PAN-OS Subscriptions: Overview & Licensing

Palo Alto Networks Next-Generation Firewalls (NGFWs) are powerful security platforms, but their full potential is unlocked through various cloud-delivered security subscriptions. These subscriptions provide dynamic updates, advanced threat intelligence, and specialized security services to protect against an ever-evolving threat landscape.

The Role of Subscriptions

Subscriptions transform the NGFW from a stateful firewall into a comprehensive security enforcement point. They enable features like:

  • Protection against known and unknown malware, exploits, and phishing attacks.
  • Granular control over web and application usage.
  • Secure remote access for users.
  • Visibility and control over IoT devices and SaaS applications.
  • Data loss prevention.
  • Proactive operational insights.

Most subscriptions are licensed on a per-firewall basis and require regular updates from the Palo Alto Networks cloud to maintain efficacy. These updates include new threat signatures, URL categorizations, application identifications, and more.

PCNSE/PCNSA Exam Note: Understanding which subscription enables which specific security feature is crucial for the exam. For example, knowing that Threat Prevention provides IPS and Antivirus, while WildFire handles zero-day malware.

Licensing and Activation

Subscription licenses are typically purchased for a specific term (e.g., 1, 3, or 5 years). Once purchased, they need to be activated and associated with a specific firewall device or, in some cases, a Panorama instance or cloud service account.

  • Activation: Licenses are activated through the Palo Alto Networks Customer Support Portal (CSP). An auth code is usually provided, which is then used to register the license to a device serial number.
  • Retrieval on Firewall: After activation in the CSP, the firewall must retrieve the license from the licensing server. This can be done via Device > Licenses > Retrieve license keys from license server . Internet connectivity is required for this process.
  • Dynamic Updates: Once licensed, the firewall needs to be configured to download and install dynamic content updates for active subscriptions. This is managed under Device > Dynamic Updates . Scheduling regular checks for updates is a best practice.
  • Grace Periods: Some subscriptions might offer a grace period after expiration, but relying on this is not recommended. Functionality will be significantly impacted or cease once a license truly expires.
Gotcha! A common issue is forgetting to retrieve licenses on the firewall after activating them in the CSP, or firewall rules blocking access to Palo Alto Networks update servers. Ensure the firewall has DNS resolution and can reach updates.paloaltonetworks.com and other relevant services.

Subscription Dependencies

Some subscriptions have dependencies on others. For example, DNS Security requires an active Threat Prevention license. Understanding these dependencies is important for proper deployment and functionality.

Key interdependencies and management points for PAN-OS subscriptions. Note that basic WildFire functionality is included with Threat Prevention, but a full WildFire subscription offers enhanced features.

Key interdependencies and management points for PAN-OS subscriptions. Note that basic WildFire functionality is included with Threat Prevention, but a full WildFire subscription offers enhanced features.

Core Security Service: Threat Prevention

The Threat Prevention subscription is foundational for protecting against a wide range of known threats. It bundles several key security engines and capabilities.

Key Features

  • Intrusion Prevention System (IPS): Detects and blocks network-based exploits targeting system vulnerabilities. It uses regularly updated signatures to identify malicious traffic patterns.
  • Anti-Virus (AV): Scans traffic for known viruses, worms, trojans, and other malware. Signatures are updated frequently to cover new threats.
  • Anti-Spyware: Detects and blocks spyware installations and Command-and-Control (C2) communications from already compromised hosts. This includes blocking connections to known malicious C2 servers.
  • Vulnerability Protection: Applies profiles to protect against known software vulnerabilities that might be exploited.
  • Built-in External Dynamic Lists (EDLs): Provides access to Palo Alto Networks-maintained EDLs of malicious IP addresses and domains that can be used in security policies.
  • Basic WildFire Access: Allows forwarding of a limited set of unknown file types to the WildFire cloud for analysis, with standard verdict times (not the 5-minute SLA of the full WildFire subscription). It also provides access to WildFire signatures generated from samples submitted by any WildFire user globally.
  • DNS Sinkhole: Can be configured to redirect DNS queries for known malicious domains to an internal "sinkhole" IP, helping identify infected hosts.
PCNSE/PCNSA Exam Note: Threat Prevention is a prerequisite for several other subscriptions, including DNS Security and the full WildFire subscription. Understand that while it includes basic WildFire features, the full WildFire license offers significant advantages.

How it Works

Threat Prevention profiles (Antivirus, Anti-Spyware, Vulnerability Protection) are attached to Security Policy rules. When traffic matches a rule with an associated Threat Prevention profile, the traffic is inspected against the signatures defined in that profile. Actions like alert, block, reset, or sinkhole can be configured based on threat severity or specific signature triggers.

Gotcha! Simply having a Threat Prevention license is not enough. You must create and apply Threat Prevention profiles to relevant Security Policy rules for inspection to occur. Also, ensure dynamic content updates for "Antivirus" and "Applications and Threats" are downloaded and installed regularly.

Core Security Service: WildFire & Advanced WildFire

WildFire is Palo Alto Networks' cloud-based malware analysis service, designed to detect and prevent unknown, zero-day malware and exploits. Advanced WildFire builds upon this with even more sophisticated detection capabilities.

