to fit your internal business use cases.\"]}),/*#__PURE__*/e(\"h4\",{children:\"Use Cases\"}),/*#__PURE__*/e(\"p\",{children:\"Common security use cases for S3 with Panther include:\"}),/*#__PURE__*/t(\"ul\",{children:[/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/e(\"p\",{children:\"Identify \u201Cknown-bad\u201D traffic flows\"})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/e(\"p\",{children:\"Find insecure access to buckets\"})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/e(\"p\",{children:\"Detect access errors on buckets\"})})]}),/*#__PURE__*/e(\"h4\",{children:\"How it Works\"}),/*#__PURE__*/e(\"p\",{children:\"The integration is simple and fast:\"}),/*#__PURE__*/t(\"ul\",{children:[/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/e(\"p\",{children:\"Connect your AWS account to Panther\"})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/e(\"p\",{children:\"A baseline scan is performed to identify all existing S3 buckets in your account(s)\"})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/e(\"p\",{children:\"Built-in detections identify security issues\"})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/e(\"p\",{children:\"Alerts will be sent if non-compliant S3 buckets exist\"})})]}),/*#__PURE__*/e(\"p\",{children:\"Use Panther to search all S3 buckets in an AWS account by name, view their compliance status, associated policies, and configured remediations.\"}),/*#__PURE__*/e(\"h4\",{children:\"S3 Access Log Analysis\"}),/*#__PURE__*/t(\"p\",{children:[\"Panther can also collect, normalize, and analyze your S3 access logs to detect suspicious activity in real time. Learn more about using Panther to \",/*#__PURE__*/e(o,{href:\"https://panther.com/integrations/aws/\",motionChild:!0,nodeId:\"SyBeQVkaI\",openInNewTab:!1,scopeId:\"contentManagement\",smoothScroll:!1,children:/*#__PURE__*/e(n.a,{children:\"analyze your AWS logs for security insights\"})}),\".\"]})]});export const richText23=/*#__PURE__*/t(i.Fragment,{children:[/*#__PURE__*/e(\"p\",{children:\"Continuously audit your EC2 VPC configurations and enforce security compliance as code with Panther.\"}),/*#__PURE__*/e(\"p\",{children:\"VPC allows you to capture information about the IP traffic going to and from network interfaces in your VPC. Use Panther to track real-time changes to your VPC to ensure configurations meet your business requirements for security and compliance.\"}),/*#__PURE__*/t(\"p\",{children:[\"Monitoring VPC is essential for understanding the traffic flow in your network interfaces. Use Panther's built in policies for \",/*#__PURE__*/e(o,{href:\"https://github.com/panther-labs/panther-analysis/tree/master/policies/aws_vpc_policies\",motionChild:!0,nodeId:\"SyBeQVkaI\",openInNewTab:!0,scopeId:\"contentManagement\",smoothScroll:!1,children:/*#__PURE__*/e(n.a,{children:\"continuous monitoring of VPC resources\"})}),\", or write your own detections in Python to fit your internal business use cases.\"]}),/*#__PURE__*/e(\"h4\",{children:\"Use Cases\"}),/*#__PURE__*/e(\"p\",{children:\"Common security use cases for VPC with Panther include:\"}),/*#__PURE__*/t(\"ul\",{children:[/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/e(\"p\",{children:\"Analyze traffic flowing to and from specific addresses\"})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/e(\"p\",{children:\"Find ACL inconsistencies to ensure your AWS services are secured\"})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/e(\"p\",{children:\"Check if VPCs have network flow logging enabled\"})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/e(\"p\",{children:\"Get alerts in real-time for suspicious activity\"})})]}),/*#__PURE__*/e(\"h4\",{children:\"How it Works\"}),/*#__PURE__*/e(\"p\",{children:\"The integration is simple and fast:\"}),/*#__PURE__*/t(\"ul\",{children:[/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/e(\"p\",{children:\"Connect your AWS account to Panther\"})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/e(\"p\",{children:\"A baseline scan is performed to identify all existing VPC in your account(s)\"})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/e(\"p\",{children:\"Built-in detections identify security issues\"})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/e(\"p\",{children:\"Alerts will be sent if non-compliant resources are detected\"})})]}),/*#__PURE__*/e(\"p\",{children:\"Use Panther to search all VPCs in an AWS account by name, view their compliance status, associated policies, and configured remediations.\"}),/*#__PURE__*/e(\"h4\",{children:\"VPC Flow Log Analysis\"}),/*#__PURE__*/t(\"p\",{children:[\"Panther can also collect, normalize, and analyze your VPC Flow logs to detect suspicious activity in real time. Learn more about using Panther to \",/*#__PURE__*/e(o,{href:\"https://panther.com/integrations/aws/\",motionChild:!0,nodeId:\"SyBeQVkaI\",openInNewTab:!1,scopeId:\"contentManagement\",smoothScroll:!1,children:/*#__PURE__*/e(n.a,{children:\"analyze your AWS logs for security insights\"})}),\".\"]})]});export const richText24=/*#__PURE__*/t(i.Fragment,{children:[/*#__PURE__*/e(\"p\",{children:\"Continuously audit your GuardDuty configurations and enforce security compliance as code with Panther.\"}),/*#__PURE__*/e(\"p\",{children:\"AWS GuardDuty helps detect unauthorized events and potentially malicious activities in your environment by using threat intelligence feeds. Use Panther to track real-time changes to your GuardDuty to ensure configurations meet your business requirements for security and compliance.\"}),/*#__PURE__*/t(\"p\",{children:[\"Monitoring GuardDuty is essential to check your AWS account for signs of compromised access or critical infrastructure. Use Panther's built in policies for \",/*#__PURE__*/e(o,{href:\"https://github.com/panther-labs/panther-analysis/tree/master/policies/aws_guardduty_policies\",motionChild:!0,nodeId:\"SyBeQVkaI\",openInNewTab:!0,scopeId:\"contentManagement\",smoothScroll:!1,children:/*#__PURE__*/e(n.a,{children:\"continuous monitoring of GuardDuty resources\"})}),\", or write your own detections in Python to fit your internal business use cases.\"]}),/*#__PURE__*/e(\"h4\",{children:\"Use Cases\"}),/*#__PURE__*/e(\"p\",{children:\"Common security use cases for GuardDuty with Panther include:\"}),/*#__PURE__*/t(\"ul\",{children:[/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/e(\"p\",{children:\"Flag GuardDuty findings against critical infrastructure for immediate attention\"})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/e(\"p\",{children:\"Setup and prioritize alerts based on severity levels of GuardDuty findings\"})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/e(\"p\",{children:\"Perform granular search and analytics on GuardDuty findings\"})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/e(\"p\",{children:\"Instant remediation of insecure resources\"})})]}),/*#__PURE__*/e(\"h4\",{children:\"How it Works\"}),/*#__PURE__*/e(\"p\",{children:\"The integration is simple and fast:\"}),/*#__PURE__*/t(\"ul\",{children:[/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/e(\"p\",{children:\"Connect your AWS account to Panther\"})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/e(\"p\",{children:\"Panther will automatically parse and extract any tags from a GuardDuty finding\"})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/e(\"p\",{children:\"Built-in detections identify security issues\"})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/e(\"p\",{children:\"Alerts will be sent to your team for remediation\"})})]}),/*#__PURE__*/e(\"h4\",{children:\"GuardDuty Log Analysis\"}),/*#__PURE__*/t(\"p\",{children:[\"Panther can also collect, normalize, and analyze your GuardDuty logs to detect suspicious activity in real time. Learn more about using Panther to \",/*#__PURE__*/e(o,{href:\"https://panther.com/integrations/aws/\",motionChild:!0,nodeId:\"SyBeQVkaI\",openInNewTab:!1,scopeId:\"contentManagement\",smoothScroll:!1,children:/*#__PURE__*/e(n.a,{children:\"analyze your AWS logs for security insights\"})}),\".\"]})]});export const richText25=/*#__PURE__*/t(i.Fragment,{children:[/*#__PURE__*/e(\"p\",{children:\"Continuously audit your Lambda configurations and enforce security compliance as code with Panther.\"}),/*#__PURE__*/e(\"p\",{children:\"AWS Lambda is a service that allows you to run code without provisioning or managing servers. You can code virtually any type of application or service and set up automatic triggers from other AWS services. Use Panther to track real-time changes to your Lambda service to ensure configurations meet your business requirements for security and compliance.\"}),/*#__PURE__*/e(\"p\",{children:\"Monitoring Lambda is critical for understanding the history of function changes and detecting suspicious activity. Use Panther's built in policies for continuous monitoring of Lambda resources, or write your own detections in Python to fit your internal business use cases.\"}),/*#__PURE__*/e(\"h4\",{children:\"Use Cases\"}),/*#__PURE__*/e(\"p\",{children:\"Common security use cases for AWS Lambda with Panther include:\"}),/*#__PURE__*/t(\"ul\",{children:[/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/e(\"p\",{children:\"Monitor the health and performance of all your Lambda functions\"})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/e(\"p\",{children:\"Ensure the most secure configuration possible\"})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/e(\"p\",{children:\"Keep track of changes to infrastructure\"})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/e(\"p\",{children:\"Identify exceptions within your AWS environment and remediate quickly\"})})]}),/*#__PURE__*/e(\"h4\",{children:\"How it Works\"}),/*#__PURE__*/e(\"p\",{children:\"The integration is simple and fast:\"}),/*#__PURE__*/t(\"ul\",{children:[/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/e(\"p\",{children:\"Connect your AWS account to Panther\"})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/e(\"p\",{children:\"A baseline scan is performed to identify all existing Lambda functions in your AWS account(s)\"})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/e(\"p\",{children:\"Built-in detections identify security issues\"})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/e(\"p\",{children:\"Alerts will be sent to your team for remediation\"})})]}),/*#__PURE__*/t(\"p\",{children:[\"Use Panther to search all Lambda functions in an AWS account by name, view their compliance status, associated policies, and configured remediations. Learn more about using Panther to \",/*#__PURE__*/e(o,{href:\"https://panther.com/integrations/aws/\",motionChild:!0,nodeId:\"SyBeQVkaI\",openInNewTab:!1,scopeId:\"contentManagement\",smoothScroll:!1,children:/*#__PURE__*/e(n.a,{children:\"analyze your AWS logs for security insights\"})}),\".\"]})]});export const richText26=/*#__PURE__*/t(i.Fragment,{children:[/*#__PURE__*/e(\"p\",{children:\"Continuously audit your WAF Web ACL configurations and enforce security compliance as code with Panther.\"}),/*#__PURE__*/e(\"p\",{children:\"A web access control list (web ACL) gives you fine-grained control over the web requests that your Amazon API Gateway API, Amazon CloudFront distribution, or Application Load Balancer responds to. Use Panther to track real-time changes to your web ACL to ensure configurations meet your business requirements for security and compliance.\"}),/*#__PURE__*/t(\"p\",{children:[\"Monitor web ACL to identify incoming threats through WAF and help detect, investigate, and remediate a web ACL failure. Use Panther's built in policies for \",/*#__PURE__*/e(o,{href:\"https://github.com/panther-labs/panther-analysis/tree/master/policies/aws_waf_policies\",motionChild:!0,nodeId:\"SyBeQVkaI\",openInNewTab:!0,scopeId:\"contentManagement\",smoothScroll:!1,children:/*#__PURE__*/e(n.a,{children:\"continuous monitoring of web ACL resources\"})}),\", or write your own detections in Python to fit your internal business use cases.