[](https://www.paloaltonetworks.com/?ts=markdown) * Sign In * Customer * Partner * Employee * [Login to download](https://www.paloaltonetworks.com/login?ts=markdown) * [Join us to become a member](https://www.paloaltonetworks.com/login?screenToRender=traditionalRegistration&ts=markdown) * EN * [USA (ENGLISH)](https://www.paloaltonetworks.com) * [AUSTRALIA (ENGLISH)](https://www.paloaltonetworks.com.au) * [BRAZIL (PORTUGUÉS)](https://www.paloaltonetworks.com.br) * [CANADA (ENGLISH)](https://www.paloaltonetworks.ca) * [CHINA (简体中文)](https://www.paloaltonetworks.cn) * [FRANCE (FRANÇAIS)](https://www.paloaltonetworks.fr) * [GERMANY (DEUTSCH)](https://www.paloaltonetworks.de) * [INDIA (ENGLISH)](https://www.paloaltonetworks.in) * [ITALY (ITALIANO)](https://www.paloaltonetworks.it) * [JAPAN (日本語)](https://www.paloaltonetworks.jp) * [KOREA (한국어)](https://www.paloaltonetworks.co.kr) * [LATIN AMERICA (ESPAÑOL)](https://www.paloaltonetworks.lat) * [MEXICO (ESPAÑOL)](https://www.paloaltonetworks.com.mx) * [SINGAPORE (ENGLISH)](https://www.paloaltonetworks.sg) * [SPAIN (ESPAÑOL)](https://www.paloaltonetworks.es) * [TAIWAN (繁體中文)](https://www.paloaltonetworks.tw) * [UK (ENGLISH)](https://www.paloaltonetworks.co.uk) * ![magnifying glass search icon to open search field](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/search-black.svg) * [Contact Us](https://www.paloaltonetworks.com/company/contact-sales?ts=markdown) * [What's New](https://www.paloaltonetworks.com/resources?ts=markdown) * [Get Support](https://support.paloaltonetworks.com/SupportAccount/MyAccount) * [Under Attack?](https://start.paloaltonetworks.com/contact-unit42.html) ![x close icon to close mobile navigation](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/x-black.svg) [![Palo Alto Networks logo](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/pan-logo-dark.svg)](https://www.paloaltonetworks.com/?ts=markdown) ![magnifying glass search icon to open search field](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/search-black.svg) * [](https://www.paloaltonetworks.com/?ts=markdown) * Products ![black arrow pointing left to go back to main navigation](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/arrow-right-black.svg) Products [AI-Powered Network Security Platform](https://www.paloaltonetworks.com/network-security?ts=markdown) * [AI Security](https://www.paloaltonetworks.com/precision-ai-security/secure-ai-by-design?ts=markdown) * [Prisma AIRS](https://www.paloaltonetworks.com/prisma/prisma-ai-runtime-security?ts=markdown) * [AI Access Security](https://www.paloaltonetworks.com/sase/ai-access-security?ts=markdown) * [Cloud Delivered Security Services](https://www.paloaltonetworks.com/network-security/security-subscriptions?ts=markdown) * [Advanced Threat Prevention](https://www.paloaltonetworks.com/network-security/advanced-threat-prevention?ts=markdown) * [Advanced URL Filtering](https://www.paloaltonetworks.com/network-security/advanced-url-filtering?ts=markdown) * [Advanced WildFire](https://www.paloaltonetworks.com/network-security/advanced-wildfire?ts=markdown) * [Advanced DNS Security](https://www.paloaltonetworks.com/network-security/advanced-dns-security?ts=markdown) * [Enterprise Data Loss Prevention](https://www.paloaltonetworks.com/sase/enterprise-data-loss-prevention?ts=markdown) * [Enterprise Device Security](https://www.paloaltonetworks.com/network-security/enterprise-device-security?ts=markdown) * [Medical Device Security](https://www.paloaltonetworks.com/network-security/medical-device-security?ts=markdown) * [OT Device Security](https://www.paloaltonetworks.com/network-security/ot-device-security?ts=markdown) * [SaaS Security](https://www.paloaltonetworks.com/sase/saas-security?ts=markdown) * [Next-Generation Firewalls](https://www.paloaltonetworks.com/network-security/next-generation-firewall?ts=markdown) * [Hardware Firewalls](https://www.paloaltonetworks.com/network-security/hardware-firewall-innovations?ts=markdown) * [Software Firewalls](https://www.paloaltonetworks.com/network-security/software-firewalls?ts=markdown) * [Strata Cloud Manager](https://www.paloaltonetworks.com/network-security/strata-cloud-manager?ts=markdown) * [SD-WAN for NGFW](https://www.paloaltonetworks.com/network-security/sd-wan-subscription?ts=markdown) * [PAN-OS](https://www.paloaltonetworks.com/network-security/pan-os?ts=markdown) * [Panorama](https://www.paloaltonetworks.com/network-security/panorama?ts=markdown) * [Secure Access Service Edge](https://www.paloaltonetworks.com/sase?ts=markdown) * [Prisma SASE](https://www.paloaltonetworks.com/sase?ts=markdown) * [Application Acceleration](https://www.paloaltonetworks.com/sase/app-acceleration?ts=markdown) * [Autonomous Digital Experience Management](https://www.paloaltonetworks.com/sase/adem?ts=markdown) * [Enterprise DLP](https://www.paloaltonetworks.com/sase/enterprise-data-loss-prevention?ts=markdown) * [Prisma Access](https://www.paloaltonetworks.com/sase/access?ts=markdown) * [Prisma Browser](https://www.paloaltonetworks.com/sase/prisma-browser?ts=markdown) * [Prisma SD-WAN](https://www.paloaltonetworks.com/sase/sd-wan?ts=markdown) * [Remote Browser Isolation](https://www.paloaltonetworks.com/sase/remote-browser-isolation?ts=markdown) * [SaaS Security](https://www.paloaltonetworks.com/sase/saas-security?ts=markdown) [AI-Driven Security Operations Platform](https://www.paloaltonetworks.com/cortex?ts=markdown) * [Cloud Security](https://www.paloaltonetworks.com/cortex/cloud?ts=markdown) * [Cortex Cloud](https://www.paloaltonetworks.com/cortex/cloud?ts=markdown) * [Application Security](https://www.paloaltonetworks.com/cortex/cloud/application-security?ts=markdown) * [Cloud Posture Security](https://www.paloaltonetworks.com/cortex/cloud/cloud-posture-security?ts=markdown) * [Cloud Runtime Security](https://www.paloaltonetworks.com/cortex/cloud/runtime-security?ts=markdown) * [Prisma Cloud](https://www.paloaltonetworks.com/prisma/cloud?ts=markdown) * [AI-Driven SOC](https://www.paloaltonetworks.com/cortex?ts=markdown) * [Cortex XSIAM](https://www.paloaltonetworks.com/cortex/cortex-xsiam?ts=markdown) * [Cortex XDR](https://www.paloaltonetworks.com/cortex/cortex-xdr?ts=markdown) * [Cortex AgentiX](https://www.paloaltonetworks.com/cortex/agentix?ts=markdown) * [Cortex XSOAR](https://www.paloaltonetworks.com/cortex/cortex-xsoar?ts=markdown) * [Cortex Exposure Management](https://www.paloaltonetworks.com/cortex/exposure-management?ts=markdown) * [Cortex Xpanse](https://www.paloaltonetworks.com/cortex/cortex-xpanse?ts=markdown) * [Cortex Advanced Email Security](https://www.paloaltonetworks.com/cortex/advanced-email-security?ts=markdown) * [Unit 42 Managed Detection \& Response](https://www.paloaltonetworks.com/cortex/managed-detection-and-response?ts=markdown) * [Unit 42 Managed XSIAM](https://www.paloaltonetworks.com/cortex/managed-xsiam?ts=markdown) * Solutions ![black arrow pointing left to go back to main navigation](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/arrow-right-black.svg) Solutions Secure AI by Design * [Secure AI Ecosystem](https://www.paloaltonetworks.com/prisma/prisma-ai-runtime-security?ts=markdown) * [Secure GenAI Usage](https://www.paloaltonetworks.com/sase/ai-access-security?ts=markdown) Network Security * [Cloud Network Security](https://www.paloaltonetworks.com/network-security/software-firewalls?ts=markdown) * [Data Center Security](https://www.paloaltonetworks.com/network-security/data-center?ts=markdown) * [DNS Security](https://www.paloaltonetworks.com/network-security/advanced-dns-security?ts=markdown) * [Intrusion Detection and Prevention](https://www.paloaltonetworks.com/network-security/advanced-threat-prevention?ts=markdown) * [Device