index
int64
0
4.08k
text
stringlengths
34
4.9k
url
stringclasses
38 values
91
Firewall Administration STEP 3 | Change the commit scope to Commit Changes Made By to select configuration changes to commit. The push scope displays the name of the admin currently logged in. Click the admin name to view a list of admins who have made configuration changes that have not been committed. STEP 4 | (Optional) Preview and validate your pending configuration changes to ensure you want to commit the selected configuration objects. STEP 5 | Commit. The Commit Status page displays the administrators that made configuration changes that were committed and the location of the committed configuration changes. Export Configuration Table Data Export policy rules, configuration objects, and IPS signatures from Panorama™ and firewalls to demonstrate regulatory compliance to external auditors, to conduct periodic reviews of the firewall configuration, and to generate reports on firewall policies. This prevents you from having to give auditors direct access to your firewalls and appliances, to take screen shots or to access the XML API to generate configuration reports. From the web interface, you can export the configuration table data for policies, objects, network, firewall, and Panorama configurations, as well as Signature exceptions in the Antivirus, Anti-Spyware, and Vulnerability Protection Security profiles, in either a PDF or CSV file. Exporting to a PDF file supports only English descriptions. Configuration table export works like a print function—you cannot import generated files back into Panorama or the firewall. When you export data as a PDF file and the table data exceeds 50,000 rows, the data is split in to multiple PDF files (for example, <report-name>_part1.pdf and <report-name>_part2.pdf) When you export data as a CSV file, the data is exported as a single file. These export formats allow you to apply filters that match your report criteria and search within PDF reports to quickly find specific data. Additionally, when you export the configuration table data, a system log is generated to record the event. PAN-OS® Administrator’s Guide Version 10.2 92 ©2025 Palo Alto Networks, Inc.
https://docs.paloaltonetworks.com/content/dam/techdocs/en_US/pdf/pan-os/10-2/pan-os-admin/pan-os-admin.pdf
92
Firewall Administration STEP 1 | Launch the Web Interface and identify the configuration data you need to export. STEP 2 | Apply filters as needed to produce the configuration data you need to export and click PDF/ CSV. STEP 3 | Configure the Configuration Table Export report: 1. Enter a File Name. 2. Select the File Type. 3. (Optional) Enter a report Description. 4. Confirm the configuration table data matches the filters you applied. Select Show All Columns to show all filters applied. STEP 4 | Export the configuration table data. Configuration table export works like a print function—you cannot import generated files back in to Panorama or the firewall. STEP 5 | Select a location to save the exported file. Use Global Find to Search the Firewall or Panorama Management Server Global Find enables you to search the candidate configuration on a firewall or on Panorama for a particular string, such as an IP address, object name, policy rule name, threat ID, UUID, or application name. In addition to searching for configuration objects and settings, you can search by job ID or job type for manual commits that administrators performed or auto-commits that the firewall or Panorama performed. You can also use Global Find to search for IP addresses within external dynamic lists. The search results are grouped by category and provide links to the configuration location in the web interface, so that you can easily find all of the places where PAN-OS® Administrator’s Guide Version 10.2 93 ©2025 Palo Alto Networks, Inc.
https://docs.paloaltonetworks.com/content/dam/techdocs/en_US/pdf/pan-os/10-2/pan-os-admin/pan-os-admin.pdf
93
Firewall Administration the string is referenced. The search results also help you identify other objects that depend on or make reference to the search term or string. For example, when deprecating a security profile enter the profile name in Global Find to locate all instances of the profile and then click each instance to navigate to the configuration page and make the necessary change. After all references are removed, you can then delete the profile. You can do this for any configuration item that has dependencies. Watch the video. Global Find does not search dynamic content (such as logs, address ranges, or allocated DHCP addresses). In the case of DHCP, you can search on a DHCP server attribute, such as the DNS entry, but you cannot search for individual addresses allocated to users. Global Find also does not search for individual user or group names identified by User-ID unless the user/group is defined in a policy. In general, you can only search content that the firewall writes to the configuration. Launch Global Find by clicking the Search icon located on the upper right of the web interface. PAN-OS® Administrator’s Guide Version 10.2 94 ©2025 Palo Alto Networks, Inc.
https://docs.paloaltonetworks.com/content/dam/techdocs/en_US/pdf/pan-os/10-2/pan-os-admin/pan-os-admin.pdf
94
Firewall Administration To access the Global Find from within a configuration area, click the drop-down next to an item and select Global Find: For example, click Global Find on a zone named Users to search the candidate configuration for each location where the zone is referenced. The following screen capture shows the search results for the zone Users: Search tips: • If you initiate a search on a firewall that has multiple virtual systems enabled or if custom Administrative Role Types are defined, Global Find will only return results for areas of the firewall in which the administrator has permissions. The same applies to Panorama device groups. • Spaces in search terms are handled as AND operations. For example, if you search on corp policy, the search results include instances where corp and policy exist in the configuration. • To find an exact phrase, enclose the phrase in quotation marks. • Enter no more than five keywords or use an exact phrase match with quotation marks. • To rerun a previous search, click Search (located on the upper right of the web interface) to see a list of the last 20 searches. Click an item in the list to rerun that search. Search history is unique to each administrator account. • To search for a UUID, you must copy and paste the UUID. Manage Locks for Restricting Configuration Changes You can use configuration locks to prevent other administrators from changing the candidate configuration or from committing configuration changes until you manually remove the lock or PAN-OS® Administrator’s Guide Version 10.2 95 ©2025 Palo Alto Networks, Inc.
https://docs.paloaltonetworks.com/content/dam/techdocs/en_US/pdf/pan-os/10-2/pan-os-admin/pan-os-admin.pdf
95
Firewall Administration the firewall automatically removes it (after a commit). Locks ensure that administrators don’t make conflicting changes to the same settings or interdependent settings during concurrent login sessions. The firewall queues commit requests and performs them in the order that administrators initiate the commits. For details, see Commit, Validate, and Preview Firewall Configuration Changes. To view the status of queued commits, see Manage and Monitor Administrative Tasks. View details about current locks. For example, you can check whether other administrators have set locks and read comments they entered to explain the locks. Click the lock at the top of the web interface. An adjacent number indicates the number of current locks. Lock a configuration. 1. Click the lock at the top of the web interface. The lock image varies based on whether existing locks are or are not set. 2. Take a Lock and select the lock Type: • Config—Blocks other administrators from changing the candidate configuration. • Commit—Blocks other administrators from committing changes made to the candidate configuration. 3. (Firewall with multiple virtual systems only) Select a Location to lock the configuration for a specific virtual system or the Shared location. 4. (Optional) As a best practice, enter a Comment so that other administrators will understand the reason for the lock. 5. Click OK and Close. Unlock a configuration. Only a superuser or the administrator who locked the configuration can manually unlock it. However, the firewall automatically removes a lock after completing the commit operation. 1. Click the lock at the top of the web interface. 2. Select the lock entry in the list. 3. Click Remove Lock, OK, and Close. Configure the firewall to automatically apply a commit lock when you change the candidate configuration. This setting applies to all administrators. 1. Select Device > Setup > Management and edit the General Settings. 2. Select Automatically Acquire Commit Lock and then click OK and Commit. PAN-OS® Administrator’s Guide Version 10.2 96 ©2025 Palo Alto Networks, Inc.
https://docs.paloaltonetworks.com/content/dam/techdocs/en_US/pdf/pan-os/10-2/pan-os-admin/pan-os-admin.pdf
96
Firewall Administration Manage Configuration Backups The running configuration on the firewall comprises all settings you have committed and that are therefore active, such as policy rules that currently block or allow various types of traffic in your network. The candidate configuration is a copy of the running configuration plus any inactive changes that you made after the last commit. Saving backup versions of the running or candidate configuration enables you to later restore those versions. For example, if a commit validation shows that the current candidate configuration has more errors than you want to fix, you can restore a previous candidate configuration. You can also revert to the current running configuration without saving a backup first. If you need to export specific parts of the configuration for internal review or audit, you can Export Configuration Table Data. See Commit, Validate, and Preview Firewall Configuration Changes for details about commit operations. • Save and Export Firewall Configurations • Revert Firewall Configuration Changes Save and Export Firewall Configurations Saving a backup of the candidate configuration to persistent storage on the firewall enables you to later revert to that backup (see Revert Firewall Configuration Changes). This is useful for preserving changes that would otherwise be lost if a system event or administrator action causes the firewall to reboot. After rebooting, PAN-OS automatically reverts to the current version of the running configuration, which the firewall stores in a file named running-config.xml. Saving backups is also useful if you want to revert to a firewall configuration that is earlier than the current running configuration. The firewall does not automatically save the candidate configuration to persistent storage. You must manually save the candidate configuration as a default snapshot file (.snapshot.xml) or as a custom-named snapshot file. The firewall stores the snapshot file locally but you can export it to an external host. You don’t have to save a configuration backup to revert the changes made since the last commit or reboot; just select Config > Revert Changes (see Revert Firewall Configuration Changes). When you edit a setting and click OK, the firewall updates the candidate configuration but does not save a backup snapshot. Additionally, saving changes does not activate them. To activate changes, perform a commit (see Commit, Validate, and Preview Firewall Configuration Changes). Palo Alto Networks recommends that you back up any important configuration to a host external to the firewall. PAN-OS® Administrator’s Guide Version 10.2 97 ©2025 Palo Alto Networks, Inc.
https://docs.paloaltonetworks.com/content/dam/techdocs/en_US/pdf/pan-os/10-2/pan-os-admin/pan-os-admin.pdf
97
Firewall Administration STEP 1 | Save a local backup snapshot of the candidate configuration if it contains changes that you want to preserve in the event the firewall reboots. These are changes you are not ready to commit—for example, changes you cannot finish in the current login session. To overwrite the default snapshot file (.snapshot.xml) with all the changes that all administrators made, perform one of the following steps: • Select Device > Setup > Operations and Save candidate configuration. • Log in to the firewall with an administrative account that is assigned the Superuser role or an Admin Role profile with the Save For Other Admins privilege enabled. Then select Config > Save Changes at the top of the web interface, select Save All Changes and Save. To create a snapshot that includes all the changes that all administrators made but without overwriting the default snapshot file: 1. Select Device > Setup > Operations and Save named configuration snapshot. 2. Specify the Name of a new or existing configuration file. 3. Click OK and Close. To save only specific changes to the candidate configuration without overwriting any part of the default snapshot file: 1. Log in to the firewall with an administrative account that has the role privileges required to save the desired changes. 2. Select Config > Save Changes at the top of the web interface. 3. Select Save Changes Made By. 4. To filter the Save Scope by administrator, click <administrator-name>, select the administrators, and click OK. 5. To filter the Save Scope by location, clear any locations that you want to exclude. The locations can be specific virtual systems, shared policies and objects, or shared device and network settings. 6. Click Save, specify the Name of a new or existing configuration file, and click OK. STEP 2 | Export a candidate configuration, a running configuration, or the firewall state information to a host external to the firewall. Select Device > Setup > Operations and click an export option: • Export named configuration snapshot—Export the current running configuration, a named candidate configuration snapshot, or a previously imported configuration (candidate or running). The firewall exports the configuration as an XML file with the Name you specify. • Export configuration version—Select a Version of the running configuration to export as an XML file. The firewall creates a version whenever you commit configuration changes. • Export device state—Export the firewall state information as a bundle. Besides the running configuration, the state information includes device group and template settings pushed from Panorama. If the firewall is a GlobalProtect portal, the information also includes certificate information, a list of satellites, and satellite authentication information. If you replace a firewall or portal, you can restore the exported information on the replacement by importing the state bundle. PAN-OS® Administrator’s Guide Version 10.2 98 ©2025 Palo Alto Networks, Inc.
https://docs.paloaltonetworks.com/content/dam/techdocs/en_US/pdf/pan-os/10-2/pan-os-admin/pan-os-admin.pdf
98
Firewall Administration Revert Firewall Configuration Changes Revert operations replace settings in the current candidate configuration with settings from another configuration. Reverting changes is useful when you want to undo changes to multiple settings as a single operation instead of manually reconfiguring each setting. You can revert pending changes that were made to the firewall configuration since the last commit. The firewall provides the option to filter the pending changes by administrator or location. The locations can be specific virtual systems, shared policies and objects, or shared device and network settings. If you saved a snapshot file for a candidate configuration that is earlier than the current running configuration (see Save and Export Firewall Configurations), you can also revert to that snapshot. Reverting to a snapshot enables you to restore a candidate configuration that existed before the last commit. The firewall automatically saves a new version of the running configuration whenever you commit changes, and you can restore any of those versions. Revert to the current running configuration (file named running-config.xml). This operation undoes changes you made to the candidate configuration since the last commit. To revert all the changes that all administrators made, perform one of the following steps: • Select Device > Setup > Operations, Revert to running configuration, and click Yes to confirm the operation. • Log in to the firewall with an administrative account that is assigned the Superuser role or an Admin Role profile with the Commit For Other Admins privilege enabled. Then select Config > Revert Changes at the top of the web interface, select Revert All Changes and Revert. To revert only specific changes to the candidate configuration: 1. Log in to the firewall with an administrative account that has the role privileges required to revert the desired changes. The privileges that control commit operations also control revert operations. 2. Select Config > Revert Changes at the top of the web interface. 3. Select Revert Changes Made By. 4. To filter the Revert Scope by administrator, click <administrator-name>, select the administrators, and click OK. 5. To filter the Revert Scope by location, clear any locations that you want to exclude. 6. Revert the changes. Revert to the default snapshot of the candidate configuration. This is the snapshot that you create or overwrite when you click Config > Save Changes at the top of the web interface. 1. Select Device > Setup > Operations and Revert to last saved configuration. 2. Click Yes to confirm the operation. 3. (Optional) Click Commit to overwrite the running configuration with the snapshot. PAN-OS® Administrator’s Guide Version 10.2 99 ©2025 Palo Alto Networks, Inc.
https://docs.paloaltonetworks.com/content/dam/techdocs/en_US/pdf/pan-os/10-2/pan-os-admin/pan-os-admin.pdf
99
Firewall Administration Revert to a previous version of the running configuration that is stored on the firewall. The firewall creates a version whenever you commit configuration changes. 1. Select Device > Setup > Operations and Load configuration version. 2. Select a configuration Version and click OK. 3. (Optional) Click Commit to overwrite the running configuration with the version you just restored. Revert to one of the following: • Custom-named version of the running configuration that you previously imported • Custom-named candidate configuration snapshot (instead of the default snapshot) 1. Select Device > Setup > Operations and click Load named configuration snapshot. 2. Select the snapshot Name and click OK. 3. (Optional) Click Commit to overwrite the running configuration with the snapshot. Revert to a running or candidate configuration that you previously exported to an external host. 1. Select Device > Setup > Operations, click Import named configuration snapshot, Browse to the configuration file on the external host, and click OK. 2. Click Load named configuration snapshot, select the Name of the configuration file you just imported, and click OK. 3. (Optional) Click Commit to overwrite the running configuration with the snapshot you just imported. Restore state information that you exported from a firewall. Besides the running configuration, the state information includes device group and template settings pushed from Panorama. If the firewall is a GlobalProtect portal, the information also includes certificate information, a list of satellites, and satellite authentication information. If you replace a firewall or portal, can you can restore the information on the replacement by importing the state bundle. Import state information: 1. Select Device > Setup > Operations, click Import device state, Browse to the state bundle, and click OK. 2. (Optional) Click Commit to apply the imported state information to the running configuration. PAN-OS® Administrator’s Guide Version 10.2 100 ©2025 Palo Alto Networks, Inc.
https://docs.paloaltonetworks.com/content/dam/techdocs/en_US/pdf/pan-os/10-2/pan-os-admin/pan-os-admin.pdf
100
Firewall Administration Manage Firewall Administrators Administrative accounts specify roles and authentication methods for the administrators of Palo Alto Networks firewalls. Every Palo Alto Networks firewall has a predefined default administrative account (admin) that provides full read-write access (also known as superuser access) to the firewall. As a best practice, create a separate administrative account for each person who needs access to the administrative or reporting functions of the firewall. This enables you to better protect the firewall from unauthorized configuration and enables logging of the actions of individual administrators. Make sure you are following the Adminstrative Access Best Practices to ensure that you are securing administrative access to your firewalls and other security devices in a way that prevents successful attacks. • Administrative Role Types • Configure an Admin Role Profile • Administrative Authentication • Configure Administrative Accounts and Authentication • Configure Tracking of Administrator Activity Administrative Role Types A role defines the type of access that an administrator has to the firewall. The Administrator Types are: • Role Based—Custom roles you can configure for more granular access control over the functional areas of the web interface, CLI, and XML API. For example, you can create an Admin Role profile for your operations staff that provides access to the firewall and network configuration areas of the web interface and a separate profile for your security administrators that provides access to security policy definitions, logs, and reports. On a firewall with multiple virtual systems, you can select whether the role defines access for all virtual systems or specific virtual systems. When new features are added to the product, you must update the roles with corresponding access privileges: the firewall does not automatically add new features to custom role definitions. For details on the privileges you can configure for custom administrator roles, see Reference: Web Interface Administrator Access. • Dynamic—Built-in roles that provide access to the firewall. When new features are added, the firewall automatically updates the definitions of dynamic roles; you never need to manually update them. The following table lists the access privileges associated with dynamic roles. Dynamic Role Privileges Superuser Full access to the firewall, including defining new administrator accounts and virtual systems. You must have Superuser privileges to create an administrative user with Superuser privileges. PAN-OS® Administrator’s Guide Version 10.2 101 ©2025 Palo Alto Networks, Inc.