\"]}),/*#__PURE__*/e(\"h4\",{children:\"Use Cases\"}),/*#__PURE__*/e(\"p\",{children:\"Common security use cases for Web ACL with Panther include:\"}),/*#__PURE__*/t(\"ul\",{children:[/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/e(\"p\",{children:\"Build alerts to communicate about suspicious activity\"})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/e(\"p\",{children:\"Detect and remediate failed web ACLs\"})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/e(\"p\",{children:\"Identify unusual traffic patterns and find root causes\"})})]}),/*#__PURE__*/e(\"h4\",{children:\"How it Works\"}),/*#__PURE__*/e(\"p\",{children:\"The integration is simple and fast:\"}),/*#__PURE__*/t(\"ul\",{children:[/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/e(\"p\",{children:\"Connect your AWS account to Panther\"})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/e(\"p\",{children:\"A baseline scan is performed to identify all existing Web ACLs in your account(s)\"})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/e(\"p\",{children:\"Built-in detections identify security issues related to failed web ACLs\"})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/e(\"p\",{children:\"Alerts will be sent if non-compliant web ACLs exist\"})})]}),/*#__PURE__*/t(\"p\",{children:[\"Use Panther to search all Web ACL in an AWS account by name, view their compliance status, associated policies, and configured remediations. Learn more about using Panther to \",/*#__PURE__*/e(o,{href:\"https://panther.com/integrations/aws/\",motionChild:!0,nodeId:\"SyBeQVkaI\",openInNewTab:!1,scopeId:\"contentManagement\",smoothScroll:!1,children:/*#__PURE__*/e(n.a,{children:\"analyze your AWS logs for security insights\"})}),\".\"]})]});export const richText27=/*#__PURE__*/t(i.Fragment,{children:[/*#__PURE__*/e(\"p\",{children:\"Continuously audit and monitor ALB (Application Load Balancers) configurations and enforce security compliance as code with Panther.\"}),/*#__PURE__*/e(\"p\",{children:\"Application Load Balancers functions at the application layer of the OSI model and distributes incoming application traffic across multiple compute resources. Use Panther to track real-time changes to your ALB resources to ensure configurations meet your business requirements for security and compliance.\"}),/*#__PURE__*/t(\"p\",{children:[\"Monitoring ALB is critical for understanding the history of load changes and detecting suspicious activity. Use Panther's built in policies for \",/*#__PURE__*/e(o,{href:\"https://github.com/panther-labs/panther-analysis/tree/master/policies/aws_elb_policies\",motionChild:!0,nodeId:\"SyBeQVkaI\",openInNewTab:!0,scopeId:\"contentManagement\",smoothScroll:!1,children:/*#__PURE__*/e(n.a,{children:\"continuous monitoring of ALB resources\"})}),\", or write your own detections in Python to fit your internal business use cases.\"]}),/*#__PURE__*/e(\"h4\",{children:\"Use Cases\"}),/*#__PURE__*/e(\"p\",{children:\"Common security use cases for ALB with Panther include:\"}),/*#__PURE__*/e(\"ul\",{children:/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/e(\"p\",{children:\"Validate that all application load balancers have an associated Web ACL to enforce protections against various web attacks\"})})}),/*#__PURE__*/e(\"h4\",{children:\"How it Works\"}),/*#__PURE__*/e(\"p\",{children:\"The integration is simple and fast:\"}),/*#__PURE__*/t(\"ul\",{children:[/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/e(\"p\",{children:\"Connect your AWS account to Panther\"})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/e(\"p\",{children:\"A baseline scan is performed to identify all existing ALB's in your account(s)\"})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/e(\"p\",{children:\"Built-in detections identify security issues\"})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/e(\"p\",{children:\"Alerts will be sent if non-compliant ALB's exist\"})})]}),/*#__PURE__*/e(\"p\",{children:\"Use Panther to search all ALB's in an account by name, view their compliance status, associated policies, and configured remediations.\"}),/*#__PURE__*/e(\"h4\",{children:\"AWS ALB Log Analysis\"}),/*#__PURE__*/t(\"p\",{children:[\"Panther can also collect, normalize, and analyze your ALB logs to detect suspicious activity in real time. Learn more about using Panther to \",/*#__PURE__*/e(o,{href:\"https://panther.com/integrations/aws/\",motionChild:!0,nodeId:\"SyBeQVkaI\",openInNewTab:!1,scopeId:\"contentManagement\",smoothScroll:!1,children:/*#__PURE__*/e(n.a,{children:\"analyze your AWS logs for security insights\"})}),\".\"]})]});export const richText28=/*#__PURE__*/t(i.Fragment,{children:[/*#__PURE__*/e(\"p\",{children:\"Continuously audit and monitor ACM Certificate configurations and enforce security compliance as code with Panther.\"}),/*#__PURE__*/e(\"p\",{children:\"AWS Certificate Manager (ACM) handles creating, storing, and renewing public and private SSL/TLS certificates and keys that protect your AWS websites and applications. Use Panther to track real-time changes to your ACM cerificates to ensure configurations meet your business requirements for security and compliance.\"}),/*#__PURE__*/t(\"p\",{children:[\"Monitoring ACM is critical for understanding the history of public and private SSL/TLS certificate changes and detecting suspicious activity. Use Panther's built in policies for \",/*#__PURE__*/e(o,{href:\"https://github.com/panther-labs/panther-analysis/tree/master/policies/aws_acm_policies\",motionChild:!0,nodeId:\"SyBeQVkaI\",openInNewTab:!0,scopeId:\"contentManagement\",smoothScroll:!1,children:/*#__PURE__*/e(n.a,{children:\"continuous monitoring of ACM resources\"})}),\", or write your own detections in Python to fit your internal business use cases.\"]}),/*#__PURE__*/e(\"h4\",{children:\"Use Cases\"}),/*#__PURE__*/e(\"p\",{children:\"Common security use cases for ACM Certificate with Panther include:\"}),/*#__PURE__*/t(\"ul\",{children:[/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/e(\"p\",{children:\"Ensure all ACM certificates are using secure key and signature algorithms\"})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/e(\"p\",{children:\"Monitor ACM certificate expiration\"})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/e(\"p\",{children:\"Check if an ACM certificate renewal is pending or has failed and is in use by any other resources within the account.\"})})]}),/*#__PURE__*/e(\"h4\",{children:\"How it Works\"}),/*#__PURE__*/e(\"p\",{children:\"The integration is simple and fast:\"}),/*#__PURE__*/t(\"ul\",{children:[/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/e(\"p\",{children:\"Connect your AWS account(s) to Panther\"})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/e(\"p\",{children:\"A baseline scan is performed to identify all existing ACM certificates enabled in your AWS applications\"})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/e(\"p\",{children:\"Built-in detections identify security issues\"})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/e(\"p\",{children:\"Alerts will be sent if non-compliant ACM Certificates exist\"})})]}),/*#__PURE__*/t(\"p\",{children:[\"Use Panther to search all ACM Certificates by name, view their compliance status, associated policies, and configured remediations. Learn more about using Panther to \",/*#__PURE__*/e(o,{href:\"https://panther.com/integrations/aws/\",motionChild:!0,nodeId:\"SyBeQVkaI\",openInNewTab:!1,scopeId:\"contentManagement\",smoothScroll:!1,children:/*#__PURE__*/e(n.a,{children:\"analyze your AWS logs for security insights\"})}),\".\"]})]});export const richText29=/*#__PURE__*/t(i.Fragment,{children:[/*#__PURE__*/e(\"p\",{children:\"Continuously audit and monitor AWS Redshift Cluster configurations and enforce security compliance as code with Panther.\"}),/*#__PURE__*/e(\"p\",{children:\"Amazon Redshift is a fully-managed cloud-based data warehouse product designed for large scale data set storage and analysis. The Redshift data warehouse is a collection of computing resources called nodes, which are organized into a group called a cluster. Each cluster runs an Amazon Redshift engine and contains one or more databases. Use Panther to track real-time changes to your Redshift Clusters to ensure configurations meet your business requirements for security and compliance.\"}),/*#__PURE__*/t(\"p\",{children:[\"Monitoring Redshift is critical for understanding the history of database changes and detecting suspicious activity. Use Panther's built in policies for \",/*#__PURE__*/e(o,{href:\"https://github.com/panther-labs/panther-analysis/tree/master/policies/aws_redshift_policies\",motionChild:!0,nodeId:\"SyBeQVkaI\",openInNewTab:!0,scopeId:\"contentManagement\",smoothScroll:!1,children:/*#__PURE__*/e(n.a,{children:\"continuous monitoring of Redshift resources\"})}),\", or write your own detections in Python to fit your internal business use cases.\"]}),/*#__PURE__*/e(\"h4\",{children:\"Use Cases\"}),/*#__PURE__*/e(\"p\",{children:\"Common security use cases for Redshift Cluster with Panther include:\"}),/*#__PURE__*/t(\"ul\",{children:[/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/e(\"p\",{children:\"Validate that Redshift Cluster has logging and encryption enabled.\"})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/e(\"p\",{children:\"Ensure Redshift Clusters automatically performs upgrades during scheduled maintenance windows\"})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/e(\"p\",{children:\"Monitor if Redshift Cluster snapshot retention periods are set to an appropriate time\"})})]}),/*#__PURE__*/e(\"h4\",{children:\"How it Works\"}),/*#__PURE__*/e(\"p\",{children:\"The integration is simple and fast:\"}),/*#__PURE__*/t(\"ul\",{children:[/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/e(\"p\",{children:\"Connect your AWS account to Panther\"})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/e(\"p\",{children:\"A baseline scan is performed to identify all existing Redshift clusters in your account(s)\"})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/e(\"p\",{children:\"Built-in detections identify security issues\"})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/e(\"p\",{children:\"Alerts will be sent if non-compliant Redshift cluster exist\"})})]}),/*#__PURE__*/t(\"p\",{children:[\"Use Panther to search all Redshift clusters in an account by name, view their compliance status, associated policies, and configured remediations. Learn more about using Panther to \",/*#__PURE__*/e(o,{href:\"https://panther.com/integrations/aws/\",motionChild:!0,nodeId:\"SyBeQVkaI\",openInNewTab:!1,scopeId:\"contentManagement\",smoothScroll:!1,children:/*#__PURE__*/e(n.a,{children:\"analyze your AWS logs for security insights\"})}),\".\"]})]});export const richText30=/*#__PURE__*/t(i.Fragment,{children:[/*#__PURE__*/e(\"p\",{children:\"Continuously audit and monitor AWS DynamoDB table configurations and enforce security compliance as code with Panther.\"}),/*#__PURE__*/t(\"p\",{children:[\"AWS DynamoDB is a fully managed NoSQL database service provided by Amazon. The AWS DynamoDB resource represents a snapshot of an AWS DynamoDB table. Track real-time changes to your DynamoDB table to ensure the most secure configuration possible. Keep the highest standards for infrastructure security using Panther\u201A\\xc4\\xf4s \",/*#__PURE__*/e(o,{href:\"https://github.com/panther-labs/panther-analysis/tree/master/policies/aws_dynamodb_policies\",motionChild:!0,nodeId:\"SyBeQVkaI\",openInNewTab:!0,scopeId:\"contentManagement\",smoothScroll:!1,children:/*#__PURE__*/e(n.a,{children:\"built-in policies\"})}),\".\"]}),/*#__PURE__*/e(\"p\",{children:\"Use Panther to monitor the performance of your database applications running through DynamoDB and get alerted when a database change occurs.\"}),/*#__PURE__*/e(\"h4\",{children:\"Use Cases\"}),/*#__PURE__*/e(\"p\",{children:\"Common security use cases for DynamoDB with Panther include:\"}),/*#__PURE__*/t(\"ul\",{children:[/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/e(\"p\",{children:\"Configure DynamoDB Auto Scaling to adjust provisioned throughput capacity in response to traffic patterns.