{"id":53,"date":"2022-12-31T15:27:13","date_gmt":"2022-12-31T14:27:13","guid":{"rendered":"https:\/\/worldofsecurity.de\/?page_id=53"},"modified":"2023-03-27T10:30:49","modified_gmt":"2023-03-27T09:30:49","slug":"palo-alto-networks","status":"publish","type":"page","link":"https:\/\/blog.helge-meyer.de\/?page_id=53","title":{"rendered":"Palo Alto Networks"},"content":{"rendered":"<h2>Course Overview<\/h2>\n<ul>\n<li><a href=\"#edu210\">PA EDU-210 (Essentials: Configuration and Management)<\/a><\/li>\n<li><a href=\"#edu220\">PA EDU-220 (Panorama Managing Firewalls at Scale)<\/a><\/li>\n<li><a href=\"#edu330\">PA EDU-330 (Firewall Troubleshooting)<\/a><\/li>\n<li><a href=\"#edu238\">PA EDU-238 (Prisma SD-WAN)<\/a><\/li>\n<li><a href=\"#edu318\">PA EDU-318 (Prisma Access SASE Security)<\/a><\/li>\n<li><a href=\"#edu380\">PA EDU-380 (Cortex XSOAR: Automation and Orchestration)<\/a><\/li>\n<li><a href=\"#edu260\">PA EDU-260 (Cortex XDR 2: Prevention, Analysis, and Response)<\/a><\/li>\n<li><a href=\"#edu262\">PA EDU-262 (Cortex XDR: Investigation and Response)<\/a><\/li>\n<\/ul>\n<h2>Additional URLs<\/h2>\n<ul>\n<li><a href=\"https:\/\/pan.dev\/\" target=\"_blank\" rel=\"noopener noreferrer\">Develop with Palo Alto Networks<\/a><\/li>\n<li><a href=\"https:\/\/ansible-pan.readthedocs.io\/en\/latest\/\" target=\"_blank\" rel=\"noopener noreferrer\">Palo Alto Networks Ansible Galaxy Role Documentation<\/a><\/li>\n<li><a href=\"https:\/\/www.paloaltonetworks.com\/unit42\" target=\"_blank\" rel=\"noopener noreferrer\">Unit 42<\/a><\/li>\n<li><a href=\"https:\/\/apps.paloaltonetworks.com\/apps\" target=\"_blank\" rel=\"noopener noreferrer\">Discover, Access, and Manage Apps<\/a><\/li>\n<li><a href=\"https:\/\/applipedia.paloaltonetworks.com\/\" target=\"_blank\" rel=\"noopener noreferrer\">Applipedia (App-ID Lookup)<\/a><\/li>\n<li><a href=\"https:\/\/threatvault.paloaltonetworks.com\" target=\"_blank\" rel=\"noopener noreferrer\">Threat Lookup (Login Required)<\/a><\/li>\n<li><a href=\"https:\/\/urlfiltering.paloaltonetworks.com\" target=\"_blank\" rel=\"noopener noreferrer\">URL Filtering Lookup<\/a><\/li>\n<li><a href=\"https:\/\/status.paloaltonetworks.com\" target=\"_blank\" rel=\"noopener noreferrer\">Cloud Service Status<\/a><\/li>\n<\/ul>\n<hr style=\"border: 5px solid black; border-radius: 5px;\" \/>\n<h2><a style=\"text-decoration: none; text: #092d07; link: #1FOOFF; vlink: #000000; alink: #000000; bgcolor: #ffffff;\" name=\"edu210\"><\/a>Course PA EDU-210<\/h2>\n<p><em>Here you will find all Reference Links for the EDU-210 Course (Based on the course material and my own references)<\/em><\/p>\n<div style=\"background-color: #ebebeb;\">\n<h5 style=\"text-decoration: underline;\">Modul 0 &#8211; Introductions<\/h5>\n<ul>\n<li><a href=\"https:\/\/beacon.paloaltonetworks.com\" target=\"_blank\" rel=\"noopener noreferrer\">Prepare Certification Exam, Online Training Courses and more<\/a><\/li>\n<li><a href=\"https:\/\/www.youtube.com\/@paloaltonetworks\/featured\" target=\"_blank\" rel=\"noopener noreferrer\">PaloAlto Networks &#8211; You Tube Channel<\/a><\/li>\n<li><a href=\"https:\/\/www.paloaltonetworks.com\/services\/education\" target=\"_blank\" rel=\"noopener noreferrer\">Education Services<\/a><\/li>\n<li><a href=\"https:\/\/live.paloaltonetworks.com\/t5\/certification\/ct-p\/Certification\" target=\"_blank\" rel=\"noopener noreferrer\">Palo Alto Networks Live &#8211; Certification<\/a><\/li>\n<li><a href=\"https:\/\/www.paloaltonetworks.com\/services\/education\/palo-alto-networks-certified-cybersecurity-entry-level-technician\" target=\"_blank\" rel=\"noopener noreferrer\">Palo Alto Networks Certified Cybersecurity Entry-Level Technician (PCCET)<\/a><\/li>\n<li><a href=\"https:\/\/www.paloaltonetworks.com\/services\/education\/palo-alto-networks-certified-network-security-administrator\" target=\"_blank\" rel=\"noopener noreferrer\">Palo Alto Networks Certified Network Security Administrator (PCNSA)<\/a><\/li>\n<li><a href=\"https:\/\/www.paloaltonetworks.com\/services\/education\/palo-alto-networks-certified-network-security-engineer\" target=\"_blank\" rel=\"noopener noreferrer\">Palo Alto Networks Certified Network Security Engineer (PCNSE)<\/a><\/li>\n<li><a href=\"http:\/\/www.pearsonvue.com\/paloaltonetworks\" target=\"_blank\" rel=\"noopener noreferrer\">Person VUE Exam Registration<\/a><\/li>\n<\/ul>\n<h5 style=\"text-decoration: underline;\">Modul 1 &#8211; Portfolio and Architecture<\/h5>\n<ul>\n<li><a href=\"https:\/\/knowledgebase.paloaltonetworks.com\/KCSArticleDetail?id=kA10g000000ClVHCA0\" target=\"_blank\" rel=\"noopener noreferrer\">Packet Flow Sequence in PAN-OS<\/a><\/li>\n<li><a href=\"https:\/\/docs.paloaltonetworks.com\/best-practices\/zero-trust-best-practices\" target=\"_blank\" rel=\"noopener noreferrer\">Best Practices Implementing Zero Trust with Palo Alto Networks<\/a><\/li>\n<li><a href=\"https:\/\/www.paloaltonetworks.com\/products\/product-selection.html\" target=\"_blank\" rel=\"noopener noreferrer\">PA-Series Next-Generation Firewalls<\/a><\/li>\n<li><a href=\"https:\/\/www.paloaltonetworks.com\/network-security\/next-generation-firewall-hardware\" target=\"_blank\" rel=\"noopener noreferrer\">Hardware NGFWs<\/a><\/li>\n<li><a href=\"https:\/\/www.paloaltonetworks.com\/prisma\/vm-series\" target=\"_blank\" rel=\"noopener noreferrer\">VM-Series Virtual Next-Generation-Firewalls<\/a><\/li>\n<li><a href=\"https:\/\/www.paloaltonetworks.com\/network-security\/vm-series-virtual-next-generation-firewall\" target=\"_blank\" rel=\"noopener noreferrer\">Virtual NGFWs<\/a><\/li>\n<li><a href=\"https:\/\/www.paloaltonetworks.com\/network-security\/cn-series\" target=\"_blank\" rel=\"noopener noreferrer\">Container NGFWs<\/a><\/li>\n<li><a href=\"https:\/\/www.paloaltonetworks.com\/network-security\/cloud-ngfw\" target=\"_blank\" rel=\"noopener noreferrer\">Cloud NGFWs<\/a><\/li>\n<li><a href=\"https:\/\/www.paloaltonetworks.com\/network-security\/aiops-for-ngfw\" target=\"_blank\" rel=\"noopener noreferrer\">AIOps for NGFW<\/a><\/li>\n<li><a href=\"https:\/\/www.paloaltonetworks.com\/network-security\/panorama\" target=\"_blank\" rel=\"noopener noreferrer\">Panorama<\/a><\/li>\n<li><a href=\"https:\/\/docs.paloaltonetworks.com\/pan-os\" target=\"_blank\" rel=\"noopener noreferrer\">PAN-OS<\/a><\/li>\n<li><a href=\"https:\/\/docs.paloaltonetworks.com\/pan-os\/10-2\/pan-os-admin\/virtual-systems.html\" target=\"_blank\" rel=\"noopener noreferrer\">Virtual Systems PAN-OS 10.2<\/a><\/li>\n<li><a href=\"https:\/\/www.paloaltonetworks.com\/services\/support\/end-of-life-announcements\" target=\"_blank\" rel=\"noopener noreferrer\">End-of-Life Announcements<\/a><\/li>\n<\/ul>\n<h5 style=\"text-decoration: underline;\">Modul 2 &#8211; Initial Firewall Settings<\/h5>\n<ul>\n<li><a href=\"https:\/\/docs.paloaltonetworks.com\/pan-os\/10-2\/pan-os-panorama-api\" target=\"_blank\" rel=\"noopener noreferrer\">PAN-OS and Panorama API Usage Guide 10.2<\/a><\/li>\n<li><a href=\"https:\/\/docs.paloaltonetworks.com\/pan-os\/10-2\/pan-os-admin\/firewall-administration\/reset-the-firewall-to-factory-default-settings\" target=\"_blank\" rel=\"noopener noreferrer\">Reset the Firewall to Factory Default Settings (Administration Guide 10.2)<\/a><\/li>\n<li><a href=\"https:\/\/knowledgebase.paloaltonetworks.com\/KCSArticleDetail?id=kA10g000000CldXCAS\" target=\"_blank\" rel=\"noopener noreferrer\">How to perform a factory reset on a Palo Alto Networks device<\/a><\/li>\n<li><a href=\"https:\/\/docs.paloaltonetworks.com\/pan-os\/10-2\/pan-os-admin\/firewall-administration\/use-the-web-interface\/launch-the-web-interface\" target=\"_blank\" rel=\"noopener noreferrer\">Launch the Web Interface<\/a><\/li>\n<li><a href=\"https:\/\/knowledgebase.paloaltonetworks.com\/KCSArticleDetail?id=kA10g000000ClN7CAK\" target=\"_blank\" rel=\"noopener noreferrer\">How to Configure the Management Interface IP<\/a><\/li>\n<li><a href=\"https:\/\/docs.paloaltonetworks.com\/pan-os\/10-2\/pan-os-admin\/getting-started\/integrate-the-firewall-into-your-management-network\/perform-initial-configuration\" target=\"_blank\" rel=\"noopener noreferrer\">Perform Initial Configuration<\/a><\/li>\n<li><a href=\"https:\/\/docs.paloaltonetworks.com\/pan-os\/10-2\/pan-os-admin\/firewall-administration\/use-the-web-interface\/configure-banners-message-of-the-day-and-logos\" target=\"_blank\" rel=\"noopener noreferrer\">Configure Bammers, Message of the Days, adn Logos<\/a><\/li>\n<li><a href=\"https:\/\/docs.paloaltonetworks.com\/pan-os\/10-2\/pan-os-networking-admin\/service-routes\/service-routes-overview\" target=\"_blank\" rel=\"noopener noreferrer\">Services Routes Overview<\/a><\/li>\n<li><a href=\"https:\/\/docs.paloaltonetworks.com\/pan-os\/10-2\/pan-os-networking-admin\/service-routes\/configure-service-routes\" target=\"_blank\" rel=\"noopener noreferrer\">Configure Services Routes<\/a><\/li>\n<li><a href=\"https:\/\/docs.paloaltonetworks.com\/pan-os\/10-2\/pan-os-admin\/getting-started\/register-the-firewall\" target=\"_blank\" rel=\"noopener noreferrer\">Register the Firewall<\/a><\/li>\n<li><a href=\"https:\/\/knowledgebase.paloaltonetworks.com\/KCSArticleDetail?id=kA10g000000ClNfCAK\" target=\"_blank\" rel=\"noopener noreferrer\">How to Register a Palo Alto Networks Device, Spare, or VM-Series Auth-Code<\/a><\/li>\n<li><a href=\"https:\/\/docs.paloaltonetworks.com\/pan-os\/10-2\/pan-os-admin\/subscriptions\/all-subscriptions\" target=\"_blank\" rel=\"noopener noreferrer\">Subsciptions You Can Use With The Firewall<\/a><\/li>\n<li><a href=\"https:\/\/docs.paloaltonetworks.com\/resources\/licensing-registration-activation\" target=\"_blank\" rel=\"noopener noreferrer\">Licensing, Registration, and Activation<\/a><\/li>\n<li><a href=\"https:\/\/docs.paloaltonetworks.com\/pan-os\/10-2\/pan-os-upgrade\" target=\"_blank\" rel=\"noopener noreferrer\">PAN-OS Upgrade Guide<\/a><\/li>\n<li><a href=\"https:\/\/live.paloaltonetworks.com\/t5\/Customer-Resources\/Support-PAN-OS-Software-Release-Guidance\/ta-p\/258304\" target=\"_blank\" rel=\"noopener noreferrer\">Support PAN-OS Release Guidance (Login Required)<\/a><\/li>\n<li><a href=\"https:\/\/docs.paloaltonetworks.com\/pan-os\/10-2\/pan-os-web-interface-help\/device\/device-dynamic-updates\" target=\"_blank\" rel=\"noopener noreferrer\">Device &gt; Dynamic Updates<\/a><\/li>\n<li><a href=\"https:\/\/docs.paloaltonetworks.com\/pan-os\/9-1\/pan-os-admin\/software-and-content-updates\/best-practices-for-app-and-threat-content-updates\" target=\"_blank\" rel=\"noopener noreferrer\">Best Practice for App and Threat Content Updates<\/a><\/li>\n<li><a href=\"https:\/\/knowledgebase.paloaltonetworks.com\/KCSArticleDetail?id=kA10g000000PM2lCAG\" target=\"_blank\" rel=\"noopener noreferrer\">Day 1 Configuration: What Does It Do?<\/a><\/li>\n<li><a href=\"https:\/\/github.com\/PaloAltoNetworks\/iron-skillet\" target=\"_blank\" rel=\"noopener noreferrer\">IronSkillet Day One Configuration Template<\/a><\/li>\n<\/ul>\n<h5 style=\"text-decoration: underline;\">Modul 3 &#8211; Managing Firewall Configurations<\/h5>\n<ul>\n<li><a href=\"https:\/\/docs.paloaltonetworks.com\/pan-os\/10-2\/pan-os-web-interface-help\/device\/device-setup-operations\" target=\"_blank\" rel=\"noopener noreferrer\">Device &gt; Setup &gt; Operations<\/a><\/li>\n<li><a href=\"https:\/\/docs.paloaltonetworks.com\/pan-os\/10-2\/pan-os-admin\/firewall-administration\/manage-configuration-backups\/save-and-export-firewall-configurations\" target=\"_blank\" rel=\"noopener noreferrer\">Save and Export Firewall Configuration<\/a><\/li>\n<li><a href=\"https:\/\/knowledgebase.paloaltonetworks.com\/KCSArticleDetail?id=kA10g000000ClaOCAS\" target=\"_blank\" rel=\"noopener noreferrer\">How to Save an Entire Configuration for Import into Another Palo Alto Networks Device<\/a><\/li>\n<li><a href=\"https:\/\/knowledgebase.paloaltonetworks.com\/KCSArticleDetail?id=kA10g000000CldVCAS\" target=\"_blank\" rel=\"noopener noreferrer\">How to Export The Device State Using XML API<\/a><\/li>\n<li><a href=\"https:\/\/docs.paloaltonetworks.com\/pan-os\/10-2\/pan-os-admin\/firewall-administration\/use-the-web-interface\/manage-and-monitor-administrative-tasks\" target=\"_blank\" rel=\"noopener noreferrer\">Manage and Monitor Administrative Tasks<\/a><\/li>\n<li><a href=\"https:\/\/docs.paloaltonetworks.com\/pan-os\/10-2\/pan-os-web-interface-help\/web-interface-basics\/revert-changes\" target=\"_blank\" rel=\"noopener noreferrer\">Revert Changes<\/a><\/li>\n<li><a href=\"https:\/\/docs.paloaltonetworks.com\/pan-os\/10-2\/pan-os-admin\/firewall-administration\/use-the-web-interface\/commit-validate-and-preview-firewall-configuration-changes\" target=\"_blank\" rel=\"noopener noreferrer\">Commit, Validate, and Preview Firewall Configuration Changes<\/a><\/li>\n<li><a href=\"https:\/\/docs.paloaltonetworks.com\/pan-os\/10-2\/pan-os-web-interface-help\/web-interface-basics\/lock-configurations\" target=\"_blank\" rel=\"noopener noreferrer\">Lock Configurations<\/a><\/li>\n<li><a href=\"https:\/\/docs.paloaltonetworks.com\/pan-os\/10-2\/pan-os-web-interface-help\/monitor\/monitor-logs\/log-types\" target=\"_blank\" rel=\"noopener noreferrer\">Log Types<\/a><\/li>\n<li><a href=\"https:\/\/docs.paloaltonetworks.com\/pan-os\/10-2\/pan-os-web-interface-help\/monitor\/monitor-logs\/log-actions\" target=\"_blank\" rel=\"noopener noreferrer\">Log Actions<\/a><\/li>\n<li><a href=\"https:\/\/docs.paloaltonetworks.com\/pan-os\/10-2\/pan-os-admin\/monitoring\/view-and-manage-logs\" target=\"_blank\" rel=\"noopener noreferrer\">View and Manage Logs<\/a><\/li>\n<li><a href=\"https:\/\/knowledgebase.paloaltonetworks.com\/KCSArticleDetail?id=kA10g000000ClSlCAK\" target=\"_blank\" rel=\"noopener noreferrer\">Basics of Traffic Monitor Filtering<\/a><\/li>\n<li><a href=\"https:\/\/docs.paloaltonetworks.com\/pan-os\/10-2\/pan-os-admin\/monitoring\/view-and-manage-logs\/filter-logs\" target=\"_blank\" rel=\"noopener noreferrer\">Filter Logs<\/a><\/li>\n<\/ul>\n<h5 style=\"text-decoration: underline;\">Modul 4 &#8211; Managing Firewall Administrator Accounts<\/h5>\n<ul>\n<li><a href=\"https:\/\/docs.paloaltonetworks.com\/pan-os\/10-2\/pan-os-admin\/authentication\/plan-your-authentication-deployment\" target=\"_blank\" rel=\"noopener noreferrer\">Plan Your Authentication Deployment<\/a><\/li>\n<li><a href=\"https:\/\/docs.paloaltonetworks.com\/pan-os\/10-2\/pan-os-web-interface-help\/device\/device-server-profiles#id3ee061c0-c6f2-40ba-beea-a57b18395ef3\" target=\"_blank\" rel=\"noopener noreferrer\">Device &gt; Server Profiles<\/a><\/li>\n<li><a href=\"https:\/\/docs.paloaltonetworks.com\/pan-os\/10-2\/pan-os-admin\/authentication\/authentication-types\/external-authentication-services\" target=\"_blank\" rel=\"noopener noreferrer\">External Authentication Services<\/a><\/li>\n<li><a href=\"https:\/\/docs.paloaltonetworks.com\/pan-os\/10-2\/pan-os-web-interface-help\/device\/device-setup-management#id008c489e-9f57-4e0c-a430-e2a2c3420bcf_id4d41c20b-37f1-49b5-8f94-f0f782285514\" target=\"_blank\" rel=\"noopener noreferrer\">Device &gt; Setup &gt; Management &gt; Authentication Settings<\/a><\/li>\n<li><a href=\"https:\/\/docs.paloaltonetworks.com\/pan-os\/10-2\/pan-os-admin\/firewall-administration\/manage-firewall-administrators\/administrative-role-types\" target=\"_blank\" rel=\"noopener noreferrer\">Administrative Role Types<\/a><\/li>\n<li><a href=\"https:\/\/docs.paloaltonetworks.com\/panorama\/10-2\/panorama-admin\/panorama-overview\/role-based-access-control\" target=\"_blank\" rel=\"noopener noreferrer\">Role-Based Access Control<\/a><\/li>\n<li><a href=\"https:\/\/docs.paloaltonetworks.com\/pan-os\/10-2\/pan-os-web-interface-help\/device\/device-local-user-database-users\" target=\"_blank\" rel=\"noopener noreferrer\">Device &gt; Local User Database &gt; Users<\/a><\/li>\n<li><a href=\"https:\/\/knowledgebase.paloaltonetworks.com\/KCSArticleDetail?id=kA10g000000ClHcCAK\" target=\"_blank\" rel=\"noopener noreferrer\">How to Configure Local Database Authentication<\/a><\/li>\n<li><a href=\"https:\/\/docs.paloaltonetworks.com\/pan-os\/10-2\/pan-os-web-interface-help\/device\/device-authentication-profile\/configure-an-authentication-profile\" target=\"_blank\" rel=\"noopener noreferrer\">Authentication Profile<\/a><\/li>\n<li><a href=\"https:\/\/docs.paloaltonetworks.com\/pan-os\/10-2\/pan-os-admin\/firewall-administration\/manage-firewall-administrators\/administrative-authentication\" target=\"_blank\" rel=\"noopener noreferrer\">Administrative Authentication<\/a><\/li>\n<li><a href=\"https:\/\/docs.paloaltonetworks.com\/pan-os\/10-2\/pan-os-admin\/authentication\/configure-an-authentication-profile-and-sequence\" target=\"_blank\" rel=\"noopener noreferrer\">Configure an Authentication Profile and Sequence<\/a><\/li>\n<li><a href=\"https:\/\/docs.paloaltonetworks.com\/pan-os\/10-2\/pan-os-admin\/certificate-management\/configure-a-certificate-profile\" target=\"_blank\" rel=\"noopener noreferrer\">Configure a Certificate Profile<\/a><\/li>\n<li><a href=\"https:\/\/docs.paloaltonetworks.com\/pan-os\/10-2\/pan-os-admin\/firewall-administration\/manage-firewall-administrators\/configure-administrative-accounts-and-authentication\/configure-ssh-key-based-administrator-authentication-to-the-cli\" target=\"_blank\" rel=\"noopener noreferrer\">Configure SSH Key-Based Administrator Authentication to the CLI<\/a><\/li>\n<\/ul>\n<h5 style=\"text-decoration: underline;\">Modul 5 &#8211; Connecting The Firewall To Production Networks With Security Zones<\/h5>\n<ul>\n<li><a href=\"https:\/\/docs.paloaltonetworks.com\/pan-os\/10-2\/pan-os-admin\/zone-protection-and-dos-protection\/network-segmentation-using-zones\" target=\"_blank\" rel=\"noopener noreferrer\">Network Segmentation Using Zones<\/a><\/li>\n<li><a href=\"https:\/\/docs.paloaltonetworks.com\/pan-os\/10-2\/pan-os-admin\/getting-started\/segment-your-network-using-interfaces-and-zones\" target=\"_blank\" rel=\"noopener noreferrer\">Segment Your Network Using Interfaces and Zones<\/a><\/li>\n<li><a href=\"https:\/\/www.paloaltonetworks.com\/zero-trust\" target=\"_blank\" rel=\"noopener noreferrer\">Zero Trust<\/a><\/li>\n<li><a href=\"https:\/\/www.paloaltonetworks.com\/cyberpedia\/what-is-a-zero-trust-architecture\" target=\"_blank\" rel=\"noopener noreferrer\">What is a Zero Trust Architecture<\/a><\/li>\n<li><a href=\"https:\/\/docs.paloaltonetworks.com\/pan-os\/10-2\/pan-os-admin\/getting-started\/segment-your-network-using-interfaces-and-zones\/configure-interfaces-and-zones\" target=\"_blank\" rel=\"noopener noreferrer\">Configure Interfaces and Zones<\/a><\/li>\n<li><a href=\"https:\/\/docs.paloaltonetworks.com\/pan-os\/10-2\/pan-os-web-interface-help\/network\/network-zones\/building-blocks-of-security-zones\" target=\"_blank\" rel=\"noopener noreferrer\">Building Blocks of Security Zones<\/a><\/li>\n<li><a href=\"https:\/\/docs.paloaltonetworks.com\/pan-os\/10-2\/pan-os-networking-admin\/configure-interfaces\/tap-interfaces\" target=\"_blank\" rel=\"noopener noreferrer\">Tap Interfaces<\/a><\/li>\n<li><a href=\"https:\/\/docs.paloaltonetworks.com\/pan-os\/10-2\/pan-os-networking-admin\/configure-interfaces\/virtual-wire-interfaces\" target=\"_blank\" rel=\"noopener noreferrer\">Virtual Wire Interfaces<\/a><\/li>\n<li><a href=\"https:\/\/docs.paloaltonetworks.com\/pan-os\/10-2\/pan-os-networking-admin\/configure-interfaces\/layer-2-interfaces\" target=\"_blank\" rel=\"noopener noreferrer\">Layer 2 Interfaces<\/a><\/li>\n<li><a href=\"https:\/\/docs.paloaltonetworks.com\/pan-os\/10-2\/pan-os-networking-admin\/configure-interfaces\/layer-3-interfaces\" target=\"_blank\" rel=\"noopener noreferrer\">Layer 3 Interfaces<\/a><\/li>\n<li><a href=\"https:\/\/docs.paloaltonetworks.com\/pan-os\/10-2\/pan-os-networking-admin\/configure-interfaces\/configure-an-aggregate-interface-group\" target=\"_blank\" rel=\"noopener noreferrer\">Configure an Aggregate Interface Group<\/a><\/li>\n<li><a href=\"https:\/\/docs.paloaltonetworks.com\/pan-os\/10-2\/pan-os-networking-admin\/configure-interfaces\/configure-bonjour-reflector-for-network-segmentation\" target=\"_blank\" rel=\"noopener noreferrer\">Configure Bonjour Reflector for Network Segmentation<\/a><\/li>\n<li><a href=\"https:\/\/docs.paloaltonetworks.com\/pan-os\/10-2\/pan-os-networking-admin\/virtual-routers\" target=\"_blank\" rel=\"noopener noreferrer\">Virtual Routers<\/a><\/li>\n<li><a href=\"https:\/\/docs.paloaltonetworks.com\/pan-os\/10-2\/pan-os-admin\/policy\/policy-based-forwarding\" target=\"_blank\" rel=\"noopener noreferrer\">Policy-Based Forwarding<\/a><\/li>\n<li><a href=\"https:\/\/knowledgebase.paloaltonetworks.com\/KCSArticleDetail?id=kA10g000000ClXsCAK\" target=\"_blank\" rel=\"noopener noreferrer\">Dynamic Protocols on Palo Alto Networks Devices that Do Not Require Security Policies to Operate<\/a><\/li>\n<li><a href=\"https:\/\/docs.paloaltonetworks.com\/pan-os\/10-2\/pan-os-networking-admin\/ospf\" target=\"_blank\" rel=\"noopener noreferrer\">OSPF<\/a><\/li>\n<li><a href=\"https:\/\/knowledgebase.paloaltonetworks.com\/KCSArticleDetail?id=kA10g000000ClN1CAK\" target=\"_blank\" rel=\"noopener noreferrer\">How to Configure OSPF<\/a><\/li>\n<li><a href=\"https:\/\/docs.paloaltonetworks.com\/pan-os\/10-2\/pan-os-networking-admin\/bgp\" target=\"_blank\" rel=\"noopener noreferrer\">BGP<\/a><\/li>\n<li><a href=\"https:\/\/knowledgebase.paloaltonetworks.com\/KCSArticleDetail?id=kA10g000000ClJg\" target=\"_blank\" rel=\"noopener noreferrer\">Tech Note: How to Configure BGP<\/a><\/li>\n<li><a href=\"https:\/\/docs.paloaltonetworks.com\/pan-os\/10-2\/pan-os-networking-admin\/ip-multicast\" target=\"_blank\" rel=\"noopener noreferrer\">IP Multicast<\/a><\/li>\n<li><a href=\"https:\/\/knowledgebase.paloaltonetworks.com\/KCSArticleDetail?id=kA10g000000ClJfCAK\" target=\"_blank\" rel=\"noopener noreferrer\">How to Facilitate Multicast Routing when only One Palo Alto Networks Firewall Between the Sender and Recipients<\/a><\/li>\n<\/ul>\n<h5 style=\"text-decoration: underline;\">Modul 6 &#8211; Creating And Managing Security Policy Rules<\/h5>\n<ul>\n<li><a href=\"https:\/\/knowledgebase.paloaltonetworks.com\/KCSArticleDetail?id=kA10g000000ClgACAS\" target=\"_blank\" rel=\"noopener noreferrer\">Resource List: Security Policy Configuring and Troubleshooting<\/a><\/li>\n<li><a href=\"https:\/\/knowledgebase.paloaltonetworks.com\/KCSArticleDetail?id=kA10g000000ClVHCA0\" target=\"_blank\" rel=\"noopener noreferrer\">Packet Flow Sequence in PAN-OS<\/a><\/li>\n<li><a href=\"https:\/\/knowledgebase.paloaltonetworks.com\/KCSArticleDetail?id=kA10g000000ClVECA0\" target=\"_blank\" rel=\"noopener noreferrer\">Palo Alto Networks Firewall Session Overview<\/a><\/li>\n<li><a href=\"https:\/\/knowledgebase.paloaltonetworks.com\/KCSArticleDetail?id=kA10g000000Clk9CAC\" target=\"_blank\" rel=\"noopener noreferrer\">Session States and Types<\/a><\/li>\n<li><a href=\"https:\/\/docs.paloaltonetworks.com\/pan-os\/10-2\/pan-os-admin\/policy\/security-policy\/components-of-a-security-policy-rule\" target=\"_blank\" rel=\"noopener noreferrer\">Components of a Security Policy Rule<\/a><\/li>\n<li><a href=\"https:\/\/docs.paloaltonetworks.com\/pan-os\/10-2\/pan-os-web-interface-help\/policies\/move-or-clone-a-policy-rule\" target=\"_blank\" rel=\"noopener noreferrer\">Move or Clone a Policy Rule<\/a><\/li>\n<li><a href=\"https:\/\/knowledgebase.paloaltonetworks.com\/KCSArticleDetail?id=kA10g000000ClomCAC\" target=\"_blank\" rel=\"noopener noreferrer\">What are Universal, Intrazone and Interzone Rules?<\/a><\/li>\n<li><a href=\"https:\/\/docs.paloaltonetworks.com\/pan-os\/10-2\/pan-os-admin\/policy\/security-policy\/create-a-security-policy-rule\" target=\"_blank\" rel=\"noopener noreferrer\">Create a Security Policy Rule<\/a><\/li>\n<li><a href=\"https:\/\/docs.paloaltonetworks.com\/pan-os\/10-2\/pan-os-admin\/app-id\/security-policy-rule-optimization\" target=\"_blank\" rel=\"noopener noreferrer\">Security Policy Rule Optimization<\/a><\/li>\n<li><a href=\"https:\/\/knowledgebase.paloaltonetworks.com\/KCSArticleDetail?id=kA10g000000PMThCAO\" target=\"_blank\" rel=\"noopener noreferrer\">Why use Security Policy Optimizer and what are the benefits?<\/a><\/li>\n<li><a href=\"https:\/\/docs.paloaltonetworks.com\/panorama\/10-2\/panorama-admin\/manage-firewalls\/device-monitoring-on-panorama\/monitor-policy-rule-usage\" target=\"_blank\" rel=\"noopener noreferrer\">Monitor Policy Rule Usage<\/a><\/li>\n<li><a href=\"https:\/\/docs.paloaltonetworks.com\/pan-os\/10-2\/pan-os-admin\/app-id\/use-application-objects-in-policy\/resolve-application-dependencies\" target=\"_blank\" rel=\"noopener noreferrer\">Resolve Application Dependencies<\/a><\/li>\n<li><a href=\"https:\/\/docs.paloaltonetworks.com\/pan-os\/10-2\/pan-os-web-interface-help\/objects\/objects-services\" target=\"_blank\" rel=\"noopener noreferrer\">Objects &gt; Services<\/a><\/li>\n<li><a href=\"https:\/\/docs.paloaltonetworks.com\/pan-os\/10-2\/pan-os-admin\/app-id\/security-policy-rule-optimization\/policy-optimizer-concepts\/sorting-and-filtering-security-policy-rules\" target=\"_blank\" rel=\"noopener noreferrer\">Sorting and Filtering Security Policy Rules<\/a><\/li>\n<li><a href=\"https:\/\/docs.paloaltonetworks.com\/pan-os\/10-2\/pan-os-admin\/policy\/use-address-object-to-represent-ip-addresses\/create-an-address-object\" target=\"_blank\" rel=\"noopener noreferrer\">Create an Address Object<\/a><\/li>\n<li><a href=\"https:\/\/docs.paloaltonetworks.com\/pan-os\/10-2\/pan-os-web-interface-help\/objects\/objects-address-groups\" target=\"_blank\" rel=\"noopener noreferrer\">Objects &gt; Address Groups<\/a><\/li>\n<li><a href=\"https:\/\/docs.paloaltonetworks.com\/pan-os\/10-2\/pan-os-admin\/policy\/use-auto-tagging-to-automate-security-actions\" target=\"_blank\" rel=\"noopener noreferrer\">Use Auto-Tagging to Automate Security Actions<\/a><\/li>\n<li><a href=\"https:\/\/docs.paloaltonetworks.com\/pan-os\/10-2\/pan-os-admin\/policy\/use-tags-to-group-and-visually-distinguish-objects\/create-and-apply-tags\" target=\"_blank\" rel=\"noopener noreferrer\">Create and Apply Tags<\/a><\/li>\n<li><a href=\"https:\/\/docs.paloaltonetworks.com\/pan-os\/10-2\/pan-os-web-interface-help\/objects\/objects-tags\/view-rulebase-as-groups\" target=\"_blank\" rel=\"noopener noreferrer\">View Rulebase as Groups<\/a><\/li>\n<li><a href=\"https:\/\/docs.paloaltonetworks.com\/pan-os\/10-2\/pan-os-web-interface-help\/device\/device-troubleshooting\" target=\"_blank\" rel=\"noopener noreferrer\">Device &gt; Troubleshooting<\/a><\/li>\n<li><a href=\"https:\/\/docs.paloaltonetworks.com\/pan-os\/10-2\/pan-os-web-interface-help\/web-interface-basics\/global-find\" target=\"_blank\" rel=\"noopener noreferrer\">Global Find<\/a><\/li>\n<li><a href=\"https:\/\/knowledgebase.paloaltonetworks.com\/KCSArticleDetail?id=kA10g000000ClRuCAK\" target=\"_blank\" rel=\"noopener noreferrer\">Global Find &#8211; Knowledge Base<\/a><\/li>\n<li><a href=\"https:\/\/docs.paloaltonetworks.com\/pan-os\/10-2\/pan-os-admin\/monitoring\/use-syslog-for-monitoring\/syslog-field-descriptions\/traffic-log-fields\" target=\"_blank\" rel=\"noopener noreferrer\">Traffic Log Fields<\/a><\/li>\n<\/ul>\n<h5 style=\"text-decoration: underline;\">Modul 7 &#8211; Creating And Managing NAT Policy Rules<\/h5>\n<ul>\n<li><a href=\"\/\/knowledgebase.paloaltonetworks.com\/KCSArticleDetail?id=kA10g000000CllzCAC\" target=\"_blank\" rel=\"noopener noreferrer\">Getting Started: Network Address Translation (NAT)<\/a><\/li>\n<li><a href=\"https:\/\/knowledgebase.paloaltonetworks.com\/KCSArticleDetail?id=kA10g000000ClEiCAK\" target=\"_blank\" rel=\"noopener noreferrer\">How to Configure U-Turn NAT<\/a><\/li>\n<li><a href=\"https:\/\/knowledgebase.paloaltonetworks.com\/KCSArticleDetail?id=kA10g000000ClTuCAK\" target=\"_blank\" rel=\"noopener noreferrer\">Tips &amp; Tricks: NAT64<\/a><\/li>\n<li><a href=\"https:\/\/docs.paloaltonetworks.com\/pan-os\/10-2\/pan-os-networking-admin\/nat\/nat-policy-rules\/nat-policy-overview\" target=\"_blank\" rel=\"noopener noreferrer\">NAT Policy Overview<\/a><\/li>\n<li><a href=\"https:\/\/docs.paloaltonetworks.com\/pan-os\/10-2\/pan-os-networking-admin\/nat\/nat-configuration-examples\/source-and-destination-nat-example\" target=\"_blank\" rel=\"noopener noreferrer\">Source and Destination NAT Example<\/a><\/li>\n<li><a href=\"https:\/\/docs.paloaltonetworks.com\/pan-os\/10-2\/pan-os-networking-admin\/nat\/source-nat-and-destination-nat\/source-nat\" target=\"_blank\" rel=\"noopener noreferrer\">Source NAT<\/a><\/li>\n<li><a href=\"https:\/\/knowledgebase.paloaltonetworks.com\/KCSArticleDetail?id=kA10g000000CllzCAC\" target=\"_blank\" rel=\"noopener noreferrer\">Getting Started: Network Address Translation (NAT)<\/a><\/li>\n<li><a href=\"https:\/\/docs.paloaltonetworks.com\/pan-os\/10-2\/pan-os-networking-admin\/nat\/dynamic-ip-and-port-nat-oversubscription\" target=\"_blank\" rel=\"noopener noreferrer\">Dynamic IP and Port NAT Oversubscription<\/a><\/li>\n<li><a href=\"https:\/\/docs.paloaltonetworks.com\/pan-os\/10-2\/pan-os-networking-admin\/nat\/source-nat-and-destination-nat\/destination-nat\" target=\"_blank\" rel=\"noopener noreferrer\">Destination NAT<\/a><\/li>\n<li><a href=\"https:\/\/docs.paloaltonetworks.com\/pan-os\/10-2\/pan-os-networking-admin\/nat\/configure-nat\/configure-destination-nat-using-dynamic-ip-addresses\" target=\"_blank\" rel=\"noopener noreferrer\">Configure Destination NAT Using Dynamic IP Addresses<\/a><\/li>\n<li><a href=\"https:\/\/docs.paloaltonetworks.com\/pan-os\/10-2\/pan-os-networking-admin\/nat\/nat-configuration-examples\/destination-nat-with-port-translation-example\" target=\"_blank\" rel=\"noopener noreferrer\">Destination NAT with Port Translation Example<\/a><\/li>\n<li><a href=\"https:\/\/docs.paloaltonetworks.com\/pan-os\/10-2\/pan-os-networking-admin\/nat\/configure-nat\/enable-bi-directional-address-translation-for-your-public-facing-servers-static-source-nat\" target=\"_blank\" rel=\"noopener noreferrer\">Enable Bi-Directional Address Translation for Your Public-Facing Servers (Static Source NAT)<\/a><\/li>\n<li><a href=\"https:\/\/knowledgebase.paloaltonetworks.com\/KCSArticleDetail?id=kA10g000000ClhwCAC\" target=\"_blank\" rel=\"noopener noreferrer\">Source NAT Translation Types and Typical Use Cases<\/a><\/li>\n<li><a href=\"https:\/\/knowledgebase.paloaltonetworks.com\/KCSArticleDetail?id=kA10g000000ClTuCAK\" target=\"_blank\" rel=\"noopener noreferrer\">Tips &amp; Tricks: NAT64<\/a><\/li>\n<li><a href=\"https:\/\/knowledgebase.paloaltonetworks.com\/KCSArticleDetail?id=kA10g000000ClIFCA0\" target=\"_blank\" rel=\"noopener noreferrer\">How to Configure NAT64 on Palo Alto Firewalls &#8211; IPv6 to IPv4 Translation<\/a><\/li>\n<li><a href=\"https:\/\/knowledgebase.paloaltonetworks.com\/KCSArticleDetail?id=kA14u000000oM6fCAE\" target=\"_blank\" rel=\"noopener noreferrer\">How to setup Destination-NAT for IPv6<\/a><\/li>\n<li><a href=\"https:\/\/knowledgebase.paloaltonetworks.com\/KCSArticleDetail?id=kA10g000000ClsZCAS\" target=\"_blank\" rel=\"noopener noreferrer\">How to Check the Oversubscription on a NAT Rule<\/a><\/li>\n<li><a href=\"https:\/\/knowledgebase.paloaltonetworks.com\/KCSArticleDetail?id=kA10g000000ClfjCAC\" target=\"_blank\" rel=\"noopener noreferrer\">DNS rewrite on a Palo Alto Networks firewall<\/a><\/li>\n<\/ul>\n<h5 style=\"text-decoration: underline;\">Modul 8 &#8211; Controlling Application Usage With App-ID<\/h5>\n<ul>\n<li><a href=\"https:\/\/knowledgebase.paloaltonetworks.com\/KCSArticleDetail?id=kA10g000000ClowCAC\" target=\"_blank\" rel=\"noopener noreferrer\">Resource list:\u00a0App-ID\u00a0Configuration and Troubleshooting<\/a><\/li>\n<li><a href=\"https:\/\/applipedia.paloaltonetworks.com\/\" target=\"_blank\" rel=\"noopener noreferrer\">Application Research Center<\/a><\/li>\n<li><a href=\"https:\/\/knowledgebase.paloaltonetworks.com\/KCSArticleDetail?id=kA10g000000Clc6CAC\" target=\"_blank\" rel=\"noopener noreferrer\">Pro Tips &#8211; Unknown Applications<\/a><\/li>\n<li><a href=\"https:\/\/docs.paloaltonetworks.com\/pan-os\/10-2\/pan-os-admin\/app-id\/manage-custom-or-unknown-applications\" target=\"_blank\" rel=\"noopener noreferrer\">Manage Custom or Unknown Applications<\/a><\/li>\n<li><a href=\"https:\/\/knowledgebase.paloaltonetworks.com\/KCSArticleDetail?id=kA10g000000Clu2CAC\" target=\"_blank\" rel=\"noopener noreferrer\">How to Request a new App-ID<\/a><\/li>\n<li><a href=\"https:\/\/docs.paloaltonetworks.com\/best-practices\/10-2\/internet-gateway-best-practices\/best-practice-internet-gateway-security-policy\/decrypt-traffic-for-full-visibility-and-threat-inspection\" target=\"_blank\" rel=\"noopener noreferrer\">Decrypt Traffic for Full Visibility and Threat Inspection<\/a><\/li>\n<li><a href=\"https:\/\/docs.paloaltonetworks.com\/pan-os\/10-2\/pan-os-admin\/app-id\/security-policy-rule-optimization\" target=\"_blank\" rel=\"noopener noreferrer\">Security Policy Rule Optimization<\/a><\/li>\n<li><a href=\"https:\/\/docs.paloaltonetworks.com\/pan-os\/10-2\/pan-os-admin\/app-id\/security-policy-rule-optimization\/migrate-port-based-to-app-id-based-security-policy-rules\" target=\"_blank\" rel=\"noopener noreferrer\">Migrate Port-Based to App-ID Based Security Policy Rules<\/a><\/li>\n<li><a href=\"https:\/\/live.paloaltonetworks.com\/t5\/expedition-articles\/expedition-documentation\/ta-p\/215619\" target=\"_blank\" rel=\"noopener noreferrer\">Expedition Documentation <\/a><\/li>\n<li><a href=\"https:\/\/docs.paloaltonetworks.com\/best-practices\/9-1\/best-practices-for-migrating-to-application-based-policy\" target=\"_blank\" rel=\"noopener noreferrer\">Best Practices for Migrating to Application-Based Policy<\/a><\/li>\n<li><a href=\"https:\/\/docs.paloaltonetworks.com\/pan-os\/10-2\/pan-os-upgrade\/software-and-content-updates\/app-and-threat-content-updates\" target=\"_blank\" rel=\"noopener noreferrer\">Applications and Threats Content Updates<\/a><\/li>\n<li><a href=\"https:\/\/docs.paloaltonetworks.com\/pan-os\/10-2\/pan-os-admin\/app-id\/manage-new-app-ids-introduced-in-content-releases\/app-id-updates-workflow\" target=\"_blank\" rel=\"noopener noreferrer\">Workflow to Best Incorporate New and Modified App-IDs<\/a><\/li>\n<li><a href=\"https:\/\/docs.paloaltonetworks.com\/pan-os\/10-2\/pan-os-admin\/app-id\/manage-new-app-ids-introduced-in-content-releases\/review-new-app-ids-since-last-content-version\" target=\"_blank\" rel=\"noopener noreferrer\">See the New and Modified App-IDs in a Content Release<\/a><\/li>\n<li><a href=\"https:\/\/docs.paloaltonetworks.com\/pan-os\/10-2\/pan-os-admin\/app-id\/manage-new-app-ids-introduced-in-content-releases\/review-new-app-id-impact-on-existing-policy-rules\" target=\"_blank\" rel=\"noopener noreferrer\">See How New and Modified App-IDs Impact Your Security Policy<\/a><\/li>\n<\/ul>\n<h5 style=\"text-decoration: underline;\">Modul 9 &#8211; Blocking Known Threats Using Security Profiles<\/h5>\n<ul>\n<li><a href=\"https:\/\/knowledgebase.paloaltonetworks.com\/KCSArticleDetail?id=kA10g000000ClZ5CAK\" target=\"_blank\" rel=\"noopener noreferrer\">Resource List: File Blocking Profile Configuring and Troubleshooting<\/a><\/li>\n<li><a href=\"https:\/\/docs.paloaltonetworks.com\/pan-os\/10-2\/pan-os-admin\/policy\/security-profiles\" target=\"_blank\" rel=\"noopener noreferrer\">Security Profiles<\/a><\/li>\n<li><a href=\"https:\/\/docs.paloaltonetworks.com\/pan-os\/10-2\/pan-os-admin\/threat-prevention\/best-practices-for-securing-your-network-from-layer-4-and-layer-7-evasions\" target=\"_blank\" rel=\"noopener noreferrer\">Best Practices for Securing Your Network from Layer 4 and Layer 7 Evasions<\/a><\/li>\n<li><a href=\"https:\/\/docs.paloaltonetworks.com\/pan-os\/10-2\/pan-os-admin\/threat-prevention\" target=\"_blank\" rel=\"noopener noreferrer\">Threat Prevention<\/a><\/li>\n<li><a href=\"threatvault.paloaltonetworks.com\/\" target=\"_blank\" rel=\"noopener noreferrer\">Threat Vault<\/a><\/li>\n<li><a href=\"https:\/\/docs.paloaltonetworks.com\/pan-os\/10-2\/pan-os-admin\/policy\/security-profiles\" target=\"_blank\" rel=\"noopener noreferrer\">Security Profiles<\/a><\/li>\n<li><a href=\"https:\/\/docs.paloaltonetworks.com\/pan-os\/10-2\/pan-os-admin\/monitoring\/use-syslog-for-monitoring\/syslog-field-descriptions\/threat-log-fields\" target=\"_blank\" rel=\"noopener noreferrer\">Threat Log Fields<\/a><\/li>\n<li><a href=\"https:\/\/knowledgebase.paloaltonetworks.com\/KCSArticleDetail?id=kA10g000000Cm4yCAC\" target=\"_blank\" rel=\"noopener noreferrer\">How to create a vulnerability exception<\/a><\/li>\n<li><a href=\"https:\/\/knowledgebase.paloaltonetworks.com\/KCSArticleDetail?id=kA10g000000ClhcCAC\" target=\"_blank\" rel=\"noopener noreferrer\">Vulnerability Exception Based Upon Source and Destination IP Address to change the default behavior<\/a><\/li>\n<li><a href=\"https:\/\/knowledgebase.paloaltonetworks.com\/KCSArticleDetail?id=kA10g000000ClcrCAC\" target=\"_blank\" rel=\"noopener noreferrer\">How to Use Anti-Spyware, Vulnerability and Antivirus Exceptions to Block or Allow Threats<\/a><\/li>\n<li><a href=\"https:\/\/docs.paloaltonetworks.com\/pan-os\/10-2\/pan-os-admin\/threat-prevention\/wildfire-inline-ml\" target=\"_blank\" rel=\"noopener noreferrer\">WildFire Inline ML<\/a><\/li>\n<li><a href=\"https:\/\/knowledgebase.paloaltonetworks.com\/KCSArticleDetail?id=kA10g000000ClGECA0\" target=\"_blank\" rel=\"noopener noreferrer\">How to Configure DNS Sinkhole<\/a><\/li>\n<li><a href=\"https:\/\/knowledgebase.paloaltonetworks.com\/KCSArticleDetail?id=kA10g000000ClmFCAS\" target=\"_blank\" rel=\"noopener