https://docs.paloaltonetworks.com/content/dam/techdocs/en_US/pdf/pan-os/10-2/pan-os-admin/pan-os-admin.pdf
101
Firewall Administration Dynamic Role Privileges Superuser (read-only) Read-only access to the firewall (enables the XML API in a read-only state). Device administrator Full access to all firewall settings except for defining new accounts or virtual systems. Device administrator (read￾only) Read-only access to all firewall settings except password profiles (no access) and administrator accounts (only the logged in account is visible). Virtual system administrator Access to selected virtual systems on the firewall to create and manage specific aspects of virtual systems. A virtual system administrator doesn’t have access to network interfaces, VLANs, virtual wires, virtual routers, IPSec tunnels, GRE tunnels, DHCP, DNS Proxy, QoS, LLDP, or network profiles. Virtual system administrator (read-only) Read-only access to selected virtual systems on the firewall and specific aspects of virtual systems. A virtual system administrator with read-only access doesn’t have access to network interfaces, VLANs, virtual wires, virtual routers, IPSec tunnels, GRE tunnels, DHCP, DNS Proxy, QoS, LLDP, or network profiles. Configure an Admin Role Profile Admin Role profiles enable you to define granular administrative access privileges to ensure protection for sensitive company information and privacy for end users. Follow the principle of least privilege access to create Admin Role profiles that enable administrators to access only the areas of the management interface that they need to access to perform their jobs and follow Administrative Access Best Practices. You can create an Admin Role profile, specify that the role applies to Virtual System, and then select Web UI, for example, and choose the part of the configuration that the administrator can control within a virtual system. Click OK to save the Admin Role Profile. Then select Device > Administrators, name the role, select Role Based, enter the name of the Admin Role Profile, and select the virtual system that the administrator can control. The MGT interface doesn't give full access to the firewall; access is controlled by the Admin Role. If the Admin Role Profile is based on Virtual System, that administrator won't have control over a virtual router. Only a subset of the Network options are available in a Virtual System role, and virtual router isn't one of the included options. If you want virtual router available in an Admin Role Profile, the role must be Device, not Virtual System. (You can define a superuser Administrator to have both Virtual System and Virtual Router access.) PAN-OS® Administrator’s Guide Version 10.2 102 ©2025 Palo Alto Networks, Inc.
https://docs.paloaltonetworks.com/content/dam/techdocs/en_US/pdf/pan-os/10-2/pan-os-admin/pan-os-admin.pdf
102
Firewall Administration You can create a second Admin Role Profile, specify that the role applies to Device, and then select portions under Network, such as Virtual Routers. Name the Admin Role Profile, and then apply it to a different administrator. You might have different departments that have different functions. Based on the login, the administrator gets the right to control the objects enabled in the Admin Role Profile. In summary, you can't define a Virtual System Admin Role profile that includes routing (Virtual Router). You can create two accounts to have these separate roles and assign them to two different users. An Administrator account can have only one Admin Role profile. The MGT interface can have role-based access; it doesn't strictly provide full access to the device. The login account (Admin Role) is what gives a user rights or limited access to the objects, not the MGT interface. STEP 1 | Select Device > Admin Roles and click Add. STEP 2 | Enter a Name to identify the role. STEP 3 | For the scope of the Role, select Device or Virtual System. STEP 4 | In the Web UI and REST API tabs, click the icon for each functional area to toggle it to the desired setting: Enable, Read Only or Disable. For the XML API tab select, Enable or Disable. For details on the Web UI options, see Web Interface Access Privileges. STEP 5 | Select the Command Line tab and select a CLI access option. The Role scope controls the available options: • Device role: • None—CLI access is not permitted (default). • superuser—Full access. Can define new administrator accounts and virtual systems. Only a superuser can create administrator users with superuser privileges. • superreader—Full read-only access. • deviceadmin—Full access to all settings except defining new accounts or virtual systems. • devicereader—Read-only access to all settings except password profiles (no access) and administrator accounts (only the logged in account is visible). • Virtual System role: • None—Access is not permitted (default). • vsysadmin—Access to specific virtual systems to create and manage specific aspects of virtual systems. Does not enable access to firewall-level or network-level functions including static and dynamic routing, interface IP addresses, IPSec tunnels, VLANs, virtual wires, virtual routers, GRE tunnels, DCHP, DNS Proxy, QoS, LLDP, or network profiles. • vsysreader—Read-only access to specific virtual systems to specific aspects of virtual systems. Does not enable access to firewall-level or network-level functions including static and dynamic routing, interface IP addresses, IPSec tunnels, VLANs, virtual wires, virtual routers, GRE tunnels, DCHP, DNS Proxy, QoS, LLDP, or network profiles. STEP 6 | Click OK to save the profile. PAN-OS® Administrator’s Guide Version 10.2 103 ©2025 Palo Alto Networks, Inc.
https://docs.paloaltonetworks.com/content/dam/techdocs/en_US/pdf/pan-os/10-2/pan-os-admin/pan-os-admin.pdf
103
Firewall Administration STEP 7 | Assign the role to an administrator. See Configure a Firewall Administrator Account. Example Admin Role Profile Construction This example shows an Admin Role profile for a Security Operations Center (SOC) manager who needs access to investigate potential issues. The SOC Manager needs read access to many areas of the firewall, but generally doesn’t need write access. The example covers all four of the Admin Role Profile’s tabs and each step describes why the profile enables or disables a particular area of access to the SOC manager. This is an example profile for a fictional SOC manager. Configure Admin Role profiles for your administrators based on the functions they manage and the access required to do their job. Do not enable unnecessary access. Create separate profiles for each administrative group that shares the same duties and for administrators who have unique duties. Each administrator should have the exact level of access required to perform their duties and no access beyond that. STEP 1 | Configure Web UI access permissions. Each snip of the Web UI screen shows a different area of Web UI permissions. Permissions are listed by firewall tab, in the order you see the tabs in the Web UI, followed by permissions for other actions. The Dashboard, ACC, and Monitor > Logs areas of the firewall don’t contain configuration elements—all of the objects are informational (you can only toggle them between enable and PAN-OS® Administrator’s Guide Version 10.2 104 ©2025 Palo Alto Networks, Inc.
https://docs.paloaltonetworks.com/content/dam/techdocs/en_US/pdf/pan-os/10-2/pan-os-admin/pan-os-admin.pdf
104
Firewall Administration disable because they are already read only). Because the SOC Manager needs to investigate potential issues, the SOC Manager needs access to the information on these tabs. The profile name and description make it easy to understand the profile’s objective. This snip doesn’t show all of the Logs permissions, but all of them are enabled for this profile. The next snip shows permissions for more informational objects on the Monitor tab. The SOC Manager uses these tools to investigate potential issues and therefore requires access. The next two snips show permissions for PDF Reports, Custom Reports, and predefined reports on the Monitor tab. While the SOC Manager needs access to PDF reports to gather information, in this example, the SOC Manager does not need to configure reports, so access is set to read-only (summary reports are not configurable). However, the SOC Manager needs to manage custom reports to investigate specific potential issues, so full access permissions are PAN-OS® Administrator’s Guide Version 10.2 105 ©2025 Palo Alto Networks, Inc.
https://docs.paloaltonetworks.com/content/dam/techdocs/en_US/pdf/pan-os/10-2/pan-os-admin/pan-os-admin.pdf
105
Firewall Administration granted for all custom reports (including those not shown in the snip). Finally the SOC Manager requires access to predefined reports for investigating potential issues. Because the SOC Manager is an investigator and not an administrator who configures the firewall, permissions for the Policies tab are read-only, with the exception of resetting the rule hit count. Resetting the rule hit count is not one of the SOC Manager’s duties (and changing the hit count could adversely affect or confuse other administrators), so access is disabled. Read access enables the SOC Manager to investigate the construction of a policy that the SOC Manager suspects may have caused an issue. Permissions for the Objects tab are also read-only for the same reason—the SOC Manager’s job doesn’t require configuration, so no configuration permissions are assigned. For areas that aren’t included in the SOC Manager’s duties, access is disabled. In this example, the SOC Manager has read-only access to investigate objects configurations for all objects except URL PAN-OS® Administrator’s Guide Version 10.2 106 ©2025 Palo Alto Networks, Inc.
https://docs.paloaltonetworks.com/content/dam/techdocs/en_US/pdf/pan-os/10-2/pan-os-admin/pan-os-admin.pdf
106
Firewall Administration Filtering, SD-WAN Link Management and Schedules, which are under the control of different administrators in this example. For Network tab permissions, the scenario is similar: the SOC Manager doesn’t need to configure any of the objects, but may need information to investigate issues, so read-only access is assigned to the areas that the SOC Manager may need to investigate. In this example, PAN-OS® Administrator’s Guide Version 10.2 107 ©2025 Palo Alto Networks, Inc.
https://docs.paloaltonetworks.com/content/dam/techdocs/en_US/pdf/pan-os/10-2/pan-os-admin/pan-os-admin.pdf
107
Firewall Administration access is disabled for QoS, LLDP, Network Profiles, or SD-WAN Interface profiles because these items are not part of the SOC Manager’s duties. In this example, the SOC Manager needs no access to the Device tab capabilities for investigative purposes, so all Device tab permissions are blocked. In addition, investigation doesn’t require commit actions or access to any of the remaining actions, so those permissions are also blocked. PAN-OS® Administrator’s Guide Version 10.2 108 ©2025 Palo Alto Networks, Inc.
https://docs.paloaltonetworks.com/content/dam/techdocs/en_US/pdf/pan-os/10-2/pan-os-admin/pan-os-admin.pdf
108
Firewall Administration STEP 2 | Configure XML API access permissions. The following snip shows that all XML API permissions are disabled for the SOC Manager because the SOC Manager doesn’t access the firewall using XML API commands. STEP 3 | Configure Command Line (CLI) access permissions. CLI access permissions are read-only for the SOC Manager because the SOC Manager needs access to logs and other monitoring tools and also needs to be able to see certain configurations in order to investigate potential issues. However, the SOC Manager doesn’t configure the firewall, so no configuration permissions are assigned. The access level is set to devicereader instead of to superreader because the SOC Manager doesn’t need access to password profiles or to other administrative accounts. PAN-OS® Administrator’s Guide Version 10.2 109 ©2025 Palo Alto Networks, Inc.
https://docs.paloaltonetworks.com/content/dam/techdocs/en_US/pdf/pan-os/10-2/pan-os-admin/pan-os-admin.pdf
109
Firewall Administration STEP 4 | Configure REST API access permissions. The SOC Manager doesn’t access the firewall using REST API commands, so all REST API access is disabled. Administrative Authentication You can configure the following types of authentication and authorization (role and access domain assignment) for firewall administrators: Authentication Method Authorization Method Description Local Local The administrative account credentials and authentication mechanisms are local to the firewall. You can define the accounts with or without a user database that is local to the firewall— see Local Authentication for the advantages and disadvantages of using a local database. You use the firewall to manage role assignments but access domains are not supported. For details, see Configure Local or External Authentication for Firewall Administrators. SSH Keys Local The administrative accounts are local to the firewall, but authentication to the CLI is based on SSH keys. You use the firewall to manage role assignments but access domains are not supported. For details, see Configure SSH Key-Based Administrator Authentication to the CLI. Certificates Local The administrative accounts are local to the firewall, but authentication to the web interface is based on client certificates. You use the firewall to manage role assignments but access domains are not supported. For details, see Configure Certificate￾Based Administrator Authentication to the Web Interface. PAN-OS® Administrator’s Guide Version 10.2 110 ©2025 Palo Alto Networks, Inc.
https://docs.paloaltonetworks.com/content/dam/techdocs/en_US/pdf/pan-os/10-2/pan-os-admin/pan-os-admin.pdf
110
Firewall Administration Authentication Method Authorization Method Description External service Local The administrative accounts you define locally on the firewall serve as references to the accounts defined on an external Multi￾Factor Authentication, SAML, Kerberos, TACACS+, RADIUS, or LDAP server. The external server performs authentication. You use the firewall to manage role assignments but access domains are not supported. For details, see Configure Local or External Authentication for Firewall Administrators. External service External service The administrative accounts are defined on an external SAML, TACACS+, or RADIUS server. The server performs both authentication and authorization. For authorization, you define Vendor-Specific Attributes (VSAs) on the TACACS+ or RADIUS server, or SAML attributes on the SAML server. PAN-OS maps the attributes to administrator roles, access domains, user groups, and virtual systems that you define on the firewall. For details, see: • Configure SAML Authentication • Configure TACACS+ Authentication • Configure RADIUS Authentication Configure Administrative Accounts and Authentication If you have already configured an authentication profile (see Configure an Authentication Profile and Sequence) or you don’t require one to authenticate administrators, you are ready to Configure a Firewall Administrator Account. Otherwise, perform one of the other procedures listed below to configure administrative accounts for specific types of authentication. • Configure a Firewall Administrator Account • Configure Local or External Authentication for Firewall Administrators • Configure Certificate-Based Administrator Authentication to the Web Interface • Configure SSH Key-Based Administrator Authentication to the CLI • Configure API Key Lifetime Configure a Firewall Administrator Account Administrative accounts specify roles and authentication methods for firewall administrators. The service that you use to assign roles and perform authentication determines whether you add the accounts on the firewall, on an external server, or both (see Administrative Authentication). If the authentication method relies on a local firewall database or an external service, you must configure an authentication profile before adding an administrative account (see Configure Administrative Accounts and Authentication). If you already configured the authentication profile or you will use Local Authentication without a firewall database, perform the following steps to add an administrative account on the firewall. PAN-OS® Administrator’s Guide Version 10.2 111 ©2025 Palo Alto Networks, Inc.
https://docs.paloaltonetworks.com/content/dam/techdocs/en_US/pdf/pan-os/10-2/pan-os-admin/pan-os-admin.pdf
111
Firewall Administration Create a separate administrative account for each person who needs access to the administrative or reporting functions of the firewall. This enables you to better protect the firewall from unauthorized configuration and enables logging of the actions of individual administrators. Make sure you are following the Adminstrative Access Best Practices to ensure that you are securing administrative access to your firewalls and other security devices in a way that prevents successful attacks. STEP 1 | Modify the number of supported administrator accounts. Configure the total number of supported concurrent administrative accounts sessions for a firewall in the normal operational mode or in FIPS-CC mode. You can allow up to four concurrent administrative account sessions or configure the firewall to support an unlimited number of concurrent administrative account sessions. 1. Select Device > Setup > Management and edit the Authentication Settings. 2. Edit the Max Session Count to specify the number of supported concurrent sessions (range is 0 to 4) allowed for all administrator and user accounts. Enter 0 to configure the firewall to support an unlimited number of administrative accounts. 3. Edit the Max Session Time in minutes for an administrative account. Default is 720 minutes. 4. Click OK. 5. Commit. You can also configure the total number of supported concurrent sessions by logging in to the firewall CLI. admin> configure admin# set deviceconfig setting management admin-session max-session-count <0-4> admin# set deviceconfig setting management admin-session max-session-time <0, 60-1499> admin# commit STEP 2 | Select Device > Administrators and Add an account. STEP 3 | Enter a user Name. If the firewall uses a local user database to authenticate the account, enter the name that you specified for the account in the database (see Add the user group to the local database.) STEP 4 | Select an Authentication Profile or sequence if you configured either for the administrator. If the firewall uses Local Authentication without a local user database for the account, select None (default) and enter a Password. PAN-OS® Administrator’s Guide Version 10.2 112 ©2025 Palo Alto Networks, Inc.
https://docs.paloaltonetworks.com/content/dam/techdocs/en_US/pdf/pan-os/10-2/pan-os-admin/pan-os-admin.pdf
112
Firewall Administration STEP 5 | Select the Administrator Type. If you configured a custom role for the user, select Role Based and select the Admin Role Profile. Otherwise, select Dynamic (default) and select a dynamic role. If the dynamic role is virtual system administrator, add one or more virtual systems that the virtual system administrator is allowed to manage. STEP 6 | (Optional) Select a Password Profile for administrators that the firewall authenticates locally without a local user database. For details, see Define a Password Profile. STEP 7 | Click OK and Commit. Configure Local or External Authentication for Firewall Administrators You can use Local Authentication and External Authentication Services to authenticate administrators who access the firewall. These authentication methods prompt administrators to respond to one or more authentication challenges, such as a login page for entering a username and password. If you use an external service to manage both authentication and authorization (role and access domain assignments), see: • Configure SAML Authentication • Configure TACACS+ Authentication • Configure RADIUS Authentication To authenticate administrators without a challenge-response mechanism, you can Configure Certificate-Based Administrator Authentication to the Web Interface and Configure SSH Key-Based Administrator Authentication to the CLI. STEP 1 | (External authentication only) Enable the firewall to connect to an external server for authenticating administrators. Configure a server profile: • Add a RADIUS server profile. If the firewall integrates with a Multi-Factor Authentication (MFA) service through RADIUS, you must add a RADIUS server profile. In this case, the MFA service provides all the authentication factors (challenges). If the firewall integrates with an MFA service through a vendor API, you can still use a RADIUS server profile for the first factor but MFA server profiles are required for additional factors. • Add an MFA server profile. • Add a TACACS+ server profile. • Add a SAML IdP server profile. You cannot combine Kerberos single sign-on (SSO) with SAML SSO; you can use only one type of SSO service. • Add a Kerberos server profile. • Add an LDAP server profile. PAN-OS® Administrator’s Guide Version 10.2 113 ©2025 Palo Alto Networks, Inc.
https://docs.paloaltonetworks.com/content/dam/techdocs/en_US/pdf/pan-os/10-2/pan-os-admin/pan-os-admin.pdf
113
Firewall Administration STEP 2 | (Local database authentication only) Configure a user database that is local to the firewall. 1. Add the user account to the local database. 2. (Optional) Add the user group to the local database. STEP 3 | (Local authentication only) Define password complexity and expiration settings. These settings help protect the firewall against unauthorized access by making it harder for attackers to guess passwords. 1. Define global password complexity and expiration settings for all local administrators. The settings don’t apply to local database accounts for which you specified a password hash instead of a password (see Local Authentication). 1. Select Device > Setup > Management and edit the Minimum Password Complexity settings. 2. Select Enabled. 3. Define the password settings and click OK. 2. Define a Password Profile. You assign the profile to administrator accounts for which you want to override the global password expiration settings. The profiles are available only to accounts that are not associated with a local database (see Local Authentication). 1. Select Device > Password Profiles and Add a profile. 2. Enter a Name to identify the profile. 3. Define the password expiration settings and click OK. STEP 4 | (Kerberos SSO only) Create a Kerberos keytab. A keytab is a file that contains Kerberos account information for the firewall. To support Kerberos SSO, your network must have a Kerberos infrastructure. STEP 5 | Configure an authentication profile. If your administrative accounts are stored across multiple types of servers, you can create an authentication profile for each type and add all the profiles to an authentication sequence. Configure an Authentication Profile and Sequence. In the authentication profile, specify the Type of authentication service and related settings: • External service—Select the Type of external service and select the Server Profile you created for it. • Local database authentication—Set the Type to Local Database. • Local authentication without a database—Set the Type to None. • Kerberos SSO—Specify the Kerberos Realm and Import the Kerberos Keytab. PAN-OS® Administrator’s Guide Version 10.2 114 ©2025 Palo Alto Networks, Inc.
