index int64 0 4.08k | text stringlengths 34 4.9k ⌀ | url stringclasses 38
values |
|---|---|---|
91 | Firewall Administration
STEP 3 | Change the commit scope to Commit Changes Made By to select configuration changes to
commit.
The push scope displays the name of the admin currently logged in. Click the admin name to
view a list of admins who have made configuration changes that have not been committed.
STEP 4 | (Optional) Preview and validate your pending configuration changes to ensure you want to
commit the selected configuration objects.
STEP 5 | Commit.
The Commit Status page displays the administrators that made configuration changes that
were committed and the location of the committed configuration changes.
Export Configuration Table Data
Export policy rules, configuration objects, and IPS signatures from Panorama™ and firewalls
to demonstrate regulatory compliance to external auditors, to conduct periodic reviews of the
firewall configuration, and to generate reports on firewall policies. This prevents you from having
to give auditors direct access to your firewalls and appliances, to take screen shots or to access
the XML API to generate configuration reports. From the web interface, you can export the
configuration table data for policies, objects, network, firewall, and Panorama configurations, as
well as Signature exceptions in the Antivirus, Anti-Spyware, and Vulnerability Protection Security
profiles, in either a PDF or CSV file.
Exporting to a PDF file supports only English descriptions.
Configuration table export works like a print function—you cannot import generated files back
into Panorama or the firewall. When you export data as a PDF file and the table data exceeds
50,000 rows, the data is split in to multiple PDF files (for example, <report-name>_part1.pdf and
<report-name>_part2.pdf) When you export data as a CSV file, the data is exported as a single
file. These export formats allow you to apply filters that match your report criteria and search
within PDF reports to quickly find specific data. Additionally, when you export the configuration
table data, a system log is generated to record the event.
PAN-OS® Administrator’s Guide Version 10.2 92 ©2025 Palo Alto Networks, Inc. | https://docs.paloaltonetworks.com/content/dam/techdocs/en_US/pdf/pan-os/10-2/pan-os-admin/pan-os-admin.pdf |
92 | Firewall Administration
STEP 1 | Launch the Web Interface and identify the configuration data you need to export.
STEP 2 | Apply filters as needed to produce the configuration data you need to export and click PDF/
CSV.
STEP 3 | Configure the Configuration Table Export report:
1. Enter a File Name.
2. Select the File Type.
3. (Optional) Enter a report Description.
4. Confirm the configuration table data matches the filters you applied.
Select Show All Columns to show all filters applied.
STEP 4 | Export the configuration table data.
Configuration table export works like a print function—you cannot import generated files back
in to Panorama or the firewall.
STEP 5 | Select a location to save the exported file.
Use Global Find to Search the Firewall or Panorama Management
Server
Global Find enables you to search the candidate configuration on a firewall or on Panorama
for a particular string, such as an IP address, object name, policy rule name, threat ID, UUID, or
application name. In addition to searching for configuration objects and settings, you can search
by job ID or job type for manual commits that administrators performed or auto-commits that
the firewall or Panorama performed. You can also use Global Find to search for IP addresses
within external dynamic lists. The search results are grouped by category and provide links to
the configuration location in the web interface, so that you can easily find all of the places where
PAN-OS® Administrator’s Guide Version 10.2 93 ©2025 Palo Alto Networks, Inc. | https://docs.paloaltonetworks.com/content/dam/techdocs/en_US/pdf/pan-os/10-2/pan-os-admin/pan-os-admin.pdf |
93 | Firewall Administration
the string is referenced. The search results also help you identify other objects that depend
on or make reference to the search term or string. For example, when deprecating a security
profile enter the profile name in Global Find to locate all instances of the profile and then click
each instance to navigate to the configuration page and make the necessary change. After all
references are removed, you can then delete the profile. You can do this for any configuration
item that has dependencies.
Watch the video.
Global Find does not search dynamic content (such as logs, address ranges, or allocated
DHCP addresses). In the case of DHCP, you can search on a DHCP server attribute, such
as the DNS entry, but you cannot search for individual addresses allocated to users.
Global Find also does not search for individual user or group names identified by User-ID
unless the user/group is defined in a policy. In general, you can only search content that
the firewall writes to the configuration.
Launch Global Find by clicking the Search icon located on the upper right of the web interface.
PAN-OS® Administrator’s Guide Version 10.2 94 ©2025 Palo Alto Networks, Inc. | https://docs.paloaltonetworks.com/content/dam/techdocs/en_US/pdf/pan-os/10-2/pan-os-admin/pan-os-admin.pdf |
94 | Firewall Administration
To access the Global Find from within a configuration area, click the drop-down next to an item
and select Global Find:
For example, click Global Find on a zone named Users to search the candidate configuration
for each location where the zone is referenced. The following screen capture shows the search
results for the zone Users:
Search tips:
• If you initiate a search on a firewall that has multiple virtual systems enabled or if custom
Administrative Role Types are defined, Global Find will only return results for areas of the
firewall in which the administrator has permissions. The same applies to Panorama device
groups.
• Spaces in search terms are handled as AND operations. For example, if you search on
corp policy, the search results include instances where corp and policy exist in the
configuration.
• To find an exact phrase, enclose the phrase in quotation marks.
• Enter no more than five keywords or use an exact phrase match with quotation marks.
• To rerun a previous search, click Search (located on the upper right of the web interface) to
see a list of the last 20 searches. Click an item in the list to rerun that search. Search history
is unique to each administrator account.
• To search for a UUID, you must copy and paste the UUID.
Manage Locks for Restricting Configuration Changes
You can use configuration locks to prevent other administrators from changing the candidate
configuration or from committing configuration changes until you manually remove the lock or
PAN-OS® Administrator’s Guide Version 10.2 95 ©2025 Palo Alto Networks, Inc. | https://docs.paloaltonetworks.com/content/dam/techdocs/en_US/pdf/pan-os/10-2/pan-os-admin/pan-os-admin.pdf |
95 | Firewall Administration
the firewall automatically removes it (after a commit). Locks ensure that administrators don’t
make conflicting changes to the same settings or interdependent settings during concurrent login
sessions.
The firewall queues commit requests and performs them in the order that administrators
initiate the commits. For details, see Commit, Validate, and Preview Firewall
Configuration Changes. To view the status of queued commits, see Manage and
Monitor Administrative Tasks.
View details about current locks.
For example, you can check whether other administrators have set locks and read comments
they entered to explain the locks.
Click the lock at the top of the web interface. An adjacent number indicates the number of
current locks.
Lock a configuration.
1. Click the lock at the top of the web interface.
The lock image varies based on whether existing locks are or are not set.
2. Take a Lock and select the lock Type:
• Config—Blocks other administrators from changing the candidate configuration.
• Commit—Blocks other administrators from committing changes made to the
candidate configuration.
3. (Firewall with multiple virtual systems only) Select a Location to lock the configuration
for a specific virtual system or the Shared location.
4. (Optional) As a best practice, enter a Comment so that other administrators will
understand the reason for the lock.
5. Click OK and Close.
Unlock a configuration.
Only a superuser or the administrator who locked the configuration can manually unlock it.
However, the firewall automatically removes a lock after completing the commit operation.
1. Click the lock at the top of the web interface.
2. Select the lock entry in the list.
3. Click Remove Lock, OK, and Close.
Configure the firewall to automatically apply a commit lock when you change the candidate
configuration. This setting applies to all administrators.
1. Select Device > Setup > Management and edit the General Settings.
2. Select Automatically Acquire Commit Lock and then click OK and Commit.
PAN-OS® Administrator’s Guide Version 10.2 96 ©2025 Palo Alto Networks, Inc. | https://docs.paloaltonetworks.com/content/dam/techdocs/en_US/pdf/pan-os/10-2/pan-os-admin/pan-os-admin.pdf |
96 | Firewall Administration
Manage Configuration Backups
The running configuration on the firewall comprises all settings you have committed and that
are therefore active, such as policy rules that currently block or allow various types of traffic
in your network. The candidate configuration is a copy of the running configuration plus any
inactive changes that you made after the last commit. Saving backup versions of the running or
candidate configuration enables you to later restore those versions. For example, if a commit
validation shows that the current candidate configuration has more errors than you want to
fix, you can restore a previous candidate configuration. You can also revert to the current
running configuration without saving a backup first. If you need to export specific parts of the
configuration for internal review or audit, you can Export Configuration Table Data.
See Commit, Validate, and Preview Firewall Configuration Changes for details about
commit operations.
• Save and Export Firewall Configurations
• Revert Firewall Configuration Changes
Save and Export Firewall Configurations
Saving a backup of the candidate configuration to persistent storage on the firewall enables
you to later revert to that backup (see Revert Firewall Configuration Changes). This is useful for
preserving changes that would otherwise be lost if a system event or administrator action causes
the firewall to reboot. After rebooting, PAN-OS automatically reverts to the current version of the
running configuration, which the firewall stores in a file named running-config.xml. Saving backups
is also useful if you want to revert to a firewall configuration that is earlier than the current
running configuration. The firewall does not automatically save the candidate configuration to
persistent storage. You must manually save the candidate configuration as a default snapshot file
(.snapshot.xml) or as a custom-named snapshot file. The firewall stores the snapshot file locally
but you can export it to an external host.
You don’t have to save a configuration backup to revert the changes made since
the last commit or reboot; just select Config > Revert Changes (see Revert Firewall
Configuration Changes).
When you edit a setting and click OK, the firewall updates the candidate configuration
but does not save a backup snapshot.
Additionally, saving changes does not activate them. To activate changes, perform a
commit (see Commit, Validate, and Preview Firewall Configuration Changes).
Palo Alto Networks recommends that you back up any important configuration to a host
external to the firewall.
PAN-OS® Administrator’s Guide Version 10.2 97 ©2025 Palo Alto Networks, Inc. | https://docs.paloaltonetworks.com/content/dam/techdocs/en_US/pdf/pan-os/10-2/pan-os-admin/pan-os-admin.pdf |
97 | Firewall Administration
STEP 1 | Save a local backup snapshot of the candidate configuration if it contains changes that you
want to preserve in the event the firewall reboots.
These are changes you are not ready to commit—for example, changes you cannot finish in the
current login session.
To overwrite the default snapshot file (.snapshot.xml) with all the changes that all
administrators made, perform one of the following steps:
• Select Device > Setup > Operations and Save candidate configuration.
• Log in to the firewall with an administrative account that is assigned the Superuser role
or an Admin Role profile with the Save For Other Admins privilege enabled. Then select
Config > Save Changes at the top of the web interface, select Save All Changes and Save.
To create a snapshot that includes all the changes that all administrators made but without
overwriting the default snapshot file:
1. Select Device > Setup > Operations and Save named configuration snapshot.
2. Specify the Name of a new or existing configuration file.
3. Click OK and Close.
To save only specific changes to the candidate configuration without overwriting any part of
the default snapshot file:
1. Log in to the firewall with an administrative account that has the role privileges required
to save the desired changes.
2. Select Config > Save Changes at the top of the web interface.
3. Select Save Changes Made By.
4. To filter the Save Scope by administrator, click <administrator-name>, select the
administrators, and click OK.
5. To filter the Save Scope by location, clear any locations that you want to exclude. The
locations can be specific virtual systems, shared policies and objects, or shared device
and network settings.
6. Click Save, specify the Name of a new or existing configuration file, and click OK.
STEP 2 | Export a candidate configuration, a running configuration, or the firewall state information to
a host external to the firewall.
Select Device > Setup > Operations and click an export option:
• Export named configuration snapshot—Export the current running configuration, a named
candidate configuration snapshot, or a previously imported configuration (candidate or
running). The firewall exports the configuration as an XML file with the Name you specify.
• Export configuration version—Select a Version of the running configuration to export as an
XML file. The firewall creates a version whenever you commit configuration changes.
• Export device state—Export the firewall state information as a bundle. Besides the running
configuration, the state information includes device group and template settings pushed
from Panorama. If the firewall is a GlobalProtect portal, the information also includes
certificate information, a list of satellites, and satellite authentication information. If you
replace a firewall or portal, you can restore the exported information on the replacement by
importing the state bundle.
PAN-OS® Administrator’s Guide Version 10.2 98 ©2025 Palo Alto Networks, Inc. | https://docs.paloaltonetworks.com/content/dam/techdocs/en_US/pdf/pan-os/10-2/pan-os-admin/pan-os-admin.pdf |
98 | Firewall Administration
Revert Firewall Configuration Changes
Revert operations replace settings in the current candidate configuration with settings from
another configuration. Reverting changes is useful when you want to undo changes to multiple
settings as a single operation instead of manually reconfiguring each setting.
You can revert pending changes that were made to the firewall configuration since the last
commit. The firewall provides the option to filter the pending changes by administrator or
location. The locations can be specific virtual systems, shared policies and objects, or shared
device and network settings. If you saved a snapshot file for a candidate configuration that is
earlier than the current running configuration (see Save and Export Firewall Configurations),
you can also revert to that snapshot. Reverting to a snapshot enables you to restore a candidate
configuration that existed before the last commit. The firewall automatically saves a new version
of the running configuration whenever you commit changes, and you can restore any of those
versions.
Revert to the current running configuration (file named running-config.xml).
This operation undoes changes you made to the candidate configuration since the last commit.
To revert all the changes that all administrators made, perform one of the following steps:
• Select Device > Setup > Operations, Revert to running configuration, and click Yes to
confirm the operation.
• Log in to the firewall with an administrative account that is assigned the Superuser role or
an Admin Role profile with the Commit For Other Admins privilege enabled. Then select
Config > Revert Changes at the top of the web interface, select Revert All Changes and
Revert.
To revert only specific changes to the candidate configuration:
1. Log in to the firewall with an administrative account that has the role privileges required
to revert the desired changes.
The privileges that control commit operations also control revert operations.
2. Select Config > Revert Changes at the top of the web interface.
3. Select Revert Changes Made By.
4. To filter the Revert Scope by administrator, click <administrator-name>, select the
administrators, and click OK.
5. To filter the Revert Scope by location, clear any locations that you want to exclude.
6. Revert the changes.
Revert to the default snapshot of the candidate configuration.
This is the snapshot that you create or overwrite when you click Config > Save Changes at the
top of the web interface.
1. Select Device > Setup > Operations and Revert to last saved configuration.
2. Click Yes to confirm the operation.
3. (Optional) Click Commit to overwrite the running configuration with the snapshot.
PAN-OS® Administrator’s Guide Version 10.2 99 ©2025 Palo Alto Networks, Inc. | https://docs.paloaltonetworks.com/content/dam/techdocs/en_US/pdf/pan-os/10-2/pan-os-admin/pan-os-admin.pdf |
99 | Firewall Administration
Revert to a previous version of the running configuration that is stored on the firewall.
The firewall creates a version whenever you commit configuration changes.
1. Select Device > Setup > Operations and Load configuration version.
2. Select a configuration Version and click OK.
3. (Optional) Click Commit to overwrite the running configuration with the version you just
restored.
Revert to one of the following:
• Custom-named version of the running configuration that you previously imported
• Custom-named candidate configuration snapshot (instead of the default snapshot)
1. Select Device > Setup > Operations and click Load named configuration snapshot.
2. Select the snapshot Name and click OK.
3. (Optional) Click Commit to overwrite the running configuration with the snapshot.
Revert to a running or candidate configuration that you previously exported to an external
host.
1. Select Device > Setup > Operations, click Import named configuration snapshot,
Browse to the configuration file on the external host, and click OK.
2. Click Load named configuration snapshot, select the Name of the configuration file you
just imported, and click OK.
3. (Optional) Click Commit to overwrite the running configuration with the snapshot you
just imported.
Restore state information that you exported from a firewall.
Besides the running configuration, the state information includes device group and template
settings pushed from Panorama. If the firewall is a GlobalProtect portal, the information also
includes certificate information, a list of satellites, and satellite authentication information. If
you replace a firewall or portal, can you can restore the information on the replacement by
importing the state bundle.
Import state information:
1. Select Device > Setup > Operations, click Import device state, Browse to the state
bundle, and click OK.
2. (Optional) Click Commit to apply the imported state information to the running
configuration.
PAN-OS® Administrator’s Guide Version 10.2 100 ©2025 Palo Alto Networks, Inc. | https://docs.paloaltonetworks.com/content/dam/techdocs/en_US/pdf/pan-os/10-2/pan-os-admin/pan-os-admin.pdf |
100 | Firewall Administration
Manage Firewall Administrators
Administrative accounts specify roles and authentication methods for the administrators of Palo
Alto Networks firewalls. Every Palo Alto Networks firewall has a predefined default administrative
account (admin) that provides full read-write access (also known as superuser access) to the
firewall.
As a best practice, create a separate administrative account for each person who needs
access to the administrative or reporting functions of the firewall. This enables you to
better protect the firewall from unauthorized configuration and enables logging of the
actions of individual administrators. Make sure you are following the Adminstrative
Access Best Practices to ensure that you are securing administrative access to your
firewalls and other security devices in a way that prevents successful attacks.
• Administrative Role Types
• Configure an Admin Role Profile
• Administrative Authentication
• Configure Administrative Accounts and Authentication
• Configure Tracking of Administrator Activity
Administrative Role Types
A role defines the type of access that an administrator has to the firewall. The Administrator Types
are:
• Role Based—Custom roles you can configure for more granular access control over the
functional areas of the web interface, CLI, and XML API. For example, you can create an
Admin Role profile for your operations staff that provides access to the firewall and network
configuration areas of the web interface and a separate profile for your security administrators
that provides access to security policy definitions, logs, and reports. On a firewall with multiple
virtual systems, you can select whether the role defines access for all virtual systems or
specific virtual systems. When new features are added to the product, you must update
the roles with corresponding access privileges: the firewall does not automatically add new
features to custom role definitions. For details on the privileges you can configure for custom
administrator roles, see Reference: Web Interface Administrator Access.
• Dynamic—Built-in roles that provide access to the firewall. When new features are added, the
firewall automatically updates the definitions of dynamic roles; you never need to manually
update them. The following table lists the access privileges associated with dynamic roles.
Dynamic Role Privileges
Superuser Full access to the firewall, including defining new
administrator accounts and virtual systems. You must have
Superuser privileges to create an administrative user with
Superuser privileges.
PAN-OS® Administrator’s Guide Version 10.2 101 ©2025 Palo Alto Networks, Inc. | https://docs.paloaltonetworks.com/content/dam/techdocs/en_US/pdf/pan-os/10-2/pan-os-admin/pan-os-admin.pdf |
101 | Firewall Administration
Dynamic Role Privileges
Superuser (read-only) Read-only access to the firewall (enables the XML API in a
read-only state).
Device administrator Full access to all firewall settings except for defining new
accounts or virtual systems.
Device administrator (readonly)
Read-only access to all firewall settings except password
profiles (no access) and administrator accounts (only the
logged in account is visible).
Virtual system administrator Access to selected virtual systems on the firewall to create
and manage specific aspects of virtual systems. A virtual
system administrator doesn’t have access to network
interfaces, VLANs, virtual wires, virtual routers, IPSec
tunnels, GRE tunnels, DHCP, DNS Proxy, QoS, LLDP, or
network profiles.
