If you are familiar with Palo Alto Networks platform, you can save time by using this
streamlined checklist to step through pre-deployment planning, deployment activities,
and post-deployment maintenance to implement and sustain data center security policy
best practices. Each section includes links to detailed information in the full
Data Center Best Practice Security Policy
document or in the
PAN-OS Administrator's Guide, including how to configure
policy rules, security profiles, DoS attack prevention, and user authentication, how to
segment your network, and more.