noreferrer\">How to Verify DNS Sinkhole<\/a><\/li>\n<li><a href=\"https:\/\/docs.paloaltonetworks.com\/pan-os\/10-2\/pan-os-admin\/threat-prevention\/use-dns-queries-to-identify-infected-hosts-on-the-network\/configure-dns-sinkholing-for-a-list-of-custom-domains\" target=\"_blank\" rel=\"noopener noreferrer\">Configure DNS Sinkholing for a List of Custom Domains<\/a><\/li>\n<li><a href=\"https:\/\/docs.paloaltonetworks.com\/pan-os\/10-2\/pan-os-admin\/threat-prevention\/use-dns-queries-to-identify-infected-hosts-on-the-network\/configure-dns-sinkholing\" target=\"_blank\" rel=\"noopener noreferrer\">Configure DNS Sinkholing<\/a><\/li>\n<li><a href=\"https:\/\/knowledgebase.paloaltonetworks.com\/KCSArticleDetail?id=kA10g000000ClT8CAK\" target=\"_blank\" rel=\"noopener noreferrer\">Tips from the Field: File Blocking Profile<\/a><\/li>\n<li><a href=\"https:\/\/docs.paloaltonetworks.com\/pan-os\/10-2\/pan-os-admin\/threat-prevention\/set-up-file-blocking\" target=\"_blank\" rel=\"noopener noreferrer\">Set Up File Blocking<\/a><\/li>\n<li><a href=\"https:\/\/docs.paloaltonetworks.com\/pan-os\/10-2\/pan-os-admin\/threat-prevention\/set-up-data-filtering\/predefined-data-filtering-patterns\" target=\"_blank\" rel=\"noopener noreferrer\">Predefined Data Filtering Patterns<\/a><\/li>\n<li><a href=\"https:\/\/docs.paloaltonetworks.com\/panorama\/10-2\/panorama-admin\/monitor-network-activity\/use-case-respond-to-an-incident-using-panorama\/review-data-filtering-logs\" target=\"_blank\" rel=\"noopener noreferrer\">Review Data Filtering Logs<\/a><\/li>\n<li><a href=\"https:\/\/docs.paloaltonetworks.com\/best-practices\/10-2\/internet-gateway-best-practices\/best-practice-internet-gateway-security-policy\/create-best-practice-security-profiles\" target=\"_blank\" rel=\"noopener noreferrer\">Create Best Practice Security Profiles for the Internet Gateway<\/a><\/li>\n<li><a href=\"https:\/\/docs.paloaltonetworks.com\/best-practices\/dos-and-zone-protection-best-practices\" target=\"_blank\" rel=\"noopener noreferrer\">DoS and Zone Protection Best Practices<\/a><\/li>\n<li><a href=\"https:\/\/docs.paloaltonetworks.com\/best-practices\/dos-and-zone-protection-best-practices\/dos-and-zone-protection-best-practices\/deploy-dos-and-zone-protection-using-best-practices\" target=\"_blank\" rel=\"noopener noreferrer\">Deploy DoS and Zone Protection Using Best Practices<\/a><\/li>\n<li><a href=\"https:\/\/docs.paloaltonetworks.com\/pan-os\/10-2\/pan-os-admin\/zone-protection-and-dos-protection\/zone-defense\/zone-protection-profiles\/flood-protection\" target=\"_blank\" rel=\"noopener noreferrer\">Flood Protection<\/a><\/li>\n<li><a href=\"https:\/\/docs.paloaltonetworks.com\/pan-os\/10-2\/pan-os-admin\/zone-protection-and-dos-protection\/configure-zone-protection-to-increase-network-security\/configure-reconnaissance-protection\" target=\"_blank\" rel=\"noopener noreferrer\">Configure Reconnaissance Protection<\/a><\/li>\n<li><a href=\"https:\/\/docs.paloaltonetworks.com\/pan-os\/10-2\/pan-os-admin\/zone-protection-and-dos-protection\/configure-zone-protection-to-increase-network-security\/configure-packet-based-attack-protection\" target=\"_blank\" rel=\"noopener noreferrer\">Configure Packet Based Attack Protection<\/a><\/li>\n<li><a href=\"https:\/\/knowledgebase.paloaltonetworks.com\/KCSArticleDetail?id=kA10g000000ClWLCA0\" target=\"_blank\" rel=\"noopener noreferrer\">Troubleshooting DoS Attacks<\/a><\/li>\n<li><a href=\"https:\/\/knowledgebase.paloaltonetworks.com\/KCSArticleDetail?id=kA10g000000ClOGCA0\" target=\"_blank\" rel=\"noopener noreferrer\">Understanding DoS Protection<\/a><\/li>\n<li><a href=\"https:\/\/knowledgebase.paloaltonetworks.com\/KCSArticleDetail?id=kA10g000000ClVkCAK\" target=\"_blank\" rel=\"noopener noreferrer\">Zone Protection Recommendations<\/a><\/li>\n<li><a href=\"https:\/\/knowledgebase.paloaltonetworks.com\/KCSArticleDetail?id=kA10g000000ClOKCA0\" target=\"_blank\" rel=\"noopener noreferrer\">Understanding DoS Logs and Counters<\/a><\/li>\n<li><a href=\"https:\/\/knowledgebase.paloaltonetworks.com\/KCSArticleDetail?id=kA10g000000ClTLCA0\" target=\"_blank\" rel=\"noopener noreferrer\">Best Practices for Ransomware Prevention<\/a><\/li>\n<li><a href=\"https:\/\/knowledgebase.paloaltonetworks.com\/KCSArticleDetail?id=kA14u0000001VMY\" target=\"_blank\" rel=\"noopener noreferrer\">Best practices to prevent DarkSide ransomware<\/a><\/li>\n<li><a href=\"https:\/\/knowledgebase.paloaltonetworks.com\/KCSArticleDetail?id=kA10g000000ClUdCAK\" target=\"_blank\" rel=\"noopener noreferrer\">Creating Custom Threat signatures from Snort signatures<\/a><\/li>\n<\/ul>\n<h5 style=\"text-decoration: underline;\">Modul 10 &#8211; Blocking Inappropriate Web Traffic With Advanced URL Filtering<\/h5>\n<ul>\n<li><a href=\"https:\/\/docs.paloaltonetworks.com\/pan-os\/10-2\/pan-os-admin\/url-filtering\" target=\"_blank\" rel=\"noopener noreferrer\">URL Filtering<\/a><\/li>\n<li><a href=\"https:\/\/docs.paloaltonetworks.com\/pan-os\/10-2\/pan-os-admin\/url-filtering\/pan-db-categorization\" target=\"_blank\" rel=\"noopener noreferrer\">How Advanced URL Filtering Works<\/a><\/li>\n<li><a href=\"https:\/\/docs.paloaltonetworks.com\/pan-os\/10-2\/pan-os-admin\/url-filtering\/determine-url-filtering-policy-requirements\" target=\"_blank\" rel=\"noopener noreferrer\">Plan Your URL Filtering Deployment<\/a><\/li>\n<li><a href=\"https:\/\/docs.paloaltonetworks.com\/pan-os\/10-2\/pan-os-admin\/url-filtering\/url-filtering-best-practices\" target=\"_blank\" rel=\"noopener noreferrer\">URL Filtering Best Practices<\/a><\/li>\n<li><a href=\"https:\/\/knowledgebase.paloaltonetworks.com\/KCSArticleDetail?id=kA10g000000Cm5hCAC\" target=\"_blank\" rel=\"noopener noreferrer\">Where Can I Find a Complete List of PAN-DB URL Filtering Categories?<\/a><\/li>\n<li><a href=\"https:\/\/live.paloaltonetworks.com\/t5\/blogs\/url-filtering-assigning-multiple-categories-to-urls\/ba-p\/516971\" target=\"_blank\" rel=\"noopener noreferrer\">URL Filtering: Assigning Multiple Categories to URLs <\/a><\/li>\n<li><a href=\"https:\/\/docs.paloaltonetworks.com\/pan-os\/10-2\/pan-os-admin\/url-filtering\/custom-url-categories\" target=\"_blank\" rel=\"noopener noreferrer\">Create a Custom URL Category<\/a><\/li>\n<li><a href=\"https:\/\/docs.paloaltonetworks.com\/pan-os\/10-2\/pan-os-admin\/url-filtering\/allow-password-access-to-certain-sites\" target=\"_blank\" rel=\"noopener noreferrer\">Allow Password Access to Certain Sites<\/a><\/li>\n<li><a href=\"https:\/\/docs.paloaltonetworks.com\/pan-os\/10-2\/pan-os-admin\/url-filtering\/safe-search-enforcement\" target=\"_blank\" rel=\"noopener noreferrer\">Safe Search Enforcement<\/a><\/li>\n<li><a href=\"https:\/\/knowledgebase.paloaltonetworks.com\/KCSArticleDetail?id=kA10g000000ClSdCAK\" target=\"_blank\" rel=\"noopener noreferrer\">Safe Search Enforcement in K-12<\/a><\/li>\n<li><a href=\"https:\/\/docs.paloaltonetworks.com\/pan-os\/10-2\/pan-os-admin\/app-id\/http-header-insertion\/http-header-insertion-create-custom\" target=\"_blank\" rel=\"noopener noreferrer\">Create Custom HTTP Header Insertion Entries<\/a><\/li>\n<li><a href=\"\/\/docs.paloaltonetworks.com\/pan-os\/10-2\/pan-os-admin\/url-filtering\/configure-url-filtering-inline-ml\" target=\"_blank\" rel=\"noopener noreferrer\">Configure Inline Categorization<\/a><\/li>\n<li><a href=\"https:\/\/knowledgebase.paloaltonetworks.com\/KCSArticleDetail?id=kA14u000000oM37CAE&amp;lang=en_US%E2%80%A9\" target=\"_blank\" rel=\"noopener noreferrer\">How does the URL Filtering Inline ML feature work?<\/a><\/li>\n<li><a href=\"https:\/\/docs.paloaltonetworks.com\/pan-os\/10-2\/pan-os-admin\/url-filtering\/url-category-change\" target=\"_blank\" rel=\"noopener noreferrer\">Request to Change the Category for a URL<\/a><\/li>\n<li><a href=\"https:\/\/knowledgebase.paloaltonetworks.com\/KCSArticleDetail?id=kA10g000000ClpGCAS\" target=\"_blank\" rel=\"noopener noreferrer\">How to Submit change for a Miscategorized URL in PAN-DB<\/a><\/li>\n<li><a href=\"https:\/\/urlfiltering.paloaltonetworks.com\/\" target=\"_blank\" rel=\"noopener noreferrer\">Test A Site<\/a><\/li>\n<li><a href=\"https:\/\/knowledgebase.paloaltonetworks.com\/KCSArticleDetail?id=kA10g000000ClaDCAS\" target=\"_blank\" rel=\"noopener noreferrer\">URL Filtering Test Pages<\/a><\/li>\n<li><a href=\"https:\/\/knowledgebase.paloaltonetworks.com\/KCSArticleDetail?id=kA14u000000sY4UCAU\" target=\"_blank\" rel=\"noopener noreferrer\">How to test URL Filtering Inline ML detection<\/a><\/li>\n<li><a href=\"https:\/\/knowledgebase.paloaltonetworks.com\/KCSArticleDetail?id=kA14u000000oM79CAE\" target=\"_blank\" rel=\"noopener noreferrer\">Examples of using wildcards in URL filtering profiles<\/a><\/li>\n<li><a href=\"https:\/\/knowledgebase.paloaltonetworks.com\/KCSArticleDetail?id=kA10g000000ClRZCA0\" target=\"_blank\" rel=\"noopener noreferrer\">URL Filtering Implementation and Troubleshooting<\/a><\/li>\n<\/ul>\n<h5 style=\"text-decoration: underline;\">Modul 11 &#8211; Blocking Unknown Threats With Wildfire<\/h5>\n<ul>\n<li><a href=\"https:\/\/knowledgebase.paloaltonetworks.com\/KCSArticleDetail?id=kA10g000000HAEJCA4\" target=\"_blank\" rel=\"noopener noreferrer\">Resource List:\u00a0Wildfire Configuration and Troubleshooting<\/a><\/li>\n<li><a href=\"https:\/\/docs.paloaltonetworks.com\/wildfire\/9-1\/wildfire-admin\/wildfire-overview\/get-started-with-wildfire\" target=\"_blank\" rel=\"noopener noreferrer\">Get Started with WildFire<\/a><\/li>\n<li><a href=\"https:\/\/docs.paloaltonetworks.com\/wildfire\/9-1\/wildfire-admin\/wildfire-overview\/about-wildfire\" target=\"_blank\" rel=\"noopener noreferrer\">About WildFire<\/a><\/li>\n<li><a href=\"https:\/\/docs.paloaltonetworks.com\/pan-os\/10-2\/pan-os-admin\/getting-started\/enable-basic-wildfire-forwarding\" target=\"_blank\" rel=\"noopener noreferrer\">Enable Free WildFire Forwarding<\/a><\/li>\n<li><a href=\"https:\/\/docs.paloaltonetworks.com\/wildfire\/10-2\/wildfire-admin\/wildfire-overview\/wildfire-deployments\" target=\"_blank\" rel=\"noopener noreferrer\">WildFire Deployments<\/a><\/li>\n<li><a href=\"https:\/\/docs.paloaltonetworks.com\/wildfire\/10-2\/wildfire-admin\/submit-files-for-wildfire-analysis\/forward-decrypted-ssl-traffic-for-wildfire-analysis\" target=\"_blank\" rel=\"noopener noreferrer\">Forward Decrypted SSL Traffic for WildFire Analysis<\/a><\/li>\n<li><a href=\"https:\/\/docs.paloaltonetworks.com\/pan-os\/10-2\/pan-os-admin\/threat-prevention\/wildfire-inline-ml\" target=\"_blank\" rel=\"noopener noreferrer\">WildFire Inline ML<\/a><\/li>\n<li><a href=\"https:\/\/docs.paloaltonetworks.com\/wildfire\/10-2\/wildfire-admin\/wildfire-deployment-best-practices\/wildfire-best-practices\" target=\"_blank\" rel=\"noopener noreferrer\">WildFire Best Practices<\/a><\/li>\n<li><a href=\"https:\/\/knowledgebase.paloaltonetworks.com\/KCSArticleDetail?id=kA10g000000CloTCAS\" target=\"_blank\" rel=\"noopener noreferrer\">How to Test WildFire with a Fake Malicious File<\/a><\/li>\n<li><a href=\"https:\/\/knowledgebase.paloaltonetworks.com\/KCSArticleDetail?id=kA14u000000oMICCA2\" target=\"_blank\" rel=\"noopener noreferrer\">How to verify the status and troubleshoot the WildFire Real Time Signature Updates feature<\/a><\/li>\n<li><a href=\"https:\/\/docs.paloaltonetworks.com\/wildfire\" target=\"_blank\" rel=\"noopener noreferrer\">Advanced WildFire<\/a><\/li>\n<li><a href=\"https:\/\/knowledgebase.paloaltonetworks.com\/KCSArticleDetail?id=kA10g000000ClaHCAS\" target=\"_blank\" rel=\"noopener noreferrer\">Wildfire Configuration, Testing, and Monitoring<\/a><\/li>\n<li><a href=\"https:\/\/live.paloaltonetworks.com\/t5\/blogs\/real-time-retrieval-of-wildfire-signatures-wildfire-inline-ml\/ba-p\/527279\" target=\"_blank\" rel=\"noopener noreferrer\">Real-time retrieval of WildFire signatures, WildFire Inline ML and Advanced Wildfire as an ICAP alternative!<\/a><\/li>\n<\/ul>\n<h5 style=\"text-decoration: underline;\">Modul 12 &#8211; Controlling Access To Network Resources With User-ID<\/h5>\n<ul>\n<li><a href=\"https:\/\/knowledgebase.paloaltonetworks.com\/KCSArticleDetail?id=kA10g000000ClRyCAK\" target=\"_blank\" rel=\"noopener noreferrer\">Getting Started: User-ID<\/a><\/li>\n<li><a href=\"https:\/\/knowledgebase.paloaltonetworks.com\/KCSArticleDetail?id=kA10g000000Cm5bCAC\" target=\"_blank\" rel=\"noopener noreferrer\">Resource List:\u00a0User-ID\u00a0Configuring and Troubleshooting<\/a><\/li>\n<li><a href=\"https:\/\/docs.paloaltonetworks.com\/pan-os\/10-2\/pan-os-web-interface-help\/user-identification\" target=\"_blank\" rel=\"noopener noreferrer\">User Identification<\/a><\/li>\n<li><a href=\"https:\/\/docs.paloaltonetworks.com\/pan-os\/10-2\/pan-os-admin\/user-id\/map-ip-addresses-to-users\/configure-user-mapping-using-the-pan-os-integrated-user-id-agent\" target=\"_blank\" rel=\"noopener noreferrer\">Configure User Mapping Using the PAN-OS Integrated User-ID Agent<\/a><\/li>\n<li><a href=\"https:\/\/docs.paloaltonetworks.com\/pan-os\/10-2\/pan-os-admin\/user-id\/map-ip-addresses-to-users\/configure-user-mapping-using-the-windows-user-id-agent\/configure-the-windows-based-user-id-agent-for-user-mapping\" target=\"_blank\" rel=\"noopener noreferrer\">Configure the Windows User-ID Agent for User Mapping<\/a><\/li>\n<li><a href=\"https:\/\/docs.paloaltonetworks.com\/globalprotect\/10-1\/globalprotect-admin\" target=\"_blank\" rel=\"noopener noreferrer\">GlobalProtect Administrator&#8217;s Guide<\/a><\/li>\n<li><a href=\"https:\/\/docs.paloaltonetworks.com\/pan-os\/10-2\/pan-os-admin\/user-id\/map-ip-addresses-to-users\/configure-user-id-to-monitor-syslog-senders-for-user-mapping\" target=\"_blank\" rel=\"noopener noreferrer\">Configure User-ID to Monitor Syslog Senders for User Mapping<\/a><\/li>\n<li><a href=\"https:\/\/docs.paloaltonetworks.com\/best-practices\/10-1\/user-id-best-practices\" target=\"_blank\" rel=\"noopener noreferrer\">User-ID Best Practices<\/a><\/li>\n<li><a href=\"https:\/\/docs.paloaltonetworks.com\/pan-os\/10-2\/pan-os-admin\/user-id\/enable-user-id\" target=\"_blank\" rel=\"noopener noreferrer\">Enable User-ID<\/a><\/li>\n<li><a href=\"https:\/\/docs.paloaltonetworks.com\/pan-os\/10-2\/pan-os-admin\/user-id\/map-users-to-groups\" target=\"_blank\" rel=\"noopener noreferrer\">Map Users to Groups<\/a><\/li>\n<li><a href=\"https:\/\/docs.paloaltonetworks.com\/pan-os\/10-2\/pan-os-admin\/user-id\/user-id-concepts\/user-mapping\/server-monitoring\" target=\"_blank\" rel=\"noopener noreferrer\">Server Monitoring<\/a><\/li>\n<li><a href=\"https:\/\/docs.paloaltonetworks.com\/pan-os\/10-2\/pan-os-admin\/user-id\/user-id-concepts\/group-mapping\" target=\"_blank\" rel=\"noopener noreferrer\">Group Mapping<\/a><\/li>\n<li><a href=\"https:\/\/docs.paloaltonetworks.com\/best-practices\/10-1\/user-id-best-practices\/user-id-best-practices\/user-id-best-practices-for-group-mapping\" target=\"_blank\" rel=\"noopener noreferrer\">User-ID Best Practices for Group Mapping<\/a><\/li>\n<li><a href=\"https:\/\/docs.paloaltonetworks.com\/pan-os\/10-2\/pan-os-web-interface-help\/policies\/policies-security\/building-blocks-in-a-security-policy-rule\" target=\"_blank\" rel=\"noopener noreferrer\">Building Blocks in a Security Policy Rule<\/a><\/li>\n<li><a href=\"https:\/\/docs.paloaltonetworks.com\/pan-os\/10-2\/pan-os-admin\/policy\/use-dynamic-user-groups-in-policy\" target=\"_blank\" rel=\"noopener noreferrer\">Use Dynamic User Groups in Policy<\/a><\/li>\n<li><a href=\"https:\/\/knowledgebase.paloaltonetworks.com\/KCSArticleDetail?id=kA14u000000CqbiCAC\" target=\"_blank\" rel=\"noopener noreferrer\">How to configure Authentication policies when Captive Portal with SAML authentication in Palo Alto Networks firewall<\/a><\/li>\n<li><a href=\"https:\/\/knowledgebase.paloaltonetworks.com\/KCSArticleDetail?id=kA10g000000ClRVCA0\" target=\"_blank\" rel=\"noopener noreferrer\">Tips &amp; Tricks: Considerations for TS Agent and User-ID Agent in a Mixed Environment<\/a><\/li>\n<li><a href=\"https:\/\/knowledgebase.paloaltonetworks.com\/KCSArticleDetail?id=kA10g000000ClGBCA0\" target=\"_blank\" rel=\"noopener noreferrer\">How to Collect the User-IP Mappings from a Syslog Sender Using an User-ID Agent<\/a><\/li>\n<li><a href=\"https:\/\/knowledgebase.paloaltonetworks.com\/KCSArticleDetail?id=kA14u000000Cr9GCAS\" target=\"_blank\" rel=\"noopener noreferrer\">How to troubleshoot connection failure to User-ID agent<\/a><\/li>\n<li><a href=\"https:\/\/knowledgebase.paloaltonetworks.com\/KCSArticleDetail?id=kA10g000000ClR1CAK\" target=\"_blank\" rel=\"noopener noreferrer\">Useful CLI Commands for Troubleshooting User-ID Agent<\/a><\/li>\n<li><a href=\"https:\/\/knowledgebase.paloaltonetworks.com\/KCSArticleDetail?id=kA10g000000ClVPCA0\" target=\"_blank\" rel=\"noopener noreferrer\">Best Practices for Securing User-ID Deployments<\/a><\/li>\n<\/ul>\n<h5 style=\"text-decoration: underline;\">Modul 13 &#8211; Using Decryption To Block Threats In Encrypted Traffic<\/h5>\n<ul>\n<li><a href=\"https:\/\/knowledgebase.paloaltonetworks.com\/KCSArticleDetail?id=kA10g000000Cm5YCAS\" target=\"_blank\" rel=\"noopener noreferrer\">Resource List: SSL Certificates Configuring and Troubleshooting<\/a><\/li>\n<li><a href=\"https:\/\/knowledgebase.paloaltonetworks.com\/KCSArticleDetail?id=kA10g000000Cm5YCAS\" target=\"_blank\" rel=\"noopener noreferrer\">Resource List: SSL Certificates Configuring and Troubleshooting<\/a><\/li>\n<li><a href=\"https:\/\/knowledgebase.paloaltonetworks.com\/KCSArticleDetail?id=kA10g000000ClmyCAC\" target=\"_blank\" rel=\"noopener noreferrer\">Decryption Overview (Knowledge Base)<\/a><\/li>\n<li><a href=\"https:\/\/docs.paloaltonetworks.com\/pan-os\/10-2\/pan-os-admin\/decryption\/decryption-overview\" target=\"_blank\" rel=\"noopener noreferrer\">Decryption Overview (PAN-OS Administrator\u2019s Guide)<\/a><\/li>\n<li><a href=\"https:\/\/docs.paloaltonetworks.com\/pan-os\/10-2\/pan-os-admin\/decryption\/decryption-concepts\/keys-and-certificates-for-decryption-policies\" target=\"_blank\" rel=\"noopener noreferrer\">Keys and Certificates for Decryption Policies<\/a><\/li>\n<li><a href=\"https:\/\/knowledgebase.paloaltonetworks.com\/KCSArticleDetail?id=kA10g000000ClV8CAK\" target=\"_blank\" rel=\"noopener noreferrer\">Difference Between SSL Forward-Proxy and Inbound Inspection Decryption Mode<\/a><\/li>\n<li><a href=\"https:\/\/docs.paloaltonetworks.com\/pan-os\/10-2\/pan-os-admin\/decryption\/configure-ssl-forward-proxy\" target=\"_blank\" rel=\"noopener noreferrer\">Configure SSL Forward Proxy<\/a><\/li>\n<li><a href=\"https:\/\/docs.paloaltonetworks.com\/pan-os\/10-2\/pan-os-admin\/decryption\/decryption-concepts\/ssl-inbound-inspection\" target=\"_blank\" rel=\"noopener noreferrer\">SSL Inbound Inspection<\/a><\/li>\n<li><a