Welcome to Panther!
First things first, let's make sure you get logged in. See the guidelines below to get credentials and set up your Panther account.
Then, depending on the desired use case, follow the onboarding paths below:
Once your account has been provisioned, you will get an invitation email from
[email protected] with your temporary login credentials. If you don't see it, be sure to check your spam folder.
You can use these temporary credentials to login and setup MFA:
The first recommended step after initial login is to configure destinations to receive alerts in notification systems such as Slack, PagerDuty, or automation platforms like Tines. You can quickly set up a destination by following the steps below:
Alert Destinations >
Add New Destination
Select a destination you would like to push alert to
Follow the onboarding experience, use Panther Docs to correctly configure the destination
For data normalization, real-time analytics, and storage into the data lake, start by onboarding data through one (or multiple) of the transport methods below:
Panther comes with build-in detections that alert against common security events and monitoring of cloud infrastructure. Building on these built-on detections is easy; use Panther to create custom detections that address your organizational needs. Use the documentation below to guide you through setting up detections and cloud compliance:
Onboard AWS accounts for cloud security scans
Write rules based on internal business logic or monitoring needs
Panther can be deployed to any of the following regions:
us-east-1 (N. Virginia)