{
  "version": 3,
  "sources": ["ssg:https://framerusercontent.com/modules/v6qiqVdQy2sNMmWI9NF7/2g1pmlqd8ioOKRQBOKkc/SyBeQVkaI-6.js"],
  "sourcesContent": ["import{jsx as e,jsxs as n}from\"react/jsx-runtime\";import{Link as t}from\"framer\";import{motion as i}from\"framer-motion\";import*as o from\"react\";export const richText=/*#__PURE__*/n(o.Fragment,{children:[/*#__PURE__*/e(\"p\",{children:\"Continuously audit and monitor AWS CloudWatch log group configurations and enforce security compliance as code with Panther.\"}),/*#__PURE__*/e(\"p\",{children:\"CloudWatch Logs enables teams to centralize logs from systems, applications, and AWS services. Use Panther to track real-time changes to your CloudWatch logs to ensure configurations meet your business requirements for security and compliance.\"}),/*#__PURE__*/n(\"p\",{children:[\"Monitoring CloudWatch is critical for understanding the history of log changes and detecting suspicious activity. Use Panther's built in policies for \",/*#__PURE__*/e(t,{href:\"https://github.com/panther-labs/panther-analysis/tree/master/policies/aws_cloudwatch_policies\",motionChild:!0,nodeId:\"SyBeQVkaI\",openInNewTab:!0,scopeId:\"contentManagement\",smoothScroll:!1,children:/*#__PURE__*/e(i.a,{children:\"continuous security monitoring of CloudWatch\"})}),\", or write your own detections in Python to fit your internal business use cases.\"]}),/*#__PURE__*/e(\"h4\",{children:\"Use Cases\"}),/*#__PURE__*/e(\"p\",{children:\"Common security use cases for CloudWatch with Panther include:\"}),/*#__PURE__*/n(\"ul\",{children:[/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/e(\"p\",{children:\"Encrypt logs with a CMK to protect sensitive data\"})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/e(\"p\",{children:\"Adjust the retention policy for each log group.\"})})]}),/*#__PURE__*/e(\"h4\",{children:\"How it Works\"}),/*#__PURE__*/e(\"p\",{children:\"The integration is simple and fast:\"}),/*#__PURE__*/n(\"ul\",{children:[/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/e(\"p\",{children:\"Connect your AWS account to Panther\"})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/e(\"p\",{children:\"A baseline scan is performed to identify all existing CloudWatch's in your account(s)\"})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/e(\"p\",{children:\"Built-in detections identify security issues\"})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/e(\"p\",{children:\"Alerts will be sent if non-compliant CloudWatch's exist\"})})]}),/*#__PURE__*/e(\"p\",{children:\"Use Panther to search CloudWatch in an account by name, view their compliance status, associated policies, and configured remediations.\"}),/*#__PURE__*/e(\"h4\",{children:\"CloudWatch Log Analysis\"}),/*#__PURE__*/n(\"p\",{children:[\"Panther can also collect, normalize, and analyze your CloudWatch events logs to detect suspicious activity in real time. Learn more about using Panther to \",/*#__PURE__*/e(t,{href:\"https://panther.com/integrations/aws/\",motionChild:!0,nodeId:\"SyBeQVkaI\",openInNewTab:!1,scopeId:\"contentManagement\",smoothScroll:!1,children:/*#__PURE__*/e(i.a,{children:\"analyze your AWS logs for security\"})}),\" insights.\"]})]});export const richText1=/*#__PURE__*/n(o.Fragment,{children:[/*#__PURE__*/e(\"p\",{children:\"Continuously audit and monitor AWS CloudFormation stack configurations and enforce security compliance as code with Panther.\"}),/*#__PURE__*/e(\"p\",{children:\"CloudFormation Stack is a collection of AWS resources that you can manage as a single unit. You can create, update, or delete a collection of resources by creating, updating, or deleting stacks. Use Panther to track real-time changes to your CloudFormation to ensure configurations meet your business requirements for security and compliance.\"}),/*#__PURE__*/n(\"p\",{children:[\"Monitoring CloudFormation is critical for understanding the history of resources within your stack and detecting suspicious activity. Use Panther's built in policies for \",/*#__PURE__*/e(t,{href:\"https://github.com/panther-labs/panther-analysis/tree/master/policies/aws_cloudformation_policies\",motionChild:!0,nodeId:\"SyBeQVkaI\",openInNewTab:!0,scopeId:\"contentManagement\",smoothScroll:!1,children:/*#__PURE__*/e(i.a,{children:\"continuous monitoring of CloudFormation stack resources\"})}),\", or write your own detections in Python to fit your internal business use cases.\"]}),/*#__PURE__*/e(\"h4\",{children:\"Use Cases\"}),/*#__PURE__*/e(\"p\",{children:\"Common security use cases for CloudFormation with Panther include:\"}),/*#__PURE__*/n(\"ul\",{children:[/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/e(\"p\",{children:\"Associate IAM roles with CloudFormation stacks that ensure least privilege when making changes to your account.\"})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/e(\"p\",{children:\"Protect a CloudFormation stack from accidentally being deleted.\"})})]}),/*#__PURE__*/e(\"h4\",{children:\"How it Works\"}),/*#__PURE__*/e(\"p\",{children:\"The integration is simple and fast:\"}),/*#__PURE__*/n(\"ul\",{children:[/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/e(\"p\",{children:\"Connect your AWS account to Panther\"})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/e(\"p\",{children:\"A baseline scan is performed to identify all existing CloudFormation stacks in your account(s)\"})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/e(\"p\",{children:\"Built-in detections identify security issues\"})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/e(\"p\",{children:\"Alerts will be sent if non-compliant CloudFormation templates exist\"})})]}),/*#__PURE__*/n(\"p\",{children:[\"Use Panther to search all CloudFormation stacks in an account by name, view their compliance status, associated policies, and configured remediations. Learn more about using Panther to \",/*#__PURE__*/e(t,{href:\"https://panther.com/integrations/aws/\",motionChild:!0,nodeId:\"SyBeQVkaI\",openInNewTab:!1,scopeId:\"contentManagement\",smoothScroll:!1,children:/*#__PURE__*/e(i.a,{children:\"analyze your AWS logs for security insights\"})}),\".\"]})]});export const richText2=/*#__PURE__*/n(o.Fragment,{children:[/*#__PURE__*/e(\"p\",{children:\"Continuously audit and monitor RDS Instance configurations and enforce security compliance as code with Panther.\"}),/*#__PURE__*/e(\"p\",{children:\"Amazon Relational Database Service (RDS) enables developers to create and manage relational databases in the cloud, overcoming some limitations of traditional databases like MySQL. Use Panther to track real-time changes to your RDS to ensure configurations meet your business requirements for security and compliance.\"}),/*#__PURE__*/n(\"p\",{children:[\"Monitoring RDS is critical for understanding the history of database application changes and detecting suspicious activity. Use Panther's built in policies for \",/*#__PURE__*/e(t,{href:\"https://github.com/panther-labs/panther-analysis/tree/master/policies/aws_rds_policies\",motionChild:!0,nodeId:\"SyBeQVkaI\",openInNewTab:!0,scopeId:\"contentManagement\",smoothScroll:!1,children:/*#__PURE__*/e(i.a,{children:\"continuous monitoring of RDS instances\"})}),\", or write your own detections in Python to fit your internal business use cases.\"]}),/*#__PURE__*/e(\"h4\",{children:\"Use Cases\"}),/*#__PURE__*/e(\"p\",{children:\"Common security use cases for RDS with Panther include:\"}),/*#__PURE__*/n(\"ul\",{children:[/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/e(\"p\",{children:\"Check whether RDS instances have encryption enabled\"})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/e(\"p\",{children:\"RDS instances are available via the public internet\"})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/e(\"p\",{children:\"Check if RDS instances have backups enabled.\"})})]}),/*#__PURE__*/e(\"h4\",{children:\"How it Works\"}),/*#__PURE__*/e(\"p\",{children:\"The integration is simple and fast:\"}),/*#__PURE__*/n(\"ul\",{children:[/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/e(\"p\",{children:\"Connect your AWS account to Panther\"})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/e(\"p\",{children:\"A baseline scan is performed to identify all existing RDS in your account(s)\"})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/e(\"p\",{children:\"Built-in detections identify security issues\"})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/e(\"p\",{children:\"Alerts will be sent if non-compliant RDS exist\"})})]}),/*#__PURE__*/n(\"p\",{children:[\"Use Panther to search all RDS in an account by name, view their compliance status, associated policies, and configured remediations. Learn more about using Panther to \",/*#__PURE__*/e(t,{href:\"https://panther.com/integrations/aws/\",motionChild:!0,nodeId:\"SyBeQVkaI\",openInNewTab:!1,scopeId:\"contentManagement\",smoothScroll:!1,children:/*#__PURE__*/e(i.a,{children:\"analyze your AWS logs for security insights\"})}),\".\"]})]});export const richText3=/*#__PURE__*/n(o.Fragment,{children:[/*#__PURE__*/e(\"p\",{children:\"Continuously audit and monitor password policy configurations and enforce security compliance as code with Panther.\"}),/*#__PURE__*/e(\"p\",{children:\"Password policies are set on your AWS accounts to enforce complexity requirements. Use Panther to track real-time changes to your password policies to ensure configurations meet your business requirements for security and compliance.\"}),/*#__PURE__*/n(\"p\",{children:[\"Monitoring password policies is critical to ensure it is compliant with your internal password requirements. Use Panther's built-in policies for \",/*#__PURE__*/e(t,{href:\"https://github.com/panther-labs/panther-analysis/tree/master/policies/aws_iam_policies\",motionChild:!0,nodeId:\"SyBeQVkaI\",openInNewTab:!0,scopeId:\"contentManagement\",smoothScroll:!1,children:/*#__PURE__*/e(i.a,{children:\"continuous monitoring of password policy resources\"})}),\", or write your own detections in Python to fit your internal business use cases.\"]}),/*#__PURE__*/e(\"h4\",{children:\"Use Cases\"}),/*#__PURE__*/e(\"p\",{children:\"Common security use cases for password policy with Panther include:\"}),/*#__PURE__*/n(\"ul\",{children:[/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/e(\"p\",{children:\"Ensure that the account password policy enforces the recommended password complexity requirements.