WildFire Subscription

  • Protection Against Unknown Threats: Analyzes unknown files and email links submitted by firewalls (and other Palo Alto Networks products) in a secure cloud sandbox environment.
  • Analysis Techniques: Uses static analysis, dynamic analysis (executing files in a virtual environment), machine learning, and bare metal analysis to identify malicious behavior.
  • Fast Verdict Times: With a full WildFire subscription, verdicts for newly discovered malware are typically available globally within 5 minutes (this is a key differentiator from the basic WildFire included with Threat Prevention).
  • Expanded File Type Support: Supports forwarding of a wider range of file types for analysis, including executables (PE, Mach-O, ELF), APKs, PDFs, Microsoft Office documents, Java Applets, and more.
  • API Access: Allows programmatic submission of files and queries for verdicts.
  • WF-500 Appliance Support: A WildFire subscription is required if forwarding files to an on-premise WF-500 appliance for local analysis (though cloud analysis is generally preferred for broader threat intelligence).
  • Prerequisite: Requires an active Threat Prevention license.
PCNSE/PCNSA Exam Note: The 5-minute signature update SLA for new malware is a hallmark of the full WildFire subscription. Understand the flow: file submitted -> cloud analysis -> signature generated -> signature distributed to all subscribed firewalls.

Advanced WildFire Subscription

Advanced WildFire enhances the standard WildFire service with additional, more deeply integrated analysis capabilities, particularly targeting evasive malware.

  • Intelligent Run-time Memory Analysis: This cloud-based engine complements existing sandboxing by deeply inspecting the memory of a running process. It's designed to detect highly evasive malware that might employ techniques to evade traditional sandbox detection (e.g., sleep timers, environment checks, fileless malware).
  • Deeper Visibility: Provides more profound insights into malware behavior during its execution lifecycle.
  • Focus on Evasion: Specifically targets threats that attempt to hide their malicious activity until they are in memory or under specific run-time conditions.
  • Builds on WildFire: Requires a standard WildFire subscription as a prerequisite.
Gotcha! Advanced WildFire is not a replacement for WildFire; it's an add-on. You need both subscriptions for its full capabilities. The key benefit is enhanced detection of *evasive* malware.

WildFire Analysis Process

Simplified WildFire and Advanced WildFire analysis process. The firewall forwards unknown files, WildFire cloud analyzes them, and if malicious, generates signatures distributed globally.

Simplified WildFire and Advanced WildFire analysis process. The firewall forwards unknown files, WildFire cloud analyzes them, and if malicious, generates signatures distributed globally.

Core Security Service: Advanced URL Filtering

Advanced URL Filtering (AUR) provides robust control over web access, leveraging the cloud-based PAN-DB for categorization and inline machine learning for real-time detection of unknown malicious sites.

Key Features

  • Comprehensive URL Categorization: Uses PAN-DB, a globally distributed URL database, to categorize websites into numerous categories (e.g., Social Networking, Streaming Media, Malware, Phishing, Adult). Policies can then be set based on these categories.
  • Inline Machine Learning (ML): A key differentiator. AUR uses ML directly on the firewall (for some models) and in conjunction with cloud queries to detect and block new malicious and phishing websites in real-time, even if they are not yet in the PAN-DB. This is crucial for zero-day web threats.
  • Credential Phishing Prevention: Allows administrators to control where users can submit corporate credentials. It can block submissions to untrusted or unverified sites, or specific URL categories. It supports User-ID integration to identify users and their legitimate corporate domains.
  • HTTP Header Insertion: Can insert custom HTTP headers for traffic going to specific URL categories, useful for integration with downstream security or monitoring tools.
  • Safe Search Enforcement: Can enforce safe search settings for major search engines.
  • Supersedes Legacy URL Filtering: Advanced URL Filtering is the current offering and includes all features of the older "URL Filtering (PAN-DB)" subscription, plus the advanced ML capabilities.
PCNSE/PCNSA Exam Note: The inline ML capability for detecting *unknown* malicious URLs in real-time is a critical feature of Advanced URL Filtering. Also, understand its role in preventing credential theft by controlling where users submit corporate credentials.

How it Works

URL Filtering profiles are attached to Security Policy rules. When a user attempts to access a URL:

  1. The firewall first checks its local cache for the URL's category.
  2. If not cached, it queries the PAN-DB cloud service.
  3. If the URL is uncategorized or potentially suspicious, the inline ML engine analyzes the web page content and other indicators in real time.
  4. Based on the determined category and the configured policy (allow, alert, block, continue, override), access is managed.
  5. For credential phishing prevention, the firewall inspects POST requests containing usernames/passwords and checks the destination against allowed categories/domains.
Decision flow for Advanced URL Filtering, highlighting the interplay of local cache, PAN-DB cloud, and inline Machine Learning.

Decision flow for Advanced URL Filtering, highlighting the interplay of local cache, PAN-DB cloud, and inline Machine Learning.

Gotcha! For credential phishing prevention to be effective, User-ID must be configured to identify users and their domains, and SSL/TLS decryption must be enabled for HTTPS sites. Without decryption, the firewall cannot see the submitted credentials within encrypted traffic.

Core Security Service: DNS Security

The DNS Security subscription leverages cloud-based analytics and threat intelligence to protect against threats using the Domain Name System (DNS) for infrastructure, such as C2, malware distribution, and phishing.

Key Features

  • Malicious Domain Blocking: Identifies and blocks DNS requests to known malicious domains using a continuously updated cloud-delivered database. This database is powered by predictive analytics, machine learning, and extensive threat research.
  • DNS Sinkholing: Allows redirection of DNS requests for malicious or undesirable domains to a specified sinkhole IP address. This helps identify infected hosts on the internal network attempting to contact these domains.
  • Protection Against Advanced Threats: Effective against various attack vectors including:
    • Command and Control (C2) callbacks
    • Malware and ransomware distribution sites
    • Phishing sites
    • Domains generated by Domain Generation Algorithms (DGAs)
  • Extensible Cloud Architecture: The service can rapidly incorporate new threat intelligence.
  • Prerequisite: Requires an active Threat Prevention license.
PCNSE/PCNSA Exam Note: DNS Security focuses on preventing connections *before* they happen by disrupting the DNS resolution phase for malicious domains. It's a proactive layer of defense. Understand the concept of DNS sinkholing and its utility in identifying compromised endpoints.

How it Works

When a client on the network makes a DNS query that transits the firewall:

  1. The firewall intercepts the DNS query.
  2. It checks the requested domain against the DNS Security cloud service's intelligence.
  3. If the domain is identified as malicious or matches a policy:
    • The firewall can block the query, returning a synthetic response (e.g., NXDOMAIN).
    • Alternatively, it can perform DNS sinkholing, returning a pre-configured IP address (the sinkhole IP) instead of the actual malicious IP. Traffic to this sinkhole IP can then be monitored.
  4. If the domain is benign, the query is allowed to proceed to the legitimate DNS server.

This inspection is applied via Anti-Spyware profiles, which are attached to Security Policy rules.

DNS Security workflow: Intercepting DNS queries, checking against cloud intelligence, and applying actions like sinkholing.

DNS Security workflow: Intercepting DNS queries, checking against cloud intelligence, and applying actions like sinkholing.

Gotcha! DNS Security relies on the firewall seeing the DNS traffic. Ensure that internal clients are configured to use DNS servers whose traffic passes through the Palo Alto Networks firewall. If clients use external DNS servers directly (e.g., 8.8.8.8) and that traffic bypasses the firewall's inspection point for DNS Security, the protection will be ineffective for those clients. Consider policy to force DNS traffic through the firewall.

Core Security Service: Advanced Threat Prevention

Advanced Threat Prevention (ATP) is an inline, cloud-delivered security service that builds upon the standard Threat Prevention subscription. It introduces signature-less detection capabilities using machine learning directly on the firewall to block unknown and evasive command-and-control (C2) traffic and exploits in real-time.

Key Features

  • Inline Deep Learning Models: Leverages custom-built deep learning models on the firewall to analyze network traffic patterns and detect malicious behavior without relying solely on traditional signatures.
  • Real-time C2 Detection: Specialized in identifying and blocking unknown C2 communication attempts, even those using novel techniques or encryption. This is crucial for stopping active intrusions and data exfiltration.
  • Zero-Day Exploit Prevention: Designed to identify and stop exploit attempts in real-time, even for vulnerabilities that do not yet have specific signatures. It looks for anomalous traffic patterns indicative of exploitation.
  • Signature-less Detection: While it complements signature-based detection from standard Threat Prevention, its core strength is identifying threats that have no existing signature. This reduces the window of exposure to new attacks.
  • Cloud-Assisted Intelligence: While detection is inline, it benefits from the broader threat landscape visibility and model training occurring in the Palo Alto Networks cloud.
  • Builds on Threat Prevention: Requires the standard Threat Prevention subscription as a base.
PCNSE/PCNSA Exam Note: Advanced Threat Prevention's key differentiator is its *inline, signature-less* detection capability, particularly for unknown C2 and exploits. This is a step beyond traditional IPS.

How it Works

Advanced Threat Prevention inspects traffic inline as it passes through the firewall. It applies machine learning models that have been trained to recognize subtle indicators of malicious activity often missed by signatures alone.

  1. Traffic flows through the firewall and is subject to standard Threat Prevention (signatures).
  2. If Advanced Threat Prevention is licensed and enabled, the same traffic is also analyzed by inline ML models.
  3. These models look for characteristics of:
    • Evasive C2 (e.g., unusual beaconing, non-standard protocols, encrypted channels with suspicious metadata).
    • Exploit kits or vulnerability exploitation attempts (e.g., specific sequences of network requests, shellcode-like patterns).
  4. If the ML models detect a high probability of malicious activity, ATP can block the traffic in real-time, preventing the threat from succeeding.

This capability is typically configured within the Anti-Spyware and Vulnerability Protection profiles, often by setting certain actions for "critical," "high," and "medium" severity cloud-delivered C2 and exploit detections.

Gotcha! Because ATP relies on sophisticated inline analysis, it can have a performance impact, though Palo Alto Networks designs its hardware to handle these advanced services. It's important to deploy on appropriately sized hardware. Also, SSL/TLS decryption is highly recommended for ATP to be effective against encrypted C2 and web-based exploits.

Connectivity & Specialized Service: GlobalProtect

GlobalProtect provides secure remote access (VPN) for users, whether they are mobile, at home, or in branch offices. The GlobalProtect subscription unlocks advanced features for endpoint posture assessment and broader client support.

Key Features (Enabled/Enhanced by Subscription)

  • Host Information Profile (HIP) Checks: This is a major feature unlocked by the subscription. HIP allows the firewall to collect information about the security posture of connecting endpoints (e.g., OS patch level, antivirus status, disk encryption, presence of specific software). Policies can then be enforced based on HIP data (e.g., grant full access only to compliant devices).
  • HIP Notification and Content Updates: The subscription provides regular updates for HIP checks, including new OS versions, antivirus definitions, and other endpoint security software.
  • GlobalProtect Mobile App Support: Full support for the GlobalProtect app on mobile platforms (iOS, Android).
  • IPv6 Support: Enables GlobalProtect connections over IPv6.
  • Clientless VPN: Provides access to specific web applications through a browser-based portal without requiring the full GlobalProtect client. Useful for contractors or unmanaged devices needing limited access.
  • Enhanced Scale and Features: While basic portal/gateway functionality might work without a license on some platforms, the subscription is generally required for any production deployment relying on the features listed above and for optimal performance and scale.
PCNSE/PCNSA Exam Note: HIP checks are a critical GlobalProtect feature tied to the subscription. Understand that without the license, you lose the ability to assess endpoint security posture and enforce policies based on it.

