Discover what’s really driving the shift toward unified security
Discover how geopolitical tensions are fueling advanced cyber campaigns
Is the Quantum Threat Closer Than You Think?
  • Sign In
    • Customer
    • Partner
    • Employee
    • Login to download
    • Join us to become a member
  • EN
    • USA (ENGLISH)
    • AUSTRALIA (ENGLISH)
    • BRAZIL (PORTUGUÉS)
    • CANADA (ENGLISH)
    • CHINA (简体中文)
    • FRANCE (FRANÇAIS)
    • GERMANY (DEUTSCH)
    • INDIA (ENGLISH)
    • ITALY (ITALIANO)
    • JAPAN (日本語)
    • KOREA (한국어)
    • LATIN AMERICA (ESPAÑOL)
    • MEXICO (ESPAÑOL)
    • SINGAPORE (ENGLISH)
    • SPAIN (ESPAÑOL)
    • TAIWAN (繁體中文)
    • UK (ENGLISH)
  • magnifying glass search icon to open search field
  • Contact Us
  • What's New
  • Get Support
  • Under Attack?
Palo Alto Networks logo
  • Products
    Products
    AI-Powered Network Security Platform
    • Secure AI by Design
    • Prisma AIRS
    • AI Access Security
    • Cloud Delivered Security Services
    • Advanced Threat Prevention
    • Advanced URL Filtering
    • Advanced WildFire
    • Advanced DNS Security
    • Enterprise Data Loss Prevention
    • Enterprise IoT Security
    • Medical IoT Security
    • Industrial OT Security
    • SaaS Security
    • Next-Generation Firewalls
    • Hardware Firewalls
    • Software Firewalls
    • Strata Cloud Manager
    • SD-WAN for NGFW
    • PAN-OS
    • Panorama
    • Secure Access Service Edge
    • Prisma SASE
    • Application Acceleration
    • Autonomous Digital Experience Management
    • Enterprise DLP
    • Prisma Access
    • Prisma Access Browser
    • Prisma SD-WAN
    • Remote Browser Isolation
    • SaaS Security
    AI-Driven Security Operations Platform
    • Cloud Security
    • Cortex Cloud
    • Application Security
    • Cloud Posture Security
    • Cloud Detection & Response
    • Prisma Cloud
    • AI-Driven SOC
    • Cortex XSIAM
    • Cortex XDR
    • Cortex XSOAR
    • Cortex Xpanse
    • Unit 42 Managed Detection & Response
    • Unit 42 Managed XSIAM
  • Solutions
    Solutions
    AI Security
    • Secure AI Ecosystem
    • Secure GenAI Usage
    Network Security
    • Cloud Network Security
    • Data Center Security
    • DNS Security
    • Intrusion Detection and Prevention
    • IoT Security
    • 5G Security
    • Secure All Apps, Users and Locations
    • Secure Branch Transformation
    • Secure Work on Any Device
    • VPN Replacement
    • Web & Phishing Security
    Cloud Security
    • Application Security Posture Management (ASPM)
    • Software Supply Chain Security
    • Code Security
    • Cloud Security Posture Management (CSPM)
    • Cloud Infrastructure Entitlement Management (CIEM)
    • Data Security Posture Management (DSPM)
    • AI Security Posture Management (AI-SPM)
    • Cloud Detection & Response
    • Cloud Workload Protection (CWP)
    • Web Application & API Security (WAAS)
    Security Operations
    • Cloud Detection & Response
    • Network Security Automation
    • Incident Case Management
    • SOC Automation
    • Threat Intel Management
    • Managed Detection & Response
    • Attack Surface Management
    • Compliance Management
    • Internet Operations Management
    Endpoint Security
    • Endpoint Protection
    • Extended Detection & Response
    • Ransomware Protection
    • Digital Forensics
    Industries
    • Public Sector
    • Financial Services
    • Manufacturing
    • Healthcare
    • Small & Medium Business Solutions
  • Services
    Services
    Threat Intel and Incident Response Services
    • Assess
    • AI Security Assessment
    • Attack Surface Assessment
    • Breach Readiness Review
    • BEC Readiness Assessment
    • Cloud Security Assessment
    • Compromise Assessment
    • Cyber Risk Assessment
    • M&A Cyber Due Diligence
    • Penetration Testing
    • Purple Team Exercises
    • Ransomware Readiness Assessment
    • SOC Assessment
    • Supply Chain Risk Assessment
    • Tabletop Exercises
    • Unit 42 Retainer
    • Respond
    • Cloud Incident Response
    • Digital Forensics
    • Incident Response
    • Managed Detection and Response
    • Managed Threat Hunting
    • Managed XSIAM
    • Unit 42 Retainer
    • Transform
    • IR Plan Development and Review
    • Security Program Design
    • Virtual CISO
    • Zero Trust Advisory
    Global Customer Services
    • Education & Training
    • Professional Services
    • Success Tools
    • Support Services
    • Customer Success
    UNIT 42 RETAINER

