<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: First-time poster exploring best practices for security design in PAN-OS environments in General Topics</title>
    <link>https://live.paloaltonetworks.com/t5/general-topics/first-time-poster-exploring-best-practices-for-security-design/m-p/1253039#M126341</link>
    <description>&lt;P&gt;Hi&amp;nbsp;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/470304411"&gt;@hellencharless54&lt;/a&gt;&amp;nbsp;,&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;"recommended learning paths"&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;&lt;A href="https://learn.paloaltonetworks.com/learn/learning-plans/350/certified-next-generation-firewall-ngfw-engineer" target="_blank"&gt;https://learn.paloaltonetworks.com/learn/learning-plans/350/certified-next-generation-firewall-ngfw-engineer&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;It's free!&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Thanks,&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Tom&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
    <pubDate>Sun, 26 Apr 2026 01:58:29 GMT</pubDate>
    <dc:creator>TomYoung</dc:creator>
    <dc:date>2026-04-26T01:58:29Z</dc:date>
    <item>
      <title>First-time poster exploring best practices for security design in PAN-OS environments</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/first-time-poster-exploring-best-practices-for-security-design/m-p/1252972#M126333</link>
      <description>&lt;SECTION class="text-token-text-primary w-full focus:outline-none [--shadow-height:45px] has-data-writing-block:pointer-events-none has-data-writing-block:-mt-(--shadow-height) has-data-writing-block:pt-(--shadow-height) [&amp;amp;:has([data-writing-block])&amp;gt;*]:pointer-events-auto [content-visibility:auto] supports-[content-visibility:auto]:[contain-intrinsic-size:auto_100lvh] R6Vx5W_threadScrollVars scroll-mb-[calc(var(--scroll-root-safe-area-inset-bottom,0px)+var(--thread-response-height))] scroll-mt-[calc(var(--header-height)+min(200px,max(70px,20svh)))]" dir="auto" data-turn="assistant" data-scroll-anchor="false" data-testid="conversation-turn-42" data-turn-id="request-WEB:22567a32-52ed-43c0-8f36-5a93b3b0f25e-20"&gt;
&lt;DIV class="text-base my-auto mx-auto pb-10 [--thread-content-margin:var(--thread-content-margin-xs,calc(var(--spacing)*4))] @w-sm/main:[--thread-content-margin:var(--thread-content-margin-sm,calc(var(--spacing)*6))] @w-lg/main:[--thread-content-margin:var(--thread-content-margin-lg,calc(var(--spacing)*16))] px-(--thread-content-margin)"&gt;
&lt;DIV class="[--thread-content-max-width:40rem] @w-lg/main:[--thread-content-max-width:48rem] mx-auto max-w-(--thread-content-max-width) flex-1 group/turn-messages focus-visible:outline-hidden relative flex w-full min-w-0 flex-col agent-turn"&gt;
&lt;DIV class="flex max-w-full flex-col gap-4 grow"&gt;
&lt;DIV class="min-h-8 text-message relative flex w-full flex-col items-end gap-2 text-start break-words whitespace-normal outline-none keyboard-focused:focus-ring [.text-message+&amp;amp;]:mt-1" dir="auto" tabindex="0" data-message-model-slug="gpt-5-3-mini" data-turn-start-message="true" data-message-id="ae2db64d-f514-4448-8394-df1ae1786edb" data-message-author-role="assistant"&gt;
&lt;DIV class="flex w-full flex-col gap-1 empty:hidden"&gt;
&lt;DIV class="markdown prose dark:prose-invert w-full wrap-break-word light markdown-new-styling"&gt;
&lt;P data-end="201" data-start="189"&gt;Hi everyone,&lt;/P&gt;
&lt;P data-end="362" data-start="203"&gt;I’m new to the **&lt;SPAN class="hover:entity-accent entity-underline inline cursor-pointer align-baseline"&gt;&lt;SPAN class="whitespace-normal"&gt;Palo Alto Networks&lt;/SPAN&gt;&lt;/SPAN&gt; community and currently learning my way around firewall policy design and general architecture concepts.&lt;/P&gt;
&lt;P data-end="453" data-start="364"&gt;Right now I’m trying to better understand how experienced engineers approach things like:&lt;/P&gt;
&lt;UL data-end="705" data-start="454"&gt;
&lt;LI data-end="515" data-start="454" data-section-id="6lsipk"&gt;structuring security policies in a clean and scalable way&lt;/LI&gt;
&lt;LI data-end="571" data-start="516" data-section-id="xjzufe"&gt;balancing simplicity vs. granularity in rule design&lt;/LI&gt;
&lt;LI data-end="622" data-start="572" data-section-id="1puous5"&gt;avoiding “rule sprawl” in growing environments&lt;/LI&gt;