\"})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/e(\"p\",{children:\"Ensure Table encryption is enabled\"})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/e(\"p\",{children:\"Increase a table's provisioned read and write capacity to handle sudden increases in traffic\"})})]}),/*#__PURE__*/e(\"h4\",{children:\"How it Works\"}),/*#__PURE__*/e(\"p\",{children:\"The integration is simple and fast:\"}),/*#__PURE__*/t(\"ul\",{children:[/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/e(\"p\",{children:\"Connect your AWS account to Panther\"})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/e(\"p\",{children:\"A baseline scan is performed to identify all existing DynamoDB resources in your account(s)\"})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/e(\"p\",{children:\"Built-in detections identify security issues\"})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/e(\"p\",{children:\"Alerts will be sent if non-compliant DynamoDB resources exist\"})})]}),/*#__PURE__*/t(\"p\",{children:[\"Use Panther to search all DynamoDB resources in an account by name, view their compliance status, associated policies, and configured remediations. Learn more about using Panther to \",/*#__PURE__*/e(o,{href:\"https://panther.com/integrations/aws/\",motionChild:!0,nodeId:\"SyBeQVkaI\",openInNewTab:!1,scopeId:\"contentManagement\",smoothScroll:!1,children:/*#__PURE__*/e(n.a,{children:\"analyze your AWS logs for security insights\"})}),\".\"]}),/*#__PURE__*/e(\"p\",{children:\"\\xa0\"})]});export const richText31=/*#__PURE__*/t(i.Fragment,{children:[/*#__PURE__*/e(\"p\",{children:\"Continuously audit and monitor AWS Config Recorder configurations and enforce security compliance as code with Panther.\"}),/*#__PURE__*/e(\"p\",{children:\"AWS Config provides a detailed view of the configuration of AWS resources in your AWS account. The AWS Config Recorder resource describes the AWS resource types for which AWS Config records configuration changes. Use Panther to track real-time changes to your Confic Recorder resources to ensure configurations meet your business requirements for security and compliance.\"}),/*#__PURE__*/t(\"p\",{children:[\"Monitoring Config Recorder is critical for understanding the history of AWS resource configuration changes and detecting suspicious activity. Use Panther's built in policies for \",/*#__PURE__*/e(o,{href:\"https://github.com/panther-labs/panther-analysis/tree/master/policies/aws_config_policies\",motionChild:!0,nodeId:\"SyBeQVkaI\",openInNewTab:!0,scopeId:\"contentManagement\",smoothScroll:!1,children:/*#__PURE__*/e(n.a,{children:\"continuous monitoring of Config Recorder resources\"})}),\", or write your own detections in Python to fit your internal business use cases.\"]}),/*#__PURE__*/e(\"h4\",{children:\"Use Cases\"}),/*#__PURE__*/e(\"p\",{children:\"Common security use cases for Config recorder with Panther include:\"}),/*#__PURE__*/t(\"ul\",{children:[/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/e(\"p\",{children:\"Ensure config recorder is operational and capturing changes to your account.\"})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/e(\"p\",{children:\"Check if AWS Config Record support types of global resources, such as IAM users, groups, roles, and customer-managed policies\"})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/e(\"p\",{children:\"Configure a comprehensive configuration audit in place for all resource types in AWS.\"})})]}),/*#__PURE__*/e(\"h4\",{children:\"How it Works\"}),/*#__PURE__*/e(\"p\",{children:\"The integration is simple and fast:\"}),/*#__PURE__*/t(\"ul\",{children:[/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/e(\"p\",{children:\"Connect your AWS account to Panther\"})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/e(\"p\",{children:\"A baseline scan is performed to identify all existing Config Recorder resources in your account(s)\"})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/e(\"p\",{children:\"Built-in detections identify security issues\"})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/e(\"p\",{children:\"Alerts will be sent if non-compliant Config Recorder resources exist\"})})]}),/*#__PURE__*/t(\"p\",{children:[\"Use Panther to search all Config Recorder resources in an account by name, view their compliance status, associated policies, and configured remediations. Learn more about using Panther to \",/*#__PURE__*/e(o,{href:\"https://panther.com/integrations/aws/\",motionChild:!0,nodeId:\"SyBeQVkaI\",openInNewTab:!1,scopeId:\"contentManagement\",smoothScroll:!1,children:/*#__PURE__*/e(n.a,{children:\"analyze your AWS logs for security insights\"})}),\".\"]})]});\nexport const __FramerMetadata__ = {\"exports\":{\"richText17\":{\"type\":\"variable\",\"annotations\":{\"framerContractVersion\":\"1\"}},\"richText3\":{\"type\":\"variable\",\"annotations\":{\"framerContractVersion\":\"1\"}},\"richText1\":{\"type\":\"variable\",\"annotations\":{\"framerContractVersion\":\"1\"}},\"richText31\":{\"type\":\"variable\",\"annotations\":{\"framerContractVersion\":\"1\"}},\"richText8\":{\"type\":\"variable\",\"annotations\":{\"framerContractVersion\":\"1\"}},\"richText22\":{\"type\":\"variable\",\"annotations\":{\"framerContractVersion\":\"1\"}},\"richText7\":{\"type\":\"variable\",\"annotations\":{\"framerContractVersion\":\"1\"}},\"richText18\":{\"type\":\"variable\",\"annotations\":{\"framerContractVersion\":\"1\"}},\"richText10\":{\"type\":\"variable\",\"annotations\":{\"framerContractVersion\":\"1\"}},\"richText23\":{\"type\":\"variable\",\"annotations\":{\"framerContractVersion\":\"1\"}},\"richText14\":{\"type\":\"variable\",\"annotations\":{\"framerContractVersion\":\"1\"}},\"richText\":{\"type\":\"variable\",\"annotations\":{\"framerContractVersion\":\"1\"}},\"richText29\":{\"type\":\"variable\",\"annotations\":{\"framerContractVersion\":\"1\"}},\"richText21\":{\"type\":\"variable\",\"annotations\":{\"framerContractVersion\":\"1\"}},\"richText19\":{\"type\":\"variable\",\"annotations\":{\"framerContractVersion\":\"1\"}},\"richText5\":{\"type\":\"variable\",\"annotations\":{\"framerContractVersion\":\"1\"}},\"richText11\":{\"type\":\"variable\",\"annotations\":{\"framerContractVersion\":\"1\"}},\"richText30\":{\"type\":\"variable\",\"annotations\":{\"framerContractVersion\":\"1\"}},\"richText9\":{\"type\":\"variable\",\"annotations\":{\"framerContractVersion\":\"1\"}},\"richText28\":{\"type\":\"variable\",\"annotations\":{\"framerContractVersion\":\"1\"}},\"richText26\":{\"type\":\"variable\",\"annotations\":{\"framerContractVersion\":\"1\"}},\"richText4\":{\"type\":\"variable\",\"annotations\":{\"framerContractVersion\":\"1\"}},\"richText13\":{\"type\":\"variable\",\"annotations\":{\"framerContractVersion\":\"1\"}},\"richText24\":{\"type\":\"variable\",\"annotations\":{\"framerContractVersion\":\"1\"}},\"richText16\":{\"type\":\"variable\",\"annotations\":{\"framerContractVersion\":\"1\"}},\"richText6\":{\"type\":\"variable\",\"annotations\":{\"framerContractVersion\":\"1\"}},\"richText20\":{\"type\":\"variable\",\"annotations\":{\"framerContractVersion\":\"1\"}},\"richText25\":{\"type\":\"variable\",\"annotations\":{\"framerContractVersion\":\"1\"}},\"richText27\":{\"type\":\"variable\",\"annotations\":{\"framerContractVersion\":\"1\"}},\"richText2\":{\"type\":\"variable\",\"annotations\":{\"framerContractVersion\":\"1\"}},\"richText12\":{\"type\":\"variable\",\"annotations\":{\"framerContractVersion\":\"1\"}},\"richText15\":{\"type\":\"variable\",\"annotations\":{\"framerContractVersion\":\"1\"}},\"__FramerMetadata__\":{\"type\":\"variable\"}}}"],
  "mappings": "+LAAsJ,IAAMA,EAAsBC,EAAIC,EAAS,CAAC,SAAS,CAAcC,EAAE,IAAI,CAAC,SAAS,gHAAgH,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,gPAAgP,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,CAAC,mKAAgLE,EAAEC,EAAE,CAAC,KAAK,yFAAyF,YAAY,GAAG,OAAO,YAAY,aAAa,GAAG,QAAQ,oBAAoB,aAAa,GAAG,SAAsBD,EAAEE,EAAE,EAAE,CAAC,SAAS,+CAA+C,CAAC,CAAC,CAAC,EAAE,mFAAmF,CAAC,CAAC,EAAeF,EAAE,KAAK,CAAC,SAAS,WAAW,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,gEAAgE,CAAC,EAAeF,EAAE,KAAK,CAAC,SAAS,CAAcE,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBA,EAAE,IAAI,CAAC,SAAS,2DAA2D,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBA,EAAE,IAAI,CAAC,SAAS,+EAA+E,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBA,EAAE,IAAI,CAAC,SAAS,4DAA4D,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,cAAc,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,qCAAqC,CAAC,EAAeF,EAAE,KAAK,CAAC,SAAS,CAAcE,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBA,EAAE,IAAI,CAAC,SAAS,qCAAqC,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBA,EAAE,IAAI,CAAC,SAAS,kGAAkG,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBA,EAAE,IAAI,CAAC,SAAS,8CAA8C,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBA,EAAE,IAAI,CAAC,SAAS,4DAA4D,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,CAAC,8KAA2LE,EAAEC,EAAE,CAAC,KAAK,wCAAwC,YAAY,GAAG,OAAO,YAAY,aAAa,GAAG,QAAQ,oBAAoB,aAAa,GAAG,SAAsBD,EAAEE,EAAE,EAAE,CAAC,SAAS,6CAA6C,CAAC,CAAC,CAAC,EAAE,GAAG,CAAC,CAAC,CAAC,CAAC,CAAC,EAAeC,EAAuBL,EAAIC,EAAS,CAAC,SAAS,CAAcC,EAAE,IAAI,CAAC,SAAS,qHAAqH,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,yTAAyT,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,CAAC,kLAA+LE,EAAEC,EAAE,CAAC,KAAK,yFAAyF,YAAY,GAAG,OAAO,YAAY,aAAa,GAAG,QAAQ,oBAAoB,aAAa,GAAG,SAAsBD,EAAEE,EAAE,EAAE,CAAC,SAAS,gDAAgD,CAAC,CAAC,CAAC,EAAE,mFAAmF,CAAC,CAAC,EAAeF,EAAE,KAAK,CAAC,SAAS,WAAW,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,qEAAqE,CAAC,EAAeF,EAAE,KAAK,CAAC,SAAS,CAAcE,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBA,EAAE,IAAI,CAAC,SAAS,yGAAyG,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBA,EAAE,IAAI,CAAC,SAAS,6EAA6E,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBA,EAAE,IAAI,CAAC,SAAS,uEAAuE,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,cAAc,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,qCAAqC,CAAC,EAAeF,EAAE,KAAK,CAAC,SAAS,CAAcE,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBA,EAAE,IAAI,CAAC,SAAS,qCAAqC,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBA,EAAE,IAAI,CAAC,SAAS,kFAAkF,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBA,EAAE,IAAI,CAAC,SAAS,8CAA8C,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBA,EAAE,IAAI,CAAC,SAAS,yDAAyD,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,CAAC,sLAAmME,EAAEC,EAAE,CAAC,KAAK,wCAAwC,YAAY,GAAG,OAAO,YAAY,aAAa,GAAG,QAAQ,oBAAoB,aAAa,GAAG,SAAsBD,EAAEE,EAAE,EAAE,CAAC,SAAS,8CAA8C,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,EAAeE,EAAuBN,EAAIC,EAAS,CAAC,SAAS,CAAcC,EAAE,IAAI,CAAC,SAAS,wHAAwH,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,kQAAkQ,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,CAAC,qLAAkME,EAAEC,EAAE,CAAC,KAAK,yFAAyF,YAAY,GAAG,OAAO,YAAY,aAAa,GAAG,QAAQ,oBAAoB,aAAa,GAAG,SAAsBD,EAAEE,EAAE,EAAE,CAAC,SAAS,mDAAmD,CAAC,CAAC,CAAC,EAAE,mFAAmF,CAAC,CAAC,EAAeF,EAAE,KAAK,CAAC,SAAS,WAAW,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,wEAAwE,CAAC,EAAeF,EAAE,KAAK,CAAC,SAAS,CAAcE,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBA,EAAE,IAAI,CAAC,SAAS,iLAAiL,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBA,EAAE,IAAI,CAAC,SAAS,2EAA2E,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,cAAc,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,qCAAqC,CAAC,EAAeF,EAAE,KAAK,CAAC,SAAS,CAAcE,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBA,EAAE,IAAI,CAAC,SAAS,qCAAqC,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBA,EAAE,IAAI,CAAC,SAAS,4FAA4F,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBA,EAAE,IAAI,CAAC,SAAS,8CAA8C,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBA,EAAE,IAAI,CAAC,SAAS,4DAA4D,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,CAAC,0LAAuME,EAAEC,EAAE,CAAC,KAAK,wCAAwC,YAAY,GAAG,OAAO,YAAY,aAAa,GAAG,QAAQ,oBAAoB,aAAa,GAAG,SAAsBD,EAAEE,EAAE,EAAE,CAAC,SAAS,6CAA6C,CAAC,CAAC,CAAC,EAAE,GAAG,CAAC,CAAC,CAAC,CAAC,CAAC,EAAeG,EAAuBP,EAAIC,EAAS,CAAC,SAAS,CAAcC,EAAE,IAAI,CAAC,SAAS,qFAAqF,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,4KAA4K,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,6NAA6N,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,cAAc,CAAC,EAAeF,EAAE,KAAK,CAAC,SAAS,CAAcE,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBF,EAAE,IAAI,CAAC,SAAS,CAAC,gBAA6BE,EAAEC,EAAE,CAAC,KAAK,kDAAkD,YAAY,GAAG,OAAO,YAAY,aAAa,GAAG,QAAQ,oBAAoB,aAAa,GAAG,SAAsBD,EAAEE,EAAE,EAAE,CAAC,SAAS,uBAAuB,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,EAAeF,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBA,EAAE,IAAI,CAAC,SAAS,iDAAiD,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBA,EAAE,IAAI,CAAC,SAAS,4GAA4G,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBA,EAAE,IAAI,CAAC,SAAS,qCAAqC,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,CAAC,gBAA6BE,EAAEC,EAAE