\"})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/e(\"p\",{children:\"Prevents users from reusing previous passwords, and prevents password reuse for 24 or more prior passwords.\"})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/e(\"p\",{children:\"Set and enforce the maximum password age of 90\"})})]}),/*#__PURE__*/e(\"h4\",{children:\"How it Works\"}),/*#__PURE__*/e(\"p\",{children:\"The integration is simple and fast:\"}),/*#__PURE__*/n(\"ul\",{children:[/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/e(\"p\",{children:\"Connect your AWS account to Panther\"})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/e(\"p\",{children:\"A baseline scan is performed to identify all passwords in your account(s)\"})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/e(\"p\",{children:\"Built-in detections identify security issues\"})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/e(\"p\",{children:\"Alerts will be sent if non-compliant passwords exist\"})})]}),/*#__PURE__*/n(\"p\",{children:[\"Use Panther to search all Password policies in an account by name, view their compliance status, associated policies, and configured remediations. Learn more about using Panther to \",/*#__PURE__*/e(t,{href:\"https://panther.com/integrations/aws/\",motionChild:!0,nodeId:\"SyBeQVkaI\",openInNewTab:!1,scopeId:\"contentManagement\",smoothScroll:!1,children:/*#__PURE__*/e(i.a,{children:\"analyze your AWS logs for security insights\"})}),\".\"]})]});export const richText4=/*#__PURE__*/n(o.Fragment,{children:[/*#__PURE__*/e(\"p\",{children:\"Continuously audit and monitor IAM (Identity and Access Management) configurations and enforce security compliance as code with Panther.\"}),/*#__PURE__*/e(\"p\",{children:\"AWS admins manage access to AWS resources in their organization using AWS IAM. IAM provides the ability to create and manage AWS users, groups, and roles-each with their own unique set of privileges and defined access to specific resources. Use Panther to track real-time changes to your IAM to ensure configurations meet your business requirements for security and compliance.\"}),/*#__PURE__*/n(\"p\",{children:[\"Monitoring IAM is critical for understanding the history of control access and detecting suspicious activity. Use Panther's built in policies for \",/*#__PURE__*/e(t,{href:\"https://github.com/panther-labs/panther-analysis/tree/master/policies/aws_iam_policies\",motionChild:!0,nodeId:\"SyBeQVkaI\",openInNewTab:!0,scopeId:\"contentManagement\",smoothScroll:!1,children:/*#__PURE__*/e(i.a,{children:\"continuous monitoring of IAM resources\"})}),\", or write your own detections in Python to fit your internal business use cases.\"]}),/*#__PURE__*/e(\"h4\",{children:\"Use Cases\"}),/*#__PURE__*/e(\"p\",{children:\"Common security use cases for IAM with Panther include:\"}),/*#__PURE__*/n(\"ul\",{children:[/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/e(\"p\",{children:\"Check for IAM policies that are too permissive\"})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/e(\"p\",{children:\"Ensure MFA protocols are enabled for IAM user\"})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/e(\"p\",{children:\"Ensure IAM policy is not assigned directly to a user\"})})]}),/*#__PURE__*/e(\"h4\",{children:\"How it Works\"}),/*#__PURE__*/e(\"p\",{children:\"The integration is simple and fast:\"}),/*#__PURE__*/n(\"ul\",{children:[/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/e(\"p\",{children:\"Connect your AWS account to Panther\"})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/e(\"p\",{children:\"A baseline scan is performed to identify all existing IAMs in your account(s)\"})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/e(\"p\",{children:\"Built-in detections identify security issues\"})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/e(\"p\",{children:\"Alerts will be sent if non-compliant IAMs exist\"})})]}),/*#__PURE__*/n(\"p\",{children:[\"Use Panther to search all IAM User, Root User, Policy, Group, and Role in an account by name, view their compliance status, associated policies, and configured remediations. Learn more about using Panther to \",/*#__PURE__*/e(t,{href:\"https://panther.com/integrations/aws/\",motionChild:!0,nodeId:\"SyBeQVkaI\",openInNewTab:!1,scopeId:\"contentManagement\",smoothScroll:!1,children:/*#__PURE__*/e(i.a,{children:\"analyze your AWS logs for security insights\"})}),\".\"]})]});export const richText5=/*#__PURE__*/n(o.Fragment,{children:[/*#__PURE__*/e(\"p\",{children:\"Continuously audit and monitor KMS key configurations and enforce security compliance as code with Panther.\"}),/*#__PURE__*/e(\"p\",{children:\"AWS KMS is a managed service used to create, store, and control encryption keys to encrypt your data in your applications. Use Panther to track real-time changes to your KMS keys to ensure configurations meet your business requirements for security and compliance.\"}),/*#__PURE__*/n(\"p\",{children:[\"Monitoring KMS is critical for understanding the history of encryption key changes and detecting suspicious activity. Use Panther's built in policies for \",/*#__PURE__*/e(t,{href:\"https://github.com/panther-labs/panther-analysis/tree/master/policies/aws_kms_policies\",motionChild:!0,nodeId:\"SyBeQVkaI\",openInNewTab:!0,scopeId:\"contentManagement\",smoothScroll:!1,children:/*#__PURE__*/e(i.a,{children:\"continuous monitoring of KMS resources\"})}),\", or write your own detections in Python to fit your internal business use cases.\"]}),/*#__PURE__*/e(\"h4\",{children:\"Use Cases\"}),/*#__PURE__*/e(\"p\",{children:\"Common security use cases for KMS Key with Panther include:\"}),/*#__PURE__*/n(\"ul\",{children:[/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/e(\"p\",{children:\"Timely rotation and management of keys\"})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/e(\"p\",{children:\"Use your most sensitive and regulated data without giving applications direct access to your data's encryption keys\"})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/e(\"p\",{children:\"Manage keys and define policies consistently across integrated AWS services and your applications.\"})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/e(\"p\",{children:\"Meet your regulatory and compliance needs\"})})]}),/*#__PURE__*/e(\"h4\",{children:\"How it Works\"}),/*#__PURE__*/e(\"p\",{children:\"The integration is simple and fast:\"}),/*#__PURE__*/n(\"ul\",{children:[/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/e(\"p\",{children:\"Connect your AWS account to Panther\"})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/e(\"p\",{children:\"A baseline scan is performed to identify all existing KMS keys in your account(s)\"})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/e(\"p\",{children:\"Built-in detections identify security issues\"})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/e(\"p\",{children:\"Alerts will be sent if non-compliant KMS exist\"})})]}),/*#__PURE__*/n(\"p\",{children:[\"Use Panther to search all KMS keys in an AWS account by name, view their compliance status, associated policies, and configured remediations. Learn more about using Panther to \",/*#__PURE__*/e(t,{href:\"https://panther.com/integrations/aws/\",motionChild:!0,nodeId:\"SyBeQVkaI\",openInNewTab:!1,scopeId:\"contentManagement\",smoothScroll:!1,children:/*#__PURE__*/e(i.a,{children:\"analyze your AWS logs for security insights\"})}),\".\"]})]});export const richText6=/*#__PURE__*/n(o.Fragment,{children:[/*#__PURE__*/e(\"p\",{children:\"Continuously audit and monitor ECS Cluster configurations and enforce security compliance as code with Panther.\"}),/*#__PURE__*/e(\"p\",{children:\"Amazon ECS offers a logical method to set up or scale a cluster of tasks and services. It's designed as a container management service that manages EC2 clusters and integrates with ELB, VPC, and other AWS services. Use Panther to track real-time changes to your ECS to ensure configurations meet your business requirements for security and compliance.\"}),/*#__PURE__*/e(\"p\",{children:\"Monitoring ECS is critical for understanding the history of ECS environments and detecting suspicious activity. Use Panther's built in policies for continuous monitoring of ECS resources, or write your own detections in Python to fit your internal business use cases.\"}),/*#__PURE__*/e(\"h4\",{children:\"Use Cases\"}),/*#__PURE__*/e(\"p\",{children:\"Common security use cases for ECS Cluster with Panther include:\"}),/*#__PURE__*/n(\"ul\",{children:[/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/e(\"p\",{children:\"Monitor AWS security and compliance information such as user access or infrastructure configurations\"})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/e(\"p\",{children:\"Review cluster-specific information such as CPU reservation or memory reservation\"})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/e(\"p\",{children:\"Identify issues in real-time and monitor AWS performance\"})})]}),/*#__PURE__*/e(\"h4\",{children:\"How it Works\"}),/*#__PURE__*/e(\"p\",{children:\"The integration is simple and fast:\"}),/*#__PURE__*/n(\"ul\",{children:[/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/e(\"p\",{children:\"Connect your AWS account to Panther\"})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/e(\"p\",{children:\"A baseline scan is performed to identify all Elastic Container Services in your account(s)\"})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/e(\"p\",{children:\"Built-in detections identify security issues\"})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/e(\"p\",{children:\"Alerts will be sent if non-compliant ECS exists\"})})]}),/*#__PURE__*/n(\"p\",{children:[\"Use Panther to search all ECS Clusters in an AWS account by name, view their compliance status, associated policies, and configured remediations. Learn more about using Panther to \",/*#__PURE__*/e(t,{href:\"https://panther.com/integrations/aws/\",motionChild:!0,nodeId:\"SyBeQVkaI\",openInNewTab:!1,scopeId:\"contentManagement\",smoothScroll:!1,children:/*#__PURE__*/e(i.a,{children:\"analyze your AWS logs for security insights\"})}),\".