&lt;LI data-end="705" data-start="623" data-section-id="1cquth2"&gt;and best practices for maintaining visibility without overcomplicating configs&lt;/LI&gt;
&lt;/UL&gt;
&lt;P data-end="822" data-start="707"&gt;I’m still at the learning stage, so I’m focusing on building good habits early rather than just making things work.&lt;/P&gt;
&lt;P data-end="928" data-start="824"&gt;If anyone has advice, common mistakes to avoid, or recommended learning paths, I’d really appreciate it.&lt;/P&gt;
&lt;P data-end="1018" data-start="930"&gt;Looking forward to learning from the community and gradually improving my understanding.&lt;/P&gt;
&lt;P data-end="1038" data-start="1020"&gt;Thanks in advance!&lt;/P&gt;
&lt;/DIV&gt;
&lt;/DIV&gt;
&lt;/DIV&gt;
&lt;/DIV&gt;
&lt;DIV class="z-0 flex min-h-[46px] justify-start"&gt;&amp;nbsp;&lt;/DIV&gt;
&lt;DIV class="mt-3 w-full empty:hidden"&gt;
&lt;DIV class="text-center"&gt;&amp;nbsp;&lt;/DIV&gt;
&lt;/DIV&gt;
&lt;/DIV&gt;
&lt;/DIV&gt;
&lt;/SECTION&gt;
&lt;DIV class="pointer-events-none -mt-px h-px translate-y-[calc(var(--scroll-root-safe-area-inset-bottom)-14*var(--spacing))]" aria-hidden="true"&gt;&amp;nbsp;&lt;/DIV&gt;</description>
      <pubDate>Fri, 24 Apr 2026 08:49:43 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/first-time-poster-exploring-best-practices-for-security-design/m-p/1252972#M126333</guid>
      <dc:creator>hellencharless54</dc:creator>
      <dc:date>2026-04-24T08:49:43Z</dc:date>
    </item>
    <item>
      <title>Re: First-time poster exploring best practices for security design in PAN-OS environments</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/first-time-poster-exploring-best-practices-for-security-design/m-p/1253035#M126338</link>
      <description>&lt;P&gt;Hi&amp;nbsp;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/470304411"&gt;@hellencharless54&lt;/a&gt;&amp;nbsp;,&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;I love your focus on "building good habits"!&amp;nbsp; Let me share what works for me:&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;"structuring security policies in a clean and scalable way"&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;I like to group similar rules together: inbound, DMZ, outbound, etc.&amp;nbsp; That works for me.&amp;nbsp; The Day 1 Configuration even has tags for Inbound, Outbound, Internal, etc.&amp;nbsp; These tags make the grouping easy.&amp;nbsp; You could even use the Group Rules By Tag field and the Rulebase By Groups option on the bottom to view only sections of the security policy at a time.&lt;/P&gt;
&lt;P&gt;Use a whitelist (only allow specific traffic) whenever possible, but for outbound traffic an allow all rule coupled with a blacklist is more manageable.&amp;nbsp; An outbound whitelist can be done for critical assets.&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;"balancing simplicity vs. granularity in rule design"&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;The security policy rule should be specific enough to allow &lt;EM&gt;only&lt;/EM&gt; the desired traffic.&amp;nbsp; If you want to allow SQL traffic to MS SQL servers, you should include the destination zone, destination objects, mssql-db application, and application-default service as a minimum.&amp;nbsp; You could also include source zones, subnets, or even users if you have User-ID.&amp;nbsp; A more specific rule is more secure.&lt;/P&gt;
&lt;P&gt;Here are some other rules I have for rules:&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;Always use application-default or specific ports with applications.&amp;nbsp; Otherwise, the NGFW will allow a few packets through on all ports as it tries to identify the application.&lt;/LI&gt;
&lt;LI&gt;Do not block by application, but by port.&amp;nbsp;&amp;nbsp;Otherwise, the NGFW will allow a few packets through as it tries to identify the application.&lt;/LI&gt;
&lt;LI&gt;L7 rules are more secure than L4 rules. The Policy Optimizer makes L7 rules easy.&lt;/LI&gt;
&lt;LI&gt;Use Security Profile Groups rather than specific Security Profiles in rules to make changes much easier.&amp;nbsp; The Day 1 Configuration has excellent Security Profile Groups.&lt;/LI&gt;
