Links

System Configuration

Overview

This section of Panther's documentation covers how to configure your Panther Console and your overall Panther deployment. Panther features several configurable settings that enable you to tailor the service for your needs.
The gear icon in the upper right corner of the Panther Console is expanded and a drop-down menu is visible.

General settings

To access your General settings, click the gear icon in the upper right corner of your Panther Console. The General settings include tabs for Main Information, SAML Configuration, Data Lake, and Developer Workflow.
Only users with the Read Settings & SAML Preferences permission can view the configurations on this page, and only those with Edit Settings & SAML Preferences can make changes.

Main Information

In this section, you can configure the following fields:
  • Company name
  • Company email
  • Send product analytics
    • This anonymized data helps us improve Panther.
  • Display UTC time zone
    • Show all dates and times displayed in the Console in Coordinated Universal Time (UTC). When switched off, the local time zone will be used.

SAML Configuration

Integrate with SAML Identity Providers (IdP) to enable user login to the Panther Console via SSO. Panther integrates with the following providers:
In addition, Panther supports integrating with any SAML IdP via the Generic SSO integration.
For more information, see SAML/SSO Integration.

Data Lake

Panther is configured to write processed log data to an AWS-based Snowflake database cluster. Using Panther with Snowflake enables Panther data to both integrate with your given Business Intelligence tools and to perform assessments of your organization's security posture. For more information, see Snowflake Integration.

Developer Workflow

Click the toggle next to We use the Panther Analysis Tool to manage our detections if you want to prevent users from enabling Panther Packs in the Panther Console. This helps prevent update conflicts between the Console and CI/CD workflows.

User and User Role settings

View, delete, and invite users

Under Settings > Users, users with the "View Users" permission can view a list of all users in your Panther account. A user with the "Manage Users" permission can delete and invite users.

Initial login

When you invite a user to your Panther account, they receive an email with temporary credentials that they can use to sign in to the platform. After a user's initial login, they are required to update their password and set up MFA.
Panther requires a strong password:
  • Password must contain at least 1 number
  • Password must contain at least 1 symbol
  • Password must contain at least 1 lowercase character
  • Password must contain at least 1 uppercase character
  • Password must contain at least 12 characters

Configure Role-Based Access Control

Under Settings > User Roles, you can configure Role-Based Access Control (RBAC). This gives Panther deployments granular access control for its user accounts. All roles, including the three Panther default roles (Admin, Analyst, and AnalystReadOnly), are customizable by any user with UserModify permissions.
For more information, see Role-Based Access Control.

API Tokens and Playground

Under Settings > API Tokens, view a list of API tokens that have been created for your account. You can also create a new API Token.
Under Settings > API Playground, access Panther's API Playground to try out API operations.

Other Panther Console features

Panther Audit Logs

Panther audit logs provide a read-only history of activity within your Panther deployment. You can write detections or query your data lake for audit logs the same way you would with any other security events ingested by Panther. For more information, see Panther Audit Logs.

System Health Notifications

Panther's System Health Notifications alert you with a "System Error" when a part of the Panther platform is not functioning correctly. This includes the following types of notifications:
  • Log source health notifications
  • Log classification errors
  • Alert delivery failures
  • Cloud security scanning failures
For more information, see System Health Notifications.

Troubleshooting System Configuration

Visit the Panther Knowledge Base to view articles about system configuration that answer frequently asked questions and help you resolve common errors and issues.