Core GlobalProtect Functionality (May have limitations without license)

  • Portal: Authenticates users and provides them with the appropriate GlobalProtect agent software and configuration.
  • Gateway(s): Terminate VPN tunnels, enforce security policy on remote user traffic, and provide access to internal or cloud resources.
  • Connection Methods: Supports various connection methods like "On-demand," "User-logon (Always On)," and "Pre-logon (Always On for device)."

A GlobalProtect Gateway license is typically required for each gateway that will utilize the advanced features. A single portal can serve multiple gateways.

Gotcha! While you might be able to configure a basic GlobalProtect portal and gateway without a license on some PAN-OS versions/platforms, critical features like HIP checks, mobile app support, and clientless VPN will not function or will be severely limited. For any serious GlobalProtect deployment, the subscription is essential.

For detailed setup, refer to the GlobalProtect Administrator's Guide .

Connectivity & Specialized Service: SD-WAN

The SD-WAN (Software-Defined Wide Area Network) subscription enables Palo Alto Networks firewalls to provide intelligent path selection, simplified VPN orchestration, and centralized management for distributed enterprise networks.

Key Features

  • Dynamic Path Selection: Intelligently steers application traffic across multiple WAN links (e.g., MPLS, internet broadband, LTE) based on real-time path performance (latency, jitter, packet loss) and application requirements (defined in SLAs).
  • Application-Aware Routing: Identifies applications using App-ID and makes path decisions tailored to the needs of each application.
  • Simplified VPN Orchestration: Automates the creation and maintenance of VPN tunnels between branch firewalls and hub locations, simplifying complex mesh or hub-and-spoke topologies.
  • Centralized Management via Panorama: SD-WAN configuration, monitoring, and troubleshooting are managed centrally through Panorama. Panorama is a requirement for SD-WAN.
  • Zero Touch Provisioning (ZTP): Simplifies the deployment of new branch firewalls.
  • Secure SD-WAN: Combines SD-WAN functionality with the NGFW's security capabilities, ensuring that all traffic, regardless of path, is inspected and secured.
  • Monitoring and Reporting: Provides visibility into WAN link performance and application traffic patterns.
PCNSE/PCNSA Exam Note: Panorama is mandatory for managing a Palo Alto Networks SD-WAN deployment. The SD-WAN subscription is applied to the firewalls participating in the SD-WAN fabric. Key benefits include application-based path selection and simplified VPN management.

How it Works

Palo Alto Networks SD-WAN typically involves:

  1. Panorama as Controller: Panorama acts as the central SD-WAN controller and management plane. It's used to define SD-WAN policies, device configurations, and monitor the network.
  2. Branch and Hub Devices: Firewalls at branch locations and central hub sites are configured as part of the SD-WAN fabric. They require the SD-WAN subscription.
  3. Path Quality Monitoring: Devices continuously monitor the health of available WAN paths using probes.
  4. Policy-Based Path Selection: Based on configured application SLAs and real-time path metrics, traffic is dynamically routed over the optimal path. For example, critical VoIP traffic might be prioritized on a low-latency link, while bulk data transfer might use a higher-bandwidth internet link.
  5. Secure Tunnels: VPN tunnels (typically IPsec) are established between devices to secure inter-site traffic.
High-level Palo Alto Networks SD-WAN architecture showing Panorama managing branch and hub firewalls with multiple WAN links.

High-level Palo Alto Networks SD-WAN architecture showing Panorama managing branch and hub firewalls with multiple WAN links.

Gotcha! The SD-WAN subscription is distinct from other licenses. While the firewall itself provides security, the SD-WAN license specifically enables the advanced WAN path control and orchestration features. Also, ensure Panorama is appropriately licensed and sized for the number of SD-WAN devices.

For detailed information, see the SD-WAN Administrator's Guide .

Connectivity & Specialized Service: IoT Security

The Palo Alto Networks IoT Security subscription is a cloud-delivered service designed to provide comprehensive visibility, prevention, and enforcement for Internet of Things (IoT) and Operational Technology (OT) devices.

Key Features

  • Device Discovery and Classification: Uses passive network traffic analysis and machine learning to automatically discover and accurately classify all connected IoT/OT devices, even those previously unknown.
  • Risk Assessment: Identifies device vulnerabilities, anomalous behaviors, and potential threats associated with discovered IoT devices. Provides a risk score for each device.
  • Behavioral Anomaly Detection: Baselines normal device behavior and alerts on deviations that could indicate a compromise or malfunction.
  • Policy Recommendations: Generates context-aware security policy recommendations based on device type, risk, and behavior. These recommendations can be easily translated into NGFW policies to segment and secure IoT devices.
  • Threat Prevention: Leverages the NGFW's threat prevention capabilities to block known and unknown threats targeting IoT devices.
  • Integration with NGFW and Strata Logging Service: IoT Security ingests metadata from NGFWs (via Strata Logging Service, formerly Cortex Data Lake) to analyze device traffic. Policy enforcement occurs on the NGFW.
  • IP-Tagging and Device Attributes: Discovered device information (e.g., device type, model, OS) can be used as IP-tags or device attributes in Dynamic Address Groups (DAGs) for policy enforcement.
PCNSE/PCNSA Exam Note: IoT Security is a cloud service that requires Strata Logging Service for data collection. Its primary value lies in discovering unmanaged devices, assessing their risk, and providing actionable policy recommendations for NGFW enforcement.