\"]})]});export const richText7=/*#__PURE__*/n(o.Fragment,{children:[/*#__PURE__*/e(\"h3\",{children:\"Integration Overview\"}),/*#__PURE__*/e(\"p\",{children:\"OSSEC is an open-source Host-based Intrusion Detection System (HIDS) used for server protection, log analysis, and security monitoring. Panther can collect, normalize, and monitor OSSEC logs to help you identify suspicious activity in real time. Your normalized data is then retained to conduct future security investigations in a serverless data lake powered by Snowflake.\"}),/*#__PURE__*/e(\"h3\",{children:\"Use Cases for OSSEC Logs\"}),/*#__PURE__*/e(\"p\",{children:\"Common security use cases for monitoring OSSEC logs include:\"}),/*#__PURE__*/n(\"ul\",{children:[/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/e(\"p\",{children:\"Monitoring suspicious logs and operational anomalies\"})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/e(\"p\",{children:\"Monitoring syslog data\"})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/e(\"p\",{children:\"Monitoring user activity such as failed logins and other user-related events\"})})]}),/*#__PURE__*/e(\"h3\",{children:\"Onboarding OSSEC Logs in Panther\"}),/*#__PURE__*/e(\"p\",{children:\"Panther's integration for OSSEC is simple and fast to configure, allowing you to onboard logs in just a few minutes. Simply select OSSEC from the list of pre-defined log sources, choose your preferred data transport method, and configure OSSEC to push logs to your data transport source.\"}),/*#__PURE__*/n(\"p\",{children:[\"For more detailed steps on onboarding OSSEC logs or for supported log schema, you can \",/*#__PURE__*/e(t,{href:\"https://docs.panther.com/data-onboarding/supported-logs/ossec\",motionChild:!0,nodeId:\"SyBeQVkaI\",openInNewTab:!0,scopeId:\"contentManagement\",smoothScroll:!1,children:/*#__PURE__*/e(i.a,{children:\"view our OSSEC documentation\"})}),\".\"]}),/*#__PURE__*/e(\"h3\",{children:\"Parsing, Normalizing, & Analyzing OSSEC Logs\"}),/*#__PURE__*/e(\"p\",{children:\"As Panther ingests OSSEC audit logs, they are parsed, normalized, and stored in a Snowflake security data lake. This allows security teams to build detections, identify anomalies, and conduct investigations on logs in the context of days, weeks, or months of data.\"}),/*#__PURE__*/n(\"p\",{children:[\"Panther applies normalization fields to all log records, which standardizes names for attributes and allows users to correlate data across all log sources. Panther's intuitive search features allow you to investigate your normalized logs for suspicious activity or vulnerabilities. For more on searching normalized log data in Panther, \",/*#__PURE__*/e(t,{href:\"https://docs.panther.com/data-analytics\",motionChild:!0,nodeId:\"SyBeQVkaI\",openInNewTab:!0,scopeId:\"contentManagement\",smoothScroll:!1,children:/*#__PURE__*/e(i.a,{children:\"check out our documentation on Investigations & Search\"})}),\".\"]}),/*#__PURE__*/e(\"h3\",{children:\"Powerful Detection-as-Code\"}),/*#__PURE__*/n(\"p\",{children:[\"A number of pre-built detections are available by default in Panther, offering users immediate value for monitoring common IoCs and threats. You can \",/*#__PURE__*/e(t,{href:\"https://panther.com/product/detection-coverage/#filter=ossec\",motionChild:!0,nodeId:\"SyBeQVkaI\",openInNewTab:!1,scopeId:\"contentManagement\",smoothScroll:!1,children:/*#__PURE__*/e(i.a,{children:\" explore our built-in detection coverage for OSSEC logs here\"})}),\".\"]}),/*#__PURE__*/e(\"p\",{children:\"With Panther, your team won't be confined to restrictive detection rules as seen in many SIEM platforms. Panther is built with detection-as-code principles, giving you the ability to write Python to define detection logic and to integrate external systems like version control and CI/CD pipelines into your detection engineering processes. This results in powerful, flexible, and reusable scripting of detection logic for your security team.\"}),/*#__PURE__*/e(\"h3\",{children:\"Configuring Alerts\"}),/*#__PURE__*/n(\"p\",{children:[\"Panther fires alerts when your detection rules or policies are triggered, and integrates with a variety of \",/*#__PURE__*/e(t,{href:\"https://panther.com/integrations/alerts/\",motionChild:!0,nodeId:\"SyBeQVkaI\",openInNewTab:!1,scopeId:\"contentManagement\",smoothScroll:!1,children:/*#__PURE__*/e(i.a,{children:\" alert destinations\"})}),\" to allow for easy access and management of alerts for your security team. Alerts can also be sent to alert context or SOAR platforms for more remediation options.\"]}),/*#__PURE__*/e(\"p\",{children:\"Alerts are categorized by different severity levels: Info, Low, Medium, High, and Critical. Security teams have the options to dynamically assign severity based on specific log event attributes.\"}),/*#__PURE__*/e(\"h3\",{children:\"Customer Support\"}),/*#__PURE__*/e(\"p\",{children:\"If you have any questions about configuring or monitoring OSSEC logs in Panther, we're here to help. All customers have access to our technical support team via a dedicated Slack channel, email, or in-app messenger.\"}),/*#__PURE__*/n(\"p\",{children:[\"You can view our \",/*#__PURE__*/e(t,{href:\"https://docs.panther.com/data-onboarding/supported-logs/ossec\",motionChild:!0,nodeId:\"SyBeQVkaI\",openInNewTab:!0,scopeId:\"contentManagement\",smoothScroll:!1,children:/*#__PURE__*/e(i.a,{children:\"detailed documentation on configuring and monitoring OSSEC logs here\"})}),\", or customers can sign up for \",/*#__PURE__*/e(t,{href:\"https://pnthr.io/community\",motionChild:!0,nodeId:\"SyBeQVkaI\",openInNewTab:!0,scopeId:\"contentManagement\",smoothScroll:!1,children:/*#__PURE__*/e(i.a,{children:\"the Panther Community\"})}),\" to share best practices or custom detections for monitoring OSSEC.\"]}),/*#__PURE__*/e(\"h3\",{children:\"Replacing Traditional SIEM for OSSEC Log Monitoring\"}),/*#__PURE__*/e(\"p\",{children:\"With Panther, you don't have to struggle with rigid detection logic, waste time and effort on operational overhead, or pay skyrocketing costs to keep up with the growth of cloud app data. Panther was founded by a team of veteran security practitioners who struggled with legacy SIEM challenges first-hand, and built an intuitive, cloud-native platform to solve them.\"}),/*#__PURE__*/n(\"p\",{children:[\"Panther is a cloud-native SIEM built for security operations at scale, offering powerful detection-as-code, intuitive security workflows, and actionable real-time alerts to keep up with the needs of today's security teams. For a powerful, flexible, and scalable SIEM solution for OSSEC, \",/*#__PURE__*/e(t,{href:\"https://panther.com/product/request-a-demo/\",motionChild:!0,nodeId:\"SyBeQVkaI\",openInNewTab:!1,scopeId:\"contentManagement\",smoothScroll:!1,children:/*#__PURE__*/e(i.a,{children:\" request a demo today\"})}),\".\"]})]});export const richText8=/*#__PURE__*/n(o.Fragment,{children:[/*#__PURE__*/e(\"p\",{children:\"Enable your team's security management pipeline with Panther's Asana integration and send alerts to Asana.\"}),/*#__PURE__*/e(\"p\",{children:\"When your detections are triggered, Panther will create an issue in Asana. Your team can then analyze the issue, assign ownership to the proper team, and remediate the vulnerability.\"}),/*#__PURE__*/e(\"h4\",{children:\"How it Works\"}),/*#__PURE__*/n(\"ul\",{children:[/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/n(\"p\",{children:[\"Set up a new \",/*#__PURE__*/e(t,{href:\"https://docs.panther.com/destinations/asana\",motionChild:!0,nodeId:\"SyBeQVkaI\",openInNewTab:!1,scopeId:\"contentManagement\",smoothScroll:!1,children:/*#__PURE__*/e(i.a,{children:\"Asana token\"})}),\" linked to one or more Asana Projects\"]})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/e(\"p\",{children:\"Configure Asana as a Destination in Panther\"})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/e(\"p\",{children:\"Trigger an alert based on issue severity, or configure specific detections to use this as a destination\"})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/e(\"p\",{children:\"Sit back and monitor your activity!\"})})]}),/*#__PURE__*/n(\"p\",{children:[\"Learn how to \",/*#__PURE__*/e(t,{href:\"https://docs.panther.com/destinations/asana\",motionChild:!0,nodeId:\"SyBeQVkaI\",openInNewTab:!1,scopeId:\"contentManagement\",smoothScroll:!1,children:/*#__PURE__*/e(i.a,{children:\"configure Asana\"})}),\" as an alert destination in Panther.\"]})]});export const richText9=/*#__PURE__*/n(o.Fragment,{children:[/*#__PURE__*/e(\"p\",{children:\"Enable your team's security management pipeline with Panther's OpsGenie integration by sending Panther alerts to OpsGenie.\"}),/*#__PURE__*/e(\"p\",{children:\"When your detections are triggered, Panther will send an alert to OpsGenie. Your team can then analyze the alert, begin an investigation, or remediate the vulnerability.\"}),/*#__PURE__*/e(\"p\",{children:\"OpsGenie is an ideal destination for high and critical severity issues that require immediate action. With OpsGenie, you can review incident timelines, pertinent notes, and gain more control over your team's response.\"}),/*#__PURE__*/e(\"h4\",{children:\"How it Works\"}),/*#__PURE__*/n(\"ul\",{children:[/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/n(\"p\",{children:[\"Set up a \",/*#__PURE__*/e(t,{href:\"https://docs.panther.com/destinations/opsgenie\",motionChild:!0,nodeId:\"SyBeQVkaI\",openInNewTab:!1,scopeId:\"contentManagement\",smoothScroll:!1,children:/*#__PURE__*/e(i.a,{children:\"new API Key\"})}),\" linked to a specific team (like Panther Alerts)\"]})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/e(\"p\",{children:\"Configure OpsGenie as a Destination in Panther\"})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/e(\"p\",{children:\"Configure a specific rule to use this new destination, or rely on the default mapping based on severity\"})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/e(\"p\",{children:\"Sit back and monitor your activity!\"})})]}),/*#__PURE__*/n(\"p\",{children:[\"Learn how to \",/*#__PURE__*/e(t,{href:\"https://docs.panther.com/destinations/opsgenie\",motionChild:!0,nodeId:\"SyBeQVkaI\",openInNewTab:!1,scopeId:\"contentManagement\",smoothScroll:!1,children:/*#__PURE__*/e(i.a,{children:\"configure OpsGenie\"})}),\" as an alert destination in Panther.\"]})]});export const richText10=/*#__PURE__*/n(o.Fragment,{children:[/*#__PURE__*/e(\"p\",{children:\"Enable your team's security alerting pipeline with Panther's Jira integration by sending alerts to Jira.