At Palo Alto Networks, it’s our mission to develop products and services that help you, our customer, detect and prevent successful cyberattacks. We’ve developed our best practice documentation to help you do just that. Whether you’re looking for the best way to secure administrative access to your next-gen firewalls and Panorama, create best practice security policy to safely enable application access at the internet gateway and the data center, or learn the best way roll out a decryption policy to prevent threats from sneaking into your network, you will find the guidance you need here in our best practice documentation. And, our best practice library keeps growing and evolving to keep up with the ever-changing threat landscape, so be sure to check back often!
Documents, checklists, videos, webinars, best practice assessment tools, and more help you learn about and apply security best practices.
Use the Panorama Best Practices to help manage and secure your firewalls.
Firewalls and Panorama centralized management servers are the gatekeepers and protectors of your network. To prevent attackers from gaining access to these devices and reconfiguring them to permit malicious access to your network, follow these best practices to secure administrative access.
Learn the best practices for managing firewalls centrally using Panorama.
You can't defend against threats you can’t see. By enabling decryption on your next-gen firewalls you can inspect and control SSL/TLS and SSH traffic so that you can detect and prevent threats that would otherwise remain hidden in encrypted traffic. Use the best practice guidelines in this site to learn how to plan for and deploy decryption in your organization.
Internet access exposes your network to risk from malicious websites, phishing scams, and other types of cyberattacks. Create best practices internet gateway security policy to safely enable applications, users, and content while protecting your network.
Protect against DoS attacks that try to take down your network and critical devices using a layered approach that defends your network perimeter, zones, and individual devices.
Eliminate implicit trust from your enterprise and continuously validate every stage of a digital transaction to secure your enterprise.
Security policy best practices for rule construction, including profiles and logging, rulebase order, Policy Optimizer, the App-ID Cloud Engine (ACE), and SaaS and IoT Policy Recommendation.
Firewalls and Panorama centralized management servers are the gatekeepers and protectors of your network. To prevent attackers from gaining access to these devices and reconfiguring them to permit malicious access to your network, follow these best practices to secure administrative access.
Learn the best practices for using WildFire as part of your network threat detection and prevention solution.
Learn the best practices for keeping application and threat content signatures up-to-date seamlessly.
Apply best practices during the planning, deployment, and maintenance of your IoT Security implementation.
Learn the best practices for implementing User-ID so that you know and control every user on your network.
Use the URL Filtering best practices to guide you how to reduce your exposure to web-based threats, without limiting your users’ access to web content that they need.
To monitor and protect your network from most Layer 4 and Layer 7 attacks, follow our best practice recommendations.
Block malicious traffic, including viruses, vulnerability exploits, bad file types, bad websites, and more.
Click "View BPA+ Playlist" to access all of the BPA+ videos, including best practice network security checks and a demo.
About this webinar
App-ID increases the value of our next-generation firewalls by making it easier and faster to determine the exact identity of applications traversing the network, enabling teams to set and enforce the right policies.
Join Palo Alto Networks experts and learn how you can use the New Policy Optimizer capability to migrate your legacy rule set to App-ID based rules. In this webcast, you will:
About this webinar
Employees are accessing any application they want, using work or personal devices, regardless of the business and security risks involved.
Join the webinar and discover:
About this webinar
Visibility and policy control based on users is critical for cybersecurity. User-based policies readily show their business relevance, are more secure, easier to manage, and allow better forensics. In this webinar you will:
About this webinar
The growth in SSL/TLS encrypted traffic traversing the internet is on an explosive upturn. Given the primary benefits associated with encryption, the private and secure exchange of information over the internet, compliance with certain privacy and security regulations – such as the Health Insurance Portability and Accountability Act and Payment Card Industry Data Security Standard, or HIPAA and PCI DSS – the trend in SSL adoption is expected to continue to rise.
Watch as our Palo Alto Networks® team of experts presents the “hows and whys” of SSL decryption. In this webcast, you will: