Internet Gateway Best Practice Security Policy

Table of Contents
Filter icon
Expand all | Collapse all

One of the cheapest and easiest ways for an attacker to break into your network is through users accessing the internet. By successfully exploiting an endpoint, an attacker can enter your network and move laterally towards the end goal: stealing source code, exfiltrating customer data, or taking down infrastructure. To protect your network from cyberattacks and improve your overall security posture, implement a best practice internet gateway security policy. A best practice policy allows you to safely enable applications, users, and content by controlling all traffic, across all ports, all the time.

What Do You Want To Do?

Featured Topics

Gain Visibility Into Application Traffic

Best practices decryption profile recommendations, including cipher settings and block recommendations.

Explore the Best Practices Portal

The Best Practices Portal connects you to Palo Alto Networks official best practices documentation.

Temporary Tuning Rules Discover Application Traffic

Use temporary tuning rules to discover applications and users on your network safely as you migrate to a best practices Security policy rulebase.

Decryption Best Practices Infographic

Transition Safely to Best Practices Security Profiles

How aggressively can you transition profiles from alerting to blocking potentially malicious traffic? What traffic can you block right away? How do you transition to blocking?

Don't Trust, Verify!

Learn about Zero Trust principles and how to enact them in your network.