__CONFIG_colors_palette__{"active_palette":0,"config":{"colors":{"7b875":{"name":"Main Accent","parent":-1},"5a321":{"name":"Accent Transparent","parent":"7b875"}},"gradients":[]},"palettes":[{"name":"Default","value":{"colors":{"7b875":{"val":"var(--tva-skin-color-4)","hsl":{"h":210,"s":0.7778,"l":0.5412,"a":1}},"5a321":{"val":"rgba(46, 138, 229, 0.15)","hsl_parent_dependency":{"h":210,"l":0.54,"s":0.78}}},"gradients":[]},"original":{"colors":{"7b875":{"val":"rgb(55, 179, 233)","hsl":{"h":198,"s":0.8,"l":0.56,"a":1}},"5a321":{"val":"rgba(55, 179, 233, 0.15)","hsl_parent_dependency":{"h":198,"s":0.8,"l":0.56,"a":0.15}}},"gradients":[]}}]}__CONFIG_colors_palette__
__CONFIG_colors_palette__{"active_palette":0,"config":{"colors":{"7b875":{"name":"Main Accent","parent":-1},"5a321":{"name":"Accent Transparent","parent":"7b875"}},"gradients":[]},"palettes":[{"name":"Default","value":{"colors":{"7b875":{"val":"var(--tva-skin-color-4)","hsl":{"h":210,"s":0.7778,"l":0.5412,"a":1}},"5a321":{"val":"rgba(46, 138, 229, 0.15)","hsl_parent_dependency":{"h":210,"l":0.54,"s":0.78}}},"gradients":[]},"original":{"colors":{"7b875":{"val":"rgb(55, 179, 233)","hsl":{"h":198,"s":0.8,"l":0.56,"a":1}},"5a321":{"val":"rgba(55, 179, 233, 0.15)","hsl_parent_dependency":{"h":198,"s":0.8,"l":0.56,"a":0.15}}},"gradients":[]}}]}__CONFIG_colors_palette__
Home
Courses
Use Cases
Pricing
Resources
Courses
Securing Windows Endpoints
Conclusion and Next Steps
You’ve Done it
Congrats, you made it so far
Congrats, you made it so far
Mark lesson complete
Comments are closed.
{"email":"Email address invalid","url":"Website address invalid","required":"Required field missing"}
Pen
Comments are closed.