Articles
Find LIVEcommunity articles and technical documentation about Palo Alto Networks products.
cancel
Showing results for 
Show  only  | Search instead for 
Did you mean: 
Articles
Find LIVEcommunity articles and technical documentation about Palo Alto Networks products.

Browse the Community

General Articles

LIVEcommunity's General Articles area is home to how-to resources, technical documentation, and discussions with Accepted Solutions that turn into articles related to all Palo Alto Networks products.

166 Posts

Support FAQ

Support FAQ on LIVEcommunity is where customers can find answers to their most common queries, in collaboration with Palo Alto Networks Knowledge Base.

8 Posts

Activity in Articles

Google Cloud Network Security Integration (NSI)

11 min read

Google Cloud Network Security Integration (NSI) Author - Nidhi Pandey This document provides a comprehensive overview of the Network Security Integration (NSI) deployment . This document describes an in-line traffic inspection architecture using Palo Alto Networks VM-Series Next-Generation Firewalls. The NSI deployment follows Google Cloud...

image2.gif
image1.gif
image3.gif
npandey by L3 Networker
  • 64 Views
  • 0 replies
  • 0 Likes

Use Ansible AWX to automate the Palo Alto NGFW's management and even Process/Deamon Restarts!

8 min read

This article is a continuation of my previous one, 'Automating the Palo Alto NGFW's Process/Deamon Restarts'. While using TCL Expect is one of the classic methods for automating legacy devices, modern infrastructure demands more robust solutions like Ansible AWX for better scalability and management. 1. Overview 2. AWX ansible installatio...

nikoolayy1_3-1776425825137.png
nikoolayy1_0-1776430115994.png
nikoolayy1_0-1776427311767.png
nikoolayy1_1-1776427340257.png

Ensure Business Continuity with the New App-ID Update Safeguard

6 min read

One of the most common challenges administrators face when utilizing App-ID is the "Monday Morning Surprise": a new content update is installed, a broad application (like ssl) is refined into a more specific one (like acme-app), and suddenly, business-critical traffic is blocked by a default deny rule because the new App-ID hasn't been added to ...

Ensure screenshot.png
Add Custom Tab.png
Applications allowed.png
Rules allowing apps.png
kbarker by L1 Bithead
  • 4626 Views
  • 0 replies
  • 0 Likes

Intelligence-Driven Active Defense Report 2026- Securing Operational Technology Environments

1 min read

Bring the fight to the edge. In an OT environment, defense is about time, and the edge is where you still have it. Joint research by Palo Alto Networks, Siemens, and the Idaho National Laboratory (INL) analyzed global telemetry from over 61,000 firewalls deployed in OT environments, alongside 20 years of historical incident data. The analysis ...

2026 Report.png
arobbie by L2 Linker
  • 4001 Views
  • 0 replies
  • 1 Likes

Achieving Defense-in-Depth with Advanced DNS Security and Remote Browser Isolation

6 min read

In today's complex threat landscape, a single layer of security is no longer sufficient. Attackers leverage multi-stage, evasive techniques to bypass traditional defenses. Palo Alto Networks addresses this challenge by integrating best-of-breed security services to provide a layered, defense-in-depth architecture. This article explores the pow...

shv_1-1771504265970.png
shv_0-1771504749424.png
shv by L3 Networker
  • 2489 Views
  • 0 replies
  • 0 Likes

Securing WhatsApp File Transfers with Remote Browser Isolation

5 min read

In today's digital landscape, modern collaboration tools like WhatsApp Web are essential for business-to-consumer (B2C) communication. While they offer incredible speed, they also introduce a critical security challenge: how do you prevent sensitive data exfiltration through applications that use end-to-end encryption? This encryption creates a ...

shv_7-1770891450658.png
shv_8-1770891565245.png
shv_9-1770891769962.png
shv_10-1770891960134.png
shv by L3 Networker
  • 2378 Views
  • 0 replies
  • 1 Likes

Secure Your Prompts: Defeating Prompt Poaching with Remote Browser Isolation

3 min read

Introduction: The AI-First Workplace In just three short years, Generative AI has transitioned from a viral curiosity to the fundamental operating system of the modern professional. As we enter 2026, the numbers paint a staggering picture of this shift: over 1.5 billion people now interact with standalone AI platforms monthly, and in the corpo...

shv_1-1770802070526.png
unnamed.png
shv by L3 Networker
  • 1482 Views
  • 0 replies
  • 0 Likes

