When managing a network secured by Palo Alto Networks, choosing the correct software version for your devices is critical for...
Distributed Denial-of-Service (DDoS) attacks are indeed a prevalent type of cyberattack. In a DDoS attack, the attacker overloads a network,...
If you’re doing SSL Offloading, you may run across sites that don’t behave well when HTTP/2 Inspection is enabled. You...
If you are trying to upgrade your Palo Alto GlobalProtect APP and notice it’s not getting upgraded, a good place...
DNS name servers are usually split into two categories:...
Below are a couple of timeouts but Login Lifetime will disconnect your end users no matter what. If it’s set...
Here’s a step-by-step breakdown of the data flow: DNS Resolution: The user enters “https://cordero.me” into their browser’s address bar. The...
In today’s rapidly evolving technological landscape, staying up-to-date of application and security updates is not just beneficial—it’s critical for avoiding...
There might be times where you need to import an Intermediate CA because the FW is restricting access to a...