,CAAC,KAAK,kDAAkD,YAAY,GAAG,OAAO,YAAY,aAAa,GAAG,QAAQ,oBAAoB,aAAa,GAAG,SAAsBD,EAAEE,EAAE,EAAE,CAAC,SAAS,qBAAqB,CAAC,CAAC,CAAC,EAAE,sCAAsC,CAAC,CAAC,CAAC,CAAC,CAAC,EAAeI,EAAuBR,EAAIC,EAAS,CAAC,SAAS,CAAcC,EAAE,IAAI,CAAC,SAAS,yFAAyF,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,6NAA6N,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,cAAc,CAAC,EAAeF,EAAE,KAAK,CAAC,SAAS,CAAcE,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBF,EAAE,IAAI,CAAC,SAAS,CAAC,4BAAyCE,EAAEC,EAAE,CAAC,KAAK,4CAA4C,YAAY,GAAG,OAAO,YAAY,aAAa,GAAG,QAAQ,oBAAoB,aAAa,GAAG,SAAsBD,EAAEE,EAAE,EAAE,CAAC,SAAS,YAAY,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,EAAeF,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBA,EAAE,IAAI,CAAC,SAAS,2CAA2C,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBA,EAAE,IAAI,CAAC,SAAS,yGAAyG,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBA,EAAE,IAAI,CAAC,SAAS,qCAAqC,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,CAAC,gBAA6BE,EAAEC,EAAE,CAAC,KAAK,4CAA4C,YAAY,GAAG,OAAO,YAAY,aAAa,GAAG,QAAQ,oBAAoB,aAAa,GAAG,SAAsBD,EAAEE,EAAE,EAAE,CAAC,SAAS,eAAe,CAAC,CAAC,CAAC,EAAE,sCAAsC,CAAC,CAAC,CAAC,CAAC,CAAC,EAAeK,EAAuBT,EAAIC,EAAS,CAAC,SAAS,CAAcC,EAAE,KAAK,CAAC,SAAS,sBAAsB,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,+ZAA+Z,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,wBAAwB,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,oMAAoM,CAAC,EAAeF,EAAE,KAAK,CAAC,SAAS,CAAcE,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBA,EAAE,IAAI,CAAC,SAAS,mDAAmD,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBA,EAAE,IAAI,CAAC,SAAS,sFAAsF,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBA,EAAE,IAAI,CAAC,SAAS,gEAAgE,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBA,EAAE,IAAI,CAAC,SAAS,wEAAwE,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,yCAAyC,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,sSAAsS,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,CAAC,gFAA6FE,EAAEC,EAAE,CAAC,KAAK,8DAA8D,YAAY,GAAG,OAAO,YAAY,aAAa,GAAG,QAAQ,oBAAoB,aAAa,GAAG,SAAsBD,EAAEE,EAAE,EAAE,CAAC,SAAS,iCAAiC,CAAC,CAAC,CAAC,EAAE,GAAG,CAAC,CAAC,EAAeF,EAAE,KAAK,CAAC,SAAS,4CAA4C,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,+OAA+O,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,CAAC,iYAA8YE,EAAEC,EAAE,CAAC,KAAK,0CAA0C,YAAY,GAAG,OAAO,YAAY,aAAa,GAAG,QAAQ,oBAAoB,aAAa,GAAG,SAAsBD,EAAEE,EAAE,EAAE,CAAC,SAAS,wDAAwD,CAAC,CAAC,CAAC,EAAE,GAAG,CAAC,CAAC,EAAeF,EAAE,KAAK,CAAC,SAAS,6CAA6C,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,CAAC,sLAAmME,EAAEC,EAAE,CAAC,KAAK,6DAA6D,YAAY,GAAG,OAAO,YAAY,aAAa,GAAG,QAAQ,oBAAoB,aAAa,GAAG,SAAsBD,EAAEE,EAAE,EAAE,CAAC,SAAS,4DAA4D,CAAC,CAAC,CAAC,EAAE,GAAG,CAAC,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,kbAAkb,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,oBAAoB,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,CAAC,+HAA4IE,EAAEC,EAAE,CAAC,KAAK,2CAA2C,YAAY,GAAG,OAAO,YAAY,aAAa,GAAG,QAAQ,oBAAoB,aAAa,GAAG,SAAsBD,EAAEE,EAAE,EAAE,CAAC,SAAS,qBAAqB,CAAC,CAAC,CAAC,EAAE,4IAA4I,CAAC,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,kMAAkM,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,kBAAkB,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,2NAA2N,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,CAAC,oBAAiCE,EAAEC,EAAE,CAAC,KAAK,8DAA8D,YAAY,GAAG,OAAO,YAAY,aAAa,GAAG,QAAQ,oBAAoB,aAAa,GAAG,SAAsBD,EAAEE,EAAE,EAAE,CAAC,SAAS,4CAA4C,CAAC,CAAC,CAAC,EAAE,kCAA+CF,EAAEC,EAAE,CAAC,KAAK,6BAA6B,YAAY,GAAG,OAAO,YAAY,aAAa,GAAG,QAAQ,oBAAoB,aAAa,GAAG,SAAsBD,EAAEE,EAAE,EAAE,CAAC,SAAS,uBAAuB,CAAC,CAAC,CAAC,EAAE,gDAAgD,CAAC,CAAC,EAAeF,EAAE,KAAK,CAAC,SAAS,6BAA6B,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,4WAA4W,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,CAAC,sOAAmPE,EAAEC,EAAE,CAAC,KAAK,8CAA8C,YAAY,GAAG,OAAO,YAAY,aAAa,GAAG,QAAQ,oBAAoB,aAAa,GAAG,SAAsBD,EAAEE,EAAE,EAAE,CAAC,SAAS,uBAAuB,CAAC,CAAC,CAAC,EAAE,GAAG,CAAC,CAAC,CAAC,CAAC,CAAC,EAAeM,EAAuBV,EAAIC,EAAS,CAAC,SAAS,CAAcC,EAAE,KAAK,CAAC,SAAS,sBAAsB,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,yXAAyX,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,2BAA2B,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,2JAA2J,CAAC,EAAeF,EAAE,KAAK,CAAC,SAAS,CAAcE,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBA,EAAE,IAAI,CAAC,SAAS,iCAAiC,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBA,EAAE,IAAI,CAAC,SAAS,qCAAqC,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,mCAAmC,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,qWAAqW,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,CAAC,mFAAgGE,EAAEC,EAAE,CAAC,KAAK,iEAAiE,YAAY,GAAG,OAAO,YAAY,aAAa,GAAG,QAAQ,oBAAoB,aAAa,GAAG,SAAsBD,EAAEE,EAAE,EAAE,CAAC,SAAS,oCAAoC,CAAC,CAAC,CAAC,EAAE,GAAG,CAAC,CAAC,EAAeF,EAAE,KAAK,CAAC,SAAS,mCAAmC,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,kPAAkP,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,CAAC,gYAA6YE,EAAEC,EAAE,CAAC,KAAK,0CAA0C,YAAY,GAAG,OAAO,YAAY,aAAa,GAAG,QAAQ,oBAAoB,aAAa,GAAG,SAAsBD,EAAEE,EAAE,EAAE,CAAC,SAAS,wDAAwD,CAAC,CAAC,CAAC,EAAE,GAAG,CAAC,CAAC,EAAeF,EAAE,KAAK,CAAC,SAAS,mBAAmB,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,qaAAqa,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,oBAAoB,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,CAAC,6HAA0IE,EAAEC,EAAE,CAAC,KAAK,2CAA2C,YAAY,GAAG,OAAO,YAAY,aAAa,GAAG,QAAQ,oBAAoB,aAAa,GAAG,SAAsBD,EAAEE,EAAE,EAAE,CAAC,SAAS,sBAAsB,CAAC,CAAC,CAAC,EAAE,4IAA4I,CAAC,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,0MAA0M,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,kBAAkB,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,6NAA6N,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,CAAC,oBAAiCE,EAAEC,EAAE,CAAC,KAAK,iEAAiE,YAAY,GAAG,OAAO,YAAY,aAAa,GAAG,QAAQ,oBAAoB,aAAa,GAAG,SAAsBD,EAAEE,EAAE,EAAE,CAAC,SAAS,8DAA8D,CAAC,CAAC,CAAC,EAAE,kCAA+CF,EAAEC,EAAE,CAAC,KAAK,6BAA6B,YAAY,GAAG,OAAO,YAAY,aAAa,GAAG,QAAQ,oBAAoB,aAAa,GAAG,SAAsBD,EAAEE,EAAE,EAAE,CAAC,SAAS,uBAAuB,CAAC,CAAC,CAAC,EAAE,gEAAgE,CAAC,CAAC,EAAeF,EAAE,KAAK,CAAC,SAAS,2BAA2B,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,iYAAiY,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,CAAC,gPAA6PE,EAAEC,EAAE,CAAC,KAAK,8CAA8C,YAAY,GAAG,OAAO,YAAY,aAAa,GAAG,QAAQ,oBAAoB,aAAa,GAAG,SAAsBD,EAAEE,EAAE,EAAE,CAAC,SAAS,uBAAuB,CAAC,CAAC,CAAC,EAAE,GAAG,CAAC,CAAC,CAAC,CAAC,CAAC,EAAeO,EAAuBX,EAAIC,EAAS,CAAC,SAAS,CAAcC,EAAE,KAAK,CAAC,SAAS,sBAAsB,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,8WAA8W,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,4BAA4B,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,sDAAsD,CAAC,EAAeF,EAAE,KAAK,CAAC,SAAS,CAAcE,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBA,EAAE,IAAI,CAAC,SAAS,iCAAiC,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBA,EAAE,IAAI,CAAC,SAAS,kCAAkC,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBA,EAAE,IAAI,CAAC,SAAS,mBAAmB,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBA,EAAE,IAAI,CAAC,SAAS,qCAAqC,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,oCAAoC,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,6TAA6T,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,CAAC,oFAAiGE,EAAEC,EAAE,CAAC,KAAK,kEAAkE,YAAY,GAAG,OAAO,YAAY,aAAa,GAAG,QAAQ,oBAAoB,aAAa,GAAG,SAAsBD,EAAEE,EAAE,EAAE,CAAC,SAAS,qCAAqC,CAAC,CAAC,CAAC,EAAE,GAAG,CAAC,CAAC,EAAeF,EAAE,KAAK,CAAC,SAAS,gDAAgD,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,mPAAmP,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,CAAC,oUAAiVE,EAAEC,EAAE,CAAC,KAAK,0CAA0C,YAAY,GAAG,OAAO,YAAY,aAAa,GAAG,QAAQ,oBAAoB,aAAa,GAAG,SAAsBD,EAAEE,EAAE,EAAE,CAAC,SAAS,wDAAwD,CAAC,CAAC,CAAC,EAAE,GAAG,CAAC,CAAC,EAAeF,EAAE,KAAK,CAAC,SAAS,gCAAgC,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,sbAAsb,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,oBAAoB,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,CAAC,8HAA2IE,EAAEC,EAAE,CAAC,KAAK,2CAA2C,YAAY,GAAG,OAAO,YAAY,aAAa,GAAG,QAAQ,oBAAoB,aAAa,GAAG,SAAsBD,EAAEE,EAAE,EAAE,CAAC,SAAS,oBAAoB,CAAC,CAAC,CAAC,EAAE,4IAA4I,CAAC,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,oMAAoM,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,kBAAkB,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,sNAAsN,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,CAAC,oBAAiCE,EAAEC,EAAE,CAAC,KAAK,kEAAkE,YAAY,GAAG,OAAO,YAAY,aAAa,GAAG,QAAQ,oBAAoB,aAAa,GAAG,SAAsBD,EAAEE,EAAE,EAAE,CAAC,SAAS,gDAAgD,CAAC,CAAC,CAAC,EAAE,kCAA+CF,EAAEC,EAAE,CAAC,KAAK,6BAA6B,YAAY,GAAG,OAAO,YAAY,aAAa,GAAG,QAAQ,oBAAoB,aAAa,GAAG,SAAsBD,EAAEE,EAAE,EAAE,CAAC,SAAS,uBAAuB,CAAC,CAAC,CAAC,EAAE,gDAAgD,CAAC,CAAC,EAAeF,EAAE,KAAK,CAAC,SAAS,wCAAwC,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,2WAA2W,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,CAAC,0OAAuPE,EAAEC,EAAE,CAAC,KAAK,8CAA8C,YAAY,GAAG,OAAO,YAAY,aAAa,GAAG,QAAQ,oBAAoB,aAAa,GAAG,SAAsBD,EAAEE,EAAE,EAAE,CAAC,SAAS,uBAAuB,CAAC,CAAC,CAAC,EAAE,GAAG,CAAC,CAAC,CAAC,CAAC,CAAC,EAAeQ,EAAuBZ,EAAIC,EAAS,CAAC,SAAS,CAAcC,EAAE,KAAK,CAAC,SAAS,sBAAsB,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,0aAA0a,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,yBAAyB,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,mJAAmJ,CAAC,EAAeF,EAAE,KAAK,CAAC,SAAS,CAAcE,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBA,EAAE,IAAI,CAAC,SAAS,uCAAuC,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBA,EAAE,IAAI,CAAC,SAAS,6FAA6F,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBA,EAAE,IAAI,CAAC,SAAS,uDAAuD,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,iCAAiC,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,gVAAgV,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,CAAC,iFAA8FE,EAAEC,EAAE,CAAC,KAAK,+DAA+D,YAAY,GAAG,OAAO,YAAY,aAAa,GAAG,QAAQ,oBAAoB,aAAa,GAAG,SAAsBD,EAAEE,EAAE,EAAE,CAAC,SAAS,kCAAkC,CAAC,CAAC,CAAC,EAAE,GAAG,CAAC,CAAC,EAAeF,EAAE,KAAK,CAAC,SAAS,mCAAmC,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,gPAAgP,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,CAAC,gYAA6YE,EAAEC,EAAE,CAAC,KAAK,0CAA0C,YAAY,GAAG,OAAO,YAAY,aAAa,GAAG,QAAQ,oBAAoB,aAAa,GAAG,SAAsBD,EAAEE,EAAE,EAAE,CAAC,SAAS,wDAAwD,CAAC,CAAC,CAAC,EAAE,GAAG,CAAC,CAAC,EAAeF,EAAE,KAAK,CAAC,SAAS,mBAAmB,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,2aAA2a,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,CAAC,gJAA6JE,EAAEC,EAAE,CAAC,KAAK,8DAA8D,YAAY,GAAG,OAAO,YAAY,aAAa,GAAG,QAAQ,oBAAoB,aAAa,GAAG,SAAsBD,EAAEE,EAAE,EAAE,CAAC,SAAS,6DAA6D,CAAC,CAAC,CAAC,EAAE,GAAG,CAAC,CAAC,EAAeF,EAAE,KAAK,CAAC,SAAS,oBAAoB,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,CAAC,2HAAwIE,EAAEC,EAAE,CAAC,KAAK,2CAA2C,YAAY,GAAG,OAAO,YAAY,aAAa,GAAG,QAAQ,oBAAoB,aAAa,GAAG,SAAsBD,EAAEE,EAAE,EAAE,CAAC,SAAS,sBAAsB,CAAC,CAAC,CAAC,EAAE,4IAA4I,CAAC,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,4MAA4M,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,kBAAkB,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,2NAA2N,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,CAAC,oBAAiCE,EAAEC,EAAE,CAAC,KAAK,+DAA+D,YAAY,GAAG,OAAO,YAAY,aAAa,GAAG,QAAQ,oBAAoB,aAAa,GAAG,SAAsBD,EAAEE,EAAE,EAAE,CAAC,SAAS,4DAA4D,CAAC,CAAC,CAAC,EAAE,kCAA+CF,EAAEC,EAAE,CAAC,KAAK,6BAA6B,YAAY,GAAG,OAAO,YAAY,aAAa,GAAG,QAAQ,oBAAoB,aAAa,GAAG,SAAsBD,EAAEE,EAAE,EAAE,CAAC,SAAS,uBAAuB,CAAC,CAAC,CAAC,EAAE,8DAA8D,CAAC,CAAC,EAAeF,EAAE,KAAK,CAAC,SAAS,yBAAyB,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,8XAA8X,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,CAAC,yOAAsPE,EAAEC,EAAE,CAAC,KAAK,8CAA8C,YAAY,GAAG,OAAO,YAAY,aAAa,GAAG,QAAQ,oBAAoB,aAAa,GAAG,SAAsBD,EAAEE,EAAE,EAAE,CAAC,SAAS,uBAAuB,CAAC,CAAC,CAAC,EAAE,GAAG,CAAC,CAAC,CAAC,CAAC,CAAC,EAAeS,EAAuBb,EAAIC,EAAS,CAAC,SAAS,CAAcC,EAAE,KAAK,CAAC,SAAS,sBAAsB,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,2YAA2Y,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,mCAAmC,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,4JAA4J,CAAC,EAAeF,EAAE,KAAK,CAAC,SAAS,CAAcE,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBA,EAAE,IAAI,CAAC,SAAS,0DAA0D,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBA,EAAE,IAAI,CAAC,SAAS,+EAA+E,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBA,EAAE,IAAI,CAAC,SAAS,uDAAuD,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,2CAA2C,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,8TAA8T,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,CAAC,2FAAwGE,EAAEC,EAAE,CAAC,KAAK,wEAAwE,YAAY,GAAG,OAAO,YAAY,aAAa,GAAG,QAAQ,oBAAoB,aAAa,GAAG,SAAsBD,EAAEE,EAAE,EAAE,CAAC,SAAS,4CAA4C,CAAC,CAAC,CAAC,EAAE,GAAG,CAAC,CAAC,EAAeF,EAAE,KAAK,CAAC,SAAS,mCAAmC,