    Custom-built to fit your organization's needs, you can choose to allocate your retainer hours to any of our offerings, including proactive cyber risk management services. Learn how you can put the world-class Unit 42 Incident Response team on speed dial.

    Learn more
  • Partners
    Partners
    NextWave Partners
    • NextWave Partner Community
    • Cloud Service Providers
    • Global Systems Integrators
    • Technology Partners
    • Service Providers
    • Solution Providers
    • Managed Security Service Providers
    Take Action
    • Portal Login
    • Managed Services Program
    • Become a Partner
    • Request Access
    • Find a Partner
    CYBERFORCE

    CYBERFORCE represents the top 1% of partner engineers trusted for their security expertise.

    Learn more
  • Company
    Company
    Palo Alto Networks
    • About Us
    • Management Team
    • Investor Relations
    • Locations
    • Ethics & Compliance
    • Corporate Responsibility
    • Military & Veterans
    Why Palo Alto Networks?
    • Precision AI Security
    • Our Platform Approach
    • Accelerate Your Cybersecurity Transformation
    • Awards & Recognition
    • Customer Stories
    • Global Certifications
    • Trust 360 Program
    Careers
    • Overview
    • Culture & Benefits
    A Newsweek Most Loved Workplace

    "Businesses that do right by their employees"

    Read more
  • More
    More
    Resources
    • Blog
    • Unit 42 Threat Research
    • Communities
    • Content Library
    • Cyberpedia
    • Tech Insider
    • Knowledge Base
    • Palo Alto Networks TV
    • Perspectives of Leaders
    • Cyber Perspectives Magazine
    • Regional Cloud Locations
    • Tech Docs
    • Security Posture Assessment
    • Threat Vector Podcast
    Connect
    • LIVE community
    • Events
    • Executive Briefing Center
    • Demos
    • Contact us
    Blog

    Stay up-to-date on industry trends and the latest innovations from the world's largest cybersecurity

    Learn more
  • Sign In
    Sign In
    • Customer
    • Partner
    • Employee
    • Login to download
    • Join us to become a member
  • EN
    Language
    • USA (ENGLISH)
    • AUSTRALIA (ENGLISH)
    • BRAZIL (PORTUGUÉS)
    • CANADA (ENGLISH)
    • CHINA (简体中文)
    • FRANCE (FRANÇAIS)
    • GERMANY (DEUTSCH)
    • INDIA (ENGLISH)
    • ITALY (ITALIANO)
    • JAPAN (日本語)
    • KOREA (한국어)
    • LATIN AMERICA (ESPAÑOL)
    • MEXICO (ESPAÑOL)
    • SINGAPORE (ENGLISH)
    • SPAIN (ESPAÑOL)
    • TAIWAN (繁體中文)
    • UK (ENGLISH)
  • Contact Us
  • What's New
  • Get support
  • Under Attack?
  • Demos and Trials
Search
  • Tech Docs

Customer support plan

Register your device and create a support portal account

Entitlement: Support is available to you for registered devices with active support licenses.

