Home
EN
Location
Documentation Home
Palo Alto Networks
Support
Live Community
Knowledge Base
Clear
Data Center Best Practice Security Policy
:
Data Center Security Policy Rulebase Order
Updated on
Aug 28, 2023
Focus
Download PDF
Updated on
Aug 28, 2023
Focus
Home
Best Practices
Data Center Best Practice Security Policy
Data Center Security Policy Best Practices Checklist
Deploy Data Center Best Practices
Data Center Security Policy Rulebase Order
Download PDF
Data Center Best Practice Security Policy
Data Center Security Policy Rulebase Order
Table of Contents
Filter
Version
10.0 (EoL)
10.2
10.1
10.0 (EoL)
9.1 (EoL)
Expand all
|
Collapse all
Data Center Security Policy Best Practices Checklist
Plan Your Data Center Best Practice Deployment
Deploy Data Center Best Practices
Global Data Center Objects, Policies, and Actions
User Data Center Traffic Policies
Internet-to-Data-Center Traffic Policies
Data-Center-to-Internet Traffic Policies
Intra-Data-Center Traffic Policies
Data Center Security Policy Rulebase Order
Follow Post-Deployment Data Center Best Practices
Data Center Best Practice Security Policy
What Is a Data Center Best Practice Security Policy?
Why Do I Need a Data Center Best Practice Security Policy?
Data Center Best Practice Methodology
How Do I Deploy a Data Center Best Practice Security Policy?
How to Assess Your Data Center
How to Decrypt Data Center Traffic
Create the Data Center Best Practice Decryption Profiles
Exclude Unsuitable Traffic from Data Center Decryption
Create a Data Center Segmentation Strategy
How to Segment the Data Center
How to Segment Data Center Applications
How to Create Data Center Best Practice Security Profiles
Create the Data Center Best Practice Antivirus Profile
Create the Data Center Best Practice Anti-Spyware Profile
Create the Data Center Best Practice Vulnerability Protection Profile
Create the Data Center Best Practice File Blocking Profile
Create the Data Center Best Practice WildFire Analysis Profile
Use Cortex XDR Agent to Protect Data Center Endpoints
Create Data Center Traffic Block Rules
Define the Initial User-to-Data-Center Traffic Security Policy
User-to-Data-Center Traffic Security Approaches
Create User-to-Data-Center Application Allow Rules
Create User-to-Data-Center Authentication Policy Rules
Create User-to-Data-Center Decryption Policy Rules
Define the Initial Internet-to-Data-Center Traffic Security Policy
Internet-to-Data-Center Traffic Security Approach
Create Internet-to-Data-Center Application Allow Rules
Create Internet-to-Data-Center Decryption Policy Rules
Create Internet-to-Data-Center DoS Protection Policy Rules
Define the Initial Data-Center-to-Internet Traffic Security Policy
Data-Center-to-Internet Traffic Security Approaches
Create Data-Center-to-Internet Application Allow Rules
Create Data-Center-to-Internet Decryption Policy Rules
Define the Initial Intra-Data-Center Traffic Security Policy
Intra-Data-Center Traffic Security Approach
Create Intra-Data-Center Application Allow Rules
Create Intra-Data-Center Decryption Policy Rules
Order the Data Center Security Policy Rulebase
Log and Monitor Data Center Traffic
What Data Center Traffic to Log and Monitor
Monitor Data Center Block Rules and Tune the Rulebase
Log Intra Data Center Traffic That Matches the Intrazone Allow Rule
Log Data Center Traffic That Matches No Interzone Rules
Maintain the Data Center Best Practice Rulebase
Use Palo Alto Networks Assessment and Review Tools
End-of-Life (EoL)
Data Center Security Policy Rulebase Order
Order the rules properly in the Security policy rulebase to ensure that you allow only the applications and traffic you intend to allow and so that no rule shadows another rule.
Order the Data Center Security policy rulebase
shows the full rulebase from the previous examples (allow and block rules) in the correct order and explains each rule’s placement.
Previous
Intra-Data-Center Traffic Policies
Next
Follow Post-Deployment Data Center Best Practices