Security](https://www.paloaltonetworks.com/network-security/device-security?ts=markdown) * [OT Security](https://www.paloaltonetworks.com/network-security/ot-device-security?ts=markdown) * [5G Security](https://www.paloaltonetworks.com/network-security/5g-security?ts=markdown) * [Secure All Apps, Users and Locations](https://www.paloaltonetworks.com/sase/secure-users-data-apps-devices?ts=markdown) * [Secure Branch Transformation](https://www.paloaltonetworks.com/sase/secure-branch-transformation?ts=markdown) * [Secure Work on Any Device](https://www.paloaltonetworks.com/sase/secure-work-on-any-device?ts=markdown) * [VPN Replacement](https://www.paloaltonetworks.com/sase/vpn-replacement-for-secure-remote-access?ts=markdown) * [Web \& Phishing Security](https://www.paloaltonetworks.com/network-security/advanced-url-filtering?ts=markdown) Cloud Security * [Application Security Posture Management (ASPM)](https://www.paloaltonetworks.com/cortex/cloud/application-security-posture-management?ts=markdown) * [Software Supply Chain Security](https://www.paloaltonetworks.com/cortex/cloud/software-supply-chain-security?ts=markdown) * [Code Security](https://www.paloaltonetworks.com/cortex/cloud/code-security?ts=markdown) * [Cloud Security Posture Management (CSPM)](https://www.paloaltonetworks.com/cortex/cloud/cloud-security-posture-management?ts=markdown) * [Cloud Infrastructure Entitlement Management (CIEM)](https://www.paloaltonetworks.com/cortex/cloud/cloud-infrastructure-entitlement-management?ts=markdown) * [Data Security Posture Management (DSPM)](https://www.paloaltonetworks.com/cortex/cloud/data-security-posture-management?ts=markdown) * [AI Security Posture Management (AI-SPM)](https://www.paloaltonetworks.com/cortex/cloud/ai-security-posture-management?ts=markdown) * [Cloud Detection \& Response](https://www.paloaltonetworks.com/cortex/cloud-detection-and-response?ts=markdown) * [Cloud Workload Protection (CWP)](https://www.paloaltonetworks.com/cortex/cloud/cloud-workload-protection?ts=markdown) * [Web Application \& API Security (WAAS)](https://www.paloaltonetworks.com/cortex/cloud/web-app-api-security?ts=markdown) Security Operations * [Cloud Detection \& Response](https://www.paloaltonetworks.com/cortex/cloud-detection-and-response?ts=markdown) * [Security Information and Event Management](https://www.paloaltonetworks.com/cortex/modernize-siem?ts=markdown) * [Network Security Automation](https://www.paloaltonetworks.com/cortex/network-security-automation?ts=markdown) * [Incident Case Management](https://www.paloaltonetworks.com/cortex/incident-case-management?ts=markdown) * [SOC Automation](https://www.paloaltonetworks.com/cortex/security-operations-automation?ts=markdown) * [Threat Intel Management](https://www.paloaltonetworks.com/cortex/threat-intel-management?ts=markdown) * [Managed Detection \& Response](https://www.paloaltonetworks.com/cortex/managed-detection-and-response?ts=markdown) * [Attack Surface Management](https://www.paloaltonetworks.com/cortex/cortex-xpanse/attack-surface-management?ts=markdown) * [Compliance Management](https://www.paloaltonetworks.com/cortex/cortex-xpanse/compliance-management?ts=markdown) * [Internet Operations Management](https://www.paloaltonetworks.com/cortex/cortex-xpanse/internet-operations-management?ts=markdown) * [Extended Data Lake (XDL)](https://www.paloaltonetworks.com/cortex/cortex-xdl?ts=markdown) * [Agentic Assistant](https://www.paloaltonetworks.com/cortex/cortex-agentic-assistant?ts=markdown) Endpoint Security * [Endpoint Protection](https://www.paloaltonetworks.com/cortex/endpoint-protection?ts=markdown) * [Extended Detection \& Response](https://www.paloaltonetworks.com/cortex/detection-and-response?ts=markdown) * [Ransomware Protection](https://www.paloaltonetworks.com/cortex/ransomware-protection?ts=markdown) * [Digital Forensics](https://www.paloaltonetworks.com/cortex/digital-forensics?ts=markdown) [Industries](https://www.paloaltonetworks.com/industry?ts=markdown) * [Public Sector](https://www.paloaltonetworks.com/industry/public-sector?ts=markdown) * [Financial Services](https://www.paloaltonetworks.com/industry/financial-services?ts=markdown) * [Manufacturing](https://www.paloaltonetworks.com/industry/manufacturing?ts=markdown) * [Healthcare](https://www.paloaltonetworks.com/industry/healthcare?ts=markdown) * [Small \& Medium Business Solutions](https://www.paloaltonetworks.com/industry/small-medium-business-portfolio?ts=markdown) * Services ![black arrow pointing left to go back to main navigation](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/arrow-right-black.svg) Services [Threat Intel and Incident Response Services](https://www.paloaltonetworks.com/unit42?ts=markdown) * [Assess](https://www.paloaltonetworks.com/unit42/assess?ts=markdown) * [AI Security Assessment](https://www.paloaltonetworks.com/unit42/assess/ai-security-assessment?ts=markdown) * [Attack Surface Assessment](https://www.paloaltonetworks.com/unit42/assess/attack-surface-assessment?ts=markdown) * [Breach Readiness Review](https://www.paloaltonetworks.com/unit42/assess/breach-readiness-review?ts=markdown) * [BEC Readiness Assessment](https://www.paloaltonetworks.com/bec-readiness-assessment?ts=markdown) * [Cloud Security Assessment](https://www.paloaltonetworks.com/unit42/assess/cloud-security-assessment?ts=markdown) * [Compromise Assessment](https://www.paloaltonetworks.com/unit42/assess/compromise-assessment?ts=markdown) * [Cyber Risk Assessment](https://www.paloaltonetworks.com/unit42/assess/cyber-risk-assessment?ts=markdown) * [M\&A Cyber Due Diligence](https://www.paloaltonetworks.com/unit42/assess/mergers-acquisitions-cyber-due-diligence?ts=markdown) * [Penetration Testing](https://www.paloaltonetworks.com/unit42/assess/penetration-testing?ts=markdown) * [Purple Team Exercises](https://www.paloaltonetworks.com/unit42/assess/purple-teaming?ts=markdown) * [Ransomware Readiness Assessment](https://www.paloaltonetworks.com/unit42/assess/ransomware-readiness-assessment?ts=markdown) * [SOC Assessment](https://www.paloaltonetworks.com/unit42/assess/soc-assessment?ts=markdown) * [Supply Chain Risk Assessment](https://www.paloaltonetworks.com/unit42/assess/supply-chain-risk-assessment?ts=markdown) * [Tabletop Exercises](https://www.paloaltonetworks.com/unit42/assess/tabletop-exercise?ts=markdown) * [Unit 42 Retainer](https://www.paloaltonetworks.com/unit42/retainer?ts=markdown) * [Respond](https://www.paloaltonetworks.com/unit42/respond?ts=markdown) * [Cloud Incident Response](https://www.paloaltonetworks.com/unit42/respond/cloud-incident-response?ts=markdown) * [Digital Forensics](https://www.paloaltonetworks.com/unit42/respond/digital-forensics?ts=markdown) * [Incident Response](https://www.paloaltonetworks.com/unit42/respond/incident-response?ts=markdown) * [Managed Detection and Response](https://www.paloaltonetworks.com/unit42/respond/managed-detection-response?ts=markdown) * [Managed Threat Hunting](https://www.paloaltonetworks.com/unit42/respond/managed-threat-hunting?ts=markdown) * [Managed XSIAM](https://www.paloaltonetworks.com/cortex/managed-xsiam?ts=markdown) * [Unit 42 Retainer](https://www.paloaltonetworks.com/unit42/retainer?ts=markdown) * [Transform](https://www.paloaltonetworks.com/unit42/transform?ts=markdown) * [IR Plan Development and Review](https://www.paloaltonetworks.com/unit42/transform/incident-response-plan-development-review?ts=markdown) * [Security Program Design](https://www.paloaltonetworks.com/unit42/transform/security-program-design?ts=markdown) * [Virtual CISO](https://www.paloaltonetworks.com/unit42/transform/vciso?ts=markdown) * [Zero Trust Advisory](https://www.paloaltonetworks.com/unit42/transform/zero-trust-advisory?ts=markdown) [Global Customer