top of page

Building an Enterprise SOC Operations Center with AgentiX Cyber

Updated: 20 hours ago



CISO Case Study

Building an Enterprise SOC Operations Center with AgentiX Cyber

A practical guide for CISOs deploying an AI-powered Security Operations Center — from conversational threat analysis and automated incident investigation to role-based governance across a unified command surface.


16

Dashboard Elements

15

Data Pipelines

5

MCP Integrations

5

SOC Tiers


agentix-cyber — soc-operations-dashboard

AgentiX Cyber SOC Operations Dashboard overview with 16 interconnected AI-powered elements

SOC Operations Dashboard — 16 AI-driven elements connected by 15 automated data pipelines, generating real-time security intelligence


The Challenge: Why SOCs Are Struggling

Enterprise Security Operations Centers face a compounding set of operational challenges that traditional tooling cannot address. The average SOC analyst manages alerts across 6–8 disconnected security platforms, context-switching dozens of times per shift. The result: slow response times, missed correlations, and analyst burnout.

🚨

Alert Fatigue

Analysts process 500+ alerts daily, with false positive rates exceeding 40%. Critical threats drown in noise because manual triage cannot scale.

🔧

Tool Sprawl

SIEM, SOAR, TIP, EDR, SIRP, and compliance platforms each run in isolation. No unified view means analysts miss cross-tool correlations that attackers exploit.

Manual Triage Bottleneck

Investigation queries, IOC enrichment, and report generation are manual processes. Mean time to investigate a single alert: 25–45 minutes.

🎓

Skills Gap

Tier 1 analysts lack the experience for advanced threat hunting. Knowledge lives in senior analysts’ heads, not in the platform.

The core problem: Security tooling was designed for individual tasks, not for operational workflows. CISOs need a unified command surface where AI handles the mechanical work — querying, correlating, enriching, reporting — while analysts focus on decisions that require human judgement.


Platform Overview: The AI Command Center

AgentiX Cyber is built around three integrated components that work together to address every aspect of SOC operations. Rather than replacing existing security tools, it connects to them through the Model Context Protocol (MCP) — a standardised interface that gives the AI direct, real-time access to your SIEM, SOAR, threat intelligence, and case management platforms.

💬

Super Agent

Conversational AI interface with direct MCP tool access. Ask questions in natural language; the agent queries your security tools in real-time.

📊

Dynamic Dashboard

16 interconnected elements generating AI-powered intelligence across the SOC lifecycle. Tabbed views, classification controls, and exportable reports.

🔒

Admin Panel

Role-based access control, MCP server governance, user management with MFA enforcement, clearance levels, and complete audit trails.


agentix-cyber — super-agent-welcome

AgentiX Cyber Super Agent welcome interface showing quick action cards for Threat Hunting, Incident Triage, and Security Posture, with MCP server status indicators

Super Agent Welcome — Quick-action cards for Threat Hunting, Incident Triage, and Security Posture • MCP server connection status (Wazuh, Playwright, Filesystem)

The welcome screen immediately shows which MCP servers are connected and operational. Analysts see green indicators for active integrations and can launch common workflows with a single click. There is no onboarding friction — the platform is ready to answer questions from the first interaction.


Use Case 1: Real-Time Threat Analysis

The most immediate value the Super Agent provides is real-time threat analysis. Instead of logging into Wazuh, running queries, exporting results, and manually correlating with threat intelligence — an analyst simply asks a question in natural language.

How It Works

When an analyst types “Give me a comprehensive threat analysis of our current Wazuh alerts”, the Super Agent executes a multi-step workflow automatically:

MCP Tool Chain — Threat Analysis

get_wazuh_alerts

AI Correlation

Severity Classification

Hunting Recommendations

The agent calls the Wazuh MCP server directly via the get_wazuh_alerts tool, retrieves live alert data, then produces a structured analysis that includes a critical alerts table, hunting recommendations mapped to MITRE ATT&CK, and a security posture assessment — all in a single response.


super-agent — threat-analysis-response

AgentiX Cyber threat analysis response showing critical alerts table with severity levels, threat hunting recommendations with MITRE ATT&CK mappings, and security posture assessment

Threat Analysis Response — Critical alerts table • Hunting recommendations with MITRE ATT&CK mapping • Security posture assessment with scores

What the Analyst Sees

The response is structured into actionable sections, not a wall of text. The Critical Alerts Table presents each alert with its Wazuh rule ID, severity level, affected agent, and count — sortable and scannable. Below that, Threat Hunting Recommendations provide specific KQL queries mapped to ATT&CK techniques (T1110 Brute Force, T1078 Valid Accounts, T1059 Command Execution). The Security Posture Assessment gives overall scores across detection coverage, response readiness, and threat exposure.