Registration: Register your device and create an account online at: https://support.paloaltonetworks.com. Enter the serial number of your Palo Alto Networks firewall and customer account number from your Order Summary. Entitlement will be verified and your Support Portal access will be available for online services. Once your account is created, you can either add additional users from your company or have your users self-register. You will be able to manage your firewalls by:

  • Activating license subscriptions
  • Monitoring expiration dates
  • Controlling device visibility to other users

Additionally, you have the option to be a member of many accounts if you manage devices for other companies.

Getting Support: Once registered, the following options are available:

  • Online Support Resources - Solve your questions online using our knowledgebase and user discussion forums.
  • License Keys and Upgrades - Activate license keys and download the latest software updates, App-IDs, threat, and anti-virus protection.
  • Online Case Management - Create, update, and manage all your cases directly online. Authorized Support Centers providing "Premium Partner Support," may submit online cases on behalf of their customers

Online resources

Palo Alto Networks online services offer you time-saving tools to solve problems, answer questions, and improve knowledge and capability.

  • LIVEcommunity - Find answers to common questions and connect with peers to troubleshoot, get tips and tricks, and gain access to useful tools to help you secure your Palo Alto Networks environment.
  • KnowledgeBase - Search solutions and technical documents describing common problems and steps to resolve them.
  • KnowledgePoint - Find answers, exchange information, and share experiences with your technical peers.
  • DevCenter - The online community shares ideas and custom content as well as tools to create it. All do-it-yourself types are welcome!
  • Create and Track a Case - Create support cases, add comments, and view your status updates 24 hours a day.
  • Software and Dynamic Updates - Find software updates for all of your Palo Alto Networks products and get the latest Application and Content-IDs.
  • Applipedia and Threat Database - Verify App-IDs, vulnerabilities, and spyware covered by your Palo Alto Networks firewall.
  • Documentation and Announcements - Updated product documentation, announcements, release notes, and alerts are posted regularly online for downloading and printing.

Open a support case

  • Create a case online (RECOMMENDED) at https://support.paloaltonetworks.com. Include your Palo Alto Networks firewall serial number, problem description, severity, and attach relevant files and screenshots. When you submit your case, you will be offered a selection of articles, which may resolve your issue. If not, your case will be assigned to an engineer who will either contact you by phone or an email generated by comments added to your case. Your email replies will automatically append to the case. You may check the status of your case and provide comments at any time online.
  • Call Support for Severity 1 (Network Down) issues. We recommend creating a case online and referring to the case number when calling. Please refer to Product Support phone numbers.

End of life policy

Learn more

Product warranty

Learn more

Support policies

Learn more

Support Program Summary

Support Entitlement

Focused Services*

Platinum Support

Premium Support

Standard Support

Online Support

Yes - 24x365x7

Yes - 24x365x7

Yes - 24x365x7

Yes - 24x365x7

Telephone Support

Yes – 24x7x365

Yes – 24x7x365

Yes – 24x7x365

No

Designated Technical Support Engineer

Yes, Plus and Elite

No

No

No

Services Account Manager

Yes

No

No

No

Advance Replacement - 4 Hour Parts Delivery

Yes, Optional Add-on**

Yes, Optional Add-on**

Yes, Optional Add-on**

No

Advance Replacement - Next Business Day Delivery ***

Yes

Yes

Yes

No

Return and Repair Hardware Replacement

No

No

No

Yes

Initial Response Times

 

 

 

 

Severity 1 - Critical

< 1 Hour

<15 Minutes

< 1 Hour

<2 Hours

Severity 2 - High

2 Hours

30 Minutes

2 Hours

<4 Hours

Severity 3 - Medium

4 Hours

2 Hours

4 Hours

<12 Hours

Severity 4 - Low

8 Business Hours

4 Hours

8 Business Hours++

<48 Hours

Security Assurance

No

Yes

Yes

No

Planned Event Assistance

No

Yes

No

No

On-site Troubleshooting Assistance

No

Yes

No

No

Failure Analysis (HW)

Yes, Plus and Elite

Yes

No

No

++ "Business Hours” mean Mondays through Fridays, 9:00 am - 5:00 pm local time, excluding local holidays.