\"}),/*#__PURE__*/e(\"p\",{children:\"When your detections are triggered, Panther will create an issue in Jira. Your team can then analyze the issue, assign it to the proper owner, and begin an investigation.\"}),/*#__PURE__*/e(\"p\",{children:\"Using Jira, teams can track the progress of issues and streamline remediation workflows.\"}),/*#__PURE__*/e(\"h4\",{children:\"How it Works\"}),/*#__PURE__*/n(\"ul\",{children:[/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/n(\"p\",{children:[\"Set up a new \",/*#__PURE__*/e(t,{href:\"https://docs.panther.com/destinations/jira\",motionChild:!0,nodeId:\"SyBeQVkaI\",openInNewTab:!1,scopeId:\"contentManagement\",smoothScroll:!1,children:/*#__PURE__*/e(i.a,{children:\"Jira API Key\"})}),\" linked to a task, created and assigned to a specified assignee in a specified project\"]})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/e(\"p\",{children:\"Configure Jira as a Destination in Panther\"})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/e(\"p\",{children:\"Configure a specific rule to use this new destination, or rely on the default mapping based on severity\"})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/e(\"p\",{children:\"Sit back and monitor your activity!\"})})]}),/*#__PURE__*/n(\"p\",{children:[\"Learn how to \",/*#__PURE__*/e(t,{href:\"https://docs.panther.com/destinations/jira\",motionChild:!0,nodeId:\"SyBeQVkaI\",openInNewTab:!1,scopeId:\"contentManagement\",smoothScroll:!1,children:/*#__PURE__*/e(i.a,{children:\"configure Jira\"})}),\" as an alert destination in Panther.\"]})]});export const richText11=/*#__PURE__*/n(o.Fragment,{children:[/*#__PURE__*/e(\"p\",{children:\"Enable your team's security alerting pipeline with Panther's Slack integration.\"}),/*#__PURE__*/e(\"p\",{children:\"When your detections are triggered, Panther will send an alert to the Slack channel of your choice. Your team can then analyze the alert, begin an investigation, or mark the alert as resolved.\"}),/*#__PURE__*/e(\"p\",{children:\"Slack is frequently used for low severity or informational alerts that don't require immediate action. Power up your workflow by coupling Slack with a ticketing or incident management solution like Jira or PagerDuty for high severity alerts.\"}),/*#__PURE__*/e(\"h4\",{children:\"How it Works\"}),/*#__PURE__*/n(\"ul\",{children:[/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/n(\"p\",{children:[\"Set up a new \",/*#__PURE__*/e(t,{href:\"https://docs.panther.com/destinations/slack\",motionChild:!0,nodeId:\"SyBeQVkaI\",openInNewTab:!1,scopeId:\"contentManagement\",smoothScroll:!1,children:/*#__PURE__*/e(i.a,{children:\"Slack token\"})}),\" linked to a specific channel (like #alerts)\"]})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/e(\"p\",{children:\"Configure Slack as a Destination in Panther\"})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/e(\"p\",{children:\"Trigger alerts based on issue severity, or configure specific detections to use this as an alert destination\"})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/e(\"p\",{children:\"Sit back and monitor the activity!\"})})]}),/*#__PURE__*/n(\"p\",{children:[\"Learn how to \",/*#__PURE__*/e(t,{href:\"https://docs.panther.com/destinations/slack\",motionChild:!0,nodeId:\"SyBeQVkaI\",openInNewTab:!1,scopeId:\"contentManagement\",smoothScroll:!1,children:/*#__PURE__*/e(i.a,{children:\"configure Slack\"})}),\" as an alert destination in Panther.\"]})]});export const richText12=/*#__PURE__*/n(o.Fragment,{children:[/*#__PURE__*/e(\"p\",{children:\"Enable your team's security alerting pipeline with Panther's GitHub integration by sending alerts to GitHub.\"}),/*#__PURE__*/e(\"p\",{children:\"When your detections are triggered, Panther will create an issue in GitHub. Your team can then analyze the issue, assign it to the proper owner, and remediate the vulnerability.\"}),/*#__PURE__*/e(\"h4\",{children:\"How it Works\"}),/*#__PURE__*/n(\"ul\",{children:[/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/n(\"p\",{children:[\"Set up a new \",/*#__PURE__*/e(t,{href:\"https://docs.panther.com/destinations/github\",motionChild:!0,nodeId:\"SyBeQVkaI\",openInNewTab:!1,scopeId:\"contentManagement\",smoothScroll:!1,children:/*#__PURE__*/e(i.a,{children:\"GitHub token\"})}),\" linked to a specific repository\"]})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/e(\"p\",{children:\"Configure GitHub as a Destination in Panther\"})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/e(\"p\",{children:\"Trigger an alert based on issue severity, or configure specific detections to use this as a destination\"})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/e(\"p\",{children:\"Sit back and monitor your activity!\"})})]}),/*#__PURE__*/n(\"p\",{children:[\"Learn how to \",/*#__PURE__*/e(t,{href:\"https://docs.panther.com/destinations/github\",motionChild:!0,nodeId:\"SyBeQVkaI\",openInNewTab:!1,scopeId:\"contentManagement\",smoothScroll:!1,children:/*#__PURE__*/e(i.a,{children:\"configure GitHub\"})}),\" as an alert destination in Panther.\"]})]});export const richText13=/*#__PURE__*/n(o.Fragment,{children:[/*#__PURE__*/e(\"p\",{children:\"Enable your team's incident alerting pipeline with Panther's SQS integration by sending alerts to SQS.\"}),/*#__PURE__*/e(\"p\",{children:\"When your detections are triggered, Panther will send informational alerts to SQS. Your team can then analyze the notification and begin an investigation if needed.\"}),/*#__PURE__*/e(\"h4\",{children:\"How it Works\"}),/*#__PURE__*/n(\"ul\",{children:[/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/n(\"p\",{children:[\"Set up a new or existing \",/*#__PURE__*/e(t,{href:\"https://docs.panther.com/destinations/sqs\",motionChild:!0,nodeId:\"SyBeQVkaI\",openInNewTab:!1,scopeId:\"contentManagement\",smoothScroll:!1,children:/*#__PURE__*/e(i.a,{children:\"SQS Queue \"})})]})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/e(\"p\",{children:\"Configure SQS as a Destination in Panther\"})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/e(\"p\",{children:\"Configure a specific rule to use this new destination, or rely on the default mapping based on severity\"})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/e(\"p\",{children:\"Sit back and monitor your activity!\"})})]}),/*#__PURE__*/n(\"p\",{children:[\"Learn how to \",/*#__PURE__*/e(t,{href:\"https://docs.panther.com/destinations/sqs\",motionChild:!0,nodeId:\"SyBeQVkaI\",openInNewTab:!1,scopeId:\"contentManagement\",smoothScroll:!1,children:/*#__PURE__*/e(i.a,{children:\"configure SQS\"})}),\" as an alert destination in Panther.\"]})]});export const richText14=/*#__PURE__*/n(o.Fragment,{children:[/*#__PURE__*/e(\"p\",{children:\"Enable your team's security alerting pipeline with Panther's Microsoft Teams integration.\"}),/*#__PURE__*/e(\"p\",{children:\"When your detections are triggered, Panther will send an alert to the MS Teams channel of your choice. Your team can then analyze the alert, begin an investigation, or mark the alert as resolved.\"}),/*#__PURE__*/e(\"p\",{children:\"MS Teams is frequently used for low severity or informational alerts that do not require immediate action. Power up your workflow by coupling MS Teams with a ticketing or incident management solution like Jira or PagerDuty for high severity alerts.\"}),/*#__PURE__*/e(\"h4\",{children:\"How it Works\"}),/*#__PURE__*/n(\"ul\",{children:[/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/n(\"p\",{children:[\"Set up a new \",/*#__PURE__*/e(t,{href:\"https://docs.panther.com/destinations/microsoft-teams\",motionChild:!0,nodeId:\"SyBeQVkaI\",openInNewTab:!1,scopeId:\"contentManagement\",smoothScroll:!1,children:/*#__PURE__*/e(i.a,{children:\"MS Teams Webhook URL\"})}),\" linked to a specific team (e.g., Panther Alerts)\"]})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/e(\"p\",{children:\"Configure MS Teams as a Destination in Panther\"})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/e(\"p\",{children:\"Configure a specific rule to use this new destination, or rely on the default mapping based on severity\"})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/e(\"p\",{children:\"Sit back and monitor your activity!\"})})]}),/*#__PURE__*/n(\"p\",{children:[\"Learn how to \",/*#__PURE__*/e(t,{href:\"https://docs.panther.com/destinations/microsoft-teams\",motionChild:!0,nodeId:\"SyBeQVkaI\",openInNewTab:!1,scopeId:\"contentManagement\",smoothScroll:!1,children:/*#__PURE__*/e(i.a,{children:\"configure Microsoft Teams\"})}),\" as an alert destination in Panther.\"]})]});export const richText15=/*#__PURE__*/n(o.Fragment,{children:[/*#__PURE__*/e(\"h3\",{children:\"Integration Overview\"}),/*#__PURE__*/e(\"p\",{children:\"Nginx provides open-source solutions for web serving, caching, load balancing, application delivery, reverse proxying, and other web tasks. Panther can collect, normalize, and monitor Nginx access logs to help you identify suspicious activity in real time. Your normalized Nginx data is then retained to conduct future security investigations in a serverless data lake powered by Snowflake.\"}),/*#__PURE__*/e(\"h3\",{children:\"Use Cases for Nginx Logs\"}),/*#__PURE__*/n(\"p\",{children:[\"The \",/*#__PURE__*/e(t,{href:\"https://docs.nginx.com/nginx/admin-guide/monitoring/logging/#setting-up-the-access-log\",motionChild:!0,nodeId:\"SyBeQVkaI\",openInNewTab:!0,scopeId:\"contentManagement\",smoothScroll:!1,children:/*#__PURE__*/e(i.a,{children:\"Nginx access log\"})}),\" records client requests and provides an audit trail to help users understand web activity. Common security use cases for monitoring Nginx access logs include:\"]}),/*#__PURE__*/n(\"ul\",{children:[/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/e(\"p\",{children:\"Understanding and analyzing the performance of your Nginx server\"})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/e(\"p\",{children:\"Tracking and analyzing user behaviors such as visits or logins\"})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/e(\"p\",{children:\"Troubleshooting server failures and redirects in your code\"})})]}),/*#__PURE__*/e(\"h3\",{children:\"Onboarding Nginx with Panther\"}),/*#__PURE__*/e(\"p\",{children:\"Panther's integration for Nginx is easy and fast to configure, allowing you to onboard access logs in just a few minutes. Simply select Nginx from the list of pre-defined log sources, select your preferred data transport method, and configure Nginx to push logs to your data transport source.