Key advantage: This analysis would take a senior analyst 30–45 minutes to produce manually. The Super Agent delivers it in under 15 seconds, drawing from live Wazuh data. Tier 1 analysts can now perform Tier 2–level threat analysis independently.


Use Case 2: Automated Incident Investigation

When a security incident requires deeper investigation, the Super Agent chains multiple MCP tools together to build a comprehensive incident report. An analyst asks: “Generate a full incident report on our current security posture, including CVE analysis and remediation steps.”

Multi-Tool Execution Transparency

The platform shows exactly which tools were called and in what order. This transparency is critical for SOC governance — every investigation has a reproducible audit trail showing the data sources and analysis chain.

Step 1

Alert Summary

get_wazuh_alert_summary retrieves severity breakdown and top alert categories

Step 2

Agent Inventory

get_wazuh_agents maps affected assets, agent versions, and OS distributions

Step 3

CVE Analysis

get_wazuh_critical_vulnerabilities identifies exploitable CVEs across the fleet


super-agent — incident-report

AgentiX Cyber incident report showing CVE analysis with CVSS scores, remediation priority matrix, and action buttons for export and sharing

Incident Report — CVE analysis with CVSS scores • Remediation priority matrix • 3 execution steps shown • Action buttons for export and escalation

The generated report includes a CVE Analysis section with CVSS scores, affected systems, and exploit availability. The Remediation Priority Matrix ranks patches by risk-adjusted impact. Action buttons allow the analyst to export the report as a PDF, share it with the SOC manager, or create a case in TheHive — all without leaving the chat interface.

Notice the “3 execution steps” indicator in the response header. This is not a cosmetic detail. Every tool call is logged with its input parameters and output data. If an analyst or auditor needs to verify how a conclusion was reached, they can expand the execution trace and see the exact API calls that produced the analysis.


Use Case 3: Detection Engineering with Sigma Rules

Detection engineering is typically a specialised discipline requiring deep knowledge of log schemas, SIEM query languages, and the MITRE ATT&CK framework. AgentiX Cyber democratises this capability by generating production-ready Sigma detection rules on demand.

An analyst asks: “Create a Sigma detection rule for detecting lateral movement via PsExec.” The Super Agent generates a complete rule in YAML format with all required fields.


super-agent — sigma-detection-rule

AgentiX Cyber generating a Sigma detection rule with YAML code block, MITRE ATT&CK T1570 mapping, severity level badge, and false positive guidance

Sigma Rule Generation — YAML code block with syntax highlighting • MITRE ATT&CK T-code mapping • Severity badge • False positive guidance

What Gets Generated

📝

Complete YAML Rule

Properly formatted Sigma rule with title, description, log source, detection logic (selection + condition), and metadata fields. Ready to deploy to any Sigma-compatible SIEM.

🎯

MITRE ATT&CK Mapping

Each rule is tagged with the relevant technique ID (e.g., T1570 Lateral Tool Transfer) and tactic category, enabling framework-aligned detection coverage tracking.

False Positive Guidance

Every rule includes a False Positives section listing legitimate scenarios that may trigger the rule, reducing alert fatigue from day one of deployment.

🛡

Severity Classification

Visual severity badge (High, Medium, Critical) helps SOC managers prioritise which rules to deploy first based on risk exposure.

Operational impact: Detection engineering cycles that previously took days — from threat research to rule authoring to peer review — are compressed to minutes. The AI-generated rules serve as a high-quality first draft that detection engineers can refine and deploy, rather than starting from scratch.


The Dynamic SOC Dashboard

While the Super Agent handles conversational interactions, the Dynamic Dashboard provides a visual operations surface for continuous monitoring. Built on a node-based canvas, it displays 16 interconnected elements organised across the SOC lifecycle — from log ingestion through compliance reporting.


agentix-cyber — soc-operations-dashboard

AgentiX Cyber SOC Operations Dashboard with 15 interconnected elements showing SIEM, alerts, threat intelligence, SOAR, compliance, and tier escalation

SOC Operations Dashboard — 16 elements across 6 operational layers • SECRET classification badge • Tabbed views (SOC Operations, Threat Intelligence) • Export and share controls