Virtual system administrator
(read-only)
Read-only access to selected virtual systems on the firewall
and specific aspects of virtual systems. A virtual system
administrator with read-only access doesn’t have access to
network interfaces, VLANs, virtual wires, virtual routers,
IPSec tunnels, GRE tunnels, DHCP, DNS Proxy, QoS, LLDP,
or network profiles.
Configure an Admin Role Profile
Admin Role profiles enable you to define granular administrative access privileges to ensure
protection for sensitive company information and privacy for end users.
Follow the principle of least privilege access to create Admin Role profiles that enable
administrators to access only the areas of the management interface that they need to
access to perform their jobs and follow Administrative Access Best Practices.
You can create an Admin Role profile, specify that the role applies to Virtual System, and then
select Web UI, for example, and choose the part of the configuration that the administrator can
control within a virtual system. Click OK to save the Admin Role Profile. Then select Device >
Administrators, name the role, select Role Based, enter the name of the Admin Role Profile, and
select the virtual system that the administrator can control. The MGT interface doesn't give full
access to the firewall; access is controlled by the Admin Role.
If the Admin Role Profile is based on Virtual System, that administrator won't have control over
a virtual router. Only a subset of the Network options are available in a Virtual System role,
and virtual router isn't one of the included options. If you want virtual router available in an
Admin Role Profile, the role must be Device, not Virtual System. (You can define a superuser
Administrator to have both Virtual System and Virtual Router access.)
PAN-OS® Administrator’s Guide Version 10.2 102 ©2025 Palo Alto Networks, Inc. | https://docs.paloaltonetworks.com/content/dam/techdocs/en_US/pdf/pan-os/10-2/pan-os-admin/pan-os-admin.pdf |
102 | Firewall Administration
You can create a second Admin Role Profile, specify that the role applies to Device, and then
select portions under Network, such as Virtual Routers. Name the Admin Role Profile, and then
apply it to a different administrator.
You might have different departments that have different functions. Based on the login, the
administrator gets the right to control the objects enabled in the Admin Role Profile.
In summary, you can't define a Virtual System Admin Role profile that includes routing (Virtual
Router). You can create two accounts to have these separate roles and assign them to two
different users. An Administrator account can have only one Admin Role profile.
The MGT interface can have role-based access; it doesn't strictly provide full access to the device.
The login account (Admin Role) is what gives a user rights or limited access to the objects, not the
MGT interface.
STEP 1 | Select Device > Admin Roles and click Add.
STEP 2 | Enter a Name to identify the role.
STEP 3 | For the scope of the Role, select Device or Virtual System.
STEP 4 | In the Web UI and REST API tabs, click the icon for each functional area to toggle it to the
desired setting: Enable, Read Only or Disable. For the XML API tab select, Enable or Disable.
For details on the Web UI options, see Web Interface Access Privileges.
STEP 5 | Select the Command Line tab and select a CLI access option. The Role scope controls the
available options:
• Device role:
• None—CLI access is not permitted (default).
• superuser—Full access. Can define new administrator accounts and virtual systems. Only
a superuser can create administrator users with superuser privileges.
• superreader—Full read-only access.
• deviceadmin—Full access to all settings except defining new accounts or virtual systems.
• devicereader—Read-only access to all settings except password profiles (no access) and
administrator accounts (only the logged in account is visible).
• Virtual System role:
• None—Access is not permitted (default).
• vsysadmin—Access to specific virtual systems to create and manage specific aspects
of virtual systems. Does not enable access to firewall-level or network-level functions
including static and dynamic routing, interface IP addresses, IPSec tunnels, VLANs,
virtual wires, virtual routers, GRE tunnels, DCHP, DNS Proxy, QoS, LLDP, or network
profiles.
• vsysreader—Read-only access to specific virtual systems to specific aspects of virtual
systems. Does not enable access to firewall-level or network-level functions including
static and dynamic routing, interface IP addresses, IPSec tunnels, VLANs, virtual wires,
virtual routers, GRE tunnels, DCHP, DNS Proxy, QoS, LLDP, or network profiles.
STEP 6 | Click OK to save the profile.
PAN-OS® Administrator’s Guide Version 10.2 103 ©2025 Palo Alto Networks, Inc. | https://docs.paloaltonetworks.com/content/dam/techdocs/en_US/pdf/pan-os/10-2/pan-os-admin/pan-os-admin.pdf |
103 | Firewall Administration
STEP 7 | Assign the role to an administrator. See Configure a Firewall Administrator Account.
Example Admin Role Profile Construction
This example shows an Admin Role profile for a Security Operations Center (SOC) manager who
needs access to investigate potential issues. The SOC Manager needs read access to many areas
of the firewall, but generally doesn’t need write access. The example covers all four of the Admin
Role Profile’s tabs and each step describes why the profile enables or disables a particular area of
access to the SOC manager.
This is an example profile for a fictional SOC manager. Configure Admin Role profiles
for your administrators based on the functions they manage and the access required
to do their job. Do not enable unnecessary access. Create separate profiles for each
administrative group that shares the same duties and for administrators who have unique
duties. Each administrator should have the exact level of access required to perform their
duties and no access beyond that.
STEP 1 | Configure Web UI access permissions. Each snip of the Web UI screen shows a different
area of Web UI permissions. Permissions are listed by firewall tab, in the order you see the
tabs in the Web UI, followed by permissions for other actions.
The Dashboard, ACC, and Monitor > Logs areas of the firewall don’t contain configuration
elements—all of the objects are informational (you can only toggle them between enable and
PAN-OS® Administrator’s Guide Version 10.2 104 ©2025 Palo Alto Networks, Inc. | https://docs.paloaltonetworks.com/content/dam/techdocs/en_US/pdf/pan-os/10-2/pan-os-admin/pan-os-admin.pdf |
104 | Firewall Administration
disable because they are already read only). Because the SOC Manager needs to investigate
potential issues, the SOC Manager needs access to the information on these tabs.
The profile name and description make it easy to understand the profile’s objective. This snip
doesn’t show all of the Logs permissions, but all of them are enabled for this profile.
The next snip shows permissions for more informational objects on the Monitor tab. The SOC
Manager uses these tools to investigate potential issues and therefore requires access.
The next two snips show permissions for PDF Reports, Custom Reports, and predefined
reports on the Monitor tab. While the SOC Manager needs access to PDF reports to gather
information, in this example, the SOC Manager does not need to configure reports, so access
is set to read-only (summary reports are not configurable). However, the SOC Manager needs
to manage custom reports to investigate specific potential issues, so full access permissions are
PAN-OS® Administrator’s Guide Version 10.2 105 ©2025 Palo Alto Networks, Inc. | https://docs.paloaltonetworks.com/content/dam/techdocs/en_US/pdf/pan-os/10-2/pan-os-admin/pan-os-admin.pdf |
105 | Firewall Administration
granted for all custom reports (including those not shown in the snip). Finally the SOC Manager
requires access to predefined reports for investigating potential issues.
Because the SOC Manager is an investigator and not an administrator who configures the
firewall, permissions for the Policies tab are read-only, with the exception of resetting the rule
hit count. Resetting the rule hit count is not one of the SOC Manager’s duties (and changing
the hit count could adversely affect or confuse other administrators), so access is disabled.
Read access enables the SOC Manager to investigate the construction of a policy that the SOC
Manager suspects may have caused an issue.
Permissions for the Objects tab are also read-only for the same reason—the SOC Manager’s
job doesn’t require configuration, so no configuration permissions are assigned. For areas
that aren’t included in the SOC Manager’s duties, access is disabled. In this example, the SOC
Manager has read-only access to investigate objects configurations for all objects except URL
PAN-OS® Administrator’s Guide Version 10.2 106 ©2025 Palo Alto Networks, Inc. | https://docs.paloaltonetworks.com/content/dam/techdocs/en_US/pdf/pan-os/10-2/pan-os-admin/pan-os-admin.pdf |
106 | Firewall Administration
Filtering, SD-WAN Link Management and Schedules, which are under the control of different
administrators in this example.
For Network tab permissions, the scenario is similar: the SOC Manager doesn’t need to
configure any of the objects, but may need information to investigate issues, so read-only
access is assigned to the areas that the SOC Manager may need to investigate. In this example,
PAN-OS® Administrator’s Guide Version 10.2 107 ©2025 Palo Alto Networks, Inc. | https://docs.paloaltonetworks.com/content/dam/techdocs/en_US/pdf/pan-os/10-2/pan-os-admin/pan-os-admin.pdf |
107 | Firewall Administration
access is disabled for QoS, LLDP, Network Profiles, or SD-WAN Interface profiles because
these items are not part of the SOC Manager’s duties.
In this example, the SOC Manager needs no access to the Device tab capabilities for
investigative purposes, so all Device tab permissions are blocked. In addition, investigation
doesn’t require commit actions or access to any of the remaining actions, so those permissions
are also blocked.
PAN-OS® Administrator’s Guide Version 10.2 108 ©2025 Palo Alto Networks, Inc. | https://docs.paloaltonetworks.com/content/dam/techdocs/en_US/pdf/pan-os/10-2/pan-os-admin/pan-os-admin.pdf |
108 | Firewall Administration
STEP 2 | Configure XML API access permissions.
The following snip shows that all XML API permissions are disabled for the SOC Manager
because the SOC Manager doesn’t access the firewall using XML API commands.
STEP 3 | Configure Command Line (CLI) access permissions.
CLI access permissions are read-only for the SOC Manager because the SOC Manager
needs access to logs and other monitoring tools and also needs to be able to see certain
configurations in order to investigate potential issues. However, the SOC Manager doesn’t
configure the firewall, so no configuration permissions are assigned. The access level is set
to devicereader instead of to superreader because the SOC Manager doesn’t need access to
password profiles or to other administrative accounts.
PAN-OS® Administrator’s Guide Version 10.2 109 ©2025 Palo Alto Networks, Inc. | https://docs.paloaltonetworks.com/content/dam/techdocs/en_US/pdf/pan-os/10-2/pan-os-admin/pan-os-admin.pdf |
109 | Firewall Administration
STEP 4 | Configure REST API access permissions.
The SOC Manager doesn’t access the firewall using REST API commands, so all REST API
access is disabled.
Administrative Authentication
You can configure the following types of authentication and authorization (role and access domain
assignment) for firewall administrators:
Authentication
Method
Authorization
Method
Description
Local Local The administrative account credentials and authentication
mechanisms are local to the firewall. You can define the accounts
with or without a user database that is local to the firewall—
see Local Authentication for the advantages and disadvantages
of using a local database. You use the firewall to manage role
assignments but access domains are not supported. For details,
see Configure Local or External Authentication for Firewall
Administrators.
SSH Keys Local The administrative accounts are local to the firewall, but
authentication to the CLI is based on SSH keys. You use the
firewall to manage role assignments but access domains are
not supported. For details, see Configure SSH Key-Based
Administrator Authentication to the CLI.
Certificates Local The administrative accounts are local to the firewall, but
authentication to the web interface is based on client certificates.
You use the firewall to manage role assignments but access
domains are not supported. For details, see Configure CertificateBased Administrator Authentication to the Web Interface.
PAN-OS® Administrator’s Guide Version 10.2 110 ©2025 Palo Alto Networks, Inc. | https://docs.paloaltonetworks.com/content/dam/techdocs/en_US/pdf/pan-os/10-2/pan-os-admin/pan-os-admin.pdf |
110 | Firewall Administration
Authentication
Method
Authorization
Method
Description
External
service
Local The administrative accounts you define locally on the firewall
serve as references to the accounts defined on an external MultiFactor Authentication, SAML, Kerberos, TACACS+, RADIUS, or
LDAP server. The external server performs authentication. You
use the firewall to manage role assignments but access domains
are not supported. For details, see Configure Local or External
Authentication for Firewall Administrators.
External
service
External
service
The administrative accounts are defined on an external SAML,
TACACS+, or RADIUS server. The server performs both
authentication and authorization. For authorization, you define
Vendor-Specific Attributes (VSAs) on the TACACS+ or RADIUS
server, or SAML attributes on the SAML server. PAN-OS maps
the attributes to administrator roles, access domains, user groups,
and virtual systems that you define on the firewall. For details,
see:
• Configure SAML Authentication
• Configure TACACS+ Authentication
• Configure RADIUS Authentication
Configure Administrative Accounts and Authentication
If you have already configured an authentication profile (see Configure an Authentication
Profile and Sequence) or you don’t require one to authenticate administrators, you are ready to
Configure a Firewall Administrator Account. Otherwise, perform one of the other procedures
listed below to configure administrative accounts for specific types of authentication.
• Configure a Firewall Administrator Account
• Configure Local or External Authentication for Firewall Administrators
• Configure Certificate-Based Administrator Authentication to the Web Interface
• Configure SSH Key-Based Administrator Authentication to the CLI
• Configure API Key Lifetime
Configure a Firewall Administrator Account
Administrative accounts specify roles and authentication methods for firewall administrators.
The service that you use to assign roles and perform authentication determines whether you add
the accounts on the firewall, on an external server, or both (see Administrative Authentication).
If the authentication method relies on a local firewall database or an external service, you must
configure an authentication profile before adding an administrative account (see Configure
Administrative Accounts and Authentication). If you already configured the authentication profile
or you will use Local Authentication without a firewall database, perform the following steps to
add an administrative account on the firewall.
PAN-OS® Administrator’s Guide Version 10.2 111 ©2025 Palo Alto Networks, Inc. | https://docs.paloaltonetworks.com/content/dam/techdocs/en_US/pdf/pan-os/10-2/pan-os-admin/pan-os-admin.pdf |
111 | Firewall Administration
Create a separate administrative account for each person who needs access to the
administrative or reporting functions of the firewall. This enables you to better protect the
firewall from unauthorized configuration and enables logging of the actions of individual
administrators.
Make sure you are following the Adminstrative Access Best Practices to ensure that you
are securing administrative access to your firewalls and other security devices in a way
that prevents successful attacks.
STEP 1 | Modify the number of supported administrator accounts.
Configure the total number of supported concurrent administrative accounts sessions for
a firewall in the normal operational mode or in FIPS-CC mode. You can allow up to four
concurrent administrative account sessions or configure the firewall to support an unlimited
number of concurrent administrative account sessions.
1. Select Device > Setup > Management and edit the Authentication Settings.
2. Edit the Max Session Count to specify the number of supported concurrent sessions
(range is 0 to 4) allowed for all administrator and user accounts.
Enter 0 to configure the firewall to support an unlimited number of administrative
accounts.
3. Edit the Max Session Time in minutes for an administrative account. Default is 720
minutes.
4. Click OK.
5. Commit.
You can also configure the total number of supported concurrent sessions by logging
in to the firewall CLI.
admin> configure
admin# set deviceconfig setting management admin-session
max-session-count <0-4>
admin# set deviceconfig setting management admin-session
max-session-time <0, 60-1499>
admin# commit
STEP 2 | Select Device > Administrators and Add an account.
STEP 3 | Enter a user Name.
If the firewall uses a local user database to authenticate the account, enter the name that you
specified for the account in the database (see Add the user group to the local database.)
STEP 4 | Select an Authentication Profile or sequence if you configured either for the administrator.
If the firewall uses Local Authentication without a local user database for the account, select
None (default) and enter a Password.
PAN-OS® Administrator’s Guide Version 10.2 112 ©2025 Palo Alto Networks, Inc. | https://docs.paloaltonetworks.com/content/dam/techdocs/en_US/pdf/pan-os/10-2/pan-os-admin/pan-os-admin.pdf |
112 | Firewall Administration
STEP 5 | Select the Administrator Type.
If you configured a custom role for the user, select Role Based and select the Admin Role
Profile. Otherwise, select Dynamic (default) and select a dynamic role. If the dynamic role
is virtual system administrator, add one or more virtual systems that the virtual system
administrator is allowed to manage.
STEP 6 | (Optional) Select a Password Profile for administrators that the firewall authenticates locally
without a local user database. For details, see Define a Password Profile.
STEP 7 | Click OK and Commit.
Configure Local or External Authentication for Firewall Administrators
You can use Local Authentication and External Authentication Services to authenticate
administrators who access the firewall. These authentication methods prompt administrators to
respond to one or more authentication challenges, such as a login page for entering a username
and password.
If you use an external service to manage both authentication and authorization (role and
access domain assignments), see:
• Configure SAML Authentication
• Configure TACACS+ Authentication
• Configure RADIUS Authentication
To authenticate administrators without a challenge-response mechanism, you can
Configure Certificate-Based Administrator Authentication to the Web Interface and
Configure SSH Key-Based Administrator Authentication to the CLI.
STEP 1 | (External authentication only) Enable the firewall to connect to an external server for
authenticating administrators.
Configure a server profile:
• Add a RADIUS server profile.
If the firewall integrates with a Multi-Factor Authentication (MFA) service through RADIUS,
you must add a RADIUS server profile. In this case, the MFA service provides all the
authentication factors (challenges). If the firewall integrates with an MFA service through
a vendor API, you can still use a RADIUS server profile for the first factor but MFA server
profiles are required for additional factors.
• Add an MFA server profile.
• Add a TACACS+ server profile.
• Add a SAML IdP server profile. You cannot combine Kerberos single sign-on (SSO) with
SAML SSO; you can use only one type of SSO service.
• Add a Kerberos server profile.
• Add an LDAP server profile.
PAN-OS® Administrator’s Guide Version 10.2 113 ©2025 Palo Alto Networks, Inc. | https://docs.paloaltonetworks.com/content/dam/techdocs/en_US/pdf/pan-os/10-2/pan-os-admin/pan-os-admin.pdf |
113 | Firewall Administration
STEP 2 | (Local database authentication only) Configure a user database that is local to the firewall.
1. Add the user account to the local database.
2. (Optional) Add the user group to the local database.
STEP 3 | (Local authentication only) Define password complexity and expiration settings.
These settings help protect the firewall against unauthorized access by making it harder for
attackers to guess passwords.
1. Define global password complexity and expiration settings for all local administrators.
The settings don’t apply to local database accounts for which you specified a password
hash instead of a password (see Local Authentication).
1. Select Device > Setup > Management and edit the Minimum Password Complexity
settings.
2. Select Enabled.
3. Define the password settings and click OK.
2. Define a Password Profile.
You assign the profile to administrator accounts for which you want to override the
global password expiration settings. The profiles are available only to accounts that are
not associated with a local database (see Local Authentication).
1. Select Device > Password Profiles and Add a profile.
2. Enter a Name to identify the profile.
3. Define the password expiration settings and click OK.
STEP 4 | (Kerberos SSO only) Create a Kerberos keytab.
A keytab is a file that contains Kerberos account information for the firewall. To support
Kerberos SSO, your network must have a Kerberos infrastructure.
STEP 5 | Configure an authentication profile.
If your administrative accounts are stored across multiple types of servers, you
can create an authentication profile for each type and add all the profiles to an
authentication sequence.
Configure an Authentication Profile and Sequence. In the authentication profile, specify the
Type of authentication service and related settings:
• External service—Select the Type of external service and select the Server Profile you
created for it.
• Local database authentication—Set the Type to Local Database.
• Local authentication without a database—Set the Type to None.
• Kerberos SSO—Specify the Kerberos Realm and Import the Kerberos Keytab.