Services](https://www.paloaltonetworks.com/services?ts=markdown) * [Education \& Training](https://www.paloaltonetworks.com/services/education?ts=markdown) * [Professional Services](https://www.paloaltonetworks.com/services/consulting?ts=markdown) * [Success Tools](https://www.paloaltonetworks.com/services/customer-success-tools?ts=markdown) * [Support Services](https://www.paloaltonetworks.com/services/solution-assurance?ts=markdown) * [Customer Success](https://www.paloaltonetworks.com/services/customer-success?ts=markdown) [![](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/logo-unit-42.svg) UNIT 42 RETAINER Custom-built to fit your organization's needs, you can choose to allocate your retainer hours to any of our offerings, including proactive cyber risk management services. Learn how you can put the world-class Unit 42 Incident Response team on speed dial. Learn more](https://www.paloaltonetworks.com/unit42/retainer?ts=markdown) * Partners ![black arrow pointing left to go back to main navigation](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/arrow-right-black.svg) Partners NextWave Partners * [NextWave Partner Community](https://www.paloaltonetworks.com/partners?ts=markdown) * [Cloud Service Providers](https://www.paloaltonetworks.com/partners/nextwave-for-csp?ts=markdown) * [Global Systems Integrators](https://www.paloaltonetworks.com/partners/nextwave-for-gsi?ts=markdown) * [Technology Partners](https://www.paloaltonetworks.com/partners/technology-partners?ts=markdown) * [Service Providers](https://www.paloaltonetworks.com/partners/service-providers?ts=markdown) * [Solution Providers](https://www.paloaltonetworks.com/partners/nextwave-solution-providers?ts=markdown) * [Managed Security Service Providers](https://www.paloaltonetworks.com/partners/managed-security-service-providers?ts=markdown) * [XMDR Partners](https://www.paloaltonetworks.com/partners/managed-security-service-providers/xmdr?ts=markdown) Take Action * [Portal Login](https://www.paloaltonetworks.com/partners/nextwave-partner-portal?ts=markdown) * [Managed Services Program](https://www.paloaltonetworks.com/partners/managed-security-services-provider-program?ts=markdown) * [Become a Partner](https://paloaltonetworks.my.site.com/NextWavePartnerProgram/s/partnerregistration?type=becomepartner) * [Request Access](https://paloaltonetworks.my.site.com/NextWavePartnerProgram/s/partnerregistration?type=requestaccess) * [Find a Partner](https://paloaltonetworks.my.site.com/NextWavePartnerProgram/s/partnerlocator) [CYBERFORCE CYBERFORCE represents the top 1% of partner engineers trusted for their security expertise. Learn more](https://www.paloaltonetworks.com/cyberforce?ts=markdown) * Company ![black arrow pointing left to go back to main navigation](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/arrow-right-black.svg) Company Palo Alto Networks * [About Us](https://www.paloaltonetworks.com/about-us?ts=markdown) * [Management Team](https://www.paloaltonetworks.com/about-us/management?ts=markdown) * [Investor Relations](https://investors.paloaltonetworks.com) * [Locations](https://www.paloaltonetworks.com/about-us/locations?ts=markdown) * [Ethics \& Compliance](https://www.paloaltonetworks.com/company/ethics-and-compliance?ts=markdown) * [Corporate Responsibility](https://www.paloaltonetworks.com/about-us/corporate-responsibility?ts=markdown) * [Military \& Veterans](https://jobs.paloaltonetworks.com/military) [Why Palo Alto Networks?](https://www.paloaltonetworks.com/why-paloaltonetworks?ts=markdown) * [Precision AI Security](https://www.paloaltonetworks.com/precision-ai-security?ts=markdown) * [Our Platform Approach](https://www.paloaltonetworks.com/why-paloaltonetworks/platformization?ts=markdown) * [Accelerate Your Cybersecurity Transformation](https://www.paloaltonetworks.com/why-paloaltonetworks/nam-cxo-portfolio?ts=markdown) * [Awards \& Recognition](https://www.paloaltonetworks.com/about-us/awards?ts=markdown) * [Customer Stories](https://www.paloaltonetworks.com/customers?ts=markdown) * [Global Certifications](https://www.paloaltonetworks.com/legal-notices/trust-center/compliance?ts=markdown) * [Trust 360 Program](https://www.paloaltonetworks.com/resources/whitepapers/trust-360?ts=markdown) Careers * [Overview](https://jobs.paloaltonetworks.com/) * [Culture \& Benefits](https://jobs.paloaltonetworks.com/en/culture/) [A Newsweek Most Loved Workplace "Businesses that do right by their employees" Read more](https://www.paloaltonetworks.com/company/press/2021/palo-alto-networks-secures-top-ranking-on-newsweek-s-most-loved-workplaces-list-for-2021?ts=markdown) * More ![black arrow pointing left to go back to main navigation](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/arrow-right-black.svg) More Resources * [Blog](https://www.paloaltonetworks.com/blog/?ts=markdown) * [Unit 42 Threat Research](https://unit42.paloaltonetworks.com/) * [Communities](https://www.paloaltonetworks.com/communities?ts=markdown) * [Content Library](https://www.paloaltonetworks.com/resources?ts=markdown) * [Cyberpedia](https://www.paloaltonetworks.com/cyberpedia?ts=markdown) * [Tech Insider](https://techinsider.paloaltonetworks.com/) * [Knowledge Base](https://knowledgebase.paloaltonetworks.com/) * [Palo Alto Networks TV](https://tv.paloaltonetworks.com/) * [Perspectives of Leaders](https://www.paloaltonetworks.com/perspectives/?ts=markdown) * [Cyber Perspectives Magazine](https://www.paloaltonetworks.com/cybersecurity-perspectives/cyber-perspectives-magazine?ts=markdown) * [Regional Cloud Locations](https://www.paloaltonetworks.com/products/regional-cloud-locations?ts=markdown) * [Tech Docs](https://docs.paloaltonetworks.com/) * [Security Posture Assessment](https://www.paloaltonetworks.com/security-posture-assessment?ts=markdown) * [Threat Vector Podcast](https://unit42.paloaltonetworks.com/unit-42-threat-vector-podcast/) * [Packet Pushers Podcasts](https://www.paloaltonetworks.com/podcasts/packet-pusher?ts=markdown) Connect * [LIVE community](https://live.paloaltonetworks.com/) * [Events](https://events.paloaltonetworks.com/) * [Executive Briefing Center](https://www.paloaltonetworks.com/about-us/executive-briefing-program?ts=markdown) * [Demos](https://www.paloaltonetworks.com/demos?ts=markdown) * [Contact us](https://www.paloaltonetworks.com/company/contact-sales?ts=markdown) [Blog Stay up-to-date on industry trends and the latest innovations from the world's largest cybersecurity Learn more](https://www.paloaltonetworks.com/blog/) * Sign In ![black arrow pointing left to go back to main navigation](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/arrow-right-black.svg) Sign In * Customer * Partner * Employee * [Login to download](https://www.paloaltonetworks.com/login?ts=markdown) * [Join us to become a member](https://www.paloaltonetworks.com/login?screenToRender=traditionalRegistration&ts=markdown) * EN ![black arrow pointing left to go back to main navigation](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/arrow-right-black.svg) Language * [USA (ENGLISH)](https://www.paloaltonetworks.com) * [AUSTRALIA (ENGLISH)](https://www.paloaltonetworks.com.au) * [BRAZIL (PORTUGUÉS)](https://www.paloaltonetworks.com.br) * [CANADA (ENGLISH)](https://www.paloaltonetworks.ca) * [CHINA (简体中文)](https://www.paloaltonetworks.cn) * [FRANCE (FRANÇAIS)](https://www.paloaltonetworks.fr) * [GERMANY (DEUTSCH)](https://www.paloaltonetworks.de) * [INDIA (ENGLISH)](https://www.paloaltonetworks.in) * [ITALY (ITALIANO)](https://www.paloaltonetworks.it) * [JAPAN (日本語)](https://www.paloaltonetworks.jp) * [KOREA (한국어)](https://www.paloaltonetworks.co.kr) * [LATIN AMERICA (ESPAÑOL)](https://www.paloaltonetworks.lat) * [MEXICO (ESPAÑOL)](https://www.paloaltonetworks.com.mx) * [SINGAPORE (ENGLISH)](https://www.paloaltonetworks.sg) * [SPAIN (ESPAÑOL)](https://www.paloaltonetworks.es) * [TAIWAN (繁體中文)](https://www.paloaltonetworks.tw) * [UK (ENGLISH)](https://www.paloaltonetworks.co.uk) * [Contact Us](https://www.paloaltonetworks.com/company/contact-sales?ts=markdown) * [What's New](https://www.paloaltonetworks.com/resources?ts=markdown) * [Get support](https://support.paloaltonetworks.com/SupportAccount/MyAccount) * [Under Attack?](https://start.paloaltonetworks.com/contact-unit42.html) * [Demos and Trials](https://www.paloaltonetworks.com/get-started?ts=markdown) Search All * [Tech Docs](https://docs.paloaltonetworks.com/search) Close search modal [Deploy Bravely --- Secure your AI transformation with Prisma AIRS](https://www.deploybravely.com) [](https://www.paloaltonetworks.com/?ts=markdown) 1. [Cyberpedia](https://www.paloaltonetworks.com/cyberpedia?ts=markdown) 2. [Network Security](https://www.paloaltonetworks.com/cyberpedia/network-security?ts=markdown) 3. [Firewall Management](https://www.paloaltonetworks.com/cyberpedia/what-is-firewall-management?ts=markdown) 4. [What Is Firewall Management?](https://www.paloaltonetworks.com/cyberpedia/what-is-firewall-management?ts=markdown) Table of Contents * [Why is firewall management important?](#why) * [What are the main types of firewalls?](#what) * [What are the key components of firewall management?](#key) * [Who should be responsible for managing firewalls?](#responsible) * [What are the main firewall management challenges?](#main) * [Top 6 best practices for firewall management](#top) * [How to choose the right firewall management system for your needs](#choose) * [Firewall management FAQs](#faqs) # What Is Firewall Management? 5 min. read Table of Contents * [Why is firewall management important?](#why) * [What are the main types of firewalls?](#what) * [What are the key components of firewall management?](#key) * [Who should be responsible for managing firewalls?](#responsible) * [What are the main firewall management challenges?](#main) * [Top 6 best practices for firewall management](#top) * [How to choose the right firewall management system for your needs](#choose) * [Firewall management FAQs](#faqs) 1. Why is firewall management important? * [1. Why is firewall management important?](#why) * [2. What are the main types of firewalls?](#what) * [3. What are the key components of firewall management?](#key) * [4. Who should be responsible for managing firewalls?](#responsible) * [5. What are the main firewall management challenges?](#main) * [6. Top 6 best practices for firewall management](#top) * [7. How to choose the right firewall management system for your needs](#choose) * [8. Firewall management FAQs](#faqs) Firewall management is the process of configuring, monitoring, and maintaining firewalls to ensure they effectively protect a network. It involves setting up rules to allow or block specific traffic, regularly auditing these rules, and monitoring logs to detect and respond to potential security incidents. Effective firewall management ensures vulnerabilities are addressed, threats are mitigated, and network operations remain secure and uninterrupted. ## Why is firewall management important? Firewall management is crucial for maintaining the security and integrity of a network. [Firewalls](https://www.paloaltonetworks.com/cyberpedia/what-is-a-firewall?ts=markdown) act as a barrier between internal networks and potential external threats. They filter traffic to prevent unauthorized access and cyberattacks. Proper firewall management ensures these protective measures are consistently effective and up-to-date. Without regular management, firewalls can become ineffective. Outdated rules and configurations may not address new threats, leaving networks vulnerable. For example: Old or conflicting firewall rules can be exploited by attackers and compromise the entire system. Regular audits and updates are necessary to close these gaps and strengthen defenses. ![Firewall misconfiguration attack example](https://www.paloaltonetworks.com/content/dam/pan/en_US/images/cyberpedia/what-is-firewall-management/firewall-misconfiguration-attack-example.png) Effective firewall management also optimizes network performance. By regularly reviewing and updating firewall rules, administrators can prevent bottlenecks and make sure data flow is smooth. Establishing a balance between security and performance helps maintain efficient operations without compromising protection. Plus, firewall management is essential for compliance with industry standards and regulations. Standards like the payment card industry data security standard (PCI DSS) require strict firewall configurations to protect sensitive data. Regularly managing firewalls helps organizations adhere to these requirements and avoid potential legal and financial penalties. [![See how Strata Cloud Manager makes firewall management easy.](https://www.paloaltonetworks.com/content/dam/pan/en_US/images/cyberpedia/what-is-firewall-management/banner-dg-see-how-strata-cloud-manager-makes-firewall-management-easy.png)](https://www.paloaltonetworks.com/resources/webcasts/strata-cloud-manager-demo?ts=markdown) ## What are the main types of firewalls? Before we dive into the details of firewall management, it's important to first establish the different [types of firewalls](https://www.paloaltonetworks.com/cyberpedia/types-of-firewalls?ts=markdown) available. Here's why: Modern organizations use a broad range of firewall products for effective [network security](https://www.paloaltonetworks.com/cyberpedia/what-is-network-security?ts=markdown). In general, they all have the same objective: serve as the first line of defense by scrutinizing and controlling network traffic to thwart potential cyber threats. However, every firewall uses a distinct process to achieve this goal. *** ** * ** *** ***Note:** There are many types of firewalls, often categorized by system protected, form factor, network placement, and data filtering method. Organizations may require multiple firewall types for effective network security. Also, one firewall product can deliver multiple firewall types.* *** ** * ** *** For the purposes of the topic of firewall management, we can break the main types of firewalls down as follows: * Proxy firewalls * Traditional firewalls * Next-generation firewalls (NGFWs) * Cloud firewalls Let's dive into the details of each. ### Proxy firewalls ![Proxy Firewall](https://www.paloaltonetworks.com/content/dam/pan/en_US/images/cyberpedia/what-is-firewall-management/proxy-firewall.png) [Proxy firewalls](https://www.paloaltonetworks.com/cyberpedia/what-is-a-proxy-firewall?ts=markdown) serve as intermediaries between internal users and external networks. They work by intercepting and analyzing incoming and outgoing traffic at the application layer. Which means that instead of allowing direct connections, proxy firewalls process requests and responses on behalf of users. As a result, they add an extra layer of security. And that prevents potential threats from directly reaching the internal network. However, the process can introduce latency---making proxy firewalls slower compared to other firewall products. ### Traditional firewalls [Traditional firewalls](https://www.paloaltonetworks.com/cyberpedia/what-is-a-firewall?ts=markdown) operate at the network or transport layer. They use predefined rules to control traffic flow based on IP addresses, port numbers, and protocols. ![Traditional Firewall](https://www.paloaltonetworks.com/content/dam/pan/en_US/images/cyberpedia/what-is-firewall-management/traditional-firewall.png) There are two main types of traditional firewalls: stateless and