1 – Introduction
2 – Security Profile Revision
3 – Daily Operations and Maintenance
4 – Establish Initial Baseline Visibility
5 – Analyze and Update Security Rules Passing Traffic
6 – Inbound Security Rules Best Practices and Analysis
7 - Outbound Security Rules Best Practices and Analysis
8 - Internal Security Rules Best Practices and Analysis
9 – Administratively Hardening PAN-OS
10 – Reducing Policy set and Simplification