PAN-OS® Administrator’s Guide Version 10.2 114 ©2025 Palo Alto Networks, Inc. | https://docs.paloaltonetworks.com/content/dam/techdocs/en_US/pdf/pan-os/10-2/pan-os-admin/pan-os-admin.pdf |
114 | Firewall Administration
STEP 6 | Assign the authentication profile or sequence to an administrator account.
1. Configure a Firewall Administrator Account.
• Assign the Authentication Profile or sequence that you configured.
• (Local database authentication only) Specify the Name of the user account you added
to the local database.
2. Commit your changes.
3. (Optional) Test Authentication Server Connectivity to verify that the firewall can use the
authentication profile to authenticate administrators.
Configure Certificate-Based Administrator Authentication to the Web Interface
As a more secure alternative to password-based authentication to the firewall web interface,
you can configure certificate-based authentication for administrator accounts that are local to
the firewall. Certificate-based authentication involves the exchange and verification of a digital
signature instead of a password.
Configuring certificate-based authentication for any administrator disables the username/
password logins for all administrators on the firewall; administrators thereafter require the
certificate to log in.
STEP 1 | Generate a certificate authority (CA) certificate on the firewall.
You will use this CA certificate to sign the client certificate of each administrator.
Create a Self-Signed Root CA Certificate.
Alternatively, Import a Certificate and Private Key from your enterprise CA or a
third-party CA.
STEP 2 | Configure a certificate profile for securing access to the web interface.
Configure a Certificate Profile.
• Set the Username Field to Subject.
• In the CA Certificates section, Add the CA Certificate you just created or imported.
STEP 3 | Configure the firewall to use the certificate profile for authenticating administrators.
1. Select Device > Setup > Management and edit the Authentication Settings.
2. Select the Certificate Profile you created for authenticating administrators and click OK.
STEP 4 | Configure the administrator accounts to use client certificate authentication.
For each administrator who will access the firewall web interface, Configure a Firewall
Administrator Account and select Use only client certificate authentication.
If you have already deployed client certificates that your enterprise CA generated, skip to Step
8. Otherwise, go to Step 5.
STEP 5 | Generate a client certificate for each administrator.
Generate a Certificate. In the Signed By drop-down, select a self-signed root CA certificate.
PAN-OS® Administrator’s Guide Version 10.2 115 ©2025 Palo Alto Networks, Inc. | https://docs.paloaltonetworks.com/content/dam/techdocs/en_US/pdf/pan-os/10-2/pan-os-admin/pan-os-admin.pdf |
115 | Firewall Administration
STEP 6 | Export the client certificate.
1. Export a Certificate and Private Key.
2. Commit your changes. The firewall restarts and terminates your login session.
Thereafter, administrators can access the web interface only from client systems that
have the client certificate you generated.
STEP 7 | Import the client certificate into the client system of each administrator who will access the
web interface.
Refer to your web browser documentation.
STEP 8 | Verify that administrators can access the web interface.
1. Open the firewall IP address in a browser on the computer that has the client certificate.
2. When prompted, select the certificate you imported and click OK. The browser displays
a certificate warning.
3. Add the certificate to the browser exception list.
4. Click Login. The web interface should appear without prompting you for a username or
password.
Configure SSH Key-Based Administrator Authentication to the CLI
For administrators who use Secure Shell (SSH) to access the CLI of a Palo Alto Networks firewall,
SSH keys provide a more secure authentication method than passwords. SSH keys almost
eliminate the risk of brute-force attacks, provide the option for two-factor authentication (key and
passphrase), and don’t send passwords over the network. SSH keys also enable automated scripts
to access the CLI.
STEP 1 | Use an SSH key generation tool to create an asymmetric keypair on the client system of the
administrator.
The supported key formats are IETF SECSH and Open SSH. The supported algorithm is RSA
(768-4,096 bits).
For the commands to generate the keypair, refer to your SSH client documentation.
The public key and private key are separate files. Save both to a location that the firewall can
access. For added security, enter a passphrase to encrypt the private key. The firewall prompts
the administrator for this passphrase during login.
STEP 2 | Configure the administrator account to use public key authentication.
1. Configure a Firewall Administrator Account.
• Configure the authentication method to use as a fallback if SSH key authentication
fails. If you configured an Authentication Profile for the administrator, select it in the
drop-down. If you select None, you must enter a Password and Confirm Password.
• Select Use Public Key Authentication (SSH), then Import Key, Browse to the public
key you just generated, and click OK.
2. Commit your changes.
PAN-OS® Administrator’s Guide Version 10.2 116 ©2025 Palo Alto Networks, Inc. | https://docs.paloaltonetworks.com/content/dam/techdocs/en_US/pdf/pan-os/10-2/pan-os-admin/pan-os-admin.pdf |
116 | Firewall Administration
STEP 3 | Configure the SSH client to use the private key to authenticate to the firewall.
Perform this task on the client system of the administrator. For the steps, refer to your SSH
client documentation.
STEP 4 | Verify that the administrator can access the firewall CLI using SSH key authentication.
1. Use a browser on the client system of the administrator to go to the firewall IP address.
2. Log in to the firewall CLI as the administrator. After entering a username, you will see
the following output (the key value is an example):
Authenticating with public key “rsa-key-20130415”
3. If prompted, enter the passphrase you defined when creating the keys.
Configure API Key Lifetime
The API keys on the firewall and Panorama enable you to authenticate API calls to the XML API
and REST API. Because these keys grant access to the firewall and Panorama that are critical
elements of your security posture, as a best practice, specify an API key lifetime to enforce regular
key rotation. After you specify the key lifetime, when you regenerate an API key, each key is
unique.
In addition to setting a key lifetime that prompts you to regenerate new keys periodically, you can
also revoke all currently valid API keys in the event one or more keys are compromised. Revoking
keys is a way to expire all currently valid keys.
STEP 1 | Select Device > Setup > Management.
STEP 2 | Edit Authentication Settings to specify the API Key Lifetime (min).
Set the API key lifetime to protect against compromise and to reduce the effects of an
accidental exposure. By default, the API key lifetime is set to 0, which means that the keys will
never expire. To ensure that your keys are frequently rotated and each key is unique when
regenerated, you must specify a validity period that ranges between 1—525600 minutes. Refer
to the audit and compliance policies for your enterprise to determine how you should specify
the lifetime for which your API keys are valid.
STEP 3 | Commit the changes.
PAN-OS® Administrator’s Guide Version 10.2 117 ©2025 Palo Alto Networks, Inc. | https://docs.paloaltonetworks.com/content/dam/techdocs/en_US/pdf/pan-os/10-2/pan-os-admin/pan-os-admin.pdf |
117 | Firewall Administration
STEP 4 | (To revoke all API keys) Select Expire all API Keys to reset currently valid API keys.
If you have just set a key lifetime and want to reset all API keys to adhere to the new term, you
can expire all existing keys.
On confirmation, the keys are revoked and you can view the timestamp for when the API Keys
Last Expired.
Configure Tracking of Administrator Activity
Track administrator activity on the firewall web interface and CLI to achieve real time reporting
of activity across your firewall. If you have reason to believe an administrator account is
compromised, you have a full history of where this administrator account navigated throughout
the web interface or what operational commands they executed so you can analyze in detail and
respond to all actions the compromised administrator took.
When an event occurs, an audit log is generated and forwarded to the specified syslog server
each time an administrator navigates through the web interface or when an operational command
is executed in the CLI. An audit log is generated for each navigation or commend executed. Take
for example if you want to create a new address object. An audit log is generated when you click
on Objects, and a second audit log is generated when you then click on Addresses.
Audit logs are only visible as syslogs forwarded to your syslog server and cannot be viewed in the
firewall web interface. Audit logs can only be forwarded to a syslog server, cannot be forwarded
to Strata Logging Service, and are not stored locally on the firewall.
STEP 1 | Configure a syslog server profile to forward audit logs of administrator activity on the
firewall.
This step is required to successfully store audit logs for tracking administrator activity on the
firewall.
1. Log in to the firewall web interface.
2. Configure a syslog server profile.
PAN-OS® Administrator’s Guide Version 10.2 118 ©2025 Palo Alto Networks, Inc. | https://docs.paloaltonetworks.com/content/dam/techdocs/en_US/pdf/pan-os/10-2/pan-os-admin/pan-os-admin.pdf |
118 | Firewall Administration
STEP 2 | Configure tracking of administrator activity.
1. Select Device > Setup > Management and edit the Logging and Reporting Settings.
2. Select Log Export and Reporting.
3. In the Log Admin Activity section, configure what administrator activity to track.
• Operational Commands—Generate an audit log when an administrator executes an
operational or debug command in the CLI or an operational command triggered from
the web interface. See the CLI Operational Command Hierarchy for a full list of PANOS operational and debug commands.
• UI Actions—Generate an audit log when an administrator navigates throughout
the web interface. This includes navigation between configuration tabs, as well as
individual objects within a tab.
For example, an audit log is generated when an administrator navigates from the
ACC to the Policies tab. Additionally, an audit log is generated when an administrator
navigates from Objects > Addresses to Objects > Tags.
• Syslog Server—Select a target syslog server profile to forward audit logs.
4. Click OK
5. Select Commit.
PAN-OS® Administrator’s Guide Version 10.2 119 ©2025 Palo Alto Networks, Inc. | https://docs.paloaltonetworks.com/content/dam/techdocs/en_US/pdf/pan-os/10-2/pan-os-admin/pan-os-admin.pdf |
119 | Firewall Administration
Reference: Web Interface Administrator Access
You can configure privileges for an entire firewall or for one or more virtual systems (on platforms
that support multiple virtual systems). Within that Device or Virtual System designation, you
can configure privileges for custom administrator roles, which are more granular than the fixed
privileges associated with a dynamic administrator role.
Configuring privileges at a granular level ensures that lower level administrators cannot access
certain information. You can create custom roles for firewall administrators (see Configure
a Firewall Administrator Account), Panorama administrators, or Device Group and Template
administrators (refer to the Panorama Administrator’s Guide). You apply the admin role to a
custom role-based administrator account where you can assign one or more virtual systems. The
following topics describe the privileges you can configure for custom administrator roles.
• Web Interface Access Privileges
• Panorama Web Interface Access Privileges
Web Interface Access Privileges
If you want to prevent a role-based administrator from accessing specific tabs on the web
interface, you can disable the tab and the administrator will not even see it when logging in using
the associated role-based administrative account. For example, you could create an Admin Role
Profile for your operations staff that provides access to the Device and Network tabs only and a
separate profile for your security administrators that provides access to the Object, Policy, and
Monitor tabs.
An admin role can apply at the Device level or Virtual System level as defined by the Device
or Virtual System radio button. If you select Virtual System, the admin assigned this profile is
restricted to the virtual system(s) he or she is assigned to. Furthermore, only the Device > Setup >
Services > Virtual Systems tab is available to that admin, not the Global tab.
The following topics describe how to set admin role privileges to the different parts of the web
interface:
• Define Access to the Web Interface Tabs
• Provide Granular Access to the Monitor Tab
• Provide Granular Access to the Policy Tab
• Provide Granular Access to the Objects Tab
• Provide Granular Access to the Network Tab
• Provide Granular Access to the Device Tab
• Define User Privacy Settings in the Admin Role Profile
• Restrict Administrator Access to Commit and Validate Functions
• Provide Granular Access to Global Settings
• Provide Granular Access to the Panorama Tab
• Provide Granular Access to Operations Settings
PAN-OS® Administrator’s Guide Version 10.2 120 ©2025 Palo Alto Networks, Inc. | https://docs.paloaltonetworks.com/content/dam/techdocs/en_US/pdf/pan-os/10-2/pan-os-admin/pan-os-admin.pdf |
120 | Firewall Administration
Define Access to the Web Interface Tabs
The following table describes the top-level access privileges you can assign to an admin role
profile (Device > Admin Roles). You can enable, disable, or define read-only access privileges at
the top-level tabs in the web interface.
Access Level Description Enable Read
Only
Disable
Dashboard Controls access to the Dashboard
tab. If you disable this privilege, the
administrator will not see the tab and will
not have access to any of the Dashboard
widgets.
Yes No Yes
ACC Controls access to the Application
Command Center (ACC). If you disable
this privilege, the ACC tab will not display
in the web interface. Keep in mind that if
you want to protect the privacy of your
users while still providing access to the
ACC, you can disable the Privacy > Show
Full IP Addresses option and/or the Show
User Names In Logs And Reports option.
Yes No Yes
Monitor Controls access to the Monitor tab. If you
disable this privilege, the administrator
will not see the Monitor tab and will not
have access to any of the logs, packet
captures, session information, reports or
to App Scope. For more granular control
over what monitoring information the
administrator can see, leave the Monitor
option enabled and then enable or disable
specific nodes on the tab as described in
Provide Granular Access to the Monitor
Tab.
Yes No Yes
Policies Controls access to the Policies tab. If you
disable this privilege, the administrator
will not see the Policies tab and will not
have access to any policy information. For
more granular control over what policy
information the administrator can see,
for example to enable access to a specific
type of policy or to enable read-only
access to policy information, leave the
Policies option enabled and then enable
or disable specific nodes on the tab as
Yes No Yes
PAN-OS® Administrator’s Guide Version 10.2 121 ©2025 Palo Alto Networks, Inc. | https://docs.paloaltonetworks.com/content/dam/techdocs/en_US/pdf/pan-os/10-2/pan-os-admin/pan-os-admin.pdf |
121 | Firewall Administration
Access Level Description Enable Read
Only
Disable
described in Provide Granular Access to
the Policy Tab.
Objects Controls access to the Objects tab. If you
disable this privilege, the administrator
will not see the Objects tab and will
not have access to any objects, security
profiles, log forwarding profiles,
decryption profiles, or schedules. For
more granular control over what objects
the administrator can see, leave the
Objects option enabled and then enable
or disable specific nodes on the tab as
described in Provide Granular Access to
the Objects Tab.
Yes No Yes
Network Controls access to the Network tab. If you
disable this privilege, the administrator
will not see the Network tab and will
not have access to any interface, zone,
VLAN, virtual wire, virtual router, IPsec
tunnel, DHCP, DNS Proxy, GlobalProtect,
or QoS configuration information or
to the network profiles. For more
granular control over what objects the
administrator can see, leave the Network
option enabled and then enable or disable
specific nodes on the tab as described in
Provide Granular Access to the Network
Tab.
Yes No Yes
Device Controls access to the Device tab. If you
disable this privilege, the administrator
will not see the Device tab and will
not have access to any firewall-wide
configuration information, such as UserID, high availability, server profile or
certificate configuration information. For
more granular control over what objects
the administrator can see, leave the
Objects option enabled and then enable
or disable specific nodes on the tab as
described in Provide Granular Access to
the Device Tab.
Yes No Yes
PAN-OS® Administrator’s Guide Version 10.2 122 ©2025 Palo Alto Networks, Inc. | https://docs.paloaltonetworks.com/content/dam/techdocs/en_US/pdf/pan-os/10-2/pan-os-admin/pan-os-admin.pdf |
122 | Firewall Administration
Access Level Description Enable Read
Only
Disable
You cannot enable access
to the Admin Roles or
Administrators nodes for a
role-based administrator even
if you enable full access to the
Device tab.
Provide Granular Access to the Monitor Tab
In some cases you might want to enable the administrator to view some but not all areas of the
Monitor tab. For example, you might want to restrict operations administrators to the Config and
System logs only, because they do not contain sensitive user data. Although this section of the
administrator role definition specifies what areas of the Monitor tab the administrator can see,
you can also couple privileges in this section with privacy privileges, such as disabling the ability
to see usernames in logs and reports. One thing to keep in mind, however, is that any systemgenerated reports will still show usernames and IP addresses even if you disable that functionality
in the role. For this reason, if you do not want the administrator to see any of the private user
information, disable access to the specific reports as detailed in the following table.
The following table lists the Monitor tab access levels and the administrator roles for which they
are available.
Device Group and Template roles can see log data only for the device groups that are
within the access domains assigned to those roles.
Access
Level
Description Administrator Role
Availability
Enable Read
Only
Disable
Monitor Enables or disables access to
the Monitor tab. If disabled, the
administrator will not see this
tab or any of the associated logs
or reports.
Firewall: Yes
Panorama: Yes
Device Group/
Template: Yes
Yes No Yes
Logs Enables or disables access to
all log files. You can also leave
this privilege enabled and then
disable specific logs that you
do not want the administrator
to see. Keep in mind that if you
want to protect the privacy of
your users while still providing
access to one or more of the
logs, you can disable the Privacy
> Show Full IP Addresses option
Firewall: Yes
Panorama: Yes
Device Group/
Template: Yes
Yes No Yes
PAN-OS® Administrator’s Guide Version 10.2 123 ©2025 Palo Alto Networks, Inc. | https://docs.paloaltonetworks.com/content/dam/techdocs/en_US/pdf/pan-os/10-2/pan-os-admin/pan-os-admin.pdf |
123 | Firewall Administration
Access
Level
Description Administrator Role
Availability
Enable Read
Only
Disable
and/or the Show User Names In
Logs And Reports option.
Traffic Specifies whether the
administrator can see the traffic
logs.
Firewall: Yes
Panorama: Yes
Device Group/
Template: Yes
Yes No Yes
Threat Specifies whether the
administrator can see the threat
logs.
Firewall: Yes
Panorama: Yes
Device Group/
Template: Yes
Yes No Yes
URL
Filtering
Specifies whether the
administrator can see the URL
filtering logs.
Firewall: Yes
Panorama: Yes
Device Group/
Template: Yes
Yes No Yes
WildFire
Submissions
Specifies whether the
administrator can see the
WildFire logs. These logs are
only available if you have a
WildFire subscription.
Firewall: Yes
Panorama: Yes
Device Group/
Template: Yes
Yes No Yes
Data
Filtering
Specifies whether the
administrator can see the data
filtering logs.
Firewall: Yes
Panorama: Yes
Device Group/
Template: Yes
Yes No Yes
HIP Match Specifies whether the
administrator can see the
HIP Match logs. HIP Match
logs are available only if you
have a GlobalProtect license
(subscription).
Firewall: Yes
Panorama: Yes
Device Group/
Template: Yes
Yes No Yes
GlobalProtectSpecifies whether the
administrator can see the
GlobalProtect logs. These
logs are available only if you
have a GlobalProtect license
(subscription).
Firewall: Yes
Panorama: Yes
Device Group/
Template: Yes
Yes No Yes
PAN-OS® Administrator’s Guide Version 10.2 124 ©2025 Palo Alto Networks, Inc. | https://docs.paloaltonetworks.com/content/dam/techdocs/en_US/pdf/pan-os/10-2/pan-os-admin/pan-os-admin.pdf |
124 | Firewall Administration
Access
Level
Description Administrator Role
Availability
Enable Read
Only
Disable
User-ID Specifies whether the
administrator can see the UserID logs.
Firewall: Yes
Panorama: Yes
Device Group/
Template: Yes
Yes No Yes
GTP Specifies whether the mobile
network operator can see GTP
logs.
Firewall: Yes
Panorama: Yes
Device Group/
Template: Yes
Yes No Yes
Tunnel
Inspection
Specifies whether the
administrator can see the
Tunnel Inspection logs.
Firewall: Yes
Panorama: Yes
Device Group/
Template: Yes
Yes No Yes
SCTP Specifies whether the mobile
network operator can see
Stream Control Transmission
Protocol (SCTP) logs.