stateful. Stateless firewalls, also known as [packet filtering firewalls](https://www.paloaltonetworks.com/cyberpedia/what-is-a-packet-filtering-firewall?ts=markdown), inspect packets individually without considering past traffic patterns. ![Packet Filtering Firewall](https://www.paloaltonetworks.com/content/dam/pan/en_US/images/cyberpedia/what-is-firewall-management/packet-filtering-firewall.png) Stateful firewalls, also known as [stateful inspection firewalls](https://www.paloaltonetworks.com/cyberpedia/what-is-a-stateful-firewall?ts=markdown), maintain context about active connections, which allows more informed decision-making. ![Stateful Inspection Firewall](https://www.paloaltonetworks.com/content/dam/pan/en_US/images/cyberpedia/what-is-firewall-management/stateful-inspection-firewall.png) Traditional firewalls were historically common in many network security setups because they have a straightforward, relatively effective approach to filtering traffic. ### Next-generation firewalls (NGFWs) ![Next-Generation Firewall](https://www.paloaltonetworks.com/content/dam/pan/en_US/images/cyberpedia/what-is-firewall-management/next-generation-firewall.png) Next-generation firewalls (NGFW) build upon the capabilities of traditional firewalls by incorporating advanced features, including but not limited to: * Deep packet inspection * Intrusion prevention * Application traffic analysis and control * Cloud-sourced threat intelligence * Advanced malware detection and prevention NGFWs can identify and control applications regardless of port, protocol, or IP address used. They can also detect and block sophisticated threats like malware and exploits. ### Cloud firewalls ![Cloud firewall (FWaaS)](https://www.paloaltonetworks.com/content/dam/pan/en_US/images/cyberpedia/what-is-firewall-management/cloud-firewall-fwaas.png) Cloud firewalls, also known as [firewall-as-a-service (FWaaS](https://www.paloaltonetworks.com/cyberpedia/what-is-firewall-as-a-service?ts=markdown)), are a variation of [software firewalls](https://www.paloaltonetworks.com/cyberpedia/what-is-a-software-firewall?ts=markdown) which protect cloud infrastructure and applications. They offer similar functionalities to traditional and next-generation firewalls but are hosted in the cloud. Which makes them scalable and easy to deploy. Cloud firewalls are ideal for organizations with cloud-based environments. They can also provide centralized security management to protect distributed network resources with consistent policies. ## What are the key components of firewall management? Firewall management is a multifaceted process that's crucial for maintaining network security. Effective firewall management involves: * Policy control * Configuration * Rule management * Change management * Compliance * Performance optimization * Monitoring * Automation Each component plays a vital role in protecting against evolving threats. ### Policy control Policy control is the foundation of firewall management. It involves defining the rules that determine which traffic is allowed or blocked. Rules are based on factors like source and destination IP addresses, port numbers, and protocols. Like this: ![Strata Cloud Manager unified policy management](https://www.paloaltonetworks.com/content/dam/pan/en_US/images/cyberpedia/what-is-firewall-management/strate-cloud-manager-unified-policy-management.png) Proper policy control ensures that the firewall enforces the organization's security policies, allowing legitimate traffic while blocking potential threats. ### Firewall configuration The initial setup of a firewall is critical. [Firewall configuration](https://www.paloaltonetworks.com/cyberpedia/what-is-firewall-configuration?ts=markdown) involves setting up rules and parameters that dictate how the firewall handles incoming and outgoing network traffic. ![Firewall configuration process](https://www.paloaltonetworks.com/content/dam/pan/en_US/images/cyberpedia/what-is-firewall-management/firewall-configuration-process.png) The firewall configuration process includes: * Securing the firewall * Designing firewall zones and IP address structure * Implementing access control lists (ACLs) * Activating additional services and logging * Testing the configuration * Ongoing monitoring and management A properly configured firewall establishes a strong foundation for network security. ### Firewall rule management Managing [firewall rules](https://www.paloaltonetworks.com/cyberpedia/what-are-firewall-rules?ts=markdown) is an ongoing process: ![Firewall rule management process](https://www.paloaltonetworks.com/content/dam/pan/en_US/images/cyberpedia/what-is-firewall-management/firewall-rule-management-process.png) Firewall rule management involves identifying and removing outdated or redundant rules to streamline performance and enhance security. Doing reviews and optimization activities regularly ensures firewall rules align with current security policies and effectively mitigate emerging threats. Managing rules consistently also maintains optimal firewall performance. *** ** * ** *** ***Note:** Policy control and rule management are related but distinct concepts in firewall management. Policy control defines the overarching rules for traffic flow based on security policies, while firewall rule management involves the ongoing maintenance and optimization of these rules to ensure effective performance and security.* *** ** * ** *** ### Firewall change management Firewalls have to be kept current with the latest patches and updates to address known vulnerabilities. Change management involves regularly applying updates and patches to the firewall software: ![Firewall change management process](https://www.paloaltonetworks.com/content/dam/pan/en_US/images/cyberpedia/what-is-firewall-management/firewall-change-management-process.png) The process reduces security risks and keeps the firewall effective against any new exploits and threats. Good change management majorly influences network security. ### Ensuring firewall compliance Adhering to industry-specific regulations and compliance standards are another pretty important part of managing firewalls. Making sure firewall configurations and policies meet regulatory requirements helps organizations protect sensitive data. Not to mention avoid compliance violations. Regular audits and reviews are necessary to maintain compliance and address any gaps in security practices. ![Firewall compliance audit steps](https://www.paloaltonetworks.com/content/dam/pan/en_US/images/cyberpedia/what-is-firewall-management/firewall-compliance-audit-steps.png) ### Firewall performance optimization Firewall performance management focuses on ongoing maintenance and tuning so the firewall operates efficiently. Which includes troubleshooting any issues that may impact network security or throughput. ![Identifying and classifying firewall rule anomalies for performance tuning](https://www.paloaltonetworks.com/content/dam/pan/en_US/images/cyberpedia/what-is-firewall-management/identifying-and-classifying-firewall-rule-anomalies.png) **For example:** Consider a scenario where a shadow anomaly occurs. Let's say you have two rules in your firewall rule set, like this: **Rule 1:** `Allow traffic from IP range 192.168.1.0/24 to any destination on port 80.` **Rule 2:** `Deny traffic from IP 192.168.1.50 to any destination on port 80.