Saturday, September 6, 2025

Palo Alto - Intro-

Palo Alto Introduction

Founded in 2005 by security visionary Nir Zuk

Earlier 2002-2005 CTO of Netsceen Juniper
Before 2000-2002 founder and CTP OneSecure – World’s First IPS
Before that 1994-1999 Principal Engineer at Checkpoint
Innovations: App-ID, User-ID (AD/Directory Service LDAP users can access certain sites) , Content-ID (URL Filtering, anti-virus protection, AntiSpyWare, SSL Decrypt, Data loss Prevention)
Builds Next Generation Firewalls that identifies and control more than 3000 applications which makes firewalls a strategic security device once again!

Prisma -  Prisma gives customers what they need to consistently govern access, protect data, and secure applications. The suite consists of four key components

  • Prisma Access1 secures access to the cloud for branch offices and mobile users anywhere in the world with a scalable, cloud-native architecture, blending enterprise-grade security with a globally scalable network. Customers will also have access to a streamlined cloud management user interface (UI) that enables rapid onboarding of branches and users.  
  • Prisma Public Cloud2 provides continuous visibility, security, and compliance monitoring across public multi-cloud deployments. Powered by machine learning, it correlates data and assesses risk across the cloud environment. Starting today, customers can further reduce their attack surface early in the development cycle through a "shift left" approach to security. With the ability to detect vulnerabilities and fix improper configurations in customers' infrastructure-as-code templates, developers can reduce risk without sacrificing agility. 
  • Prisma SaaS3 is a multi-mode cloud access security broker (CASB) service that safely enables SaaS application adoption. It provides advanced capabilities in risk discovery, adaptive access control, data loss prevention, compliance assurance, data governance, user behavior monitoring, and advanced threat prevention. New integrations will bring improved administration experience across IT-sanctioned and IT-unsanctioned SaaS applications with unified visibility and management.
  • VM-Series is the virtualized form factor of the Palo Alto Networks Next-Generation Firewall that can be deployed in private and public cloud computing environments, including Amazon Web Services (AWS®), GCP, Microsoft Azure®, Oracle Cloud®Alibaba Cloud®, and VMware NSX®. The VM-Series is also enhanced through infrastructure-as-code automation for deployment and configuration, which reduces complexity for customers.













The Palo Alto Networks Firewall Essentials: Configuration and Management course is a five-day, instructor-led training designed to help you:

  • Configure and manage the essential features of Palo Alto Networks next-generation firewalls.
  • Configure and manage Security and NAT policies to enable approved traffic to and from zones.
  • Configure and manage Threat Prevention strategies to block traffic from known and unknown IP addresses, domains, and URLs.
  • Monitor network traffic using the interactive web interface and firewall reports.

Objectives

Successful completion of this five-day, instructor-led course should enhance the student’s understanding of configuring and managing Palo Alto Networks Next-Generation Firewalls. The course includes hands-on experience configuring, managing, and monitoring a firewall in a lab environment.

Target Audience

  • Security Engineers
  • Security Administrators
  • Security Operations Specialists
  • Security Analysts
  • Support Staff

Prerequisites

  • Familiarity with networking concepts, including routing, switching, and IP addressing.
  • Basic security concepts.
  • Experience with other security technologies (IPS, proxy, and content filtering) is a plus.

Course Modules:

  1. Palo Alto Networks Portfolio and Architecture
  2. Configuring Initial Firewall Settings
  3. Managing Firewall Configurations
  4. Managing Firewall Administrator Accounts
  5. Connecting the Firewall to Production Networks with Security Zones
  6. Creating and Managing Security Policy Rules
  7. Creating and Managing NAT Policy Rules
  8. Controlling Application Usage with App-ID
  9. Blocking Known Threats Using Security Profiles
  10. Blocking Inappropriate Web Traffic with URL Filtering
  11. Blocking Unknown Threats with WildFire
  12. Controlling Access to Network Resources with User-ID
  13. Using Decryption to Block Threats in Encrypted Traffic
  14. Locating Valuable Information Using Logs and Reports
  15. What’s Next in Your Training and Certification Journey
  16. Supplemental Materials
    • Securing Endpoints with GlobalProtect
    • Providing Firewall Redundancy with High Availability
    • Connecting Remote Sites using VPNs
    • Blocking Common Attacks Using Zone Protection

Course Scope:

  • Level: Introductory
  • Duration: 5 days
  • Format: Lecture and hands-on labs
  • Platform Support: Palo Alto Networks next-generation firewalls running the PAN-OS® 11.1 operating system

No comments:

Post a Comment

Global Protect Troubleshooting

Global Protect Components Certificate Management Connections Authentication Debugging https://www.youtube.com/watch?v=0Z48WHvyW0Q authentica...