https://docs.paloaltonetworks.com/content/dam/techdocs/en_US/pdf/pan-os/10-2/pan-os-admin/pan-os-admin.pdf
114
Firewall Administration STEP 6 | Assign the authentication profile or sequence to an administrator account. 1. Configure a Firewall Administrator Account. • Assign the Authentication Profile or sequence that you configured. • (Local database authentication only) Specify the Name of the user account you added to the local database. 2. Commit your changes. 3. (Optional) Test Authentication Server Connectivity to verify that the firewall can use the authentication profile to authenticate administrators. Configure Certificate-Based Administrator Authentication to the Web Interface As a more secure alternative to password-based authentication to the firewall web interface, you can configure certificate-based authentication for administrator accounts that are local to the firewall. Certificate-based authentication involves the exchange and verification of a digital signature instead of a password. Configuring certificate-based authentication for any administrator disables the username/ password logins for all administrators on the firewall; administrators thereafter require the certificate to log in. STEP 1 | Generate a certificate authority (CA) certificate on the firewall. You will use this CA certificate to sign the client certificate of each administrator. Create a Self-Signed Root CA Certificate. Alternatively, Import a Certificate and Private Key from your enterprise CA or a third-party CA. STEP 2 | Configure a certificate profile for securing access to the web interface. Configure a Certificate Profile. • Set the Username Field to Subject. • In the CA Certificates section, Add the CA Certificate you just created or imported. STEP 3 | Configure the firewall to use the certificate profile for authenticating administrators. 1. Select Device > Setup > Management and edit the Authentication Settings. 2. Select the Certificate Profile you created for authenticating administrators and click OK. STEP 4 | Configure the administrator accounts to use client certificate authentication. For each administrator who will access the firewall web interface, Configure a Firewall Administrator Account and select Use only client certificate authentication. If you have already deployed client certificates that your enterprise CA generated, skip to Step 8. Otherwise, go to Step 5. STEP 5 | Generate a client certificate for each administrator. Generate a Certificate. In the Signed By drop-down, select a self-signed root CA certificate. PAN-OS® Administrator’s Guide Version 10.2 115 ©2025 Palo Alto Networks, Inc.
https://docs.paloaltonetworks.com/content/dam/techdocs/en_US/pdf/pan-os/10-2/pan-os-admin/pan-os-admin.pdf
115
Firewall Administration STEP 6 | Export the client certificate. 1. Export a Certificate and Private Key. 2. Commit your changes. The firewall restarts and terminates your login session. Thereafter, administrators can access the web interface only from client systems that have the client certificate you generated. STEP 7 | Import the client certificate into the client system of each administrator who will access the web interface. Refer to your web browser documentation. STEP 8 | Verify that administrators can access the web interface. 1. Open the firewall IP address in a browser on the computer that has the client certificate. 2. When prompted, select the certificate you imported and click OK. The browser displays a certificate warning. 3. Add the certificate to the browser exception list. 4. Click Login. The web interface should appear without prompting you for a username or password. Configure SSH Key-Based Administrator Authentication to the CLI For administrators who use Secure Shell (SSH) to access the CLI of a Palo Alto Networks firewall, SSH keys provide a more secure authentication method than passwords. SSH keys almost eliminate the risk of brute-force attacks, provide the option for two-factor authentication (key and passphrase), and don’t send passwords over the network. SSH keys also enable automated scripts to access the CLI. STEP 1 | Use an SSH key generation tool to create an asymmetric keypair on the client system of the administrator. The supported key formats are IETF SECSH and Open SSH. The supported algorithm is RSA (768-4,096 bits). For the commands to generate the keypair, refer to your SSH client documentation. The public key and private key are separate files. Save both to a location that the firewall can access. For added security, enter a passphrase to encrypt the private key. The firewall prompts the administrator for this passphrase during login. STEP 2 | Configure the administrator account to use public key authentication. 1. Configure a Firewall Administrator Account. • Configure the authentication method to use as a fallback if SSH key authentication fails. If you configured an Authentication Profile for the administrator, select it in the drop-down. If you select None, you must enter a Password and Confirm Password. • Select Use Public Key Authentication (SSH), then Import Key, Browse to the public key you just generated, and click OK. 2. Commit your changes. PAN-OS® Administrator’s Guide Version 10.2 116 ©2025 Palo Alto Networks, Inc.
https://docs.paloaltonetworks.com/content/dam/techdocs/en_US/pdf/pan-os/10-2/pan-os-admin/pan-os-admin.pdf
116
Firewall Administration STEP 3 | Configure the SSH client to use the private key to authenticate to the firewall. Perform this task on the client system of the administrator. For the steps, refer to your SSH client documentation. STEP 4 | Verify that the administrator can access the firewall CLI using SSH key authentication. 1. Use a browser on the client system of the administrator to go to the firewall IP address. 2. Log in to the firewall CLI as the administrator. After entering a username, you will see the following output (the key value is an example): Authenticating with public key “rsa-key-20130415” 3. If prompted, enter the passphrase you defined when creating the keys. Configure API Key Lifetime The API keys on the firewall and Panorama enable you to authenticate API calls to the XML API and REST API. Because these keys grant access to the firewall and Panorama that are critical elements of your security posture, as a best practice, specify an API key lifetime to enforce regular key rotation. After you specify the key lifetime, when you regenerate an API key, each key is unique. In addition to setting a key lifetime that prompts you to regenerate new keys periodically, you can also revoke all currently valid API keys in the event one or more keys are compromised. Revoking keys is a way to expire all currently valid keys. STEP 1 | Select Device > Setup > Management. STEP 2 | Edit Authentication Settings to specify the API Key Lifetime (min). Set the API key lifetime to protect against compromise and to reduce the effects of an accidental exposure. By default, the API key lifetime is set to 0, which means that the keys will never expire. To ensure that your keys are frequently rotated and each key is unique when regenerated, you must specify a validity period that ranges between 1—525600 minutes. Refer to the audit and compliance policies for your enterprise to determine how you should specify the lifetime for which your API keys are valid. STEP 3 | Commit the changes. PAN-OS® Administrator’s Guide Version 10.2 117 ©2025 Palo Alto Networks, Inc.
https://docs.paloaltonetworks.com/content/dam/techdocs/en_US/pdf/pan-os/10-2/pan-os-admin/pan-os-admin.pdf
117
Firewall Administration STEP 4 | (To revoke all API keys) Select Expire all API Keys to reset currently valid API keys. If you have just set a key lifetime and want to reset all API keys to adhere to the new term, you can expire all existing keys. On confirmation, the keys are revoked and you can view the timestamp for when the API Keys Last Expired. Configure Tracking of Administrator Activity Track administrator activity on the firewall web interface and CLI to achieve real time reporting of activity across your firewall. If you have reason to believe an administrator account is compromised, you have a full history of where this administrator account navigated throughout the web interface or what operational commands they executed so you can analyze in detail and respond to all actions the compromised administrator took. When an event occurs, an audit log is generated and forwarded to the specified syslog server each time an administrator navigates through the web interface or when an operational command is executed in the CLI. An audit log is generated for each navigation or commend executed. Take for example if you want to create a new address object. An audit log is generated when you click on Objects, and a second audit log is generated when you then click on Addresses. Audit logs are only visible as syslogs forwarded to your syslog server and cannot be viewed in the firewall web interface. Audit logs can only be forwarded to a syslog server, cannot be forwarded to Strata Logging Service, and are not stored locally on the firewall. STEP 1 | Configure a syslog server profile to forward audit logs of administrator activity on the firewall. This step is required to successfully store audit logs for tracking administrator activity on the firewall. 1. Log in to the firewall web interface. 2. Configure a syslog server profile. PAN-OS® Administrator’s Guide Version 10.2 118 ©2025 Palo Alto Networks, Inc.
https://docs.paloaltonetworks.com/content/dam/techdocs/en_US/pdf/pan-os/10-2/pan-os-admin/pan-os-admin.pdf
118
Firewall Administration STEP 2 | Configure tracking of administrator activity. 1. Select Device > Setup > Management and edit the Logging and Reporting Settings. 2. Select Log Export and Reporting. 3. In the Log Admin Activity section, configure what administrator activity to track. • Operational Commands—Generate an audit log when an administrator executes an operational or debug command in the CLI or an operational command triggered from the web interface. See the CLI Operational Command Hierarchy for a full list of PAN￾OS operational and debug commands. • UI Actions—Generate an audit log when an administrator navigates throughout the web interface. This includes navigation between configuration tabs, as well as individual objects within a tab. For example, an audit log is generated when an administrator navigates from the ACC to the Policies tab. Additionally, an audit log is generated when an administrator navigates from Objects > Addresses to Objects > Tags. • Syslog Server—Select a target syslog server profile to forward audit logs. 4. Click OK 5. Select Commit. PAN-OS® Administrator’s Guide Version 10.2 119 ©2025 Palo Alto Networks, Inc.
https://docs.paloaltonetworks.com/content/dam/techdocs/en_US/pdf/pan-os/10-2/pan-os-admin/pan-os-admin.pdf
119
Firewall Administration Reference: Web Interface Administrator Access You can configure privileges for an entire firewall or for one or more virtual systems (on platforms that support multiple virtual systems). Within that Device or Virtual System designation, you can configure privileges for custom administrator roles, which are more granular than the fixed privileges associated with a dynamic administrator role. Configuring privileges at a granular level ensures that lower level administrators cannot access certain information. You can create custom roles for firewall administrators (see Configure a Firewall Administrator Account), Panorama administrators, or Device Group and Template administrators (refer to the Panorama Administrator’s Guide). You apply the admin role to a custom role-based administrator account where you can assign one or more virtual systems. The following topics describe the privileges you can configure for custom administrator roles. • Web Interface Access Privileges • Panorama Web Interface Access Privileges Web Interface Access Privileges If you want to prevent a role-based administrator from accessing specific tabs on the web interface, you can disable the tab and the administrator will not even see it when logging in using the associated role-based administrative account. For example, you could create an Admin Role Profile for your operations staff that provides access to the Device and Network tabs only and a separate profile for your security administrators that provides access to the Object, Policy, and Monitor tabs. An admin role can apply at the Device level or Virtual System level as defined by the Device or Virtual System radio button. If you select Virtual System, the admin assigned this profile is restricted to the virtual system(s) he or she is assigned to. Furthermore, only the Device > Setup > Services > Virtual Systems tab is available to that admin, not the Global tab. The following topics describe how to set admin role privileges to the different parts of the web interface: • Define Access to the Web Interface Tabs • Provide Granular Access to the Monitor Tab • Provide Granular Access to the Policy Tab • Provide Granular Access to the Objects Tab • Provide Granular Access to the Network Tab • Provide Granular Access to the Device Tab • Define User Privacy Settings in the Admin Role Profile • Restrict Administrator Access to Commit and Validate Functions • Provide Granular Access to Global Settings • Provide Granular Access to the Panorama Tab • Provide Granular Access to Operations Settings PAN-OS® Administrator’s Guide Version 10.2 120 ©2025 Palo Alto Networks, Inc.
https://docs.paloaltonetworks.com/content/dam/techdocs/en_US/pdf/pan-os/10-2/pan-os-admin/pan-os-admin.pdf
120
Firewall Administration Define Access to the Web Interface Tabs The following table describes the top-level access privileges you can assign to an admin role profile (Device > Admin Roles). You can enable, disable, or define read-only access privileges at the top-level tabs in the web interface. Access Level Description Enable Read Only Disable Dashboard Controls access to the Dashboard tab. If you disable this privilege, the administrator will not see the tab and will not have access to any of the Dashboard widgets. Yes No Yes ACC Controls access to the Application Command Center (ACC). If you disable this privilege, the ACC tab will not display in the web interface. Keep in mind that if you want to protect the privacy of your users while still providing access to the ACC, you can disable the Privacy > Show Full IP Addresses option and/or the Show User Names In Logs And Reports option. Yes No Yes Monitor Controls access to the Monitor tab. If you disable this privilege, the administrator will not see the Monitor tab and will not have access to any of the logs, packet captures, session information, reports or to App Scope. For more granular control over what monitoring information the administrator can see, leave the Monitor option enabled and then enable or disable specific nodes on the tab as described in Provide Granular Access to the Monitor Tab. Yes No Yes Policies Controls access to the Policies tab. If you disable this privilege, the administrator will not see the Policies tab and will not have access to any policy information. For more granular control over what policy information the administrator can see, for example to enable access to a specific type of policy or to enable read-only access to policy information, leave the Policies option enabled and then enable or disable specific nodes on the tab as Yes No Yes PAN-OS® Administrator’s Guide Version 10.2 121 ©2025 Palo Alto Networks, Inc.
https://docs.paloaltonetworks.com/content/dam/techdocs/en_US/pdf/pan-os/10-2/pan-os-admin/pan-os-admin.pdf
121
Firewall Administration Access Level Description Enable Read Only Disable described in Provide Granular Access to the Policy Tab. Objects Controls access to the Objects tab. If you disable this privilege, the administrator will not see the Objects tab and will not have access to any objects, security profiles, log forwarding profiles, decryption profiles, or schedules. For more granular control over what objects the administrator can see, leave the Objects option enabled and then enable or disable specific nodes on the tab as described in Provide Granular Access to the Objects Tab. Yes No Yes Network Controls access to the Network tab. If you disable this privilege, the administrator will not see the Network tab and will not have access to any interface, zone, VLAN, virtual wire, virtual router, IPsec tunnel, DHCP, DNS Proxy, GlobalProtect, or QoS configuration information or to the network profiles. For more granular control over what objects the administrator can see, leave the Network option enabled and then enable or disable specific nodes on the tab as described in Provide Granular Access to the Network Tab. Yes No Yes Device Controls access to the Device tab. If you disable this privilege, the administrator will not see the Device tab and will not have access to any firewall-wide configuration information, such as User￾ID, high availability, server profile or certificate configuration information. For more granular control over what objects the administrator can see, leave the Objects option enabled and then enable or disable specific nodes on the tab as described in Provide Granular Access to the Device Tab. Yes No Yes PAN-OS® Administrator’s Guide Version 10.2 122 ©2025 Palo Alto Networks, Inc.
https://docs.paloaltonetworks.com/content/dam/techdocs/en_US/pdf/pan-os/10-2/pan-os-admin/pan-os-admin.pdf
122
Firewall Administration Access Level Description Enable Read Only Disable You cannot enable access to the Admin Roles or Administrators nodes for a role-based administrator even if you enable full access to the Device tab. Provide Granular Access to the Monitor Tab In some cases you might want to enable the administrator to view some but not all areas of the Monitor tab. For example, you might want to restrict operations administrators to the Config and System logs only, because they do not contain sensitive user data. Although this section of the administrator role definition specifies what areas of the Monitor tab the administrator can see, you can also couple privileges in this section with privacy privileges, such as disabling the ability to see usernames in logs and reports. One thing to keep in mind, however, is that any system￾generated reports will still show usernames and IP addresses even if you disable that functionality in the role. For this reason, if you do not want the administrator to see any of the private user information, disable access to the specific reports as detailed in the following table. The following table lists the Monitor tab access levels and the administrator roles for which they are available. Device Group and Template roles can see log data only for the device groups that are within the access domains assigned to those roles. Access Level Description Administrator Role Availability Enable Read Only Disable Monitor Enables or disables access to the Monitor tab. If disabled, the administrator will not see this tab or any of the associated logs or reports. Firewall: Yes Panorama: Yes Device Group/ Template: Yes Yes No Yes Logs Enables or disables access to all log files. You can also leave this privilege enabled and then disable specific logs that you do not want the administrator to see. Keep in mind that if you want to protect the privacy of your users while still providing access to one or more of the logs, you can disable the Privacy > Show Full IP Addresses option Firewall: Yes Panorama: Yes Device Group/ Template: Yes Yes No Yes PAN-OS® Administrator’s Guide Version 10.2 123 ©2025 Palo Alto Networks, Inc.
https://docs.paloaltonetworks.com/content/dam/techdocs/en_US/pdf/pan-os/10-2/pan-os-admin/pan-os-admin.pdf
123
Firewall Administration Access Level Description Administrator Role Availability Enable Read Only Disable and/or the Show User Names In Logs And Reports option. Traffic Specifies whether the administrator can see the traffic logs. Firewall: Yes Panorama: Yes Device Group/ Template: Yes Yes No Yes Threat Specifies whether the administrator can see the threat logs. Firewall: Yes Panorama: Yes Device Group/ Template: Yes Yes No Yes URL Filtering Specifies whether the administrator can see the URL filtering logs. Firewall: Yes Panorama: Yes Device Group/ Template: Yes Yes No Yes WildFire Submissions Specifies whether the administrator can see the WildFire logs. These logs are only available if you have a WildFire subscription. Firewall: Yes Panorama: Yes Device Group/ Template: Yes Yes No Yes Data Filtering Specifies whether the administrator can see the data filtering logs. Firewall: Yes Panorama: Yes Device Group/ Template: Yes Yes No Yes HIP Match Specifies whether the administrator can see the HIP Match logs. HIP Match logs are available only if you have a GlobalProtect license (subscription). Firewall: Yes Panorama: Yes Device Group/ Template: Yes Yes No Yes GlobalProtectSpecifies whether the administrator can see the GlobalProtect logs. These logs are available only if you have a GlobalProtect license (subscription). Firewall: Yes Panorama: Yes Device Group/ Template: Yes Yes No Yes PAN-OS® Administrator’s Guide Version 10.2 124 ©2025 Palo Alto Networks, Inc.
https://docs.paloaltonetworks.com/content/dam/techdocs/en_US/pdf/pan-os/10-2/pan-os-admin/pan-os-admin.pdf
124
Firewall Administration Access Level Description Administrator Role Availability Enable Read Only Disable User-ID Specifies whether the administrator can see the User￾ID logs. Firewall: Yes Panorama: Yes Device Group/ Template: Yes Yes No Yes GTP Specifies whether the mobile network operator can see GTP logs. Firewall: Yes Panorama: Yes Device Group/ Template: Yes Yes No Yes Tunnel Inspection Specifies whether the administrator can see the Tunnel Inspection logs. Firewall: Yes Panorama: Yes Device Group/ Template: Yes Yes No Yes SCTP Specifies whether the mobile network operator can see Stream Control Transmission Protocol (SCTP) logs. You must enable SCTP on Panorama (Device > Setup > Management) before you can control Administrator access to SCTP logs, custom reports, or predefined reports for Panorama and Device Group/ Template. Firewall: Yes Panorama: Yes Device Group/ Template: Yes Yes No Yes ConfigurationSpecifies whether the administrator can see the configuration logs. Firewall: Yes Panorama: Yes Device Group/ Template: No Yes No Yes PAN-OS® Administrator’s Guide Version 10.2 125 ©2025 Palo Alto Networks, Inc.