\"}),/*#__PURE__*/n(\"p\",{children:[\"For more detailed steps on onboarding Nginx logs or for supported log schema, you can \",/*#__PURE__*/e(t,{href:\"https://docs.panther.com/data-onboarding/supported-logs/nginx\",motionChild:!0,nodeId:\"SyBeQVkaI\",openInNewTab:!0,scopeId:\"contentManagement\",smoothScroll:!1,children:/*#__PURE__*/e(i.a,{children:\"view our Nginx documentation here\"})}),\".\"]}),/*#__PURE__*/e(\"h3\",{children:\"Parsing, Normalizing, & Analyzing Nginx Logs\"}),/*#__PURE__*/e(\"p\",{children:\"As Panther ingests Nginx logs, they are parsed, normalized, and stored in a Snowflake security data lake. This allows your security team to write detections, identify anomalies, and conduct investigations on logs in the context of days, weeks, or months of data.\"}),/*#__PURE__*/n(\"p\",{children:[\"Panther applies normalization fields to all log records, which standardizes names for attributes and allows users to correlate data across all log sources - not just Nginx. Panther's search tools - Data Explorer, Indicator Search, and Query Builder - allow you to investigate your normalized logs for suspicious activity or vulnerabilities. For more on querying and searching normalized log data in Panther, \",/*#__PURE__*/e(t,{href:\"https://docs.panther.com/data-analytics\",motionChild:!0,nodeId:\"SyBeQVkaI\",openInNewTab:!0,scopeId:\"contentManagement\",smoothScroll:!1,children:/*#__PURE__*/e(i.a,{children:\"read our documentation on Investigations & Search\"})}),\".\"]}),/*#__PURE__*/e(\"h3\",{children:\"Built-In & Easily Customizable Detections\"}),/*#__PURE__*/n(\"p\",{children:[\"A number of pre-built detections are available in Panther, which provide immediate value for monitoring common IoCs and threats. You can \",/*#__PURE__*/e(t,{href:\"https://panther.com/product/detection-coverage/#filter=nginx\",motionChild:!0,nodeId:\"SyBeQVkaI\",openInNewTab:!1,scopeId:\"contentManagement\",smoothScroll:!1,children:/*#__PURE__*/e(i.a,{children:\" explore our built-in detection coverage for Nginx access logs here\"})}),\".\"]}),/*#__PURE__*/e(\"p\",{children:\"With Panther, your team won't be confined to rigid detection logic as seen in many SIEM platforms. Panther is architected around detection-as-code principles, granting you the ability to write Python to define detections and to integrate external systems like version control and CI/CD pipelines into your detection engineering processes. This results in powerful, flexible, and reusable scripting of detection logic for your team.\"}),/*#__PURE__*/e(\"h3\",{children:\"Configuring Alerts\"}),/*#__PURE__*/n(\"p\",{children:[\"Panther fires alerts when your detection rules or policies are triggered, and offers a variety of \",/*#__PURE__*/e(t,{href:\"https://panther.com/integrations/alerts/\",motionChild:!0,nodeId:\"SyBeQVkaI\",openInNewTab:!1,scopeId:\"contentManagement\",smoothScroll:!1,children:/*#__PURE__*/e(i.a,{children:\" alert destination \"})}),\" integrations to allow for easy access and management of alerts for your security team. Alerts can also be sent to SOAR or alert context platforms for more remediation options.\"]}),/*#__PURE__*/e(\"p\",{children:\"Alerts are categorized by five different severity levels: Info, Low, Medium, High, and Critical. Your security team can dynamically assign severity based on specific log event attributes.\"}),/*#__PURE__*/e(\"h3\",{children:\"Customer Support\"}),/*#__PURE__*/e(\"p\",{children:\"If you have any questions about configuring or monitoring Nginx logs in Panther, we're here to help. All customers have access to our technical support team via a dedicated Slack channel, email, or in-app messenger.\"}),/*#__PURE__*/n(\"p\",{children:[\"You can view our \",/*#__PURE__*/e(t,{href:\"https://docs.panther.com/data-onboarding/supported-logs/nginx\",motionChild:!0,nodeId:\"SyBeQVkaI\",openInNewTab:!0,scopeId:\"contentManagement\",smoothScroll:!1,children:/*#__PURE__*/e(i.a,{children:\"documentation on configuring and monitoring Nginx logs here\"})}),\", or customers can join \",/*#__PURE__*/e(t,{href:\"https://pnthr.io/community\",motionChild:!0,nodeId:\"SyBeQVkaI\",openInNewTab:!0,scopeId:\"contentManagement\",smoothScroll:!1,children:/*#__PURE__*/e(i.a,{children:\"the Panther Community\"})}),\" to share best practices or custom detections for monitoring Nginx.\"]}),/*#__PURE__*/e(\"h3\",{children:\"Replacing Traditional SIEM for Nginx Log Monitoring\"}),/*#__PURE__*/e(\"p\",{children:\"With Panther, you don't have to waste time and effort on operational overhead, accept limitations with SIEM detections, or pay skyrocketing costs to keep up with the growth of cloud data. Panther was founded by a team of veteran security practitioners who struggled with traditional SIEM challenges first-hand, and built an intuitive, cloud-native platform to solve them.\"}),/*#__PURE__*/n(\"p\",{children:[\"Panther is a cloud-native SIEM built for security operations at scale, offering powerful detection-as-code, intuitive security workflows, and actionable real-time alerts to keep up with the needs of today's security teams. For a powerful, flexible, and scalable SIEM solution for Nginx, \",/*#__PURE__*/e(t,{href:\"https://panther.com/product/request-a-demo/\",motionChild:!0,nodeId:\"SyBeQVkaI\",openInNewTab:!1,scopeId:\"contentManagement\",smoothScroll:!1,children:/*#__PURE__*/e(i.a,{children:\" request a demo today\"})}),\".\"]})]});export const richText16=/*#__PURE__*/n(o.Fragment,{children:[/*#__PURE__*/e(\"h3\",{children:\"Integration Overview\"}),/*#__PURE__*/e(\"p\",{children:\"Osquery is an operating system instrumentation framework that enables analytics, monitoring, and exploration of operating system data. Panther can collect, normalize, and monitor Osquery logs to help you identify suspicious operating system activity in real time. Your normalized data is then retained to enable future security investigations in a serverless data lake powered by Snowflake.\"}),/*#__PURE__*/e(\"h3\",{children:\"Use Cases for Osquery Logs\"}),/*#__PURE__*/n(\"p\",{children:[\"Panther supports four types of \",/*#__PURE__*/e(t,{href:\"https://osquery.readthedocs.io/en/stable/deployment/logging/\",motionChild:!0,nodeId:\"SyBeQVkaI\",openInNewTab:!0,scopeId:\"contentManagement\",smoothScroll:!1,children:/*#__PURE__*/e(i.a,{children:\"Osquery logs\"})}),\": Osquery.Batch, Osquery.Differential, Osquery.Snapshot, and Osquery.System. Common security use cases for monitoring Osquery logs include:\"]}),/*#__PURE__*/n(\"ul\",{children:[/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/e(\"p\",{children:\"Track activity in your installed programs, running processes, network connections, or system logs\"})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/e(\"p\",{children:\"Monitor user activity such as failed logins and other user-related events\"})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/e(\"p\",{children:\"Monitor for Chrome extensions that could lead to a credential compromise\"})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/e(\"p\",{children:\"Monitor listening ports on a production Linux host\"})})]}),/*#__PURE__*/e(\"h3\",{children:\"Onboarding Osquery with Panther\"}),/*#__PURE__*/e(\"p\",{children:\"Panther's integration for Osquery is simple and quick to configure, allowing you to onboard your logs in just a few minutes. Simply select Osquery from the list of pre-defined log sources, select your preferred data transport method, and configure Osquery to push logs to your data transport source.\"}),/*#__PURE__*/n(\"p\",{children:[\"For more details on onboarding Osquery logs or for supported log schema, you can \",/*#__PURE__*/e(t,{href:\"https://docs.panther.com/data-onboarding/supported-logs/osquery\",motionChild:!0,nodeId:\"SyBeQVkaI\",openInNewTab:!0,scopeId:\"contentManagement\",smoothScroll:!1,children:/*#__PURE__*/e(i.a,{children:\"view our Osquery documentation here\"})}),\".\"]}),/*#__PURE__*/e(\"h3\",{children:\"Parsing, Normalizing, & Analyzing Osquery Logs\"}),/*#__PURE__*/e(\"p\",{children:\"As Panther ingests your Osquery logs, they are parsed, normalized, and stored in a Snowflake security data lake. This allows your security team to build detections, identify anomalies, and conduct investigations on Osquery logs using days, weeks, or months of data.\"}),/*#__PURE__*/n(\"p\",{children:[\"Panther applies normalization fields to all log records, which standardizes names for attributes and allows you to correlate data across all log sources. You can use Panther\u201A\\xc4\\xf4s intuitive search features to investigate your normalized Osquery logs for suspicious activity or vulnerabilities. For more on querying and searching normalized log data in Panther, \",/*#__PURE__*/e(t,{href:\"https://docs.panther.com/data-analytics\",motionChild:!0,nodeId:\"SyBeQVkaI\",openInNewTab:!0,scopeId:\"contentManagement\",smoothScroll:!1,children:/*#__PURE__*/e(i.a,{children:\"check out our documentation on Investigations & Search\"})}),\".\"]}),/*#__PURE__*/e(\"h3\",{children:\"Detection as Code\"}),/*#__PURE__*/e(\"p\",{children:\"With Panther, your team won't be confined to restrictive detection rules as seen in many SIEMs. Panther is built around detection-as-code principles, giving you the ability to write Python to define detection logic and to integrate systems like CI/CD pipelines into your detection engineering processes. This results in powerful, flexible, and reusable scripting of detection logic for your team.\"}),/*#__PURE__*/n(\"p\",{children:[\"A number of pre-built detections are available by default in Panther, offering users immediate value for monitoring common IoCs and threats. You can \",/*#__PURE__*/e(t,{href:\"https://panther.com/product/detection-coverage/#filter=osquery\",motionChild:!0,nodeId:\"SyBeQVkaI\",openInNewTab:!1,scopeId:\"contentManagement\",smoothScroll:!1,children:/*#__PURE__*/e(i.a,{children:\" explore our built-in detection coverage for Osquery logs here\"})}),\".