1: Introduction
2: Security Profile Revision
3: Daily Operations and Maintenance
4: Establish Initial Baseline Visibility
5: Analyze and Update Security Rules that Pass Traffic
6: Inbound Security Rules Best Practices and Analysis
7: Outbound Security Rules Best Practices and Analysis
8: Internal Security Rules Best Practices and Analysis
9: Administratively Hardening PAN-OS
10: Reducing Policy Set and Simplification