https://docs.paloaltonetworks.com/content/dam/techdocs/en_US/pdf/pan-os/10-2/pan-os-admin/pan-os-admin.pdf
125
Firewall Administration Access Level Description Administrator Role Availability Enable Read Only Disable System Specifies whether the administrator can see the system logs. Firewall: Yes Panorama: Yes Device Group/ Template: No Yes No Yes Alarms Specifies whether the administrator can see system￾generated alarms. Firewall: Yes Panorama: Yes Device Group/ Template: Yes Yes No Yes AuthenticationSpecifies whether the administrator can see the Authentication logs. Firewall: Yes Panorama: Yes Device Group/ Template: No Yes No Yes Automated Correlation Engine Enables or disables access to the correlation objects and correlated event logs generated on the firewall. Firewall: Yes Panorama: Yes Device Group/ Template: Yes Yes No Yes Correlation Objects Specifies whether the administrator can view and enable/disable the correlation objects. Firewall: Yes Panorama: Yes Device Group/ Template: Yes Yes No Yes Correlated Events Specifies whether the administrator can view and enable/disable the correlation events. Firewall: Yes Panorama: Yes Device Group/ Template: Yes Yes No Yes Packet Capture Specifies whether the administrator can see packet captures (pcaps) from the Monitor tab. Keep in mind that packet captures are raw flow data and as such may contain user IP addresses. Disabling the Show Full IP Addresses privileges will not obfuscate the IP address in the pcap and Firewall: Yes Panorama: No Device Group/ Template: No Yes Yes Yes PAN-OS® Administrator’s Guide Version 10.2 126 ©2025 Palo Alto Networks, Inc.
https://docs.paloaltonetworks.com/content/dam/techdocs/en_US/pdf/pan-os/10-2/pan-os-admin/pan-os-admin.pdf
126
Firewall Administration Access Level Description Administrator Role Availability Enable Read Only Disable you should therefore disable the Packet Capture privilege if you are concerned about user privacy. App Scope Specifies whether the administrator can see the App Scope visibility and analysis tools. Enabling App Scope enables access to all of the App Scope charts. Firewall: Yes Panorama: Yes Device Group/ Template: Yes Yes No Yes Session Browser Specifies whether the administrator can browse and filter current running sessions on the firewall. Keep in mind that the session browser shows raw flow data and as such may contain user IP addresses. Disabling the Show Full IP Addresses privileges will not obfuscate the IP address in the session browser and you should therefore disable the Session Browser privilege if you are concerned about user privacy. Firewall: Yes Panorama: No Device Group/ Template: No Yes No Yes Block IP List Specifies whether the administrator can view the block list (Enable or Read Only) and delete entries from the list (Enable). If you disable the setting, the administrator won’t be able to view or delete entries from the block list. Firewall: Yes Panorama: under Context Switch UI: Yes Template: Yes Yes Yes Yes Botnet Specifies whether the administrator can generate and view botnet analysis reports or view botnet reports in read￾only mode. Disabling the Show Full IP Addresses privileges will not obfuscate the IP address in scheduled botnet reports and you should therefore disable Firewall: Yes Panorama: No Device Group/ Template: No Yes Yes Yes PAN-OS® Administrator’s Guide Version 10.2 127 ©2025 Palo Alto Networks, Inc.
https://docs.paloaltonetworks.com/content/dam/techdocs/en_US/pdf/pan-os/10-2/pan-os-admin/pan-os-admin.pdf
127
Firewall Administration Access Level Description Administrator Role Availability Enable Read Only Disable the Botnet privilege if you are concerned about user privacy. PDF Reports Enables or disables access to all PDF reports. You can also leave this privilege enabled and then disable specific PDF reports that you do not want the administrator to see. Keep in mind that if you want to protect the privacy of your users while still providing access to one or more of the reports, you can disable the Privacy > Show Full IP Addresses option and/or the Show User Names In Logs And Reports option. Firewall: Yes Panorama: Yes Device Group/ Template: Yes Yes No Yes Manage PDF Summary Specifies whether the administrator can view, add or delete PDF summary report definitions. With read-only access, the administrator can see PDF summary report definitions, but not add or delete them. If you disable this option, the administrator can neither view the report definitions nor add/delete them. Firewall: Yes Panorama: Yes Device Group/ Template: Yes Yes Yes Yes PDF Summary Reports Specifies whether the administrator can see the generated PDF Summary reports in Monitor > Reports. If you disable this option, the PDF Summary Reports category will not display in the Reports node. Firewall: Yes Panorama: Yes Device Group/ Template: Yes Yes No Yes User Activity Report Specifies whether the administrator can view, add or delete User Activity report definitions and download the reports. With read-only access, the administrator can see User Activity report definitions, but not add, delete, or download them. If you disable this option, Firewall: Yes Panorama: Yes Device Group/ Template: Yes Yes Yes Yes PAN-OS® Administrator’s Guide Version 10.2 128 ©2025 Palo Alto Networks, Inc.
https://docs.paloaltonetworks.com/content/dam/techdocs/en_US/pdf/pan-os/10-2/pan-os-admin/pan-os-admin.pdf
128
Firewall Administration Access Level Description Administrator Role Availability Enable Read Only Disable the administrator cannot see this category of PDF report. SaaS Application Usage Report Specifies whether the administrator can view, add or delete a SaaS application usage report. With read-only access, the administrator can see the SaaS application usage report definitions, but cannot add or delete them. If you disable this option, the administrator can neither view the report definitions nor add or delete them. Firewall: Yes Panorama: Yes Device Group/ Template: Yes Yes Yes Yes Report Groups Specifies whether the administrator can view, add or delete report group definitions. With read-only access, the administrator can see report group definitions, but not add or delete them. If you disable this option, the administrator cannot see this category of PDF report. Firewall: Yes Panorama: Yes Device Group/ Template: Yes Yes Yes Yes Email Scheduler Specifies whether the administrator can schedule report groups for email. Because the generated reports that get emailed may contain sensitive user data that is not removed by disabling the Privacy > Show Full IP Addresses option and/ or the Show User Names In Logs And Reports options and because they may also show log data to which the administrator does not have access, you should disable the Email Scheduler option if you have user privacy requirements. Firewall: Yes Panorama: Yes Device Group/ Template: Yes Yes Yes Yes Manage Custom Reports Enables or disables access to all custom report functionality. You can also leave this privilege enabled and then Firewall: Yes Panorama: Yes Yes No Yes PAN-OS® Administrator’s Guide Version 10.2 129 ©2025 Palo Alto Networks, Inc.
https://docs.paloaltonetworks.com/content/dam/techdocs/en_US/pdf/pan-os/10-2/pan-os-admin/pan-os-admin.pdf
129
Firewall Administration Access Level Description Administrator Role Availability Enable Read Only Disable disable specific custom report categories that you do not want the administrator to be able to access. Keep in mind that if you want to protect the privacy of your users while still providing access to one or more of the reports, you can disable the Privacy > Show Full IP Addresses option and/or the Show User Names In Logs And Reports option. Reports that are scheduled to run rather than run on demand will show IP address and user information. In this case, be sure to restrict access to the corresponding report areas. In addition, the custom report feature does not restrict the ability to generate reports that contain log data contained in logs that are excluded from the administrator role. Device Group/ Template: Yes Application Statistics Specifies whether the administrator can create a custom report that includes data from the application statistics database. Firewall: Yes Panorama: Yes Device Group/ Template: Yes Yes No Yes Data Filtering Log Specifies whether the administrator can create a custom report that includes data from the Data Filtering logs. Firewall: Yes Panorama: Yes Device Group/ Template: Yes Yes No Yes PAN-OS® Administrator’s Guide Version 10.2 130 ©2025 Palo Alto Networks, Inc.
https://docs.paloaltonetworks.com/content/dam/techdocs/en_US/pdf/pan-os/10-2/pan-os-admin/pan-os-admin.pdf
130
Firewall Administration Access Level Description Administrator Role Availability Enable Read Only Disable Threat Log Specifies whether the administrator can create a custom report that includes data from the Threat logs. Firewall: Yes Panorama: Yes Device Group/ Template: Yes Yes No Yes Threat Summary Specifies whether the administrator can create a custom report that includes data from the Threat Summary database. Firewall: Yes Panorama: Yes Device Group/ Template: Yes Yes No Yes Traffic Log Specifies whether the administrator can create a custom report that includes data from the Traffic logs. Firewall: Yes Panorama: Yes Device Group/ Template: Yes Yes No Yes Traffic Summary Specifies whether the administrator can create a custom report that includes data from the Traffic Summary database. Firewall: Yes Panorama: Yes Device Group/ Template: Yes Yes No Yes URL Log Specifies whether the administrator can create a custom report that includes data from the URL Filtering logs. Firewall: Yes Panorama: Yes Device Group/ Template: Yes Yes No Yes URL Summary Specifies whether the administrator can create a custom report that includes data from the URL Summary database. Firewall: Yes Panorama: Yes Device Group/ Template: Yes Yes No Yes HIP Match Specifies whether the administrator can create a custom report that includes data from the HIP Match logs. Firewall: Yes Panorama: Yes Device Group/ Template: Yes Yes No Yes GlobalProtectSpecifies whether the administrator can create a Firewall: Yes Panorama: Yes Yes No Yes PAN-OS® Administrator’s Guide Version 10.2 131 ©2025 Palo Alto Networks, Inc.
https://docs.paloaltonetworks.com/content/dam/techdocs/en_US/pdf/pan-os/10-2/pan-os-admin/pan-os-admin.pdf
131
Firewall Administration Access Level Description Administrator Role Availability Enable Read Only Disable custom report that includes data from the GlobalProtect logs. Device Group/ Template: Yes WildFire Log Specifies whether the administrator can create a custom report that includes data from the WildFire logs. Firewall: Yes Panorama: Yes Device Group/ Template: Yes Yes No Yes GTP Log Specifies whether the mobile network operator can create a custom report that includes data from GTP logs. Firewall: Yes Panorama: Yes Device Group/ Template: Yes Yes No Yes GTP Summary Specifies whether the mobile network operator can create a custom report that includes data from GTP logs. Firewall: Yes Panorama: Yes Device Group/ Template: Yes Yes No Yes Tunnel Log Specifies whether the administrator can create a custom report that includes data from tunnel inspection logs. Firewall: Yes Panorama: Yes Device Group/ Template: Yes Yes No Yes Tunnel Summary Specifies whether the administrator can create a custom report that includes data from the Tunnel Summary database. Firewall: Yes Panorama: Yes Device Group/ Template: Yes Yes No Yes SCTP Log Specifies whether the mobile network operator can create a custom report that includes data from SCTP logs. Firewall: Yes Panorama: Yes Device Group/ Template: Yes Yes No Yes SCTP Summary Specifies whether the mobile network operator can create a custom report that includes data from the SCTP Summary database. Firewall: Yes Panorama: Yes Device Group/ Template: Yes Yes No Yes PAN-OS® Administrator’s Guide Version 10.2 132 ©2025 Palo Alto Networks, Inc.
https://docs.paloaltonetworks.com/content/dam/techdocs/en_US/pdf/pan-os/10-2/pan-os-admin/pan-os-admin.pdf
132
Firewall Administration Access Level Description Administrator Role Availability Enable Read Only Disable User-ID Specifies whether the administrator can create a custom report that includes data from the User-ID logs. Firewall: Yes Panorama: Yes Device Group/ Template: Yes Yes No Yes AuthenticationSpecifies whether the administrator can create a custom report that includes data from the Authentication logs. Firewall: Yes Panorama: Yes Device Group/ Template: Yes Yes No Yes View Scheduled Custom Reports Specifies whether the administrator can view a custom report that has been scheduled to generate. Firewall: Yes Panorama: Yes Device Group/ Template: Yes Yes No Yes View Predefined Application Reports Specifies whether the administrator can view Application Reports. Privacy privileges do not impact reports available on the Monitor > Reports node and you should therefore disable access to the reports if you have user privacy requirements. Firewall: Yes Panorama: Yes Device Group/ Template: Yes Yes No Yes View Predefined Threat Reports Specifies whether the administrator can view Threat Reports. Privacy privileges do not impact reports available on the Monitor > Reports node and you should therefore disable access to the reports if you have user privacy requirements. Firewall: Yes Panorama: Yes Device Group/ Template: Yes Yes No Yes View Predefined URL Filtering Reports Specifies whether the administrator can view URL Filtering Reports. Privacy privileges do not impact reports available on the Monitor > Reports node and you should therefore disable access to the reports if you have user privacy requirements. Firewall: Yes Panorama: Yes Device Group/ Template: Yes Yes No Yes PAN-OS® Administrator’s Guide Version 10.2 133 ©2025 Palo Alto Networks, Inc.
https://docs.paloaltonetworks.com/content/dam/techdocs/en_US/pdf/pan-os/10-2/pan-os-admin/pan-os-admin.pdf
133
Firewall Administration Access Level Description Administrator Role Availability Enable Read Only Disable View Predefined Traffic Reports Specifies whether the administrator can view Traffic Reports. Privacy privileges do not impact reports available on the Monitor > Reports node and you should therefore disable access to the reports if you have user privacy requirements. Firewall: Yes Panorama: Yes Device Group/ Template: Yes Yes No Yes View Predefined GTP Reports Specifies whether the mobile network operator can view GTP Reports. Privacy privileges do not impact reports available on the Monitor > Reports node and you should therefore disable access to the reports if you have user privacy requirements. Firewall: Yes Panorama: Yes Device Group/ Template: Yes Yes No Yes View Predefined SCTP Reports Specifies whether the mobile network operator can view SCTP Reports. Privacy privileges do not impact reports available on the Monitor > Reports node and you should therefore disable access to the reports if you have user privacy requirements. Firewall: Yes Panorama: Yes Device Group/ Template: Yes Yes No Yes Provide Granular Access to the Policy Tab If you enable the Policy option in the Admin Role profile, you can then enable, disable, or provide read-only access to specific nodes within the tab as necessary for the role you are defining. By enabling access to a specific policy type, you enable the ability to view, add, or delete policy rules. By enabling read-only access to a specific policy, you enable the administrator to view the corresponding policy rule base, but not add or delete rules. Disabling access to a specific type of policy prevents the administrator from seeing the policy rule base. Because policy that is based on specific users (by username or IP address) must be explicitly defined, privacy settings that disable the ability to see full IP addresses or usernames do not apply to the Policy tab. Therefore, you should only allow access to the Policy tab to administrators that are excluded from user privacy restrictions. PAN-OS® Administrator’s Guide Version 10.2 134 ©2025 Palo Alto Networks, Inc.
https://docs.paloaltonetworks.com/content/dam/techdocs/en_US/pdf/pan-os/10-2/pan-os-admin/pan-os-admin.pdf
134
Firewall Administration Access Level Description Enable Read Only Disable Security Enable this privilege to allow the administrator to view, add, and/or delete security rules. Set the privilege to read￾only if you want the administrator to be able to see the rules, but not modify them. To prevent the administrator from seeing the security rulebase, disable this privilege. Yes Yes Yes NAT Enable this privilege to allow the administrator to view, add, and/or delete NAT rules. Set the privilege to read-only if you want the administrator to be able to see the rules, but not modify them. To prevent the administrator from seeing the NAT rulebase, disable this privilege. Yes Yes Yes QoS Enable this privilege to allow the administrator to view, add, and/or delete QoS rules. Set the privilege to read-only if you want the administrator to be able to see the rules, but not modify them. To prevent the administrator from seeing the QoS rulebase, disable this privilege. Yes Yes Yes Policy Based Forwarding Enable this privilege to allow the administrator to view, add, and/or delete Policy-Based Forwarding (PBF) rules. Set the privilege to read-only if you want the administrator to be able to see the rules, but not modify them. To prevent the administrator from seeing the PBF rulebase, disable this privilege. Yes Yes Yes Decryption Enable this privilege to allow the administrator to view, add, and/or delete decryption rules. Set the privilege to read￾only if you want the administrator to be able to see the rules, but not modify them. To prevent the administrator from seeing the decryption rulebase, disable this privilege. Yes Yes Yes Network Packet Broker Enable this privilege to allow the administrator to view, add, and/or delete Network Packet Broker policy rules. Set Yes Yes Yes PAN-OS® Administrator’s Guide Version 10.2 135 ©2025 Palo Alto Networks, Inc.
https://docs.paloaltonetworks.com/content/dam/techdocs/en_US/pdf/pan-os/10-2/pan-os-admin/pan-os-admin.pdf
135
Firewall Administration Access Level Description Enable Read Only Disable the privilege to read-only if you want the administrator to be able to see the rules, but not modify them. To prevent the administrator from seeing the Network Packet Broker rulebase in the interface, disable this privilege. Tunnel Inspection Enable this privilege to allow the administrator to view, add, and/or delete Tunnel Inspection rules. Set the privilege to read-only if you want the administrator to be able to see the rules, but not modify them. To prevent the administrator from seeing the Tunnel Inspection rulebase, disable this privilege. Yes Yes Yes Application Override Enable this privilege to allow the administrator to view, add, and/or delete application override policy rules. Set the privilege to read-only if you want the administrator to be able to see the rules, but not modify them. To prevent the administrator from seeing the application override rulebase, disable this privilege. Yes Yes Yes Authentication Enable this privilege to allow the administrator to view, add, and/or delete Authentication policy rules. Set the privilege to read-only if you want the administrator to be able to see the rules, but not modify them. To prevent the administrator from seeing the Authentication rulebase, disable this privilege. Yes Yes Yes DoS Protection Enable this privilege to allow the administrator to view, add, and/or delete DoS protection rules. Set the privilege to read-only if you want the administrator to be able to see the rules, but not modify them. To prevent the administrator from seeing the DoS protection rulebase, disable this privilege. Yes Yes Yes SD-WAN Enable this privilege to allow the administrator to view, add, and/or delete SD-WAN policy rules. Set the privilege to Yes Yes Yes PAN-OS® Administrator’s Guide Version 10.2 136 ©2025 Palo Alto Networks, Inc.
https://docs.paloaltonetworks.com/content/dam/techdocs/en_US/pdf/pan-os/10-2/pan-os-admin/pan-os-admin.pdf
136
Firewall Administration Access Level Description Enable Read Only Disable read-only if you want the administrator to be able to see the rules, but not modify them. To prevent the administrator from seeing the SD-WAN policy rulebase, disable this privilege. Provide Granular Access to the Objects Tab An object is a container that groups specific policy filter values—such as IP addresses, URLs, applications, or services—for simplified rule definition. For example, an address object might contain specific IP address definitions for the web and application servers in your DMZ zone. When deciding whether to allow access to the objects tab as a whole, determine whether the administrator will have policy definition responsibilities. If not, the administrator probably does not need access to the tab. If, however, the administrator will need to create policy, you can enable access to the tab and then provide granular access privileges at the node level. By enabling access to a specific node, you give the administrator the privilege to view, add, and delete the corresponding object type. Giving read-only access allows the administrator to view the already defined objects, but not create or delete any. Disabling a node prevents the administrator from seeing the node in the web interface. Access Level Description Enable Read Only Disable Addresses Specifies whether the administrator can view, add, or delete address objects for use in security policy. Yes Yes Yes Address Groups Specifies whether the administrator can view, add, or delete address group objects for use in security policy. Yes Yes Yes Regions Specifies whether the administrator can view, add, or delete regions objects for use in security, decryption, or DoS policy. Yes Yes Yes Applications Specifies whether the administrator can view, add, or delete application objects for use in policy. Yes Yes Yes Application Groups Specifies whether the administrator can view, add, or delete application group objects for use in policy. Yes Yes Yes PAN-OS® Administrator’s Guide Version 10.2 137 ©2025 Palo Alto Networks, Inc.
