The topics in this site provide detailed concepts and steps to help you deploy a new Palo Alto Networks next-generation firewall, including how to integrate the firewall into your network, register the firewall, activate licenses and subscriptions, and configure policy and threat prevention features.

After you perform the basic configuration steps, you can use the rest of the topics in this guide to help you deploy the comprehensive security operating platform features as necessary to address your network security needs and prevent successful cyberattacks.

What Do You Want To Do?

Featured Topics

What’s New in PAN-OS 8.0


Excited about all of the new features Palo Alto Networks introduced in PAN-OS 8.0? So are we! Use the PAN-OS 8.0 New Features Guide to learn how to use the new features to solve your security problems. The topics in this site briefly introduce each new feature and provide the steps you need to get started using them quickly and easily.

Best Practices for Application and Threats Content Updates


Learn the best practices for keeping applications and threats content signatures up-to-date seamlessly.

Best Practices for Securing Administrative Access


Learn the best practices for securing administrative access to your firewalls to prevent successful cyberattacks through an exposed management interface.

Prevent Credential Phishing


Recommended Topics

Configure SSL Decryption


SSL Forward Proxy decryption enables the firewall to see potential threats in outbound encrypted traffic and apply security protections against those threats.

Cipher Suites Supported in PAN-OS 8.0


Cipher suites supported on firewalls running a PAN-OS® 8.0 release in normal operation mode.

Configure Authentication Policy


Best Practices

Book Image

Data Center Best Practice Security Policy

Best Practices for Securing Administrative Access


Learn the best practices for securing administrative access to your firewalls to prevent successful cyberattacks through an exposed management interface.

Best Practice Internet Gateway Security Policy


Best Practices for Application and Threats Content Updates


Learn the best practices for keeping applications and threats content signatures up-to-date seamlessly.

Decryption Best Practices


Shine a light on the darkness of encrypted traffic so you can reveal what’s really coming into and leaving your network and inspect that traffic for threats.