Next Steps to Adopt Security Best Practices
Expand all | Collapse all
End-of-Life (EoL)
Next Steps to Adopt Security Best Practices
Continue to improve network security after you convert
legacy port-based rules to application-based rules.
After you finish your first pass at converting port-based
rules to application-based rules, consider the following steps to
strengthen your Security policy rulebase and improve network security:
If you need help migrating your legacy device configuration to
Palo Alto Networks appliances, contact the Palo Alto Networks’
Professional Services group,
which has a wealth of migration experience you can leverage to achieve
a successful migration and a successful conversion to App-ID.