You must enable
SCTP on Panorama
(Device > Setup
> Management)
before you
can control
Administrator
access to SCTP
logs, custom
reports, or
predefined reports
for Panorama and
Device Group/
Template.
Firewall: Yes
Panorama: Yes
Device Group/
Template: Yes
Yes No Yes
ConfigurationSpecifies whether the
administrator can see the
configuration logs.
Firewall: Yes
Panorama: Yes
Device Group/
Template: No
Yes No Yes
PAN-OS® Administrator’s Guide Version 10.2 125 ©2025 Palo Alto Networks, Inc. | https://docs.paloaltonetworks.com/content/dam/techdocs/en_US/pdf/pan-os/10-2/pan-os-admin/pan-os-admin.pdf |
125 | Firewall Administration
Access
Level
Description Administrator Role
Availability
Enable Read
Only
Disable
System Specifies whether the
administrator can see the
system logs.
Firewall: Yes
Panorama: Yes
Device Group/
Template: No
Yes No Yes
Alarms Specifies whether the
administrator can see systemgenerated alarms.
Firewall: Yes
Panorama: Yes
Device Group/
Template: Yes
Yes No Yes
AuthenticationSpecifies whether the
administrator can see the
Authentication logs.
Firewall: Yes
Panorama: Yes
Device Group/
Template: No
Yes No Yes
Automated
Correlation
Engine
Enables or disables access to
the correlation objects and
correlated event logs generated
on the firewall.
Firewall: Yes
Panorama: Yes
Device Group/
Template: Yes
Yes No Yes
Correlation
Objects
Specifies whether the
administrator can view and
enable/disable the correlation
objects.
Firewall: Yes
Panorama: Yes
Device Group/
Template: Yes
Yes No Yes
Correlated
Events
Specifies whether the
administrator can view and
enable/disable the correlation
events.
Firewall: Yes
Panorama: Yes
Device Group/
Template: Yes
Yes No Yes
Packet
Capture
Specifies whether the
administrator can see packet
captures (pcaps) from the
Monitor tab. Keep in mind that
packet captures are raw flow
data and as such may contain
user IP addresses. Disabling
the Show Full IP Addresses
privileges will not obfuscate
the IP address in the pcap and
Firewall: Yes
Panorama: No
Device Group/
Template: No
Yes Yes Yes
PAN-OS® Administrator’s Guide Version 10.2 126 ©2025 Palo Alto Networks, Inc. | https://docs.paloaltonetworks.com/content/dam/techdocs/en_US/pdf/pan-os/10-2/pan-os-admin/pan-os-admin.pdf |
126 | Firewall Administration
Access
Level
Description Administrator Role
Availability
Enable Read
Only
Disable
you should therefore disable
the Packet Capture privilege if
you are concerned about user
privacy.
App Scope Specifies whether the
administrator can see the App
Scope visibility and analysis
tools. Enabling App Scope
enables access to all of the App
Scope charts.
Firewall: Yes
Panorama: Yes
Device Group/
Template: Yes
Yes No Yes
Session
Browser
Specifies whether the
administrator can browse and
filter current running sessions
on the firewall. Keep in mind
that the session browser shows
raw flow data and as such may
contain user IP addresses.
Disabling the Show Full IP
Addresses privileges will not
obfuscate the IP address in the
session browser and you should
therefore disable the Session
Browser privilege if you are
concerned about user privacy.
Firewall: Yes
Panorama: No
Device Group/
Template: No
Yes No Yes
Block IP
List
Specifies whether the
administrator can view the
block list (Enable or Read Only)
and delete entries from the
list (Enable). If you disable the
setting, the administrator won’t
be able to view or delete entries
from the block list.
Firewall: Yes
Panorama: under
Context Switch UI:
Yes
Template: Yes
Yes Yes Yes
Botnet Specifies whether the
administrator can generate and
view botnet analysis reports
or view botnet reports in readonly mode. Disabling the Show
Full IP Addresses privileges will
not obfuscate the IP address in
scheduled botnet reports and
you should therefore disable
Firewall: Yes
Panorama: No
Device Group/
Template: No
Yes Yes Yes
PAN-OS® Administrator’s Guide Version 10.2 127 ©2025 Palo Alto Networks, Inc. | https://docs.paloaltonetworks.com/content/dam/techdocs/en_US/pdf/pan-os/10-2/pan-os-admin/pan-os-admin.pdf |
127 | Firewall Administration
Access
Level
Description Administrator Role
Availability
Enable Read
Only
Disable
the Botnet privilege if you are
concerned about user privacy.
PDF
Reports
Enables or disables access to
all PDF reports. You can also
leave this privilege enabled
and then disable specific PDF
reports that you do not want
the administrator to see. Keep in
mind that if you want to protect
the privacy of your users while
still providing access to one or
more of the reports, you can
disable the Privacy > Show Full
IP Addresses option and/or the
Show User Names In Logs And
Reports option.
Firewall: Yes
Panorama: Yes
Device Group/
Template: Yes
Yes No Yes
Manage
PDF
Summary
Specifies whether the
administrator can view, add or
delete PDF summary report
definitions. With read-only
access, the administrator can
see PDF summary report
definitions, but not add or
delete them. If you disable
this option, the administrator
can neither view the report
definitions nor add/delete them.
Firewall: Yes
Panorama: Yes
Device Group/
Template: Yes
Yes Yes Yes
PDF
Summary
Reports
Specifies whether the
administrator can see the
generated PDF Summary
reports in Monitor > Reports. If
you disable this option, the PDF
Summary Reports category will
not display in the Reports node.
Firewall: Yes
Panorama: Yes
Device Group/
Template: Yes
Yes No Yes
User
Activity
Report
Specifies whether the
administrator can view, add
or delete User Activity report
definitions and download the
reports. With read-only access,
the administrator can see User
Activity report definitions, but
not add, delete, or download
them. If you disable this option,
Firewall: Yes
Panorama: Yes
Device Group/
Template: Yes
Yes Yes Yes
PAN-OS® Administrator’s Guide Version 10.2 128 ©2025 Palo Alto Networks, Inc. | https://docs.paloaltonetworks.com/content/dam/techdocs/en_US/pdf/pan-os/10-2/pan-os-admin/pan-os-admin.pdf |
128 | Firewall Administration
Access
Level
Description Administrator Role
Availability
Enable Read
Only
Disable
the administrator cannot see
this category of PDF report.
SaaS
Application
Usage
Report
Specifies whether the
administrator can view, add or
delete a SaaS application usage
report. With read-only access,
the administrator can see the
SaaS application usage report
definitions, but cannot add
or delete them. If you disable
this option, the administrator
can neither view the report
definitions nor add or delete
them.
Firewall: Yes
Panorama: Yes
Device Group/
Template: Yes
Yes Yes Yes
Report
Groups
Specifies whether the
administrator can view, add or
delete report group definitions.
With read-only access, the
administrator can see report
group definitions, but not add or
delete them. If you disable this
option, the administrator cannot
see this category of PDF report.
Firewall: Yes
Panorama: Yes
Device Group/
Template: Yes
Yes Yes Yes
Email
Scheduler
Specifies whether the
administrator can schedule
report groups for email. Because
the generated reports that get
emailed may contain sensitive
user data that is not removed
by disabling the Privacy > Show
Full IP Addresses option and/
or the Show User Names In
Logs And Reports options
and because they may also
show log data to which the
administrator does not have
access, you should disable the
Email Scheduler option if you
have user privacy requirements.
Firewall: Yes
Panorama: Yes
Device Group/
Template: Yes
Yes Yes Yes
Manage
Custom
Reports
Enables or disables access to
all custom report functionality.
You can also leave this
privilege enabled and then
Firewall: Yes
Panorama: Yes
Yes No Yes
PAN-OS® Administrator’s Guide Version 10.2 129 ©2025 Palo Alto Networks, Inc. | https://docs.paloaltonetworks.com/content/dam/techdocs/en_US/pdf/pan-os/10-2/pan-os-admin/pan-os-admin.pdf |
129 | Firewall Administration
Access
Level
Description Administrator Role
Availability
Enable Read
Only
Disable
disable specific custom report
categories that you do not
want the administrator to be
able to access. Keep in mind
that if you want to protect the
privacy of your users while
still providing access to one or
more of the reports, you can
disable the Privacy > Show Full
IP Addresses option and/or the
Show User Names In Logs And
Reports option.
Reports that are
scheduled to run
rather than run on
demand will show
IP address and user
information. In this
case, be sure to
restrict access to
the corresponding
report areas.
In addition, the
custom report
feature does not
restrict the ability
to generate reports
that contain log
data contained
in logs that are
excluded from the
administrator role.
Device Group/
Template: Yes
Application
Statistics
Specifies whether the
administrator can create a
custom report that includes data
from the application statistics
database.
Firewall: Yes
Panorama: Yes
Device Group/
Template: Yes
Yes No Yes
Data
Filtering
Log
Specifies whether the
administrator can create a
custom report that includes data
from the Data Filtering logs.
Firewall: Yes
Panorama: Yes
Device Group/
Template: Yes
Yes No Yes
PAN-OS® Administrator’s Guide Version 10.2 130 ©2025 Palo Alto Networks, Inc. | https://docs.paloaltonetworks.com/content/dam/techdocs/en_US/pdf/pan-os/10-2/pan-os-admin/pan-os-admin.pdf |
130 | Firewall Administration
Access
Level
Description Administrator Role
Availability
Enable Read
Only
Disable
Threat Log Specifies whether the
administrator can create a
custom report that includes data
from the Threat logs.
Firewall: Yes
Panorama: Yes
Device Group/
Template: Yes
Yes No Yes
Threat
Summary
Specifies whether the
administrator can create a
custom report that includes
data from the Threat Summary
database.
Firewall: Yes
Panorama: Yes
Device Group/
Template: Yes
Yes No Yes
Traffic Log Specifies whether the
administrator can create a
custom report that includes data
from the Traffic logs.
Firewall: Yes
Panorama: Yes
Device Group/
Template: Yes
Yes No Yes
Traffic
Summary
Specifies whether the
administrator can create a
custom report that includes
data from the Traffic Summary
database.
Firewall: Yes
Panorama: Yes
Device Group/
Template: Yes
Yes No Yes
URL Log Specifies whether the
administrator can create a
custom report that includes data
from the URL Filtering logs.
Firewall: Yes
Panorama: Yes
Device Group/
Template: Yes
Yes No Yes
URL
Summary
Specifies whether the
administrator can create a
custom report that includes
data from the URL Summary
database.
Firewall: Yes
Panorama: Yes
Device Group/
Template: Yes
Yes No Yes
HIP Match Specifies whether the
administrator can create a
custom report that includes data
from the HIP Match logs.
Firewall: Yes
Panorama: Yes
Device Group/
Template: Yes
Yes No Yes
GlobalProtectSpecifies whether the
administrator can create a
Firewall: Yes
Panorama: Yes
Yes No Yes
PAN-OS® Administrator’s Guide Version 10.2 131 ©2025 Palo Alto Networks, Inc. | https://docs.paloaltonetworks.com/content/dam/techdocs/en_US/pdf/pan-os/10-2/pan-os-admin/pan-os-admin.pdf |
131 | Firewall Administration
Access
Level
Description Administrator Role
Availability
Enable Read
Only
Disable
custom report that includes data
from the GlobalProtect logs.
Device Group/
Template: Yes
WildFire
Log
Specifies whether the
administrator can create a
custom report that includes data
from the WildFire logs.
Firewall: Yes
Panorama: Yes
Device Group/
Template: Yes
Yes No Yes
GTP Log Specifies whether the mobile
network operator can create a
custom report that includes data
from GTP logs.
Firewall: Yes
Panorama: Yes
Device Group/
Template: Yes
Yes No Yes
GTP
Summary
Specifies whether the mobile
network operator can create a
custom report that includes data
from GTP logs.
Firewall: Yes
Panorama: Yes
Device Group/
Template: Yes
Yes No Yes
Tunnel
Log
Specifies whether the
administrator can create a
custom report that includes data
from tunnel inspection logs.
Firewall: Yes
Panorama: Yes
Device Group/
Template: Yes
Yes No Yes
Tunnel
Summary
Specifies whether the
administrator can create a
custom report that includes
data from the Tunnel Summary
database.
Firewall: Yes
Panorama: Yes
Device Group/
Template: Yes
Yes No Yes
SCTP Log Specifies whether the mobile
network operator can create a
custom report that includes data
from SCTP logs.
Firewall: Yes
Panorama: Yes
Device Group/
Template: Yes
Yes No Yes
SCTP
Summary
Specifies whether the mobile
network operator can create
a custom report that includes
data from the SCTP Summary
database.
Firewall: Yes
Panorama: Yes
Device Group/
Template: Yes
Yes No Yes
PAN-OS® Administrator’s Guide Version 10.2 132 ©2025 Palo Alto Networks, Inc. | https://docs.paloaltonetworks.com/content/dam/techdocs/en_US/pdf/pan-os/10-2/pan-os-admin/pan-os-admin.pdf |
132 | Firewall Administration
Access
Level
Description Administrator Role
Availability
Enable Read
Only
Disable
User-ID Specifies whether the
administrator can create a
custom report that includes data
from the User-ID logs.
Firewall: Yes
Panorama: Yes
Device Group/
Template: Yes
Yes No Yes
AuthenticationSpecifies whether the
administrator can create a
custom report that includes data
from the Authentication logs.
Firewall: Yes
Panorama: Yes
Device Group/
Template: Yes
Yes No Yes
View
Scheduled
Custom
Reports
Specifies whether the
administrator can view a custom
report that has been scheduled
to generate.
Firewall: Yes
Panorama: Yes
Device Group/
Template: Yes
Yes No Yes
View
Predefined
Application
Reports
Specifies whether the
administrator can view
Application Reports. Privacy
privileges do not impact reports
available on the Monitor >
Reports node and you should
therefore disable access to the
reports if you have user privacy
requirements.
Firewall: Yes
Panorama: Yes
Device Group/
Template: Yes
Yes No Yes
View
Predefined
Threat
Reports
Specifies whether the
administrator can view Threat
Reports. Privacy privileges do
not impact reports available on
the Monitor > Reports node and
you should therefore disable
access to the reports if you have
user privacy requirements.
Firewall: Yes
Panorama: Yes
Device Group/
Template: Yes
Yes No Yes
View
Predefined
URL
Filtering
Reports
Specifies whether the
administrator can view URL
Filtering Reports. Privacy
privileges do not impact reports
available on the Monitor >
Reports node and you should
therefore disable access to the
reports if you have user privacy
requirements.
Firewall: Yes
Panorama: Yes
Device Group/
Template: Yes
Yes No Yes
PAN-OS® Administrator’s Guide Version 10.2 133 ©2025 Palo Alto Networks, Inc. | https://docs.paloaltonetworks.com/content/dam/techdocs/en_US/pdf/pan-os/10-2/pan-os-admin/pan-os-admin.pdf |
133 | Firewall Administration
Access
Level
Description Administrator Role
Availability
Enable Read
Only
Disable
View
Predefined
Traffic
Reports
Specifies whether the
administrator can view Traffic
Reports. Privacy privileges do
not impact reports available on
the Monitor > Reports node and
you should therefore disable
access to the reports if you have
user privacy requirements.
Firewall: Yes
Panorama: Yes
Device Group/
Template: Yes
Yes No Yes
View
Predefined
GTP
Reports
Specifies whether the mobile
network operator can view GTP
Reports. Privacy privileges do
not impact reports available on
the Monitor > Reports node and
you should therefore disable
access to the reports if you have
user privacy requirements.
Firewall: Yes
Panorama: Yes
Device Group/
Template: Yes
Yes No Yes
View
Predefined
SCTP
Reports
Specifies whether the mobile
network operator can view
SCTP Reports. Privacy privileges
do not impact reports available
on the Monitor > Reports
node and you should therefore
disable access to the reports
if you have user privacy
requirements.
Firewall: Yes
Panorama: Yes
Device Group/
Template: Yes
Yes No Yes
Provide Granular Access to the Policy Tab
If you enable the Policy option in the Admin Role profile, you can then enable, disable, or provide
read-only access to specific nodes within the tab as necessary for the role you are defining. By
enabling access to a specific policy type, you enable the ability to view, add, or delete policy
rules. By enabling read-only access to a specific policy, you enable the administrator to view the
corresponding policy rule base, but not add or delete rules. Disabling access to a specific type of
policy prevents the administrator from seeing the policy rule base.
Because policy that is based on specific users (by username or IP address) must be explicitly
defined, privacy settings that disable the ability to see full IP addresses or usernames do not apply
to the Policy tab. Therefore, you should only allow access to the Policy tab to administrators that
are excluded from user privacy restrictions.
PAN-OS® Administrator’s Guide Version 10.2 134 ©2025 Palo Alto Networks, Inc. | https://docs.paloaltonetworks.com/content/dam/techdocs/en_US/pdf/pan-os/10-2/pan-os-admin/pan-os-admin.pdf |
134 | Firewall Administration
Access Level Description Enable Read
Only
Disable
Security Enable this privilege to allow the
administrator to view, add, and/or delete
security rules. Set the privilege to readonly if you want the administrator to
be able to see the rules, but not modify
them. To prevent the administrator from
seeing the security rulebase, disable this
privilege.
Yes Yes Yes
NAT Enable this privilege to allow the
administrator to view, add, and/or delete
NAT rules. Set the privilege to read-only
if you want the administrator to be able
to see the rules, but not modify them. To
prevent the administrator from seeing the
NAT rulebase, disable this privilege.
Yes Yes Yes
QoS Enable this privilege to allow the
administrator to view, add, and/or delete
QoS rules. Set the privilege to read-only
if you want the administrator to be able
to see the rules, but not modify them. To
prevent the administrator from seeing the
QoS rulebase, disable this privilege.
Yes Yes Yes
Policy Based
Forwarding
Enable this privilege to allow the
administrator to view, add, and/or delete
Policy-Based Forwarding (PBF) rules. Set
the privilege to read-only if you want
the administrator to be able to see the
rules, but not modify them. To prevent
the administrator from seeing the PBF
rulebase, disable this privilege.
Yes Yes Yes
Decryption Enable this privilege to allow the
administrator to view, add, and/or delete
decryption rules. Set the privilege to readonly if you want the administrator to
be able to see the rules, but not modify
them. To prevent the administrator from
seeing the decryption rulebase, disable
this privilege.
Yes Yes Yes
Network Packet
Broker
Enable this privilege to allow the
administrator to view, add, and/or delete
Network Packet Broker policy rules. Set
Yes Yes Yes
PAN-OS® Administrator’s Guide Version 10.2 135 ©2025 Palo Alto Networks, Inc. | https://docs.paloaltonetworks.com/content/dam/techdocs/en_US/pdf/pan-os/10-2/pan-os-admin/pan-os-admin.pdf |
135 | Firewall Administration
Access Level Description Enable Read
Only
Disable
the privilege to read-only if you want
the administrator to be able to see the
rules, but not modify them. To prevent the
administrator from seeing the Network
Packet Broker rulebase in the interface,
disable this privilege.