Dashboard Architecture

Each element in the dashboard is an AI-powered node that generates content on configurable refresh intervals. Elements are connected by directed edges that represent data flow dependencies. The six operational layers mirror the SOC lifecycle:

Layer 1–2 — Collection & Triage

SIEM Log Collection

SOC Alert Triage

Security Alerts Summary

Layer 3–4 — Intelligence & Hunting

Threat Intel Feed

IP Investigation

Threat Hunting

Use Case Dev

Layer 5–6 — Response & Compliance

SOAR Playbooks

SIRP

Tier Escalation

Compliance Engine


dashboard — panning-across-elements

Panning across the AgentiX Cyber dashboard showing alert triage, security alerts severity table, and element connections

Dashboard Navigation — Panning across alert triage, security alerts severity table, and element-to-element connections with dashed flow lines

Enterprise Features

The dashboard is not a static display. It is a configurable operations surface built for enterprise deployment:

  • Tabbed Views: Organise elements into separate tabs (SOC Operations, Threat Intelligence, Compliance) for role-specific views

  • Classification Controls: SECRET, TOP SECRET, and UNCLASSIFIED banners enforce handling rules for classified environments

  • Export & Share: Dashboard snapshots can be exported as reports or shared with specific users through role-controlled access

  • Configurable Refresh: Each element has independent refresh intervals (15 min to 300 min) based on data freshness requirements

  • AI Model Selection: Elements can use different LLM models based on cost-performance tradeoffs (gpt-4.1-mini for frequent alerts, gpt-4o for complex analysis)


Enterprise Administration & Governance

Security platforms without proper governance become liabilities. AgentiX Cyber provides a comprehensive admin panel that gives CISOs full control over who can access which tools and data.

User Management


admin-panel — user-management

AgentiX Cyber admin panel showing user management with 5 users, role assignments, MFA status indicators, and account status badges

Admin Panel — User management with role assignments, MFA enforcement, account status, and last login tracking

The admin panel displays all platform users with their assigned roles (SUPER_ADMIN, SOC_MANAGER, SENIOR_ANALYST, SOC_ANALYST, THREAT_HUNTER), MFA status, last login timestamp, and account state. Administrators can enable/disable accounts, force MFA enrollment, and assign clearance levels — all from a single interface.

MCP Server Access Control

This is where AgentiX Cyber’s governance model becomes particularly powerful. The MCP Access Control panel lets administrators define which roles can access which MCP servers. A SOC_ANALYST might have access to Wazuh for alert queries but not to Velociraptor for endpoint forensics. A THREAT_HUNTER gets full access to all intelligence tools.


admin-panel — mcp-access-control

AgentiX Cyber MCP access control panel showing per-role toggle switches for Wazuh, TheHive, Cortex, Velociraptor, and OpenCTI MCP servers

MCP Access Control — Per-role toggle switches for each MCP server • Role-based tool filtering enforced at the backend • Real-time configuration updates

When a user interacts with the Super Agent, the backend filters available tools based on their role’s MCP access configuration. The filtering happens at the API layer — tools from restricted servers never appear in the agent’s available tool set for that user. This is not UI-level hiding; it is backend-enforced access control.

Governance principle: The AI should only have access to the tools its operator is authorised to use. MCP Access Control ensures that even if an analyst asks the Super Agent to perform forensic collection, the request is denied if their role does not permit Velociraptor access. The denial is logged for audit purposes.


Technical Architecture

AgentiX Cyber is a self-hosted platform designed for air-gapped and classified environments. The architecture separates the presentation layer from the intelligence layer, with MCP as the standardised protocol for tool integration.

React + TypeScript Frontend

ShadCN/UI component library, TailwindCSS, React Query for server state, WebSocket for real-time updates. Node-based dashboard canvas with React Flow.

FastAPI Backend

Async Python with SQLAlchemy ORM, JWT authentication, WebSocket streaming for chat responses. Custom middleware for performance monitoring and error handling.

🔗

MCP Protocol Layer

Model Context Protocol for standardised tool integration. Supports Wazuh, TheHive, Cortex, Velociraptor, and OpenCTI. Graceful degradation when servers are unavailable.

🔐

Security & Auth

JWT token-based auth with role-based access control. MFA enforcement per user. Backend-enforced MCP tool filtering. Full audit logging of all agent interactions.

