Table of Contents
Enable visibility into the applications on the network to help you create and enforce security policy rules.
Security Policy Rule Optimization
Migrate port-based Security rules to app-based rules, remove unused apps from rules, and safely enable apps without compromising availability.
Expedition Migration Tool
Reduce the time and effort to migrate a configuration from one of the supported vendors to Palo Alto Networks.
Best Practices for Applications and Threats Content Updates
Learn the best practices for keeping application and threat content signatures up-to-date seamlessly.
Decryption Best Practices
You can't defend against threats you can’t see. By enabling decryption on your next-gen firewalls you can inspect and control SSL/TLS and SSH traffic so that you can detect and prevent threats that would otherwise remain hidden in encrypted traffic. Use the best practice guidelines in this site to learn how to plan for and deploy decryption in your organization.
Best Practices Getting Started
Apply security best practices to reduce the attack surface, gain visibility into traffic, prevent threats, and protect your network, users, and data.