href=\"https:\/\/docs.paloaltonetworks.com\/pan-os\/10-2\/pan-os-admin\/decryption\/decryption-concepts\/ssh-proxy\" target=\"_blank\" rel=\"noopener noreferrer\">SSH Proxy<\/a><\/li>\n<li><a href=\"https:\/\/docs.paloaltonetworks.com\/pan-os\/10-2\/pan-os-admin\/decryption\/prepare-to-deploy-decryption\/develop-a-pki-rollout-plan\" target=\"_blank\" rel=\"noopener noreferrer\">Develop a PKI Rollout Plan<\/a><\/li>\n<li><a href=\"https:\/\/docs.paloaltonetworks.com\/pan-os\/10-2\/pan-os-web-interface-help\/device\/device-certificate-management-certificates\/manage-firewall-and-panorama-certificates\" target=\"_blank\" rel=\"noopener noreferrer\">Manage Firewall and Panorama Certificates<\/a><\/li>\n<li><a href=\"https:\/\/docs.paloaltonetworks.com\/pan-os\/10-2\/pan-os-admin\/certificate-management\/certificate-deployment\" target=\"_blank\" rel=\"noopener noreferrer\">Certificate Deployment<\/a><\/li>\n<li><a href=\"https:\/\/docs.paloaltonetworks.com\/pan-os\/10-2\/pan-os-admin\/certificate-management\/obtain-certificates\/create-a-self-signed-root-ca-certificate\" target=\"_blank\" rel=\"noopener noreferrer\">Create a Self-Signed Root CA Certificate<\/a><\/li>\n<li><a href=\"https:\/\/docs.paloaltonetworks.com\/pan-os\/10-2\/pan-os-admin\/certificate-management\/obtain-certificates\/import-a-certificate-and-private-key\" target=\"_blank\" rel=\"noopener noreferrer\">Import a Certificate and Private Key<\/a><\/li>\n<li><a href=\"https:\/\/docs.paloaltonetworks.com\/pan-os\/10-2\/pan-os-admin\/certificate-management\/obtain-certificates\/obtain-a-certificate-from-an-external-ca\" target=\"_blank\" rel=\"noopener noreferrer\">Obtain a Certificate from an External CA<\/a><\/li>\n<li><a href=\"https:\/\/docs.paloaltonetworks.com\/pan-os\/10-2\/pan-os-admin\/certificate-management\/obtain-certificates\/generate-a-certificate\" target=\"_blank\" rel=\"noopener noreferrer\">Generate a Certificate<\/a><\/li>\n<li><a href=\"https:\/\/docs.paloaltonetworks.com\/pan-os\/10-2\/pan-os-admin\/certificate-management\/revoke-and-renew-certificates\/revoke-a-certificate\" target=\"_blank\" rel=\"noopener noreferrer\">Revoke a Certificate<\/a><\/li>\n<li><a href=\"https:\/\/docs.paloaltonetworks.com\/pan-os\/10-2\/pan-os-admin\/decryption\/define-traffic-to-decrypt\" target=\"_blank\" rel=\"noopener noreferrer\">Define Traffic to Decrypt<\/a><\/li>\n<li><a href=\"https:\/\/docs.paloaltonetworks.com\/pan-os\/10-2\/pan-os-admin\/decryption\/define-traffic-to-decrypt\/create-a-decryption-profile\" target=\"_blank\" rel=\"noopener noreferrer\">Create a Decryption Profile<\/a><\/li>\n<li><a href=\"https:\/\/docs.paloaltonetworks.com\/pan-os\/10-2\/pan-os-admin\/decryption\/decryption-exclusions\" target=\"_blank\" rel=\"noopener noreferrer\">Decryption Exclusions<\/a><\/li>\n<li><a href=\"https:\/\/docs.paloaltonetworks.com\/pan-os\/10-2\/pan-os-admin\/decryption\/decryption-exclusions\/create-a-policy-based-decryption-exclusion\" target=\"_blank\" rel=\"noopener noreferrer\">Create a Policy-Based Decryption Exclusion<\/a><\/li>\n<li><a href=\"https:\/\/docs.paloaltonetworks.com\/pan-os\/10-2\/pan-os-admin\/decryption\/troubleshoot-and-monitor-decryption\/decryption-troubleshooting-workflow-examples\" target=\"_blank\" rel=\"noopener noreferrer\">Decryption Troubleshooting Workflow Examples<\/a><\/li>\n<li><a href=\"https:\/\/docs.paloaltonetworks.com\/pan-os\/10-2\/pan-os-admin\/decryption\/troubleshoot-and-monitor-decryption\" target=\"_blank\" rel=\"noopener noreferrer\">Troubleshoot and Monitor Decryption<\/a><\/li>\n<li><a href=\"https:\/\/docs.paloaltonetworks.com\/pan-os\/10-2\/pan-os-admin\/decryption\/troubleshoot-and-monitor-decryption\/decryption-logs\/configure-decryption-logging\" target=\"_blank\" rel=\"noopener noreferrer\">Configure Decryption Logging<\/a><\/li>\n<li><a href=\"https:\/\/docs.paloaltonetworks.com\/best-practices\/10-2\/decryption-best-practices\" target=\"_blank\" rel=\"noopener noreferrer\">Decryption Best Practices<\/a><\/li>\n<li><a href=\"https:\/\/docs.paloaltonetworks.com\/pan-os\/10-2\/pan-os-admin\/decryption\/decryption-concepts\/decryption-mirroring\" target=\"_blank\" rel=\"noopener noreferrer\">Decryption Mirroring<\/a><\/li>\n<li><a href=\"https:\/\/docs.paloaltonetworks.com\/pan-os\/10-2\/pan-os-web-interface-help\/objects\/objects-packet-broker-profile\" target=\"_blank\" rel=\"noopener noreferrer\">Objects &gt; Packet Broker Profile<\/a><\/li>\n<li><a href=\"https:\/\/docs.paloaltonetworks.com\/pan-os\/10-2\/pan-os-web-interface-help\/device\/device-setup-hsm\" target=\"_blank\" rel=\"noopener noreferrer\">Device &gt; Setup &gt; HSM<\/a><\/li>\n<\/ul>\n<h5 style=\"text-decoration: underline;\">Modul 14 &#8211; Locating Valuable Information Using Logs And Reports<\/h5>\n<ul>\n<li><a href=\"https:\/\/knowledgebase.paloaltonetworks.com\/KCSArticleDetail?id=kA14u0000001VVLCA2\" target=\"_blank\" rel=\"noopener noreferrer\">Resource List: Firewall Logging and Reporting<\/a><\/li>\n<li><a href=\"https:\/\/docs.paloaltonetworks.com\/pan-os\/10-2\/pan-os-web-interface-help\/dashboard\/dashboard-widgets\" target=\"_blank\" rel=\"noopener noreferrer\">Dashboard Widgets<\/a><\/li>\n<li><a href=\"https:\/\/docs.paloaltonetworks.com\/pan-os\/10-2\/pan-os-admin\/monitoring\/use-the-application-command-center\" target=\"_blank\" rel=\"noopener noreferrer\">Use the Application Command Center<\/a><\/li>\n<li><a href=\"https:\/\/docs.paloaltonetworks.com\/pan-os\/10-2\/pan-os-web-interface-help\/acc\/acc-tabs\" target=\"_blank\" rel=\"noopener noreferrer\">ACC Tabs<\/a><\/li>\n<li><a href=\"https:\/\/knowledgebase.paloaltonetworks.com\/KCSArticleDetail?id=kA10g000000ClcvCAC\" target=\"_blank\" rel=\"noopener noreferrer\">Tips &#038; Tricks: How to Use the Application Command Center (ACC)<\/a><\/li>\n<li><a href=\"https:\/\/docs.paloaltonetworks.com\/pan-os\/10-2\/pan-os-admin\/monitoring\/use-the-application-command-center\/acc-widgets\" target=\"_blank\" rel=\"noopener noreferrer\">ACC Widgets<\/a><\/li>\n<li><a href=\"https:\/\/docs.paloaltonetworks.com\/pan-os\/10-2\/pan-os-admin\/monitoring\/use-syslog-for-monitoring\/syslog-field-descriptions\/traffic-log-fields\" target=\"_blank\" rel=\"noopener noreferrer\">Traffic Log Fields<\/a><\/li>\n<li><a href=\"https:\/\/docs.paloaltonetworks.com\/pan-os\/10-2\/pan-os-admin\/monitoring\/use-syslog-for-monitoring\/syslog-field-descriptions\/threat-log-fields\" target=\"_blank\" rel=\"noopener noreferrer\">Threat Log Fields<\/a><\/li>\n<li><a href=\"https:\/\/docs.paloaltonetworks.com\/pan-os\/10-2\/pan-os-admin\/monitoring\/use-the-automated-correlation-engine\/interpret-correlated-events\" target=\"_blank\" rel=\"noopener noreferrer\">Interpret Correlated Events<\/a><\/li>\n<li><a href=\"https:\/\/docs.paloaltonetworks.com\/pan-os\/10-2\/pan-os-admin\/monitoring\/use-the-app-scope-reports\" target=\"_blank\" rel=\"noopener noreferrer\">Use the App Scope Reports<\/a><\/li>\n<li><a href=\"https:\/\/docs.paloaltonetworks.com\/pan-os\/10-2\/pan-os-web-interface-help\/monitor\/monitor-app-scope\/app-scope-threat-monitor-report\" target=\"_blank\" rel=\"noopener noreferrer\">App Scope Threat Monitor Report<\/a><\/li>\n<li><a href=\"https:\/\/docs.paloaltonetworks.com\/pan-os\/10-2\/pan-os-admin\/monitoring\/view-and-manage-reports\/report-types\" target=\"_blank\" rel=\"noopener noreferrer\">Report Types<\/a><\/li>\n<li><a href=\"https:\/\/docs.paloaltonetworks.com\/pan-os\/10-2\/pan-os-admin\/monitoring\/view-and-manage-reports\" target=\"_blank\" rel=\"noopener noreferrer\">View and Manage Reports\/a&gt;<\/a><\/li>\n<li><a href=\"https:\/\/docs.paloaltonetworks.com\/pan-os\/10-2\/pan-os-admin\/monitoring\/view-and-manage-reports\/generate-custom-reports\" target=\"_blank\" rel=\"noopener noreferrer\">Generate Custom Reports<\/a><\/li>\n<li><a href=\"https:\/\/knowledgebase.paloaltonetworks.com\/KCSArticleDetail?id=kA10g000000Cln0CAC\" target=\"_blank\" rel=\"noopener noreferrer\">Getting Started: Custom Reports<\/a><\/li>\n<li><a href=\"https:\/\/knowledgebase.paloaltonetworks.com\/KCSArticleDetail?id=kA10g000000ClG1CAK\" target=\"_blank\" rel=\"noopener noreferrer\">How to Receive Custom Reports via Email<\/a><\/li>\n<li><a href=\"https:\/\/docs.paloaltonetworks.com\/pan-os\/10-2\/pan-os-panorama-api\/pan-os-xml-api-request-types\/get-reports-api\/custom-reports\" target=\"_blank\" rel=\"noopener noreferrer\">Custom Reports (PAN-OS\u00ae and Panorama\u2122API Usage Guide)<\/a><\/li>\n<li><a href=\"https:\/\/docs.paloaltonetworks.com\/pan-os\/10-2\/pan-os-admin\/device-telemetry\/device-telemetry-overview\" target=\"_blank\" rel=\"noopener noreferrer\">Device Telemetry Overview<\/a><\/li>\n<li><a href=\"https:\/\/docs.paloaltonetworks.com\/pan-os\/10-2\/pan-os-web-interface-help\/device\/device-server-profiles#id3ee061c0-c6f2-40ba-beea-a57b18395ef3\" target=\"_blank\" rel=\"noopener noreferrer\">Device &gt; Server Profiles<\/a><\/li>\n<li><a href=\"https:\/\/docs.paloaltonetworks.com\/pan-os\/10-2\/pan-os-web-interface-help\/objects\/objects-log-forwarding\" target=\"_blank\" rel=\"noopener noreferrer\">Objects &gt; Log Forwarding<\/a><\/li>\n<\/ul>\n<h5 style=\"text-decoration: underline;\">Appendix A &#8211; Securing Endpoints With Globalprotect<\/h5>\n<ul>\n<li><a href=\"https:\/\/knowledgebase.paloaltonetworks.com\/KCSArticleDetail?id=kA10g000000ClfXCAS\" target=\"_blank\" rel=\"noopener noreferrer\">Resource List:\u00a0GlobalProtect Configuring and Troubleshooting<\/a><\/li>\n<li><a href=\"https:\/\/docs.paloaltonetworks.com\/globalprotect\/9-1\/globalprotect-admin\/globalprotect-overview\/about-globalprotect-licenses\" target=\"_blank\" rel=\"noopener noreferrer\">About GlobalProtect Licenses<\/a><\/li>\n<li><a href=\"https:\/\/docs.paloaltonetworks.com\/globalprotect\/10-0\/globalprotect-admin\/globalprotect-portals\/globalprotect-portal-overview\" target=\"_blank\" rel=\"noopener noreferrer\">GlobalProtect Portal Overview<\/a><\/li>\n<li><a href=\"https:\/\/docs.paloaltonetworks.com\/globalprotect\/10-0\/globalprotect-admin\/globalprotect-gateways\/globalprotect-gateways-overview\" target=\"_blank\" rel=\"noopener noreferrer\">GlobalProtect Gateways Overview<\/a><\/li>\n<li><a href=\"https:\/\/docs.paloaltonetworks.com\/globalprotect\/10-0\/globalprotect-admin\/globalprotect-architecture\" target=\"_blank\" rel=\"noopener noreferrer\">GlobalProtect Architecture<\/a><\/li>\n<li><a href=\"https:\/\/knowledgebase.paloaltonetworks.com\/KCSArticleDetail?id=kA10g000000ClhQCAS\" target=\"_blank\" rel=\"noopener noreferrer\">Useful GlobalProtect gateway CLI commands<\/a><\/li>\n<li><a href=\"https:\/\/docs.paloaltonetworks.com\/globalprotect\/10-1\/globalprotect-admin\" target=\"_blank\" rel=\"noopener noreferrer\">GlobalProtect Administrator&#8217;s Guide<\/a><\/li>\n<li><a href=\"https:\/\/docs.paloaltonetworks.com\/globalprotect\/10-1\/globalprotect-admin\/globalprotect-user-authentication\/how-does-the-app-know-what-credentials-to-supply\/cookie-authentication-on-the-portal-or-gateway\" target=\"_blank\" rel=\"noopener noreferrer\">Cookie Authentication on the Portal or Gateway<\/a><\/li>\n<li><a href=\"https:\/\/knowledgebase.paloaltonetworks.com\/KCSArticleDetail?id=kA14u000000oM4ACAU\" target=\"_blank\" rel=\"noopener noreferrer\">Basic-GlobalProtect-configuration-with-Pre-Logon-then-On-Demand<\/a><\/li>\n<li><a href=\"https:\/\/knowledgebase.paloaltonetworks.com\/KCSArticleDetail?id=kA10g000000ClFbCAK\" target=\"_blank\" rel=\"noopener noreferrer\">How to Configure GlobalProtect<\/a><\/li>\n<\/ul>\n<h5 style=\"text-decoration: underline;\">Appendix B &#8211; Providing Firewall Redundancy With High Availability<\/h5>\n<ul>\n<li><a href=\"https:\/\/knowledgebase.paloaltonetworks.com\/KCSArticleDetail?id=kA10g000000ClIbCAK\" target=\"_blank\" rel=\"noopener noreferrer\">Resource List: High Availability Configuring and Troubleshooting<\/a><\/li>\n<li><a href=\"https:\/\/docs.paloaltonetworks.com\/pan-os\/10-2\/pan-os-admin\/high-availability\/ha-concepts#idd3f6ee4d-5161-4a6c-bc67-239a144250a4\" target=\"_blank\" rel=\"noopener noreferrer\">HA Concepts<\/a><\/li>\n<li><a href=\"https:\/\/docs.paloaltonetworks.com\/pan-os\/10-2\/pan-os-admin\/high-availability\/set-up-activepassive-ha#id8e4cc79e-3c5d-4b8e-bea2-c6d4acdffebf\" target=\"_blank\" rel=\"noopener noreferrer\">Set Up Active\/Passive HA<\/a><\/li>\n<li><a href=\"https:\/\/docs.paloaltonetworks.com\/pan-os\/10-2\/pan-os-admin\/high-availability\/set-up-activeactive-ha#id97a3e777-5d8a-4baa-9c68-7c84b5bb3a7d\" target=\"_blank\" rel=\"noopener noreferrer\">Set Up Active\/Active HA<\/a><\/li>\n<li><a href=\"https:\/\/docs.paloaltonetworks.com\/pan-os\/10-2\/pan-os-cli-quick-start\/cli-cheat-sheets\/cli-cheat-sheet-ha\" target=\"_blank\" rel=\"noopener noreferrer\">CLI Cheat Sheet: HA<\/a><\/li>\n<\/ul>\n<h5 style=\"text-decoration: underline;\">Appendix C &#8211; Connecting Remote Sites Using VPNs<\/h5>\n<ul>\n<li><a href=\"https:\/\/knowledgebase.paloaltonetworks.com\/KCSArticleDetail?id=kA10g000000Clh5CAC\" target=\"_blank\" rel=\"noopener noreferrer\">Resource List:\u00a0IPSec Configuring and Troubleshooting<\/a><\/li>\n<li><a href=\"https:\/\/docs.paloaltonetworks.com\/pan-os\/10-2\/pan-os-admin\/vpns\/site-to-site-vpn-overview\" target=\"_blank\" rel=\"noopener noreferrer\">Site-to-Site VPN Overview<\/a><\/li>\n<li><a href=\"https:\/\/knowledgebase.paloaltonetworks.com\/KCSArticleDetail?id=kA10g000000ClW8CAK\" target=\"_blank\" rel=\"noopener noreferrer\">Proxy-ID for VPNs Between Palo Alto Networks and Firewalls with Policy-based VPNs<\/a><\/li>\n<li><a href=\"https:\/\/docs.paloaltonetworks.com\/pan-os\/10-2\/pan-os-admin\/high-availability\/ha-concepts\/route-based-redundancy\" target=\"_blank\" rel=\"noopener noreferrer\">Route-Based Redundancy<\/a><\/li>\n<\/ul>\n<\/div>\n<hr style=\"border: 5px solid black; border-radius: 5px;\" \/>\n<h2><a name=\"edu220\"><\/a>Course PA EDU-220<\/h2>\n<p><em>Here you will find all Reference Links for the EDU-220 Course (Based on the course material and my own references)<\/em><\/p>\n<div style=\"background-color: #ebebeb;\">\n<h5 style=\"text-decoration: underline;\">Modul 0 &#8211; Introductions<\/h5>\n<ul>\n<li><a href=\"https:\/\/beacon.paloaltonetworks.com\" target=\"_blank\" rel=\"noopener noreferrer\">Prepare Certification Exam, Online Training Courses and more<\/a><\/li>\n<li><a href=\"https:\/\/www.youtube.com\/@paloaltonetworks\/featured\" target=\"_blank\" rel=\"noopener noreferrer\">PaloAlto Networks &#8211; You Tube Channel<\/a><\/li>\n<li><a href=\"https:\/\/www.paloaltonetworks.com\/services\/education\" target=\"_blank\" rel=\"noopener noreferrer\">Education Services<\/a><\/li>\n<li><a href=\"https:\/\/live.paloaltonetworks.com\/t5\/certification\/ct-p\/Certification\" target=\"_blank\" rel=\"noopener noreferrer\">Palo Alto Networks Live &#8211; Certification<\/a><\/li>\n<li><a href=\"https:\/\/www.paloaltonetworks.com\/services\/education\/palo-alto-networks-certified-cybersecurity-entry-level-technician\" target=\"_blank\" rel=\"noopener noreferrer\">Palo Alto Networks Certified Cybersecurity Entry-Level Technician (PCCET)<\/a><\/li>\n<li><a href=\"https:\/\/www.paloaltonetworks.com\/services\/education\/palo-alto-networks-certified-network-security-administrator\" target=\"_blank\" rel=\"noopener noreferrer\">Palo Alto Networks Certified Network Security Administrator (PCNSA)<\/a><\/li>\n<li><a href=\"https:\/\/www.paloaltonetworks.com\/services\/education\/palo-alto-networks-certified-network-security-engineer\" target=\"_blank\" rel=\"noopener noreferrer\">Palo Alto Networks Certified Network Security Engineer (PCNSE)<\/a><\/li>\n<li><a href=\"http:\/\/www.pearsonvue.com\/paloaltonetworks\" target=\"_blank\" rel=\"noopener noreferrer\">Person VUE Exam Registration<\/a><\/li>\n<\/ul>\n<h5 style=\"text-decoration: underline;\">Modul 1 &#8211; Initial Configuration<\/h5>\n<ul>\n<li><a href=\"https:\/\/docs.paloaltonetworks.com\/panorama\/10-2\/panorama-admin\/panorama-overview\/about-panorama\" target=\"_blank\" rel=\"noopener noreferrer\">About Panorama<\/a><\/li>\n<li><a href=\"https:\/\/docs.paloaltonetworks.com\/panorama\/10-2\/panorama-admin\/panorama-overview\/plan-your-panorama-deployment\" target=\"_blank\" rel=\"noopener noreferrer\">Plan Your Panorama Deployment<\/a><\/li>\n<li><a href=\"https:\/\/knowledgebase.paloaltonetworks.com\/KCSArticleDetail?id=kA14u0000008UmKCAU\" target=\"_blank\" rel=\"noopener noreferrer\">Panorama Configuration Articles<\/a><\/li>\n<li><a href=\"https:\/\/docs.paloaltonetworks.com\/panorama\/10-2\/panorama-admin\/panorama-overview\/panorama-models\" target=\"_blank\" rel=\"noopener noreferrer\">Panorama Models<\/a><\/li>\n<li><a href=\"https:\/\/docs.paloaltonetworks.com\/pan-os\/10-2\/pan-os-admin\/getting-started\/integrate-the-firewall-into-your-management-network\/perform-initial-configuration\" target=\"_blank\" rel=\"noopener noreferrer\">Perform Initial Configuration<\/a><\/li>\n<li><a href=\"https:\/\/docs.paloaltonetworks.com\/pan-os\/10-2\/pan-os-web-interface-help\/panorama-web-interface\" target=\"_blank\" rel=\"noopener noreferrer\">Panorama Web Interface<\/a><\/li>\n<li><a href=\"https:\/\/docs.paloaltonetworks.com\/panorama\/10-2\/panorama-admin\/set-up-panorama\/register-panorama-and-install-licenses\" target=\"_blank\" rel=\"noopener noreferrer\">Register Panorama and Install Licenses<\/a><\/li>\n<li><a href=\"https:\/\/docs.paloaltonetworks.com\/pan-os\/10-2\/pan-os-web-interface-help\/panorama-web-interface\/panorama-software\/manage-panorama-software-updates\" target=\"_blank\" rel=\"noopener noreferrer\">Manage Panorama Software Upda<\/a><\/li>\n<li><a href=\"https:\/\/docs.paloaltonetworks.com\/pan-os\/10-2\/pan-os-web-interface-help\/panorama-web-interface\/panorama-device-deployment\/manage-software-and-content-updates\" target=\"_blank\" rel=\"noopener noreferrer\">Manage Software and Content Updates<\/a><\/li>\n<li><a href=\"https:\/\/docs.paloaltonetworks.com\/pan-os\/10-2\/pan-os-web-interface-help\/panorama-web-interface\/panorama-device-deployment\/schedule-dynamic-content-updates\" target=\"_blank\" rel=\"noopener noreferrer\">Schedule Dynamic Content Updates<\/a><\/li>\n<li><a href=\"https:\/\/docs.paloaltonetworks.com\/panorama\/10-2\/panorama-admin\/panorama-plugins\" target=\"_blank\" rel=\"noopener noreferrer\">Panorama Plugins<\/a><\/li>\n<li><a href=\"https:\/\/knowledgebase.paloaltonetworks.com\/KCSArticleDetail?id=kA14u0000001UiOCAU\" target=\"_blank\" rel=\"noopener noreferrer\">How to disable ztp on a ztp firewall<\/a><\/li>\n<li><a href=\"https:\/\/docs.paloaltonetworks.com\/pan-os\/10-2\/pan-os-web-interface-help\/panorama-web-interface\/panorama-setup-interfaces\" target=\"_blank\" rel=\"noopener noreferrer\">Panorama &gt; Setup &gt; Interfaces<\/a><\/li>\n<li><a