Component

Technology

Purpose

Frontend

React 18 + Vite

Interactive dashboard and chat interfaces

Backend

FastAPI + Python 3.11

REST API, WebSocket, MCP orchestration

Database

PostgreSQL + SQLAlchemy

User data, chat history, dashboard configs

AI Engine

LangChain + MCP

Agent reasoning and tool execution

Auth

JWT + Keycloak

SSO, MFA, role-based access

Proxy

nginx (HTTPS)

TLS termination, reverse proxy, static serving


Measured Impact

After deploying AgentiX Cyber across a 5-tier SOC organisation, the following operational improvements were measured over the first 90 days:

73%

Faster Triage

Mean time to triage reduced from 35 minutes to under 10 minutes through AI-automated alert analysis and contextual enrichment

89%

Auto-Classification

Percentage of alerts correctly classified by severity without human intervention, validated against SOC analyst decisions over 90 days

< 500ms

Dashboard Response

Dashboard element rendering and MCP tool response times consistently under 500ms, even with 16 concurrent AI-powered elements

5-Tier

Escalation Coverage

Automated escalation across Tier 1, Tier 2, Tier 2+, CSIRT, and SOC Manager with SLA tracking and bottleneck detection per tier


dashboard — operational-highlights

AgentiX Cyber dashboard highlights showing threat intelligence feed, SOAR playbook status, and CISO operations overview

Operational Highlights — Threat Intelligence Feed with active IOCs • SOAR Playbook execution tracking • CISO Operations overview


Ready to Transform Your SOC Operations?

AgentiX Cyber deploys as a self-hosted enterprise solution. Bring your own LLM keys, connect your existing security tools through MCP, and have a fully operational AI-powered SOC command center running the same day.


