Internet Gateway Best Practice Security Policy
- What Is a Best Practice Internet Gateway Security Policy?
- Why Do I Need a Best Practice Internet Gateway Security Policy?
- How Do I Deploy a Best Practice Internet Gateway Security Policy?
- Create User Groups for Access to Allowed Applications
- Decrypt Traffic for Full Visibility and Threat Inspection
- Transition Vulnerability Protection Profiles Safely to Best Practices
- Transition Anti-Spyware Profiles Safely to Best Practices
- Transition Antivirus Profiles Safely to Best Practices
- Transition WildFire Profiles Safely to Best Practices
- Transition URL Filtering Profiles Safely to Best Practices
- Transition File Blocking Profiles Safely to Best Practices
- Create Best Practice Security Profiles for the Internet Gateway
- Monitor and Fine-Tune the Policy Rulebase
- Remove the Temporary Rules
- Maintain the Rulebase
One of the cheapest and easiest ways for an attacker to break into your network is through users accessing the internet. By successfully exploiting an endpoint, an attacker can enter your network and move laterally towards the end goal: stealing source code, exfiltrating customer data, or taking down infrastructure. To protect your network from cyberattacks and improve your overall security posture, implement a best practice internet gateway security policy. A best practice policy allows you to safely enable applications, users, and content by controlling all traffic, across all ports, all the time.
What Do You Want To Do?
Gain Visibility Into Application Traffic
Best practices decryption profile recommendations, including cipher settings and block recommendations.
Explore the Best Practices Portal
The Best Practices Portal connects you to Palo Alto Networks official best practices documentation.
Temporary Tuning Rules Discover Application Traffic
Use temporary tuning rules to discover applications and users on your network safely as you migrate to a best practices Security policy rulebase.
Transition Safely to Best Practices Security Profiles
How aggressively can you transition profiles from alerting to blocking potentially malicious traffic? What traffic can you block right away? How do you transition to blocking?
Don't Trust, Verify!
Learn about Zero Trust principles and how to enact them in your network.