Tunnel Inspection Enable this privilege to allow the
administrator to view, add, and/or delete
Tunnel Inspection rules. Set the privilege
to read-only if you want the administrator
to be able to see the rules, but not modify
them. To prevent the administrator from
seeing the Tunnel Inspection rulebase,
disable this privilege.
Yes Yes Yes
Application
Override
Enable this privilege to allow the
administrator to view, add, and/or delete
application override policy rules. Set the
privilege to read-only if you want the
administrator to be able to see the rules,
but not modify them. To prevent the
administrator from seeing the application
override rulebase, disable this privilege.
Yes Yes Yes
Authentication Enable this privilege to allow the
administrator to view, add, and/or
delete Authentication policy rules.
Set the privilege to read-only if you
want the administrator to be able to
see the rules, but not modify them. To
prevent the administrator from seeing
the Authentication rulebase, disable this
privilege.
Yes Yes Yes
DoS Protection Enable this privilege to allow the
administrator to view, add, and/or delete
DoS protection rules. Set the privilege to
read-only if you want the administrator
to be able to see the rules, but not modify
them. To prevent the administrator from
seeing the DoS protection rulebase,
disable this privilege.
Yes Yes Yes
SD-WAN Enable this privilege to allow the
administrator to view, add, and/or delete
SD-WAN policy rules. Set the privilege to
Yes Yes Yes
PAN-OS® Administrator’s Guide Version 10.2 136 ©2025 Palo Alto Networks, Inc. | https://docs.paloaltonetworks.com/content/dam/techdocs/en_US/pdf/pan-os/10-2/pan-os-admin/pan-os-admin.pdf |
136 | Firewall Administration
Access Level Description Enable Read
Only
Disable
read-only if you want the administrator
to be able to see the rules, but not modify
them. To prevent the administrator from
seeing the SD-WAN policy rulebase,
disable this privilege.
Provide Granular Access to the Objects Tab
An object is a container that groups specific policy filter values—such as IP addresses, URLs,
applications, or services—for simplified rule definition. For example, an address object might
contain specific IP address definitions for the web and application servers in your DMZ zone.
When deciding whether to allow access to the objects tab as a whole, determine whether the
administrator will have policy definition responsibilities. If not, the administrator probably does
not need access to the tab. If, however, the administrator will need to create policy, you can
enable access to the tab and then provide granular access privileges at the node level.
By enabling access to a specific node, you give the administrator the privilege to view, add,
and delete the corresponding object type. Giving read-only access allows the administrator to
view the already defined objects, but not create or delete any. Disabling a node prevents the
administrator from seeing the node in the web interface.
Access Level Description Enable Read
Only
Disable
Addresses Specifies whether the administrator can
view, add, or delete address objects for
use in security policy.
Yes Yes Yes
Address Groups Specifies whether the administrator can
view, add, or delete address group objects
for use in security policy.
Yes Yes Yes
Regions Specifies whether the administrator can
view, add, or delete regions objects for
use in security, decryption, or DoS policy.
Yes Yes Yes
Applications Specifies whether the administrator can
view, add, or delete application objects for
use in policy.
Yes Yes Yes
Application
Groups
Specifies whether the administrator can
view, add, or delete application group
objects for use in policy.
Yes Yes Yes
PAN-OS® Administrator’s Guide Version 10.2 137 ©2025 Palo Alto Networks, Inc. | https://docs.paloaltonetworks.com/content/dam/techdocs/en_US/pdf/pan-os/10-2/pan-os-admin/pan-os-admin.pdf |
137 | Firewall Administration
Access Level Description Enable Read
Only
Disable
Application
Filters
Specifies whether the administrator can
view, add, or delete application filters for
simplification of repeated searches.
Yes Yes Yes
Services Specifies whether the administrator can
view, add, or delete service objects for use
in creating policy rules that limit the port
numbers an application can use.
Yes Yes Yes
Service Groups Specifies whether the administrator can
view, add, or delete service group objects
for use in security policy.
Yes Yes Yes
Tags Specifies whether the administrator can
view, add, or delete tags that have been
defined on the firewall.
Yes Yes Yes
GlobalProtect Specifies whether the administrator can
view, add, or delete HIP objects and
profiles. You can restrict access to both
types of objects at the GlobalProtect
level, or provide more granular control
by enabling the GlobalProtect privilege
and restricting HIP Object or HIP Profile
access.
Yes No Yes
HIP Objects Specifies whether the administrator can
view, add, or delete HIP objects, which are
used to define HIP profiles. HIP Objects
also generate HIP Match logs.
Yes Yes Yes
Clientless Apps Specifies whether the administrator can
view, add, modify, or delete GlobalProtect
VPN Clientless applications.
Yes Yes Yes
Clientless App
Groups
Specifies whether the administrator can
view, add, modify, or delete GlobalProtect
VPN Clientless application groups.
Yes Yes Yes
HIP Profiles Specifies whether the administrator can
view, add, or delete HIP Profiles for use in
security policy and/or for generating HIP
Match logs.
Yes Yes Yes
PAN-OS® Administrator’s Guide Version 10.2 138 ©2025 Palo Alto Networks, Inc. | https://docs.paloaltonetworks.com/content/dam/techdocs/en_US/pdf/pan-os/10-2/pan-os-admin/pan-os-admin.pdf |
138 | Firewall Administration
Access Level Description Enable Read
Only
Disable
External Dynamic
Lists
Specifies whether the administrator can
view, add, or delete external dynamic lists
for use in security policy.
Yes Yes Yes
Custom Objects Specifies whether the administrator can
see the custom spyware and vulnerability
signatures. You can restrict access
to either enable or disable access to
all custom signatures at this level,
or provide more granular control by
enabling the Custom Objects privilege
and then restricting access to each type of
signature.
Yes No Yes
Data Patterns Specifies whether the administrator can
view, add, or delete custom data pattern
signatures for use in creating custom
Vulnerability Protection profiles.
Yes Yes Yes
Spyware Specifies whether the administrator can
view, add, or delete custom spyware
signatures for use in creating custom
Vulnerability Protection profiles.
Yes Yes Yes
Vulnerability Specifies whether the administrator can
view, add, or delete custom vulnerability
signatures for use in creating custom
Vulnerability Protection profiles.
Yes Yes Yes
URL Category Specifies whether the administrator
can view, add, or delete custom URL
categories for use in policy.
Yes Yes Yes
Security Profiles Specifies whether the administrator can
see security profiles. You can restrict
access to either enable or disable access
to all security profiles at this level, or
provide more granular control by enabling
the Security Profiles privilege and then
restricting access to each type of profile.
Yes No Yes
Antivirus Specifies whether the administrator can
view, add, or delete antivirus profiles.
Yes Yes Yes
PAN-OS® Administrator’s Guide Version 10.2 139 ©2025 Palo Alto Networks, Inc. | https://docs.paloaltonetworks.com/content/dam/techdocs/en_US/pdf/pan-os/10-2/pan-os-admin/pan-os-admin.pdf |
139 | Firewall Administration
Access Level Description Enable Read
Only
Disable
Anti-Spyware Specifies whether the administrator can
view, add, or delete Anti-Spyware profiles.
Yes Yes Yes
Vulnerability
Protection
Specifies whether the administrator
can view, add, or delete Vulnerability
Protection profiles.
Yes Yes Yes
URL Filtering Specifies whether the administrator can
view, add, or delete URL filtering profiles.
Yes Yes Yes
File Blocking Specifies whether the administrator can
view, add, or delete file blocking profiles.
Yes Yes Yes
WildFire Analysis Specifies whether the administrator can
view, add, or delete WildFire analysis
profiles.
Yes Yes Yes
Data Filtering Specifies whether the administrator can
view, add, or delete data filtering profiles.
Yes Yes Yes
DoS Protection Specifies whether the administrator
can view, add, or delete DoS protection
profiles.
Yes Yes Yes
GTP Protection Specifies whether the mobile network
operator can view, add, or delete GTP
Protection profiles.
Yes Yes Yes
SCTP Protection Specifies whether the mobile network
operator can view, add, or delete Stream
Control Transmission Protocol (SCTP)
Protection profiles.
Yes Yes Yes
Security Profile
Groups
Specifies whether the administrator
can view, add, or delete security profile
groups.
Yes Yes Yes
Log Forwarding Specifies whether the administrator
can view, add, or delete log forwarding
profiles.
Yes Yes Yes
Authentication Specifies whether the administrator
can view, add, or delete authentication
enforcement objects.
Yes Yes Yes
PAN-OS® Administrator’s Guide Version 10.2 140 ©2025 Palo Alto Networks, Inc. | https://docs.paloaltonetworks.com/content/dam/techdocs/en_US/pdf/pan-os/10-2/pan-os-admin/pan-os-admin.pdf |
140 | Firewall Administration
Access Level Description Enable Read
Only
Disable
Decryption
Profile
Specifies whether the administrator can
view, add, or delete decryption profiles.
Yes Yes Yes
SD-WAN Link
Management
Specifies whether the administrator can
add or delete Path Quality, SaaS Quality,
Traffic Distribution, and Error Correction
profiles.
Yes No Yes
Path Quality
Profile
Specifies whether the administrator
can view, add, or delete SD-WAN Path
Quality profiles.
Yes Yes Yes
SaaS Quality
Profile
Specifies whether the administrator
can view, add, or delete SD-WAN SaaS
Quality profiles.
Yes Yes Yes
Traffic
Distribution
Profile
Specifies whether the administrator can
view, add, or delete SD-WAN Traffic
Distribution profiles.
Yes Yes Yes
Error Correction
Profile
Specifies whether the administrator
can view, add, or delete SD-WAN Error
Correction profiles.
Yes Yes Yes
Packet Broker
Profile
Specifies whether the administrator
can view, add, or delete Packet Broker
profiles.
Yes Yes Yes
Schedules Specifies whether the administrator can
view, add, or delete schedules for limiting
a security policy to a specific date and/or
time range.
Yes Yes Yes
Provide Granular Access to the Network Tab
When deciding whether to allow access to the Network tab as a whole, determine whether
the administrator will have network administration responsibilities, including GlobalProtect
administration. If not, the administrator probably does not need access to the tab.
You can also define access to the Network tab at the node level. By enabling access to a specific
node, you give the administrator the privilege to view, add, and delete the corresponding network
configurations. Giving read-only access allows the administrator to view the already-defined
configuration, but not create or delete any. Disabling a node prevents the administrator from
seeing the node in the web interface.
A number of Routing access levels are visible and apply only when Advanced Routing is enabled
for the device, in which case logical routers replace virtual routers.
PAN-OS® Administrator’s Guide Version 10.2 141 ©2025 Palo Alto Networks, Inc. | https://docs.paloaltonetworks.com/content/dam/techdocs/en_US/pdf/pan-os/10-2/pan-os-admin/pan-os-admin.pdf |
141 | Firewall Administration
Access Level Description Enable Read
Only
Disable
Interfaces Specifies whether the administrator
can view, add, or delete interface
configurations.
Yes Yes Yes
Zones Specifies whether the administrator can
view, add, or delete zones.
Yes Yes Yes
VLANs Specifies whether the administrator can
view, add, or delete VLANs.
Yes Yes Yes
Virtual Wires Specifies whether the administrator can
view, add, or delete virtual wires.
Yes Yes Yes
Virtual Routers Specifies whether the administrator can
view, add, modify or delete virtual routers.
Yes Yes Yes
Routing (Advanced Routing Engine) Specifies
whether the administrator can view, add,
modify or delete any of the routing fields
for an Advanced Routing Engine.
Yes Yes Yes
Logical Routers (Advanced Routing Engine) Specifies
whether the administrator can view, add,
modify or delete logical routers.
Yes Yes Yes
Routing Profiles (Advanced Routing Engine) Specifies
whether the administrator can view, add,
modify or delete routing profiles.
Yes Yes Yes
BGP (Advanced Routing Engine) Specifies
whether the administrator can view, add,
modify or delete BGP routing profiles.
Yes Yes Yes
BFD (Advanced Routing Engine) Specifies
whether the administrator can view, add,
modify or delete BFD routing profiles.
Yes
S
Yes Yes
OSPF (Advanced Routing Engine) Specifies
whether the administrator can view, add,
modify or delete OSPFv2 routing profiles.
Yes Yes Yes
OSPFv3 (Advanced Routing Engine) Specifies
whether the administrator can view, add,
modify or delete OSPFv3 routing profiles.
Yes Yes Yes
PAN-OS® Administrator’s Guide Version 10.2 142 ©2025 Palo Alto Networks, Inc. | https://docs.paloaltonetworks.com/content/dam/techdocs/en_US/pdf/pan-os/10-2/pan-os-admin/pan-os-admin.pdf |
142 | Firewall Administration
Access Level Description Enable Read
Only
Disable
RIPv2 (Advanced Routing Engine) Specifies
whether the administrator can view, add,
modify or delete RIPv2 routing profiles.
Yes Yes Yes
Filters (Advanced Routing Engine) Specifies
whether the administrator can view, add,
modify or delete filters.
Yes Yes Yes
Multicast (Advanced Routing Engine) Specifies
whether the administrator can view, add,
modify or delete IPv4 multicast routing
profiles.
Yes Yes Yes
IPSec Tunnels Specifies whether the administrator can
view, add, modify, or delete IPSec Tunnel
configurations.
Yes Yes Yes
GRE Tunnels Specifies whether the administrator can
view, add, modify, or delete GRE Tunnel
configurations.
Yes Yes Yes
DHCP Specifies whether the administrator can
view, add, modify, or delete DHCP server
and DHCP relay configurations.
Yes Yes Yes
DNS Proxy Specifies whether the administrator can
view, add, modify, or delete DNS proxy
configurations.
Yes Yes Yes
GlobalProtect Specifies whether the administrator
can view, add, modify GlobalProtect
portal and gateway configurations. You
can disable access to the GlobalProtect
functions entirely, or you can enable the
GlobalProtect privilege and then restrict
the role to either the portal or gateway
configuration areas.
Yes No Yes
Portals Specifies whether the administrator can
view, add, modify, or delete GlobalProtect
portal configurations.
Yes Yes Yes
Gateways Specifies whether the administrator can
view, add, modify, or delete GlobalProtect
gateway configurations.
Yes Yes Yes
PAN-OS® Administrator’s Guide Version 10.2 143 ©2025 Palo Alto Networks, Inc. | https://docs.paloaltonetworks.com/content/dam/techdocs/en_US/pdf/pan-os/10-2/pan-os-admin/pan-os-admin.pdf |
143 | Firewall Administration
Access Level Description Enable Read
Only
Disable
MDM Specifies whether the administrator can
view, add, modify, or delete GlobalProtect
MDM server configurations.
Yes Yes Yes
Device Block List Specifies whether the administrator can
view, add, modify, or delete device block
lists.
Yes Yes Yes
Clientless Apps Specifies whether the administrator can
view, add, modify, or delete GlobalProtect
Clientless VPN applications.
Yes Yes Yes
Clientless App
Groups
Specifies whether the administrator can
view, add, modify, or delete GlobalProtect
Clientless VPN application groups.
Yes Yes Yes
QoS Specifies whether the administrator
can view, add, modify, or delete QoS
configurations.
Yes Yes Yes
LLDP Specifies whether the administrator
can view add, modify, or delete LLDP
configurations.
Yes Yes Yes
Network Profiles Sets the default state to enable or disable
for all of the Network settings described
below.
Yes No Yes
GlobalProtect
IPSec Crypto
Controls access to the Network Profiles >
GlobalProtect IPSec Crypto node.
If you disable this privilege, the
administrator will not see that node, or
configure algorithms for authentication
and encryption in VPN tunnels between a
GlobalProtect gateway and clients.
If you set the privilege to read-only,
the administrator can view existing
GlobalProtect IPSec Crypto profiles but
cannot add or edit them.
Yes Yes Yes
IKE Gateways Controls access to the Network Profiles
> IKE Gateways node. If you disable
this privilege, the administrator will not
see the IKE Gateways node or define
gateways that include the configuration
Yes Yes Yes
PAN-OS® Administrator’s Guide Version 10.2 144 ©2025 Palo Alto Networks, Inc. | https://docs.paloaltonetworks.com/content/dam/techdocs/en_US/pdf/pan-os/10-2/pan-os-admin/pan-os-admin.pdf |
144 | Firewall Administration
Access Level Description Enable Read
Only
Disable
information necessary to perform IKE
protocol negotiation with peer gateway.
If the privilege state is set to read-only,
you can view the currently configured
IKE Gateways but cannot add or edit
gateways.
IPSec Crypto Controls access to the Network Profiles
> IPSec Crypto node. If you disable this
privilege, the administrator will not see
the Network Profiles > IPSec Crypto
node or specify protocols and algorithms
for identification, authentication, and
encryption in VPN tunnels based on IPSec
SA negotiation.
If the privilege state is set to read-only,
you can view the currently configured
IPSec Crypto configuration but cannot
add or edit a configuration.
Yes Yes Yes
IKE Crypto Controls how devices exchange
information to ensure secure
communication. Specify the protocols
and algorithms for identification,
authentication, and encryption in VPN
tunnels based on IPsec SA negotiation
(IKEv1 Phase-1).
Yes Yes Yes
Monitor Controls access to the Network Profiles
> Monitor node. If you disable this
privilege, the administrator will not see
the Network Profiles > Monitor node or
be able to create or edit a monitor profile
that is used to monitor IPSec tunnels and
monitor a next-hop device for policybased forwarding (PBF) rules.
If the privilege state is set to read-only,
you can view the currently configured
monitor profile configuration but cannot
add or edit a configuration.
Yes Yes Yes
Interface Mgmt Controls access to the Network Profiles
> Interface Mgmt node. If you disable this
privilege, the administrator will not see
the Network Profiles > Interface Mgmt
Yes Yes Yes
PAN-OS® Administrator’s Guide Version 10.2 145 ©2025 Palo Alto Networks, Inc. | https://docs.paloaltonetworks.com/content/dam/techdocs/en_US/pdf/pan-os/10-2/pan-os-admin/pan-os-admin.pdf |
145 | Firewall Administration
Access Level Description Enable Read
Only
Disable
node or be able to specify the protocols
that are used to manage the firewall.
If the privilege state is set to readonly, you can view the currently
configured Interface management profile
configuration but cannot add or edit a
configuration.
Zone Protection Controls access to the Network Profiles >
Zone Protection node. If you disable this
privilege, the administrator will not see
the Network Profiles > Zone Protection
node or be able to configure a profile that
determines how the firewall responds to
attacks from specified security zones.
If the privilege state is set to read-only,
you can view the currently configured
Zone Protection profile configuration but
cannot add or edit a configuration.
Yes Yes Yes
QoS Profile Controls access to the Network Profiles >
QoS node. If you disable this privilege, the
administrator will not see the Network
Profiles > QoS node or be able to
configure a QoS profile that determines
how QoS traffic classes are treated.
If the privilege state is set to read-only,
you can view the currently configured
QoS profile configuration but cannot add
or edit a configuration.
Yes Yes Yes
LLDP Profile Controls access to the Network Profiles
> LLDP node. If you disable this privilege,
the administrator will not see the
Network Profiles > LLDP node or be able
to configure an LLDP profile that controls
whether the interfaces on the firewall can
participate in the Link Layer Discovery
Protocol.
If the privilege state is set to read-only,
you can view the currently configured
LLDP profile configuration but cannot add
or edit a configuration.