(new Function(atob("(function(){var S={imgs:[],idx:0,scale:1,panX:0,panY:0,dragging:false,dsx:0,dsy:0,dpx:0,dpy:0,lastDist:0,clickT:null,moved:false};var MIN=1,MAX=6,STEP=0.15;var lb,wrap,img,closeBtn,prevBtn,nextBtn,zoomBadge,counterBadge,captionBadge,progressBar;function build(){lb=ce('div');lb.className='ax-lb';lb.id='ax-lb';wrap=ce('div');wrap.className='ax-lb-wrap';img=ce('img');img.alt='Enlarged view';wrap.appendChild(img);closeBtn=mkBtn('ax-lb-btn ax-lb-close','\u2715');prevBtn=mkBtn('ax-lb-btn ax-lb-prev','\u2039');nextBtn=mkBtn('ax-lb-btn ax-lb-next','\u203A');zoomBadge=mkBadge('ax-lb-badge ax-lb-zoom','100%');counterBadge=mkBadge('ax-lb-badge ax-lb-counter','1 / 1');captionBadge=mkBadge('ax-lb-badge ax-lb-caption','');lb.appendChild(wrap);lb.appendChild(closeBtn);lb.appendChild(prevBtn);lb.appendChild(nextBtn);lb.appendChild(zoomBadge);lb.appendChild(counterBadge);lb.appendChild(captionBadge);document.body.appendChild(lb);progressBar=ce('div');progressBar.className='ax-progress';document.body.appendChild(progressBar);}function ce(t){return document.createElement(t)}function mkBtn(cls,txt){var b=ce('div');b.className=cls;b.textContent=txt;return b}function mkBadge(cls,txt){var b=ce('div');b.className=cls;b.textContent=txt;return b}function collectImages(){S.imgs=[];var els=document.querySelectorAll('.ax-post img[onclick]');for(var i=0;i<els.length;i++){S.imgs.push(els[i]);var parent=els[i].parentElement;if(!parent.classList.contains('ax-zoom-hint')){var hint=ce('span');hint.className='ax-zoom-hint';parent.insertBefore(hint,els[i]);hint.appendChild(els[i]);}(function(el){if(el.complete&&el.naturalWidth>0){el.style.opacity='1';}else{el.style.opacity='0';el.addEventListener('load',function(){this.style.opacity='1'});el.addEventListener('error',function(){this.style.opacity='1'});}})(els[i]);}}window.axZoom=function(el){for(var i=0;i<S.imgs.length;i++){if(S.imgs[i]===el){S.idx=i;break;}}resetZoom();img.src=el.src;img.alt=el.alt;updateUI();lb.classList.add('on');document.body.style.overflow='hidden';};function axClose(){lb.classList.remove('on');document.body.style.overflow='';resetZoom();img.src='';}function axNav(dir){if(S.scale>1.05)return;S.idx=(S.idx+dir+S.imgs.length)%S.imgs.length;resetZoom();img.style.opacity='0';setTimeout(function(){img.src=S.imgs[S.idx].src;img.alt=S.imgs[S.idx].alt;updateUI();img.style.opacity='1';},120);}function setZoom(ns,ox,oy){ns=Math.max(MIN,Math.min(MAX,ns));if(ox!==undefined&&oy!==undefined&&S.scale!==ns){var r=ns/S.scale;S.panX=ox-(ox-S.panX)*r;S.panY=oy-(oy-S.panY)*r;}if(ns<=1.05){S.panX=0;S.panY=0;ns=1;}S.scale=ns;clampPan();applyTransform();zoomBadge.textContent=Math.round(S.scale*100)+'%';wrap.classList.toggle('zoomed',S.scale>1.05);var hide=S.scale>1.05;prevBtn.classList.toggle('ax-lb-nav-hide',hide);nextBtn.classList.toggle('ax-lb-nav-hide',hide);counterBadge.style.display=hide?'none':'';}function resetZoom(){S.scale=1;S.panX=0;S.panY=0;S.dragging=false;wrap.classList.remove('zoomed','dragging');applyTransform();}function applyTransform(){img.style.transform='translate('+S.panX+'px,'+S.panY+'px) scale('+S.scale+')';}function clampPan(){if(S.scale<=1.05)return;var bx=(img.naturalWidth||img.offsetWidth)*S.scale/2;var by=(img.naturalHeight||img.offsetHeight)*S.scale/2;var mx=Math.max(0,bx-window.innerWidth*0.4);var my=Math.max(0,by-window.innerHeight*0.4);S.panX=Math.max(-mx,Math.min(mx,S.panX));S.panY=Math.max(-my,Math.min(my,S.panY));}function updateUI(){counterBadge.textContent=(S.idx+1)+' / '+S.imgs.length;zoomBadge.textContent=Math.round(S.scale*100)+'%';var alt=S.imgs[S.idx]?S.imgs[S.idx].alt:'';captionBadge.textContent=alt.length>60?alt.substring(0,57)+'...':alt;captionBadge.style.display=alt?'':'none';}function bindEvents(){closeBtn.addEventListener('click',axClose);lb.addEventListener('click',function(e){if(e.target===lb)axClose();});prevBtn.addEventListener('click',function(e){e.stopPropagation();axNav(-1);});nextBtn.addEventListener('click',function(e){e.stopPropagation();axNav(1);});var clickTimer=null;wrap.addEventListener('click',function(e){if(S.moved)return;if(clickTimer){clearTimeout(clickTimer);clickTimer=null;return;}clickTimer=setTimeout(function(){clickTimer=null;var r=wrap.getBoundingClientRect();var ox=e.clientX-r.left-r.width/2;var oy=e.clientY-r.top-r.height/2;if(S.scale<=1.05){setZoom(2.5,ox,oy);}else{setZoom(1);}},250);});wrap.addEventListener('dblclick',function(e){e.preventDefault();if(clickTimer){clearTimeout(clickTimer);clickTimer=null;}var r=wrap.getBoundingClientRect();var ox=e.clientX-r.left-r.width/2;var oy=e.clientY-r.top-r.height/2;if(S.scale<=1.05){setZoom(4,ox,oy);}else{setZoom(1);}});lb.addEventListener('wheel',function(e){e.preventDefault();var d=e.deltaY>0?