` As you can see, Rule 1 is more general and allows traffic from the entire 192.168.1.0/24 network to any destination on port 80. But Rule 2 is specific to a single IP address within that range (192.168.1.50). Which means that Rule 2 is shadowed by Rule 1 because Rule 1 allows traffic from the entire subnet, including 192.168.1.50, making the deny action of Rule 2 ineffective. To resolve the shadow anomaly, Rule 2 should be placed before Rule 1 in the rule set. Firewall rules are typically processed in order, so the specific deny action would be applied before the general allow rule. In other words, the correct order looks like this: **Rule 2:** `Deny traffic from IP 192.168.1.50 to any destination on port 80.` **Rule 1:** `Allow traffic from IP range 192.168.1.0/24 to any destination on port 80.` This is an example of a critical task in firewall performance management: ensuring that rules are optimized for both security and efficiency. By optimizing performance, organizations can maintain a stable, resilient network environment. And be sure the firewall doesn't become a bottleneck. ### Monitoring and reporting Continuous monitoring and reporting are yet another essential element of maintaining a secure network and managing firewalls. Analyzing firewall logs and activity gives network and security admins helpful insights into security trends and policy effectiveness. ![Using PAN-OS Application Command Center dashboard to review network activity](https://www.paloaltonetworks.com/content/dam/pan/en_US/images/cyberpedia/what-is-firewall-management/using-pan-os-application-command-center-dashboard.png) Plus, regular reports help identify any gaps in security and areas for improvement. This way, firewall management practices stay effective. ### Automation Automation can majorly improve the firewall management process. Automation tools help analyze traffic patterns, suggest rule optimizations, and ensure consistency across multiple firewalls. For example: ![Using Cortex Expanse to collection information on over-permissive firewall rules](https://www.paloaltonetworks.com/content/dam/pan/en_US/images/cyberpedia/what-is-firewall-management/using-cortex-expanses-to-collect-information.png) It also reduces the risk of human error **and** makes managing complex firewall environments a lot more efficient. *** ** * ** *** ***Further reading:*** * [What Is Firewall Configuration? | How to Configure a Firewall](https://www.paloaltonetworks.com/cyberpedia/what-is-firewall-configuration?ts=markdown) * [How to Troubleshoot a Firewall | Firewall Issues \& Solutions](https://www.paloaltonetworks.com/cyberpedia/how-to-troubleshoot-common-firewall-issues?ts=markdown) *** ** * ** *** ## Who should be responsible for managing firewalls? Managing firewalls is a key part of keeping the network secure. Needless to say, deciding who should handle the job is important to make sure firewalls are set up, maintained, and monitored properly. So, who should manage firewalls and why does it matter? Doing firewall management right requires a team effort. One that involves various roles within the organization. The IT and network security team are the main players. They should be handling configuration, monitoring, and responding to incidents. For organizations who don't have the in-house expertise needed for effective firewall management: Outsourcing to managed security service providers (MSSPs) is an option. MSSPs bring specialized knowledge and 24/7 monitoring capabilities. If your IT and network security staff are limited, going with this option will allow the resources you do have to focus on core business activities. Also: While IT security teams and network admins handle the day-to-day activities, it's worth mentioning that other roles often have a vested interest firewall management: * **Compliance officers** are sometimes involved in verifying that firewall configurations and policies meet regulatory standards. Although compliance officers aren't part of the daily technical tasks, they do work with network and security personnel to conduct regular audits and reviews. * **Executive leadership** might be a part of setting the strategic direction for the organization's security posture. They also allocate resources. Executive influence is usually focused on making sure firewall management procedure aligns with business objectives and risk management strategies. ## What are the main firewall management challenges? ![Top 3 firewall management challenges](https://www.paloaltonetworks.com/content/dam/pan/en_US/images/cyberpedia/what-is-firewall-management/top-3-firewall-management-challenges.png) As with all network security activities, managing firewalls does come with several challenges, though none that can't be overcome. Most network admins would agree that firewall rules, changes, and user access are the quintessential obstacles that come along with staying on top of firewalls. ### Navigating the complexity of firewall rules One of the biggest challenges in firewall management is dealing with the complexity of rules. Firewalls often have hundreds or thousands of rules. And managing them can become overwhelming. Not to mention, over time, rules can become outdated, redundant, or conflict with each other. Optimizing firewall rules involves regular reviews to ensure they're effective, up-to-date, and don't introduce unnecessary complexity. ### Keeping up with dynamic network environments Modern networks are super dynamic. Traffic patterns, applications, and user behaviors change frequently. Which means firewalls have to adapt in real time. Firewalls have to be configured to accommodate changes---and without compromising security. So, network and security personnel have to monitor and adjust firewall rules constantly to make sure they're working with current network conditions. ### Balancing security with user access needs Dealing with user access is one of the biggest challenges when it comes to firewall management. That's because firewalls have to control access for both internal and remote users. And that includes those with privileged access. The core issue here is really about balancing security with accessibility. Firewalls have to allow legitimate users to work without unnecessary hindrance. At the same time, they need to block unauthorized access. Implementing multi-factor authentication and role-based access control helps keep a balance. Monitoring user activities regularly also makes it easier to stay on top of access. ## Top 6 best practices for firewall management ![6 best practices for firewall management](https://www.paloaltonetworks.com/content/dam/pan/en_US/images/cyberpedia/what-is-firewall-management/6-best-practices-for-firewall-management.png) Let's explore the top best practices for managing firewalls. These tactics help protect against external threats, minimize internal security risks, and ensure that the network remains secure and compliant with regulatory requirements. Remember: firewall management is an ongoing process. ### 1. Block all access by default When configuring a firewall, always start with a default-deny policy. Which means blocking all incoming and outgoing traffic---unless explicitly allowed by other rules. This will reduce the risk of unauthorized access by only permitting traffic that meets specific security criteria. ### 2. Regularly audit firewall rules and policies Conducting regular audits of firewall rules and policies is essential. As discussed, over time, rules can become outdated, redundant, or conflicting. Audits help identify and remove these issues. This way, the firewall remains efficient and secure. Reviewing logs and monitoring changes are fundamental parts of the process. Auditing is really about refining and optimizing firewall settings on an ongoing basis. ### 3. Keep the firewall up to date Keep firewall software and firmware up to date at all times. No exceptions. Vendors frequently release updates that address vulnerabilities, add new features, and improve performance. Stay on top of them. Updates allow firewalls to defend against new threats and function optimally. *** ** * ** *** ***Tip:** Automate firewall software and firmware updates where possible to streamline this process.