href=\"https:\/\/docs.paloaltonetworks.com\/pan-os\/10-2\/pan-os-web-interface-help\/panorama-web-interface\/panorama-commit-operations\" target=\"_blank\" rel=\"noopener noreferrer\">Panorama Commit Operations<\/a><\/li>\n<li><a href=\"https:\/\/docs.paloaltonetworks.com\/panorama\/10-2\/panorama-admin\/administer-panorama\/preview-validate-or-commit-configuration-changes\" target=\"_blank\" rel=\"noopener noreferrer\">Preview, Validate, or Commit Configuration Changes<\/a><\/li>\n<li><a href=\"https:\/\/docs.paloaltonetworks.com\/panorama\/10-2\/panorama-admin\/manage-firewalls\/schedule-a-configuration-push-to-managed-firewalls\" target=\"_blank\" rel=\"noopener noreferrer\">Schedule a Configuration Push to Managed Firewalls<\/a><\/li>\n<li><a href=\"https:\/\/docs.paloaltonetworks.com\/pan-os\/10-2\/pan-os-web-interface-help\/panorama-web-interface\/panorama-commit-operations\" target=\"_blank\" rel=\"noopener noreferrer\">Panorama Commit Operations<\/a><\/li>\n<li><a href=\"https:\/\/docs.paloaltonetworks.com\/panorama\/10-2\/panorama-admin\/administer-panorama\/use-the-panorama-task-manager\" target=\"_blank\" rel=\"noopener noreferrer\">Use the Panorama Task Manager<\/a><\/li>\n<li><a href=\"https:\/\/docs.paloaltonetworks.com\/panorama\/10-2\/panorama-admin\/administer-panorama\/manage-panorama-and-firewall-configuration-backups\" target=\"_blank\" rel=\"noopener noreferrer\">Manage Panorama and Firewall Configuration Backups<\/a><\/li>\n<\/ul>\n<h5 style=\"text-decoration: underline;\">Modul 2 &#8211; Adding Firewalls<\/h5>\n<ul>\n<li><a href=\"https:\/\/docs.paloaltonetworks.com\/panorama\/10-2\/panorama-admin\/manage-firewalls\/add-a-firewall-as-a-managed-device\" target=\"_blank\" rel=\"noopener noreferrer\">Add a Firewall as a Managed Device<\/a><\/li>\n<li><a href=\"https:\/\/knowledgebase.paloaltonetworks.com\/KCSArticleDetail?id=kA10g000000Cmd6CAC\" target=\"_blank\" rel=\"noopener noreferrer\">How to remove a Firewall from Panorama<\/a><\/li>\n<li><a href=\"https:\/\/docs.paloaltonetworks.com\/pan-os\/10-2\/pan-os-upgrade\/upgrade-pan-os\/upgrade-the-firewall-pan-os\/upgrade-firewalls-using-panorama\" target=\"_blank\" rel=\"noopener noreferrer\">Upgrade Firewalls Using Panorama<\/a><\/li>\n<\/ul>\n<h5 style=\"text-decoration: underline;\">Modul 3 &#8211; Templates<\/h5>\n<ul>\n<li><a href=\"https:\/\/docs.paloaltonetworks.com\/panorama\/10-2\/panorama-admin\/panorama-overview\/centralized-firewall-configuration-and-update-management\/templates-and-template-stacks\" target=\"_blank\" rel=\"noopener noreferrer\">Templates and Template Stacks<\/a><\/li>\n<li><a href=\"https:\/\/docs.paloaltonetworks.com\/panorama\/10-2\/panorama-admin\/manage-firewalls\/manage-templates-and-template-stacks\" target=\"_blank\" rel=\"noopener noreferrer\">Manage Templates and Template Stacks<\/a><\/li>\n<li><a href=\"https:\/\/docs.paloaltonetworks.com\/panorama\/10-2\/panorama-admin\/manage-firewalls\/manage-templates-and-template-stacks\/override-a-template-setting\/override-a-template-setting-on-the-firewall\" target=\"_blank\" rel=\"noopener noreferrer\">Override a Template Value on the Firewall<\/a><\/li>\n<li><a href=\"https:\/\/docs.paloaltonetworks.com\/panorama\/10-2\/panorama-admin\/manage-firewalls\/manage-templates-and-template-stacks\/configure-template-or-template-stack-variables\" target=\"_blank\" rel=\"noopener noreferrer\">Configure a Template or Template Stack Variable<\/a><\/li>\n<li><a href=\"https:\/\/docs.paloaltonetworks.com\/panorama\/10-2\/panorama-admin\/manage-firewalls\/manage-templates-and-template-stacks\/import-and-overwrite-existing-template-stack-variables\" target=\"_blank\" rel=\"noopener noreferrer\">Import and Overwrite Existing Template Stack Variables<\/a><\/li>\n<\/ul>\n<h5 style=\"text-decoration: underline;\">Modul 4 &#8211; Device Groups<\/h5>\n<ul>\n<li><a href=\"https:\/\/docs.paloaltonetworks.com\/panorama\/10-2\/panorama-admin\/panorama-overview\/centralized-firewall-configuration-and-update-management\/device-groups\" target=\"_blank\" rel=\"noopener noreferrer\">Device Groups<\/a><\/li>\n<li><a href=\"https:\/\/docs.paloaltonetworks.com\/panorama\/10-2\/panorama-admin\/panorama-overview\/centralized-firewall-configuration-and-update-management\/device-groups\/device-group-hierarchy\" target=\"_blank\" rel=\"noopener noreferrer\">Device Group Hierarchy<\/a><\/li>\n<li><a href=\"https:\/\/docs.paloaltonetworks.com\/panorama\/10-2\/panorama-admin\/manage-firewalls\/manage-device-groups\/manage-precedence-of-inherited-objects#id99c22770-bee6-47fd-9b02-ac2b3dbf857a\" target=\"_blank\" rel=\"noopener noreferrer\">Manage Precedence of Inherited Objects<\/a><\/li>\n<li><a href=\"https:\/\/docs.paloaltonetworks.com\/panorama\/10-2\/panorama-admin\/manage-firewalls\/manage-device-groups\/add-a-device-group\" target=\"_blank\" rel=\"noopener noreferrer\">Add a Device Group<\/a><\/li>\n<li><a href=\"https:\/\/docs.paloaltonetworks.com\/panorama\/10-2\/panorama-admin\/panorama-overview\/centralized-firewall-configuration-and-update-management\/device-groups\/device-group-objects\" target=\"_blank\" rel=\"noopener noreferrer\">Device Group Objects<\/a><\/li>\n<li><a href=\"https:\/\/docs.paloaltonetworks.com\/panorama\/10-2\/panorama-admin\/manage-firewalls\/manage-device-groups\/create-objects-for-use-in-shared-or-device-group-policy\" target=\"_blank\" rel=\"noopener noreferrer\">Create Objects for Use in Shared or Device Gro<\/a><\/li>\n<li><a href=\"https:\/\/docs.paloaltonetworks.com\/pan-os\/10-2\/pan-os-web-interface-help\/objects\/move-clone-override-or-revert-objects\/override-or-revert-an-object\" target=\"_blank\" rel=\"noopener noreferrer\">Override or Revert an Object<\/a><\/li>\n<li><a href=\"https:\/\/docs.paloaltonetworks.com\/panorama\/10-2\/panorama-admin\/manage-firewalls\/manage-device-groups\/manage-precedence-of-inherited-objects\" target=\"_blank\" rel=\"noopener noreferrer\">Manage Precedence of Inherited Objects<\/a><\/li>\n<li><a href=\"https:\/\/docs.paloaltonetworks.com\/panorama\/10-2\/panorama-admin\/manage-firewalls\/manage-device-groups\/move-or-clone-a-policy-rule-or-object-to-a-different-device-group\" target=\"_blank\" rel=\"noopener noreferrer\">Move or Clone a Policy Rule or Object to a Different Device Group<\/a><\/li>\n<li><a href=\"https:\/\/docs.paloaltonetworks.com\/panorama\/10-2\/panorama-admin\/panorama-overview\/centralized-firewall-configuration-and-update-management\/device-groups\/device-group-policies\" target=\"_blank\" rel=\"noopener noreferrer\">Device Group Policies<\/a><\/li>\n<li><a href=\"https:\/\/docs.paloaltonetworks.com\/pan-os\/10-2\/pan-os-web-interface-help\/panorama-web-interface\/defining-policies-on-panorama\" target=\"_blank\" rel=\"noopener noreferrer\">Defining Policies on Panorama<\/a><\/li>\n<li><a href=\"https:\/\/docs.paloaltonetworks.com\/pan-os\/10-2\/pan-os-panorama-api\/get-started-with-the-pan-os-rest-api\/work-with-policy-rules-on-panorama-rest-api\" target=\"_blank\" rel=\"noopener noreferrer\">Work with Policy Rules on Panorama (REST API)<\/a><\/li>\n<li><a href=\"https:\/\/docs.paloaltonetworks.com\/pan-os\/10-2\/pan-os-admin\/policy\/enumeration-of-rules-within-a-rulebase\" target=\"_blank\" rel=\"noopener noreferrer\">Track Rules Within a Rulebase<\/a><\/li>\n<li><a href=\"https:\/\/docs.paloaltonetworks.com\/panorama\/10-2\/panorama-admin\/manage-firewalls\/device-monitoring-on-panorama\/monitor-policy-rule-usage\" target=\"_blank\" rel=\"noopener noreferrer\">Monitor Policy Rule Usage<\/a><\/li>\n<li><a href=\"https:\/\/docs.paloaltonetworks.com\/panorama\/10-2\/panorama-admin\/manage-firewalls\/device-monitoring-on-panorama\/monitor-policy-rule-usage\" target=\"_blank\" rel=\"noopener noreferrer\">Monitor Policy Rule Usage<\/a><\/li>\n<li><a href=\"https:\/\/docs.paloaltonetworks.com\/pan-os\/10-2\/pan-os-admin\/policy\/enforce-policy-rule-description-tag-and-audit-comment\" target=\"_blank\" rel=\"noopener noreferrer\">Enforce Policy Rule Description, Tag, and Audit Comment<\/a><\/li>\n<li><a href=\"https:\/\/docs.paloaltonetworks.com\/pan-os\/10-2\/pan-os-web-interface-help\/policies\/audit-comment-archive\" target=\"_blank\" rel=\"noopener noreferrer\">Audit Comment Archive<\/a><\/li>\n<\/ul>\n<h5 style=\"text-decoration: underline;\">Modul 5 &#8211; Log Collection And Forwrding<\/h5>\n<ul>\n<li><a href=\"https:\/\/docs.paloaltonetworks.com\/panorama\/10-2\/panorama-admin\/panorama-overview\/centralized-logging-and-reporting\" target=\"_blank\" rel=\"noopener noreferrer\">Centralized Logging and Reporting<\/a><\/li>\n<li><a href=\"https:\/\/knowledgebase.paloaltonetworks.com\/KCSArticleDetail?id=kA10g000000Clc8CAC\" target=\"_blank\" rel=\"noopener noreferrer\">Panorama Sizing and Design Guide<\/a><\/li>\n<li><a href=\"https:\/\/knowledgebase.paloaltonetworks.com\/kcSArticleDetail?id=kA14u000000HBw7\" target=\"_blank\" rel=\"noopener noreferrer\">How to Design and Size Panorama Log Collector Environments<\/a><\/li>\n<li><a href=\"https:\/\/knowledgebase.paloaltonetworks.com\/KCSArticleDetail?id=kA10g000000CmJLCA0\" target=\"_blank\" rel=\"noopener noreferrer\">How to view the pattern of incoming log rate on Panorama and compare it to platform capacity<\/a><\/li>\n<li><a href=\"https:\/\/docs.paloaltonetworks.com\/cortex\/cortex-data-lake\/cortex-data-lake-getting-started\/get-started-with-cortex-data-lake\/start-sending-logs-to-cortex-data-lake\/start-sending-logs-to-cortex-data-lake-individually-managed\" target=\"_blank\" rel=\"noopener noreferrer\">Start Sending Logs to Cortex Data Lake (Individually Managed)<\/a><\/li>\n<li><a href=\"https:\/\/apps.paloaltonetworks.com\/cortex-sizing-estimator\" target=\"_blank\" rel=\"noopener noreferrer\">Cortex Data Lake Estimator<\/a><\/li>\n<li><a href=\"https:\/\/docs.paloaltonetworks.com\/pan-os\/10-2\/pan-os-web-interface-help\/device\/device-log-settings\/select-log-forwarding-destinations\" target=\"_blank\" rel=\"noopener noreferrer\">Select Log Forwarding Destinations<\/a><\/li>\n<li><a href=\"https:\/\/docs.paloaltonetworks.com\/pan-os\/10-2\/pan-os-web-interface-help\/objects\/objects-log-forwarding\" target=\"_blank\" rel=\"noopener noreferrer\">Objects &gt; Log Forwarding<\/a><\/li>\n<li><a href=\"https:\/\/docs.paloaltonetworks.com\/pan-os\/10-2\/pan-os-web-interface-help\/device\/device-log-settings\/select-log-forwarding-destinations\" target=\"_blank\" rel=\"noopener noreferrer\">Select Log Forwarding Destinations<\/a><\/li>\n<li><a href=\"https:\/\/docs.paloaltonetworks.com\/panorama\/10-2\/panorama-admin\/manage-log-collection\/configure-log-forwarding-from-panorama-to-external-destinations\" target=\"_blank\" rel=\"noopener noreferrer\">Configure Log Forwarding from Panorama to External Destinations<\/a><\/li>\n<li><a href=\"https:\/\/docs.paloaltonetworks.com\/panorama\/10-2\/panorama-admin\/administer-panorama\/monitor-panorama\/panorama-system-and-configuration-logs\" target=\"_blank\" rel=\"noopener noreferrer\">Panorama System and Configuration Logs<\/a><\/li>\n<\/ul>\n<h5 style=\"text-decoration: underline;\">Modul 6 &#8211; Using Panorama Logs<\/h5>\n<ul>\n<li><a href=\"https:\/\/knowledgebase.paloaltonetworks.com\/KCSArticleDetail?id=kA10g000000ClSlCAK\" target=\"_blank\" rel=\"noopener noreferrer\">Basics of Traffic Monitor Filtering<\/a><\/li>\n<\/ul>\n<h5 style=\"text-decoration: underline;\">Modul 7 &#8211; Administrative Accounts<\/h5>\n<ul>\n<li><a href=\"https:\/\/docs.paloaltonetworks.com\/panorama\/10-2\/panorama-admin\/set-up-panorama\/set-up-administrative-access-to-panorama\/configure-administrative-accounts-and-authentication\/configure-local-or-external-authentication-for-panorama-administrators\" target=\"_blank\" rel=\"noopener noreferrer\">Configure Local or External Authentication for Panorama Administrators<\/a><\/li>\n<li><a href=\"https:\/\/docs.paloaltonetworks.com\/panorama\/10-2\/panorama-admin\/set-up-panorama\/set-up-administrative-access-to-panorama\/configure-administrative-accounts-and-authentication\/configure-a-panorama-administrator-account\" target=\"_blank\" rel=\"noopener noreferrer\">Configure a Panorama Administrator Account<\/a><\/li>\n<li><a href=\"https:\/\/docs.paloaltonetworks.com\/panorama\/10-2\/panorama-admin\/set-up-panorama\/set-up-administrative-access-to-panorama\/configure-administrative-accounts-and-authentication\/configure-radius-authentication-for-panorama-administrators\" target=\"_blank\" rel=\"noopener noreferrer\">Configure RADIUS Authentication for Panorama Administrators<\/a><\/li>\n<li><a href=\"https:\/\/docs.paloaltonetworks.com\/panorama\/10-2\/panorama-admin\/set-up-panorama\/set-up-administrative-access-to-panorama\/configure-administrative-accounts-and-authentication\/configure-tacacs-authentication-for-panorama-administrators\" target=\"_blank\" rel=\"noopener noreferrer\">Configure TACACS+ Authentication for Panorama Administrators<\/a><\/li>\n<li><a href=\"https:\/\/docs.paloaltonetworks.com\/panorama\/10-2\/panorama-admin\/set-up-panorama\/set-up-administrative-access-to-panorama\/configure-administrative-accounts-and-authentication\/configure-saml-authentication-for-panorama-administrators\" target=\"_blank\" rel=\"noopener noreferrer\">Configure SAML Authentication for Panorama Administrators<\/a><\/li>\n<li><a href=\"https:\/\/docs.paloaltonetworks.com\/panorama\/10-2\/panorama-admin\/set-up-panorama\/set-up-administrative-access-to-panorama\/configure-an-admin-role-profile\" target=\"_blank\" rel=\"noopener noreferrer\">Configure an Admin Role Profile<\/a><\/li>\n<li><a href=\"https:\/\/docs.paloaltonetworks.com\/panorama\/10-2\/panorama-admin\/set-up-panorama\/set-up-administrative-access-to-panorama\/configure-an-access-domain\" target=\"_blank\" rel=\"noopener noreferrer\">Configure an Access Domain<\/a><\/li>\n<\/ul>\n<h5 style=\"text-decoration: underline;\">Modul 8 &#8211; Aggregated Monitoring And Reporting<\/h5>\n<ul>\n<li><a href=\"https:\/\/docs.paloaltonetworks.com\/panorama\/10-2\/panorama-admin\/administer-panorama\/manage-storage-quotas-and-expiration-periods-for-logs-and-reports\/log-and-report-storage\" target=\"_blank\" rel=\"noopener noreferrer\">Log and Report Storage<\/a><\/li>\n<li><a href=\"https:\/\/docs.paloaltonetworks.com\/panorama\/10-2\/panorama-admin\/administer-panorama\/manage-storage-quotas-and-expiration-periods-for-logs-and-reports\/configure-storage-quotas-and-expiration-periods-for-logs-and-reports\" target=\"_blank\" rel=\"noopener noreferrer\">Configure Storage Quotas and Expiration Periods for Logs and Reports<\/a><\/li>\n<li><a href=\"https:\/\/docs.paloaltonetworks.com\/panorama\/10-2\/panorama-admin\/administer-panorama\/monitor-panorama\/panorama-system-and-configuration-logs\" target=\"_blank\" rel=\"noopener noreferrer\">Panorama System and Configuration Logs<\/a><\/li>\n<li><a href=\"https:\/\/docs.paloaltonetworks.com\/panorama\/10-2\/panorama-admin\/administer-panorama\/monitor-panorama\/monitor-panorama-and-log-collector-statistics-using-snmp\" target=\"_blank\" rel=\"noopener noreferrer\">Monitor Panorama and Log Collector Statistics Using SNMP<\/a><\/li>\n<\/ul>\n<h5 style=\"text-decoration: underline;\">Modul 9 &#8211; Troubleshooting<\/h5>\n<ul>\n<li><a href=\"https:\/\/knowledgebase.paloaltonetworks.com\/KCSArticleDetail?id=kA10g000000ClIbCAK\" target=\"_blank\" rel=\"noopener noreferrer\">Resource List: High Availability Configuring and Troubleshooting<\/a><\/li>\n<li><a href=\"https:\/\/knowledgebase.paloaltonetworks.com\/KCSArticleDetail?id=kA10g000000PMjGCAW\" target=\"_blank\" rel=\"noopener noreferrer\">Resource List: Panorama Configuring and Troubleshooting\/a&gt;<\/a><\/li>\n<li><a href=\"https:\/\/knowledgebase.paloaltonetworks.com\/KCSArticleDetail?id=kA14u000000CqrRCAS\" target=\"_blank\" rel=\"noopener noreferrer\">How To Troubleshoot The Log Forwarding Failure From Firewall To Cortex Data Lake (CDL)<\/a><\/li>\n<li><a href=\"https:\/\/docs.paloaltonetworks.com\/pan-os\/10-2\/pan-os-admin\/firewall-administration\/reference-port-number-usage\/ports-used-for-panorama\" target=\"_blank\" rel=\"noopener noreferrer\">Ports Used for Panorama<\/a><\/li>\n<li><a href=\"https:\/\/docs.paloaltonetworks.com\/panorama\/10-2\/panorama-admin\/manage-firewalls\/device-monitoring-on-panorama\/monitor-device-health\" target=\"_blank\" rel=\"noopener noreferrer\">Monitor Device Health<\/a><\/li>\n<li><a href=\"https:\/\/docs.paloaltonetworks.com\/panorama\/10-2\/panorama-admin\/troubleshooting\/troubleshoot-automatically-reverted-firewall-configurations\" target=\"_blank\" rel=\"noopener noreferrer\">Troubleshoot Automatically Reverted Firewall Configurations<\/a><\/li>\n<li><a href=\"https:\/\/knowledgebase.paloaltonetworks.com\/KCSArticleDetail?id=kA10g000000CleECAS\" target=\"_blank\" rel=\"noopener noreferrer\">How To Packet Capture (tcpdump) On Management Interface<\/a><\/li>\n<\/ul>\n<h5 style=\"text-decoration: underline;\">Appendix A<\/h5>\n<ul>\n<li><a href=\"https:\/\/knowledgebase.paloaltonetworks.com\/KCSArticleDetail?id=kA10g000000CloRCAS\" target=\"_blank\" rel=\"noopener noreferrer\">How to add a locally managed firewall to panorama management<\/a><\/li>\n<li><a href=\"https:\/\/docs.paloaltonetworks.com\/panorama\/10-2\/panorama-admin\/manage-log-collection\/log-collection-deployments\" target=\"_blank\" rel=\"noopener noreferrer\">Log Collection Deployments<\/a><\/li>\n<li><a href=\"https:\/\/docs.paloaltonetworks.com\/panorama\/10-2\/panorama-admin\/manage-log-collection\/configure-log-forwarding-to-panorama\" target=\"_blank\" rel=\"noopener noreferrer\">Configure Log Forwarding to Panorama<\/a><\/li>\n<li><a href=\"https:\/\/docs.paloaltonetworks.com\/panorama\/10-2\/panorama-admin\/panorama-high-availability\" target=\"_blank\" rel=\"noopener noreferrer\">Panorama High Availability<\/a><\/li>\n<\/ul>\n<\/div>\n<hr style=\"border: 5px solid black; border-radius: 5px;\" \/>\n<h2><a name=\"edu330\"><\/a>Course PA EDU-330<\/h2>\n<p><em>Here you will find all Reference Links for the EDU-330 Course (Based on the course material and my own references)<\/em><\/p>\n<div style=\"background-color: #ebebeb;\">\n<h5 style=\"text-decoration: underline;\">Modul 0 &#8211; Introductions<\/h5>\n<ul>\n<li><a href=\"https:\/\/beacon.paloaltonetworks.com\" target=\"_blank\" rel=\"noopener noreferrer\">Prepare Certification Exam, Online Training Courses and more<\/a><\/li>\n<li><a href=\"https:\/\/www.youtube.com\/@paloaltonetworks\/featured\" target=\"_blank\" rel=\"noopener noreferrer\">PaloAlto Networks &#8211; You Tube Channel<\/a><\/li>\n<li><a href=\"https:\/\/www.paloaltonetworks.com\/services\/education\" target=\"_blank\" rel=\"noopener noreferrer\">Education Services<\/a><\/li>\n<li><a href=\"https:\/\/live.paloaltonetworks.com\/t5\/certification\/ct-p\/Certification\" target=\"_blank\" rel=\"noopener noreferrer\">Palo Alto Networks Live &#8211; Certification<\/a><\/li>\n<li><a