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,0PAA0P,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,CAAC,gZAA6ZE,EAAEC,EAAE,CAAC,KAAK,0CAA0C,YAAY,GAAG,OAAO,YAAY,aAAa,GAAG,QAAQ,oBAAoB,aAAa,GAAG,SAAsBD,EAAEE,EAAE,EAAE,CAAC,SAAS,wDAAwD,CAAC,CAAC,CAAC,EAAE,GAAG,CAAC,CAAC,EAAeF,EAAE,KAAK,CAAC,SAAS,6CAA6C,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,CAAC,+KAA4LE,EAAEC,EAAE,CAAC,KAAK,uEAAuE,YAAY,GAAG,OAAO,YAAY,aAAa,GAAG,QAAQ,oBAAoB,aAAa,GAAG,SAAsBD,EAAEE,EAAE,EAAE,CAAC,SAAS,uEAAuE,CAAC,CAAC,CAAC,EAAE,GAAG,CAAC,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,ibAAib,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,oBAAoB,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,CAAC,kHAA+HE,EAAEC,EAAE,CAAC,KAAK,2CAA2C,YAAY,GAAG,OAAO,YAAY,aAAa,GAAG,QAAQ,oBAAoB,aAAa,GAAG,SAAsBD,EAAEE,EAAE,EAAE,CAAC,SAAS,oBAAoB,CAAC,CAAC,CAAC,EAAE,4IAA4I,CAAC,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,4MAA4M,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,kBAAkB,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,sOAAsO,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,CAAC,oBAAiCE,EAAEC,EAAE,CAAC,KAAK,wEAAwE,YAAY,GAAG,OAAO,YAAY,aAAa,GAAG,QAAQ,oBAAoB,aAAa,GAAG,SAAsBD,EAAEE,EAAE,EAAE,CAAC,SAAS,uDAAuD,CAAC,CAAC,CAAC,EAAE,kCAA+CF,EAAEC,EAAE,CAAC,KAAK,6BAA6B,YAAY,GAAG,OAAO,YAAY,aAAa,GAAG,QAAQ,oBAAoB,aAAa,GAAG,SAAsBD,EAAEE,EAAE,EAAE,CAAC,SAAS,uBAAuB,CAAC,CAAC,CAAC,EAAE,wEAAwE,CAAC,CAAC,EAAeF,EAAE,KAAK,CAAC,SAAS,+CAA+C,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,mXAAmX,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,CAAC,mPAAgQE,EAAEC,EAAE,CAAC,KAAK,8CAA8C,YAAY,GAAG,OAAO,YAAY,aAAa,GAAG,QAAQ,oBAAoB,aAAa,GAAG,SAAsBD,EAAEE,EAAE,EAAE,CAAC,SAAS,uBAAuB,CAAC,CAAC,CAAC,EAAE,GAAG,CAAC,CAAC,CAAC,CAAC,CAAC,EAAeU,EAAwBd,EAAIC,EAAS,CAAC,SAAS,CAAcC,EAAE,KAAK,CAAC,SAAS,sBAAsB,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,oUAAoU,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,4BAA4B,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,mLAAmL,CAAC,EAAeF,EAAE,KAAK,CAAC,SAAS,CAAcE,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBA,EAAE,IAAI,CAAC,SAAS,uCAAuC,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBA,EAAE,IAAI,CAAC,SAAS,kCAAkC,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBA,EAAE,IAAI,CAAC,SAAS,4BAA4B,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,iCAAiC,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,6TAA6T,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,CAAC,oFAAiGE,EAAEC,EAAE,CAAC,KAAK,kEAAkE,YAAY,GAAG,OAAO,YAAY,aAAa,GAAG,QAAQ,oBAAoB,aAAa,GAAG,SAAsBD,EAAEE,EAAE,EAAE,CAAC,SAAS,qCAAqC,CAAC,CAAC,CAAC,EAAE,GAAG,CAAC,CAAC,EAAeF,EAAE,KAAK,CAAC,SAAS,gDAAgD,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,uRAAuR,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,CAAC,0ZAAuaE,EAAEC,EAAE,CAAC,KAAK,0CAA0C,YAAY,GAAG,OAAO,YAAY,aAAa,GAAG,QAAQ,oBAAoB,aAAa,GAAG,SAAsBD,EAAEE,EAAE,EAAE,CAAC,SAAS,wDAAwD,CAAC,CAAC,CAAC,EAAE,GAAG,CAAC,CAAC,EAAeF,EAAE,KAAK,CAAC,SAAS,2CAA2C,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,CAAC,wJAAqKE,EAAEC,EAAE,CAAC,KAAK,iEAAiE,YAAY,GAAG,OAAO,YAAY,aAAa,GAAG,QAAQ,oBAAoB,aAAa,GAAG,SAAsBD,EAAEE,EAAE,EAAE,CAAC,SAAS,gEAAgE,CAAC,CAAC,CAAC,EAAE,GAAG,CAAC,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,gbAAgb,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,oBAAoB,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,CAAC,yHAAsIE,EAAEC,EAAE,CAAC,KAAK,2CAA2C,YAAY,GAAG,OAAO,YAAY,aAAa,GAAG,QAAQ,oBAAoB,aAAa,GAAG,SAAsBD,EAAEE,EAAE,EAAE,CAAC,SAAS,qBAAqB,CAAC,CAAC,CAAC,EAAE,qKAAqK,CAAC,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,0MAA0M,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,kBAAkB,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,yNAAyN,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,CAAC,oBAAiCE,EAAEC,EAAE,CAAC,KAAK,kEAAkE,YAAY,GAAG,OAAO,YAAY,aAAa,GAAG,QAAQ,oBAAoB,aAAa,GAAG,SAAsBD,EAAEE,EAAE,EAAE,CAAC,SAAS,wEAAwE,CAAC,CAAC,CAAC,EAAE,2BAAwCF,EAAEC,EAAE,CAAC,KAAK,6BAA6B,YAAY,GAAG,OAAO,YAAY,aAAa,GAAG,QAAQ,oBAAoB,aAAa,GAAG,SAAsBD,EAAEE,EAAE,EAAE,CAAC,SAAS,uBAAuB,CAAC,CAAC,CAAC,EAAE,uEAAuE,CAAC,CAAC,EAAeF,EAAE,KAAK,CAAC,SAAS,uDAAuD,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,mXAAmX,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,CAAC,8SAAsTE,EAAEC,EAAE,CAAC,KAAK,8CAA8C,YAAY,GAAG,OAAO,YAAY,aAAa,GAAG,QAAQ,oBAAoB,aAAa,GAAG,SAAsBD,EAAEE,EAAE,EAAE,CAAC,SAAS,sBAAsB,CAAC,CAAC,CAAC,EAAE,GAAG,CAAC,CAAC,CAAC,CAAC,CAAC,EAAeW,EAAwBf,EAAIC,EAAS,CAAC,SAAS,CAAcC,EAAE,KAAK,CAAC,SAAS,sBAAsB,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,wZAAwZ,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,mCAAmC,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,2NAA2N,CAAC,EAAeF,EAAE,KAAK,CAAC,SAAS,CAAcE,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBA,EAAE,IAAI,CAAC,SAAS,8EAA8E,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBA,EAAE,IAAI,CAAC,SAAS,mEAAmE,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBA,EAAE,IAAI,CAAC,SAAS,yBAAyB,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,qCAAqC,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,kXAAkX,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,CAAC,qFAAkGE,EAAEC,EAAE,CAAC,KAAK,mEAAmE,YAAY,GAAG,OAAO,YAAY,aAAa,GAAG,QAAQ,oBAAoB,aAAa,GAAG,SAAsBD,EAAEE,EAAE,EAAE,CAAC,SAAS,sCAAsC,CAAC,CAAC,CAAC,EAAE,GAAG,CAAC,CAAC,EAAeF,EAAE,KAAK,CAAC,SAAS,mCAAmC,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,oPAAoP,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,CAAC,gYAA6YE,EAAEC,EAAE,CAAC,KAAK,0CAA0C,YAAY,GAAG,OAAO,YAAY,aAAa,GAAG,QAAQ,oBAAoB,aAAa,GAAG,SAAsBD,EAAEE,EAAE,EAAE,CAAC,SAAS,wDAAwD,CAAC,CAAC,CAAC,EAAE,GAAG,CAAC,CAAC,EAAeF,EAAE,KAAK,CAAC,SAAS,mBAAmB,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,2aAA2a,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,CAAC,+JAA4KE,EAAEC,EAAE,CAAC,KAAK,kEAAkE,YAAY,GAAG,OAAO,YAAY,aAAa,GAAG,QAAQ,oBAAoB,aAAa,GAAG,SAAsBD,EAAEE,EAAE,EAAE,CAAC,SAAS,uEAAuE,CAAC,CAAC,CAAC,EAAE,GAAG,CAAC,CAAC,EAAeF,EAAE,KAAK,CAAC,SAAS,oBAAoB,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,CAAC,+HAA4IE,EAAEC,EAAE,CAAC,KAAK,2CAA2C,YAAY,GAAG,OAAO,YAAY,aAAa,GAAG,QAAQ,oBAAoB,aAAa,GAAG,SAAsBD,EAAEE,EAAE,EAAE,CAAC,SAAS,sBAAsB,CAAC,CAAC,CAAC,EAAE,4IAA4I,CAAC,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,4MAA4M,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,kBAAkB,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,+NAA+N,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,CAAC,oBAAiCE,EAAEC,EAAE,CAAC,KAAK,mEAAmE,YAAY,GAAG,OAAO,YAAY,aAAa,GAAG,QAAQ,oBAAoB,aAAa,GAAG,SAAsBD,EAAEE,EAAE,EAAE,CAAC,SAAS,gEAAgE,CAAC,CAAC,CAAC,EAAE,kCAA+CF,EAAEC,EAAE,CAAC,KAAK,6BAA6B,YAAY,GAAG,OAAO,YAAY,aAAa,GAAG,QAAQ,oBAAoB,aAAa,GAAG,SAAsBD,EAAEE,EAAE,EAAE,CAAC,SAAS,uBAAuB,CAAC,CAAC,CAAC,EAAE,kEAAkE,CAAC,CAAC,EAAeF,EAAE,KAAK,CAAC,SAAS,6BAA6B,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,gXAAgX,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,CAAC,kPAA+PE,EAAEC,EAAE,CAAC,KAAK,8CAA8C,YAAY,GAAG,OAAO,YAAY,aAAa,GAAG,QAAQ,oBAAoB,aAAa,GAAG,SAAsBD,EAAEE,EAAE,EAAE,CAAC,SAAS,uBAAuB,CAAC,CAAC,CAAC,EAAE,GAAG,CAAC,CAAC,CAAC,CAAC,CAAC,EAAeY,EAAwBhB,EAAIC,EAAS,CAAC,SAAS,CAAcC,EAAE,KAAK,CAAC,SAAS,sBAAsB,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,+YAA+Y,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,6BAA6B,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,kHAAkH,CAAC,EAAeF,EAAE,KAAK,CAAC,SAAS,CAAcE,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBA,EAAE,IAAI,CAAC,SAAS,uDAAuD,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBA,EAAE,IAAI,CAAC,SAAS,kDAAkD,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBA,EAAE,IAAI,CAAC,SAAS,+CAA+C,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBA,EAAE,IAAI,CAAC,SAAS,8CAA8C,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,kCAAkC,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,gUAAgU,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,CAAC,qFAAkGE,EAAEC,EAAE,CAAC,KAAK,mEAAmE,YAAY,GAAG,OAAO,YAAY,aAAa,GAAG,QAAQ,oBAAoB,aAAa,GAAG,SAAsBD,EAAEE,EAAE,EAAE,CAAC,SAAS,sCAAsC,CAAC,CAAC,CAAC,EAAE,GAAG,CAAC,CAAC,EAAeF,EAAE,KAAK,CAAC,SAAS,iDAAiD,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,yRAAyR,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,CAAC,0ZAAuaE,EAAEC,EAAE,CAAC,KAAK,0CAA0C,YAAY,GAAG,OAAO,YAAY,aAAa,GAAG,QAAQ,oBAAoB,aAAa,GAAG,SAAsBD,EAAEE,EAAE,EAAE,CAAC,SAAS,wDAAwD,CAAC,CAAC,CAAC,EAAE,GAAG,CAAC,CAAC,EAAeF,EAAE,KAAK,CAAC,SAAS,gCAAgC,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,gbAAgb,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,oBAAoB,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,CAAC,0HAAuIE,EAAEC,EAAE,CAAC,KAAK,2CAA2C,YAAY,GAAG,OAAO,YAAY,aAAa,GAAG,QAAQ,oBAAoB,aAAa,GAAG,SAAsBD,EAAEE,EAAE,EAAE,CAAC,SAAS,qBAAqB,CAAC,CAAC,CAAC,EAAE,qKAAqK,CAAC,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,0MAA0M,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,kBAAkB,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,0NAA0N,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,CAAC,oBAAiCE,EAAEC,EAAE,CAAC,KAAK,mEAAmE,YAAY,GAAG,OAAO,YAAY,aAAa,GAAG,QAAQ,oBAAoB,aAAa,GAAG,SAAsBD,EAAEE,EAAE,EAAE,CAAC,SAAS,yEAAyE,CAAC,CAAC,CAAC,EAAE,2BAAwCF,EAAEC,EAAE,CAAC,KAAK,6BAA6B,YAAY,GAAG,OAAO,YAAY,aAAa,GAAG,QAAQ,oBAAoB,aAAa,GAAG,SAAsBD,EAAEE,EAAE,EAAE,CAAC,SAAS,uBAAuB,CAAC,CAAC,CAAC,EAAE,wEAAwE,CAAC,CAAC,EAAeF,EAAE,KAAK,CAAC,SAAS,6BAA6B,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,mXAAmX,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,CAAC,sSAAmTE,EAAEC,EAAE,CAAC,KAAK,8CAA8C,YAAY,GAAG,OAAO,YAAY,aAAa,GAAG,QAAQ,oBAAoB,aAAa,GAAG,SAAsBD,EAAEE,EAAE,EAAE,CAAC,SAAS,sBAAsB,CAAC,CAAC,CAAC,EAAE,GAAG,CAAC,CAAC,CAAC,CAAC,CAAC,EAAea,EAAwBjB,EAAIC,EAAS,CAAC,SAAS,CAAcC,EAAE,KAAK,CAAC,SAAS,sBAAsB,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,2YAA2Y,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,mCAAmC,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,gQAAgQ,CAAC,EAAeF,EAAE,KAAK,CAAC,SAAS,CAAcE,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBA,EAAE,IAAI,CAAC,SAAS,6CAA6C,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBA,EAAE,IAAI,CAAC,SAAS,qDAAqD,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBA,EAAE,IAAI,CAAC,SAAS,oEAAoE,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBA,EAAE,IAAI,CAAC,SAAS,kEAAkE,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,qCAAqC,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,gWAAgW,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,CAAC,qFAAkGE,EAAEC,EAAE,CAAC,KAAK,mEAAmE,YAAY,GAAG,OAAO,YAAY,aAAa,GAAG,QAAQ,oBAAoB,aAAa,GAAG,SAAsBD,EAAEE,EAAE,EAAE,CAAC,SAAS,sCAAsC,CAAC,CAAC,CAAC,EAAE,GAAG,CAAC,CAAC,EAAeF,EAAE,KAAK,CAAC,SAAS,mCAAmC,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,oPAAoP,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,CAAC,gYAA6YE,EAAEC,EAAE,CAAC,KAAK,0CAA0C,YAAY,GAAG,OAAO,YAAY,aAAa,GAAG,QAAQ,oBAAoB,aAAa,GAAG,SAAsBD,EAAEE,EAAE,EAAE,CAAC,SAAS,wDAAwD,CAAC,CAAC,CAAC,EAAE,GAAG,CAAC,CAAC,EAAeF,EAAE,KAAK,CAAC,SAAS,mBAAmB,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,qaAAqa,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,CAAC,oJAAiKE,EAAEC,EAAE,CAAC,KAAK,kEAAkE,YAAY,GAAG,OAAO,YAAY,aAAa,GAAG,QAAQ,oBAAoB,aAAa,GAAG,SAAsBD,EAAEE,EAAE,EAAE,CAAC,SAAS,iEAAiE,CAAC,CAAC,CAAC,EAAE,GAAG,CAAC,CAAC,EAAeF,EAAE,KAAK,CAAC,SAAS,oBAAoB,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,CAAC,+HAA4IE,EAAEC,EAAE,CAAC,KAAK,2CAA2C,YAAY,GAAG,OAAO,YAAY,aAAa,GAAG,QAAQ,oBAAoB,aAAa,GAAG,SAAsBD,EAAEE,EAAE,EAAE,CAAC,SAAS,sBAAsB,CAAC,CAAC,CAAC,EAAE,4IAA4I,CAAC,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,0MAA0M,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,kBAAkB,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,+NAA+N,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,CAAC,oBAAiCE,EAAEC,EAAE,CAAC,KAAK,mEAAmE,YAAY,GAAG,OAAO,YAAY,aAAa,GAAG,QAAQ,oBAAoB,aAAa,GAAG,SAAsBD,EAAEE,EAAE,EAAE,CAAC,SAAS,gEAAgE,CAAC,CAAC,CAAC,EAAE,kCAA+CF,EAAEC,EAAE,CAAC,KAAK,6BAA6B,YAAY,GAAG,OAAO,YAAY,aAAa,GAAG,QAAQ,oBAAoB,aAAa,GAAG,SAAsBD,EAAEE,EAAE,EAAE,CAAC,SAAS,wBAAwB,CAAC,CAAC,CAAC,EAAE,kEAAkE,CAAC,CAAC,EAAeF,EAAE,KAAK,CAAC,SAAS,6BAA6B,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,iYAAiY,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,CAAC,kPAA+PE,EAAEC,EAAE,CAAC,KAAK,8CAA8C,YAAY,GAAG,OAAO,YAAY,aAAa,GAAG,QAAQ,oBAAoB,aAAa,GAAG,SAAsBD,EAAEE,EAAE,EAAE,CAAC,SAAS,uBAAuB,CAAC,CAAC,CAAC,EAAE,GAAG,CAAC,CAAC,CAAC,CAAC,CAAC,EAAec,EAAwBlB,EAAIC,EAAS,CAAC,SAAS,CAAcC,EAAE,KAAK,CAAC,SAAS,sBAAsB,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,+WAA+W,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,2BAA2B,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,sJAAsJ,CAAC,EAAeF,EAAE,KAAK,CAAC,SAAS,CAAcE,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBA,EAAE,IAAI,CAAC,SAAS,0DAA0D,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBA,EAAE,IAAI,CAAC,SAAS,yDAAyD,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBA,EAAE,IAAI,CAAC,SAAS,uDAAuD,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,mCAAmC,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,oSAAoS,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,CAAC,mFAAgGE,EAAEC,EAAE,CAAC,KAAK,iEAAiE,YAAY,GAAG,OAAO,YAAY,aAAa,GAAG,QAAQ,oBAAoB,aAAa,GAAG,SAAsBD,EAAEE,EAAE,EAAE,CAAC,SAAS,oCAAoC,CAAC,CAAC,CAAC,EAAE,GAAG,CAAC,CAAC,EAAeF,EAAE,KAAK,CAAC,SAAS,+CAA+C,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,4QAA4Q,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,CAAC,+YAA4ZE,EAAEC,EAAE,CAAC,KAAK,0CAA0C,YAAY,GAAG,OAAO,YAAY,aAAa,GAAG,QAAQ,oBAAoB,aAAa,GAAG,SAAsBD,EAAEE,EAAE,EAAE,CAAC,SAAS,wDAAwD,CAAC,CAAC,CAAC,EAAE,IAAI,CAAC,CAAC,EAAeF,EAAE,KAAK,CAAC,SAAS,2CAA2C,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,CAAC,wJAAqKE,EAAEC,EAAE,CAAC,KAAK,gEAAgE,YAAY,GAAG,OAAO,YAAY,aAAa,GAAG,QAAQ,oBAAoB,aAAa,GAAG,SAAsBD,EAAEE,EAAE,EAAE,CAAC,SAAS,+DAA+D,CAAC,CAAC,CAAC,EAAE,GAAG,CAAC,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,2bAA2b,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,oBAAoB,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,CAAC,kHAA+HE,EAAEC,EAAE,CAAC,KAAK,2CAA2C,YAAY,GAAG,OAAO,YAAY,aAAa,GAAG,QAAQ,oBAAoB,aAAa,GAAG,SAAsBD,EAAEE,EAAE,EAAE,CAAC,SAAS,oBAAoB,CAAC,CAAC,CAAC,EAAE,yJAAyJ,CAAC,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,yMAAyM,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,kBAAkB,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,8NAA8N,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,CAAC,oBAAiCE,EAAEC,EAAE,CAAC,KAAK,iEAAiE,YAAY,GAAG,OAAO,YAAY,aAAa,GAAG,QAAQ,oBAAoB,aAAa,GAAG,SAAsBD,EAAEE,EAAE,EAAE,CAAC,SAAS,8DAA8D,CAAC,CAAC,CAAC,EAAE,kCAA+CF,EAAEC,EAAE,CAAC,KAAK,6BAA6B,YAAY,GAAG,OAAO,YAAY,aAAa,GAAG,QAAQ,oBAAoB,aAAa,GAAG,SAAsBD,EAAEE,EAAE,EAAE,CAAC,SAAS,uBAAuB,CAAC,CAAC,CAAC,EAAE,sEAAsE,CAAC,CAAC,EAAeF,EAAE,KAAK,CAAC,SAAS,sDAAsD,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,kYAAkY,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,CAAC,iSAA8SE,EAAEC,EAAE,CAAC,KAAK,8CAA8C,YAAY,GAAG,OAAO,YAAY,aAAa,GAAG,QAAQ,oBAAoB,aAAa,GAAG,SAAsBD,EAAEE,EAAE,EAAE,CAAC,SAAS,uBAAuB,CAAC,CAAC,CAAC,EAAE,GAAG,CAAC,CAAC,CAAC,CAAC,CAAC,EAAee,EAAwBnB,EAAIC,EAAS,CAAC,SAAS,CAAcC,EAAE,KAAK,CAAC,SAAS,sBAAsB,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,6bAA6b,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,uCAAuC,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,oMAAoM,CAAC,EAAeF,EAAE,KAAK,CAAC,SAAS,CAAcE,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBA,EAAE,IAAI,CAAC,SAAS,iDAAiD,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBA,EAAE,IAAI,CAAC,SAAS,iEAAiE,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBA,EAAE,IAAI,CAAC,SAAS,sEAAsE,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,mCAAmC,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,yTAAyT,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,CAAC,mFAAgGE,EAAEC,EAAE,CAAC,KAAK,iEAAiE,YAAY,GAAG,OAAO,YAAY,aAAa,GAAG,QAAQ,oBAAoB,aAAa,GAAG,SAAsBD,EAAEE,EAAE,EAAE,CAAC,SAAS,oCAAoC,CAAC,CAAC,CAAC,EAAE,GAAG,CAAC,CAAC,EAAeF,EAAE,KAAK,CAAC,SAAS,wCAAwC,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,kPAAkP,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,CAAC,yYAAsZE,EAAEC,EAAE,CAAC,KAAK,0CAA0C,YAAY,GAAG,OAAO,YAAY,aAAa,GAAG,QAAQ,oBAAoB,aAAa,GAAG,SAAsBD,EAAEE,EAAE,EAAE,CAAC,SAAS,wDAAwD,CAAC,CAAC,CAAC,EAAE,GAAG,CAAC,CAAC,EAAeF,EAAE,KAAK,CAAC,SAAS,6CAA6C,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,gbAAgb,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,oBAAoB,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,CAAC,6HAA0IE,EAAEC,EAAE,CAAC,KAAK,2CAA2C,YAAY,GAAG,OAAO,YAAY,aAAa,GAAG,QAAQ,oBAAoB,aAAa,GAAG,SAAsBD,EAAEE,EAAE,EAAE,CAAC,SAAS,oBAAoB,CAAC,CAAC,CAAC,EAAE,4IAA4I,CAAC,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,4MAA4M,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,kBAAkB,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,8NAA8N,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,CAAC,oBAAiCE,EAAEC,EAAE,CAAC,KAAK,iEAAiE,YAAY,GAAG,OAAO,YAAY,aAAa,GAAG,QAAQ,oBAAoB,aAAa,GAAG,SAAsBD,EAAEE,EAAE,EAAE,CAAC,SAAS,gEAAgE,CAAC,CAAC,CAAC,EAAE,mCAAgDF,EAAEC,EAAE,CAAC,KAAK,6BAA6B,YAAY,GAAG,OAAO,YAAY,aAAa,GAAG,QAAQ,oBAAoB,aAAa,GAAG,SAAsBD,EAAEE,EAAE,EAAE,CAAC,SAAS,yBAAyB,CAAC,CAAC,CAAC,EAAE,gEAAgE,CAAC,CAAC,EAAeF,EAAE,KAAK,CAAC,SAAS,uCAAuC,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,gXAAgX,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,CAAC,2OAAwPE,EAAEC,EAAE,CAAC,KAAK,8CAA8C,YAAY,GAAG,OAAO,YAAY,aAAa,GAAG,QAAQ,oBAAoB,aAAa,GAAG,SAAsBD,EAAEE,EAAE,EAAE,CAAC,SAAS,uBAAuB,CAAC,CAAC,CAAC,EAAE,GAAG,CAAC,CAAC,CAAC,CAAC,CAAC,EAAegB,EAAwBpB,EAAIC,EAAS,CAAC,SAAS,CAAcC,EAAE,KAAK,CAAC,SAAS,sBAAsB,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,oXAAoX,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,yBAAyB,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,CAAC,OAAoBE,EAAEC,EAAE,CAAC,KAAK,4DAA4D,YAAY,GAAG,OAAO,YAAY,aAAa,GAAG,QAAQ,oBAAoB,aAAa,GAAG,SAAsBD,EAAEE,EAAE,EAAE,CAAC,SAAS,iBAAiB,CAAC,CAAC,CAAC,EAAE,sLAAsL,CAAC,CAAC,EAAeJ,EAAE,KAAK,CAAC,SAAS,CAAcE,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBA,EAAE,IAAI,CAAC,SAAS,yBAAyB,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBA,EAAE,IAAI,CAAC,SAAS,gDAAgD,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBA,EAAE,IAAI,CAAC,SAAS,oCAAoC,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,8BAA8B,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,+RAA+R,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,CAAC,iGAA8GE,EAAEC,EAAE,CAAC,KAAK,4DAA4D,YAAY,GAAG,OAAO,YAAY,aAAa,GAAG,QAAQ,oBAAoB,aAAa,GAAG,SAAsBD,EAAEE,EAAE,EAAE,CAAC,SAAS,qBAAqB,CAAC,CAAC,CAAC,EAAE,yIAAsJF,EAAEC,EAAE,CAAC,KAAK,+DAA+D,YAAY,GAAG,OAAO,YAAY,aAAa,GAAG,QAAQ,oBAAoB,aAAa,GAAG,SAAsBD,EAAEE,EAAE,EAAE,CAAC,SAAS,kCAAkC,CAAC,CAAC,CAAC,EAAE,GAAG,CAAC,CAAC,EAAeF,EAAE,KAAK,CAAC,SAAS,6CAA6C,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,yQAAyQ,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,CAAC,0aAAubE,EAAEC,EAAE,CAAC,KAAK,0CAA0C,YAAY,GAAG,OAAO,YAAY,aAAa,GAAG,QAAQ,oBAAoB,aAAa,GAAG,SAAsBD,EAAEE,EAAE,EAAE,CAAC,SAAS,wDAAwD,CAAC,CAAC,CAAC,EAAE,GAAG,CAAC,CAAC,EAAeF,EAAE,KAAK,CAAC,SAAS,gCAAgC,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,2bAA2b,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,CAAC,wJAAqKE,EAAEC,EAAE,CAAC,KAAK,8DAA8D,YAAY,GAAG,OAAO,YAAY,aAAa,GAAG,QAAQ,oBAAoB,aAAa,GAAG,SAAsBD,EAAEE,EAAE,EAAE,CAAC,SAAS,6DAA6D,CAAC,CAAC,CAAC,EAAE,GAAG,CAAC,CAAC,EAAeF,EAAE,KAAK,CAAC,SAAS,oBAAoB,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,CAAC,kHAA+HE,EAAEC,EAAE,CAAC,KAAK,2CAA2C,YAAY,GAAG,OAAO,YAAY,aAAa,GAAG,QAAQ,oBAAoB,aAAa,GAAG,SAAsBD,EAAEE,EAAE,EAAE,CAAC,SAAS,qBAAqB,CAAC,CAAC,CAAC,EAAE,qKAAqK,CAAC,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,oMAAoM,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,kBAAkB,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,wNAAwN,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,CAAC,oBAAiCE,EAAEC,EAAE,CAAC,KAAK,+DAA+D,YAAY,GAAG,OAAO,YAAY,aAAa,GAAG,QAAQ,oBAAoB,aAAa,GAAG,SAAsBD,EAAEE,EAAE,EAAE,CAAC,SAAS,qEAAqE,CAAC,CAAC,CAAC,EAAE,2BAAwCF,EAAEC,EAAE,CAAC,KAAK,6BAA6B,YAAY,GAAG,OAAO,YAAY,aAAa,GAAG,QAAQ,oBAAoB,aAAa,GAAG,SAAsBD,EAAEE,EAAE,EAAE,CAAC,SAAS,uBAAuB,CAAC,CAAC,CAAC,EAAE,oEAAoE,CAAC,CAAC,EAAeF,EAAE,KAAK,CAAC,SAAS,oDAAoD,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,oXAAoX,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,CAAC,kSAA+SE,EAAEC,EAAE,CAAC,KAAK,8CAA8C,YAAY,GAAG,OAAO,YAAY,aAAa,GAAG,QAAQ,oBAAoB,aAAa,GAAG,SAAsBD,EAAEE,EAAE,EAAE,CAAC,SAAS,uBAAuB,CAAC,CAAC,CAAC,EAAE,GAAG,CAAC,CAAC,CAAC,CAAC,CAAC,EAAeiB,EAAwBrB,EAAIC,EAAS,CAAC,SAAS,CAAcC,EAAE,KAAK,CAAC,SAAS,sBAAsB,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,8aAA8a,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,mCAAmC,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,mNAAmN,CAAC,EAAeF,EAAE,KAAK,CAAC,SAAS,CAAcE,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBA,EAAE,IAAI,CAAC,SAAS,+CAA+C,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBA,EAAE,IAAI,CAAC,SAAS,oDAAoD,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBA,EAAE,IAAI,CAAC,SAAS,0DAA0D,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBA,EAAE,IAAI,CAAC,SAAS,mEAAmE,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBA,EAAE,IAAI,CAAC,SAAS,sFAAsF,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,qCAAqC,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,yaAAya,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,CAAC,qFAAkGE,EAAEC,EAAE,CAAC,KAAK,mEAAmE,YAAY,GAAG,OAAO,YAAY,aAAa,GAAG,QAAQ,oBAAoB,aAAa,GAAG,SAAsBD,EAAEE,EAAE,EAAE,CAAC,SAAS,sCAAsC,CAAC,CAAC,CAAC,EAAE,GAAG,CAAC,CAAC,EAAeF,EAAE,KAAK,CAAC,SAAS,wCAAwC,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,oPAAoP,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,CAAC,oYAAiZE,EAAEC,EAAE,CAAC,KAAK,0CAA0C,YAAY,GAAG,OAAO,YAAY,aAAa,GAAG,QAAQ,oBAAoB,aAAa,GAAG,SAAsBD,EAAEE,EAAE,EAAE,CAAC,SAAS,wDAAwD,CAAC,CAAC,CAAC,EAAE,GAAG,CAAC,CAAC,EAAeF,EAAE,KAAK,CAAC,SAAS,mBAAmB,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,ibAAib,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,CAAC,8IAA2JE,EAAEC,EAAE,CAAC,KAAK,kEAAkE,YAAY,GAAG,OAAO,YAAY,aAAa,GAAG,QAAQ,oBAAoB,aAAa,GAAG,SAAsBD,EAAEE,EAAE,EAAE,CAAC,SAAS,iEAAiE,CAAC,CAAC,CAAC,EAAE,GAAG,CAAC,CAAC,EAAeF,EAAE,KAAK,CAAC,SAAS,oBAAoB,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,CAAC,+HAA4IE,EAAEC,EAAE,CAAC,KAAK,2CAA2C,YAAY,GAAG,OAAO,YAAY,aAAa,GAAG,QAAQ,oBAAoB,aAAa,GAAG,SAAsBD,EAAEE,EAAE,EAAE,CAAC,SAAS,qBAAqB,CAAC,CAAC,CAAC,EAAE,4IAA4I,CAAC,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,4MAA4M,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,kBAAkB,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,gOAAgO,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,CAAC,oBAAiCE,EAAEC,EAAE,CAAC,KAAK,mEAAmE,YAAY,GAAG,OAAO,YAAY,aAAa,GAAG,QAAQ,oBAAoB,aAAa,GAAG,SAAsBD,EAAEE,EAAE,EAAE,CAAC,SAAS,gEAAgE,CAAC,CAAC,CAAC,EAAE,kCAA+CF,EAAEC,EAAE,CAAC,KAAK,6BAA6B,YAAY,GAAG,OAAO,YAAY,aAAa,GAAG,QAAQ,oBAAoB,aAAa,GAAG,SAAsBD,EAAEE,EAAE,EAAE,CAAC,SAAS,uBAAuB,CAAC,CAAC,CAAC,EAAE,kEAAkE,CAAC,CAAC,EAAeF,EAAE,KAAK,CAAC,SAAS,6BAA6B,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,+WAA+W,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,CAAC,6OAA0PE,EAAEC,EAAE,CAAC,KAAK,8CAA8C,YAAY,GAAG,OAAO,YAAY,aAAa,GAAG,QAAQ,oBAAoB,aAAa,GAAG,SAAsBD,EAAEE,EAAE,EAAE,CAAC,SAAS,uBAAuB,CAAC,CAAC,CAAC,EAAE,GAAG,CAAC,CAAC,CAAC,CAAC,CAAC,EAAekB,EAAwBtB,EAAIC,EAAS,CAAC,SAAS,CAAcC,EAAE,KAAK,CAAC,SAAS,sBAAsB,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,kdAAkd,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,qCAAqC,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,6JAA6J,CAAC,EAAeF,EAAE,KAAK,CAAC,SAAS,CAAcE,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBA,EAAE,IAAI,CAAC,SAAS,+DAA+D,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBA,EAAE,IAAI,CAAC,SAAS,uDAAuD,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBA,EAAE,IAAI,CAAC,SAAS,qDAAqD,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBA,EAAE,IAAI,CAAC,SAAS,iDAAiD,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBA,EAAE,IAAI,CAAC,SAAS,yDAAyD,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,6CAA6C,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,4WAA4W,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,CAAC,6FAA0GE,EAAEC,EAAE,CAAC,KAAK,0EAA0E,YAAY,GAAG,OAAO,YAAY,aAAa,GAAG,QAAQ,oBAAoB,aAAa,GAAG,SAAsBD,EAAEE,EAAE,EAAE,CAAC,SAAS,8CAA8C,CAAC,CAAC,CAAC,EAAE,GAAG,CAAC,CAAC,EAAeF,EAAE,KAAK,CAAC,SAAS,wCAAwC,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,4PAA4P,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,CAAC,yYAAsZE,EAAEC,EAAE,CAAC,KAAK,0CAA0C,YAAY,GAAG,OAAO,YAAY,aAAa,GAAG,QAAQ,oBAAoB,aAAa,GAAG,SAAsBD,EAAEE,EAAE,EAAE,CAAC,SAAS,wDAAwD,CAAC,CAAC,CAAC,EAAE,GAAG,CAAC,CAAC,EAAeF,EAAE,KAAK,CAAC,SAAS,6CAA6C,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,CAAC,2KAAwLE,EAAEC,EAAE,CAAC,KAAK,gEAAgE,YAAY,GAAG,OAAO,YAAY,aAAa,GAAG,QAAQ,oBAAoB,aAAa,GAAG,SAAsBD,EAAEE,EAAE,EAAE,CAAC,SAAS,yEAAyE,CAAC,CAAC,CAAC,EAAE,GAAG,CAAC,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,2aAA2a,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,oBAAoB,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,CAAC,uIAAoJE,EAAEC,EAAE,CAAC,KAAK,2CAA2C,YAAY,GAAG,OAAO,YAAY,aAAa,GAAG,QAAQ,oBAAoB,aAAa,GAAG,SAAsBD,EAAEE,EAAE,EAAE,CAAC,SAAS,oBAAoB,CAAC,CAAC,CAAC,EAAE,4IAA4I,CAAC,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,4MAA4M,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,kBAAkB,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,+NAA+N,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,CAAC,oBAAiCE,EAAEC,EAAE,CAAC,KAAK,0EAA0E,YAAY,GAAG,OAAO,YAAY,aAAa,GAAG,QAAQ,oBAAoB,aAAa,GAAG,SAAsBD,EAAEE,EAAE,EAAE,CAAC,SAAS,wEAAwE,CAAC,CAAC,CAAC,EAAE,kCAA+CF,EAAEC,EAAE,CAAC,KAAK,6BAA6B,YAAY,GAAG,OAAO,YAAY,aAAa,GAAG,QAAQ,oBAAoB,aAAa,GAAG,SAAsBD,EAAEE,EAAE,EAAE,CAAC,SAAS,uBAAuB,CAAC,CAAC,CAAC,EAAE,0EAA0E,CAAC,CAAC,EAAeF,EAAE,KAAK,CAAC,SAAS,qCAAqC,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,+WAA+W,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,CAAC,uQAAoRE,EAAEC,EAAE,CAAC,KAAK,8CAA8C,YAAY,GAAG,OAAO,YAAY,aAAa,GAAG,QAAQ,oBAAoB,aAAa,GAAG,SAAsBD,EAAEE,EAAE,EAAE,CAAC,SAAS,uBAAuB,CAAC,CAAC,CAAC,EAAE,GAAG,CAAC,CAAC,CAAC,CAAC,CAAC,EAAemB,EAAwBvB,EAAIC,EAAS,CAAC,SAAS,CAAcC,EAAE,KAAK,CAAC,SAAS,sBAAsB,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,2bAA2b,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,wBAAwB,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,sOAAsO,CAAC,EAAeF,EAAE,KAAK,CAAC,SAAS,CAAcE,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBA,EAAE,IAAI,CAAC,SAAS,6CAA6C,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBA,EAAE,IAAI,CAAC,SAAS,wCAAwC,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBA,EAAE,IAAI,CAAC,SAAS,kDAAkD,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAEC,EAAE,CAAC,KAAK,6BAA6B,YAAY,GAAG,OAAO,YAAY,aAAa,GAAG,QAAQ,oBAAoB,aAAa,GAAG,SAAsBD,EAAEE,EAAE,EAAE,CAAC,SAAS,YAAY,CAAC,CAAC,CAAC,EAAE,sBAAsB,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,EAAeF,EAAE,KAAK,CAAC,SAAS,gCAAgC,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,0RAA0R,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,CAAC,0CAAuDE,EAAEC,EAAE,CAAC,KAAK,kDAAkD,YAAY,GAAG,OAAO,YAAY,aAAa,GAAG,QAAQ,oBAAoB,aAAa,GAAG,SAAsBD,EAAEE,EAAE,EAAE,CAAC,SAAS,iBAAiB,CAAC,CAAC,CAAC,EAAE,2HAAwIF,EAAEC,EAAE,CAAC,KAAK,8DAA8D,YAAY,GAAG,OAAO,YAAY,aAAa,GAAG,QAAQ,oBAAoB,aAAa,GAAG,SAAsBD,EAAEE,EAAE,EAAE,CAAC,SAAS,iCAAiC,CAAC,CAAC,CAAC,EAAE,GAAG,CAAC,CAAC,EAAeF,EAAE,KAAK,CAAC,SAAS,mCAAmC,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,qPAAqP,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,CAAC,maAAgbE,EAAEC,EAAE,CAAC,KAAK,0CAA0C,YAAY,GAAG,OAAO,YAAY,aAAa,GAAG,QAAQ,oBAAoB,aAAa,GAAG,SAAsBD,EAAEE,EAAE,EAAE,CAAC,SAAS,wDAAwD,CAAC,CAAC,CAAC,EAAE,GAAG,CAAC,CAAC,EAAeF,EAAE,KAAK,CAAC,SAAS,6CAA6C,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,CAAC,gKAA6KE,EAAEC,EAAE,CAAC,KAAK,6DAA6D,YAAY,GAAG,OAAO,YAAY,aAAa,GAAG,QAAQ,oBAAoB,aAAa,GAAG,SAAsBD,EAAEE,EAAE,EAAE,CAAC,SAAS,4DAA4D,CAAC,CAAC,CAAC,EAAE,GAAG,CAAC,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,ibAAib,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,oBAAoB,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,CAAC,kHAA+HE,EAAEC,EAAE,CAAC,KAAK,2CAA2C,YAAY,GAAG,OAAO,YAAY,aAAa,GAAG,QAAQ,oBAAoB,aAAa,GAAG,SAAsBD,EAAEE,EAAE,EAAE,CAAC,SAAS,oBAAoB,CAAC,CAAC,CAAC,EAAE,8IAA8I,CAAC,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,iMAAiM,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,kBAAkB,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,2NAA2N,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,CAAC,oBAAiCE,EAAEC,EAAE,CAAC,KAAK,8DAA8D,YAAY,GAAG,OAAO,YAAY,aAAa,GAAG,QAAQ,oBAAoB,aAAa,GAAG,SAAsBD,EAAEE,EAAE,EAAE,CAAC,SAAS,2DAA2D,CAAC,CAAC,CAAC,EAAE,kCAA+CF,EAAEC,EAAE,CAAC,KAAK,6BAA6B,YAAY,GAAG,OAAO,YAAY,aAAa,GAAG,QAAQ,oBAAoB,aAAa,GAAG,SAAsBD,EAAEE,EAAE,EAAE,CAAC,SAAS,uBAAuB,CAAC,CAAC,CAAC,EAAE,6DAA6D,CAAC,CAAC,EAAeF,EAAE,KAAK,CAAC,SAAS,yCAAyC,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,6WAA6W,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,CAAC,6OAA0PE,EAAEC,EAAE,CAAC,KAAK,8CAA8C,YAAY,GAAG,OAAO,YAAY,aAAa,GAAG,QAAQ,oBAAoB,aAAa,GAAG,SAAsBD,EAAEE,EAAE,EAAE,CAAC,SAAS,sBAAsB,CAAC,CAAC,CAAC,EAAE,GAAG,CAAC,CAAC,CAAC,CAAC,CAAC,EAAeoB,EAAwBxB,EAAIC,EAAS,CAAC,SAAS,CAAcD,EAAE,IAAI,CAAC,SAAS,CAAC,yFAAsGE,EAAEC,EAAE,CAAC,KAAK,wBAAwB,YAAY,GAAG,OAAO,YAAY,aAAa,GAAG,QAAQ,oBAAoB,aAAa,GAAG,SAAsBD,EAAEE,EAAE,EAAE,CAAC,SAAS,WAAW,CAAC,CAAC,CAAC,EAAE,qDAAqD,CAAC,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,mWAAmW,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,WAAW,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,sCAAsC,CAAC,EAAeF,EAAE,KAAK,CAAC,SAAS,CAAcE,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBA,EAAE,IAAI,CAAC,SAAS,gGAAgG,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBA,EAAE,IAAI,CAAC,SAAS,2HAA2H,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBA,EAAE,IAAI,CAAC,SAAS,sJAAsJ,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBA,EAAE,IAAI,CAAC,SAAS,4GAA4G,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,cAAc,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,wGAAwG,CAAC,EAAeF,EAAE,KAAK,CAAC,SAAS,CAAcE,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBA,EAAE,IAAI,CAAC,SAAS,qDAAqD,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBA,EAAE,IAAI,CAAC,SAAS,iDAAiD,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBA,EAAE,IAAI,CAAC,SAAS,8DAA8D,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,CAAC,+BAA4CE,EAAEC,EAAE,CAAC,KAAK,gEAAgE,YAAY,GAAG,OAAO,YAAY,aAAa,GAAG,QAAQ,oBAAoB,aAAa,GAAG,SAAsBD,EAAEE,EAAE,EAAE,CAAC,SAAS,iCAAiC,CAAC,CAAC,CAAC,EAAE,GAAG,CAAC,CAAC,CAAC,CAAC,CAAC,EAAeqB,EAAwBzB,EAAIC,EAAS,CAAC,SAAS,CAAcC,EAAE,IAAI,CAAC,SAAS,6GAA6G,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,2RAA2R,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,CAAC,2JAAwKE,EAAEC,EAAE,CAAC,KAAK,gGAAgG,YAAY,GAAG,OAAO,YAAY,aAAa,GAAG,QAAQ,oBAAoB,aAAa,GAAG,SAAsBD,EAAEE,EAAE,EAAE,CAAC,SAAS,+CAA+C,CAAC,CAAC,CAAC,EAAE,mFAAmF,CAAC,CAAC,EAAeF,EAAE,KAAK,CAAC,SAAS,WAAW,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,yDAAyD,CAAC,EAAeF,EAAE,KAAK,CAAC,SAAS,CAAcE,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBA,EAAE,IAAI,CAAC,SAAS,yEAAyE,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBA,EAAE,IAAI,CAAC,SAAS,iDAAiD,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBA,EAAE,IAAI,CAAC,SAAS,gHAAgH,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBA,EAAE,IAAI,CAAC,SAAS,+CAA+C,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,cAAc,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,qCAAqC,CAAC,EAAeF,EAAE,KAAK,CAAC,SAAS,CAAcE,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBA,EAAE,IAAI,CAAC,SAAS,qCAAqC,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBA,EAAE,IAAI,CAAC,SAAS,sFAAsF,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBA,EAAE,IAAI,CAAC,SAAS,8CAA8C,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBA,EAAE,IAAI,CAAC,SAAS,wDAAwD,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,8IAA8I,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,yBAAyB,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,CAAC,uJAAoKE,EAAEC,EAAE,CAAC,KAAK,wCAAwC,YAAY,GAAG,OAAO,YAAY,aAAa,GAAG,QAAQ,oBAAoB,aAAa,GAAG,SAAsBD,EAAEE,EAAE,EAAE,CAAC,SAAS,6CAA6C,CAAC,CAAC,CAAC,EAAE,GAAG,CAAC,CAAC,CAAC,CAAC,CAAC,EAAesB,EAAwB1B,EAAIC,EAAS,CAAC,SAAS,CAAcC,EAAE,IAAI,CAAC,SAAS,qGAAqG,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,oNAAoN,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,CAAC,oJAAiKE,EAAEC,EAAE,CAAC,KAAK,wFAAwF,YAAY,GAAG,OAAO,YAAY,aAAa,GAAG,QAAQ,oBAAoB,aAAa,GAAG,SAAsBD,EAAEE,EAAE,EAAE,CAAC,SAAS,uCAAuC,CAAC,CAAC,CAAC,EAAE,mFAAmF,CAAC,CAAC,EAAeF,EAAE,KAAK,CAAC,SAAS,WAAW,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,wDAAwD,CAAC,EAAeF,EAAE,KAAK,CAAC,SAAS,CAAcE,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBA,EAAE,IAAI,CAAC,SAAS,8CAAoC,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBA,EAAE,IAAI,CAAC,SAAS,iCAAiC,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBA,EAAE,IAAI,CAAC,SAAS,iCAAiC,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,cAAc,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,qCAAqC,CAAC,EAAeF,EAAE,KAAK,CAAC,SAAS,CAAcE,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBA,EAAE,IAAI,CAAC,SAAS,qCAAqC,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBA,EAAE,IAAI,CAAC,SAAS,qFAAqF,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBA,EAAE,IAAI,CAAC,SAAS,8CAA8C,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBA,EAAE,IAAI,CAAC,SAAS,uDAAuD,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,iJAAiJ,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,wBAAwB,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,CAAC,sJAAmKE,EAAEC,EAAE,CAAC,KAAK,wCAAwC,YAAY,GAAG,OAAO,YAAY,aAAa,GAAG,QAAQ,oBAAoB,aAAa,GAAG,SAAsBD,EAAEE,EAAE,EAAE,CAAC,SAAS,6CAA6C,CAAC,CAAC,CAAC,EAAE,GAAG,CAAC,CAAC,CAAC,CAAC,CAAC,EAAeuB,EAAwB3B,EAAIC,EAAS,CAAC,SAAS,CAAcC,EAAE,IAAI,CAAC,SAAS,sGAAsG,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,uPAAuP,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,CAAC,kIAA+IE,EAAEC,EAAE,CAAC,KAAK,yFAAyF,YAAY,GAAG,OAAO,YAAY,aAAa,GAAG,QAAQ,oBAAoB,aAAa,GAAG,SAAsBD,EAAEE,EAAE,EAAE,CAAC,SAAS,wCAAwC,CAAC,CAAC,CAAC,EAAE,mFAAmF,CAAC,CAAC,EAAeF,EAAE,KAAK,CAAC,SAAS,WAAW,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,yDAAyD,CAAC,EAAeF,EAAE,KAAK,CAAC,SAAS,CAAcE,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBA,EAAE,IAAI,CAAC,SAAS,wDAAwD,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBA,EAAE,IAAI,CAAC,SAAS,kEAAkE,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBA,EAAE,IAAI,CAAC,SAAS,iDAAiD,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBA,EAAE,IAAI,CAAC,SAAS,iDAAiD,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,cAAc,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,qCAAqC,CAAC,EAAeF,EAAE,KAAK,CAAC,SAAS,CAAcE,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBA,EAAE,IAAI,CAAC,SAAS,qCAAqC,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBA,EAAE,IAAI,CAAC,SAAS,8EAA8E,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBA,EAAE,IAAI,CAAC,SAAS,8CAA8C,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBA,EAAE,IAAI,CAAC,SAAS,6DAA6D,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,2IAA2I,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,uBAAuB,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,CAAC,qJAAkKE,EAAEC,EAAE,CAAC,KAAK,wCAAwC,YAAY,GAAG,OAAO,YAAY,aAAa,GAAG,QAAQ,oBAAoB,aAAa,GAAG,SAAsBD,EAAEE,EAAE,EAAE,CAAC,SAAS,6CAA6C,CAAC,CAAC,CAAC,EAAE,GAAG,CAAC,CAAC,CAAC,CAAC,CAAC,EAAewB,EAAwB5B,EAAIC,EAAS,CAAC,SAAS,CAAcC,EAAE,IAAI,CAAC,SAAS,wGAAwG,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,4RAA4R,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,CAAC,+JAA4KE,EAAEC,EAAE,CAAC,KAAK,+FAA+F,YAAY,GAAG,OAAO,YAAY,aAAa,GAAG,QAAQ,oBAAoB,aAAa,GAAG,SAAsBD,EAAEE,EAAE,EAAE,CAAC,SAAS,8CAA8C,CAAC,CAAC,CAAC,EAAE,mFAAmF,CAAC,CAAC,EAAeF,EAAE,KAAK,CAAC,SAAS,WAAW,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,+DAA+D,CAAC,EAAeF,EAAE,KAAK,CAAC,SAAS,CAAcE,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBA,EAAE,IAAI,CAAC,SAAS,iFAAiF,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBA,EAAE,IAAI,CAAC,SAAS,4EAA4E,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBA,EAAE,IAAI,CAAC,SAAS,6DAA6D,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBA,EAAE,IAAI,CAAC,SAAS,2CAA2C,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,cAAc,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,qCAAqC,CAAC,EAAeF,EAAE,KAAK,CAAC,SAAS,CAAcE,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBA,EAAE,IAAI,CAAC,SAAS,qCAAqC,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBA,EAAE,IAAI,CAAC,SAAS,gFAAgF,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBA,EAAE,IAAI,CAAC,SAAS,8CAA8C,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBA,EAAE,IAAI,CAAC,SAAS,kDAAkD,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,wBAAwB,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,CAAC,sJAAmKE,EAAEC,EAAE,CAAC,KAAK,wCAAwC,YAAY,GAAG,OAAO,YAAY,aAAa,GAAG,QAAQ,oBAAoB,aAAa,GAAG,SAAsBD,EAAEE,EAAE,EAAE,CAAC,SAAS,6CAA6C,CAAC,CAAC,CAAC,EAAE,GAAG,CAAC,CAAC,CAAC,CAAC,CAAC,EAAeyB,EAAwB7B,EAAIC,EAAS,CAAC,SAAS,CAAcC,EAAE,IAAI,CAAC,SAAS,qGAAqG,