How it Works

  1. Data Collection: NGFWs forward traffic metadata (not full packet captures) from segments where IoT devices reside to the Strata Logging Service.
  2. Cloud Analysis: The IoT Security cloud service ingests this metadata and applies advanced analytics, machine learning, and Palo Alto Networks threat intelligence to:
    • Discover and identify IoT devices.
    • Profile their normal behavior.
    • Assess their risk posture.
    • Detect anomalies and threats.
  3. Policy Recommendation & Enforcement: The service provides insights and policy recommendations through its cloud portal. These recommendations (e.g., "Allow camera X to only communicate with NVR Y on port Z") can be used to create granular security policies on the NGFWs, often leveraging Dynamic Address Groups populated by IoT Security.
Gotcha! IoT Security is not a standalone enforcement point; it relies on the NGFW for policy enforcement and Strata Logging Service for its data feed. Proper network segmentation and visibility (e.g., SPAN ports or direct traffic flow through NGFW) are crucial for effective IoT device discovery.

For more details, refer to the IoT Security Administrator's Guide .

Connectivity & Specialized Service: Enterprise DLP

Palo Alto Networks Enterprise Data Loss Prevention (DLP) is a cloud-delivered service that helps discover, monitor, and protect sensitive data across networks, clouds, and users.

Key Features

  • Unified DLP Engine: Provides a consistent DLP engine across Palo Alto Networks products (NGFWs, Prisma Access, Prisma SaaS, Prisma Cloud).
  • Comprehensive Data Discovery: Identifies sensitive data in motion (transiting the network via NGFWs or Prisma Access) and at rest (in sanctioned SaaS applications via Prisma SaaS, or cloud storage via Prisma Cloud). This study guide focuses on the NGFW integration.
  • Predefined and Custom Data Patterns: Offers a library of predefined data patterns for common sensitive information types (e.g., PII, PCI, PHI, source code). Allows creation of custom patterns using keywords, regular expressions, and document properties.
  • Machine Learning-Based Classification: Uses ML for accurate data classification, reducing false positives.
  • Data Profiling: Scan for collective types of data using Boolean logic (e.g., detect if a document contains a credit card number AND a name AND an address).
  • Policy Enforcement: Enables policies on NGFWs (and other enforcement points) to monitor, alert, or block the exfiltration of sensitive data.
  • Integration with Panorama: The Enterprise DLP plugin on Panorama is used to configure DLP policies and profiles, which are then pushed to managed NGFWs.
  • Incident Management: Provides reporting and analytics on DLP incidents.
PCNSE/PCNSA Exam Note: Enterprise DLP for NGFWs requires the Enterprise DLP subscription, the DLP plugin on Panorama, and ideally SSL/TLS decryption for visibility into encrypted traffic. Focus on its role in preventing data exfiltration based on content inspection.

How it Works (NGFW Context)

  1. Configuration: DLP data patterns, profiles, and policies are configured using the Enterprise DLP plugin on Panorama.
  2. Policy Deployment: These configurations are pushed from Panorama to the managed NGFWs.
  3. Traffic Inspection: NGFWs inspect traffic matching relevant security policies that have DLP profiles attached. SSL/TLS decryption is critical for inspecting encrypted traffic.
  4. Data Analysis: When traffic is inspected:
    • The NGFW can perform initial matching against simpler patterns.
    • For more complex analysis or confirmation, snippets or metadata might be sent to the Enterprise DLP cloud service.
  5. Enforcement: Based on the DLP policy, the NGFW can alert, block the data transfer, or take other configured actions if sensitive data is detected.
  6. Logging and Reporting: DLP events are logged on the firewall and can be forwarded to Panorama and SIEM systems.
Simplified flow of data inspection with Enterprise DLP for NGFWs. Panorama manages configuration, and the DLP cloud service assists with analysis.

Simplified flow of data inspection with Enterprise DLP for NGFWs. Panorama manages configuration, and the DLP cloud service assists with analysis.

Gotcha! SSL/TLS decryption is absolutely essential for Enterprise DLP to inspect most modern web and email traffic. Without it, the DLP engine cannot see the actual data being transferred. Also, remember the Panorama DLP plugin requirement for configuration.

For more details, consult the Enterprise DLP Administration Guide .

Connectivity & Specialized Service: SaaS Security Inline

SaaS Security Inline, in conjunction with the App-ID Cloud Engine (ACE), provides enhanced visibility and granular control over Software-as-a-Service (SaaS) application usage directly on the NGFW.

Key Features

  • Enhanced SaaS App Discovery: Leverages the App-ID Cloud Engine (ACE) to rapidly identify new, emerging, and evasive SaaS applications that might not be covered by standard App-ID updates. ACE is updated frequently (multiple times per day).
  • Granular Control: Allows for policy enforcement not just on the SaaS application itself (e.g., Box, Slack) but also on specific functions or activities within those applications (e.g., block file uploads to personal Box accounts, allow chat but block file sharing in Slack for certain users).
  • Shadow IT Discovery: Helps identify unsanctioned SaaS applications being used within the organization by analyzing traffic patterns.
  • User and Usage Details: Provides insights into who is using which SaaS apps and for what purposes.
  • Policy Recommendations: Can generate policy recommendations for controlling SaaS usage.
  • Integration with Strata Logging Service: Requires Strata Logging Service (formerly Cortex Data Lake) to send traffic logs and metadata to the cloud for analysis by ACE and the SaaS Security service.
  • Inline Enforcement: Unlike CASB solutions that might be API-based, SaaS Security Inline provides real-time, inline policy enforcement on the NGFW.
PCNSE/PCNSA Exam Note: SaaS Security Inline's primary benefits are fast identification of new SaaS apps via ACE and granular control over SaaS app functions. It requires Strata Logging Service. Differentiate this from out-of-band CASB solutions.

