The topics in this site provide detailed concepts and steps to help you deploy a new Palo Alto Networks next-generation firewall, including how to integrate the firewall into your network, register the firewall, activate licenses and subscriptions, and configure policy and threat prevention features.
After you perform the basic configuration steps, you can use the rest of the topics in this guide to help you deploy the comprehensive security operating platform features as necessary to address your network security needs and prevent successful cyberattacks.
What Do You Want To Do?
Featured Topics
What’s New in PAN-OS 8.1
Excited about all of the new features Palo Alto Networks introduced in PAN-OS 8.1? So are we! Use the PAN-OS 8.1 New Features Guide to learn how to use the new features to solve your security problems. The topics in this site briefly introduce each new feature and provide the steps you need to get started using them quickly and easily.
Best Practices for Securing Administrative Access
Learn the best practices for securing administrative access to your firewalls to prevent successful cyberattacks through an exposed management interface.
Best Practices for Application and Threat Content Updates
Learn the best practices for keeping application and threat content signatures up-to-date seamlessly.
Recommended Topics
Configure SSL Decryption
SSL Forward Proxy decryption enables the firewall to see potential threats in outbound encrypted traffic and apply security protections against those threats.
Best Practices
Data Center Best Practice Security Policy
Learn about Palo Alto Networks data center security policy best practices to protect your most valuable assets.
Best Practices for Securing Administrative Access
Learn the best practices for securing administrative access to your firewalls to prevent successful cyberattacks through an exposed management interface.
Best Practice Internet Gateway Security Policy
Applications and Threat Updates
Applications and Threats content updates equip Palo Alto Networks next-gen firewalls with the very latest threat prevention and application identification technology.
Decryption Best Practices
Shine a light on the darkness of encrypted traffic so you can reveal what’s really coming into and leaving your network and inspect that traffic for threats.