https://docs.paloaltonetworks.com/content/dam/techdocs/en_US/pdf/pan-os/10-2/pan-os-admin/pan-os-admin.pdf
137
Firewall Administration Access Level Description Enable Read Only Disable Application Filters Specifies whether the administrator can view, add, or delete application filters for simplification of repeated searches. Yes Yes Yes Services Specifies whether the administrator can view, add, or delete service objects for use in creating policy rules that limit the port numbers an application can use. Yes Yes Yes Service Groups Specifies whether the administrator can view, add, or delete service group objects for use in security policy. Yes Yes Yes Tags Specifies whether the administrator can view, add, or delete tags that have been defined on the firewall. Yes Yes Yes GlobalProtect Specifies whether the administrator can view, add, or delete HIP objects and profiles. You can restrict access to both types of objects at the GlobalProtect level, or provide more granular control by enabling the GlobalProtect privilege and restricting HIP Object or HIP Profile access. Yes No Yes HIP Objects Specifies whether the administrator can view, add, or delete HIP objects, which are used to define HIP profiles. HIP Objects also generate HIP Match logs. Yes Yes Yes Clientless Apps Specifies whether the administrator can view, add, modify, or delete GlobalProtect VPN Clientless applications. Yes Yes Yes Clientless App Groups Specifies whether the administrator can view, add, modify, or delete GlobalProtect VPN Clientless application groups. Yes Yes Yes HIP Profiles Specifies whether the administrator can view, add, or delete HIP Profiles for use in security policy and/or for generating HIP Match logs. Yes Yes Yes PAN-OS® Administrator’s Guide Version 10.2 138 ©2025 Palo Alto Networks, Inc.
https://docs.paloaltonetworks.com/content/dam/techdocs/en_US/pdf/pan-os/10-2/pan-os-admin/pan-os-admin.pdf
138
Firewall Administration Access Level Description Enable Read Only Disable External Dynamic Lists Specifies whether the administrator can view, add, or delete external dynamic lists for use in security policy. Yes Yes Yes Custom Objects Specifies whether the administrator can see the custom spyware and vulnerability signatures. You can restrict access to either enable or disable access to all custom signatures at this level, or provide more granular control by enabling the Custom Objects privilege and then restricting access to each type of signature. Yes No Yes Data Patterns Specifies whether the administrator can view, add, or delete custom data pattern signatures for use in creating custom Vulnerability Protection profiles. Yes Yes Yes Spyware Specifies whether the administrator can view, add, or delete custom spyware signatures for use in creating custom Vulnerability Protection profiles. Yes Yes Yes Vulnerability Specifies whether the administrator can view, add, or delete custom vulnerability signatures for use in creating custom Vulnerability Protection profiles. Yes Yes Yes URL Category Specifies whether the administrator can view, add, or delete custom URL categories for use in policy. Yes Yes Yes Security Profiles Specifies whether the administrator can see security profiles. You can restrict access to either enable or disable access to all security profiles at this level, or provide more granular control by enabling the Security Profiles privilege and then restricting access to each type of profile. Yes No Yes Antivirus Specifies whether the administrator can view, add, or delete antivirus profiles. Yes Yes Yes PAN-OS® Administrator’s Guide Version 10.2 139 ©2025 Palo Alto Networks, Inc.
https://docs.paloaltonetworks.com/content/dam/techdocs/en_US/pdf/pan-os/10-2/pan-os-admin/pan-os-admin.pdf
139
Firewall Administration Access Level Description Enable Read Only Disable Anti-Spyware Specifies whether the administrator can view, add, or delete Anti-Spyware profiles. Yes Yes Yes Vulnerability Protection Specifies whether the administrator can view, add, or delete Vulnerability Protection profiles. Yes Yes Yes URL Filtering Specifies whether the administrator can view, add, or delete URL filtering profiles. Yes Yes Yes File Blocking Specifies whether the administrator can view, add, or delete file blocking profiles. Yes Yes Yes WildFire Analysis Specifies whether the administrator can view, add, or delete WildFire analysis profiles. Yes Yes Yes Data Filtering Specifies whether the administrator can view, add, or delete data filtering profiles. Yes Yes Yes DoS Protection Specifies whether the administrator can view, add, or delete DoS protection profiles. Yes Yes Yes GTP Protection Specifies whether the mobile network operator can view, add, or delete GTP Protection profiles. Yes Yes Yes SCTP Protection Specifies whether the mobile network operator can view, add, or delete Stream Control Transmission Protocol (SCTP) Protection profiles. Yes Yes Yes Security Profile Groups Specifies whether the administrator can view, add, or delete security profile groups. Yes Yes Yes Log Forwarding Specifies whether the administrator can view, add, or delete log forwarding profiles. Yes Yes Yes Authentication Specifies whether the administrator can view, add, or delete authentication enforcement objects. Yes Yes Yes PAN-OS® Administrator’s Guide Version 10.2 140 ©2025 Palo Alto Networks, Inc.
https://docs.paloaltonetworks.com/content/dam/techdocs/en_US/pdf/pan-os/10-2/pan-os-admin/pan-os-admin.pdf
140
Firewall Administration Access Level Description Enable Read Only Disable Decryption Profile Specifies whether the administrator can view, add, or delete decryption profiles. Yes Yes Yes SD-WAN Link Management Specifies whether the administrator can add or delete Path Quality, SaaS Quality, Traffic Distribution, and Error Correction profiles. Yes No Yes Path Quality Profile Specifies whether the administrator can view, add, or delete SD-WAN Path Quality profiles. Yes Yes Yes SaaS Quality Profile Specifies whether the administrator can view, add, or delete SD-WAN SaaS Quality profiles. Yes Yes Yes Traffic Distribution Profile Specifies whether the administrator can view, add, or delete SD-WAN Traffic Distribution profiles. Yes Yes Yes Error Correction Profile Specifies whether the administrator can view, add, or delete SD-WAN Error Correction profiles. Yes Yes Yes Packet Broker Profile Specifies whether the administrator can view, add, or delete Packet Broker profiles. Yes Yes Yes Schedules Specifies whether the administrator can view, add, or delete schedules for limiting a security policy to a specific date and/or time range. Yes Yes Yes Provide Granular Access to the Network Tab When deciding whether to allow access to the Network tab as a whole, determine whether the administrator will have network administration responsibilities, including GlobalProtect administration. If not, the administrator probably does not need access to the tab. You can also define access to the Network tab at the node level. By enabling access to a specific node, you give the administrator the privilege to view, add, and delete the corresponding network configurations. Giving read-only access allows the administrator to view the already-defined configuration, but not create or delete any. Disabling a node prevents the administrator from seeing the node in the web interface. A number of Routing access levels are visible and apply only when Advanced Routing is enabled for the device, in which case logical routers replace virtual routers. PAN-OS® Administrator’s Guide Version 10.2 141 ©2025 Palo Alto Networks, Inc.
https://docs.paloaltonetworks.com/content/dam/techdocs/en_US/pdf/pan-os/10-2/pan-os-admin/pan-os-admin.pdf
141
Firewall Administration Access Level Description Enable Read Only Disable Interfaces Specifies whether the administrator can view, add, or delete interface configurations. Yes Yes Yes Zones Specifies whether the administrator can view, add, or delete zones. Yes Yes Yes VLANs Specifies whether the administrator can view, add, or delete VLANs. Yes Yes Yes Virtual Wires Specifies whether the administrator can view, add, or delete virtual wires. Yes Yes Yes Virtual Routers Specifies whether the administrator can view, add, modify or delete virtual routers. Yes Yes Yes Routing (Advanced Routing Engine) Specifies whether the administrator can view, add, modify or delete any of the routing fields for an Advanced Routing Engine. Yes Yes Yes Logical Routers (Advanced Routing Engine) Specifies whether the administrator can view, add, modify or delete logical routers. Yes Yes Yes Routing Profiles (Advanced Routing Engine) Specifies whether the administrator can view, add, modify or delete routing profiles. Yes Yes Yes BGP (Advanced Routing Engine) Specifies whether the administrator can view, add, modify or delete BGP routing profiles. Yes Yes Yes BFD (Advanced Routing Engine) Specifies whether the administrator can view, add, modify or delete BFD routing profiles. Yes S Yes Yes OSPF (Advanced Routing Engine) Specifies whether the administrator can view, add, modify or delete OSPFv2 routing profiles. Yes Yes Yes OSPFv3 (Advanced Routing Engine) Specifies whether the administrator can view, add, modify or delete OSPFv3 routing profiles. Yes Yes Yes PAN-OS® Administrator’s Guide Version 10.2 142 ©2025 Palo Alto Networks, Inc.
https://docs.paloaltonetworks.com/content/dam/techdocs/en_US/pdf/pan-os/10-2/pan-os-admin/pan-os-admin.pdf
142
Firewall Administration Access Level Description Enable Read Only Disable RIPv2 (Advanced Routing Engine) Specifies whether the administrator can view, add, modify or delete RIPv2 routing profiles. Yes Yes Yes Filters (Advanced Routing Engine) Specifies whether the administrator can view, add, modify or delete filters. Yes Yes Yes Multicast (Advanced Routing Engine) Specifies whether the administrator can view, add, modify or delete IPv4 multicast routing profiles. Yes Yes Yes IPSec Tunnels Specifies whether the administrator can view, add, modify, or delete IPSec Tunnel configurations. Yes Yes Yes GRE Tunnels Specifies whether the administrator can view, add, modify, or delete GRE Tunnel configurations. Yes Yes Yes DHCP Specifies whether the administrator can view, add, modify, or delete DHCP server and DHCP relay configurations. Yes Yes Yes DNS Proxy Specifies whether the administrator can view, add, modify, or delete DNS proxy configurations. Yes Yes Yes GlobalProtect Specifies whether the administrator can view, add, modify GlobalProtect portal and gateway configurations. You can disable access to the GlobalProtect functions entirely, or you can enable the GlobalProtect privilege and then restrict the role to either the portal or gateway configuration areas. Yes No Yes Portals Specifies whether the administrator can view, add, modify, or delete GlobalProtect portal configurations. Yes Yes Yes Gateways Specifies whether the administrator can view, add, modify, or delete GlobalProtect gateway configurations. Yes Yes Yes PAN-OS® Administrator’s Guide Version 10.2 143 ©2025 Palo Alto Networks, Inc.
https://docs.paloaltonetworks.com/content/dam/techdocs/en_US/pdf/pan-os/10-2/pan-os-admin/pan-os-admin.pdf
143
Firewall Administration Access Level Description Enable Read Only Disable MDM Specifies whether the administrator can view, add, modify, or delete GlobalProtect MDM server configurations. Yes Yes Yes Device Block List Specifies whether the administrator can view, add, modify, or delete device block lists. Yes Yes Yes Clientless Apps Specifies whether the administrator can view, add, modify, or delete GlobalProtect Clientless VPN applications. Yes Yes Yes Clientless App Groups Specifies whether the administrator can view, add, modify, or delete GlobalProtect Clientless VPN application groups. Yes Yes Yes QoS Specifies whether the administrator can view, add, modify, or delete QoS configurations. Yes Yes Yes LLDP Specifies whether the administrator can view add, modify, or delete LLDP configurations. Yes Yes Yes Network Profiles Sets the default state to enable or disable for all of the Network settings described below. Yes No Yes GlobalProtect IPSec Crypto Controls access to the Network Profiles > GlobalProtect IPSec Crypto node. If you disable this privilege, the administrator will not see that node, or configure algorithms for authentication and encryption in VPN tunnels between a GlobalProtect gateway and clients. If you set the privilege to read-only, the administrator can view existing GlobalProtect IPSec Crypto profiles but cannot add or edit them. Yes Yes Yes IKE Gateways Controls access to the Network Profiles > IKE Gateways node. If you disable this privilege, the administrator will not see the IKE Gateways node or define gateways that include the configuration Yes Yes Yes PAN-OS® Administrator’s Guide Version 10.2 144 ©2025 Palo Alto Networks, Inc.
https://docs.paloaltonetworks.com/content/dam/techdocs/en_US/pdf/pan-os/10-2/pan-os-admin/pan-os-admin.pdf
144
Firewall Administration Access Level Description Enable Read Only Disable information necessary to perform IKE protocol negotiation with peer gateway. If the privilege state is set to read-only, you can view the currently configured IKE Gateways but cannot add or edit gateways. IPSec Crypto Controls access to the Network Profiles > IPSec Crypto node. If you disable this privilege, the administrator will not see the Network Profiles > IPSec Crypto node or specify protocols and algorithms for identification, authentication, and encryption in VPN tunnels based on IPSec SA negotiation. If the privilege state is set to read-only, you can view the currently configured IPSec Crypto configuration but cannot add or edit a configuration. Yes Yes Yes IKE Crypto Controls how devices exchange information to ensure secure communication. Specify the protocols and algorithms for identification, authentication, and encryption in VPN tunnels based on IPsec SA negotiation (IKEv1 Phase-1). Yes Yes Yes Monitor Controls access to the Network Profiles > Monitor node. If you disable this privilege, the administrator will not see the Network Profiles > Monitor node or be able to create or edit a monitor profile that is used to monitor IPSec tunnels and monitor a next-hop device for policy￾based forwarding (PBF) rules. If the privilege state is set to read-only, you can view the currently configured monitor profile configuration but cannot add or edit a configuration. Yes Yes Yes Interface Mgmt Controls access to the Network Profiles > Interface Mgmt node. If you disable this privilege, the administrator will not see the Network Profiles > Interface Mgmt Yes Yes Yes PAN-OS® Administrator’s Guide Version 10.2 145 ©2025 Palo Alto Networks, Inc.
https://docs.paloaltonetworks.com/content/dam/techdocs/en_US/pdf/pan-os/10-2/pan-os-admin/pan-os-admin.pdf
145
Firewall Administration Access Level Description Enable Read Only Disable node or be able to specify the protocols that are used to manage the firewall. If the privilege state is set to read￾only, you can view the currently configured Interface management profile configuration but cannot add or edit a configuration. Zone Protection Controls access to the Network Profiles > Zone Protection node. If you disable this privilege, the administrator will not see the Network Profiles > Zone Protection node or be able to configure a profile that determines how the firewall responds to attacks from specified security zones. If the privilege state is set to read-only, you can view the currently configured Zone Protection profile configuration but cannot add or edit a configuration. Yes Yes Yes QoS Profile Controls access to the Network Profiles > QoS node. If you disable this privilege, the administrator will not see the Network Profiles > QoS node or be able to configure a QoS profile that determines how QoS traffic classes are treated. If the privilege state is set to read-only, you can view the currently configured QoS profile configuration but cannot add or edit a configuration. Yes Yes Yes LLDP Profile Controls access to the Network Profiles > LLDP node. If you disable this privilege, the administrator will not see the Network Profiles > LLDP node or be able to configure an LLDP profile that controls whether the interfaces on the firewall can participate in the Link Layer Discovery Protocol. If the privilege state is set to read-only, you can view the currently configured LLDP profile configuration but cannot add or edit a configuration. Yes Yes Yes PAN-OS® Administrator’s Guide Version 10.2 146 ©2025 Palo Alto Networks, Inc.
https://docs.paloaltonetworks.com/content/dam/techdocs/en_US/pdf/pan-os/10-2/pan-os-admin/pan-os-admin.pdf
146
Firewall Administration Access Level Description Enable Read Only Disable BFD Profile Controls access to the Network Profiles > BFD Profile node. If you disable this privilege, the administrator will not see the Network Profiles > BFD Profile node or be able to configure a BFD profile. A Bidirectional Forwarding Detection (BFD) profile allows you to configure BFD settings to apply to one or more static routes or routing protocols. Thus, BFD detects a failed link or BFD peer and allows an extremely fast failover. If the privilege state is set to read-only, you can view the currently configured BFD profile but cannot add or edit a BFD profile. Yes Yes Yes SD-WAN Interface Profile Controls access to the SD-WAN Interface Profile node. If you disable this privilege, the administrator will not see the SD￾WAN Interface Profile node or be able to configure an SD-WAN Interface Profile. An SD-WAN Interface Profile defines the characteristics of ISP connections and specifies the link speed and how frequently the firewall monitors the link. If the privilege state is set to read-only, you can view the currently configured SD￾WAN Interface Profile but cannot add or edit one. Yes Yes Yes Provide Granular Access to the Device Tab To define granular access privileges for the Device tab, when creating or editing an admin role profile (Device > Admin Roles), scroll down to the Device node on the WebUI tab. Access Level Description Enable Read Only Disable Setup Controls access to the Setup node. If you disable this privilege, the administrator will not see the Setup node or have access to firewall-wide setup configuration information, such as Management, Yes Yes Yes PAN-OS® Administrator’s Guide Version 10.2 147 ©2025 Palo Alto Networks, Inc.
https://docs.paloaltonetworks.com/content/dam/techdocs/en_US/pdf/pan-os/10-2/pan-os-admin/pan-os-admin.pdf
147
Firewall Administration Access Level Description Enable Read Only Disable Operations, Service, Content-ID, WildFire or Session setup information. If the privilege state is set to read-only, you can view the current configuration but cannot make any changes. Management Controls access to the Management node. If you disable this privilege, the administrator will not be able to configure settings such as the hostname, domain, timezone, authentication, logging and reporting, Panorama connections, banner, message, and password complexity settings, and more. If the privilege state is set to read-only, you can view the current configuration but cannot make any changes. Yes Yes Yes Operations Controls access to the Operations and Telemetry and Threat Intelligence nodes. If you disable this privilege, the administrator cannot: • Load firewall configurations. • Save or revert the firewall configuration. This privilege applies only to the Device > Operations options. The Save and Commit privileges control whether the administrator can save or revert configurations through the Config > Save and Config > Revert options. • Create custom logos. • Configure SNMP monitoring of firewall settings. • Configure the Statistics Service feature. • Configure Telemetry and Threat Intelligence settings. Yes Yes Yes PAN-OS® Administrator’s Guide Version 10.2 148 ©2025 Palo Alto Networks, Inc.