* *** ** * ** *** ### 4. Keep track of authorized users Limit who has access to firewall settings liberally. Monitor always. Only senior network admins or designated security personnel should have the ability to modify firewall configurations. Implement role-based access controls (RBAC) so that users only have the permissions necessary for their roles. Don't forget to regularly review user access and monitor any changes to help prevent unauthorized modifications. ### 5. Use a centralized firewall management system Deploying a centralized firewall management system streamlines rule management, policy enforcement, and monitoring across the network. Centralization enhances visibility and control, making it easier to maintain consistent security measures and respond to incidents. ### 6. Train and educate staff Investing in training and education for staff involved in firewall management is essential. Ensuring that they are knowledgeable about best practices, security threats, and the latest technologies helps maintain a high level of network security. Regular training sessions and staying updated with industry developments are key components of this practice. ## How to choose the right firewall management system for your needs ![How to choose the right firewall management system for your needs](https://www.paloaltonetworks.com/content/dam/pan/en_US/images/cyberpedia/what-is-firewall-management/how-to-choose-the-right-firewall-management-system.png) Choosing the right firewall management system is crucial for maintaining network security and ensuring efficient operations. With numerous options available, it can be challenging to determine which system best fits your organization's needs. Here's a guide to help you make an informed decision. ### Assess your network size and complexity First, evaluate the size and complexity of your network. Smaller networks may require simpler solutions, while larger, more complex networks need advanced features and scalability. Understanding your network's structure and needs will help you narrow down your options. ### Ensure scalability Choose a firewall management system that can scale with your organization. As your business grows, the system should handle increasing traffic, users, and devices without compromising performance. ### Look for integration capabilities Select a system that integrates seamlessly with your existing security tools and systems. This includes SIEM (Security Information and Event Management) systems, intrusion detection systems, and threat intelligence platforms. ### Opt for automation features Choose a system with automation capabilities for rule creation, policy enforcement, and threat detection. Automation reduces manual workload, minimizes errors, and ensures timely responses to security incidents. ### Check for a user-friendly interface Ensure the system has a user-friendly interface. The system should be easy to navigate, with clear dashboards and intuitive controls, helping administrators quickly configure, monitor, and manage firewalls. ### Verify security and compliance support Ensure the firewall management system supports compliance with industry standards and regulatory requirements like PCI DSS, HIPAA, or GDPR. The system should provide regular updates to address new vulnerabilities and threats. ### Evaluate vendor support and reputation Research the vendor's reputation and the level of support they offer. Reliable customer support and a solid track record can make a significant difference in the effectiveness of your firewall management system. Check reviews, testimonials, and case studies. ### Demand robust reporting and analytics Choose a system that provides detailed reports on firewall activities, rule effectiveness, and potential threats. These insights help in making informed decisions and optimizing firewall configurations. ### Assess cost and budget Ensure the chosen system is cost-effective. Compare pricing models, including initial costs, subscription fees, and potential hidden charges. Ensure the system provides good value for the features and support offered. [![Try Strata Cloud Manager free for 90 days.](https://www.paloaltonetworks.com/content/dam/pan/en_US/images/cyberpedia/what-is-firewall-management/banner-dg-try-strate-cloud-manager-free.png)](https://start.paloaltonetworks.com/strata-cloud-manager-free-trial.html) ## Firewall management FAQs ### What is a management firewall? A management firewall is a system or tool used to configure, monitor, and maintain firewalls. It ensures that firewalls effectively protect a network by setting up rules to allow or block specific traffic, regularly auditing these rules, and monitoring logs for potential security incidents. ### What is firewall rule management? Firewall rule management involves creating, reviewing, and updating the rules that determine which traffic is allowed or blocked by the firewall. This process ensures the firewall rules align with current firewall security policies and effectively mitigate threats. ### What are the 3 types of firewalls? The three main types of firewalls are proxy firewalls, which act as intermediaries between users and networks; traditional firewalls, which filter traffic based on predefined rules at the network or transport layer; and next-generation firewalls (NGFW), which include advanced features like deep packet inspection and intrusion prevention. ### What does a firewall manager do? A firewall manager configures, monitors, and maintains firewalls to protect the network. They set up rules, conduct audits, monitor logs, respond to security incidents, and ensure compliance with security policies. ### What does a firewall administrator do? A firewall administrator manages the day-to-day operations of firewalls, including configuring rules, monitoring traffic, troubleshooting issues, and ensuring that firewalls are updated and effective against current threats. Related content [Solution brief: Strata Cloud Manager^™^ Get the details on Strata Cloud Manager^™^, the first AI-Powered management and operations solution.](https://www.paloaltonetworks.com/resources/techbriefs/strata-cloud-manager?ts=markdown) [Blog: Hotel Customer Simplifies Network Security with Strata Cloud Manager See how this hotel makes changes to firewall policies with just a few clicks.](https://www.paloaltonetworks.com/blog/network-security/netsec-strata-cloud-manager/) [Video: Strata Cloud Manager^™^ Discover Strata Cloud Manager^™^: a better way to easily manage your Palo Alto Networks infrastructure.](https://www.paloaltonetworks.com/resources/videos/strata-cloud-manager?ts=markdown) [White paper: Modernize Your Network Security With Artificial Intelligence Learn key principles to adopting a zero trust, AI-powered approach to network security.](https://www.paloaltonetworks.com/resources/whitepapers/modernize-your-network-security-with-artificial-intelligence?ts=markdown) ![Share page on facebook](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/resources/facebook-circular-icon.svg) ![Share page on linkedin](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/resources/linkedin-circular-icon.svg) [![Share page by an email](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/resources/email-circular-icon.svg)](mailto:?subject=What%20Is%20Firewall%20Management%3F%20%7C%20A%20Comprehensive%20Guide&body=Firewall%20management%20is%20the%20process%20of%20configuring%2C%20monitoring%2C%20and%20maintaining%20firewalls%20to%20ensure%20they%20effectively%20protect%20a%20network.