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,oWAAoW,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,mRAAmR,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,WAAW,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,gEAAgE,CAAC,EAAeF,EAAE,KAAK,CAAC,SAAS,CAAcE,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBA,EAAE,IAAI,CAAC,SAAS,iEAAiE,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBA,EAAE,IAAI,CAAC,SAAS,+CAA+C,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBA,EAAE,IAAI,CAAC,SAAS,yCAAyC,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBA,EAAE,IAAI,CAAC,SAAS,uEAAuE,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,cAAc,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,qCAAqC,CAAC,EAAeF,EAAE,KAAK,CAAC,SAAS,CAAcE,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBA,EAAE,IAAI,CAAC,SAAS,qCAAqC,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBA,EAAE,IAAI,CAAC,SAAS,+FAA+F,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBA,EAAE,IAAI,CAAC,SAAS,8CAA8C,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBA,EAAE,IAAI,CAAC,SAAS,kDAAkD,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,CAAC,2LAAwME,EAAEC,EAAE,CAAC,KAAK,wCAAwC,YAAY,GAAG,OAAO,YAAY,aAAa,GAAG,QAAQ,oBAAoB,aAAa,GAAG,SAAsBD,EAAEE,EAAE,EAAE,CAAC,SAAS,6CAA6C,CAAC,CAAC,CAAC,EAAE,GAAG,CAAC,CAAC,CAAC,CAAC,CAAC,EAAe0B,EAAwB9B,EAAIC,EAAS,CAAC,SAAS,CAAcC,EAAE,IAAI,CAAC,SAAS,0GAA0G,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,mVAAmV,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,CAAC,+JAA4KE,EAAEC,EAAE,CAAC,KAAK,yFAAyF,YAAY,GAAG,OAAO,YAAY,aAAa,GAAG,QAAQ,oBAAoB,aAAa,GAAG,SAAsBD,EAAEE,EAAE,EAAE,CAAC,SAAS,4CAA4C,CAAC,CAAC,CAAC,EAAE,mFAAmF,CAAC,CAAC,EAAeF,EAAE,KAAK,CAAC,SAAS,WAAW,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,6DAA6D,CAAC,EAAeF,EAAE,KAAK,CAAC,SAAS,CAAcE,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBA,EAAE,IAAI,CAAC,SAAS,uDAAuD,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBA,EAAE,IAAI,CAAC,SAAS,sCAAsC,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBA,EAAE,IAAI,CAAC,SAAS,wDAAwD,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,cAAc,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,qCAAqC,CAAC,EAAeF,EAAE,KAAK,CAAC,SAAS,CAAcE,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBA,EAAE,IAAI,CAAC,SAAS,qCAAqC,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBA,EAAE,IAAI,CAAC,SAAS,mFAAmF,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBA,EAAE,IAAI,CAAC,SAAS,yEAAyE,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBA,EAAE,IAAI,CAAC,SAAS,qDAAqD,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,CAAC,kLAA+LE,EAAEC,EAAE,CAAC,KAAK,wCAAwC,YAAY,GAAG,OAAO,YAAY,aAAa,GAAG,QAAQ,oBAAoB,aAAa,GAAG,SAAsBD,EAAEE,EAAE,EAAE,CAAC,SAAS,6CAA6C,CAAC,CAAC,CAAC,EAAE,GAAG,CAAC,CAAC,CAAC,CAAC,CAAC,EAAe2B,EAAwB/B,EAAIC,EAAS,CAAC,SAAS,CAAcC,EAAE,IAAI,CAAC,SAAS,sIAAsI,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,mTAAmT,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,CAAC,mJAAgKE,EAAEC,EAAE,CAAC,KAAK,yFAAyF,YAAY,GAAG,OAAO,YAAY,aAAa,GAAG,QAAQ,oBAAoB,aAAa,GAAG,SAAsBD,EAAEE,EAAE,EAAE,CAAC,SAAS,wCAAwC,CAAC,CAAC,CAAC,EAAE,mFAAmF,CAAC,CAAC,EAAeF,EAAE,KAAK,CAAC,SAAS,WAAW,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,yDAAyD,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAsBA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBA,EAAE,IAAI,CAAC,SAAS,4HAA4H,CAAC,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,cAAc,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,qCAAqC,CAAC,EAAeF,EAAE,KAAK,CAAC,SAAS,CAAcE,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBA,EAAE,IAAI,CAAC,SAAS,qCAAqC,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBA,EAAE,IAAI,CAAC,SAAS,gFAAgF,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBA,EAAE,IAAI,CAAC,SAAS,8CAA8C,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBA,EAAE,IAAI,CAAC,SAAS,kDAAkD,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,wIAAwI,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,sBAAsB,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,CAAC,gJAA6JE,EAAEC,EAAE,CAAC,KAAK,wCAAwC,YAAY,GAAG,OAAO,YAAY,aAAa,GAAG,QAAQ,oBAAoB,aAAa,GAAG,SAAsBD,EAAEE,EAAE,EAAE,CAAC,SAAS,6CAA6C,CAAC,CAAC,CAAC,EAAE,GAAG,CAAC,CAAC,CAAC,CAAC,CAAC,EAAe4B,EAAwBhC,EAAIC,EAAS,CAAC,SAAS,CAAcC,EAAE,IAAI,CAAC,SAAS,qHAAqH,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,8TAA8T,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,CAAC,qLAAkME,EAAEC,EAAE,CAAC,KAAK,yFAAyF,YAAY,GAAG,OAAO,YAAY,aAAa,GAAG,QAAQ,oBAAoB,aAAa,GAAG,SAAsBD,EAAEE,EAAE,EAAE,CAAC,SAAS,wCAAwC,CAAC,CAAC,CAAC,EAAE,mFAAmF,CAAC,CAAC,EAAeF,EAAE,KAAK,CAAC,SAAS,WAAW,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,qEAAqE,CAAC,EAAeF,EAAE,KAAK,CAAC,SAAS,CAAcE,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBA,EAAE,IAAI,CAAC,SAAS,2EAA2E,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBA,EAAE,IAAI,CAAC,SAAS,oCAAoC,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBA,EAAE,IAAI,CAAC,SAAS,uHAAuH,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,cAAc,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,qCAAqC,CAAC,EAAeF,EAAE,KAAK,CAAC,SAAS,CAAcE,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBA,EAAE,IAAI,CAAC,SAAS,wCAAwC,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBA,EAAE,IAAI,CAAC,SAAS,yGAAyG,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBA,EAAE,IAAI,CAAC,SAAS,8CAA8C,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBA,EAAE,IAAI,CAAC,SAAS,6DAA6D,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,CAAC,yKAAsLE,EAAEC,EAAE,CAAC,KAAK,wCAAwC,YAAY,GAAG,OAAO,YAAY,aAAa,GAAG,QAAQ,oBAAoB,aAAa,GAAG,SAAsBD,EAAEE,EAAE,EAAE,CAAC,SAAS,6CAA6C,CAAC,CAAC,CAAC,EAAE,GAAG,CAAC,CAAC,CAAC,CAAC,CAAC,EAAe6B,EAAwBjC,EAAIC,EAAS,CAAC,SAAS,CAAcC,EAAE,IAAI,CAAC,SAAS,0HAA0H,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,0eAA0e,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,CAAC,4JAAyKE,EAAEC,EAAE,CAAC,KAAK,8FAA8F,YAAY,GAAG,OAAO,YAAY,aAAa,GAAG,QAAQ,oBAAoB,aAAa,GAAG,SAAsBD,EAAEE,EAAE,EAAE,CAAC,SAAS,6CAA6C,CAAC,CAAC,CAAC,EAAE,mFAAmF,CAAC,CAAC,EAAeF,EAAE,KAAK,CAAC,SAAS,WAAW,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,sEAAsE,CAAC,EAAeF,EAAE,KAAK,CAAC,SAAS,CAAcE,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBA,EAAE,IAAI,CAAC,SAAS,oEAAoE,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBA,EAAE,IAAI,CAAC,SAAS,+FAA+F,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBA,EAAE,IAAI,CAAC,SAAS,uFAAuF,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,cAAc,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,qCAAqC,CAAC,EAAeF,EAAE,KAAK,CAAC,SAAS,CAAcE,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBA,EAAE,IAAI,CAAC,SAAS,qCAAqC,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBA,EAAE,IAAI,CAAC,SAAS,4FAA4F,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBA,EAAE,IAAI,CAAC,SAAS,8CAA8C,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBA,EAAE,IAAI,CAAC,SAAS,6DAA6D,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,CAAC,wLAAqME,EAAEC,EAAE,CAAC,KAAK,wCAAwC,YAAY,GAAG,OAAO,YAAY,aAAa,GAAG,QAAQ,oBAAoB,aAAa,GAAG,SAAsBD,EAAEE,EAAE,EAAE,CAAC,SAAS,6CAA6C,CAAC,CAAC,CAAC,EAAE,GAAG,CAAC,CAAC,CAAC,CAAC,CAAC,EAAe8B,EAAwBlC,EAAIC,EAAS,CAAC,SAAS,CAAcC,EAAE,IAAI,CAAC,SAAS,wHAAwH,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,CAAC,6UAAqVE,EAAEC,EAAE,CAAC,KAAK,8FAA8F,YAAY,GAAG,OAAO,YAAY,aAAa,GAAG,QAAQ,oBAAoB,aAAa,GAAG,SAAsBD,EAAEE,EAAE,EAAE,CAAC,SAAS,mBAAmB,CAAC,CAAC,CAAC,EAAE,GAAG,CAAC,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,8IAA8I,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,WAAW,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,8DAA8D,CAAC,EAAeF,EAAE,KAAK,CAAC,SAAS,CAAcE,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBA,EAAE,IAAI,CAAC,SAAS,4GAA4G,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBA,EAAE,IAAI,CAAC,SAAS,oCAAoC,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBA,EAAE,IAAI,CAAC,SAAS,8FAA8F,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,cAAc,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,qCAAqC,CAAC,EAAeF,EAAE,KAAK,CAAC,SAAS,CAAcE,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBA,EAAE,IAAI,CAAC,SAAS,qCAAqC,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBA,EAAE,IAAI,CAAC,SAAS,6FAA6F,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBA,EAAE,IAAI,CAAC,SAAS,8CAA8C,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBA,EAAE,IAAI,CAAC,SAAS,+DAA+D,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,CAAC,yLAAsME,EAAEC,EAAE,CAAC,KAAK,wCAAwC,YAAY,GAAG,OAAO,YAAY,aAAa,GAAG,QAAQ,oBAAoB,aAAa,GAAG,SAAsBD,EAAEE,EAAE,EAAE,CAAC,SAAS,6CAA6C,CAAC,CAAC,CAAC,EAAE,GAAG,CAAC,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,MAAM,CAAC,CAAC,CAAC,CAAC,EAAeiC,EAAwBnC,EAAIC,EAAS,CAAC,SAAS,CAAcC,EAAE,IAAI,CAAC,SAAS,yHAAyH,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,qXAAqX,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,CAAC,qLAAkME,EAAEC,EAAE,CAAC,KAAK,4FAA4F,YAAY,GAAG,OAAO,YAAY,aAAa,GAAG,QAAQ,oBAAoB,aAAa,GAAG,SAAsBD,EAAEE,EAAE,EAAE,CAAC,SAAS,oDAAoD,CAAC,CAAC,CAAC,EAAE,mFAAmF,CAAC,CAAC,EAAeF,EAAE,KAAK,CAAC,SAAS,WAAW,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,qEAAqE,CAAC,EAAeF,EAAE,KAAK,CAAC,SAAS,CAAcE,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBA,EAAE,IAAI,CAAC,SAAS,8EAA8E,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBA,EAAE,IAAI,CAAC,SAAS,+HAA+H,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBA,EAAE,IAAI,CAAC,SAAS,uFAAuF,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,cAAc,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,qCAAqC,CAAC,EAAeF,EAAE,KAAK,CAAC,SAAS,CAAcE,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBA,EAAE,IAAI,CAAC,SAAS,qCAAqC,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBA,EAAE,IAAI,CAAC,SAAS,oGAAoG,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBA,EAAE,IAAI,CAAC,SAAS,8CAA8C,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBA,EAAE,IAAI,CAAC,SAAS,sEAAsE,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,CAAC,gMAA6ME,EAAEC,EAAE,CAAC,KAAK,wCAAwC,YAAY,GAAG,OAAO,YAAY,aAAa,GAAG,QAAQ,oBAAoB,aAAa,GAAG,SAAsBD,EAAEE,EAAE,EAAE,CAAC,SAAS,6CAA6C,CAAC,CAAC,CAAC,EAAE,GAAG,CAAC,CAAC,CAAC,CAAC,CAAC,EAC/tpJgC,EAAqB,CAAC,QAAU,CAAC,WAAa,CAAC,KAAO,WAAW,YAAc,CAAC,sBAAwB,GAAG,CAAC,EAAE,UAAY,CAAC,KAAO,WAAW,YAAc,CAAC,sBAAwB,GAAG,CAAC,EAAE,UAAY,CAAC,KAAO,WAAW,YAAc,CAAC,sBAAwB,GAAG,CAAC,EAAE,WAAa,CAAC,KAAO,WAAW,YAAc,CAAC,sBAAwB,GAAG,CAAC,EAAE,UAAY,CAAC,KAAO,WAAW,YAAc,CAAC,sBAAwB,GAAG,CAAC,EAAE,WAAa,CAAC,KAAO,WAAW,YAAc,CAAC,sBAAwB,GAAG,CAAC,EAAE,UAAY,CAAC,KAAO,WAAW,YAAc,CAAC,sBAAwB,GAAG,CAAC,EAAE,WAAa,CAAC,KAAO,WAAW,YAAc,CAAC,sBAAwB,GAAG,CAAC,EAAE,WAAa,CAAC,KAAO,WAAW,YAAc,CAAC,sBAAwB,GAAG,CAAC,EAAE,WAAa,CAAC,KAAO,WAAW,YAAc,CAAC,sBAAwB,GAAG,CAAC,EAAE,WAAa,CAAC,KAAO,WAAW,YAAc,CAAC,sBAAwB,GAAG,CAAC,EAAE,SAAW,CAAC,KAAO,WAAW,YAAc,CAAC,sBAAwB,GAAG,CAAC,EAAE,WAAa,CAAC,KAAO,WAAW,YAAc,CAAC,sBAAwB,GAAG,CAAC,EAAE,WAAa,CAAC,KAAO,WAAW,YAAc,CAAC,sBAAwB,GAAG,CAAC,EAAE,WAAa,CAAC,KAAO,WAAW,YAAc,CAAC,sBAAwB,GAAG,CAAC,EAAE,UAAY,CAAC,KAAO,WAAW,YAAc,CAAC,sBAAwB,GAAG,CAAC,EAAE,WAAa,CAAC,KAAO,WAAW,YAAc,CAAC,sBAAwB,GAAG,CAAC,EAAE,WAAa,CAAC,KAAO,WAAW,YAAc,CAAC,sBAAwB,GAAG,CAAC,EAAE,UAAY,CAAC,KAAO,WAAW,YAAc,CAAC,sBAAwB,GAAG,CAAC,EAAE,WAAa,CAAC,KAAO,WAAW,YAAc,CAAC,sBAAwB,GAAG,CAAC,EAAE,WAAa,CAAC,KAAO,WAAW,YAAc,CAAC,sBAAwB,GAAG,CAAC,EAAE,UAAY,CAAC,KAAO,WAAW,YAAc,CAAC,sBAAwB,GAAG,CAAC,EAAE,WAAa,CAAC,KAAO,WAAW,YAAc,CAAC,sBAAwB,GAAG,CAAC,EAAE,WAAa,CAAC,KAAO,WAAW,YAAc,CAAC,sBAAwB,GAAG,CAAC,EAAE,WAAa,CAAC,KAAO,WAAW,YAAc,CAAC,sBAAwB,GAAG,CAAC,EAAE,UAAY,CAAC,KAAO,WAAW,YAAc,CAAC,sBAAwB,GAAG,CAAC,EAAE,WAAa,CAAC,KAAO,WAAW,YAAc,CAAC,sBAAwB,GAAG,CAAC,EAAE,WAAa,CAAC,KAAO,WAAW,YAAc,CAAC,sBAAwB,GAAG,CAAC,EAAE,WAAa,CAAC,KAAO,WAAW,YAAc,CAAC,sBAAwB,GAAG,CAAC,EAAE,UAAY,CAAC,KAAO,WAAW,YAAc,CAAC,sBAAwB,GAAG,CAAC,EAAE,WAAa,CAAC,KAAO,WAAW,YAAc,CAAC,sBAAwB,GAAG,CAAC,EAAE,WAAa,CAAC,KAAO,WAAW,YAAc,CAAC,sBAAwB,GAAG,CAAC,EAAE,mBAAqB,CAAC,KAAO,UAAU,CAAC,CAAC",
  "names": ["richText", "u", "x", "p", "Link", "motion", "richText1", "richText2", "richText3", "richText4", "richText5", "richText6", "richText7", "richText8", "richText9", "richText10", "richText11", "richText12", "richText13", "richText14", "richText15", "richText16", "richText17", "richText18", "richText19", "richText20", "richText21", "richText22", "richText23", "richText24", "richText25", "richText26", "richText27", "richText28", "richText29", "richText30", "richText31", "__FramerMetadata__"]
}