https://docs.paloaltonetworks.com/content/dam/techdocs/en_US/pdf/pan-os/10-2/pan-os-admin/pan-os-admin.pdf
148
Firewall Administration Access Level Description Enable Read Only Disable Only administrators with the predefined Superuser role can export or import firewall configurations and shut down the firewall. Only administrators with the predefined Superuser or Device Administrator role can reboot the firewall or restart the dataplane. Administrators with a role that allows access only to specific virtual systems cannot load, save, or revert firewall configurations through the Device > Operations options. Services Controls access to the Services node. If you disable this privilege, the administrator will not be able to configure services for DNS servers, an update server, proxy server, or NTP servers, or set up service routes. If the privilege state is set to read-only, you can view the current configuration but cannot make any changes. Yes Yes Yes Content-ID Controls access to the Content-ID node. If you disable this privilege, the administrator will not be able to configure URL filtering or Content-ID. If the privilege state is set to read-only, you can view the current configuration but cannot make any changes. Yes Yes Yes WildFire Controls access to the WildFire node. If you disable this privilege, the administrator will not be able to configure WildFire settings. If the privilege state is set to read-only, you can view the current configuration but cannot make any changes. Yes Yes Yes Session Controls access to the Session node. If you disable this privilege, the administrator will not be able to configure session settings or timeouts for TCP, UDP Yes Yes Yes PAN-OS® Administrator’s Guide Version 10.2 149 ©2025 Palo Alto Networks, Inc.
https://docs.paloaltonetworks.com/content/dam/techdocs/en_US/pdf/pan-os/10-2/pan-os-admin/pan-os-admin.pdf
149
Firewall Administration Access Level Description Enable Read Only Disable or ICMP, or configure decryption or VPN session settings. If the privilege state is set to read-only, you can view the current configuration but cannot make any changes. HSM Controls access to the HSM node. If you disable this privilege, the administrator will not be able to configure a Hardware Security Module. If the privilege state is set to read-only, you can view the current configuration but cannot make any changes. Yes Yes Yes High Availability Controls access to the High Availability node. If you disable this privilege, the administrator will not see the High Availability node or have access to firewall-wide high availability configuration information such as General setup information or Link and Path Monitoring. If you set this privilege to read-only, the administrator can view High Availability configuration information for the firewall but is not allowed to perform any configuration procedures. Yes Yes Yes Config Audit Controls access to the Config Audit node. If you disable this privilege, the administrator will not see the Config Audit node or have access to any firewall￾wide configuration information. Yes No Yes Administrators Controls access to the Administrators node. This function can only be allowed for read-only access. If you disable this privilege, the administrator will not see the Administrators node or have access to information about their own administrator account. If you set this privilege to read-only, the administrator can view the configuration No Yes Yes PAN-OS® Administrator’s Guide Version 10.2 150 ©2025 Palo Alto Networks, Inc.
https://docs.paloaltonetworks.com/content/dam/techdocs/en_US/pdf/pan-os/10-2/pan-os-admin/pan-os-admin.pdf
150
Firewall Administration Access Level Description Enable Read Only Disable information for their own administrator account. They will not see any information about other administrator accounts configured on the firewall. Admin Roles Controls access to the Admin Roles node. This function can only be allowed for read-only access. If you disable this privilege, the administrator will not see the Admin Roles node or have access to any firewall￾wide information concerning Admin Role profiles configuration. If you set this privilege to read-only, you can view the configuration information for all administrator roles configured on the firewall. No Yes Yes Authentication Profile Controls access to the Authentication Profile node. If you disable this privilege, the administrator will not see the Authentication Profile node or be able to create or edit authentication profiles that specify RADIUS, TACACS +, LDAP, Kerberos, SAML, multi-factor authentication (MFA), or local database authentication settings. PAN-OS uses authentication profiles to authenticate firewall administrators and Authentication Portal or GlobalProtect end users. If you set this privilege to read-only, the administrator can view the Authentication Profile information but cannot create or edit authentication profiles. Yes Yes Yes Authentication Sequence Controls access to the Authentication Sequence node. If you disable this privilege, the administrator will not see the Authentication Sequence node or be able to create or edit an authentication sequence. If you set this privilege to read-only, the administrator can view the Authentication Yes Yes Yes PAN-OS® Administrator’s Guide Version 10.2 151 ©2025 Palo Alto Networks, Inc.
https://docs.paloaltonetworks.com/content/dam/techdocs/en_US/pdf/pan-os/10-2/pan-os-admin/pan-os-admin.pdf
151
Firewall Administration Access Level Description Enable Read Only Disable Profile information but cannot create or edit an authentication sequence. Virtual Systems Controls access to the Virtual Systems node. If you disable this privilege, the administrator will not see or be able to configure virtual systems. If the privilege state is set to read-only, you can view the currently configured virtual systems but cannot add or edit a configuration. Yes Yes Yes Shared Gateways Controls access to the Shared Gateways node. Shared gateways allow virtual systems to share a common interface for external communications. If you disable this privilege, the administrator will not see or be able to configure shared gateways. If the privilege state is set to read-only, you can view the currently configured shared gateways but cannot add or edit a configuration. Yes Yes Yes User Identification Controls access to the User Identification node. If you disable this privilege, the administrator will not see the User Identification node or have access to firewall-wide User Identification configuration information, such as User Mapping, Connection Security, User-ID Agents, Terminal Server Agents, Group Mappings Settings, or Authentication Portal Settings. If you set this privilege to read-only, the administrator can view configuration information for the firewall but is not allowed to perform any configuration procedures. Yes Yes Yes VM Information Source Controls access to the VM Information Source node that allows you to configure the firewall/Windows User-ID agent to collect VM inventory automatically. If you disable this privilege, the administrator Yes Yes Yes PAN-OS® Administrator’s Guide Version 10.2 152 ©2025 Palo Alto Networks, Inc.
https://docs.paloaltonetworks.com/content/dam/techdocs/en_US/pdf/pan-os/10-2/pan-os-admin/pan-os-admin.pdf
152
Firewall Administration Access Level Description Enable Read Only Disable will not see the VM Information Source node. If you set this privilege to read-only, the administrator can view the VM information sources configured but cannot add, edit, or delete any sources. This privilege is not available to Device Group and Template administrators. Certificate Management Sets the default state to enable or disable for all of the Certificate settings described below. Yes No Yes Certificates Controls access to the Certificates node. If you disable this privilege, the administrator will not see the Certificates node or be able to configure or access information regarding Device Certificates or Default Trusted Certificate Authorities. If you set this privilege to read-only, the administrator can view Certificate configuration information for the firewall but is not allowed to perform any configuration procedures. Yes Yes Yes Certificate Profile Controls access to the Certificate Profile node. If you disable this privilege, the administrator will not see the Certificate Profile node or be able to create certificate profiles. If you set this privilege to read-only, the administrator can view Certificate Profiles that are currently configured for the firewall but is not allowed to create or edit a certificate profile. Yes Yes Yes OCSP Responder Controls access to the OCSP Responder node. If you disable this privilege, the administrator will not see the OCSP Responder node or be able to define a server that will be used to verify the revocation status of certificates issues by the firewall. Yes Yes Yes PAN-OS® Administrator’s Guide Version 10.2 153 ©2025 Palo Alto Networks, Inc.
https://docs.paloaltonetworks.com/content/dam/techdocs/en_US/pdf/pan-os/10-2/pan-os-admin/pan-os-admin.pdf
153
Firewall Administration Access Level Description Enable Read Only Disable If you set this privilege to read-only, the administrator can view the OCSP Responder configuration for the firewall but is not allowed to create or edit an OCSP responder configuration. SSL/TLS Service Profile Controls access to the SSL/TLS Service Profile node. If you disable this privilege, the administrator will not see the node or configure a profile that specifies a certificate and a protocol version or range of versions for firewall services that use SSL/TLS. If you set this privilege to read-only, the administrator can view existing SSL/TLS Service profiles but cannot create or edit them. Yes Yes Yes SCEP Controls access to the SCEP node. If you disable this privilege, the administrator will not see the node or be able to define a profile that specifies simple certificate enrollment protocol (SCEP) settings for issuing unique device certificates. If you set this privilege to read-only, the administrator can view existing SCEP profiles but cannot create or edit them. Yes Yes Yes SSL Decryption Exclusion Controls access to the SSL Decryption Exclusion node. If you disable this privilege, the administrator will not see the node or be able to add custom exclusions. If you set this privilege to read-only, the administrator can view existing SSL decryption exceptions but cannot create or edit them. Yes Yes Yes SSH Service Profile Controls access to the SSH Service Profile node. If you disable this privilege, the administrator will be unable to see the node or configure a profile to specify parameters for SSH connections to your Yes Yes Yes PAN-OS® Administrator’s Guide Version 10.2 154 ©2025 Palo Alto Networks, Inc.
https://docs.paloaltonetworks.com/content/dam/techdocs/en_US/pdf/pan-os/10-2/pan-os-admin/pan-os-admin.pdf
154
Firewall Administration Access Level Description Enable Read Only Disable Palo Alto Networks management and high availability (HA) appliances. If you set this privilege to read-only, the administrator can view existing SSH service profiles but cannot edit or create them. Response Pages Controls access to the Response Pages node. If you disable this privilege, the administrator will not see the Response Page node or be able to define a custom HTML message that is downloaded and displayed instead of a requested web page or file. If you set this privilege to read-only, the administrator can view the Response Page configuration for the firewall but is not allowed to create or edit a response page configuration. Yes Yes Yes Log Settings Sets the default state to enable or disable for all of the Log settings described below. Yes No Yes System Controls access to the Log Settings > System node. If you disable this privilege, the administrator cannot see the Log Settings > System node or specify which System logs the firewall forwards to Panorama or external services (such as a syslog server). If you set this privilege to read-only, the administrator can view the Log Settings > System settings for the firewall but cannot add, edit, or delete the settings. Yes Yes Yes Configuration Controls access to the Log Settings > Configuration node. If you disable this privilege, the administrator cannot see the Log Settings > Configuration node or specify which Configuration logs the firewall forwards to Panorama or external services (such as a syslog server). If you set this privilege to read-only, the administrator can view the Log Settings > Yes Yes Yes PAN-OS® Administrator’s Guide Version 10.2 155 ©2025 Palo Alto Networks, Inc.
https://docs.paloaltonetworks.com/content/dam/techdocs/en_US/pdf/pan-os/10-2/pan-os-admin/pan-os-admin.pdf
155
Firewall Administration Access Level Description Enable Read Only Disable Configuration settings for the firewall but cannot add, edit, or delete the settings. User-ID Controls access to the Log Settings > User-ID node. If you disable this privilege, the administrator cannot see the Log Settings > User-ID node or specify which User-ID logs the firewall forwards to Panorama or external services (such as a syslog server). If you set this privilege to read-only, the administrator can view the Log Settings > User-ID settings for the firewall but cannot add, edit, or delete the settings. Yes Yes Yes HIP Match Controls access to the Log Settings > HIP Match node. If you disable this privilege, the administrator cannot see the Log Settings > HIP Match node or specify which Host Information Profile (HIP) match logs the firewall forwards to Panorama or external services (such as a syslog server). HIP match logs provide information on Security policy rules that apply to GlobalProtect endpoints. If you set this privilege to read-only, the administrator can view the Log Settings > HIP settings for the firewall but cannot add, edit, or delete the settings. Yes Yes Yes GlobalProtect Controls access to the Log Settings > GlobalProtect node. If you disable this privilege, the administrator cannot see the Log Settings > GlobalProtect node or specify which GlobalProtect logs the firewall forwards to Panorama or external services (such as a syslog server). If you set this privilege to read-only, the administrator can view the Log Settings > GlobalProtect settings for the firewall but cannot add, edit, or delete the settings. Yes Yes Yes Correlation Controls access to the Log Settings > Correlation node. If you disable this privilege, the administrator cannot see Yes Yes Yes PAN-OS® Administrator’s Guide Version 10.2 156 ©2025 Palo Alto Networks, Inc.
https://docs.paloaltonetworks.com/content/dam/techdocs/en_US/pdf/pan-os/10-2/pan-os-admin/pan-os-admin.pdf
156
Firewall Administration Access Level Description Enable Read Only Disable the Log Settings > Correlation node or add, delete, or modify correlation log forwarding settings or tag source or destination IP addresses. If you set this privilege to read-only, the administrator can view the Log Settings > Correlation settings for the firewall but cannot add, edit, or delete the settings. Alarm Settings Controls access to the Log Settings > Alarm Settings node. If you disable this privilege, the administrator cannot see the Log Settings > Alarm Settings node or configure notifications that the firewall generates when a Security policy rule (or group of rules) is hit repeatedly within a configurable time period. If you set this privilege to read-only, the administrator can view the Log Settings > Alarm Settings for the firewall but cannot edit the settings. Yes Yes Yes Manage Logs Controls access to the Log Settings > Manage Logs node. If you disable this privilege, the administrator cannot see the Log Settings > Manage Logs node or clear the indicated logs. If you set this privilege to read-only, the administrator can view the Log Settings > Manage Logs information but cannot clear any of the logs. Yes Yes Yes Server Profiles Sets the default state to enable or disable for all of the Server Profiles settings described below. Yes No Yes SNMP Trap Controls access to the Server Profiles > SNMP Trap node. If you disable this privilege, the administrator will not see the Server Profiles > SNMP Trap node or be able to specify one or more SNMP trap destinations to be used for system log entries. If you set this privilege to read-only, the administrator can view the Server Profiles Yes Yes Yes PAN-OS® Administrator’s Guide Version 10.2 157 ©2025 Palo Alto Networks, Inc.
https://docs.paloaltonetworks.com/content/dam/techdocs/en_US/pdf/pan-os/10-2/pan-os-admin/pan-os-admin.pdf
157
Firewall Administration Access Level Description Enable Read Only Disable > SNMP Trap Logs information but cannot specify SNMP trap destinations. Syslog Controls access to the Server Profiles > Syslog node. If you disable this privilege, the administrator will not see the Server Profiles > Syslog node or be able to specify one or more syslog servers. If you set this privilege to read-only, the administrator can view the Server Profiles > Syslog information but cannot specify syslog servers. Yes Yes Yes Email Controls access to the Server Profiles > Email node. If you disable this privilege, the administrator will not see the Server Profiles > Email node or be able to configure an email profile that can be used to enable email notification for system and configuration log entries. If you set this privilege to read-only, the administrator can view the Server Profiles > Email information but cannot configure an email server profile. Yes Yes Yes HTTP Controls access to the Server Profiles > HTTP node. If you disable this privilege, the administrator will not see the Server Profiles > HTTP node or be able to configure an HTTP server profile that can be used to enable log forwarding to HTTP destinations any log entries. If you set this privilege to read-only, the administrator can view the Server Profiles > HTTP information but cannot configure an HTTP server profile. Yes Yes Yes Netflow Controls access to the Server Profiles > Netflow node. If you disable this privilege, the administrator will not see the Server Profiles > Netflow node or be able to define a NetFlow server profile, which specifies the frequency of the export along with the NetFlow servers that will receive the exported data. Yes Yes Yes PAN-OS® Administrator’s Guide Version 10.2 158 ©2025 Palo Alto Networks, Inc.
https://docs.paloaltonetworks.com/content/dam/techdocs/en_US/pdf/pan-os/10-2/pan-os-admin/pan-os-admin.pdf
158
Firewall Administration Access Level Description Enable Read Only Disable If you set this privilege to read-only, the administrator can view the Server Profiles > Netflow information but cannot define a Netflow profile. RADIUS Controls access to the Server Profiles > RADIUS node. If you disable this privilege, the administrator will not see the Server Profiles > RADIUS node or be able to configure settings for the RADIUS servers that are identified in authentication profiles. If you set this privilege to read-only, the administrator can view the Server Profiles > RADIUS information but cannot configure settings for the RADIUS servers. Yes Yes Yes SCP Controls access to the Server Profiles > SCP node. If you disable this privilege, the administrator will not see the node or configure settings for SCP servers. If you set this privilege to read-only, the administrator can view existing SCP server profiles but cannot add or edit them. Yes Yes Yes TACACS+ Controls access to the Server Profiles > TACACS+ node. If you disable this privilege, the administrator will not see the node or configure settings for the TACACS+ servers that dynamic content update scheduled reference. If you set this privilege to read-only, the administrator can view existing TACACS + server profiles but cannot add or edit them. Yes Yes Yes LDAP Controls access to the Server Profiles > LDAP node. If you disable this privilege, the administrator will not see the Server Profiles > LDAP node or be able to configure settings for the LDAP servers Yes Yes Yes PAN-OS® Administrator’s Guide Version 10.2 159 ©2025 Palo Alto Networks, Inc.
https://docs.paloaltonetworks.com/content/dam/techdocs/en_US/pdf/pan-os/10-2/pan-os-admin/pan-os-admin.pdf
159
Firewall Administration Access Level Description Enable Read Only Disable to use for authentication by way of authentication profiles. If you set this privilege to read-only, the administrator can view the Server Profiles > LDAP information but cannot configure settings for the LDAP servers. Kerberos Controls access to the Server Profiles > Kerberos node. If you disable this privilege, the administrator will not see the Server Profiles > Kerberos node or configure a Kerberos server that allows users to authenticate natively to a domain controller. If you set this privilege to read-only, the administrator can view the Server Profiles > Kerberos information but cannot configure settings for Kerberos servers. Yes Yes Yes SAML Identity Provider Controls access to the Server Profiles > SAML Identity Provider node. If you disable this privilege, the administrator cannot see the node or configure SAML identity provider (IdP) server profiles. If you set this privilege to read-only, the administrator can view the Server Profiles > SAML Identity Provider information but cannot configure SAML IdP server profiles. Yes Yes Yes Multi Factor Authentication Controls access to the Server Profiles > Multi Factor Authentication node. If you disable this privilege, the administrator cannot see the node or configure multi￾factor authentication (MFA) server profiles. If you set this privilege to read-only, the administrator can view the Server Profiles > SAML Identity Provider information but cannot configure MFA server profiles. PAN-OS® Administrator’s Guide Version 10.2 160 ©2025 Palo Alto Networks, Inc.
