Best Practices

Use the Palo Alto Networks technologies to protect against data theft, malware, and damage to your reputation. Identify the risks and proactively address the security challenges on your network with best practice guidelines that ensure detection and prevention at different stages of the attack life cycle.

Documentation


Data Center

Protect your valuable data and intellectual property from a data center breach. 


Securing Administrative Access

Follow these guidelines to ensure you are securing administrative access to your firewalls  in a way that will prevent successful cyberattacks.


Security Profiles

Best practice settings for each of the security profiles that you should attach to every Security policy rule.

Internet Gateway

Protect your network from an attacker who tries to gain access to your network through users accessing the internet.

 

Ways to Strengthen Your Internet Gateway

Top recommended actions you can implement to strengthen your internet gateway. 


Protection Against Layer 4 and Layer 7 Evasions

Use these best practices to secure your network by preventing Layer 4 and Layer 7 attacks.


Decryption

Decrypt network traffic to inspect it and expose hidden threats that lurk in the ever-increasing amount of encrypted traffic.

WildFire

Follow these WildFire best practices to best prevent and detect zero-day malware.


Application and Threat Content Updates

Follow these best practices to enable seamless Applications and Threats updates.


DoS and Zone Protection Best Practices

Learn how to use Zone and DoS protection profiles, and packet buffer protection to secure your network from a Denial-of-Service (DoS) attack.

 

 

Videos


How to Implement App-ID on Your Next-Generation Firewall

Watch the video to learn how to implement App-ID on your next-generation firewall to protect against increasingly evasive threats and prevent successful cyber breaches.

 

How to Implement User-ID on Your Next-Generation Firewall

Watch the video to learn how to implement User-ID on your next-generation firewall to maximize your security investments and defend your business from successful cyber attacks.

 

Find the Hidden Threats in Your Traffic

Next-generation firewalls from Palo Alto Networks® decrypt, inspect and then re-encrypt network traffic before it is sent to its destination.

 

 

 

Webinars


How to Prevent Breaches through Application Controls

About this webinar

Employees are accessing any application they want, using work or personal devices, regardless of the business and security risks involved.

Join the webinar and discover:

  • How attackers use apps to infect and exfiltrate data 
  • How to use app control the right way to prevent breaches 
  • How to extend visibility and control to SaaS apps

How to Implement User-Based Controls for Cybersecurity

About this webinar

Visibility and policy control based on users is critical for cybersecurity. User-based policies readily show their business relevance, are more secure, easier to manage, and allow better forensics. In this webinar you will:

  • Learn the value of user-based controls using real-life data breach examples 
  • Discover a step-by-step approach for implementing User-IDTM on your Palo Alto Networks Next-Generation Firewall

Enabling and Deploying Your SSL Decryption

About this webinar

The growth in SSL/TLS encrypted traffic traversing the internet is on an explosive upturn. Given the primary benefits associated with encryption, the private and secure exchange of information over the internet, compliance with certain privacy and security regulations – such as the Health Insurance Portability and Accountability Act and Payment Card Industry Data Security Standard, or HIPAA and PCI DSS – the trend in SSL adoption is expected to continue to rise.

Watch as our Palo Alto Networks® team of experts presents the “hows and whys” of SSL decryption. In this webcast, you will:

  • Learn why you need to enable decryption and the key metrics to support your case
  • Find out how to address internal logistics and legal considerations
  • Discover how to effectively plan and deploy decryption