href=\"https:\/\/www.paloaltonetworks.com\/services\/education\/palo-alto-networks-certified-cybersecurity-entry-level-technician\" target=\"_blank\" rel=\"noopener noreferrer\">Palo Alto Networks Certified Cybersecurity Entry-Level Technician (PCCET)<\/a><\/li>\n<li><a href=\"https:\/\/www.paloaltonetworks.com\/services\/education\/palo-alto-networks-certified-network-security-administrator\" target=\"_blank\" rel=\"noopener noreferrer\">Palo Alto Networks Certified Network Security Administrator (PCNSA)<\/a><\/li>\n<li><a href=\"https:\/\/www.paloaltonetworks.com\/services\/education\/palo-alto-networks-certified-network-security-engineer\" target=\"_blank\" rel=\"noopener noreferrer\">Palo Alto Networks Certified Network Security Engineer (PCNSE)<\/a><\/li>\n<li><a href=\"http:\/\/www.pearsonvue.com\/paloaltonetworks\" target=\"_blank\" rel=\"noopener noreferrer\">Person VUE Exam Registration<\/a><\/li>\n<\/ul>\n<h5 style=\"text-decoration: underline;\">Modul 1 &#8211; Tools And Resources<\/h5>\n<ul>\n<li><a href=\"https:\/\/knowledgebase.paloaltonetworks.com\/KCSArticleDetail?id=kA14u0000008UrKCAU\" target=\"_blank\" rel=\"noopener noreferrer\">Resource List: VM-Series Configuration and Troubleshooting<\/a><\/li>\n<li><a href=\"https:\/\/knowledgebase.paloaltonetworks.com\/KCSArticleDetail?id=kA10g000000PLWQCA4\" target=\"_blank\" rel=\"noopener noreferrer\">Resource List: Tips &amp; Tricks<\/a><\/li>\n<li><a href=\"https:\/\/knowledgebase.paloaltonetworks.com\/KCSArticleDetail?id=kA10g000000Cm2jCAC\" target=\"_blank\" rel=\"noopener noreferrer\">Troubleshooting VMware NSX\/ESXi Deployment<\/a><\/li>\n<li><a href=\"https:\/\/docs.paloaltonetworks.com\/\" target=\"_blank\" rel=\"noopener noreferrer\">Manuals, Release Notes, Best Practice Guides and More<\/a><\/li>\n<li><a href=\"https:\/\/knowledgebase.paloaltonetworks.com\/\" target=\"_blank\" rel=\"noopener noreferrer\">Palo Alto Networks Knowledge Base<\/a><\/li>\n<li><a href=\"https:\/\/live.paloaltonetworks.com\/\" target=\"_blank\" rel=\"noopener noreferrer\">Welcome to Palo Alto Networks&#8217; LIVEcommunity<\/a><\/li>\n<li><a href=\"https:\/\/support.paloaltonetworks.com\/\" target=\"_blank\" rel=\"noopener noreferrer\">Customer Support Portal<\/a><\/li>\n<li><a href=\"https:\/\/www.fuelusergroup.org\/\" target=\"_blank\" rel=\"noopener noreferrer\">Fuel Palo Alto Networks User Group<\/a><\/li>\n<li><a href=\"https:\/\/live.paloaltonetworks.com\/t5\/general-articles\/the-google-chrome-extension\/ta-p\/315323\" target=\"_blank\" rel=\"noopener noreferrer\">The Google Chrome Extension<\/a><\/li>\n<\/ul>\n<h5 style=\"text-decoration: underline;\">Modul 2 &#8211; Flow Logic<\/h5>\n<ul>\n<li><a href=\"https:\/\/knowledgebase.paloaltonetworks.com\/KCSArticleDetail?id=kA10g000000ClVNCA0\" target=\"_blank\" rel=\"noopener noreferrer\">Flow Basic Log Elements: type ATOMIC and type ORDERED<\/a><\/li>\n<li><a href=\"https:\/\/knowledgebase.paloaltonetworks.com\/KCSArticleDetail?id=kA10g000000ClVHCA0\" target=\"_blank\" rel=\"noopener noreferrer\">Packet Flow Sequence in PAN-OS<\/a><\/li>\n<\/ul>\n<h5 style=\"text-decoration: underline;\">Modul 3 &#8211; Packet Captures<\/h5>\n<ul>\n<li><a href=\"https:\/\/knowledgebase.paloaltonetworks.com\/KCSArticleDetail?id=kA10g000000CldYCAS\" target=\"_blank\" rel=\"noopener noreferrer\">Disabling Session Offload to Record Traffic During Packet Capture<\/a><\/li>\n<li><a href=\"https:\/\/knowledgebase.paloaltonetworks.com\/KCSArticleDetail?id=kA10g000000ClgDCAS\" target=\"_blank\" rel=\"noopener noreferrer\">Packet Capture Contains Traffic not Defined in Filter<\/a><\/li>\n<li><a href=\"https:\/\/knowledgebase.paloaltonetworks.com\/KCSArticleDetail?id=kA10g000000ClvbCAC\" target=\"_blank\" rel=\"noopener noreferrer\">Packet Capture Filter not Capturing Traffic Defined in the Match Filter<\/a><\/li>\n<li><a href=\"How to Get an Application PCAP\" target=\"_blank\" rel=\"noopener noreferrer\">How to Get an Application PCAP<\/a><\/li>\n<li><a href=\"https:\/\/knowledgebase.paloaltonetworks.com\/KCSArticleDetail?id=kA10g000000ClTJCA0\" target=\"_blank\" rel=\"noopener noreferrer\">Getting Started: Packet Capture<\/a><\/li>\n<li><a href=\"https:\/\/knowledgebase.paloaltonetworks.com\/KCSArticleDetail?id=kA10g000000CleECAS\" target=\"_blank\" rel=\"noopener noreferrer\">How To Packet Capture (tcpdump) On Management Interface<\/a><\/li>\n<li><a href=\"https:\/\/knowledgebase.paloaltonetworks.com\/KCSArticleDetail?id=kA10g000000Cm88CAC\" target=\"_blank\" rel=\"noopener noreferrer\">Tcpdump Packet Capture Truncated<\/a><\/li>\n<li><a href=\"https:\/\/knowledgebase.paloaltonetworks.com\/KCSArticleDetail?id=kA10g000000ClgUCAS\" target=\"_blank\" rel=\"noopener noreferrer\">How to Capture Traffic (PCAP) Hitting a Specific Rule<\/a><\/li>\n<li><a href=\"https:\/\/knowledgebase.paloaltonetworks.com\/KCSArticleDetail?id=kA14u0000004M4YCAU\" target=\"_blank\" rel=\"noopener noreferrer\">How to do the custom packet capture for vulnerability signatures analysis<\/a><\/li>\n<li><a href=\"https:\/\/knowledgebase.paloaltonetworks.com\/KCSArticleDetail?id=kA10g000000PLMfCAO\" target=\"_blank\" rel=\"noopener noreferrer\">How to Enable Threat Packet Capture for a Specific Anti-Spyware Signature?<\/a><\/li>\n<li><a href=\"https:\/\/knowledgebase.paloaltonetworks.com\/KCSArticleDetail?id=kA10g000000Cm3uCAC\" target=\"_blank\" rel=\"noopener noreferrer\">What is The Limitation of the Packet Capture File Size on PAN-OS?<\/a><\/li>\n<li><a href=\"https:\/\/knowledgebase.paloaltonetworks.com\/KCSArticleDetail?id=kA10g000000ClS8CAK\" target=\"_blank\" rel=\"noopener noreferrer\">Tips &amp; Tricks: Enabling Packet Captures to Troubleshoot Daemons<\/a><\/li>\n<li><a href=\"https:\/\/knowledgebase.paloaltonetworks.com\/KCSArticleDetail?id=kA10g000000ClEHCA0\" target=\"_blank\" rel=\"noopener noreferrer\">How to Configure Extended Packet Capture<\/a><\/li>\n<li><a href=\"https:\/\/knowledgebase.paloaltonetworks.com\/KCSArticleDetail?id=kA10g000000boHqCAI\" target=\"_blank\" rel=\"noopener noreferrer\">Identifying and Resolving High Dataplane CPU caused by packet-diag logging<\/a><\/li>\n<li><a href=\"https:\/\/knowledgebase.paloaltonetworks.com\/KCSArticleDetail?id=kA10g000000ClvxCAC\" target=\"_blank\" rel=\"noopener noreferrer\">How to Create a Packet Filter for IPv6 Addresses<\/a><\/li>\n<\/ul>\n<h5 style=\"text-decoration: underline;\">Modul 4 &#8211; Packet Diagnostics<\/h5>\n<ul>\n<li><a href=\"https:\/\/knowledgebase.paloaltonetworks.com\/KCSArticleDetail?id=kA10g000000ClLsCAK\" target=\"_blank\" rel=\"noopener noreferrer\">How to Aggregate Flow Basic or Other Dataplane packet-diag log to a Single File for Analysis<\/a><\/li>\n<li><a href=\"https:\/\/knowledgebase.paloaltonetworks.com\/KCSArticleDetail?id=kA10g000000ClWQCA0\" target=\"_blank\" rel=\"noopener noreferrer\">Understanding TCP Reassembly drops<\/a><\/li>\n<li><a href=\"https:\/\/knowledgebase.paloaltonetworks.com\/KCSArticleDetail?id=kA10g000000ClWSCA0\" target=\"_blank\" rel=\"noopener noreferrer\">Does IDMGR Dump ID Number Correlate with Flow Basic Index Number?<\/a><\/li>\n<\/ul>\n<h5 style=\"text-decoration: underline;\">Modul 5 &#8211; Host Inbound Traffic<\/h5>\n<ul>\n<li><a href=\"https:\/\/knowledgebase.paloaltonetworks.com\/KCSArticleDetail?id=kA14u000000oND3CAM\" target=\"_blank\" rel=\"noopener noreferrer\">How to troubleshoot a connection failure between the firewall and CDL.<\/a><\/li>\n<li><a href=\"https:\/\/knowledgebase.paloaltonetworks.com\/KCSArticleDetail?id=kA10g000000Clh5CAC\" target=\"_blank\" rel=\"noopener noreferrer\">Resource List: IPSec Configuring and Troubleshooting<\/a><\/li>\n<li><a href=\"https:\/\/knowledgebase.paloaltonetworks.com\/KCSArticleDetail?id=kA14u0000008UxSCAU\" target=\"_blank\" rel=\"noopener noreferrer\">Resource List: BGP configuration and Troubleshooting<\/a><\/li>\n<li><a href=\"https:\/\/knowledgebase.paloaltonetworks.com\/KCSArticleDetail?id=kA10g000000CluUCAS\" target=\"_blank\" rel=\"noopener noreferrer\">Troubleshooting RADIUS Authentication<\/a><\/li>\n<li><a href=\"https:\/\/knowledgebase.paloaltonetworks.com\/KCSArticleDetail?id=kA10g000000PLZjCAO\" target=\"_blank\" rel=\"noopener noreferrer\">How to troubleshoot OSPF adjacency stuck in INIT or EXSTART or EXCHANGE or LOADING States<\/a><\/li>\n<li><a href=\"https:\/\/knowledgebase.paloaltonetworks.com\/KCSArticleDetail?id=kA14u000000CqYPCA0\" target=\"_blank\" rel=\"noopener noreferrer\">How To Troubleshoot Connection Failure To LDAP Servers<\/a><\/li>\n<li><a href=\"https:\/\/knowledgebase.paloaltonetworks.com\/KCSArticleDetail?id=kA10g000000PLsqCAG\" target=\"_blank\" rel=\"noopener noreferrer\">How to troubleshoot and verify log forwarding issues for LPC on PA-7000 series firewall<\/a><\/li>\n<li><a href=\"https:\/\/knowledgebase.paloaltonetworks.com\/KCSArticleDetail?id=kA14u0000004NC4CAM\" target=\"_blank\" rel=\"noopener noreferrer\">How To Troubleshoot Connection Failures To Syslog Servers<\/a><\/li>\n<li><a href=\"https:\/\/knowledgebase.paloaltonetworks.com\/KCSArticleDetail?id=kA14u0000008UuYCAU\" target=\"_blank\" rel=\"noopener noreferrer\">How to Verify and Troubleshoot Netflow<\/a><\/li>\n<li><a href=\"https:\/\/knowledgebase.paloaltonetworks.com\/KCSArticleDetail?id=kA14u0000001VVLCA2\" target=\"_blank\" rel=\"noopener noreferrer\">Resource List: Performance and Stability<\/a><\/li>\n<li><a href=\"https:\/\/knowledgebase.paloaltonetworks.com\/KCSArticleDetail?id=kA10g000000PORsCAO\" target=\"_blank\" rel=\"noopener noreferrer\">IKEv1 VPN error logs &#8211; Troubleshooting<\/a><\/li>\n<li><a href=\"https:\/\/knowledgebase.paloaltonetworks.com\/KCSArticleDetail?id=kA10g000000Cm0RCAS\" target=\"_blank\" rel=\"noopener noreferrer\">How to Troubleshoot Connectivity Issues on Management Interface?<\/a><\/li>\n<li><a href=\"https:\/\/knowledgebase.paloaltonetworks.com\/KCSArticleDetail?id=kA10g000000ClcKCAS\" target=\"_blank\" rel=\"noopener noreferrer\">How to enable debug on a single VPN Peer?<\/a><\/li>\n<li><a href=\"https:\/\/knowledgebase.paloaltonetworks.com\/KCSArticleDetail?id=kA10g000000ClivCAC\" target=\"_blank\" rel=\"noopener noreferrer\">How to Troubleshoot IPSec VPN connectivity issues<\/a><\/li>\n<li><a href=\"https:\/\/knowledgebase.paloaltonetworks.com\/KCSArticleDetail?id=kA10g000000ClinCAC\" target=\"_blank\" rel=\"noopener noreferrer\">How to Decrypt IKE and ESP Packets on a Palo Alto Networks Device<\/a><\/li>\n<li><a href=\"https:\/\/knowledgebase.paloaltonetworks.com\/KCSArticleDetail?id=kA10g000000PLMzCAO\" target=\"_blank\" rel=\"noopener noreferrer\">How to Decrypt IKEv2 Packets<\/a><\/li>\n<li><a href=\"https:\/\/knowledgebase.paloaltonetworks.com\/KCSArticleDetail?id=kA14u0000001Ug3CAE\" target=\"_blank\" rel=\"noopener noreferrer\">Resource List: Firewall management<\/a><\/li>\n<li><a href=\"https:\/\/live.paloaltonetworks.com\/t5\/general-topics\/updates-paloaltonetworks-com-connectivity\/td-p\/24524\" target=\"_blank\" rel=\"noopener noreferrer\">updates.paloaltonetworks.com connectivity<\/a><\/li>\n<\/ul>\n<h5 style=\"text-decoration: underline;\">Modul 6 &#8211; Transit Traffic<\/h5>\n<ul>\n<li><a href=\"https:\/\/knowledgebase.paloaltonetworks.com\/KCSArticleDetail?id=kA10g000000ClowCAC\" target=\"_blank\" rel=\"noopener noreferrer\">Resource list: App-ID Configuration and Troubleshooting<\/a><\/li>\n<li><a href=\"https:\/\/knowledgebase.paloaltonetworks.com\/KCSArticleDetail?id=kA10g000000HAEJCA4\" target=\"_blank\" rel=\"noopener noreferrer\">Resource List: Wildfire Configuration and Troubleshooting<\/a><\/li>\n<li><a href=\"https:\/\/knowledgebase.paloaltonetworks.com\/KCSArticleDetail?id=kA10g000000ClRZCA0\" target=\"_blank\" rel=\"noopener noreferrer\">URL filtering implementation and troubleshooting<\/a><\/li>\n<li><a href=\"https:\/\/knowledgebase.paloaltonetworks.com\/KCSArticleDetail?id=kA10g000000ClgACAS\" target=\"_blank\" rel=\"noopener noreferrer\">Resource List: Security Policy Configuring and Troubleshooting<\/a><\/li>\n<li><a href=\"https:\/\/knowledgebase.paloaltonetworks.com\/KCSArticleDetail?id=kA10g000000ClZ5CAK\" target=\"_blank\" rel=\"noopener noreferrer\">Resource List: File Blocking Profile Configuring and Troubleshooting<\/a><\/li>\n<li><a href=\"https:\/\/knowledgebase.paloaltonetworks.com\/KCSArticleDetail?id=kA10g000000ClXOCA0\" target=\"_blank\" rel=\"noopener noreferrer\">How to Troubleshoot Using Counters via the CLI<\/a><\/li>\n<li><a href=\"https:\/\/knowledgebase.paloaltonetworks.com\/KCSArticleDetail?id=kA10g000000ClaVCAS\" target=\"_blank\" rel=\"noopener noreferrer\">What is the significance of Global Counters?<\/a><\/li>\n<li><a href=\"https:\/\/knowledgebase.paloaltonetworks.com\/KCSArticleDetail?id=kA14u000000oMICCA2\" target=\"_blank\" rel=\"noopener noreferrer\">How to verify the status and troubleshoot the WildFire Real Time Signature Updates feature<\/a><\/li>\n<li><a href=\"https:\/\/knowledgebase.paloaltonetworks.com\/KCSArticleDetail?id=kA10g000000PLahCAG\" target=\"_blank\" rel=\"noopener noreferrer\">How Do I Disable WildFire Forwarding of Blocked Files?<\/a><\/li>\n<li><a href=\"https:\/\/knowledgebase.paloaltonetworks.com\/KCSArticleDetail?id=kA14u0000008UuJCAU\" target=\"_blank\" rel=\"noopener noreferrer\">How to troubleshoot spoofed ip on Palo Alto Networks firewall?<\/a><\/li>\n<li><a href=\"https:\/\/knowledgebase.paloaltonetworks.com\/KCSArticleDetail?id=kA10g000000ClSHCA0\" target=\"_blank\" rel=\"noopener noreferrer\">DotW: Issues with Asymmetric Routing<\/a><\/li>\n<li><a href=\"https:\/\/knowledgebase.paloaltonetworks.com\/KCSArticleDetail?id=kA10g000000ClHDCA0\" target=\"_blank\" rel=\"noopener noreferrer\">How to Implement Resource Protection using a DOS Profile<\/a><\/li>\n<li><a href=\"https:\/\/knowledgebase.paloaltonetworks.com\/KCSArticleDetail?id=kA10g000000CloNCAS\" target=\"_blank\" rel=\"noopener noreferrer\">How to check global counters for a specific source and destination IP address<\/a><\/li>\n<li><a href=\"https:\/\/knowledgebase.paloaltonetworks.com\/KCSArticleDetail?id=kA10g000000ClSlCAK\" target=\"_blank\" rel=\"noopener noreferrer\">Basics of Traffic Monitor Filtering<\/a><\/li>\n<li><a href=\"https:\/\/knowledgebase.paloaltonetworks.com\/KCSArticleDetail?id=kA10g000000ClWLCA0\" target=\"_blank\" rel=\"noopener noreferrer\">Troubleshooting DoS Attacks<\/a><\/li>\n<\/ul>\n<h5 style=\"text-decoration: underline;\">Modul 7 &#8211; System Services Daemons<\/h5>\n<ul>\n<li><a href=\"https:\/\/knowledgebase.paloaltonetworks.com\/KCSArticleDetail?id=kA14u000000oNDrCAM\" target=\"_blank\" rel=\"noopener noreferrer\">How To Troubleshoot High Management Plane CPU Usage<\/a><\/li>\n<li><a href=\"https:\/\/knowledgebase.paloaltonetworks.com\/KCSArticleDetail?id=kA14u000000oNDmCAM\" target=\"_blank\" rel=\"noopener noreferrer\">How To Troubleshoot High Management Plane Memory Usage<\/a><\/li>\n<li><a href=\"https:\/\/knowledgebase.paloaltonetworks.com\/KCSArticleDetail?id=kA10g000000ClIbCAK\" target=\"_blank\" rel=\"noopener noreferrer\">Resource List: High Availability Configuring and Troubleshooting<\/a><\/li>\n<li><a href=\"https:\/\/knowledgebase.paloaltonetworks.com\/KCSArticleDetail?id=kA10g000000ClRTCA0\" target=\"_blank\" rel=\"noopener noreferrer\">How to Troubleshoot High Dataplane CPU<\/a><\/li>\n<li><a href=\"https:\/\/knowledgebase.paloaltonetworks.com\/KCSArticleDetail?id=kA14u000000oNB7CAM\" target=\"_blank\" rel=\"noopener noreferrer\">How to Troubleshoot High Packet Buffer or Packet Descriptors Usage<\/a><\/li>\n<li><a href=\"https:\/\/knowledgebase.paloaltonetworks.com\/KCSArticleDetail?id=kA10g000000boHqCAI\" target=\"_blank\" rel=\"noopener noreferrer\">Identifying and Resolving High Dataplane CPU caused by packet-diag logging<\/a><\/li>\n<li><a href=\"https:\/\/knowledgebase.paloaltonetworks.com\/KCSArticleDetail?id=kA14u000000HBjNCAW\" target=\"_blank\" rel=\"noopener noreferrer\">High on-chip descriptor and packet buffer usage due to policy deny resulting in traffic latency and drops<\/a><\/li>\n<li><a href=\"https:\/\/knowledgebase.paloaltonetworks.com\/KCSArticleDetail?id=kA10g000000ClXwCAK\" target=\"_blank\" rel=\"noopener noreferrer\">How to Interpret: show running resource-monitor<\/a><\/li>\n<li><a href=\"https:\/\/knowledgebase.paloaltonetworks.com\/KCSArticleDetail?id=kA10g000000ClSvCAK\" target=\"_blank\" rel=\"noopener noreferrer\">Tips &amp; Tricks: Reducing Management Plane Load<\/a><\/li>\n<li><a href=\"https:\/\/knowledgebase.paloaltonetworks.com\/KCSArticleDetail?id=kA10g000000CmMtCAK\" target=\"_blank\" rel=\"noopener noreferrer\">Troubleshooting firewall connectivity issues with Logging Service<\/a><\/li>\n<li><a href=\"https:\/\/knowledgebase.paloaltonetworks.com\/KCSArticleDetail?id=kA10g000000CmV2CAK\" target=\"_blank\" rel=\"noopener noreferrer\">How to interpret output of &#8220;debug dataplane pow performance&#8221; during troubleshooting high DP CPU<\/a><\/li>\n<li><a href=\"https:\/\/knowledgebase.paloaltonetworks.com\/KCSArticleDetail?id=kA10g000000PLr9CAG\" target=\"_blank\" rel=\"noopener noreferrer\">High Dataplane CPU Caused From &#8220;too small&#8221; or &#8220;too large&#8221; Packets For Content Inspection<\/a><\/li>\n<li><a href=\"https:\/\/knowledgebase.paloaltonetworks.com\/KCSArticleDetail?id=kA14u000000wlGlCAI\" target=\"_blank\" rel=\"noopener noreferrer\">How to Identify and Troubleshoot a Process that Exited or Restarted in PAN-OS<\/a><\/li>\n<li><a href=\"https:\/\/knowledgebase.paloaltonetworks.com\/KCSArticleDetail?id=kA10g000000ClS8CAK\" target=\"_blank\" rel=\"noopener noreferrer\">Tips &amp; Tricks: Enabling Packet Captures to Troubleshoot Daemons<\/a><\/li>\n<li><a href=\"https:\/\/knowledgebase.paloaltonetworks.com\/KCSArticleDetail?id=kA10g000000ClaJCAS\" target=\"_blank\" rel=\"noopener noreferrer\">High Disk Space Usage on \/ root partition and How To Clear<\/a><\/li>\n<li><a href=\"\/\/knowledgebase.paloaltonetworks.com\/KCSArticleDetail?id=kA10g000000PMznCAG\" target=\"_blank\" rel=\"noopener noreferrer\">How to run cleanup script if root disk-space exceed 90%<\/a><\/li>\n<li><a href=\"https:\/\/knowledgebase.paloaltonetworks.com\/KCSArticleDetail?id=kA10g000000ClgZCAS\" target=\"_blank\" rel=\"noopener noreferrer\">How to Determine How Much Disk Space is Allocated to Logs<\/a><\/li>\n<li><a href=\"https:\/\/knowledgebase.paloaltonetworks.com\/KCSArticleDetail?id=kA10g000000PLSJCA4\" target=\"_blank\" rel=\"noopener noreferrer\">High Disk Space Usage on \/opt\/pancfg partition and How To Clear<\/a><\/li>\n<li><a href=\"https:\/\/knowledgebase.paloaltonetworks.com\/KCSArticleDetail?id=kA10g000000PPBWCA4\" target=\"_blank\" rel=\"noopener noreferrer\">How to identify the packet buffer misconfiguration<\/a><\/li>\n<li><a href=\"https:\/\/knowledgebase.paloaltonetworks.com\/KCSArticleDetail?id=kA10g0000008UPfCAM\" target=\"_blank\" rel=\"noopener