How it Works

  1. Traffic Forwarding: The NGFW sends relevant traffic logs and metadata (particularly for unidentified or broadly categorized web traffic) to the Strata Logging Service.
  2. App-ID Cloud Engine (ACE) Analysis: ACE, a cloud service, analyzes this data to identify specific SaaS applications, including new and evasive ones.
  3. App-ID Updates: The NGFW receives frequent updates from ACE, effectively expanding its App-ID database with these new SaaS application signatures.
  4. Policy Enforcement: With the SaaS Security Inline subscription and updated App-IDs from ACE, administrators can create granular Security Policy rules:
    • Using the newly identified SaaS App-IDs.
    • Specifying application functions (e.g., `slack-file-transfer`, `dropbox-upload`) if available through App-ID.
    • Applying actions like allow, block, alert, or QoS.
  5. Visibility: The SaaS Security portal (integrated within the Palo Alto Networks hub/Cortex Gateway) provides dashboards and reports on discovered SaaS usage.
Gotcha! SSL/TLS decryption is crucial for SaaS Security Inline to accurately identify applications and their functions, as most SaaS traffic is encrypted. Without it, visibility and control are severely limited. Also, ensure the firewall is configured to forward logs to Strata Logging Service.

For more information, refer to the SaaS Security Inline documentation .

Operational & Platform Service: AIOps for NGFW

AIOps (Artificial Intelligence for IT Operations) for NGFW is a cloud-based service that provides proactive insights, predictive analytics, and best practice recommendations to optimize the health, performance, and security posture of Palo Alto Networks firewalls.

Key Features

  • Proactive Issue Detection: Identifies potential problems, misconfigurations, and security gaps before they impact operations or lead to breaches.
  • Predictive Analytics: Forecasts potential issues like resource exhaustion (CPU, memory, session capacity) based on trends.
  • Best Practice Adherence: Compares firewall configurations against Palo Alto Networks best practices and security hardening guidelines, highlighting deviations.
  • Remediation Recommendations: Offers actionable recommendations to address identified issues and align with best practices.
  • Security Posture Insights: Helps improve overall security posture by identifying areas for improvement in policy configuration, subscription utilization, and feature adoption.
  • Health and Performance Monitoring: Provides dashboards and metrics on firewall health, performance, and capacity utilization.
  • Integration with Strata Logging Service: Requires firewalls to forward telemetry and logs to Strata Logging Service (Cortex Data Lake) for analysis by the AIOps service.
  • Free and Premium Tiers: Offers a free tier with basic insights and a premium tier (licensed) with more advanced analytics, predictions, and longer data retention.
PCNSE/PCNSA Exam Note: AIOps for NGFW is about proactive operational excellence. It helps optimize firewall deployments and prevent issues. Understand its reliance on Strata Logging Service and the difference between Free and Premium tiers.

How it Works

  1. Data Collection: Firewalls (NGFWs and Panorama-managed firewalls) send telemetry data, configuration information, and logs to the Strata Logging Service.
  2. Cloud-Based Analysis: The AIOps cloud service processes this data using AI/ML algorithms and Palo Alto Networks expertise.
  3. Insight Generation: It identifies anomalies, predicts potential issues, compares configurations to best practices, and assesses security posture.
  4. Dashboard and Reporting: Insights, alerts, and recommendations are presented through a dedicated AIOps portal (accessible via the Palo Alto Networks hub/Cortex Gateway).

AIOps aims to reduce manual effort in troubleshooting, optimize resource utilization, and improve the overall effectiveness of the firewall deployment.

Gotcha! AIOps itself doesn't directly block threats; it's an operational tool to help administrators manage their firewalls more effectively. Ensure devices are correctly onboarded to Strata Logging Service and that necessary telemetry is being sent for AIOps to function correctly.

For more information on features, including the differences between Free and Premium, see the AIOps Free and Premium Features documentation .

Operational & Platform Service: Strata Logging Service

Strata Logging Service (formerly known as Cortex Data Lake) is a cloud-based, centralized log storage and aggregation solution. It's a foundational service that enables many other Palo Alto Networks cloud-delivered security services and applications.

Key Features

  • Centralized Log Collection: Collects logs from Palo Alto Networks NGFWs, Prisma Access, Cortex XDR, and other sources into a single, scalable cloud repository.
  • Long-Term Storage: Provides scalable and cost-effective long-term storage for security and network logs, essential for compliance, forensics, and historical analysis.
  • Data Normalization: Normalizes log data from various sources into a common format, simplifying analysis and correlation.
  • Foundation for Cloud Services: Serves as the data backbone for numerous Palo Alto Networks cloud services, including:
    • Cortex XDR (for endpoint, network, and cloud data analysis)
    • IoT Security
    • AIOps for NGFW
    • SaaS Security Inline (via App-ID Cloud Engine integration)
    • Prisma Access insights
  • Scalability and Performance: Designed to handle large volumes of log data from distributed environments.
  • Regional Data Storage: Allows customers to choose the geographic region for log storage to help meet data sovereignty and compliance requirements.
PCNSE/PCNSA Exam Note: Strata Logging Service is critical infrastructure for many Palo Alto Networks cloud services. Understand its role as a centralized log collector and enabler for services like Cortex XDR, IoT Security, and AIOps. It's not just log storage; it's a data platform.

How it Works

  1. Log Forwarding Configuration: Administrators configure NGFWs, Panorama, Prisma Access, etc., to forward logs to their dedicated Strata Logging Service instance in the cloud.
  2. Secure Data Ingestion: Logs are securely transmitted and ingested into the service.
  3. Storage and Indexing: Data is stored, indexed, and normalized for efficient querying and analysis.
  4. Data Access by Cloud Services: Other licensed Palo Alto Networks cloud services (e.g., Cortex XDR, AIOps) access the relevant log data from Strata Logging Service to perform their specialized analytics and functions.
  5. Direct Query (Limited): While primarily a backend for other services, some direct query capabilities may be available through tools like Cortex XSOAR or APIs for specific use cases.
Gotcha! Strata Logging Service is licensed based on log volume and retention period. Ensure proper capacity planning. Also, while it stores logs, the primary *analysis* and *actionable insights* often come from the applications and services that *use* the data stored in it (e.g., Cortex XDR for threat hunting).

