PAN-OS


PAN‑OS® is the software that runs all Palo Alto Networks® next-generation firewalls. By leveraging the key technologies that are built into PAN‑OS natively—App‑ID, Content‑ID, Device-ID, and User‑ID—you can have complete visibility and control of the applications in use across all users and devices in all locations all the time. And, because inline ML and the application and threat signatures automatically reprogram your firewall with the latest intelligence, you can be assured that all traffic you allow is free of known and unknown threats. 

Spotlight

Get Started with PAN-OS 11.1 Cosmos!


Review the new features in the Release Notes.

Advanced URL Filtering


We've moved our content from the PAN-OS Admin Guide. Review our new Advanced URL Filtering book.

Quantum Security


Learn about Palo Alto Networks Quantum Security solution.

Advanced Threat Prevention Administration


We've moved our content from the PAN-OS Admin Guide. Review our new Advanced Threat Prevention book.

Advanced WildFire


We're reorganizing our WildFire content. See the new Administration and Appliance books.

PAN-OS 8.1* & 9.0 & 10.0 are EoL


*We will provide critical fixes (for PAN-OS 8.1 only) on PA-200, PA-500, and M-100 appliances until 10/31/23 and on PA-5000 Series firewalls until 1/31/24.

Documentation

Use the PAN-OS documentation to help you get the most out of your next-generation firewalls. Whether you are just getting started and you need to learn how to integrate your firewall into the network, or you are setting up advanced features to prevent credential theft and thwart an attacker’s ability to use stolen credentials to move laterally through your network, you'll find the help you need in the PAN-OS documentation.

Terminal Server (TS) Agent Release Notes


Thinking about upgrading your TS agents? First, review the release notes for known issues, addressed issues, and changes in behavior that may impact you.

User-ID™ Agent Release Notes


Thinking about upgrading your User-ID agents? First, review the release notes for known issues, addressed issues, and changes in behavior that may impact you.

Data Center Best Practice Security Policy


Administrative Access Best Practices


Firewalls and Panorama centralized management servers are the gatekeepers and protectors of your network. To prevent attackers from gaining access to these devices and reconfiguring them to permit malicious access to your network, follow these best practices to secure administrative access.

PAN-OS® New Features Guide


PAN-OS 11.0 makes it easier to prevent today's modern threats across all vectors throughout your entire infrastructure with the scale, speed, and agility of the cloud.

Advanced Routing Engine Migration Reference


PAN-OS Web Interface Reference


Not sure what to put in a field in the PAN-OS Web Interface? Use this guide to learn about each field, when to use it, and why to choose one option over another.

PAN-OS Device Telemetry Metrics Reference


PAN-OS can collect data about the health and configuration of your next-generation firewalls, as well as metrics related to threat prevention. This document identifies and describes all of the metric categories, as well as the individual metrics, that PAN-OS can collect.

Best Practices

Best Practices for Securing Administrative Access

Best Practices for Applications and Threats Content Updates

URL Filtering Best Practices

IoT Security Best Practices

Videos

Dynamic User Groups

Best Practice Assessment Plus (BPA+) Tool Demo

View the BPA+ demo, which shows you how to check your PAN-OS best practice configuration and update it if necessary.

Policy Optimizer

SD-WAN Demo

BPA+ YouTube Channel


Click "View BPA+ Playlist" to access all of the BPA+ videos, including best practice network security checks and a demo.

Related Documents

IoT Security Administrator’s Guide


Learn how to get visibility, prevention, risk assessment, and enforcement for your IoT and OT devices in combination with our ML-Powered NGFW.

Best Practices


At Palo Alto Networks, it’s our mission to develop products and services that help you, our customer, detect and prevent successful cyberattacks. We’ve developed our best practice documentation to help you do just that. Whether you’re looking for the best way to secure administrative access to your next-gen firewalls and Panorama, create best practice security policy to safely enable application access at the internet gateway and the data center, or learn the best way roll out a decryption policy to prevent threats from sneaking into your network, you will find the guidance you need here in our best practice documentation. And, our best practice library keeps growing and evolving to keep up with the ever-changing threat landscape, so be sure to check back often!

Translated PAN-OS Documentation


Firewalls & Appliances


Palo Alto Networks® next-generation firewalls detect known and unknown threats, including in encrypted traffic, using intelligence generated across many thousands of customer deployments. That means they reduce risks and prevent a broad range of attacks. For example, they enable users to access data and applications based on business requirements as well as stop credential theft and an attacker’s ability to use stolen credentials.

OpenConfig


PAN-OS expands its automation capabilities to now support a management interface based on the OpenConfig standard data models to simplify deploying firewalls in OpenConfig managed networks. The OpenConfig gNMI/gNOI service is provided through the OpenConfig plugin.

Download Enterprise SNMP MIB Files


Custom Application IDs and Threat Signatures


Learn how to create custom application and threat signatures for network traffic that you want to detect, monitor, and control.

Enterprise DLP

Panorama


Panorama™ provides centralized management capabilities that empower you with easy-to-implement, consolidated monitoring of your managed firewalls, Log Collectors, and WildFire appliances. With Panorama, you can centrally manage all aspects of the firewall configuration, shared policies, and generate reports on traffic patterns or security incidents — all from a single console.

Cortex Data Lake