https://docs.paloaltonetworks.com/content/dam/techdocs/en_US/pdf/pan-os/10-2/pan-os-admin/pan-os-admin.pdf
160
Firewall Administration Access Level Description Enable Read Only Disable Local User Database Sets the default state to enable or disable for all of the Local User Database settings described below. Yes No Yes Users Controls access to the Local User Database > Users node. If you disable this privilege, the administrator will not see the Local User Database > Users node or set up a local database on the firewall to store authentication information for remote access users, firewall administrators, and Authentication Portal users. If you set this privilege to read-only, the administrator can view the Local User Database > Users information but cannot set up a local database on the firewall to store authentication information. Yes Yes Yes User Groups Controls access to the Local User Database > Users node. If you disable this privilege, the administrator will not see the Local User Database > Users node or be able to add user group information to the local database. If you set this privilege to read-only, the administrator can view the Local User Database > Users information but cannot add user group information to the local database. Yes Yes Yes Access Domain Controls access to the Access Domain node. If you disable this privilege, the administrator will not see the Access Domain node or be able to create or edit an access domain. If you set this privilege to read-only, the administrator can view the Access Domain information but cannot create or edit an access domain. Yes Yes Yes Scheduled Log Export Controls access to the Scheduled Log Export node. If you disable this privilege, the administrator will not see the Scheduled Log Export node or be able Yes No Yes PAN-OS® Administrator’s Guide Version 10.2 161 ©2025 Palo Alto Networks, Inc.
https://docs.paloaltonetworks.com/content/dam/techdocs/en_US/pdf/pan-os/10-2/pan-os-admin/pan-os-admin.pdf
161
Firewall Administration Access Level Description Enable Read Only Disable schedule exports of logs and save them to a File Transfer Protocol (FTP) server in CSV format or use Secure Copy (SCP) to securely transfer data between the firewall and a remote host. If you set this privilege to read-only, the administrator can view the Scheduled Log Export Profile information but cannot schedule the export of logs. Software Controls access to the Software node. If you disable this privilege, the administrator will not see the Software node or view the latest versions of the PAN-OS software available from Palo Alto Networks, read the release notes for each version, and select a release to download and install. If you set this privilege to read-only, the administrator can view the Software information but cannot download or install software. Yes Yes Yes GlobalProtect Client Controls access to the GlobalProtect Client node. If you disable this privilege, the administrator will not see the GlobalProtect Client node or view available GlobalProtect releases, download the code or activate the GlobalProtect app. If you set this privilege to read-only, the administrator can view the available GlobalProtect Client releases but cannot download or install the app software. Yes Yes Yes Dynamic Updates Controls access to the Dynamic Updates node. If you disable this privilege, the administrator will not see the Dynamic Updates node or be able to view the latest updates, read the release notes for each update, or select an update to upload and install. If you set this privilege to read-only, the administrator can view the available Dynamic Updates releases, read the Yes Yes Yes PAN-OS® Administrator’s Guide Version 10.2 162 ©2025 Palo Alto Networks, Inc.
https://docs.paloaltonetworks.com/content/dam/techdocs/en_US/pdf/pan-os/10-2/pan-os-admin/pan-os-admin.pdf
162
Firewall Administration Access Level Description Enable Read Only Disable release notes but cannot upload or install the software. Licenses Controls access to the Licenses node. If you disable this privilege, the administrator will not see the Licenses node or be able to view the licenses installed or activate licenses. If you set this privilege to read-only, the administrator can view the installed Licenses, but cannot perform license management functions. Yes Yes Yes Support Controls access to the Support node. If you disable this privilege, the administrator cannot see the Support node, activate support, or access production and security alerts from Palo Alto Networks. If you set this privilege to read-only, the administrator can see the Support node and access production and security alerts but cannot activate support. Yes Yes Yes Master Key and Diagnostics Controls access to the Master Key and Diagnostics node. If you disable this privilege, the administrator will not see the Master Key and Diagnostics node or be able to specify a master key to encrypt private keys on the firewall. If you set this privilege to read-only, the administrator can view the Master Key and Diagnostics node and view information about master keys that have been specified but cannot add or edit a new master key configuration. Yes Yes Yes Policy Recommendation Controls access to IoT and SaaS policy rule recommendations. If you disable these privileges, the administrator can’t see the Policy Recommendation > IoT node, the Policy Recommendation > SaaS node, or both, depending on which privileges you disable. Yes Yes Yes PAN-OS® Administrator’s Guide Version 10.2 163 ©2025 Palo Alto Networks, Inc.
https://docs.paloaltonetworks.com/content/dam/techdocs/en_US/pdf/pan-os/10-2/pan-os-admin/pan-os-admin.pdf
163
Firewall Administration Access Level Description Enable Read Only Disable If you set these privileges to read-only, the administrator can view the nodes but cannot import policy rules or edit information. Define User Privacy Settings in the Admin Role Profile To define what private end user data an administrator has access to, when creating or editing an admin role profile (Device > Admin Roles), scroll down to the Privacy option on the WebUI tab. Access Level Description Enable Read Only Disable Privacy Sets the default state to enable or disable for all of the privacy settings described below. Yes N/A Yes Show Full IP addresses When disabled, full IP addresses obtained by traffic running through the Palo Alto firewall are not shown in logs or reports. In place of the IP addresses that are normally displayed, the relevant subnet is displayed. Scheduled reports that are displayed in the interface through Monitor > Reports and reports that are sent via scheduled emails will still display full IP addresses. Because of this exception, we recommend that the following settings within the Monitor tab be set to disable: Custom Reports, Application Reports, Threat Reports, URL Filtering Reports, Traffic Reports and Email Scheduler. Yes N/A Yes Show User Names in Logs and Reports When disabled, usernames obtained by traffic running through the Palo Alto Networks firewall are not shown in logs or reports. Columns where the usernames would normally be displayed are empty. Yes N/A Yes PAN-OS® Administrator’s Guide Version 10.2 164 ©2025 Palo Alto Networks, Inc.
https://docs.paloaltonetworks.com/content/dam/techdocs/en_US/pdf/pan-os/10-2/pan-os-admin/pan-os-admin.pdf
164
Firewall Administration Access Level Description Enable Read Only Disable Scheduled reports that are displayed in the interface through Monitor > Reports or reports that are sent via the email scheduler will still display usernames. Because of this exception, we recommend that the following settings within the Monitor tab be set to disable: Custom Reports, Application Reports, Threat Reports, URL Filtering Reports, Traffic Reports and Email Scheduler. View PCAP Files When disabled, packet capture files that are normally available within the Traffic, Threat and Data Filtering logs are not displayed. Yes N/A Yes Restrict Administrator Access to Commit and Validate Functions To restrict access to commit (and revert), save, and validate functions when creating or editing an Admin Role profile (Device > Admin Roles), scroll down to the Commit, Save, and Validate options on the WebUI tab. Access Level Description Enable Read Only Disable Commit Sets the default state to enabled or disabled for all of the commit and revert privileges described below. Yes N/A Yes Device When disabled, an administrator cannot commit or revert changes that any administrator made to the firewall configuration, including his or her own changes. Yes N/A Yes Commit For Other Admins When disabled, an administrator cannot commit or revert changes that other administrators made to the firewall configuration. Yes N/A Yes PAN-OS® Administrator’s Guide Version 10.2 165 ©2025 Palo Alto Networks, Inc.
https://docs.paloaltonetworks.com/content/dam/techdocs/en_US/pdf/pan-os/10-2/pan-os-admin/pan-os-admin.pdf
165
Firewall Administration Access Level Description Enable Read Only Disable Save Sets the default state to enabled or disabled for all of the save operation privileges described below. Yes N/A Yes Partial save When disabled, an administrator cannot save changes that any administrator made to the firewall configuration, including his or her own changes. Yes N/A Yes Save For Other Admins When disabled, an administrator cannot save changes that other administrators made to the firewall configuration. Yes N/A Yes Validate When disabled, an administrator cannot validate a configuration. Yes N/A Yes Provide Granular Access to Global Settings To define what global settings and administrator has access to, when creating or editing an admin role profile (Device > Admin Roles), scroll down to the Global option on the WebUI tab. Access Level Description Enable Read Only Disable Global Sets the default state to enable or disable for all of the global settings described below. In effect, this setting is only for System Alarms at this time. Yes N/A Yes System Alarms When disabled, an administrator cannot view or acknowledge alarms that are generated. Yes N/A Yes Provide Granular Access to the Panorama Tab The following table lists the Panorama tab access levels and the custom Panorama administrator roles for which they are available. Firewall administrators cannot access any of these privileges. Access Level Description Administrator Role Availability Enable Read Only Disable Setup Specifies whether the administrator can view or edit Panorama setup information, Panorama: Yes Yes Yes Yes PAN-OS® Administrator’s Guide Version 10.2 166 ©2025 Palo Alto Networks, Inc.
https://docs.paloaltonetworks.com/content/dam/techdocs/en_US/pdf/pan-os/10-2/pan-os-admin/pan-os-admin.pdf
166
Firewall Administration Access Level Description Administrator Role Availability Enable Read Only Disable including Management, Operations and Telemetry, Services, Content-ID, WildFire, Session, or HSM. If you set the privilege to: • read-only, the administrator can see the information but cannot edit it. • disable this privilege, the administrator cannot see or edit the information. Device Group/ Template: No High Availability Specifies whether the administrator can view and manage high availability (HA) settings for the Panorama management server. If you set this privilege to read-only, the administrator can view HA configuration information for the Panorama management server but can’t manage the configuration. If you disable this privilege, the administrator can’t see or manage HA configuration settings for the Panorama management server. Panorama: Yes Device Group/ Template: No Yes Yes Yes Config Audit Specifies whether the administrator can run Panorama configuration audits. If you disable this privilege, the administrator can’t run Panorama configuration audits. Panorama: Yes Device Group/ Template: No Yes No Yes AdministratorsSpecifies whether the administrator can view Panorama administrator account details. You can’t enable full access to this function: just read￾only access. (Only Panorama administrators with a dynamic Panorama: Yes Device Group/ Template: No No Yes Yes PAN-OS® Administrator’s Guide Version 10.2 167 ©2025 Palo Alto Networks, Inc.
https://docs.paloaltonetworks.com/content/dam/techdocs/en_US/pdf/pan-os/10-2/pan-os-admin/pan-os-admin.pdf
167
Firewall Administration Access Level Description Administrator Role Availability Enable Read Only Disable role can add, edit, or delete Panorama administrators.) With read-only access, the administrator can see information about his or her own account but no other Panorama administrator accounts. If you disable this privilege, the administrator can’t see information about any Panorama administrator account, including his or her own. Admin Roles Specifies whether the administrator can view Panorama administrator roles. You can’t enable full access to this function: just read￾only access. (Only Panorama administrators with a dynamic role can add, edit, or delete custom Panorama roles.) With read-only access, the administrator can see Panorama administrator role configurations but can’t manage them. If you disable this privilege, the administrator can’t see or manage Panorama administrator roles. Panorama: Yes Device Group/ Template: No No Yes Yes Access Domain Specifies whether the administrator can view, add, edit, delete, or clone access domain configurations for Panorama administrators. (This privilege controls access Panorama: Yes Device Group/ Template: No Yes Yes Yes PAN-OS® Administrator’s Guide Version 10.2 168 ©2025 Palo Alto Networks, Inc.
https://docs.paloaltonetworks.com/content/dam/techdocs/en_US/pdf/pan-os/10-2/pan-os-admin/pan-os-admin.pdf
168
Firewall Administration Access Level Description Administrator Role Availability Enable Read Only Disable only to the configuration of access domains, not access to the device groups, templates, and firewall contexts that are assigned to access domains.) If you set this privilege to read-only, the administrator can view Panorama access domain configurations but can’t manage them. If you disable this privilege, the administrator can’t see or manage Panorama access domain configurations. You assign access domains to Device Group and Template administrators so they can access the configuration and monitoring data within the device groups, templates, and firewall contexts that are assigned to those access domains. Authentication Profile Specifies whether the administrator can view, add, edit, delete, or clone authentication profiles for Panorama administrators. If you set this privilege to read￾only, the administrator can view Panorama authentication profiles but can’t manage them. If you disable this privilege, the administrator can’t see or manage Panorama authentication profiles. Panorama: Yes Device Group/ Template: No Yes Yes Yes Authentication Sequence Specifies whether the administrator can view, Panorama: Yes Yes Yes Yes PAN-OS® Administrator’s Guide Version 10.2 169 ©2025 Palo Alto Networks, Inc.
https://docs.paloaltonetworks.com/content/dam/techdocs/en_US/pdf/pan-os/10-2/pan-os-admin/pan-os-admin.pdf
169
Firewall Administration Access Level Description Administrator Role Availability Enable Read Only Disable add, edit, delete, or clone authentication sequences for Panorama administrators. If you set this privilege to read￾only, the administrator can view Panorama authentication sequences but can’t manage them. If you disable this privilege, the administrator can’t see or manage Panorama authentication sequences. Device Group/ Template: No User Identification Specifies whether the administrator can configure User-ID connection security and view, add, edit, or delete data redistribution points (such as User-ID agents). If you set this privilege to read-only, the administrator can view settings for User￾ID connection security and redistribution points but can’t manage the settings. If you disable this privilege, the administrator can’t see or manage settings for User￾ID connection security or redistribution points. Panorama: Yes Device Group/ Template: No Yes Yes Yes Managed Devices Specifies whether the administrator can view, add, edit, or delete firewalls as managed devices, and install software or content updates on them. If you set this privilege to read￾only, the administrator can see managed firewalls but can’t add, delete, tag, or install updates on them. If you disable this privilege, the administrator can’t view, Panorama: Yes Device Group/ Template: Yes Yes (No for Device Group and Template roles) Yes Yes PAN-OS® Administrator’s Guide Version 10.2 170 ©2025 Palo Alto Networks, Inc.
https://docs.paloaltonetworks.com/content/dam/techdocs/en_US/pdf/pan-os/10-2/pan-os-admin/pan-os-admin.pdf
170
Firewall Administration Access Level Description Administrator Role Availability Enable Read Only Disable add, edit, tag, delete, or install updates on managed firewalls. An administrator with Device Deployment privileges can still select Panorama > Device Deployment to install updates on managed firewalls. Templates Specifies whether the administrator can view, edit, add, or delete templates and template stacks. If you set the privilege to read-only, the administrator can see template and stack configurations but can’t manage them. If you disable this privilege, the administrator can’t see or manage template and stack configurations. Panorama: Yes Device Group/ Template: Yes Device Group and Template administrators can see only the templates and stacks that are within the access domains assigned to those administrators. Yes (No for Device Group and Template admins) Yes Yes Device Groups Specifies whether the administrator can view, edit, add, or delete device groups. If you set this privilege to read￾only, the administrator can see Panorama: Yes Device Group/ Template: Yes Yes Yes Yes PAN-OS® Administrator’s Guide Version 10.2 171 ©2025 Palo Alto Networks, Inc.
https://docs.paloaltonetworks.com/content/dam/techdocs/en_US/pdf/pan-os/10-2/pan-os-admin/pan-os-admin.pdf
171
Firewall Administration Access Level Description Administrator Role Availability Enable Read Only Disable device group configurations but can’t manage them. If you disable this privilege, the administrator can’t see or manage device group configurations. Device Group and Template administrators can access only the device groups that are within the access domains assigned to those administrators. Managed Collectors Specifies whether the administrator can view, edit, add, or delete managed collectors. If you set this privilege to read-only, the administrator can see managed collector configurations but can’t manage them. If you disable this privilege, the administrator can’t view, edit, add, or delete managed collector configurations. An administrator with Device Deployment privileges can still use the Panorama > Device Deployment options to install updates on managed collectors. Panorama: Yes Device Group/ Template: No Yes Yes Yes PAN-OS® Administrator’s Guide Version 10.2 172 ©2025 Palo Alto Networks, Inc.
https://docs.paloaltonetworks.com/content/dam/techdocs/en_US/pdf/pan-os/10-2/pan-os-admin/pan-os-admin.pdf
172
Firewall Administration Access Level Description Administrator Role Availability Enable Read Only Disable Collector Groups Specifies whether the administrator can view, edit, add, or delete Collector Groups. If you set this privilege to read￾only, the administrator can see Collector Groups but can’t manage them. If you disable this privilege, the administrator can’t see or manage Collector Groups. Panorama: Yes Device Group/ Template: No Yes Yes Yes VMware Service Manager Specifies whether the administrator can view and edit VMware Service Manager settings. If you set this privilege to read￾only, the administrator can see the settings but can’t perform any related configuration or operational procedures. If you disable this privilege, the administrator can’t see the settings or perform any related configuration or operational procedures. Panorama: Yes Device Group/ Template: No Yes Yes Yes Certificate Management Sets the default state, enabled or disabled, for all of the Panorama certificate management privileges. Panorama: Yes Device Group/ Template: No Yes No Yes Certificates Specifies whether the administrator can view, edit, generate, delete, revoke, renew, or export certificates. This privilege also specifies whether the administrator can import or export HA keys. If you set this privilege to read￾only, the administrator can see Panorama certificates but can’t manage the certificates or HA keys. Panorama: Yes Device Group/ Template: No Yes Yes Yes PAN-OS® Administrator’s Guide Version 10.2 173 ©2025 Palo Alto Networks, Inc.
https://docs.paloaltonetworks.com/content/dam/techdocs/en_US/pdf/pan-os/10-2/pan-os-admin/pan-os-admin.pdf
173
Firewall Administration Access Level Description Administrator Role Availability Enable Read Only Disable If you disable this privilege, the administrator can’t see or manage Panorama certificates or HA keys. Certificate Profile Specifies whether the administrator can view, add, edit, delete or clone Panorama certificate profiles. If you set this privilege to read￾only, the administrator can see Panorama certificate profiles but can’t manage them. If you disable this privilege, the administrator can’t see or manage Panorama certificate profiles. Panorama: Yes Device Group/ Template: No Yes Yes Yes SSL/TLS Service Profile Specifies whether the administrator can view, add, edit, delete or clone SSL/TLS Service profiles. If you set this privilege to read￾only, the administrator can see SSL/TLS Service profiles but can’t manage them. If you disable this privilege, the administrator can’t see or manage SSL/TLS Service profiles. Panorama: Yes Device Group/ Template: No Yes Yes Yes Log Settings Sets the default state, enabled or disabled, for all the log setting privileges. Panorama: Yes Device Group/ Template: No Yes No Yes System Specifies whether the administrator can see and configure the settings that control the forwarding of System logs to external services (syslog, email, SNMP trap, or HTTP servers). If you set this privilege to read￾only, the administrator can Panorama: Yes Device Group/ Template: No Yes Yes Yes PAN-OS® Administrator’s Guide Version 10.2 174 ©2025 Palo Alto Networks, Inc.
