If you’re already familiar with Palo Alto Networks’ platform,
this checklist streamlines deploying security best practices in
your data center to safeguard your most valuable assets.
Implement data center best practices when
you create Security profiles, Decryption profiles, Security policy
rules, Authentication policy rules, and Decryption policy rules.
For
Security, Authentication, and DoS policy rules,
configure log forwarding to Panorama or
external services to centralize logs for convenient viewing and
analysis, with notifications.