If you are familiar with Palo Alto Networks platform, you can save time by using this streamlined
checklist to step through pre-deployment planning, deployment activities, and
post-deployment maintenance to implement and sustain data center security policy best
practices. Each section includes links to detailed information in the full
Data Center Best Practice Security Policy
document or in the
PAN-OS Administrator's Guide, including how to configure
policy rules, security profiles, DoS attack prevention, and user authentication, how to
segment your network, and more.