Yes Yes Yes
PAN-OS® Administrator’s Guide Version 10.2 146 ©2025 Palo Alto Networks, Inc. | https://docs.paloaltonetworks.com/content/dam/techdocs/en_US/pdf/pan-os/10-2/pan-os-admin/pan-os-admin.pdf |
146 | Firewall Administration
Access Level Description Enable Read
Only
Disable
BFD Profile Controls access to the Network Profiles
> BFD Profile node. If you disable this
privilege, the administrator will not see
the Network Profiles > BFD Profile node
or be able to configure a BFD profile.
A Bidirectional Forwarding Detection
(BFD) profile allows you to configure BFD
settings to apply to one or more static
routes or routing protocols. Thus, BFD
detects a failed link or BFD peer and
allows an extremely fast failover.
If the privilege state is set to read-only,
you can view the currently configured
BFD profile but cannot add or edit a BFD
profile.
Yes Yes Yes
SD-WAN
Interface Profile
Controls access to the SD-WAN Interface
Profile node. If you disable this privilege,
the administrator will not see the SDWAN Interface Profile node or be able to
configure an SD-WAN Interface Profile.
An SD-WAN Interface Profile defines
the characteristics of ISP connections
and specifies the link speed and how
frequently the firewall monitors the link.
If the privilege state is set to read-only,
you can view the currently configured SDWAN Interface Profile but cannot add or
edit one.
Yes Yes Yes
Provide Granular Access to the Device Tab
To define granular access privileges for the Device tab, when creating or editing an admin role
profile (Device > Admin Roles), scroll down to the Device node on the WebUI tab.
Access Level Description Enable Read
Only
Disable
Setup Controls access to the Setup node. If you
disable this privilege, the administrator
will not see the Setup node or have access
to firewall-wide setup configuration
information, such as Management,
Yes Yes Yes
PAN-OS® Administrator’s Guide Version 10.2 147 ©2025 Palo Alto Networks, Inc. | https://docs.paloaltonetworks.com/content/dam/techdocs/en_US/pdf/pan-os/10-2/pan-os-admin/pan-os-admin.pdf |
147 | Firewall Administration
Access Level Description Enable Read
Only
Disable
Operations, Service, Content-ID, WildFire
or Session setup information.
If the privilege state is set to read-only,
you can view the current configuration
but cannot make any changes.
Management Controls access to the Management
node. If you disable this privilege, the
administrator will not be able to configure
settings such as the hostname, domain,
timezone, authentication, logging and
reporting, Panorama connections, banner,
message, and password complexity
settings, and more.
If the privilege state is set to read-only,
you can view the current configuration
but cannot make any changes.
Yes Yes Yes
Operations Controls access to the Operations and
Telemetry and Threat Intelligence
nodes. If you disable this privilege, the
administrator cannot:
• Load firewall configurations.
• Save or revert the firewall
configuration.
This privilege applies
only to the Device >
Operations options.
The Save and Commit
privileges control whether
the administrator can save
or revert configurations
through the Config >
Save and Config > Revert
options.
• Create custom logos.
• Configure SNMP monitoring of firewall
settings.
• Configure the Statistics Service feature.
• Configure Telemetry and Threat
Intelligence settings.
Yes Yes Yes
PAN-OS® Administrator’s Guide Version 10.2 148 ©2025 Palo Alto Networks, Inc. | https://docs.paloaltonetworks.com/content/dam/techdocs/en_US/pdf/pan-os/10-2/pan-os-admin/pan-os-admin.pdf |
148 | Firewall Administration
Access Level Description Enable Read
Only
Disable
Only administrators with the predefined
Superuser role can export or import
firewall configurations and shut down the
firewall.
Only administrators with the predefined
Superuser or Device Administrator role
can reboot the firewall or restart the
dataplane.
Administrators with a role that allows
access only to specific virtual systems
cannot load, save, or revert firewall
configurations through the Device >
Operations options.
Services Controls access to the Services
node. If you disable this privilege, the
administrator will not be able to configure
services for DNS servers, an update
server, proxy server, or NTP servers, or
set up service routes.
If the privilege state is set to read-only,
you can view the current configuration
but cannot make any changes.
Yes Yes Yes
Content-ID Controls access to the Content-ID
node. If you disable this privilege, the
administrator will not be able to configure
URL filtering or Content-ID.
If the privilege state is set to read-only,
you can view the current configuration
but cannot make any changes.
Yes Yes Yes
WildFire Controls access to the WildFire
node. If you disable this privilege, the
administrator will not be able to configure
WildFire settings.
If the privilege state is set to read-only,
you can view the current configuration
but cannot make any changes.
Yes Yes Yes
Session Controls access to the Session node.
If you disable this privilege, the
administrator will not be able to configure
session settings or timeouts for TCP, UDP
Yes Yes Yes
PAN-OS® Administrator’s Guide Version 10.2 149 ©2025 Palo Alto Networks, Inc. | https://docs.paloaltonetworks.com/content/dam/techdocs/en_US/pdf/pan-os/10-2/pan-os-admin/pan-os-admin.pdf |
149 | Firewall Administration
Access Level Description Enable Read
Only
Disable
or ICMP, or configure decryption or VPN
session settings.
If the privilege state is set to read-only,
you can view the current configuration
but cannot make any changes.
HSM Controls access to the HSM node. If you
disable this privilege, the administrator
will not be able to configure a Hardware
Security Module.
If the privilege state is set to read-only,
you can view the current configuration
but cannot make any changes.
Yes Yes Yes
High Availability Controls access to the High Availability
node. If you disable this privilege,
the administrator will not see the
High Availability node or have access
to firewall-wide high availability
configuration information such as General
setup information or Link and Path
Monitoring.
If you set this privilege to read-only, the
administrator can view High Availability
configuration information for the firewall
but is not allowed to perform any
configuration procedures.
Yes Yes Yes
Config Audit Controls access to the Config Audit
node. If you disable this privilege, the
administrator will not see the Config
Audit node or have access to any firewallwide configuration information.
Yes No Yes
Administrators Controls access to the Administrators
node. This function can only be allowed
for read-only access.
If you disable this privilege, the
administrator will not see the
Administrators node or have access to
information about their own administrator
account.
If you set this privilege to read-only, the
administrator can view the configuration
No Yes Yes
PAN-OS® Administrator’s Guide Version 10.2 150 ©2025 Palo Alto Networks, Inc. | https://docs.paloaltonetworks.com/content/dam/techdocs/en_US/pdf/pan-os/10-2/pan-os-admin/pan-os-admin.pdf |
150 | Firewall Administration
Access Level Description Enable Read
Only
Disable
information for their own administrator
account. They will not see any information
about other administrator accounts
configured on the firewall.
Admin Roles Controls access to the Admin Roles node.
This function can only be allowed for
read-only access.
If you disable this privilege, the
administrator will not see the Admin
Roles node or have access to any firewallwide information concerning Admin Role
profiles configuration.
If you set this privilege to read-only, you
can view the configuration information for
all administrator roles configured on the
firewall.
No Yes Yes
Authentication
Profile
Controls access to the Authentication
Profile node. If you disable this privilege,
the administrator will not see the
Authentication Profile node or be
able to create or edit authentication
profiles that specify RADIUS, TACACS
+, LDAP, Kerberos, SAML, multi-factor
authentication (MFA), or local database
authentication settings. PAN-OS uses
authentication profiles to authenticate
firewall administrators and Authentication
Portal or GlobalProtect end users.
If you set this privilege to read-only, the
administrator can view the Authentication
Profile information but cannot create or
edit authentication profiles.
Yes Yes Yes
Authentication
Sequence
Controls access to the Authentication
Sequence node. If you disable this
privilege, the administrator will not see
the Authentication Sequence node or be
able to create or edit an authentication
sequence.
If you set this privilege to read-only, the
administrator can view the Authentication
Yes Yes Yes
PAN-OS® Administrator’s Guide Version 10.2 151 ©2025 Palo Alto Networks, Inc. | https://docs.paloaltonetworks.com/content/dam/techdocs/en_US/pdf/pan-os/10-2/pan-os-admin/pan-os-admin.pdf |
151 | Firewall Administration
Access Level Description Enable Read
Only
Disable
Profile information but cannot create or
edit an authentication sequence.
Virtual Systems Controls access to the Virtual Systems
node. If you disable this privilege, the
administrator will not see or be able to
configure virtual systems.
If the privilege state is set to read-only,
you can view the currently configured
virtual systems but cannot add or edit a
configuration.
Yes Yes Yes
Shared Gateways Controls access to the Shared Gateways
node. Shared gateways allow virtual
systems to share a common interface for
external communications.
If you disable this privilege, the
administrator will not see or be able to
configure shared gateways.
If the privilege state is set to read-only,
you can view the currently configured
shared gateways but cannot add or edit a
configuration.
Yes Yes Yes
User
Identification
Controls access to the User Identification
node. If you disable this privilege, the
administrator will not see the User
Identification node or have access
to firewall-wide User Identification
configuration information, such as User
Mapping, Connection Security, User-ID
Agents, Terminal Server Agents, Group
Mappings Settings, or Authentication
Portal Settings.
If you set this privilege to read-only, the
administrator can view configuration
information for the firewall but is not
allowed to perform any configuration
procedures.
Yes Yes Yes
VM Information
Source
Controls access to the VM Information
Source node that allows you to configure
the firewall/Windows User-ID agent to
collect VM inventory automatically. If you
disable this privilege, the administrator
Yes Yes Yes
PAN-OS® Administrator’s Guide Version 10.2 152 ©2025 Palo Alto Networks, Inc. | https://docs.paloaltonetworks.com/content/dam/techdocs/en_US/pdf/pan-os/10-2/pan-os-admin/pan-os-admin.pdf |
152 | Firewall Administration
Access Level Description Enable Read
Only
Disable
will not see the VM Information Source
node.
If you set this privilege to read-only,
the administrator can view the VM
information sources configured but
cannot add, edit, or delete any sources.
This privilege is not available
to Device Group and
Template administrators.
Certificate
Management
Sets the default state to enable or disable
for all of the Certificate settings described
below.
Yes No Yes
Certificates Controls access to the Certificates
node. If you disable this privilege, the
administrator will not see the Certificates
node or be able to configure or access
information regarding Device Certificates
or Default Trusted Certificate Authorities.
If you set this privilege to read-only,
the administrator can view Certificate
configuration information for the firewall
but is not allowed to perform any
configuration procedures.
Yes Yes Yes
Certificate Profile Controls access to the Certificate Profile
node. If you disable this privilege, the
administrator will not see the Certificate
Profile node or be able to create
certificate profiles.
If you set this privilege to read-only, the
administrator can view Certificate Profiles
that are currently configured for the
firewall but is not allowed to create or edit
a certificate profile.
Yes Yes Yes
OCSP Responder Controls access to the OCSP Responder
node. If you disable this privilege, the
administrator will not see the OCSP
Responder node or be able to define
a server that will be used to verify the
revocation status of certificates issues by
the firewall.
Yes Yes Yes
PAN-OS® Administrator’s Guide Version 10.2 153 ©2025 Palo Alto Networks, Inc. | https://docs.paloaltonetworks.com/content/dam/techdocs/en_US/pdf/pan-os/10-2/pan-os-admin/pan-os-admin.pdf |
153 | Firewall Administration
Access Level Description Enable Read
Only
Disable
If you set this privilege to read-only,
the administrator can view the OCSP
Responder configuration for the firewall
but is not allowed to create or edit an
OCSP responder configuration.
SSL/TLS Service
Profile
Controls access to the SSL/TLS Service
Profile node.
If you disable this privilege, the
administrator will not see the node
or configure a profile that specifies a
certificate and a protocol version or range
of versions for firewall services that use
SSL/TLS.
If you set this privilege to read-only, the
administrator can view existing SSL/TLS
Service profiles but cannot create or edit
them.
Yes Yes Yes
SCEP Controls access to the SCEP node. If you
disable this privilege, the administrator
will not see the node or be able to define
a profile that specifies simple certificate
enrollment protocol (SCEP) settings for
issuing unique device certificates.
If you set this privilege to read-only, the
administrator can view existing SCEP
profiles but cannot create or edit them.
Yes Yes Yes
SSL Decryption
Exclusion
Controls access to the SSL Decryption
Exclusion node. If you disable this
privilege, the administrator will not
see the node or be able to add custom
exclusions.
If you set this privilege to read-only,
the administrator can view existing SSL
decryption exceptions but cannot create
or edit them.
Yes Yes Yes
SSH Service
Profile
Controls access to the SSH Service Profile
node. If you disable this privilege, the
administrator will be unable to see the
node or configure a profile to specify
parameters for SSH connections to your
Yes Yes Yes
PAN-OS® Administrator’s Guide Version 10.2 154 ©2025 Palo Alto Networks, Inc. | https://docs.paloaltonetworks.com/content/dam/techdocs/en_US/pdf/pan-os/10-2/pan-os-admin/pan-os-admin.pdf |
154 | Firewall Administration
Access Level Description Enable Read
Only
Disable
Palo Alto Networks management and high
availability (HA) appliances.
If you set this privilege to read-only,
the administrator can view existing SSH
service profiles but cannot edit or create
them.
Response Pages Controls access to the Response Pages
node. If you disable this privilege, the
administrator will not see the Response
Page node or be able to define a custom
HTML message that is downloaded and
displayed instead of a requested web page
or file.
If you set this privilege to read-only, the
administrator can view the Response Page
configuration for the firewall but is not
allowed to create or edit a response page
configuration.
Yes Yes Yes
Log Settings Sets the default state to enable or disable
for all of the Log settings described below.
Yes No Yes
System Controls access to the Log Settings >
System node. If you disable this privilege,
the administrator cannot see the Log
Settings > System node or specify which
System logs the firewall forwards to
Panorama or external services (such as a
syslog server).
If you set this privilege to read-only, the
administrator can view the Log Settings
> System settings for the firewall but
cannot add, edit, or delete the settings.
Yes Yes Yes
Configuration Controls access to the Log Settings >
Configuration node. If you disable this
privilege, the administrator cannot see
the Log Settings > Configuration node
or specify which Configuration logs the
firewall forwards to Panorama or external
services (such as a syslog server).
If you set this privilege to read-only, the
administrator can view the Log Settings >
Yes Yes Yes
PAN-OS® Administrator’s Guide Version 10.2 155 ©2025 Palo Alto Networks, Inc. | https://docs.paloaltonetworks.com/content/dam/techdocs/en_US/pdf/pan-os/10-2/pan-os-admin/pan-os-admin.pdf |
155 | Firewall Administration
Access Level Description Enable Read
Only
Disable
Configuration settings for the firewall but
cannot add, edit, or delete the settings.
User-ID Controls access to the Log Settings >
User-ID node. If you disable this privilege,
the administrator cannot see the Log
Settings > User-ID node or specify which
User-ID logs the firewall forwards to
Panorama or external services (such as a
syslog server).
If you set this privilege to read-only, the
administrator can view the Log Settings
> User-ID settings for the firewall but
cannot add, edit, or delete the settings.
Yes Yes Yes
HIP Match Controls access to the Log Settings
> HIP Match node. If you disable this
privilege, the administrator cannot see
the Log Settings > HIP Match node or
specify which Host Information Profile
(HIP) match logs the firewall forwards to
Panorama or external services (such as
a syslog server). HIP match logs provide
information on Security policy rules that
apply to GlobalProtect endpoints.
If you set this privilege to read-only, the
administrator can view the Log Settings
> HIP settings for the firewall but cannot
add, edit, or delete the settings.
Yes Yes Yes
GlobalProtect Controls access to the Log Settings >
GlobalProtect node. If you disable this
privilege, the administrator cannot see
the Log Settings > GlobalProtect node
or specify which GlobalProtect logs the
firewall forwards to Panorama or external
services (such as a syslog server).
If you set this privilege to read-only, the
administrator can view the Log Settings >
GlobalProtect settings for the firewall but
cannot add, edit, or delete the settings.
Yes Yes Yes
Correlation Controls access to the Log Settings >
Correlation node. If you disable this
privilege, the administrator cannot see
Yes Yes Yes
PAN-OS® Administrator’s Guide Version 10.2 156 ©2025 Palo Alto Networks, Inc. | https://docs.paloaltonetworks.com/content/dam/techdocs/en_US/pdf/pan-os/10-2/pan-os-admin/pan-os-admin.pdf |
156 | Firewall Administration
Access Level Description Enable Read
Only
Disable
the Log Settings > Correlation node or
add, delete, or modify correlation log
forwarding settings or tag source or
destination IP addresses.
If you set this privilege to read-only, the
administrator can view the Log Settings
> Correlation settings for the firewall but
cannot add, edit, or delete the settings.
Alarm Settings Controls access to the Log Settings >
Alarm Settings node. If you disable this
privilege, the administrator cannot see
the Log Settings > Alarm Settings node
or configure notifications that the firewall
generates when a Security policy rule (or
group of rules) is hit repeatedly within a
configurable time period.
If you set this privilege to read-only, the
administrator can view the Log Settings >
Alarm Settings for the firewall but cannot
edit the settings.
Yes Yes Yes
Manage Logs Controls access to the Log Settings >
Manage Logs node. If you disable this
privilege, the administrator cannot see the
Log Settings > Manage Logs node or clear
the indicated logs.
If you set this privilege to read-only, the
administrator can view the Log Settings >
Manage Logs information but cannot clear
any of the logs.
Yes Yes Yes
Server Profiles Sets the default state to enable or disable
for all of the Server Profiles settings
described below.
Yes No Yes
SNMP Trap Controls access to the Server Profiles
> SNMP Trap node. If you disable this
privilege, the administrator will not see
the Server Profiles > SNMP Trap node
or be able to specify one or more SNMP
trap destinations to be used for system
log entries.
If you set this privilege to read-only, the
administrator can view the Server Profiles
Yes Yes Yes
PAN-OS® Administrator’s Guide Version 10.2 157 ©2025 Palo Alto Networks, Inc. | https://docs.paloaltonetworks.com/content/dam/techdocs/en_US/pdf/pan-os/10-2/pan-os-admin/pan-os-admin.pdf |
157 | Firewall Administration
Access Level Description Enable Read
Only
Disable
> SNMP Trap Logs information but
cannot specify SNMP trap destinations.
Syslog Controls access to the Server Profiles >
Syslog node. If you disable this privilege,
the administrator will not see the Server
Profiles > Syslog node or be able to
specify one or more syslog servers.
If you set this privilege to read-only, the
administrator can view the Server Profiles
> Syslog information but cannot specify
syslog servers.
Yes Yes Yes
Email Controls access to the Server Profiles >
Email node. If you disable this privilege,
the administrator will not see the Server
Profiles > Email node or be able to
configure an email profile that can be used
to enable email notification for system
and configuration log entries.
If you set this privilege to read-only, the
administrator can view the Server Profiles
> Email information but cannot configure
an email server profile.
Yes Yes Yes
HTTP Controls access to the Server Profiles >
HTTP node. If you disable this privilege,
the administrator will not see the Server
Profiles > HTTP node or be able to
configure an HTTP server profile that can
be used to enable log forwarding to HTTP
destinations any log entries.
If you set this privilege to read-only, the
administrator can view the Server Profiles
> HTTP information but cannot configure
an HTTP server profile.