For more details, refer to the Strata Logging Service (Cortex Data Lake) Getting Started Guide .

Operational & Platform Service: AutoFocus

AutoFocus is a cloud-based contextual threat intelligence service. It provides security analysts with deep insights into attack campaigns, threat actors, and malware by correlating threat data from Palo Alto Networks' global threat intelligence network, third-party sources, and an organization's own network logs.

Key Features

  • Contextual Threat Intelligence: Goes beyond individual threat indicators (like a malicious IP or hash) to provide context about related campaigns, malware families, threat actors, and tactics, techniques, and procedures (TTPs).
  • Correlation of Global and Local Data: Correlates threat data from Palo Alto Networks' Unit 42 threat research team, WildFire, third-party feeds, and (optionally) an organization's own firewall logs if integrated.
  • Threat Actor Profiling: Provides information on known threat actors, their common targets, and modus operandi.
  • Malware Family Analysis: Details on malware families, their behaviors, and variants.
  • Graphical Analysis: Offers visualization tools to explore relationships between threats, campaigns, and indicators.
  • Search and Pivoting: Allows analysts to search for specific indicators (IPs, domains, hashes, CVEs) and pivot to related threat intelligence.
  • API Access: Enables integration with SIEM, SOAR, and other security tools for automated enrichment and response.
  • Tagging System: Uses tags to categorize and search for threats based on various attributes (e.g., malware family, exploit kit, target industry).
PCNSE/PCNSA Exam Note: AutoFocus is a threat *intelligence* and *analysis* tool, not a direct prevention service like Threat Prevention or WildFire. It helps security analysts understand threats more deeply to inform their response and defense strategies. An AutoFocus license is required to access the portal and its full dataset.

How it's Used

Security operations teams and threat analysts typically use AutoFocus to:

  1. Investigate Alerts: When a firewall or other security tool generates an alert for a suspicious event, analysts can use AutoFocus to look up the indicators (e.g., IP address, file hash) and gain more context.
  2. Proactive Threat Hunting: Search for threats relevant to their industry or specific TTPs used by known adversaries.
  3. Enrich Incident Data: Augment data from SIEMs or incident response platforms with detailed threat intelligence from AutoFocus.
  4. Understand Attack Campaigns: Piece together disparate alerts or indicators to understand the scope and nature of a broader attack campaign.

With an active AutoFocus license, firewall logs (if forwarded to Strata Logging Service and integrated) can be correlated with AutoFocus intelligence, allowing analysts to see if global threats have been observed on their own network.

Gotcha! AutoFocus provides intelligence; acting upon that intelligence (e.g., creating new firewall policies, blocking indicators) is typically done manually or through integration with other systems like Panorama or a SOAR platform. The value is in the quality and context of the intelligence.

For more information, visit the AutoFocus Documentation .

Operational & Platform Service: Virtual Systems (VSYS)

Virtual Systems (VSYS) is a licensing feature that allows a single physical Palo Alto Networks firewall to be partitioned into multiple independent, logical firewall instances. Each VSYS operates as a separate firewall with its own policies, interfaces, routing tables, and administrative domains.

Key Features & Concepts

  • Firewall Virtualization: Enables logical separation of network security functions on a single hardware device.
  • Independent Administration: Each VSYS can have its own administrators with distinct access rights and visibility limited to their assigned VSYS.
  • Resource Allocation: System resources (like sessions, security processing) can be allocated or shared among VSYS instances.
  • Dedicated or Shared Interfaces: Physical interfaces can be dedicated to a single VSYS or shared among multiple VSYS instances using subinterfaces or VLANs.
  • Use Cases:
    • Multi-tenancy: Service providers can offer distinct virtual firewalls to different customers.
    • Departmental Separation: Large enterprises can segment networks for different departments (e.g., HR, Finance, Engineering) with separate security policies and administration.
    • Network Function Consolidation: Consolidate multiple physical firewalls onto fewer, more powerful platforms.
    • Lab/Test Environments: Create isolated VSYS instances for testing policies without impacting production environments.
  • Platform Dependent: VSYS capability and the number of supported VSYS instances vary by firewall model.
    • Not supported on PA-220, PA-400 Series, PA-800 Series, and most VM-Series models (some higher-end VM-Series might have limited VSYS capacity with specific licensing).
    • PA-3200 Series, PA-5200 Series, PA-5450, and PA-7000 Series firewalls support VSYS.
  • Licensing:
    • A base number of VSYS instances might be included by default on some high-end platforms (e.g., PA-5200, PA-7000 Series).
    • To enable VSYS on platforms like the PA-3200 Series, or to increase the number of VSYS instances beyond the base capacity on other supported platforms, a Virtual Systems license must be purchased. This is typically a perpetual license for a certain number of additional VSYS.
PCNSE/PCNSA Exam Note: Understand that VSYS provides logical firewall separation on supported hardware. Know which platforms generally support VSYS and that a specific "Virtual Systems" license is often required to enable or increase capacity. Differentiate this from simply having multiple security zones on a single firewall instance.

Considerations

  • Resource Management: Careful planning is needed for allocating resources (CPU, memory, sessions, security processing capacity) to each VSYS to ensure performance.
  • Inter-VSYS Routing: By default, traffic between different VSYS instances on the same firewall must exit the physical firewall and re-enter (hairpinning) through an external router or switch, or by using dedicated inter-VSYS Layer 3 interfaces if configured.
  • Shared Services: Some services (like Panorama management, User-ID agent connectivity) might be configured globally or per-VSYS depending on the deployment.
Gotcha! The "Virtual Systems" license is distinct from other security subscriptions. It enables the platform feature of virtualization. Not all firewall models support VSYS. Licensing a VSYS doesn't automatically license all security subscriptions within it; each VSYS typically requires its own security subscriptions (Threat Prevention, URL Filtering, etc.) if those features are needed.