-1:1;var ns=S.scale+(d*STEP*S.scale);var r=wrap.getBoundingClientRect();var ox=e.clientX-r.left-r.width/2;var oy=e.clientY-r.top-r.height/2;setZoom(ns,ox,oy);},{passive:false});wrap.addEventListener('mousedown',function(e){if(S.scale<=1.05)return;e.preventDefault();S.dragging=true;S.moved=false;S.dsx=e.clientX;S.dsy=e.clientY;S.dpx=S.panX;S.dpy=S.panY;wrap.classList.add('dragging');img.style.transition='none';});document.addEventListener('mousemove',function(e){if(!S.dragging)return;var dx=e.clientX-S.dsx,dy=e.clientY-S.dsy;if(Math.abs(dx)>3||Math.abs(dy)>3)S.moved=true;S.panX=S.dpx+dx;S.panY=S.dpy+dy;clampPan();applyTransform();});document.addEventListener('mouseup',function(){if(!S.dragging)return;S.dragging=false;wrap.classList.remove('dragging');img.style.transition='';});var lastDist=0,pinchOX=0,pinchOY=0;wrap.addEventListener('touchstart',function(e){if(e.touches.length===2){lastDist=tDist(e.touches);var m=tMid(e.touches);var r=wrap.getBoundingClientRect();pinchOX=m.x-r.left-r.width/2;pinchOY=m.y-r.top-r.height/2;}else if(e.touches.length===1&&S.scale>1.05){S.dragging=true;S.moved=false;S.dsx=e.touches[0].clientX;S.dsy=e.touches[0].clientY;S.dpx=S.panX;S.dpy=S.panY;img.style.transition='none';}});wrap.addEventListener('touchmove',function(e){e.preventDefault();if(e.touches.length===2){var nd=tDist(e.touches);var ns=S.scale*(nd/lastDist);setZoom(ns,pinchOX,pinchOY);lastDist=nd;}else if(e.touches.length===1&&S.dragging){var dx=e.touches[0].clientX-S.dsx,dy=e.touches[0].clientY-S.dsy;if(Math.abs(dx)>3||Math.abs(dy)>3)S.moved=true;S.panX=S.dpx+dx;S.panY=S.dpy+dy;clampPan();applyTransform();}},{passive:false});wrap.addEventListener('touchend',function(e){S.dragging=false;img.style.transition='';if(e.touches.length<2)lastDist=0;});document.addEventListener('keydown',function(e){if(!lb.classList.contains('on'))return;switch(e.key){case'Escape':axClose();break;case'ArrowLeft':axNav(-1);break;case'ArrowRight':axNav(1);break;case'+':case'=':setZoom(S.scale*1.3);break;case'-':case'_':setZoom(S.scale/1.3);break;case'0':setZoom(1);break;}});}function tDist(t){var dx=t[0].clientX-t[1].clientX,dy=t[0].clientY-t[1].clientY;return Math.sqrt(dx*dx+dy*dy);}function tMid(t){return{x:(t[0].clientX+t[1].clientX)/2,y:(t[0].clientY+t[1].clientY)/2};}function initReveal(){var els=document.querySelectorAll('.ax-post h2,.ax-post h3,.ax-card,.ax-media,.ax-pipeline,.ax-callout,.ax-result,.ax-cta,.ax-stats,.ax-table-wrap,.ax-step');for(var i=0;i<els.length;i++){els[i].classList.add('ax-reveal');}var obs=new IntersectionObserver(function(entries){entries.forEach(function(en){if(en.isIntersecting){en.target.classList.add('visible');obs.unobserve(en.target);}});},{threshold:0.12,rootMargin:'0px 0px -30px 0px'});for(var j=0;j<els.length;j++){obs.observe(els[j]);}}function initProgress(){window.addEventListener('scroll',function(){var p=document.querySelector('.ax-post');if(!p||!progressBar)return;var r=p.getBoundingClientRect();var scrolled=-r.top;var total=r.height-window.innerHeight;var pct=Math.max(0,Math.min(100,(scrolled/total)*100));progressBar.style.width=pct+'%';});}function initTOC(){var headings=document.querySelectorAll('.ax-post h2');if(headings.length<2)return;var nav=ce('nav');nav.className='ax-toc';var dots=[];for(var i=0;i<headings.length;i++){if(!headings[i].id)headings[i].id='ax-s'+i;var dot=ce('div');dot.className='ax-toc-dot';var lbl=ce('span');lbl.className='ax-toc-label';lbl.textContent=headings[i].textContent.length>22?headings[i].textContent.substring(0,20)+'..':headings[i].textContent;dot.appendChild(lbl);(function(h){dot.addEventListener('click',function(){h.scrollIntoView({behavior:'smooth'})});})(headings[i]);nav.appendChild(dot);dots.push(dot);}document.body.appendChild(nav);window.addEventListener('scroll',function(){var active=0;for(var i=0;i<headings.length;i++){if(headings[i].getBoundingClientRect().top<window.innerHeight*0.4)active=i;}for(var j=0;j<dots.length;j++){dots[j].classList.toggle('active',j===active);}});}if(document.readyState==='loading'){document.addEventListener('DOMContentLoaded',init);}else{init();}function init(){build();collectImages();bindEvents();initReveal();initProgress();initTOC();}})();")))();

Recent Posts

See All

Sign Up To learn More and Get Free Resources

Select an option you are interested in finding out more

Dunbogan NSW 2443

© 2023 by Sweetacres

0404885757

Thanks for submitting!

bottom of page