&lt;LI&gt;If a zone only has 1 subnet, I usually do not add the subnet to the rule.&amp;nbsp; It's not needed.&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;&lt;STRONG&gt;'avoiding “rule sprawl” in growing environments'&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;This is a great place to start.&amp;nbsp;&amp;nbsp;&lt;A href="https://docs.paloaltonetworks.com/best-practices" target="_blank" rel="noopener"&gt;https://docs.paloaltonetworks.com/best-practices&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;Some good sections for you are "Security Policy Best Practices," "Internet Gateway Best Practice Security Policy," and "Data Center Best Practice Security Policy."&amp;nbsp; There is even a section on "avoiding rulebase bloat" under&amp;nbsp;Security Policy Best Practices &amp;gt; Security Policy Rulebase Best Practices.&amp;nbsp; If much of the configuration matches in separate rules, it may be good to combine them.&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;"and best practices for maintaining visibility without overcomplicating configs"&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;Every rule should have logging configured unless there is a specific reason not to log.&amp;nbsp; If you create a Log Forwarding profile named "default", it will be automatically added to a new rule.&amp;nbsp;&amp;nbsp;The Day 1 Configuration has this group.&lt;/P&gt;
&lt;P&gt;Every allow rule should have a security profile configured.&amp;nbsp;&amp;nbsp;If you create a Security Profile Group named "default", it will be automatically added to a new rule.&amp;nbsp; The Day 1 Configuration has this group.&lt;/P&gt;
&lt;P&gt;When you configure a new NGFW, start with the Day 1 Configuration.&amp;nbsp; You will find it on the CSP portal under Products &amp;gt; Assets with the icons.&lt;/P&gt;
&lt;P&gt;Run a BPA on your NGFW for additional recommendations.&amp;nbsp; I generally agree with 1/2 of the recommendations.&amp;nbsp; Know your own security policy, and which ones make sense to you.&amp;nbsp; Instructions for the BPA can be found on the Best Practices page.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Once you have built new habits, they are easier to maintain.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Thanks,&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Tom&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Edit:&amp;nbsp;&amp;nbsp;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/11943"&gt;@kiwi&lt;/a&gt;&amp;nbsp;'s comments to your other post are great!&amp;nbsp; I added a few there also.&amp;nbsp;&amp;nbsp;&lt;A href="https://live.paloaltonetworks.com/t5/general-topics/beginner-question-best-way-to-structure-policy-design-in-palo/td-p/1252853" target="_blank"&gt;https://live.paloaltonetworks.com/t5/general-topics/beginner-question-best-way-to-structure-policy-design-in-palo/td-p/1252853&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Sun, 26 Apr 2026 01:29:08 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/first-time-poster-exploring-best-practices-for-security-design/m-p/1253035#M126338</guid>
      <dc:creator>TomYoung</dc:creator>
      <dc:date>2026-04-26T01:29:08Z</dc:date>
    </item>
    <item>
      <title>Re: First-time poster exploring best practices for security design in PAN-OS environments</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/first-time-poster-exploring-best-practices-for-security-design/m-p/1253039#M126341</link>
      <description>&lt;P&gt;Hi&amp;nbsp;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/470304411"&gt;@hellencharless54&lt;/a&gt;&amp;nbsp;,&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;"recommended learning paths"&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;&lt;A href="https://learn.paloaltonetworks.com/learn/learning-plans/350/certified-next-generation-firewall-ngfw-engineer" target="_blank"&gt;https://learn.paloaltonetworks.com/learn/learning-plans/350/certified-next-generation-firewall-ngfw-engineer&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;It's free!&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Thanks,&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Tom&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Sun, 26 Apr 2026 01:58:29 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/first-time-poster-exploring-best-practices-for-security-design/m-p/1253039#M126341</guid>
      <dc:creator>TomYoung</dc:creator>
      <dc:date>2026-04-26T01:58:29Z</dc:date>
    </item>
  </channel>
</rss>