For detailed guidance, refer to the Virtual Systems Administrator's Guide (select your PAN-OS version).

Operational & Platform Service: Subscription Reference Table

The following table, sourced from Palo Alto Networks documentation, provides a summary of many available subscriptions. For the most current and detailed information, always refer to the official Palo Alto Networks documentation website.

PCNSE/PCNSA Exam Note: While this table is a good reference, the exam will test your understanding of the *functionality, prerequisites, and key use cases* of major subscriptions rather than just memorizing a list. Use this table to reinforce concepts learned in previous sections.

Palo Alto Networks Firewall Subscriptions Summary

IoT Security

Discovers and classifies IoT devices using AI/ML, provides risk assessment, and generates policy recommendations for NGFW enforcement. Requires Strata Logging Service.

SD-WAN

Enables intelligent dynamic path selection, simplified VPN orchestration, and centralized configuration/monitoring for WAN links. Requires Panorama.

Threat Prevention

Provides IPS, Antivirus, Anti-Spyware (C2 protection), vulnerability protection, built-in EDLs, and basic WildFire access. Foundational for many other security services.

Advanced Threat Prevention

Inline, signature-less detection using ML on the firewall to block unknown C2 and exploits in real-time. Builds on standard Threat Prevention.

DNS Security

Blocks access to malicious domains using predictive analytics and ML-driven threat intelligence; provides DNS sinkholing. Requires Threat Prevention.

Advanced URL Filtering

Controls web access using PAN-DB categories, prevents credential phishing, and uses inline ML to detect and block unknown malicious/phishing sites in real-time. Supersedes legacy URL Filtering.

WildFire

Cloud-based advanced malware analysis (sandboxing) for unknown threats. Provides fast (~5 min) signature updates, supports more file types, and API access. Requires Threat Prevention.

Advanced WildFire

Adds Intelligent Run-time Memory Analysis to WildFire, enhancing detection of highly evasive malware. Requires WildFire subscription.

AutoFocus

Cloud-based contextual threat intelligence service. Provides graphical analysis of firewall logs (if integrated) and correlates with global threat data.

Strata Logging Service (Cortex Data Lake)

Cloud-based centralized log storage and aggregation. Required or recommended for Cortex XDR, IoT Security, AIOps, Prisma Access, etc.

GlobalProtect

Subscription enables advanced VPN features: Host Information Profile (HIP) checks, mobile app support, IPv6, Clientless VPN. Required per gateway.

Virtual Systems

Perpetual license to enable multiple logical firewall instances (VSYS) on supported hardware platforms, or increase VSYS capacity beyond base.

Enterprise DLP

Cloud-delivered service for discovering and protecting sensitive data using predefined/custom patterns and ML. Requires Panorama DLP plugin for NGFW integration.

SaaS Security Inline

Provides visibility and granular control over SaaS apps using App-ID Cloud Engine (ACE) for rapid identification. Requires Strata Logging Service.

AIOps for NGFW

Cloud service providing proactive insights, predictive analytics, and best practice recommendations for NGFW health, performance, and configuration. Comes in Free and Premium (licensed) tiers. Requires Strata Logging Service.


General References & Further Reading

These links provide broader overviews and details on managing subscriptions:

PCNSE Quiz: PAN-OS Subscriptions

1. Which Palo Alto Networks subscription is primarily responsible for providing Intrusion Prevention System (IPS), Anti-Virus, and Anti-Spyware capabilities?

2. What is the key benefit of a full WildFire subscription regarding new malware signature delivery compared to the basic WildFire access included with Threat Prevention?

3. Advanced URL Filtering uses PAN-DB for known URL categories. What additional technology does it primarily leverage for detecting unknown malicious and phishing websites in real-time?

4. Which two subscriptions are common prerequisites for other advanced security services (e.g., DNS Security requires one, full WildFire requires one)?

5. What feature, primarily enabled by the GlobalProtect subscription, allows the firewall to assess the security posture of connecting endpoints (e.g., OS patch level, AV status)?

6. The DNS Security service is designed to protect against threats by:

7. Which Palo Alto Networks management platform is a requirement for deploying and managing the SD-WAN subscription features?

8. The IoT Security subscription primarily helps organizations to:

9. Advanced WildFire builds upon the standard WildFire subscription by adding which specific capability?

10. What is the primary function of AIOps for NGFW?

11. Enterprise DLP for NGFWs relies on which component for configuration of DLP policies and profiles that are then pushed to firewalls?

12. SaaS Security Inline leverages the App-ID Cloud Engine (ACE) primarily to:

13. What critical firewall feature must generally be enabled for effective inspection by Advanced URL Filtering (for credential phishing) and Enterprise DLP?

14. What is Strata Logging Service (formerly Cortex Data Lake) primarily used for in the Palo Alto Networks ecosystem?

15. The "Virtual Systems" license on supported Palo Alto Networks firewalls enables:

16. AutoFocus is best described as a:

17. Advanced Threat Prevention (ATP) differs from standard Threat Prevention primarily by:

18. To activate a newly purchased PAN-OS subscription and make it available to a firewall, what are the typical first two steps?

19. If a company wants to prevent users from submitting corporate credentials to non-approved personal webmail sites, which subscription and feature would be most directly applicable?

20. Which of the following is NOT a primary capability of the Threat Prevention subscription?