https://docs.paloaltonetworks.com/content/dam/techdocs/en_US/pdf/pan-os/10-2/pan-os-admin/pan-os-admin.pdf
174
Firewall Administration Access Level Description Administrator Role Availability Enable Read Only Disable see the System log forwarding settings but can’t manage them. If you disable this privilege, the administrator can’t see or manage the settings. This privilege pertains only to System logs that Panorama and Log Collectors generate. The Collector Groups privilege (Panorama > Collector Groups) controls forwarding for System logs that Log Collectors receive from firewalls. The Device > Log Settings > System privilege controls log forwarding from firewalls directly to external services (without aggregation on Log Collectors). Config Specifies whether the administrator can see and configure the settings that control the forwarding of Config logs to external services (syslog, email, SNMP trap, or HTTP servers). If you set this privilege to read￾only, the administrator can see the Config log forwarding Panorama: Yes Device Group/ Template: No Yes Yes Yes PAN-OS® Administrator’s Guide Version 10.2 175 ©2025 Palo Alto Networks, Inc.
https://docs.paloaltonetworks.com/content/dam/techdocs/en_US/pdf/pan-os/10-2/pan-os-admin/pan-os-admin.pdf
175
Firewall Administration Access Level Description Administrator Role Availability Enable Read Only Disable settings but can’t manage them. If you disable this privilege, the administrator can’t see or manage the settings. This privilege pertains only to Config logs that Panorama and Log Collectors generate. The Collector Groups privilege (Panorama > Collector Groups) controls forwarding for Config logs that Log Collectors receive from firewalls. The Device > Log Settings > Configuration privilege controls log forwarding from firewalls directly to external services (without aggregation on Log Collectors). User-ID Specifies whether the administrator can see and configure the settings that control the forwarding of User￾ID logs to external services (syslog, email, SNMP trap, or HTTP servers). If you set this privilege to read￾only, the administrator can see the Config log forwarding Panorama: Yes Device Group/ Template: No Yes Yes Yes PAN-OS® Administrator’s Guide Version 10.2 176 ©2025 Palo Alto Networks, Inc.
https://docs.paloaltonetworks.com/content/dam/techdocs/en_US/pdf/pan-os/10-2/pan-os-admin/pan-os-admin.pdf
176
Firewall Administration Access Level Description Administrator Role Availability Enable Read Only Disable settings but can’t manage them. If you disable this privilege, the administrator can’t see or manage the settings. This privilege pertains only to User-ID logs that Panorama generates. The Collector Groups privilege (Panorama > Collector Groups) controls forwarding for User-ID logs that Log Collectors receive from firewalls. The Device > Log Settings > User￾ID privilege controls log forwarding from firewalls directly to external services (without aggregation on Log Collectors). HIP Match Specifies whether the administrator can see and configure the settings that control the forwarding of HIP Match logs from a Panorama virtual appliance in Legacy mode to external services (syslog, email, SNMP trap, or HTTP servers). If you set this privilege to read￾only, the administrator can see the forwarding settings of HIP Panorama: Yes Device Group/ Template: No Yes Yes Yes PAN-OS® Administrator’s Guide Version 10.2 177 ©2025 Palo Alto Networks, Inc.
https://docs.paloaltonetworks.com/content/dam/techdocs/en_US/pdf/pan-os/10-2/pan-os-admin/pan-os-admin.pdf
177
Firewall Administration Access Level Description Administrator Role Availability Enable Read Only Disable Match logs but can’t manage them. If you disable this privilege, the administrator can’t see or manage the settings. The Collector Groups privilege (Panorama > Collector Groups) controls forwarding for HIP Match logs that Log Collectors receive from firewalls. The Device > Log Settings > HIP Match privilege controls log forwarding from firewalls directly to external services (without aggregation on Log Collectors). GlobalProtect Specifies whether the administrator can see and configure the settings that control the forwarding of GlobalProtect logs from a Panorama virtual appliance in Legacy mode to external services (syslog, email, SNMP trap, or HTTP servers). If you set this privilege to read￾only, the administrator can see the forwarding settings of GlobalProtect logs but can’t manage them. If you disable this privilege, the administrator can’t see or manage the settings. Panorama: Yes Device Group/ Template: No Yes Yes Yes PAN-OS® Administrator’s Guide Version 10.2 178 ©2025 Palo Alto Networks, Inc.
https://docs.paloaltonetworks.com/content/dam/techdocs/en_US/pdf/pan-os/10-2/pan-os-admin/pan-os-admin.pdf
178
Firewall Administration Access Level Description Administrator Role Availability Enable Read Only Disable The Collector Groups privilege (Panorama > Collector Groups) controls forwarding for GlobalProtect logs that Log Collectors receive from firewalls. The Device > Log Settings > GlobalProtect privilege controls log forwarding from firewalls directly to external services (without aggregation on Log Collectors). Correlation Specifies whether the administrator can see and configure the settings that control the forwarding of Correlation logs from a Panorama virtual appliance in Legacy mode to external services (syslog, email, SNMP trap, or HTTP servers). If you set this privilege to read￾only, the administrator can see the Correlation log forwarding settings but can’t manage them. If you disable this privilege, the administrator can’t see or manage the settings. Panorama: Yes Device Group/ Template: No Yes Yes Yes PAN-OS® Administrator’s Guide Version 10.2 179 ©2025 Palo Alto Networks, Inc.
https://docs.paloaltonetworks.com/content/dam/techdocs/en_US/pdf/pan-os/10-2/pan-os-admin/pan-os-admin.pdf
179
Firewall Administration Access Level Description Administrator Role Availability Enable Read Only Disable The Collector Groups privilege (Panorama > Collector Groups) controls forwarding of Correlation logs from a Panorama M￾Series appliance or Panorama virtual appliance in Panorama mode. Traffic Specifies whether the administrator can see and configure the settings that control the forwarding of Traffic logs from a Panorama virtual appliance in Legacy mode to external services (syslog, email, SNMP trap, or HTTP servers). If you set this privilege to read￾only, the administrator can see the forwarding settings of Traffic logs but can’t manage them. If you disable this privilege, the administrator can’t see or manage the settings. Panorama: Yes Device Group/ Template: No Yes Yes Yes PAN-OS® Administrator’s Guide Version 10.2 180 ©2025 Palo Alto Networks, Inc.
https://docs.paloaltonetworks.com/content/dam/techdocs/en_US/pdf/pan-os/10-2/pan-os-admin/pan-os-admin.pdf
180
Firewall Administration Access Level Description Administrator Role Availability Enable Read Only Disable The Collector Groups privilege (Panorama > Collector Groups) controls forwarding for Traffic logs that Log Collectors receive from firewalls. The Log Forwarding privilege (Objects > Log Forwarding) controls forwarding from firewalls directly to external services (without aggregation on Log Collectors). Threat Specifies whether the administrator can see and configure the settings that control the forwarding of Threat logs from a Panorama virtual appliance in Legacy mode to external services (syslog, email, SNMP trap, or HTTP servers). If you set this privilege to read￾only, the administrator can see the forwarding settings of Threat logs but can’t manage them. If you disable this privilege, the administrator can’t see or manage the settings. Panorama: Yes Device Group/ Template: No Yes Yes Yes PAN-OS® Administrator’s Guide Version 10.2 181 ©2025 Palo Alto Networks, Inc.
https://docs.paloaltonetworks.com/content/dam/techdocs/en_US/pdf/pan-os/10-2/pan-os-admin/pan-os-admin.pdf
181
Firewall Administration Access Level Description Administrator Role Availability Enable Read Only Disable The Collector Groups privilege (Panorama > Collector Groups) controls forwarding for Threat logs that Log Collectors receive from firewalls. The Log Forwarding privilege (Objects > Log Forwarding) controls forwarding from firewalls directly to external services (without aggregation on Log Collectors). WildFire Specifies whether the administrator can see and configure the settings that control the forwarding of WildFire logs from a Panorama virtual appliance in Legacy mode to external services (syslog, email, SNMP trap, or HTTP servers). If you set this privilege to read￾only, the administrator can see the forwarding settings of WildFire logs but can’t manage them. If you disable this privilege, the administrator can’t see or manage the settings. Panorama: Yes Device Group/ Template: No Yes Yes Yes PAN-OS® Administrator’s Guide Version 10.2 182 ©2025 Palo Alto Networks, Inc.
https://docs.paloaltonetworks.com/content/dam/techdocs/en_US/pdf/pan-os/10-2/pan-os-admin/pan-os-admin.pdf
182
Firewall Administration Access Level Description Administrator Role Availability Enable Read Only Disable The Collector Groups privilege (Panorama > Collector Groups) controls the forwarding for WildFire logs that Log Collectors receive from firewalls. The Log Forwarding privilege (Objects > Log Forwarding) controls forwarding from firewalls directly to external services (without aggregation on Log Collectors). Server Profiles Sets the default state, enabled or disabled, for all the server profile privileges. Panorama: Yes Device Group/ Template: No Yes No Yes PAN-OS® Administrator’s Guide Version 10.2 183 ©2025 Palo Alto Networks, Inc.
https://docs.paloaltonetworks.com/content/dam/techdocs/en_US/pdf/pan-os/10-2/pan-os-admin/pan-os-admin.pdf
183
Firewall Administration Access Level Description Administrator Role Availability Enable Read Only Disable These privileges pertain only to the server profiles that are used for forwarding logs from Panorama or Log Collectors and the server profiles that are used for authenticating Panorama administrators. The Device > Server Profiles privileges control access to the server profiles that are used for forwarding logs directly from firewalls to external services and for authenticating firewall administrators. SNMP Trap Specifies whether the administrator can see and configure SNMP trap server profiles. If you set this privilege to read￾only, the administrator can see SNMP trap server profiles but can’t manage them. If you disable this privilege, the administrator can’t see or manage SNMP trap server profiles. Panorama: Yes Device Group/ Template: No Yes Yes Yes Syslog Specifies whether the administrator can see and configure Syslog server profiles. Panorama: Yes Device Group/ Template: No Yes Yes Yes PAN-OS® Administrator’s Guide Version 10.2 184 ©2025 Palo Alto Networks, Inc.
https://docs.paloaltonetworks.com/content/dam/techdocs/en_US/pdf/pan-os/10-2/pan-os-admin/pan-os-admin.pdf
184
Firewall Administration Access Level Description Administrator Role Availability Enable Read Only Disable If you set this privilege to read￾only, the administrator can see Syslog server profiles but can’t manage them. If you disable this privilege, the administrator can’t see or manage Syslog server profiles. Email Specifies whether the administrator can see and configure email server profiles. If you set this privilege to read￾only, the administrator can see email server profiles but can’t manage them. If you disable this privilege, the administrator can’t see or manage email server profiles. Panorama: Yes Device Group/ Template: No Yes Yes Yes RADIUS Specifies whether the administrator can see and configure the RADIUS server profiles that are used to authenticate Panorama administrators. If you set this privilege to read￾only, the administrator can see the RADIUS server profiles but can’t manage them. If you disable this privilege, the administrator can’t see or manage the RADIUS server profiles. Panorama: Yes Device Group/ Template: No Yes Yes Yes TACACS+ Specifies whether the administrator can see and configure the TACACS+ server profiles that are used to authenticate Panorama administrators. If you disable this privilege, the administrator can’t see the node or configure settings for the TACACS+ servers Panorama: Yes Device Group/ Template: No Yes Yes Yes PAN-OS® Administrator’s Guide Version 10.2 185 ©2025 Palo Alto Networks, Inc.
https://docs.paloaltonetworks.com/content/dam/techdocs/en_US/pdf/pan-os/10-2/pan-os-admin/pan-os-admin.pdf
185
Firewall Administration Access Level Description Administrator Role Availability Enable Read Only Disable that authentication profiles reference. If you set this privilege to read￾only, the administrator can view existing TACACS+ server profiles but can’t add or edit them. LDAP Specifies whether the administrator can see and configure the LDAP server profiles that are used to authenticate Panorama administrators. If you set this privilege to read￾only, the administrator can see the LDAP server profiles but can’t manage them. If you disable this privilege, the administrator can’t see or manage the LDAP server profiles. Panorama: Yes Device Group/ Template: No Yes Yes Yes Kerberos Specifies whether the administrator can see and configure the Kerberos server profiles that are used to authenticate Panorama administrators. If you set this privilege to read￾only, the administrator can see the Kerberos server profiles but can’t manage them. If you disable this privilege, the administrator can’t see or manage the Kerberos server profiles. Panorama: Yes Device Group/ Template: No Yes Yes Yes SAML Identity Provider Specifies whether the administrator can see and configure the SAML Identity Provider (IdP) server profiles that are used to authenticate Panorama administrators. Panorama: Yes Device Group/ Template: No Yes Yes Yes PAN-OS® Administrator’s Guide Version 10.2 186 ©2025 Palo Alto Networks, Inc.
https://docs.paloaltonetworks.com/content/dam/techdocs/en_US/pdf/pan-os/10-2/pan-os-admin/pan-os-admin.pdf
186
Firewall Administration Access Level Description Administrator Role Availability Enable Read Only Disable If you set this privilege to read￾only, the administrator can see the SAML IdP server profiles but can’t manage them. If you disable this privilege, the administrator can’t see or manage the SAML IdP server profiles. Scheduled Config Export Specifies whether the administrator can view, add, edit, delete, or clone scheduled Panorama configuration exports. If you set this privilege to read￾only, the administrator can view the scheduled exports but can’t manage them. If you disable this privilege, the administrator can’t see or manage the scheduled exports. Panorama: Yes Device Group/ Template: No Yes No Yes Software Specifies whether the administrator can: view information about software updates installed on the Panorama management server; download, upload, or install the updates; and view the associated release notes. If you set this privilege to read-only, the administrator can view information about Panorama software updates and view the associated release notes but can’t perform any related operations. If you disable this privilege, the administrator can’t see Panorama software updates, see the associated release notes, or perform any related operations. Panorama: Yes Device Group/ Template: No Yes Yes Yes PAN-OS® Administrator’s Guide Version 10.2 187 ©2025 Palo Alto Networks, Inc.
https://docs.paloaltonetworks.com/content/dam/techdocs/en_US/pdf/pan-os/10-2/pan-os-admin/pan-os-admin.pdf
187
Firewall Administration Access Level Description Administrator Role Availability Enable Read Only Disable The Panorama > Device Deployment > Software privilege controls access to PAN-OS software deployed on firewalls and Panorama software deployed on Dedicated Log Collectors. Dynamic Updates Specifies whether the administrator can: view information about content updates installed on the Panorama management server (for example, WildFire updates); download, upload, install, or revert the updates; and view the associated release notes. If you set this privilege to read-only, the administrator can view information about Panorama content updates and view the associated release notes but can’t perform any related operations. If you disable this privilege, the administrator can’t see Panorama content updates, see the associated release notes, or perform any related operations. Panorama: Yes Device Group/ Template: No Yes Yes Yes PAN-OS® Administrator’s Guide Version 10.2 188 ©2025 Palo Alto Networks, Inc.
https://docs.paloaltonetworks.com/content/dam/techdocs/en_US/pdf/pan-os/10-2/pan-os-admin/pan-os-admin.pdf
188
Firewall Administration Access Level Description Administrator Role Availability Enable Read Only Disable The Panorama > Device Deployment > Dynamic Updates privilege controls access to content updates deployed on firewalls and Dedicated Log Collectors. Support Specifies whether the administrator can: view Panorama support license information, product alerts, and security alerts; activate a support license, and manage cases. Only a superuser admin can generate Tech Support files. If you set this privilege to read-only, the administrator can view Panorama support information, product alerts, and security alerts, but can’t activate a support license, generate Tech Support files, or manage cases. If you disable this privilege, the administrator can’t: see Panorama support information, product alerts, or security alerts; activate a support license, generate Tech Support files, or manage cases. Panorama: Yes Device Group/ Template: No Yes Yes Yes Device Deployment Sets the default state, enabled or disabled, for all the privileges associated with deploying licenses and software or content updates to firewalls and Log Collectors. Panorama: Yes Device Group/ Template: Yes Yes No Yes PAN-OS® Administrator’s Guide Version 10.2 189 ©2025 Palo Alto Networks, Inc.
https://docs.paloaltonetworks.com/content/dam/techdocs/en_US/pdf/pan-os/10-2/pan-os-admin/pan-os-admin.pdf
189
Firewall Administration Access Level Description Administrator Role Availability Enable Read Only Disable The Panorama > Software and Panorama > Dynamic Updates privileges control the software and content updates installed on a Panorama management server. Software Specifies whether the administrator can: view information about the software updates installed on firewalls and Log Collectors; download, upload, or install the updates; and view the associated release notes. If you set this privilege to read￾only, the administrator can see information about the software updates and view the associated release notes but can’t deploy the updates to firewalls or dedicated Log Collectors. If you disable this privilege, the administrator can’t see information about the software updates, see the associated release notes, or deploy the updates to firewalls or Dedicated Log Collectors. Panorama: Yes Device Group/ Template: Yes Yes Yes Yes GlobalProtect Client Specifies whether the administrator can: view information about GlobalProtect app software updates on firewalls; download, upload, or activate the updates; and view the associated release notes. Panorama: Yes Device Group/ Template: Yes Yes Yes Yes PAN-OS® Administrator’s Guide Version 10.2 190 ©2025 Palo Alto Networks, Inc.
https://docs.paloaltonetworks.com/content/dam/techdocs/en_US/pdf/pan-os/10-2/pan-os-admin/pan-os-admin.pdf
190
Firewall Administration Access Level Description Administrator Role Availability Enable Read Only Disable If you set this privilege to read-only, the administrator can see information about GlobalProtect app software updates and view the associated release notes but can’t activate the updates on firewalls. If you disable this privilege, the administrator can’t see information about GlobalProtect app software updates, see the associated release notes, or activate the updates on firewalls. Dynamic Updates Specifies whether the administrator can: view information about the content updates (for example, Applications updates) installed on firewalls and Dedicated Log Collectors; download, upload, or install the updates; and view the associated release notes. If you set this privilege to read￾only, the administrator can see information about the content updates and view the associated release notes but can’t deploy the updates to firewalls or Dedicated Log Collectors. If you disable this privilege, the administrator can’t see information about the content updates, see the associated release notes, or deploy the updates to firewalls or Dedicated Log Collectors. Panorama: Yes Device Group/ Template: Yes Yes Yes Yes Licenses Specifies whether the administrator can view, refresh, and activate firewall licenses. Panorama: Yes Device Group/ Template: Yes Yes Yes Yes PAN-OS® Administrator’s Guide Version 10.2 191 ©2025 Palo Alto Networks, Inc.
https://docs.paloaltonetworks.com/content/dam/techdocs/en_US/pdf/pan-os/10-2/pan-os-admin/pan-os-admin.pdf