Custom Signatures With ChatGPT and AI Security

6 min read

We all know ChatGPT can write code and articles, but can it automate the specialized task of threat mitigation? We set out to test the capabilities of AI by asking it to generate a Palo Alto Networks custom signature. Before diving into the experiment, let's establish some foundational context on the technology that drives these platforms. C...

kiwi_0-1766154564195.png
nikoolayy1_0-1765196840250.png
nikoolayy1_1-1765191775795.png
nikoolayy1_0-1765191412727.png

Rate-Limiting File Uploads with Palo Alto Networks Custom Signatures

3 min read

I have made this article to show how to rate limit the file upload HTTP requests on the file upload URL for a source IP address Before you begin, I recommend reviewing my article on How to Write Palo Alto Networks Custom Vulnerability and Application Signatures with Examples. That article provides a foundation for this topic by demonstrating...

nikoolayy1_0-1759856292970.png
nikoolayy1_4-1759856531787.png
nikoolayy1_1-1759857649453.png
nikoolayy1_6-1759857238887.png

Tips & Tricks: Palo Alto Global Counters for Layer 1 to Layer 4 issues troubleshooting like MTU and DOS

6 min read

Hello everyone, I wanted to share some knowledge I've gained about investigating common Layer 1 to Layer 4 issues, such as MTU mismatches and DoS attacks, using key Palo Alto Networks firewall features like Global Counters, Flow Debug, and packet captures. The first steps in troubleshooting these issues are always to check your routing, run ...

nikoolayy1_3-1751356122244.png
nikoolayy1_1-1751354923520.png
nikoolayy1_0-1751354721007.png
nikoolayy1_2-1751360016326.png

Nominated Discussion: Configure Split Tunneling by Domain

1 min read

This Nominated Discussion Article is based on the post "Configure Split tunneling by domain" by @BigPalo and responded to by @Raido_Rattameister and @BPry Read on to see the discussion and solution! Hi, I just configured split tunneling by domain using this domain test: *.portal.microsoft.com (port 443) But i can not see this traffic going ...

kiwi by Community Team Member
  • 1684 Views
  • 0 replies
  • 0 Likes

Support FAQ: Flood Attacks - Configuration & Troubleshooting Best Practices

13 min read

Written by Alex Laulhe. With special thanks to Anupam S. & Amogh G. for their contributions. This guide is designed to help firewall admins effectively understand flood attack prevention and troubleshoot flooding incidents detected by Palo Alto Networks firewalls. Whether the event is triggered by packet buffer protection (PBP), Zone Pro...

Title_Flood-Attacks_palo-alto-networks.jpg
Fig 1_Flood-Attacks_palo-alto-networks.jpg
Fig 2_Flood-Attacks_palo-alto-networks.jpg
Fig 3_Flood-Attacks_palo-alto-networks.jpg
emgarcia by Community Team Member
  • 18517 Views
  • 3 replies
  • 4 Likes

Tips & Tricks: App-ID Debugging

5 min read

This article is inspired from Tips & Tricks: Flow Basic Debugging written by @kiwi and I recommend reading that article first before reading this one. Palo Alto Networks NGFWs use App-ID to detect the exact application inside a traffic stream but sometimes traffic will be first classified for example as App-ID "SSL" and after the decrypti...

nikoolayy1_0-1750327626537.png
nikoolayy1_2-1750327766322.png
nikoolayy1_1-1750327679712.png
nikoolayy1_0-1750325909323.png

Demystifying Selective Push on Panorama

8 min read

What is Selective Push? Selective Push on Panorama lets you deploy specific configuration to your firewalls instead of pushing everything all at once. Terminology Push Scope: The final admin view of committed changes with an option to select the changes that will be pushed to the selected target firewalls. Config Audit Window: This window is ...

Screenshot 2025-06-09 at 9.03.11 PM.png
shv_5-1749483597680.png
shv_6-1749483707514.png
shv_7-1749483817471.png
shv by L3 Networker
  • 6303 Views
  • 0 replies
  • 2 Likes

Support FAQ: How to Troubleshoot BGP on Palo Alto Networks Firewalls

5 min read

Most days, BGP runs quietly in the background. BGP advertises routes that keep your WAN, VPN, cloud environments, and public services connected and reachable. Until it doesn’t. And when BGP breaks, it’s not just a routing issue, it’s unreachable services and frustrated users. This guide will help you troubleshoot BGP on Palo Alto Networks fire...

JayGolf by Community Team Member
  • 14039 Views
  • 0 replies
  • 4 Likes
Register or Sign-in
Top Contributors
Top Liked Authors