\"]}),/*#__PURE__*/e(\"h3\",{children:\"Configuring Alerts\"}),/*#__PURE__*/n(\"p\",{children:[\"Panther fire alerts when your detection rules or policies are triggered, and integrates with a variety of \",/*#__PURE__*/e(t,{href:\"https://panther.com/integrations/alerts/\",motionChild:!0,nodeId:\"SyBeQVkaI\",openInNewTab:!1,scopeId:\"contentManagement\",smoothScroll:!1,children:/*#__PURE__*/e(i.a,{children:\" alert destinations\"})}),\" to allow for easy access and management of alerts for your security team. Alerts can also be sent to task management or SOAR platforms for more remediation options.\"]}),/*#__PURE__*/e(\"p\",{children:\"Alerts are categorized by five different severity levels: Info, Low, Medium, High, and Critical. Security teams have the options to dynamically designate severity based on specific log event attributes.\"}),/*#__PURE__*/e(\"h3\",{children:\"Customer Support\"}),/*#__PURE__*/e(\"p\",{children:\"If you have any questions about ingesting or monitoring Osquery logs in Panther, we're here to help. All customers have access to our technical support team via a dedicated Slack channel, email, or in-app messenger.\"}),/*#__PURE__*/n(\"p\",{children:[\"You can view our \",/*#__PURE__*/e(t,{href:\"https://docs.panther.com/data-onboarding/supported-logs/osquery\",motionChild:!0,nodeId:\"SyBeQVkaI\",openInNewTab:!0,scopeId:\"contentManagement\",smoothScroll:!1,children:/*#__PURE__*/e(i.a,{children:\"detailed documentation on configuring and monitoring Osquery logs here\"})}),\", or customers can join \",/*#__PURE__*/e(t,{href:\"https://pnthr.io/community\",motionChild:!0,nodeId:\"SyBeQVkaI\",openInNewTab:!0,scopeId:\"contentManagement\",smoothScroll:!1,children:/*#__PURE__*/e(i.a,{children:\"the Panther Community\"})}),\" to share best practices or custom detections for monitoring Osquery.\"]}),/*#__PURE__*/e(\"h3\",{children:\"Replacing Traditional SIEM for Osquery Log Monitoring\"}),/*#__PURE__*/e(\"p\",{children:\"With Panther, you don't have to waste precious time and effort on operational overhead, accept limitations with SIEM detections, or pay skyrocketing costs to keep up with the growth of your data. Panther was founded by a team of veteran security practitioners who struggled with legacy SIEM challenges first-hand, and built a scalable, cloud-native platform to solve them.\"}),/*#__PURE__*/n(\"p\",{children:[\"Panther is a cloud-native SIEM built for security operations at scale, offering powerful detection-as-code, intuitive security workflows, and actionable real-time alerts to keep up with the needs of today's security teams. For a powerful, practical, and scalable SIEM solution for Osquery, \",/*#__PURE__*/e(t,{href:\"https://panther.com/product/request-a-demo/\",motionChild:!0,nodeId:\"SyBeQVkaI\",openInNewTab:!1,scopeId:\"contentManagement\",smoothScroll:!1,children:/*#__PURE__*/e(i.a,{children:\" request a demo today\"})}),\".\"]})]});\nexport const __FramerMetadata__ = {\"exports\":{\"richText3\":{\"type\":\"variable\",\"annotations\":{\"framerContractVersion\":\"1\"}},\"richText1\":{\"type\":\"variable\",\"annotations\":{\"framerContractVersion\":\"1\"}},\"richText2\":{\"type\":\"variable\",\"annotations\":{\"framerContractVersion\":\"1\"}},\"richText16\":{\"type\":\"variable\",\"annotations\":{\"framerContractVersion\":\"1\"}},\"richText15\":{\"type\":\"variable\",\"annotations\":{\"framerContractVersion\":\"1\"}},\"richText8\":{\"type\":\"variable\",\"annotations\":{\"framerContractVersion\":\"1\"}},\"richText5\":{\"type\":\"variable\",\"annotations\":{\"framerContractVersion\":\"1\"}},\"richText12\":{\"type\":\"variable\",\"annotations\":{\"framerContractVersion\":\"1\"}},\"richText14\":{\"type\":\"variable\",\"annotations\":{\"framerContractVersion\":\"1\"}},\"richText\":{\"type\":\"variable\",\"annotations\":{\"framerContractVersion\":\"1\"}},\"richText10\":{\"type\":\"variable\",\"annotations\":{\"framerContractVersion\":\"1\"}},\"richText4\":{\"type\":\"variable\",\"annotations\":{\"framerContractVersion\":\"1\"}},\"richText7\":{\"type\":\"variable\",\"annotations\":{\"framerContractVersion\":\"1\"}},\"richText13\":{\"type\":\"variable\",\"annotations\":{\"framerContractVersion\":\"1\"}},\"richText9\":{\"type\":\"variable\",\"annotations\":{\"framerContractVersion\":\"1\"}},\"richText11\":{\"type\":\"variable\",\"annotations\":{\"framerContractVersion\":\"1\"}},\"richText6\":{\"type\":\"variable\",\"annotations\":{\"framerContractVersion\":\"1\"}},\"__FramerMetadata__\":{\"type\":\"variable\"}}}"],
  "mappings": "+LAAsJ,IAAMA,EAAsBC,EAAIC,EAAS,CAAC,SAAS,CAAcC,EAAE,IAAI,CAAC,SAAS,8HAA8H,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,qPAAqP,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,CAAC,yJAAsKE,EAAEC,EAAE,CAAC,KAAK,gGAAgG,YAAY,GAAG,OAAO,YAAY,aAAa,GAAG,QAAQ,oBAAoB,aAAa,GAAG,SAAsBD,EAAEE,EAAE,EAAE,CAAC,SAAS,8CAA8C,CAAC,CAAC,CAAC,EAAE,mFAAmF,CAAC,CAAC,EAAeF,EAAE,KAAK,CAAC,SAAS,WAAW,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,gEAAgE,CAAC,EAAeF,EAAE,KAAK,CAAC,SAAS,CAAcE,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBA,EAAE,IAAI,CAAC,SAAS,mDAAmD,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBA,EAAE,IAAI,CAAC,SAAS,iDAAiD,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,cAAc,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,qCAAqC,CAAC,EAAeF,EAAE,KAAK,CAAC,SAAS,CAAcE,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBA,EAAE,IAAI,CAAC,SAAS,qCAAqC,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBA,EAAE,IAAI,CAAC,SAAS,uFAAuF,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBA,EAAE,IAAI,CAAC,SAAS,8CAA8C,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBA,EAAE,IAAI,CAAC,SAAS,yDAAyD,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,yIAAyI,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,yBAAyB,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,CAAC,8JAA2KE,EAAEC,EAAE,CAAC,KAAK,wCAAwC,YAAY,GAAG,OAAO,YAAY,aAAa,GAAG,QAAQ,oBAAoB,aAAa,GAAG,SAAsBD,EAAEE,EAAE,EAAE,CAAC,SAAS,oCAAoC,CAAC,CAAC,CAAC,EAAE,YAAY,CAAC,CAAC,CAAC,CAAC,CAAC,EAAeC,EAAuBL,EAAIC,EAAS,CAAC,SAAS,CAAcC,EAAE,IAAI,CAAC,SAAS,8HAA8H,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,wVAAwV,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,CAAC,6KAA0LE,EAAEC,EAAE,CAAC,KAAK,oGAAoG,YAAY,GAAG,OAAO,YAAY,aAAa,GAAG,QAAQ,oBAAoB,aAAa,GAAG,SAAsBD,EAAEE,EAAE,EAAE,CAAC,SAAS,yDAAyD,CAAC,CAAC,CAAC,EAAE,mFAAmF,CAAC,CAAC,EAAeF,EAAE,KAAK,CAAC,SAAS,WAAW,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,oEAAoE,CAAC,EAAeF,EAAE,KAAK,CAAC,SAAS,CAAcE,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBA,EAAE,IAAI,CAAC,SAAS,iHAAiH,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBA,EAAE,IAAI,CAAC,SAAS,iEAAiE,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,cAAc,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,qCAAqC,CAAC,EAAeF,EAAE,KAAK,CAAC,SAAS,CAAcE,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBA,EAAE,IAAI,CAAC,SAAS,qCAAqC,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBA,EAAE,IAAI,CAAC,SAAS,gGAAgG,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBA,EAAE,IAAI,CAAC,SAAS,8CAA8C,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBA,EAAE,IAAI,CAAC,SAAS,qEAAqE,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,CAAC,4LAAyME,EAAEC,EAAE,CAAC,KAAK,wCAAwC,YAAY,GAAG,OAAO,YAAY,aAAa,GAAG,QAAQ,oBAAoB,aAAa,GAAG,SAAsBD,EAAEE,EAAE,EAAE,CAAC,SAAS,6CAA6C,CAAC,CAAC,CAAC,EAAE,GAAG,CAAC,CAAC,CAAC,CAAC,CAAC,EAAeE,EAAuBN,EAAIC,EAAS,CAAC,SAAS,CAAcC,EAAE,IAAI,CAAC,SAAS,kHAAkH,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,+TAA+T,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,CAAC,mKAAgLE,EAAEC,EAAE,CAAC,KAAK,yFAAyF,YAAY,GAAG,OAAO,YAAY,aAAa,GAAG,QAAQ,oBAAoB,aAAa,GAAG,SAAsBD,EAAEE,EAAE,EAAE,CAAC,SAAS,wCAAwC,CAAC,CAAC,CAAC,EAAE,mFAAmF,CAAC,CAAC,EAAeF,EAAE,KAAK,CAAC,SAAS,WAAW,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,yDAAyD,CAAC,EAAeF,EAAE,KAAK,CAAC,SAAS,CAAcE,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBA,EAAE,IAAI,CAAC,SAAS,qDAAqD,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBA,EAAE,IAAI,CAAC,SAAS,qDAAqD,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBA,EAAE,IAAI,CAAC,SAAS,8CAA8C,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,cAAc,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,qCAAqC,CAAC,EAAeF,EAAE,KAAK,CAAC,SAAS,CAAcE,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBA,EAAE,IAAI,CAAC,SAAS,qCAAqC,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBA,EAAE,IAAI,CAAC,SAAS,8EAA8E,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBA,EAAE,IAAI,CAAC,SAAS,8CAA8C,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBA,EAAE,IAAI,CAAC,SAAS,gDAAgD,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,CAAC,0KAAuLE,EAAEC,EAAE,CAAC,KAAK,wCAAwC,YAAY,GAAG,OAAO,YAAY,aAAa,GAAG,QAAQ,oBAAoB,aAAa,GAAG,SAAsBD,EAAEE,EAAE,EAAE,CAAC,SAAS,6CAA6C,CAAC,CAAC,CAAC,EAAE,GAAG,CAAC,CAAC,CAAC,CAAC,CAAC,EAAeG,EAAuBP,EAAIC,EAAS,CAAC,SAAS,CAAcC,EAAE,IAAI,CAAC,SAAS,qHAAqH,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,2OAA2O,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,CAAC,oJAAiKE,EAAEC,EAAE,CAAC,KAAK,yFAAyF,YAAY,GAAG,OAAO,YAAY,aAAa,GAAG,QAAQ,oBAAoB,aAAa,GAAG,SAAsBD,EAAEE,EAAE,EAAE,CAAC,SAAS,oDAAoD,CAAC,CAAC,CAAC,EAAE,mFAAmF,CAAC,CAAC,EAAeF,EAAE,KAAK,CAAC,SAAS,WAAW,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,qEAAqE,CAAC,EAAeF,EAAE,KAAK,CAAC,SAAS,CAAcE,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBA,EAAE,IAAI,CAAC,SAAS,oGAAoG,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBA,EAAE,IAAI,CAAC,SAAS,6GAA6G,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBA,EAAE,IAAI,CAAC,SAAS,gDAAgD,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,cAAc,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,qCAAqC,CAAC,EAAeF,EAAE,KAAK,CAAC,SAAS,CAAcE,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBA,EAAE,IAAI,CAAC,SAAS,qCAAqC,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBA,EAAE,IAAI,CAAC,SAAS,2EAA2E,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBA,EAAE,IAAI,CAAC,SAAS,8CAA8C,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBA,EAAE,IAAI,CAAC,SAAS,sDAAsD,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,CAAC,wLAAqME,EAAEC,EAAE,CAAC,KAAK,wCAAwC,YAAY,GAAG,OAAO,YAAY,aAAa,GAAG,QAAQ,oBAAoB,aAAa,GAAG,SAAsBD,EAAEE,EAAE,EAAE,CAAC,SAAS,6CAA6C,CAAC,CAAC,CAAC,EAAE,GAAG,CAAC,CAAC,CAAC,CAAC,CAAC,EAAeI,EAAuBR,EAAIC,EAAS,CAAC,SAAS,CAAcC,EAAE,IAAI,CAAC,SAAS,0IAA0I,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,2XAA2X,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,CAAC,qJAAkKE,EAAEC,EAAE,CAAC,KAAK,yFAAyF,YAAY,GAAG,OAAO,YAAY,aAAa,GAAG,QAAQ,oBAAoB,aAAa,GAAG,SAAsBD,EAAEE,EAAE,EAAE,CAAC,SAAS,wCAAwC,CAAC,CAAC,CAAC,EAAE,mFAAmF,CAAC,CAAC,EAAeF,EAAE,KAAK,CAAC,SAAS,WAAW,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,yDAAyD,CAAC,EAAeF,EAAE,KAAK,CAAC,SAAS,CAAcE,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBA,EAAE,IAAI,CAAC,SAAS,gDAAgD,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBA,EAAE,IAAI,CAAC,SAAS,+CAA+C,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBA,EAAE,IAAI,CAAC,SAAS,sDAAsD,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,cAAc,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,qCAAqC,CAAC,EAAeF,EAAE,KAAK,CAAC,SAAS,CAAcE,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBA,EAAE,IAAI,CAAC,SAAS,qCAAqC,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBA,EAAE,IAAI,CAAC,SAAS,+EAA+E,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBA,EAAE,IAAI,CAAC,SAAS,8CAA8C,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBA,EAAE,IAAI,CAAC,SAAS,iDAAiD,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,CAAC,mNAAgOE,EAAEC,EAAE,CAAC,KAAK,wCAAwC,YAAY,GAAG,OAAO,YAAY,aAAa,GAAG,QAAQ,oBAAoB,aAAa,GAAG,SAAsBD,EAAEE,EAAE,EAAE,CAAC,SAAS,6CAA6C,CAAC,CAAC,CAAC,EAAE,GAAG,CAAC,CAAC,CAAC,CAAC,CAAC,EAAeK,EAAuBT,EAAIC,EAAS,CAAC,SAAS,CAAcC,EAAE,IAAI,CAAC,SAAS,6GAA6G,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,0QAA0Q,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,CAAC,6JAA0KE,EAAEC,EAAE,CAAC,KAAK,yFAAyF,YAAY,GAAG,OAAO,YAAY,aAAa,GAAG,QAAQ,oBAAoB,aAAa,GAAG,SAAsBD,EAAEE,EAAE,EAAE,CAAC,SAAS,wCAAwC,CAAC,CAAC,CAAC,EAAE,mFAAmF,CAAC,CAAC,EAAeF,EAAE,KAAK,CAAC,SAAS,WAAW,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,6DAA6D,CAAC,EAAeF,EAAE,KAAK,CAAC,SAAS,CAAcE,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBA,EAAE,IAAI,CAAC,SAAS,wCAAwC,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBA,EAAE,IAAI,CAAC,SAAS,qHAAqH,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBA,EAAE,IAAI,CAAC,SAAS,oGAAoG,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBA,EAAE,IAAI,CAAC,SAAS,2CAA2C,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,cAAc,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,qCAAqC,CAAC,EAAeF,EAAE,KAAK,CAAC,SAAS,CAAcE,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBA,EAAE,IAAI,CAAC,SAAS,qCAAqC,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBA,EAAE,IAAI,CAAC,SAAS,mFAAmF,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBA,EAAE,IAAI,CAAC,SAAS,8CAA8C,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBA,EAAE,IAAI,CAAC,SAAS,gDAAgD,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,CAAC,mLAAgME,EAAEC,EAAE,CAAC,KAAK,wCAAwC,YAAY,GAAG,OAAO,YAAY,aAAa,GAAG,QAAQ,oBAAoB,aAAa,GAAG,SAAsBD,EAAEE,EAAE,EAAE,CAAC,SAAS,6CAA6C,CAAC,CAAC,CAAC,EAAE,GAAG,CAAC,CAAC,CAAC,CAAC,CAAC,EAAeM,EAAuBV,EAAIC,EAAS,CAAC,SAAS,CAAcC,EAAE,IAAI,CAAC,SAAS,iHAAiH,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,iWAAiW,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,6QAA6Q,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,WAAW,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,iEAAiE,CAAC,EAAeF,EAAE,KAAK,CAAC,SAAS,CAAcE,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBA,EAAE,IAAI,CAAC,SAAS,sGAAsG,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBA,EAAE,IAAI,CAAC,SAAS,mFAAmF,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBA,EAAE,IAAI,CAAC,SAAS,0DAA0D,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,cAAc,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,qCAAqC,CAAC,EAAeF,EAAE,KAAK,CAAC,SAAS,CAAcE,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBA,EAAE,IAAI,CAAC,SAAS,qCAAqC,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBA,EAAE,IAAI,CAAC,SAAS,4FAA4F,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBA,EAAE,IAAI,CAAC,SAAS,8CAA8C,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBA,EAAE,IAAI,CAAC,SAAS,iDAAiD,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,CAAC,uLAAoME,EAAEC,EAAE,CAAC,KAAK,wCAAwC,YAAY,GAAG,OAAO,YAAY,aAAa,GAAG,QAAQ,oBAAoB,aAAa,GAAG,SAAsBD,EAAEE,EAAE,EAAE,CAAC,SAAS,6CAA6C,CAAC,CAAC,CAAC,EAAE,GAAG,CAAC,CAAC,CAAC,CAAC,CAAC,EAAeO,EAAuBX,EAAIC,EAAS,CAAC,SAAS,CAAcC,EAAE,KAAK,CAAC,SAAS,sBAAsB,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,uXAAuX,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,0BAA0B,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,8DAA8D,CAAC,EAAeF,EAAE,KAAK,CAAC,SAAS,CAAcE,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBA,EAAE,IAAI,CAAC,SAAS,sDAAsD,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBA,EAAE,IAAI,CAAC,SAAS,wBAAwB,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBA,EAAE,IAAI,CAAC,SAAS,8EAA8E,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,kCAAkC,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,iSAAiS,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,CAAC,yFAAsGE,EAAEC,EAAE,CAAC,KAAK,gEAAgE,YAAY,GAAG,OAAO,YAAY,aAAa,GAAG,QAAQ,oBAAoB,aAAa,GAAG,SAAsBD,EAAEE,EAAE,EAAE,CAAC,SAAS,8BAA8B,CAAC,CAAC,CAAC,EAAE,GAAG,CAAC,CAAC,EAAeF,EAAE,KAAK,CAAC,SAAS,8CAA8C,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,0QAA0Q,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,CAAC,mVAAgWE,EAAEC,EAAE,CAAC,KAAK,0CAA0C,YAAY,GAAG,OAAO,YAAY,aAAa,GAAG,QAAQ,oBAAoB,aAAa,GAAG,SAAsBD,EAAEE,EAAE,EAAE,CAAC,SAAS,wDAAwD,CAAC,CAAC,CAAC,EAAE,GAAG,CAAC,CAAC,EAAeF,EAAE,KAAK,CAAC,SAAS,4BAA4B,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,CAAC,wJAAqKE,EAAEC,EAAE,CAAC,KAAK,+DAA+D,YAAY,GAAG,OAAO,YAAY,aAAa,GAAG,QAAQ,oBAAoB,aAAa,GAAG,SAAsBD,EAAEE,EAAE,EAAE,CAAC,SAAS,8DAA8D,CAAC,CAAC,CAAC,EAAE,GAAG,CAAC,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,2bAA2b,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,oBAAoB,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,CAAC,8GAA2HE,EAAEC,EAAE,CAAC,KAAK,2CAA2C,YAAY,GAAG,OAAO,YAAY,aAAa,GAAG,QAAQ,oBAAoB,aAAa,GAAG,SAAsBD,EAAEE,EAAE,EAAE,CAAC,SAAS,qBAAqB,CAAC,CAAC,CAAC,EAAE,qKAAqK,CAAC,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,oMAAoM,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,kBAAkB,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,yNAAyN,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,CAAC,oBAAiCE,EAAEC,EAAE,CAAC,KAAK,gEAAgE,YAAY,GAAG,OAAO,YAAY,aAAa,GAAG,QAAQ,oBAAoB,aAAa,GAAG,SAAsBD,EAAEE,EAAE,EAAE,CAAC,SAAS,sEAAsE,CAAC,CAAC,CAAC,EAAE,kCAA+CF,EAAEC,EAAE,CAAC,KAAK,6BAA6B,YAAY,GAAG,OAAO,YAAY,aAAa,GAAG,QAAQ,oBAAoB,aAAa,GAAG,SAAsBD,EAAEE,EAAE,EAAE,CAAC,SAAS,uBAAuB,CAAC,CAAC,CAAC,EAAE,qEAAqE,CAAC,CAAC,EAAeF,EAAE,KAAK,CAAC,SAAS,qDAAqD,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,gXAAgX,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,CAAC,kSAA+SE,EAAEC,EAAE,CAAC,KAAK,8CAA8C,YAAY,GAAG,OAAO,YAAY,aAAa,GAAG,QAAQ,oBAAoB,aAAa,GAAG,SAAsBD,EAAEE,EAAE,EAAE,CAAC,SAAS,uBAAuB,CAAC,CAAC,CAAC,EAAE,GAAG,CAAC,CAAC,CAAC,CAAC,CAAC,EAAeQ,EAAuBZ,EAAIC,EAAS,CAAC,SAAS,CAAcC,EAAE,IAAI,CAAC,SAAS,4GAA4G,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,wLAAwL,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,cAAc,CAAC,EAAeF,EAAE,KAAK,CAAC,SAAS,CAAcE,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBF,EAAE,IAAI,CAAC,SAAS,CAAC,gBAA6BE,EAAEC,EAAE,CAAC,KAAK,8CAA8C,YAAY,GAAG,OAAO,YAAY,aAAa,GAAG,QAAQ,oBAAoB,aAAa,GAAG,SAAsBD,EAAEE,EAAE,EAAE,CAAC,SAAS,aAAa,CAAC,CAAC,CAAC,EAAE,uCAAuC,CAAC,CAAC,CAAC,CAAC,EAAeF,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBA,EAAE,IAAI,CAAC,SAAS,6CAA6C,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBA,EAAE,IAAI,CAAC,SAAS,yGAAyG,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBA,EAAE,IAAI,CAAC,SAAS,qCAAqC,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,CAAC,gBAA6BE,EAAEC,EAAE,CAAC,KAAK,8CAA8C,YAAY,GAAG,OAAO,YAAY,aAAa,GAAG,QAAQ,oBAAoB,aAAa,GAAG,SAAsBD,EAAEE,EAAE,EAAE,CAAC,SAAS,iBAAiB,CAAC,CAAC,CAAC,EAAE,sCAAsC,CAAC,CAAC,CAAC,CAAC,CAAC,EAAeS,EAAuBb,EAAIC,EAAS,CAAC,SAAS,CAAcC,EAAE,IAAI,CAAC,SAAS,4HAA4H,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,2KAA2K,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,2NAA2N,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,cAAc,CAAC,EAAeF,EAAE,KAAK,CAAC,SAAS,CAAcE,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBF,EAAE,IAAI,CAAC,SAAS,CAAC,YAAyBE,EAAEC,EAAE,CAAC,KAAK,iDAAiD,YAAY,GAAG,OAAO,YAAY,aAAa,GAAG,QAAQ,oBAAoB,aAAa,GAAG,SAAsBD,EAAEE,EAAE,EAAE,CAAC,SAAS,aAAa,CAAC,CAAC,CAAC,EAAE,kDAAkD,CAAC,CAAC,CAAC,CAAC,EAAeF,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBA,EAAE,IAAI,CAAC,SAAS,gDAAgD,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBA,EAAE,IAAI,CAAC,SAAS,yGAAyG,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBA,EAAE,IAAI,CAAC,SAAS,qCAAqC,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,CAAC,gBAA6BE,EAAEC,EAAE,CAAC,KAAK,iDAAiD,YAAY,GAAG,OAAO,YAAY,aAAa,GAAG,QAAQ,oBAAoB,aAAa,GAAG,SAAsBD,EAAEE,EAAE,EAAE,CAAC,SAAS,oBAAoB,CAAC,CAAC,CAAC,EAAE,sCAAsC,CAAC,CAAC,CAAC,CAAC,CAAC,EAAeU,EAAwBd,EAAIC,EAAS,CAAC,SAAS,CAAcC,EAAE,IAAI,CAAC,SAAS,0GAA0G,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,4KAA4K,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,0FAA0F,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,cAAc,CAAC,EAAeF,EAAE,KAAK,CAAC,SAAS,CAAcE,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBF,EAAE,IAAI,CAAC,SAAS,CAAC,gBAA6BE,EAAEC,EAAE,CAAC,KAAK,6CAA6C,YAAY,GAAG,OAAO,YAAY,aAAa,GAAG,QAAQ,oBAAoB,aAAa,GAAG,SAAsBD,EAAEE,EAAE,EAAE,CAAC,SAAS,cAAc,CAAC,CAAC,CAAC,EAAE,wFAAwF,CAAC,CAAC,CAAC,CAAC,EAAeF,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBA,EAAE,IAAI,CAAC,SAAS,4CAA4C,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBA,EAAE,IAAI,CAAC,SAAS,yGAAyG,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBA,EAAE,IAAI,CAAC,SAAS,qCAAqC,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,CAAC,gBAA6BE,EAAEC,EAAE,CAAC,KAAK,6CAA6C,YAAY,GAAG,OAAO,YAAY,aAAa,GAAG,QAAQ,oBAAoB,aAAa,GAAG,SAAsBD,EAAEE,EAAE,EAAE,CAAC,SAAS,gBAAgB,CAAC,CAAC,CAAC,EAAE,sCAAsC,CAAC,CAAC,CAAC,CAAC,CAAC,EAAeW,EAAwBf,EAAIC,EAAS,CAAC,SAAS,CAAcC,EAAE,IAAI,CAAC,SAAS,iFAAiF,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,kMAAkM,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,mPAAmP,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,cAAc,CAAC,EAAeF,EAAE,KAAK,CAAC,SAAS,CAAcE,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBF,EAAE,IAAI,CAAC,SAAS,CAAC,gBAA6BE,EAAEC,EAAE,CAAC,KAAK,8CAA8C,YAAY,GAAG,OAAO,YAAY,aAAa,GAAG,QAAQ,oBAAoB,aAAa,GAAG,SAAsBD,EAAEE,EAAE,EAAE,CAAC,SAAS,aAAa,CAAC,CAAC,CAAC,EAAE,8CAA8C,CAAC,CAAC,CAAC,CAAC,EAAeF,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBA,EAAE,IAAI,CAAC,SAAS,6CAA6C,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBA,EAAE,IAAI,CAAC,SAAS,8GAA8G,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBA,EAAE,IAAI,CAAC,SAAS,oCAAoC,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,CAAC,gBAA6BE,EAAEC,EAAE,CAAC,KAAK,8CAA8C,YAAY,GAAG,OAAO,YAAY,aAAa,GAAG,QAAQ,oBAAoB,aAAa,GAAG,SAAsBD,EAAEE,EAAE,EAAE,CAAC,SAAS,iBAAiB,CAAC,CAAC,CAAC,EAAE,sCAAsC,CAAC,CAAC,CAAC,CAAC,CAAC,EAAeY,EAAwBhB,EAAIC,EAAS,CAAC,SAAS,CAAcC,EAAE,IAAI,CAAC,SAAS,8GAA8G,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,mLAAmL,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,cAAc,CAAC,EAAeF,EAAE,KAAK,CAAC,SAAS,CAAcE,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBF,EAAE,IAAI,CAAC,SAAS,CAAC,gBAA6BE,EAAEC,EAAE,CAAC,KAAK,+CAA+C,YAAY,GAAG,OAAO,YAAY,aAAa,GAAG,QAAQ,oBAAoB,aAAa,GAAG,SAAsBD,EAAEE,EAAE,EAAE,CAAC,SAAS,cAAc,CAAC,CAAC,CAAC,EAAE,kCAAkC,CAAC,CAAC,CAAC,CAAC,EAAeF,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBA,EAAE,IAAI,CAAC,SAAS,8CAA8C,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBA,EAAE,IAAI,CAAC,SAAS,yGAAyG,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBA,EAAE,IAAI,CAAC,SAAS,qCAAqC,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,CAAC,gBAA6BE,EAAEC,EAAE,CAAC,KAAK,+CAA+C,YAAY,GAAG,OAAO,YAAY,aAAa,GAAG,QAAQ,oBAAoB,aAAa,GAAG,SAAsBD,EAAEE,EAAE,EAAE,CAAC,SAAS,kBAAkB,CAAC,CAAC,CAAC,EAAE,sCAAsC,CAAC,CAAC,CAAC,CAAC,CAAC,EAAea,EAAwBjB,EAAIC,EAAS,CAAC,SAAS,CAAcC,EAAE,IAAI,CAAC,SAAS,wGAAwG,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,sKAAsK,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,cAAc,CAAC,EAAeF,EAAE,KAAK,CAAC,SAAS,CAAcE,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBF,EAAE,IAAI,CAAC,SAAS,CAAC,4BAAyCE,EAAEC,EAAE,CAAC,KAAK,4CAA4C,YAAY,GAAG,OAAO,YAAY,aAAa,GAAG,QAAQ,oBAAoB,aAAa,GAAG,SAAsBD,EAAEE,EAAE,EAAE,CAAC,SAAS,YAAY,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,EAAeF,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBA,EAAE,IAAI,CAAC,SAAS,2CAA2C,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBA,EAAE,IAAI,CAAC,SAAS,yGAAyG,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBA,EAAE,IAAI,CAAC,SAAS,qCAAqC,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,CAAC,gBAA6BE,EAAEC,EAAE,CAAC,KAAK,4CAA4C,YAAY,GAAG,OAAO,YAAY,aAAa,GAAG,QAAQ,oBAAoB,aAAa,GAAG,SAAsBD,EAAEE,EAAE,EAAE,CAAC,SAAS,eAAe,CAAC,CAAC,CAAC,EAAE,sCAAsC,CAAC,CAAC,CAAC,CAAC,CAAC,EAAec,EAAwBlB,EAAIC,EAAS,CAAC,SAAS,CAAcC,EAAE,IAAI,CAAC,SAAS,2FAA2F,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,qMAAqM,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,0PAA0P,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,cAAc,CAAC,EAAeF,EAAE,KAAK,CAAC,SAAS,CAAcE,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBF,EAAE,IAAI,CAAC,SAAS,CAAC,gBAA6BE,EAAEC,EAAE,CAAC,KAAK,wDAAwD,YAAY,GAAG,OAAO,YAAY,aAAa,GAAG,QAAQ,oBAAoB,aAAa,GAAG,SAAsBD,EAAEE,EAAE,EAAE,CAAC,SAAS,sBAAsB,CAAC,CAAC,CAAC,EAAE,mDAAmD,CAAC,CAAC,CAAC,CAAC,EAAeF,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBA,EAAE,IAAI,CAAC,SAAS,gDAAgD,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBA,EAAE,IAAI,CAAC,SAAS,yGAAyG,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBA,EAAE,IAAI,CAAC,SAAS,qCAAqC,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,CAAC,gBAA6BE,EAAEC,EAAE,CAAC,KAAK,wDAAwD,YAAY,GAAG,OAAO,YAAY,aAAa,GAAG,QAAQ,oBAAoB,aAAa,GAAG,SAAsBD,EAAEE,EAAE,EAAE,CAAC,SAAS,2BAA2B,CAAC,CAAC,CAAC,EAAE,sCAAsC,CAAC,CAAC,CAAC,CAAC,CAAC,EAAee,EAAwBnB,EAAIC,EAAS,CAAC,SAAS,CAAcC,EAAE,KAAK,CAAC,SAAS,sBAAsB,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,wYAAwY,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,0BAA0B,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,CAAC,OAAoBE,EAAEC,EAAE,CAAC,KAAK,yFAAyF,YAAY,GAAG,OAAO,YAAY,aAAa,GAAG,QAAQ,oBAAoB,aAAa,GAAG,SAAsBD,EAAEE,EAAE,EAAE,CAAC,SAAS,kBAAkB,CAAC,CAAC,CAAC,EAAE,iKAAiK,CAAC,CAAC,EAAeJ,EAAE,KAAK,CAAC,SAAS,CAAcE,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBA,EAAE,IAAI,CAAC,SAAS,kEAAkE,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBA,EAAE,IAAI,CAAC,SAAS,gEAAgE,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBA,EAAE,IAAI,CAAC,SAAS,4DAA4D,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,+BAA+B,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,sSAAsS,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,CAAC,yFAAsGE,EAAEC,EAAE,CAAC,KAAK,gEAAgE,YAAY,GAAG,OAAO,YAAY,aAAa,GAAG,QAAQ,oBAAoB,aAAa,GAAG,SAAsBD,EAAEE,EAAE,EAAE,CAAC,SAAS,mCAAmC,CAAC,CAAC,CAAC,EAAE,GAAG,CAAC,CAAC,EAAeF,EAAE,KAAK,CAAC,SAAS,8CAA8C,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,wQAAwQ,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,CAAC,2ZAAwaE,EAAEC,EAAE,CAAC,KAAK,0CAA0C,YAAY,GAAG,OAAO,YAAY,aAAa,GAAG,QAAQ,oBAAoB,aAAa,GAAG,SAAsBD,EAAEE,EAAE,EAAE,CAAC,SAAS,mDAAmD,CAAC,CAAC,CAAC,EAAE,GAAG,CAAC,CAAC,EAAeF,EAAE,KAAK,CAAC,SAAS,2CAA2C,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,CAAC,4IAAyJE,EAAEC,EAAE,CAAC,KAAK,+DAA+D,YAAY,GAAG,OAAO,YAAY,aAAa,GAAG,QAAQ,oBAAoB,aAAa,GAAG,SAAsBD,EAAEE,EAAE,EAAE,CAAC,SAAS,qEAAqE,CAAC,CAAC,CAAC,EAAE,GAAG,CAAC,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,ibAAib,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,oBAAoB,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,CAAC,qGAAkHE,EAAEC,EAAE,CAAC,KAAK,2CAA2C,YAAY,GAAG,OAAO,YAAY,aAAa,GAAG,QAAQ,oBAAoB,aAAa,GAAG,SAAsBD,EAAEE,EAAE,EAAE,CAAC,SAAS,qBAAqB,CAAC,CAAC,CAAC,EAAE,kLAAkL,CAAC,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,6LAA6L,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,kBAAkB,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,yNAAyN,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,CAAC,oBAAiCE,EAAEC,EAAE,CAAC,KAAK,gEAAgE,YAAY,GAAG,OAAO,YAAY,aAAa,GAAG,QAAQ,oBAAoB,aAAa,GAAG,SAAsBD,EAAEE,EAAE,EAAE,CAAC,SAAS,6DAA6D,CAAC,CAAC,CAAC,EAAE,2BAAwCF,EAAEC,EAAE,CAAC,KAAK,6BAA6B,YAAY,GAAG,OAAO,YAAY,aAAa,GAAG,QAAQ,oBAAoB,aAAa,GAAG,SAAsBD,EAAEE,EAAE,EAAE,CAAC,SAAS,uBAAuB,CAAC,CAAC,CAAC,EAAE,qEAAqE,CAAC,CAAC,EAAeF,EAAE,KAAK,CAAC,SAAS,qDAAqD,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,qXAAqX,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,CAAC,kSAA+SE,EAAEC,EAAE,CAAC,KAAK,8CAA8C,YAAY,GAAG,OAAO,YAAY,aAAa,GAAG,QAAQ,oBAAoB,aAAa,GAAG,SAAsBD,EAAEE,EAAE,EAAE,CAAC,SAAS,uBAAuB,CAAC,CAAC,CAAC,EAAE,GAAG,CAAC,CAAC,CAAC,CAAC,CAAC,EAAegB,EAAwBpB,EAAIC,EAAS,CAAC,SAAS,CAAcC,EAAE,KAAK,CAAC,SAAS,sBAAsB,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,wYAAwY,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,4BAA4B,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,CAAC,kCAA+CE,EAAEC,EAAE,CAAC,KAAK,+DAA+D,YAAY,GAAG,OAAO,YAAY,aAAa,GAAG,QAAQ,oBAAoB,aAAa,GAAG,SAAsBD,EAAEE,EAAE,EAAE,CAAC,SAAS,cAAc,CAAC,CAAC,CAAC,EAAE,6IAA6I,CAAC,CAAC,EAAeJ,EAAE,KAAK,CAAC,SAAS,CAAcE,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBA,EAAE,IAAI,CAAC,SAAS,mGAAmG,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBA,EAAE,IAAI,CAAC,SAAS,2EAA2E,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBA,EAAE,IAAI,CAAC,SAAS,0EAA0E,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBA,EAAE,IAAI,CAAC,SAAS,oDAAoD,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,iCAAiC,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,6SAA6S,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,CAAC,oFAAiGE,EAAEC,EAAE,CAAC,KAAK,kEAAkE,YAAY,GAAG,OAAO,YAAY,aAAa,GAAG,QAAQ,oBAAoB,aAAa,GAAG,SAAsBD,EAAEE,EAAE,EAAE,CAAC,SAAS,qCAAqC,CAAC,CAAC,CAAC,EAAE,GAAG,CAAC,CAAC,EAAeF,EAAE,KAAK,CAAC,SAAS,gDAAgD,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,2QAA2Q,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,CAAC,qXAA6XE,EAAEC,EAAE,CAAC,KAAK,0CAA0C,YAAY,GAAG,OAAO,YAAY,aAAa,GAAG,QAAQ,oBAAoB,aAAa,GAAG,SAAsBD,EAAEE,EAAE,EAAE,CAAC,SAAS,wDAAwD,CAAC,CAAC,CAAC,EAAE,GAAG,CAAC,CAAC,EAAeF,EAAE,KAAK,CAAC,SAAS,mBAAmB,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,8YAA8Y,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,CAAC,wJAAqKE,EAAEC,EAAE,CAAC,KAAK,iEAAiE,YAAY,GAAG,OAAO,YAAY,aAAa,GAAG,QAAQ,oBAAoB,aAAa,GAAG,SAAsBD,EAAEE,EAAE,EAAE,CAAC,SAAS,gEAAgE,CAAC,CAAC,CAAC,EAAE,GAAG,CAAC,CAAC,EAAeF,EAAE,KAAK,CAAC,SAAS,oBAAoB,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,CAAC,6GAA0HE,EAAEC,EAAE,CAAC,KAAK,2CAA2C,YAAY,GAAG,OAAO,YAAY,aAAa,GAAG,QAAQ,oBAAoB,aAAa,GAAG,SAAsBD,EAAEE,EAAE,EAAE,CAAC,SAAS,qBAAqB,CAAC,CAAC,CAAC,EAAE,uKAAuK,CAAC,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,4MAA4M,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,kBAAkB,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,yNAAyN,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,CAAC,oBAAiCE,EAAEC,EAAE,CAAC,KAAK,kEAAkE,YAAY,GAAG,OAAO,YAAY,aAAa,GAAG,QAAQ,oBAAoB,aAAa,GAAG,SAAsBD,EAAEE,EAAE,EAAE,CAAC,SAAS,wEAAwE,CAAC,CAAC,CAAC,EAAE,2BAAwCF,EAAEC,EAAE,CAAC,KAAK,6BAA6B,YAAY,GAAG,OAAO,YAAY,aAAa,GAAG,QAAQ,oBAAoB,aAAa,GAAG,SAAsBD,EAAEE,EAAE,EAAE,CAAC,SAAS,uBAAuB,CAAC,CAAC,CAAC,EAAE,uEAAuE,CAAC,CAAC,EAAeF,EAAE,KAAK,CAAC,SAAS,uDAAuD,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,sXAAsX,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,CAAC,qSAAkTE,EAAEC,EAAE,CAAC,KAAK,8CAA8C,YAAY,GAAG,OAAO,YAAY,aAAa,GAAG,QAAQ,oBAAoB,aAAa,GAAG,SAAsBD,EAAEE,EAAE,EAAE,CAAC,SAAS,uBAAuB,CAAC,CAAC,CAAC,EAAE,GAAG,CAAC,CAAC,CAAC,CAAC,CAAC,EAC12pDiB,EAAqB,CAAC,QAAU,CAAC,UAAY,CAAC,KAAO,WAAW,YAAc,CAAC,sBAAwB,GAAG,CAAC,EAAE,UAAY,CAAC,KAAO,WAAW,YAAc,CAAC,sBAAwB,GAAG,CAAC,EAAE,UAAY,CAAC,KAAO,WAAW,YAAc,CAAC,sBAAwB,GAAG,CAAC,EAAE,WAAa,CAAC,KAAO,WAAW,YAAc,CAAC,sBAAwB,GAAG,CAAC,EAAE,WAAa,CAAC,KAAO,WAAW,YAAc,CAAC,sBAAwB,GAAG,CAAC,EAAE,UAAY,CAAC,KAAO,WAAW,YAAc,CAAC,sBAAwB,GAAG,CAAC,EAAE,UAAY,CAAC,KAAO,WAAW,YAAc,CAAC,sBAAwB,GAAG,CAAC,EAAE,WAAa,CAAC,KAAO,WAAW,YAAc,CAAC,sBAAwB,GAAG,CAAC,EAAE,WAAa,CAAC,KAAO,WAAW,YAAc,CAAC,sBAAwB,GAAG,CAAC,EAAE,SAAW,CAAC,KAAO,WAAW,YAAc,CAAC,sBAAwB,GAAG,CAAC,EAAE,WAAa,CAAC,KAAO,WAAW,YAAc,CAAC,sBAAwB,GAAG,CAAC,EAAE,UAAY,CAAC,KAAO,WAAW,YAAc,CAAC,sBAAwB,GAAG,CAAC,EAAE,UAAY,CAAC,KAAO,WAAW,YAAc,CAAC,sBAAwB,GAAG,CAAC,EAAE,WAAa,CAAC,KAAO,WAAW,YAAc,CAAC,sBAAwB,GAAG,CAAC,EAAE,UAAY,CAAC,KAAO,WAAW,YAAc,CAAC,sBAAwB,GAAG,CAAC,EAAE,WAAa,CAAC,KAAO,WAAW,YAAc,CAAC,sBAAwB,GAAG,CAAC,EAAE,UAAY,CAAC,KAAO,WAAW,YAAc,CAAC,sBAAwB,GAAG,CAAC,EAAE,mBAAqB,CAAC,KAAO,UAAU,CAAC,CAAC",
  "names": ["richText", "u", "x", "p", "Link", "motion", "richText1", "richText2", "richText3", "richText4", "richText5", "richText6", "richText7", "richText8", "richText9", "richText10", "richText11", "richText12", "richText13", "richText14", "richText15", "richText16", "__FramerMetadata__"]
}