noreferrer\">Management CPU is 100% because of &#8216;%wa&#8217;<\/a><\/li>\n<li><a href=\"https:\/\/knowledgebase.paloaltonetworks.com\/KCSArticleDetail?id=kA10g000000PLUeCAO\" target=\"_blank\" rel=\"noopener noreferrer\">Commonly Used Processes\/Daemons<\/a><\/li>\n<\/ul>\n<h5 style=\"text-decoration: underline;\">Modul 8 &#8211; Certificate Management and SSL Decryption<\/h5>\n<ul>\n<li><a href=\"https:\/\/knowledgebase.paloaltonetworks.com\/KCSArticleDetail?id=kA10g000000Cm5YCAS\" target=\"_blank\" rel=\"noopener noreferrer\">Resource List: SSL Certificates Configuring and Troubleshooting<\/a><\/li>\n<li><a href=\"https:\/\/knowledgebase.paloaltonetworks.com\/KCSArticleDetail?id=kA10g000000ClVJCA0\" target=\"_blank\" rel=\"noopener noreferrer\">Troubleshooting SSL Decryption using Dynamic Address Groups<\/a><\/li>\n<li><a href=\"https:\/\/knowledgebase.paloaltonetworks.com\/KCSArticleDetail?id=kA14u000000HB8bCAG\" target=\"_blank\" rel=\"noopener noreferrer\">Why traffic is been dropped as &#8220;Client and Decryption profile mismatched&#8221;<\/a><\/li>\n<li><a href=\"https:\/\/knowledgebase.paloaltonetworks.com\/KCSArticleDetail?id=kA10g000000ClZ6CAK\" target=\"_blank\" rel=\"noopener noreferrer\">How to Temporarily Disable SSL Decryption<\/a><\/li>\n<\/ul>\n<h5 style=\"text-decoration: underline;\">Modul 9 &#8211; User ID<\/h5>\n<ul>\n<li><a href=\"https:\/\/knowledgebase.paloaltonetworks.com\/KCSArticleDetail?id=kA10g000000Cm5bCAC\" target=\"_blank\" rel=\"noopener noreferrer\">Resource List: User-ID Configuring and Troubleshooting<\/a><\/li>\n<li><a href=\"https:\/\/knowledgebase.paloaltonetworks.com\/KCSArticleDetail?id=kA10g000000CljXCAS\" target=\"_blank\" rel=\"noopener noreferrer\">How to Troubleshoot Captive Portal<\/a><\/li>\n<li><a href=\"https:\/\/knowledgebase.paloaltonetworks.com\/KCSArticleDetail?id=kA10g000000ClZiCAK\" target=\"_blank\" rel=\"noopener noreferrer\">Troubleshooting Captive Portal Redirect Page Issues<\/a><\/li>\n<li><a href=\"https:\/\/knowledgebase.paloaltonetworks.com\/KCSArticleDetail?id=kA10g000000CmUiCAK\" target=\"_blank\" rel=\"noopener noreferrer\">How to Troubleshoot VoIP Issues with Palo Alto Networks Firewall<\/a><\/li>\n<li><a href=\"https:\/\/knowledgebase.paloaltonetworks.com\/KCSArticleDetail?id=kA14u000000Cr9GCAS\" target=\"_blank\" rel=\"noopener noreferrer\">How to troubleshoot connection failure to User-ID agent<\/a><\/li>\n<li><a href=\"https:\/\/knowledgebase.paloaltonetworks.com\/KCSArticleDetail?id=kA14u0000001Uu5CAE\" target=\"_blank\" rel=\"noopener noreferrer\">Troubleshooting User-ID cache timeout<\/a><\/li>\n<li><a href=\"https:\/\/knowledgebase.paloaltonetworks.com\/KCSArticleDetail?id=kA10g000000Cli8CAC\" target=\"_blank\" rel=\"noopener noreferrer\">Workflow and Troubleshooting checklist for policy enforcement based on user groups<\/a><\/li>\n<\/ul>\n<h5 style=\"text-decoration: underline;\">Modul 10 &#8211; Global Protect<\/h5>\n<ul>\n<li><a href=\"https:\/\/knowledgebase.paloaltonetworks.com\/KCSArticleDetail?id=kA10g000000ClfXCAS\" target=\"_blank\" rel=\"noopener noreferrer\">Resource List: GlobalProtect Configuring and Troubleshooting<\/a><\/li>\n<li><a href=\"https:\/\/knowledgebase.paloaltonetworks.com\/KCSArticleDetail?id=kA10g000000ClWTCA0\" target=\"_blank\" rel=\"noopener noreferrer\">Tips &amp; Tricks: GlobalProtect IPv6 Troubleshooting Part 2 LSVPN<\/a><\/li>\n<li><a href=\"https:\/\/knowledgebase.paloaltonetworks.com\/KCSArticleDetail?id=kA10g000000ClshCAC\" target=\"_blank\" rel=\"noopener noreferrer\">How to Troubleshoot HIP Data<\/a><\/li>\n<li><a href=\"https:\/\/knowledgebase.paloaltonetworks.com\/KCSArticleDetail?id=kA10g000000ClqQCAS\" target=\"_blank\" rel=\"noopener noreferrer\">How to Export Logs from GlobalProtect App on iOS or Android<\/a><\/li>\n<li><a href=\"https:\/\/knowledgebase.paloaltonetworks.com\/KCSArticleDetail?id=kA10g000000ClNSCA0\" target=\"_blank\" rel=\"noopener noreferrer\">How to Open a Support Case and Verify Entitlement<\/a><\/li>\n<\/ul>\n<h5 style=\"text-decoration: underline;\">Modul 11 &#8211; Escalation and RMA<\/h5>\n<ul>\n<li><a href=\"https:\/\/knowledgebase.paloaltonetworks.com\/KCSArticleDetail?id=kA10g000000ClVQCA0\" target=\"_blank\" rel=\"noopener noreferrer\">When to request a Support Event<\/a><\/li>\n<li><a href=\"https:\/\/knowledgebase.paloaltonetworks.com\/KCSArticleDetail?id=kA10g000000ClTbCAK\" target=\"_blank\" rel=\"noopener noreferrer\">How to Open a Case on IPSec (VPN) Issues<\/a><\/li>\n<li><a href=\"https:\/\/knowledgebase.paloaltonetworks.com\/KCSArticleDetail?id=kA10g000000Clu2CAC\" target=\"_blank\" rel=\"noopener noreferrer\">How to Request a new App-ID<\/a><\/li>\n<li><a href=\"https:\/\/knowledgebase.paloaltonetworks.com\/KCSArticleDetail?id=kA14u0000001VmqCAE\" target=\"_blank\" rel=\"noopener noreferrer\">Best Practice Guide for Data Collection while opening a Palo Alto Networks support case for Firewall products<\/a><\/li>\n<\/ul>\n<h5 style=\"text-decoration: underline;\">Appendix A &#8211; CLI Primer<\/h5>\n<ul>\n<li><a href=\"https:\/\/knowledgebase.paloaltonetworks.com\/KCSArticleDetail?id=kA10g000000CldkCAC\" target=\"_blank\" rel=\"noopener noreferrer\">CLI Commands to Troubleshoot DHCP<\/a><\/li>\n<li><a href=\"https:\/\/knowledgebase.paloaltonetworks.com\/KCSArticleDetail?id=kA10g000000CluWCAS\" target=\"_blank\" rel=\"noopener noreferrer\">Useful CLI Commands to Troubleshoot LDAP Connection<\/a><\/li>\n<\/ul>\n<\/div>\n<hr style=\"border: 5px solid black; border-radius: 5px;\" \/>\n<h2><a name=\"edu238\"><\/a>Course PA EDU-238<\/h2>\n<p><em>Here you will find all Reference Links for the EDU-238 Course (Based on the course material and my own references)<\/em><\/p>\n<div style=\"background-color: #ebebeb;\">\n<h5 style=\"text-decoration: underline;\">Modul 0 &#8211; Introductions<\/h5>\n<ul>\n<li><a href=\"https:\/\/beacon.paloaltonetworks.com\" target=\"_blank\" rel=\"noopener noreferrer\">Prepare Certification Exam, Online Training Courses and more<\/a><\/li>\n<li><a href=\"https:\/\/www.youtube.com\/@paloaltonetworks\/featured\" target=\"_blank\" rel=\"noopener noreferrer\">PaloAlto Networks &#8211; You Tube Channel<\/a><\/li>\n<li><a href=\"https:\/\/www.paloaltonetworks.com\/services\/education\" target=\"_blank\" rel=\"noopener noreferrer\">Education Services<\/a><\/li>\n<li><a href=\"https:\/\/live.paloaltonetworks.com\/t5\/certification\/ct-p\/Certification\" target=\"_blank\" rel=\"noopener noreferrer\">Palo Alto Networks Live &#8211; Certification<\/a><\/li>\n<li><a href=\"https:\/\/www.paloaltonetworks.com\/services\/education\/palo-alto-networks-certified-cybersecurity-entry-level-technician\" target=\"_blank\" rel=\"noopener noreferrer\">Palo Alto Networks Certified Cybersecurity Entry-Level Technician (PCCET)<\/a><\/li>\n<li><a href=\"https:\/\/www.paloaltonetworks.com\/services\/education\/palo-alto-networks-certified-network-security-administrator\" target=\"_blank\" rel=\"noopener noreferrer\">Palo Alto Networks Certified Network Security Administrator (PCNSA)<\/a><\/li>\n<li><a href=\"https:\/\/www.paloaltonetworks.com\/services\/education\/palo-alto-networks-certified-network-security-engineer\" target=\"_blank\" rel=\"noopener noreferrer\">Palo Alto Networks Certified Network Security Engineer (PCNSE)<\/a><\/li>\n<li><a href=\"http:\/\/www.pearsonvue.com\/paloaltonetworks\" target=\"_blank\" rel=\"noopener noreferrer\">Person VUE Exam Registration<\/a><\/li>\n<\/ul>\n<\/div>\n<hr style=\"border: 5px solid black; border-radius: 5px;\" \/>\n<h2><a name=\"edu318\"><\/a>Course PA EDU-318<\/h2>\n<p><em>Here you will find all Reference Links for the EDU-318 Course (Based on the course material and my own references)<\/em><\/p>\n<div style=\"background-color: #ebebeb;\">\n<h5 style=\"text-decoration: underline;\">Modul 0 &#8211; Introductions<\/h5>\n<ul>\n<li><a href=\"https:\/\/beacon.paloaltonetworks.com\" target=\"_blank\" rel=\"noopener noreferrer\">Prepare Certification Exam, Online Training Courses and more<\/a><\/li>\n<li><a href=\"https:\/\/www.youtube.com\/@paloaltonetworks\/featured\" target=\"_blank\" rel=\"noopener noreferrer\">PaloAlto Networks &#8211; You Tube Channel<\/a><\/li>\n<li><a href=\"https:\/\/www.paloaltonetworks.com\/services\/education\" target=\"_blank\" rel=\"noopener noreferrer\">Education Services<\/a><\/li>\n<li><a href=\"https:\/\/live.paloaltonetworks.com\/t5\/certification\/ct-p\/Certification\" target=\"_blank\" rel=\"noopener noreferrer\">Palo Alto Networks Live &#8211; Certification<\/a><\/li>\n<li><a href=\"https:\/\/www.paloaltonetworks.com\/services\/education\/palo-alto-networks-certified-cybersecurity-entry-level-technician\" target=\"_blank\" rel=\"noopener noreferrer\">Palo Alto Networks Certified Cybersecurity Entry-Level Technician (PCCET)<\/a><\/li>\n<li><a href=\"https:\/\/www.paloaltonetworks.com\/services\/education\/palo-alto-networks-certified-network-security-administrator\" target=\"_blank\" rel=\"noopener noreferrer\">Palo Alto Networks Certified Network Security Administrator (PCNSA)<\/a><\/li>\n<li><a href=\"https:\/\/www.paloaltonetworks.com\/services\/education\/palo-alto-networks-certified-network-security-engineer\" target=\"_blank\" rel=\"noopener noreferrer\">Palo Alto Networks Certified Network Security Engineer (PCNSE)<\/a><\/li>\n<li><a href=\"http:\/\/www.pearsonvue.com\/paloaltonetworks\" target=\"_blank\" rel=\"noopener noreferrer\">Person VUE Exam Registration<\/a><\/li>\n<\/ul>\n<h5 style=\"text-decoration: underline;\">Modul 1 &#8211; Prisma Access Overview<\/h5>\n<ul>\n<li><a href=\"https:\/\/docs.paloaltonetworks.com\/prisma\/prisma-access\/prisma-access-panorama-admin\" target=\"_blank\" rel=\"noopener noreferrer\">Prisma Access Administrator\u2019s Guide (Panorama Managed)<\/a><\/li>\n<li><a href=\"https:\/\/docs.paloaltonetworks.com\/prisma\/prisma-access\/prisma-access-cloud-managed-admin\" target=\"_blank\" rel=\"noopener noreferrer\">Prisma Access (Cloud Management)<\/a><\/li>\n<li><a href=\"https:\/\/docs.paloaltonetworks.com\/common-services\/subscription-and-tenant-management\" target=\"_blank\" rel=\"noopener noreferrer\">Common Services: Subscription &amp; Tenant Management <\/a><\/li>\n<li><a href=\"https:\/\/knowledgebase.paloaltonetworks.com\/KCSArticleDetail?id=kA10g000000PP3wCAG\" target=\"_blank\" rel=\"noopener noreferrer\">Prisma Access Useful Resources<\/a><\/li>\n<li><a href=\"https:\/\/docs.paloaltonetworks.com\/prisma\/prisma-access\" target=\"_blank\" rel=\"noopener noreferrer\">Prisma Access<\/a><\/li>\n<li><a href=\"https:\/\/docs.paloaltonetworks.com\/sase\/prisma-sase-multitenant-platform\/release-updates\" target=\"_blank\" rel=\"noopener noreferrer\">Release Updates in Prisma SASE Platform <\/a><\/li>\n<li><a href=\"https:\/\/docs.paloaltonetworks.com\/prisma\/prisma-access\/prisma-access-panorama-admin\/prisma-access-overview\/prisma-access-licenses\" target=\"_blank\" rel=\"noopener noreferrer\">Prisma Access Licensing<\/a><\/li>\n<li><a href=\"https:\/\/docs.paloaltonetworks.com\/prisma\/prisma-access\/prisma-access-panorama-admin\/prepare-the-prisma-access-infrastructure\/list-of-prisma-access-locations\" target=\"_blank\" rel=\"noopener noreferrer\">Prisma Access Locations<\/a><\/li>\n<li><a href=\"https:\/\/apps.paloaltonetworks.com\/apps\" target=\"_blank\" rel=\"noopener noreferrer\">Discover, Access, and Manage Apps<\/a><\/li>\n<li><a href=\"https:\/\/live.paloaltonetworks.com\/t5\/prisma-access\/ct-p\/PrismaAccess\" target=\"_blank\" rel=\"noopener noreferrer\">Live Community &#8211; Prisma Access<\/a><\/li>\n<\/ul>\n<h5 style=\"text-decoration: underline;\">Modul 2 &#8211; Planning And Design<\/h5>\n<ul>\n<li><a href=\"https:\/\/docs.paloaltonetworks.com\/prisma\/prisma-access\/prisma-access-panorama-admin\/prepare-the-prisma-access-infrastructure\/prisma-access-service-infrastructure\" target=\"_blank\" rel=\"noopener noreferrer\">Prisma Access Service Infrastructure<\/a><\/li>\n<li><a href=\"https:\/\/docs.paloaltonetworks.com\/prisma\/prisma-access\/prisma-access-panorama-admin\/prepare-the-prisma-access-infrastructure\/prisma-access-service-infrastructure\/enable-the-service-infrastructure\" target=\"_blank\" rel=\"noopener noreferrer\">Configure the Service Infrastructure<\/a><\/li>\n<li><a href=\"https:\/\/docs.paloaltonetworks.com\/prisma\/prisma-access\/prisma-access-panorama-admin\/prepare-the-prisma-access-infrastructure\/service-connection-overview\/plan-the-service-connections\" target=\"_blank\" rel=\"noopener noreferrer\">Plan the Service Connections<\/a><\/li>\n<li><a href=\"https:\/\/docs.paloaltonetworks.com\/prisma\/prisma-access\/prisma-access-panorama-admin\/prepare-the-prisma-access-infrastructure\/service-connection-overview\/create-a-service-connection-to-enable-access-between-users-and-networks\" target=\"_blank\" rel=\"noopener noreferrer\">Create a Service Connection to Enable Access between Mobile Users and Remote Networks<\/a><\/li>\n<\/ul>\n<h5 style=\"text-decoration: underline;\">Modul 3 &#8211; Routing SD-WAN Design<\/h5>\n<ul>\n<li><a href=\"https:\/\/docs.paloaltonetworks.com\/prisma\/prisma-access\/prisma-access-panorama-admin\/prisma-access-advanced-deployments\/service-connection-advanced-deployments\/route-preferences-for-service-connection-traffic\" target=\"_blank\" rel=\"noopener noreferrer\">Routing for Service Connection Traffic<\/a><\/li>\n<li><a href=\"https:\/\/docs.paloaltonetworks.com\/prisma\/prisma-access\/prisma-access-panorama-admin\/prisma-access-advanced-deployments\/service-connection-advanced-deployments\/use-traffic-forwarding-rules-with-service-connections\" target=\"_blank\" rel=\"noopener noreferrer\">Use Traffic Steering to Forward Internet-Bound Traffic to Service Connections<\/a><\/li>\n<li><a href=\"https:\/\/docs.paloaltonetworks.com\/prisma\/prisma-access\/prisma-access-panorama-integration\/secure-sdwans-with-prisma-access\" target=\"_blank\" rel=\"noopener noreferrer\">Integrate Third-Party SD-WANs with Prisma Access<\/a><\/li>\n<\/ul>\n<h5 style=\"text-decoration: underline;\">Modul 4 &#8211; Activate and Configure<\/h5>\n<ul>\n<li><a href=\"https:\/\/docs.paloaltonetworks.com\/compatibility-matrix\/prisma-access\/prisma-access-and-panorama-version-compatibility\" target=\"_blank\" rel=\"noopener noreferrer\">Prisma Access and Panorama Version Compatibility<\/a><\/li>\n<li><a href=\"https:\/\/docs.paloaltonetworks.com\/prisma\/prisma-access\/prisma-access-panorama-admin\/prisma-access-for-networks\/use-predefined-ipsec-templates-to-onboard-service-and-network-connections\" target=\"_blank\" rel=\"noopener noreferrer\">Use Predefined IPSec Templates to Onboard Service and Remote Network Connections<\/a><\/li>\n<li><a href=\"https:\/\/docs.paloaltonetworks.com\/prisma\/prisma-access\/prisma-access-cloud-managed-admin\/prisma-access-service-connections\" target=\"_blank\" rel=\"noopener noreferrer\">Service Connections<\/a><\/li>\n<li><a href=\"https:\/\/docs.paloaltonetworks.com\/prisma\/prisma-access\/prisma-access-panorama-admin\/prisma-access-advanced-deployments\/service-connection-advanced-deployments\/create-a-high-bandwidth-network-using-multiple-service-connections\" target=\"_blank\" rel=\"noopener noreferrer\">Create a High-Bandwidth Network Using Multiple Service Connections<\/a><\/li>\n<\/ul>\n<h5 style=\"text-decoration: underline;\">Modul 5 &#8211; Security Processing Nodes<\/h5>\n<ul>\n<li><a href=\"https:\/\/docs.paloaltonetworks.com\/prisma\/prisma-access\/prisma-access-cloud-managed-admin\/create-prisma-access-policy\/best-practices\" target=\"_blank\" rel=\"noopener noreferrer\">Best Practice Checks<\/a><\/li>\n<li><a href=\"https:\/\/docs.paloaltonetworks.com\/prisma\/prisma-access\/prisma-access-cloud-managed-admin\/create-prisma-access-policy\" target=\"_blank\" rel=\"noopener noreferrer\">Prisma Access \u2014 Policy<\/a><\/li>\n<li><a href=\"https:\/\/live.paloaltonetworks.com\/t5\/prisma-access-webinars\/best-practices-for-ssl-decryption-with-prisma-access\/ta-p\/458667\" target=\"_blank\" rel=\"noopener noreferrer\">Best Practices for SSL Decryption with Prisma Access<\/a><\/li>\n<\/ul>\n<h5 style=\"text-decoration: underline;\">Modul 6 &#8211; Panorama Operations for Prisma Access<\/h5>\n<ul>\n<li><a href=\"https:\/\/docs.paloaltonetworks.com\/prisma\/prisma-access\/prisma-access-panorama-admin\/prepare-the-prisma-access-infrastructure\/get-started-with-prisma-access-overview\" target=\"_blank\" rel=\"noopener noreferrer\">Set Up Panorama Managed Prisma Access<\/a><\/li>\n<li><a href=\"https:\/\/docs.paloaltonetworks.com\/panorama\/10-1\/panorama-admin\/manage-firewalls\/manage-templates-and-template-stacks\/add-a-template\" target=\"_blank\" rel=\"noopener noreferrer\">Add a Template<\/a><\/li>\n<li><a href=\"https:\/\/docs.paloaltonetworks.com\/panorama\/10-1\/panorama-admin\/manage-firewalls\/manage-device-groups\/add-a-device-group\" target=\"_blank\" rel=\"noopener noreferrer\">Add a Device Group<\/a><\/li>\n<\/ul>\n<h5 style=\"text-decoration: underline;\">Modul 7 &#8211; Remote Networks<\/h5>\n<ul>\n<li><a href=\"https:\/\/docs.paloaltonetworks.com\/prisma\/prisma-access\/prisma-access-panorama-admin\/prisma-access-for-networks\/how-to-calculate-network-bandwidth\" target=\"_blank\" rel=\"noopener noreferrer\">How to Calculate Remote Network Bandwidth<\/a><\/li>\n<li><a href=\"https:\/\/docs.paloaltonetworks.com\/prisma\/prisma-sd-wan\/deployment-and-integrations\/2-1-1\/prisma-access-cloudblade-integration-guide\/prisma-access-for-networks-aggregate-bandwidth-licensing\" target=\"_blank\" rel=\"noopener noreferrer\">Prisma Access for Networks Aggregate Bandwidth Licensing<\/a><\/li>\n<li><a href=\"https:\/\/www.paloaltonetworks.com\/resources\/datasheets\/prisma-access-licensing-guide\" target=\"_blank\" rel=\"noopener noreferrer\">Prisma Access Licensing Guide<\/a><\/li>\n<li><a href=\"https:\/\/docs.paloaltonetworks.com\/prisma\/prisma-access\/prisma-access-panorama-admin\/prisma-access-overview\/prisma-access-licenses\" target=\"_blank\" rel=\"noopener noreferrer\">Prisma Access Licensing<\/a><\/li>\n<li><a href=\"https:\/\/docs.paloaltonetworks.com\/prisma\/prisma-access\/prisma-access-cloud-managed-admin\/prisma-access-service-infrastructure\/dns\" target=\"_blank\" rel=\"noopener noreferrer\">DNS and Prisma Access<\/a><\/li>\n<li><a href=\"https:\/\/docs.paloaltonetworks.com\/prisma\/prisma-access\/prisma-access-panorama-admin\/prisma-access-advanced-deployments\/advanced-deployments-that-apply-to-all-prisma-access-types\/dns-resolution-for-mobile-users-and-remote-networks\" target=\"_blank\" rel=\"noopener noreferrer\">DNS Resolution for Mobile Users\u2014GlobalProtect and Remote Network Deployments<\/a><\/li>\n<li><a