%20at%20https%3A//www.paloaltonetworks.com/cyberpedia/what-is-firewall-management) Back to Top {#footer} ## Products and Services * [AI-Powered Network Security Platform](https://www.paloaltonetworks.com/network-security?ts=markdown) * [Secure AI by Design](https://www.paloaltonetworks.com/precision-ai-security/secure-ai-by-design?ts=markdown) * [Prisma AIRS](https://www.paloaltonetworks.com/prisma/prisma-ai-runtime-security?ts=markdown) * [AI Access Security](https://www.paloaltonetworks.com/sase/ai-access-security?ts=markdown) * [Cloud Delivered Security Services](https://www.paloaltonetworks.com/network-security/security-subscriptions?ts=markdown) * [Advanced Threat Prevention](https://www.paloaltonetworks.com/network-security/advanced-threat-prevention?ts=markdown) * [Advanced URL Filtering](https://www.paloaltonetworks.com/network-security/advanced-url-filtering?ts=markdown) * [Advanced WildFire](https://www.paloaltonetworks.com/network-security/advanced-wildfire?ts=markdown) * [Advanced DNS Security](https://www.paloaltonetworks.com/network-security/advanced-dns-security?ts=markdown) * [Enterprise Data Loss Prevention](https://www.paloaltonetworks.com/sase/enterprise-data-loss-prevention?ts=markdown) * [Enterprise IoT Security](https://www.paloaltonetworks.com/network-security/enterprise-device-security?ts=markdown) * [Medical IoT Security](https://www.paloaltonetworks.com/network-security/medical-device-security?ts=markdown) * [Industrial OT Security](https://www.paloaltonetworks.com/network-security/medical-device-security?ts=markdown) * [SaaS Security](https://www.paloaltonetworks.com/sase/saas-security?ts=markdown) * [Next-Generation Firewalls](https://www.paloaltonetworks.com/network-security/next-generation-firewall?ts=markdown) * [Hardware Firewalls](https://www.paloaltonetworks.com/network-security/hardware-firewall-innovations?ts=markdown) * [Software Firewalls](https://www.paloaltonetworks.com/network-security/software-firewalls?ts=markdown) * [Strata Cloud Manager](https://www.paloaltonetworks.com/network-security/strata-cloud-manager?ts=markdown) * [SD-WAN for NGFW](https://www.paloaltonetworks.com/network-security/sd-wan-subscription?ts=markdown) * [PAN-OS](https://www.paloaltonetworks.com/network-security/pan-os?ts=markdown) * [Panorama](https://www.paloaltonetworks.com/network-security/panorama?ts=markdown) * [Secure Access Service Edge](https://www.paloaltonetworks.com/sase?ts=markdown) * [Prisma SASE](https://www.paloaltonetworks.com/sase?ts=markdown) * [Application Acceleration](https://www.paloaltonetworks.com/sase/app-acceleration?ts=markdown) * [Autonomous Digital Experience Management](https://www.paloaltonetworks.com/sase/adem?ts=markdown) * [Enterprise DLP](https://www.paloaltonetworks.com/sase/enterprise-data-loss-prevention?ts=markdown) * [Prisma Access](https://www.paloaltonetworks.com/sase/access?ts=markdown) * [Prisma Browser](https://www.paloaltonetworks.com/sase/prisma-browser?ts=markdown) * [Prisma SD-WAN](https://www.paloaltonetworks.com/sase/sd-wan?ts=markdown) * [Remote Browser Isolation](https://www.paloaltonetworks.com/sase/remote-browser-isolation?ts=markdown) * [SaaS Security](https://www.paloaltonetworks.com/sase/saas-security?ts=markdown) * [AI-Driven Security Operations Platform](https://www.paloaltonetworks.com/cortex?ts=markdown) * [Cloud Security](https://www.paloaltonetworks.com/cortex/cloud?ts=markdown) * [Cortex Cloud](https://www.paloaltonetworks.com/cortex/cloud?ts=markdown) * [Application Security](https://www.paloaltonetworks.com/cortex/cloud/application-security?ts=markdown) * [Cloud Posture Security](https://www.paloaltonetworks.com/cortex/cloud/cloud-posture-security?ts=markdown) * [Cloud Runtime Security](https://www.paloaltonetworks.com/cortex/cloud/runtime-security?ts=markdown) * [Prisma Cloud](https://www.paloaltonetworks.com/prisma/cloud?ts=markdown) * [AI-Driven SOC](https://www.paloaltonetworks.com/cortex?ts=markdown) * [Cortex XSIAM](https://www.paloaltonetworks.com/cortex/cortex-xsiam?ts=markdown) * [Cortex XDR](https://www.paloaltonetworks.com/cortex/cortex-xdr?ts=markdown) * [Cortex XSOAR](https://www.paloaltonetworks.com/cortex/cortex-xsoar?ts=markdown) * [Cortex Xpanse](https://www.paloaltonetworks.com/cortex/cortex-xpanse?ts=markdown) * [Unit 42 Managed Detection \& Response](https://www.paloaltonetworks.com/cortex/managed-detection-and-response?ts=markdown) * [Managed XSIAM](https://www.paloaltonetworks.com/cortex/managed-xsiam?ts=markdown) * [Threat Intel and Incident Response Services](https://www.paloaltonetworks.com/unit42?ts=markdown) * [Proactive Assessments](https://www.paloaltonetworks.com/unit42/assess?ts=markdown) * [Incident Response](https://www.paloaltonetworks.com/unit42/respond?ts=markdown) * [Transform Your Security Strategy](https://www.paloaltonetworks.com/unit42/transform?ts=markdown) * [Discover Threat Intelligence](https://www.paloaltonetworks.com/unit42/threat-intelligence-partners?ts=markdown) ## Company * [About Us](https://www.paloaltonetworks.com/about-us?ts=markdown) * [Careers](https://jobs.paloaltonetworks.com/en/) * [Contact Us](https://www.paloaltonetworks.com/company/contact-sales?ts=markdown) * [Corporate Responsibility](https://www.paloaltonetworks.com/about-us/corporate-responsibility?ts=markdown) * [Customers](https://www.paloaltonetworks.com/customers?ts=markdown) * [Investor Relations](https://investors.paloaltonetworks.com/) * [Location](https://www.paloaltonetworks.com/about-us/locations?ts=markdown) * [Newsroom](https://www.paloaltonetworks.com/company/newsroom?ts=markdown) ## Popular Links * [Blog](https://www.paloaltonetworks.com/blog/?ts=markdown) * [Communities](https://www.paloaltonetworks.com/communities?ts=markdown) * [Content Library](https://www.paloaltonetworks.com/resources?ts=markdown) * [Cyberpedia](https://www.paloaltonetworks.com/cyberpedia?ts=markdown) * [Event Center](https://events.paloaltonetworks.com/) * [Manage Email Preferences](https://start.paloaltonetworks.com/preference-center) * [Products A-Z](https://www.paloaltonetworks.com/products/products-a-z?ts=markdown) * [Product Certifications](https://www.paloaltonetworks.com/legal-notices/trust-center/compliance?ts=markdown) * [Report a Vulnerability](https://www.paloaltonetworks.com/security-disclosure?ts=markdown) * [Sitemap](https://www.paloaltonetworks.com/sitemap?ts=markdown) * [Tech Docs](https://docs.paloaltonetworks.com/) * [Unit 42](https://unit42.paloaltonetworks.com/) * [Do Not Sell or Share My Personal Information](https://panwedd.exterro.net/portal/dsar.htm?target=panwedd) ![PAN logo](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/pan-logo-dark.svg) * [Privacy](https://www.paloaltonetworks.com/legal-notices/privacy?ts=markdown) * [Trust Center](https://www.paloaltonetworks.com/legal-notices/trust-center?ts=markdown) * [Terms of Use](https://www.paloaltonetworks.com/legal-notices/terms-of-use?ts=markdown) * [Documents](https://www.paloaltonetworks.com/legal?ts=markdown) Copyright © 2026 Palo Alto Networks. All Rights Reserved * [![Youtube](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/social/youtube-black.svg)](https://www.youtube.com/user/paloaltonetworks) * [![Podcast](https://www.paloaltonetworks.com/content/dam/pan/en_US/images/icons/podcast.svg)](https://www.paloaltonetworks.com/podcasts/threat-vector?ts=markdown) * [![Facebook](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/social/facebook-black.svg)](https://www.facebook.com/PaloAltoNetworks/) * [![LinkedIn](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/social/linkedin-black.svg)](https://www.linkedin.com/company/palo-alto-networks) * [![Twitter](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/social/twitter-x-black.svg)](https://twitter.com/PaloAltoNtwks) * EN Select your language