Yes Yes Yes
Netflow Controls access to the Server Profiles >
Netflow node. If you disable this privilege,
the administrator will not see the Server
Profiles > Netflow node or be able to
define a NetFlow server profile, which
specifies the frequency of the export
along with the NetFlow servers that will
receive the exported data.
Yes Yes Yes
PAN-OS® Administrator’s Guide Version 10.2 158 ©2025 Palo Alto Networks, Inc. | https://docs.paloaltonetworks.com/content/dam/techdocs/en_US/pdf/pan-os/10-2/pan-os-admin/pan-os-admin.pdf |
158 | Firewall Administration
Access Level Description Enable Read
Only
Disable
If you set this privilege to read-only, the
administrator can view the Server Profiles
> Netflow information but cannot define a
Netflow profile.
RADIUS Controls access to the Server Profiles >
RADIUS node. If you disable this privilege,
the administrator will not see the Server
Profiles > RADIUS node or be able to
configure settings for the RADIUS servers
that are identified in authentication
profiles.
If you set this privilege to read-only,
the administrator can view the Server
Profiles > RADIUS information but cannot
configure settings for the RADIUS servers.
Yes Yes Yes
SCP Controls access to the Server Profiles >
SCP node.
If you disable this privilege, the
administrator will not see the node or
configure settings for SCP servers.
If you set this privilege to read-only, the
administrator can view existing SCP server
profiles but cannot add or edit them.
Yes Yes Yes
TACACS+ Controls access to the Server Profiles >
TACACS+ node.
If you disable this privilege, the
administrator will not see the node or
configure settings for the TACACS+
servers that dynamic content update
scheduled reference.
If you set this privilege to read-only, the
administrator can view existing TACACS
+ server profiles but cannot add or edit
them.
Yes Yes Yes
LDAP Controls access to the Server Profiles >
LDAP node. If you disable this privilege,
the administrator will not see the Server
Profiles > LDAP node or be able to
configure settings for the LDAP servers
Yes Yes Yes
PAN-OS® Administrator’s Guide Version 10.2 159 ©2025 Palo Alto Networks, Inc. | https://docs.paloaltonetworks.com/content/dam/techdocs/en_US/pdf/pan-os/10-2/pan-os-admin/pan-os-admin.pdf |
159 | Firewall Administration
Access Level Description Enable Read
Only
Disable
to use for authentication by way of
authentication profiles.
If you set this privilege to read-only, the
administrator can view the Server Profiles
> LDAP information but cannot configure
settings for the LDAP servers.
Kerberos Controls access to the Server Profiles
> Kerberos node. If you disable this
privilege, the administrator will not see
the Server Profiles > Kerberos node or
configure a Kerberos server that allows
users to authenticate natively to a domain
controller.
If you set this privilege to read-only,
the administrator can view the Server
Profiles > Kerberos information but
cannot configure settings for Kerberos
servers.
Yes Yes Yes
SAML Identity
Provider
Controls access to the Server Profiles
> SAML Identity Provider node. If you
disable this privilege, the administrator
cannot see the node or configure SAML
identity provider (IdP) server profiles.
If you set this privilege to read-only, the
administrator can view the Server Profiles
> SAML Identity Provider information
but cannot configure SAML IdP server
profiles.
Yes Yes Yes
Multi Factor
Authentication
Controls access to the Server Profiles >
Multi Factor Authentication node. If you
disable this privilege, the administrator
cannot see the node or configure multifactor authentication (MFA) server
profiles.
If you set this privilege to read-only, the
administrator can view the Server Profiles
> SAML Identity Provider information but
cannot configure MFA server profiles.
PAN-OS® Administrator’s Guide Version 10.2 160 ©2025 Palo Alto Networks, Inc. | https://docs.paloaltonetworks.com/content/dam/techdocs/en_US/pdf/pan-os/10-2/pan-os-admin/pan-os-admin.pdf |
160 | Firewall Administration
Access Level Description Enable Read
Only
Disable
Local User
Database
Sets the default state to enable or disable
for all of the Local User Database settings
described below.
Yes No Yes
Users Controls access to the Local User
Database > Users node. If you disable
this privilege, the administrator will
not see the Local User Database >
Users node or set up a local database
on the firewall to store authentication
information for remote access users,
firewall administrators, and Authentication
Portal users.
If you set this privilege to read-only, the
administrator can view the Local User
Database > Users information but cannot
set up a local database on the firewall to
store authentication information.
Yes Yes Yes
User Groups Controls access to the Local User
Database > Users node. If you disable this
privilege, the administrator will not see
the Local User Database > Users node or
be able to add user group information to
the local database.
If you set this privilege to read-only, the
administrator can view the Local User
Database > Users information but cannot
add user group information to the local
database.
Yes Yes Yes
Access Domain Controls access to the Access Domain
node. If you disable this privilege, the
administrator will not see the Access
Domain node or be able to create or edit
an access domain.
If you set this privilege to read-only,
the administrator can view the Access
Domain information but cannot create or
edit an access domain.
Yes Yes Yes
Scheduled Log
Export
Controls access to the Scheduled Log
Export node. If you disable this privilege,
the administrator will not see the
Scheduled Log Export node or be able
Yes No Yes
PAN-OS® Administrator’s Guide Version 10.2 161 ©2025 Palo Alto Networks, Inc. | https://docs.paloaltonetworks.com/content/dam/techdocs/en_US/pdf/pan-os/10-2/pan-os-admin/pan-os-admin.pdf |
161 | Firewall Administration
Access Level Description Enable Read
Only
Disable
schedule exports of logs and save them
to a File Transfer Protocol (FTP) server
in CSV format or use Secure Copy (SCP)
to securely transfer data between the
firewall and a remote host.
If you set this privilege to read-only, the
administrator can view the Scheduled Log
Export Profile information but cannot
schedule the export of logs.
Software Controls access to the Software
node. If you disable this privilege, the
administrator will not see the Software
node or view the latest versions of the
PAN-OS software available from Palo Alto
Networks, read the release notes for each
version, and select a release to download
and install.
If you set this privilege to read-only, the
administrator can view the Software
information but cannot download or
install software.
Yes Yes Yes
GlobalProtect
Client
Controls access to the GlobalProtect
Client node. If you disable this privilege,
the administrator will not see the
GlobalProtect Client node or view
available GlobalProtect releases,
download the code or activate the
GlobalProtect app.
If you set this privilege to read-only,
the administrator can view the available
GlobalProtect Client releases but cannot
download or install the app software.
Yes Yes Yes
Dynamic Updates Controls access to the Dynamic Updates
node. If you disable this privilege, the
administrator will not see the Dynamic
Updates node or be able to view the
latest updates, read the release notes for
each update, or select an update to upload
and install.
If you set this privilege to read-only,
the administrator can view the available
Dynamic Updates releases, read the
Yes Yes Yes
PAN-OS® Administrator’s Guide Version 10.2 162 ©2025 Palo Alto Networks, Inc. | https://docs.paloaltonetworks.com/content/dam/techdocs/en_US/pdf/pan-os/10-2/pan-os-admin/pan-os-admin.pdf |
162 | Firewall Administration
Access Level Description Enable Read
Only
Disable
release notes but cannot upload or install
the software.
Licenses Controls access to the Licenses
node. If you disable this privilege, the
administrator will not see the Licenses
node or be able to view the licenses
installed or activate licenses.
If you set this privilege to read-only,
the administrator can view the installed
Licenses, but cannot perform license
management functions.
Yes Yes Yes
Support Controls access to the Support node.
If you disable this privilege, the
administrator cannot see the Support
node, activate support, or access
production and security alerts from Palo
Alto Networks.
If you set this privilege to read-only, the
administrator can see the Support node
and access production and security alerts
but cannot activate support.
Yes Yes Yes
Master Key and
Diagnostics
Controls access to the Master Key and
Diagnostics node. If you disable this
privilege, the administrator will not see
the Master Key and Diagnostics node or
be able to specify a master key to encrypt
private keys on the firewall.
If you set this privilege to read-only,
the administrator can view the Master
Key and Diagnostics node and view
information about master keys that have
been specified but cannot add or edit a
new master key configuration.
Yes Yes Yes
Policy
Recommendation
Controls access to IoT and SaaS policy
rule recommendations. If you disable
these privileges, the administrator can’t
see the Policy Recommendation > IoT
node, the Policy Recommendation >
SaaS node, or both, depending on which
privileges you disable.
Yes Yes Yes
PAN-OS® Administrator’s Guide Version 10.2 163 ©2025 Palo Alto Networks, Inc. | https://docs.paloaltonetworks.com/content/dam/techdocs/en_US/pdf/pan-os/10-2/pan-os-admin/pan-os-admin.pdf |
163 | Firewall Administration
Access Level Description Enable Read
Only
Disable
If you set these privileges to read-only,
the administrator can view the nodes
but cannot import policy rules or edit
information.
Define User Privacy Settings in the Admin Role Profile
To define what private end user data an administrator has access to, when creating or editing an
admin role profile (Device > Admin Roles), scroll down to the Privacy option on the WebUI tab.
Access Level Description Enable Read
Only
Disable
Privacy Sets the default state to enable or disable
for all of the privacy settings described
below.
Yes N/A Yes
Show Full IP
addresses
When disabled, full IP addresses obtained
by traffic running through the Palo Alto
firewall are not shown in logs or reports.
In place of the IP addresses that are
normally displayed, the relevant subnet is
displayed.
Scheduled reports that are
displayed in the interface
through Monitor > Reports
and reports that are sent
via scheduled emails will
still display full IP addresses.
Because of this exception,
we recommend that the
following settings within the
Monitor tab be set to disable:
Custom Reports, Application
Reports, Threat Reports,
URL Filtering Reports, Traffic
Reports and Email Scheduler.
Yes N/A Yes
Show User
Names in Logs
and Reports
When disabled, usernames obtained by
traffic running through the Palo Alto
Networks firewall are not shown in logs
or reports. Columns where the usernames
would normally be displayed are empty.
Yes N/A Yes
PAN-OS® Administrator’s Guide Version 10.2 164 ©2025 Palo Alto Networks, Inc. | https://docs.paloaltonetworks.com/content/dam/techdocs/en_US/pdf/pan-os/10-2/pan-os-admin/pan-os-admin.pdf |
164 | Firewall Administration
Access Level Description Enable Read
Only
Disable
Scheduled reports that are
displayed in the interface
through Monitor > Reports
or reports that are sent via
the email scheduler will
still display usernames.
Because of this exception,
we recommend that the
following settings within the
Monitor tab be set to disable:
Custom Reports, Application
Reports, Threat Reports,
URL Filtering Reports, Traffic
Reports and Email Scheduler.
View PCAP Files When disabled, packet capture files that
are normally available within the Traffic,
Threat and Data Filtering logs are not
displayed.
Yes N/A Yes
Restrict Administrator Access to Commit and Validate Functions
To restrict access to commit (and revert), save, and validate functions when creating or editing
an Admin Role profile (Device > Admin Roles), scroll down to the Commit, Save, and Validate
options on the WebUI tab.
Access Level Description Enable Read
Only
Disable
Commit Sets the default state to enabled or
disabled for all of the commit and revert
privileges described below.
Yes N/A Yes
Device When disabled, an administrator cannot
commit or revert changes that any
administrator made to the firewall
configuration, including his or her own
changes.
Yes N/A Yes
Commit For
Other Admins
When disabled, an administrator cannot
commit or revert changes that other
administrators made to the firewall
configuration.
Yes N/A Yes
PAN-OS® Administrator’s Guide Version 10.2 165 ©2025 Palo Alto Networks, Inc. | https://docs.paloaltonetworks.com/content/dam/techdocs/en_US/pdf/pan-os/10-2/pan-os-admin/pan-os-admin.pdf |
165 | Firewall Administration
Access Level Description Enable Read
Only
Disable
Save Sets the default state to enabled or
disabled for all of the save operation
privileges described below.
Yes N/A Yes
Partial save When disabled, an administrator cannot
save changes that any administrator made
to the firewall configuration, including his
or her own changes.
Yes N/A Yes
Save For Other
Admins
When disabled, an administrator cannot
save changes that other administrators
made to the firewall configuration.
Yes N/A Yes
Validate When disabled, an administrator cannot
validate a configuration.
Yes N/A Yes
Provide Granular Access to Global Settings
To define what global settings and administrator has access to, when creating or editing an admin
role profile (Device > Admin Roles), scroll down to the Global option on the WebUI tab.
Access Level Description Enable Read
Only
Disable
Global Sets the default state to enable or disable
for all of the global settings described
below. In effect, this setting is only for
System Alarms at this time.
Yes N/A Yes
System Alarms When disabled, an administrator cannot
view or acknowledge alarms that are
generated.
Yes N/A Yes
Provide Granular Access to the Panorama Tab
The following table lists the Panorama tab access levels and the custom Panorama administrator
roles for which they are available. Firewall administrators cannot access any of these privileges.
Access Level Description Administrator Role
Availability
Enable Read
Only
Disable
Setup Specifies whether the
administrator can view or edit
Panorama setup information,
Panorama: Yes Yes Yes Yes
PAN-OS® Administrator’s Guide Version 10.2 166 ©2025 Palo Alto Networks, Inc. | https://docs.paloaltonetworks.com/content/dam/techdocs/en_US/pdf/pan-os/10-2/pan-os-admin/pan-os-admin.pdf |
166 | Firewall Administration
Access Level Description Administrator Role
Availability
Enable Read
Only
Disable
including Management,
Operations and Telemetry,
Services, Content-ID, WildFire,
Session, or HSM.
If you set the privilege to:
• read-only, the administrator
can see the information but
cannot edit it.
• disable this privilege, the
administrator cannot see or
edit the information.
Device Group/
Template: No
High
Availability
Specifies whether the
administrator can view and
manage high availability (HA)
settings for the Panorama
management server.
If you set this privilege to
read-only, the administrator
can view HA configuration
information for the Panorama
management server but can’t
manage the configuration.
If you disable this privilege,
the administrator can’t see
or manage HA configuration
settings for the Panorama
management server.
Panorama: Yes
Device Group/
Template: No
Yes Yes Yes
Config
Audit
Specifies whether the
administrator can run
Panorama configuration audits.
If you disable this privilege,
the administrator can’t run
Panorama configuration audits.
Panorama: Yes
Device Group/
Template: No
Yes No Yes
AdministratorsSpecifies whether the
administrator can view
Panorama administrator
account details.
You can’t enable full access
to this function: just readonly access. (Only Panorama
administrators with a dynamic
Panorama: Yes
Device Group/
Template: No
No Yes Yes
PAN-OS® Administrator’s Guide Version 10.2 167 ©2025 Palo Alto Networks, Inc. | https://docs.paloaltonetworks.com/content/dam/techdocs/en_US/pdf/pan-os/10-2/pan-os-admin/pan-os-admin.pdf |
167 | Firewall Administration
Access Level Description Administrator Role
Availability
Enable Read
Only
Disable
role can add, edit, or delete
Panorama administrators.)
With read-only access,
the administrator can see
information about his or her
own account but no other
Panorama administrator
accounts.
If you disable this privilege,
the administrator can’t
see information about any
Panorama administrator
account, including his or her
own.
Admin
Roles
Specifies whether the
administrator can view
Panorama administrator roles.
You can’t enable full access
to this function: just readonly access. (Only Panorama
administrators with a dynamic
role can add, edit, or delete
custom Panorama roles.)
With read-only access,
the administrator can see
Panorama administrator
role configurations but can’t
manage them.
If you disable this privilege,
the administrator can’t
see or manage Panorama
administrator roles.
Panorama: Yes
Device Group/
Template: No
No Yes Yes
Access
Domain
Specifies whether the
administrator can view, add,
edit, delete, or clone access
domain configurations for
Panorama administrators.
(This privilege controls access
Panorama: Yes
Device Group/
Template: No
Yes Yes Yes
PAN-OS® Administrator’s Guide Version 10.2 168 ©2025 Palo Alto Networks, Inc. | https://docs.paloaltonetworks.com/content/dam/techdocs/en_US/pdf/pan-os/10-2/pan-os-admin/pan-os-admin.pdf |
168 | Firewall Administration
Access Level Description Administrator Role
Availability
Enable Read
Only
Disable
only to the configuration of
access domains, not access to
the device groups, templates,
and firewall contexts that are
assigned to access domains.)
If you set this privilege to
read-only, the administrator
can view Panorama access
domain configurations but can’t
manage them.
If you disable this privilege,
the administrator can’t see
or manage Panorama access
domain configurations.
You
assign
access
domains
to Device
Group
and
Template
administrators
so they
can
access the
configuration
and
monitoring
data
within the
device
groups,
templates,
and
firewall
contexts
that are
assigned
to those
access
domains.
Authentication
Profile
Specifies whether the
administrator can view,
add, edit, delete, or clone
authentication profiles for
Panorama administrators.
If you set this privilege to readonly, the administrator can
view Panorama authentication
profiles but can’t manage them.
If you disable this privilege,
the administrator can’t
see or manage Panorama
authentication profiles.
Panorama: Yes
Device Group/
Template: No
Yes Yes Yes
Authentication
Sequence
Specifies whether the
administrator can view,
Panorama: Yes Yes Yes Yes
PAN-OS® Administrator’s Guide Version 10.2 169 ©2025 Palo Alto Networks, Inc. | https://docs.paloaltonetworks.com/content/dam/techdocs/en_US/pdf/pan-os/10-2/pan-os-admin/pan-os-admin.pdf |
169 | Firewall Administration
Access Level Description Administrator Role
Availability
Enable Read
Only
Disable
add, edit, delete, or clone
authentication sequences for
Panorama administrators.
If you set this privilege to readonly, the administrator can
view Panorama authentication
sequences but can’t manage
them.
If you disable this privilege,
the administrator can’t
see or manage Panorama
authentication sequences.
Device Group/
Template: No
User
Identification
Specifies whether the
administrator can configure
User-ID connection security
and view, add, edit, or delete
data redistribution points (such
as User-ID agents).
If you set this privilege to
read-only, the administrator
can view settings for UserID connection security and
redistribution points but can’t
manage the settings.
If you disable this privilege,
the administrator can’t see
or manage settings for UserID connection security or
redistribution points.
Panorama: Yes
Device Group/
Template: No
Yes Yes Yes
Managed
Devices
Specifies whether the
administrator can view, add,
edit, or delete firewalls as
managed devices, and install
software or content updates on
them.
If you set this privilege to readonly, the administrator can
see managed firewalls but
can’t add, delete, tag, or install
updates on them.
If you disable this privilege,
the administrator can’t view,
Panorama: Yes
Device Group/
Template: Yes
Yes
(No
for
Device
Group
and
Template
roles)
Yes Yes
PAN-OS® Administrator’s Guide Version 10.2 170 ©2025 Palo Alto Networks, Inc. | https://docs.paloaltonetworks.com/content/dam/techdocs/en_US/pdf/pan-os/10-2/pan-os-admin/pan-os-admin.pdf |
170 | Firewall Administration
Access Level Description Administrator Role
Availability
Enable Read
Only
Disable
add, edit, tag, delete, or install
updates on managed firewalls.
An administrator
with Device
Deployment
privileges can still
select Panorama
> Device
Deployment to
install updates
on managed
firewalls.