href=\"https:\/\/docs.paloaltonetworks.com\/prisma\/prisma-access\/prisma-access-panorama-admin\/configure-quality-of-service-in-prisma-access\" target=\"_blank\" rel=\"noopener noreferrer\">Quality of Service in Prisma Access<\/a><\/li>\n<li><a href=\"https:\/\/docs.paloaltonetworks.com\/prisma\/prisma-access\/prisma-access-panorama-admin\/prisma-access-for-networks\/network-locations-with-overlapping-subnets\" target=\"_blank\" rel=\"noopener noreferrer\">Remote Network Locations with Overlapping Subnets<\/a><\/li>\n<\/ul>\n<h5 style=\"text-decoration: underline;\">Modul 8 &#8211; Mobile Users<\/h5>\n<ul>\n<li><a href=\"https:\/\/docs.paloaltonetworks.com\/prisma\/prisma-access\/prisma-access-cloud-managed-admin\/secure-mobile-users-with-prisma-access\" target=\"_blank\" rel=\"noopener noreferrer\">Mobile Users<\/a><\/li>\n<li><a href=\"https:\/\/docs.paloaltonetworks.com\/prisma\/prisma-access\/prisma-access-panorama-admin\/prisma-access-advanced-deployments\/advanced-deployments-that-apply-to-all-prisma-access-types\/ipv6-support-for-private-app-access\" target=\"_blank\" rel=\"noopener noreferrer\">IPv6 Support for Private App Access<\/a><\/li>\n<li><a href=\"https:\/\/docs.paloaltonetworks.com\/globalprotect\" target=\"_blank\" rel=\"noopener noreferrer\">GlobalProtect<\/a><\/li>\n<li><a href=\"https:\/\/docs.paloaltonetworks.com\/cloud-identity\" target=\"_blank\" rel=\"noopener noreferrer\">Cloud Identity<\/a><\/li>\n<\/ul>\n<h5 style=\"text-decoration: underline;\">Modul 9 &#8211; Cloud SWG<\/h5>\n<ul>\n<li><a href=\"https:\/\/www.paloaltonetworks.com\/sase\/secure-web-gateway\" target=\"_blank\" rel=\"noopener noreferrer\">Cloud Secure Web Gateway<\/a><\/li>\n<li><a href=\"https:\/\/www.paloaltonetworks.com\/resources\/infographics\/prisma-access-cloud-swg\" target=\"_blank\" rel=\"noopener noreferrer\">A Comparison: Cloud Secure Web Gateway (SWG) in Prisma Access vs. web proxy appliances<\/a><\/li>\n<li><a href=\"https:\/\/docs.paloaltonetworks.com\/prisma\/prisma-access\/prisma-access-cloud-managed-admin\/secure-mobile-users-with-prisma-access\/explicit-proxy\/explicit-proxy-how-it-works\" target=\"_blank\" rel=\"noopener noreferrer\">Explicit Proxy \u2014 How It Works<\/a><\/li>\n<li><a href=\"https:\/\/docs.paloaltonetworks.com\/prisma\/prisma-access\/prisma-access-panorama-admin\/prisma-access-for-users\/explicit-proxy-prisma-access\/how-explicit-proxy-identifies-users\" target=\"_blank\" rel=\"noopener noreferrer\">How Explicit Proxy Identifies Users<\/a><\/li>\n<li><a href=\"https:\/\/docs.paloaltonetworks.com\/prisma\/prisma-access\/prisma-access-panorama-admin\/prisma-access-for-users\/explicit-proxy-prisma-access\" target=\"_blank\" rel=\"noopener noreferrer\">Explicit Proxy on Prisma Access<\/a><\/li>\n<\/ul>\n<h5 style=\"text-decoration: underline;\">Modul 10 &#8211; Tune Optimize Troubleshoot<\/h5>\n<ul>\n<li><a href=\"https:\/\/sase.status.paloaltonetworks.com\/\" target=\"_blank\" rel=\"noopener noreferrer\">SASE Status<\/a><\/li>\n<li><a href=\"https:\/\/apps.paloaltonetworks.com\/apps\" target=\"_blank\" rel=\"noopener noreferrer\">Discover, Access, and Manage Apps<\/a><\/li>\n<li><a href=\"https:\/\/docs.paloaltonetworks.com\/cloud-identity\/cloud-identity-engine-getting-started\/get-started-with-the-cloud-identity-engine\/learn-about-the-cloud-identity-engine\" target=\"_blank\" rel=\"noopener noreferrer\">Learn About the Cloud Identity Engine<\/a><\/li>\n<li><a href=\"https:\/\/docs.paloaltonetworks.com\/prisma\/prisma-access\/prisma-access-panorama-admin\/prisma-access-overview\/retrieve-ip-addresses-for-prisma-access\" target=\"_blank\" rel=\"noopener noreferrer\">Retrieve the IP Addresses for Prisma Access<\/a><\/li>\n<\/ul>\n<h5 style=\"text-decoration: underline;\">Modul 11 &#8211; Manage Multiple Tenants<\/h5>\n<ul>\n<li><a href=\"https:\/\/docs.paloaltonetworks.com\/prisma\/prisma-access\/prisma-access-panorama-admin\/manage-multiple-tenants-in-prisma-access\/plan-your-multitenant-deployment\" target=\"_blank\" rel=\"noopener noreferrer\">Plan Your Multitenant Deployment<\/a><\/li>\n<li><a href=\"https:\/\/knowledgebase.paloaltonetworks.com\/KCSArticleDetail?id=kA14u0000001VqOCAU\" target=\"_blank\" rel=\"noopener noreferrer\">How to configure role based management access for more than 1 sub-tenants from panorama for Prisma access multi-tenant environment<\/a><\/li>\n<\/ul>\n<h5 style=\"text-decoration: underline;\">Modul 12 &#8211; Prisma Access Insights<\/h5>\n<ul>\n<li><a href=\"https:\/\/docs.paloaltonetworks.com\/prisma\/prisma-access\/prisma-access-insights\/insights\" target=\"_blank\" rel=\"noopener noreferrer\">Insights in Prisma Access<\/a><\/li>\n<li><a href=\"https:\/\/docs.paloaltonetworks.com\/prisma\/prisma-access\/prisma-access-insights\/insights\/remote-networks-dashboard\" target=\"_blank\" rel=\"noopener noreferrer\">Monitor Your Remote Networks<\/a><\/li>\n<li><a href=\"https:\/\/docs.paloaltonetworks.com\/prisma\/prisma-access\/prisma-access-insights\/insights\/mobile-users-dashboard\" target=\"_blank\" rel=\"noopener noreferrer\">Manage Mobile Users<\/a><\/li>\n<\/ul>\n<h5 style=\"text-decoration: underline;\">Modul 13 &#8211; Prisma Access Autonomous Digital Experience Management (ADEM)<\/h5>\n<ul>\n<li><a href=\"https:\/\/www.paloaltonetworks.com\/sase\/adem\" target=\"_blank\" rel=\"noopener noreferrer\">Autonomous Digital Experience Management<\/a><\/li>\n<li><a href=\"https:\/\/knowledgebase.paloaltonetworks.com\/KCSArticleDetail?id=kA14u000000CpsiCAC\" target=\"_blank\" rel=\"noopener noreferrer\">ADEM version bundled with GP version<\/a><\/li>\n<li><a href=\"https:\/\/knowledgebase.paloaltonetworks.com\/KCSArticleDetail?id=kA14u0000004M02CAE\" target=\"_blank\" rel=\"noopener noreferrer\">DEM Agent unable to connect to DEM Portal to send device health metrics<\/a><\/li>\n<li><a href=\"https:\/\/www.youtube.com\/watch?v=GIXkEVdJlZo\" target=\"_blank\" rel=\"noopener noreferrer\">Prisma Access and Autonomous Digital Experience Management<\/a><\/li>\n<li><a href=\"https:\/\/docs.paloaltonetworks.com\/autonomous-dem\/autonomous-dem-admin\/autonomous-dem\" target=\"_blank\" rel=\"noopener noreferrer\">Autonomous DEM Administrator&#8217;s Guide<\/a><\/li>\n<\/ul>\n<\/div>\n<hr style=\"border: 5px solid black; border-radius: 5px;\" \/>\n<h2><a name=\"edu380\"><\/a>Course PA EDU-380<\/h2>\n<p><em>Here you will find all Reference Links for the EDU-380 Course (Based on the course material and my own references)<\/em><\/p>\n<div style=\"background-color: #ebebeb;\">\n<h5 style=\"text-decoration: underline;\">Additional Links<\/h5>\n<li><a href=\"https:\/\/live.paloaltonetworks.com\/t5\/cortex-xsoar-how-to-videos\/cortex-xsoar-how-to-customer-success-engineering-training-video\/ta-p\/484604\" target=\"_blank\" rel=\"noopener noreferrer\">Cortex XSOAR How-to: Customer Success Engineering Training Video Series<\/a><\/li>\n<li><a href=\"https:\/\/xsoar.pan.dev\/docs\/reference\/packs\/Shift_management\" target=\"_blank\" rel=\"noopener noreferrer\">Security Considerations for PowerShell Remoting using WinRM<\/a><\/li>\n<\/ul>\n<p><strong>Windows Forensic Pack<\/strong><\/p>\n<ul>\n<li><a href=\"https:\/\/xsoar.pan.dev\/docs\/reference\/packs\/Windows_Forensics#before-you-start\" target=\"_blank\" rel=\"noopener noreferrer\">Windows Forensic<\/a><\/li>\n<li><a href=\"https:\/\/xsoar.pan.dev\/docs\/reference\/articles\/Powershell_Remoting_-_Configuration#before-you-start\" target=\"_blank\" rel=\"noopener noreferrer\">Powershell Remoting &#8211; Configuration<\/a><\/li>\n<li><a href=\"https:\/\/learn.microsoft.com\/en-us\/powershell\/scripting\/learn\/remoting\/winrmsecurity?view=powershell-7.2&#038;viewFallbackFrom=powershell-7.1\" target=\"_blank\" rel=\"noopener noreferrer\">Shift Management<\/a><\/li>\n<li><a href=\"https:\/\/beacon.paloaltonetworks.com\/student\/path\/666206-cortex-xsoar\" target=\"_blank\" rel=\"noopener noreferrer\">Online Training XSOAR 6.x (Beacon)<\/a><\/li>\n<\/ul>\n<h5 style=\"text-decoration: underline;\">Modul 0 &#8211; Introductions<\/h5>\n<ul>\n<li><a href=\"https:\/\/beacon.paloaltonetworks.com\" target=\"_blank\" rel=\"noopener noreferrer\">Prepare Certification Exam, Online Training Courses and more<\/a><\/li>\n<li><a href=\"https:\/\/www.youtube.com\/@paloaltonetworks\/featured\" target=\"_blank\" rel=\"noopener noreferrer\">PaloAlto Networks &#8211; You Tube Channel<\/a><\/li>\n<li><a href=\"https:\/\/www.paloaltonetworks.com\/services\/education\" target=\"_blank\" rel=\"noopener noreferrer\">Education Services<\/a><\/li>\n<li><a href=\"https:\/\/live.paloaltonetworks.com\/t5\/certification\/ct-p\/Certification\" target=\"_blank\" rel=\"noopener noreferrer\">Palo Alto Networks Live &#8211; Certification<\/a><\/li>\n<li><a href=\"https:\/\/www.paloaltonetworks.com\/services\/education\/palo-alto-networks-certified-cybersecurity-entry-level-technician\" target=\"_blank\" rel=\"noopener noreferrer\">Palo Alto Networks Certified Cybersecurity Entry-Level Technician (PCCET)<\/a><\/li>\n<li><a href=\"https:\/\/www.paloaltonetworks.com\/services\/education\/palo-alto-networks-certified-network-security-administrator\" target=\"_blank\" rel=\"noopener noreferrer\">Palo Alto Networks Certified Network Security Administrator (PCNSA)<\/a><\/li>\n<li><a href=\"https:\/\/www.paloaltonetworks.com\/services\/education\/palo-alto-networks-certified-network-security-engineer\" target=\"_blank\" rel=\"noopener noreferrer\">Palo Alto Networks Certified Network Security Engineer (PCNSE)<\/a><\/li>\n<li><a href=\"http:\/\/www.pearsonvue.com\/paloaltonetworks\" target=\"_blank\" rel=\"noopener noreferrer\">Person VUE Exam Registration<\/a><\/li>\n<\/ul>\n<h5 style=\"text-decoration: underline;\">Modul 10 &#8211; Threat Intel Management<\/h5>\n<ul>\n<li><a href=\"https:\/\/docs-cortex.paloaltonetworks.com\/r\/Cortex-XSOAR\/6.8\/Cortex-XSOAR-Threat-Intel-Management-Guide\/Threat-Intel-Reports-Overview\" target=\"_blank\" rel=\"noopener noreferrer\">Threat Intel Reports Overview<\/a><\/li>\n<li><a href=\"https:\/\/docs-cortex.paloaltonetworks.com\/r\/Cortex-XSOAR\/6.8\/Cortex-XSOAR-Threat-Intel-Management-Guide\/Sample-Analysis\" target=\"_blank\" rel=\"noopener noreferrer\">Sample Analysis<\/a><\/li>\n<li><a href=\"https:\/\/docs-cortex.paloaltonetworks.com\/r\/Cortex-XSOAR\/6.8\/Cortex-XSOAR-Threat-Intel-Management-Guide\/Sessions-and-Submissions\" target=\"_blank\" rel=\"noopener noreferrer\">Sessions and Submissions<\/a><\/li>\n<\/ul>\n<\/div>\n<hr style=\"border: 5px solid black; border-radius: 5px;\" \/>\n<h2><a name=\"edu260\"><\/a>Course PA EDU-260<\/h2>\n<p><em>Here you will find all Reference Links for the EDU-260 Course (Based on the course material and my own references)<\/em><\/p>\n<div style=\"background-color: #ebebeb;\">\n<h5 style=\"text-decoration: underline;\">Modul 0 &#8211; Introductions<\/h5>\n<ul>\n<li><a href=\"https:\/\/beacon.paloaltonetworks.com\" target=\"_blank\" rel=\"noopener noreferrer\">Prepare Certification Exam, Online Training Courses and more<\/a><\/li>\n<li><a href=\"https:\/\/www.youtube.com\/@paloaltonetworks\/featured\" target=\"_blank\" rel=\"noopener noreferrer\">PaloAlto Networks &#8211; You Tube Channel<\/a><\/li>\n<li><a href=\"https:\/\/www.paloaltonetworks.com\/services\/education\" target=\"_blank\" rel=\"noopener noreferrer\">Education Services<\/a><\/li>\n<li><a href=\"https:\/\/live.paloaltonetworks.com\/t5\/certification\/ct-p\/Certification\" target=\"_blank\" rel=\"noopener noreferrer\">Palo Alto Networks Live &#8211; Certification<\/a><\/li>\n<li><a href=\"https:\/\/www.paloaltonetworks.com\/services\/education\/palo-alto-networks-certified-cybersecurity-entry-level-technician\" target=\"_blank\" rel=\"noopener noreferrer\">Palo Alto Networks Certified Cybersecurity Entry-Level Technician (PCCET)<\/a><\/li>\n<li><a href=\"https:\/\/www.paloaltonetworks.com\/services\/education\/palo-alto-networks-certified-network-security-administrator\" target=\"_blank\" rel=\"noopener noreferrer\">Palo Alto Networks Certified Network Security Administrator (PCNSA)<\/a><\/li>\n<li><a href=\"https:\/\/www.paloaltonetworks.com\/services\/education\/palo-alto-networks-certified-network-security-engineer\" target=\"_blank\" rel=\"noopener noreferrer\">Palo Alto Networks Certified Network Security Engineer (PCNSE)<\/a><\/li>\n<li><a href=\"http:\/\/www.pearsonvue.com\/paloaltonetworks\" target=\"_blank\" rel=\"noopener noreferrer\">Person VUE Exam Registration<\/a><\/li>\n<\/ul>\n<\/div>\n<h5 style=\"text-decoration: underline;\">Modul 1 &#8211; Cortex XDR Overview<\/h5>\n<ul>\n<li><a href=\"https:\/\/docs.paloaltonetworks.com\/cortex\/cortex-xdr\/cortex-xdr-prevent-admin\/cortex-xdr-prevent-overview\/about-cortex-xdr-protection.html\" target=\"_blank\" rel=\"noopener noreferrer\">Cortex\u00ae XDR\u2122 versus Traditional Endpoint Protection<\/a><\/li>\n<li><a href=\"https:\/\/cortex-panw.stoplight.io\/docs\/cortex-xdr\/axpm6b98x4p18-cortex-xdr-api-overview\" target=\"_blank\" rel=\"noopener noreferrer\">Cortex XDR API Overview<\/a><\/li>\n<li><a href=\"https:\/\/madret.github.io\/xql-qenerator\/\" target=\"_blank\" rel=\"noopener noreferrer\">XQL Generator<\/a><\/li>\n<li><a href=\"https:\/\/start.paloaltonetworks.de\/xdr-for-dummies.html?utm_source=google-jg-emea-cortex&#038;utm_medium=paid_search&#038;utm_term=xdr&#038;utm_campaign=google-cortex-edpxdr-emea-de-lead_gen-de-brand&#038;utm_content=gs-18796852531-142627027389-632484320041&#038;sfdcid=7014u000001hAkOAAU&#038;gclid=EAIaIQobChMItcvegeb7_QIVCuJ3Ch2rSwOtEAAYASAAEgLWCPD_BwE\" target=\"_blank\" rel=\"noopener noreferrer\">XDR for Dummies<\/a><\/li>\n<li><a href=\"https:\/\/docs-cortex.paloaltonetworks.com\/r\/Cortex-XDR\/Cortex-XDR-Pro-Administrator-Guide\/Licenses\" target=\"_blank\" rel=\"noopener noreferrer\">Features by License Type<\/a><\/li>\n<li><a href=\"\" target=\"_blank\" rel=\"noopener noreferrer\"><\/a><\/li>\n<li><a href=\"\" target=\"_blank\" rel=\"noopener noreferrer\"><\/a><\/li>\n<li><a href=\"\" target=\"_blank\" rel=\"noopener noreferrer\"><\/a><\/li>\n<li><a href=\"\" target=\"_blank\" rel=\"noopener noreferrer\"><\/a><\/li>\n<li><a href=\"\" target=\"_blank\" rel=\"noopener noreferrer\"><\/a><\/li>\n<li><a href=\"\" target=\"_blank\" rel=\"noopener noreferrer\"><\/a><\/li>\n<li><a href=\"\" target=\"_blank\" rel=\"noopener noreferrer\"><\/a><\/li>\n<li><a href=\"\" target=\"_blank\" rel=\"noopener noreferrer\"><\/a><\/li>\n<\/ul>\n<h5 style=\"text-decoration: underline;\">Modul 2 &#8211; Cortex XDR Main Components<\/h5>\n<ul>\n<li><a href=\"\" target=\"_blank\" rel=\"noopener noreferrer\"><\/a><\/li>\n<li><a href=\"\" target=\"_blank\" rel=\"noopener noreferrer\"><\/a><\/li>\n<li><a href=\"\" target=\"_blank\" rel=\"noopener noreferrer\"><\/a><\/li>\n<li><a href=\"\" target=\"_blank\" rel=\"noopener noreferrer\"><\/a><\/li>\n<li><a href=\"\" target=\"_blank\" rel=\"noopener noreferrer\"><\/a><\/li>\n<li><a href=\"\" target=\"_blank\" rel=\"noopener noreferrer\"><\/a><\/li>\n<li><a href=\"\" target=\"_blank\" rel=\"noopener noreferrer\"><\/a><\/li>\n<li><a href=\"\" target=\"_blank\" rel=\"noopener noreferrer\"><\/a><\/li>\n<li><a href=\"\" target=\"_blank\" rel=\"noopener noreferrer\"><\/a><\/li>\n<li><a href=\"\" target=\"_blank\" rel=\"noopener noreferrer\"><\/a><\/li>\n<\/ul>\n<hr style=\"border: 5px solid black; border-radius: 5px;\" \/>\n<h2><a name=\"edu262\"><\/a>Course PA EDU-262<\/h2>\n<p><em>Here you will find all Reference Links for the EDU-262 Course (Based on the course material and my own references)<\/em><\/p>\n<div style=\"background-color: #ebebeb;\">\n<h5 style=\"text-decoration: underline;\">Modul 0 &#8211; Introductions<\/h5>\n<ul>\n<li><a href=\"https:\/\/beacon.paloaltonetworks.com\" target=\"_blank\" rel=\"noopener noreferrer\">Prepare Certification Exam, Online Training Courses and more<\/a><\/li>\n<li><a href=\"https:\/\/www.youtube.com\/@paloaltonetworks\/featured\" target=\"_blank\" rel=\"noopener noreferrer\">PaloAlto Networks &#8211; You Tube Channel<\/a><\/li>\n<li><a href=\"https:\/\/www.paloaltonetworks.com\/services\/education\" target=\"_blank\" rel=\"noopener noreferrer\">Education Services<\/a><\/li>\n<li><a href=\"https:\/\/live.paloaltonetworks.com\/t5\/certification\/ct-p\/Certification\" target=\"_blank\" rel=\"noopener noreferrer\">Palo Alto Networks Live &#8211; Certification<\/a><\/li>\n<li><a href=\"https:\/\/www.paloaltonetworks.com\/services\/education\/palo-alto-networks-certified-cybersecurity-entry-level-technician\" target=\"_blank\" rel=\"noopener noreferrer\">Palo Alto Networks Certified Cybersecurity Entry-Level Technician (PCCET)<\/a><\/li>\n<li><a href=\"https:\/\/www.paloaltonetworks.com\/services\/education\/palo-alto-networks-certified-network-security-administrator\" target=\"_blank\" rel=\"noopener noreferrer\">Palo Alto Networks Certified Network Security Administrator (PCNSA)<\/a><\/li>\n<li><a href=\"https:\/\/www.paloaltonetworks.com\/services\/education\/palo-alto-networks-certified-network-security-engineer\" target=\"_blank\" rel=\"noopener noreferrer\">Palo Alto Networks Certified Network Security Engineer (PCNSE)<\/a><\/li>\n<li><a href=\"http:\/\/www.pearsonvue.com\/paloaltonetworks\" target=\"_blank\" rel=\"noopener noreferrer\">Person VUE Exam Registration<\/a><\/li>\n<\/ul>\n<\/div>\n<hr style=\"border: 5px solid black; border-radius: 5px;\" \/>\n","protected":false},"excerpt":{"rendered":"<p>Course Overview PA EDU-210 (Essentials: Configuration and Management) PA EDU-220 (Panorama Managing Firewalls at Scale) PA EDU-330 (Firewall Troubleshooting) PA EDU-238 (Prisma SD-WAN) PA EDU-318 (Prisma Access SASE Security) PA EDU-380 (Cortex XSOAR: Automation and Orchestration) PA EDU-260 (Cortex XDR 2: Prevention, Analysis, and Response) PA EDU-262 (Cortex XDR: Investigation and Response) Additional URLs Develop [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"footnotes":""},"class_list":["post-53","page","type-page","status-publish","hentry"],"_links":{"self":[{"href":"https:\/\/blog.helge-meyer.de\/index.php?rest_route=\/wp\/v2\/pages\/53","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/blog.helge-meyer.de\/index.php?rest_route=\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/blog.helge-meyer.de\/index.php?rest_route=\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/blog.helge-meyer.de\/index.php?rest_route=\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/blog.helge-meyer.de\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=53"}],"version-history":[{"count":132,"href":"https:\/\/blog.helge-meyer.de\/index.php?rest_route=\/wp\/v2\/pages\/53\/revisions"}],"predecessor-version":[{"id":608,"href":"https:\/\/blog.helge-meyer.de\/index.php?rest_route=\/wp\/v2\/pages\/53\/revisions\/608"}],"wp:attachment":[{"href":"https:\/\/blog.helge-meyer.de\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=53"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}