* Requires purchase of Premium Support on all covered devices.

** This support option is available only for Hardware located within a specified range of a Palo Alto Networks service location. It includes all the benefits of Premium Support or Focused Services (as applicable) plus commercially reasonable best efforts by Palo Alto Networks to deliver replacement Hardware to you within four hours from the issuance of an RMA.

*** Next Business Day Delivery Service is subject to certain limitations. Please see RMA Process Policy (https://www.paloaltonetworks.com/content/dam/paloaltonetworks-com/en_US/assets/pdf/datasheets/support/rma-process-policy.pdf) for details.

Severity Definitions

Severity 1 – Critical: Product is down and critically affects customer production environment. No workaround yet available.
Severity 2 – High: Product is impaired and customer production is up but impacted. No workaround yet available.
Severity 3 – Medium: A product function has failed and customer production is not affected. Support is aware of the issue and there is a workaround available.
Severity 4 – Low: Product function is not impaired and no impact to customer business.

Escalate a case

  • Escalate your case online if you require higher priority attention and response time from the assigned engineer.
  • For critical escalations, update the case online and call support and ask to speak to the engineer or a Duty Manager. Please refer to Product Support phone numbers.

Get the latest news, invites to events, and threat alerts

By submitting this form, you agree to our Terms of Use and acknowledge our Privacy Statement.

Products and Services

  • AI-Powered Network Security Platform
  • Secure AI by Design
  • Prisma AIRS
  • AI Access Security
  • Cloud Delivered Security Services
  • Advanced Threat Prevention
  • Advanced URL Filtering
  • Advanced WildFire
  • Advanced DNS Security
  • Enterprise Data Loss Prevention
  • Enterprise IoT Security
  • Medical IoT Security
  • Industrial OT Security
  • SaaS Security
  • Next-Generation Firewalls
  • Hardware Firewalls
  • Software Firewalls
  • Strata Cloud Manager
  • SD-WAN for NGFW
  • PAN-OS
  • Panorama
  • Secure Access Service Edge
  • Prisma SASE
  • Application Acceleration
  • Autonomous Digital Experience Management
  • Enterprise DLP
  • Prisma Access
  • Prisma Access Browser
  • Prisma SD-WAN
  • Remote Browser Isolation
  • SaaS Security
  • AI-Driven Security Operations Platform
  • Cloud Security
  • Cortex Cloud
  • Application Security
  • Cloud Posture Security
  • Cloud Runtime Security
  • Prisma Cloud
  • AI-Driven SOC
  • Cortex XSIAM
  • Cortex XDR
  • Cortex XSOAR
  • Cortex Xpanse
  • Unit 42 Managed Detection & Response
  • Managed XSIAM
  • Threat Intel and Incident Response Services
  • Proactive Assessments
  • Incident Response
  • Transform Your Security Strategy
  • Discover Threat Intelligence

Company

  • About Us
  • Careers
  • Contact Us
  • Corporate Responsibility
  • Customers
  • Investor Relations
  • Location
  • Newsroom

Popular Links

  • Blog
  • Communities
  • Content Library
  • Cyberpedia
  • Event Center
  • Manage Email Preferences
  • Products A-Z
  • Product Certifications
  • Report a Vulnerability
  • Sitemap
  • Tech Docs
  • Unit 42
  • Do Not Sell or Share My Personal Information
PAN logo
  • Privacy
  • Trust Center
  • Terms of Use
  • Documents

Copyright © 2025 Palo Alto Networks. All Rights Reserved

  • Youtube
  • Podcast
  • Facebook
  • LinkedIn
  • Twitter
  • Select your language