Templates Specifies whether the
administrator can view, edit,
add, or delete templates and
template stacks.
If you set the privilege to
read-only, the administrator
can see template and stack
configurations but can’t
manage them.
If you disable this privilege,
the administrator can’t see or
manage template and stack
configurations.
Panorama: Yes
Device Group/
Template: Yes
Device
Group
and
Template
administrators
can see
only the
templates
and
stacks
that are
within the
access
domains
assigned
to those
administrators.
Yes
(No
for
Device
Group
and
Template
admins)
Yes Yes
Device
Groups
Specifies whether the
administrator can view, edit,
add, or delete device groups.
If you set this privilege to readonly, the administrator can see
Panorama: Yes
Device Group/
Template: Yes
Yes Yes Yes
PAN-OS® Administrator’s Guide Version 10.2 171 ©2025 Palo Alto Networks, Inc. | https://docs.paloaltonetworks.com/content/dam/techdocs/en_US/pdf/pan-os/10-2/pan-os-admin/pan-os-admin.pdf |
171 | Firewall Administration
Access Level Description Administrator Role
Availability
Enable Read
Only
Disable
device group configurations
but can’t manage them.
If you disable this privilege,
the administrator can’t see
or manage device group
configurations.
Device
Group
and
Template
administrators
can
access
only the
device
groups
that are
within the
access
domains
assigned
to those
administrators.
Managed
Collectors
Specifies whether the
administrator can view, edit,
add, or delete managed
collectors.
If you set this privilege to
read-only, the administrator
can see managed collector
configurations but can’t
manage them.
If you disable this privilege,
the administrator can’t view,
edit, add, or delete managed
collector configurations.
An administrator
with Device
Deployment
privileges can still
use the Panorama
> Device
Deployment
options to
install updates
on managed
collectors.
Panorama: Yes
Device Group/
Template: No
Yes Yes Yes
PAN-OS® Administrator’s Guide Version 10.2 172 ©2025 Palo Alto Networks, Inc. | https://docs.paloaltonetworks.com/content/dam/techdocs/en_US/pdf/pan-os/10-2/pan-os-admin/pan-os-admin.pdf |
172 | Firewall Administration
Access Level Description Administrator Role
Availability
Enable Read
Only
Disable
Collector
Groups
Specifies whether the
administrator can view, edit,
add, or delete Collector
Groups.
If you set this privilege to readonly, the administrator can
see Collector Groups but can’t
manage them.
If you disable this privilege,
the administrator can’t see or
manage Collector Groups.
Panorama: Yes
Device Group/
Template: No
Yes Yes Yes
VMware
Service
Manager
Specifies whether the
administrator can view and
edit VMware Service Manager
settings.
If you set this privilege to readonly, the administrator can see
the settings but can’t perform
any related configuration or
operational procedures.
If you disable this privilege,
the administrator can’t see the
settings or perform any related
configuration or operational
procedures.
Panorama: Yes
Device Group/
Template: No
Yes Yes Yes
Certificate
Management
Sets the default state,
enabled or disabled, for all
of the Panorama certificate
management privileges.
Panorama: Yes
Device Group/
Template: No
Yes No Yes
Certificates Specifies whether the
administrator can view, edit,
generate, delete, revoke,
renew, or export certificates.
This privilege also specifies
whether the administrator can
import or export HA keys.
If you set this privilege to readonly, the administrator can see
Panorama certificates but can’t
manage the certificates or HA
keys.
Panorama: Yes
Device Group/
Template: No
Yes Yes Yes
PAN-OS® Administrator’s Guide Version 10.2 173 ©2025 Palo Alto Networks, Inc. | https://docs.paloaltonetworks.com/content/dam/techdocs/en_US/pdf/pan-os/10-2/pan-os-admin/pan-os-admin.pdf |
173 | Firewall Administration
Access Level Description Administrator Role
Availability
Enable Read
Only
Disable
If you disable this privilege,
the administrator can’t see or
manage Panorama certificates
or HA keys.
Certificate
Profile
Specifies whether the
administrator can view, add,
edit, delete or clone Panorama
certificate profiles.
If you set this privilege to readonly, the administrator can see
Panorama certificate profiles
but can’t manage them.
If you disable this privilege,
the administrator can’t see or
manage Panorama certificate
profiles.
Panorama: Yes
Device Group/
Template: No
Yes Yes Yes
SSL/TLS
Service
Profile
Specifies whether the
administrator can view, add,
edit, delete or clone SSL/TLS
Service profiles.
If you set this privilege to readonly, the administrator can see
SSL/TLS Service profiles but
can’t manage them.
If you disable this privilege,
the administrator can’t see
or manage SSL/TLS Service
profiles.
Panorama: Yes
Device Group/
Template: No
Yes Yes Yes
Log
Settings
Sets the default state, enabled
or disabled, for all the log
setting privileges.
Panorama: Yes
Device Group/
Template: No
Yes No Yes
System Specifies whether the
administrator can see and
configure the settings that
control the forwarding of
System logs to external
services (syslog, email, SNMP
trap, or HTTP servers).
If you set this privilege to readonly, the administrator can
Panorama: Yes
Device Group/
Template: No
Yes Yes Yes
PAN-OS® Administrator’s Guide Version 10.2 174 ©2025 Palo Alto Networks, Inc. | https://docs.paloaltonetworks.com/content/dam/techdocs/en_US/pdf/pan-os/10-2/pan-os-admin/pan-os-admin.pdf |
174 | Firewall Administration
Access Level Description Administrator Role
Availability
Enable Read
Only
Disable
see the System log forwarding
settings but can’t manage
them.
If you disable this privilege,
the administrator can’t see or
manage the settings.
This privilege
pertains only to
System logs that
Panorama and
Log Collectors
generate. The
Collector
Groups privilege
(Panorama
> Collector
Groups) controls
forwarding for
System logs that
Log Collectors
receive from
firewalls. The
Device > Log
Settings >
System privilege
controls log
forwarding from
firewalls directly
to external
services (without
aggregation on
Log Collectors).
Config Specifies whether the
administrator can see and
configure the settings that
control the forwarding of
Config logs to external services
(syslog, email, SNMP trap, or
HTTP servers).
If you set this privilege to readonly, the administrator can
see the Config log forwarding
Panorama: Yes
Device Group/
Template: No
Yes Yes Yes
PAN-OS® Administrator’s Guide Version 10.2 175 ©2025 Palo Alto Networks, Inc. | https://docs.paloaltonetworks.com/content/dam/techdocs/en_US/pdf/pan-os/10-2/pan-os-admin/pan-os-admin.pdf |
175 | Firewall Administration
Access Level Description Administrator Role
Availability
Enable Read
Only
Disable
settings but can’t manage
them.
If you disable this privilege,
the administrator can’t see or
manage the settings.
This privilege
pertains only to
Config logs that
Panorama and
Log Collectors
generate. The
Collector
Groups privilege
(Panorama
> Collector
Groups) controls
forwarding for
Config logs that
Log Collectors
receive from
firewalls. The
Device > Log
Settings >
Configuration
privilege
controls log
forwarding from
firewalls directly
to external
services (without
aggregation on
Log Collectors).
User-ID Specifies whether the
administrator can see and
configure the settings that
control the forwarding of UserID logs to external services
(syslog, email, SNMP trap, or
HTTP servers).
If you set this privilege to readonly, the administrator can
see the Config log forwarding
Panorama: Yes
Device Group/
Template: No
Yes Yes Yes
PAN-OS® Administrator’s Guide Version 10.2 176 ©2025 Palo Alto Networks, Inc. | https://docs.paloaltonetworks.com/content/dam/techdocs/en_US/pdf/pan-os/10-2/pan-os-admin/pan-os-admin.pdf |
176 | Firewall Administration
Access Level Description Administrator Role
Availability
Enable Read
Only
Disable
settings but can’t manage
them.
If you disable this privilege,
the administrator can’t see or
manage the settings.
This privilege
pertains only
to User-ID logs
that Panorama
generates.
The Collector
Groups privilege
(Panorama
> Collector
Groups) controls
forwarding for
User-ID logs that
Log Collectors
receive from
firewalls. The
Device > Log
Settings > UserID privilege
controls log
forwarding from
firewalls directly
to external
services (without
aggregation on
Log Collectors).
HIP Match Specifies whether the
administrator can see and
configure the settings that
control the forwarding of HIP
Match logs from a Panorama
virtual appliance in Legacy
mode to external services
(syslog, email, SNMP trap, or
HTTP servers).
If you set this privilege to readonly, the administrator can see
the forwarding settings of HIP
Panorama: Yes
Device Group/
Template: No
Yes Yes Yes
PAN-OS® Administrator’s Guide Version 10.2 177 ©2025 Palo Alto Networks, Inc. | https://docs.paloaltonetworks.com/content/dam/techdocs/en_US/pdf/pan-os/10-2/pan-os-admin/pan-os-admin.pdf |
177 | Firewall Administration
Access Level Description Administrator Role
Availability
Enable Read
Only
Disable
Match logs but can’t manage
them.
If you disable this privilege,
the administrator can’t see or
manage the settings.
The Collector
Groups privilege
(Panorama
> Collector
Groups) controls
forwarding for HIP
Match logs that
Log Collectors
receive from
firewalls. The
Device > Log
Settings > HIP
Match privilege
controls log
forwarding from
firewalls directly
to external
services (without
aggregation on
Log Collectors).
GlobalProtect Specifies whether the
administrator can see and
configure the settings that
control the forwarding of
GlobalProtect logs from a
Panorama virtual appliance
in Legacy mode to external
services (syslog, email, SNMP
trap, or HTTP servers).
If you set this privilege to readonly, the administrator can
see the forwarding settings of
GlobalProtect logs but can’t
manage them.
If you disable this privilege,
the administrator can’t see or
manage the settings.
Panorama: Yes
Device Group/
Template: No
Yes Yes Yes
PAN-OS® Administrator’s Guide Version 10.2 178 ©2025 Palo Alto Networks, Inc. | https://docs.paloaltonetworks.com/content/dam/techdocs/en_US/pdf/pan-os/10-2/pan-os-admin/pan-os-admin.pdf |
178 | Firewall Administration
Access Level Description Administrator Role
Availability
Enable Read
Only
Disable
The Collector
Groups privilege
(Panorama
> Collector
Groups) controls
forwarding for
GlobalProtect
logs that Log
Collectors receive
from firewalls.
The Device >
Log Settings >
GlobalProtect
privilege
controls log
forwarding from
firewalls directly
to external
services (without
aggregation on
Log Collectors).
Correlation Specifies whether the
administrator can see and
configure the settings that
control the forwarding of
Correlation logs from a
Panorama virtual appliance
in Legacy mode to external
services (syslog, email, SNMP
trap, or HTTP servers).
If you set this privilege to readonly, the administrator can see
the Correlation log forwarding
settings but can’t manage
them.
If you disable this privilege,
the administrator can’t see or
manage the settings.
Panorama: Yes
Device Group/
Template: No
Yes Yes Yes
PAN-OS® Administrator’s Guide Version 10.2 179 ©2025 Palo Alto Networks, Inc. | https://docs.paloaltonetworks.com/content/dam/techdocs/en_US/pdf/pan-os/10-2/pan-os-admin/pan-os-admin.pdf |
179 | Firewall Administration
Access Level Description Administrator Role
Availability
Enable Read
Only
Disable
The Collector
Groups privilege
(Panorama
> Collector
Groups) controls
forwarding of
Correlation
logs from a
Panorama MSeries appliance
or Panorama
virtual appliance
in Panorama
mode.
Traffic Specifies whether the
administrator can see and
configure the settings that
control the forwarding of
Traffic logs from a Panorama
virtual appliance in Legacy
mode to external services
(syslog, email, SNMP trap, or
HTTP servers).
If you set this privilege to readonly, the administrator can
see the forwarding settings of
Traffic logs but can’t manage
them.
If you disable this privilege,
the administrator can’t see or
manage the settings.
Panorama: Yes
Device Group/
Template: No
Yes Yes Yes
PAN-OS® Administrator’s Guide Version 10.2 180 ©2025 Palo Alto Networks, Inc. | https://docs.paloaltonetworks.com/content/dam/techdocs/en_US/pdf/pan-os/10-2/pan-os-admin/pan-os-admin.pdf |
180 | Firewall Administration
Access Level Description Administrator Role
Availability
Enable Read
Only
Disable
The Collector
Groups privilege
(Panorama
> Collector
Groups) controls
forwarding for
Traffic logs that
Log Collectors
receive from
firewalls. The
Log Forwarding
privilege (Objects
> Log Forwarding)
controls
forwarding from
firewalls directly
to external
services (without
aggregation on
Log Collectors).
Threat Specifies whether the
administrator can see and
configure the settings that
control the forwarding of
Threat logs from a Panorama
virtual appliance in Legacy
mode to external services
(syslog, email, SNMP trap, or
HTTP servers).
If you set this privilege to readonly, the administrator can
see the forwarding settings of
Threat logs but can’t manage
them.
If you disable this privilege,
the administrator can’t see or
manage the settings.
Panorama: Yes
Device Group/
Template: No
Yes Yes Yes
PAN-OS® Administrator’s Guide Version 10.2 181 ©2025 Palo Alto Networks, Inc. | https://docs.paloaltonetworks.com/content/dam/techdocs/en_US/pdf/pan-os/10-2/pan-os-admin/pan-os-admin.pdf |
181 | Firewall Administration
Access Level Description Administrator Role
Availability
Enable Read
Only
Disable
The Collector
Groups privilege
(Panorama
> Collector
Groups) controls
forwarding for
Threat logs that
Log Collectors
receive from
firewalls. The
Log Forwarding
privilege (Objects
> Log Forwarding)
controls
forwarding from
firewalls directly
to external
services (without
aggregation on
Log Collectors).
WildFire Specifies whether the
administrator can see and
configure the settings that
control the forwarding of
WildFire logs from a Panorama
virtual appliance in Legacy
mode to external services
(syslog, email, SNMP trap, or
HTTP servers).
If you set this privilege to readonly, the administrator can
see the forwarding settings of
WildFire logs but can’t manage
them.
If you disable this privilege,
the administrator can’t see or
manage the settings.
Panorama: Yes
Device Group/
Template: No
Yes Yes Yes
PAN-OS® Administrator’s Guide Version 10.2 182 ©2025 Palo Alto Networks, Inc. | https://docs.paloaltonetworks.com/content/dam/techdocs/en_US/pdf/pan-os/10-2/pan-os-admin/pan-os-admin.pdf |
182 | Firewall Administration
Access Level Description Administrator Role
Availability
Enable Read
Only
Disable
The Collector
Groups privilege
(Panorama >
Collector Groups)
controls the
forwarding for
WildFire logs that
Log Collectors
receive from
firewalls. The
Log Forwarding
privilege (Objects
> Log Forwarding)
controls
forwarding from
firewalls directly
to external
services (without
aggregation on
Log Collectors).
Server
Profiles
Sets the default state, enabled
or disabled, for all the server
profile privileges.
Panorama: Yes
Device Group/
Template: No
Yes No Yes
PAN-OS® Administrator’s Guide Version 10.2 183 ©2025 Palo Alto Networks, Inc. | https://docs.paloaltonetworks.com/content/dam/techdocs/en_US/pdf/pan-os/10-2/pan-os-admin/pan-os-admin.pdf |
183 | Firewall Administration
Access Level Description Administrator Role
Availability
Enable Read
Only
Disable
These privileges
pertain only to
the server profiles
that are used for
forwarding logs
from Panorama or
Log Collectors and
the server profiles
that are used for
authenticating
Panorama
administrators.
The Device >
Server Profiles
privileges control
access to the
server profiles
that are used
for forwarding
logs directly
from firewalls
to external
services and for
authenticating
firewall
administrators.
SNMP Trap Specifies whether the
administrator can see and
configure SNMP trap server
profiles.
If you set this privilege to readonly, the administrator can see
SNMP trap server profiles but
can’t manage them.
If you disable this privilege,
the administrator can’t see
or manage SNMP trap server
profiles.
Panorama: Yes
Device Group/
Template: No
Yes Yes Yes
Syslog Specifies whether the
administrator can see and
configure Syslog server
profiles.
Panorama: Yes
Device Group/
Template: No
Yes Yes Yes
PAN-OS® Administrator’s Guide Version 10.2 184 ©2025 Palo Alto Networks, Inc. | https://docs.paloaltonetworks.com/content/dam/techdocs/en_US/pdf/pan-os/10-2/pan-os-admin/pan-os-admin.pdf |
184 | Firewall Administration
Access Level Description Administrator Role
Availability
Enable Read
Only
Disable
If you set this privilege to readonly, the administrator can see
Syslog server profiles but can’t
manage them.
If you disable this privilege,
the administrator can’t see or
manage Syslog server profiles.
Email Specifies whether the
administrator can see and
configure email server profiles.
If you set this privilege to readonly, the administrator can see
email server profiles but can’t
manage them.
If you disable this privilege,
the administrator can’t see or
manage email server profiles.
Panorama: Yes
Device Group/
Template: No
Yes Yes Yes
RADIUS Specifies whether the
administrator can see and
configure the RADIUS server
profiles that are used to
authenticate Panorama
administrators.
If you set this privilege to readonly, the administrator can see
the RADIUS server profiles but
can’t manage them.
If you disable this privilege,
the administrator can’t see or
manage the RADIUS server
profiles.
Panorama: Yes
Device Group/
Template: No
Yes Yes Yes
TACACS+ Specifies whether the
administrator can see and
configure the TACACS+
server profiles that are used
to authenticate Panorama
administrators.
If you disable this privilege,
the administrator can’t see
the node or configure settings
for the TACACS+ servers
Panorama: Yes
Device Group/
Template: No
Yes Yes Yes
PAN-OS® Administrator’s Guide Version 10.2 185 ©2025 Palo Alto Networks, Inc. | https://docs.paloaltonetworks.com/content/dam/techdocs/en_US/pdf/pan-os/10-2/pan-os-admin/pan-os-admin.pdf |
185 | Firewall Administration
Access Level Description Administrator Role
Availability
Enable Read
Only
Disable
that authentication profiles
reference.
If you set this privilege to readonly, the administrator can
view existing TACACS+ server
profiles but can’t add or edit
them.
LDAP Specifies whether the
administrator can see and
configure the LDAP server
profiles that are used to
authenticate Panorama
administrators.
If you set this privilege to readonly, the administrator can see
the LDAP server profiles but
can’t manage them.
If you disable this privilege,
the administrator can’t see
or manage the LDAP server
profiles.
Panorama: Yes
Device Group/
Template: No
Yes Yes Yes
Kerberos Specifies whether the
administrator can see and
configure the Kerberos
server profiles that are used
to authenticate Panorama
administrators.
If you set this privilege to readonly, the administrator can see
the Kerberos server profiles
but can’t manage them.
If you disable this privilege,
the administrator can’t see or
manage the Kerberos server
profiles.
Panorama: Yes
Device Group/
Template: No
Yes Yes Yes
SAML
Identity
Provider
Specifies whether the
administrator can see and
configure the SAML Identity
Provider (IdP) server profiles
that are used to authenticate
Panorama administrators.
Panorama: Yes
Device Group/
Template: No
Yes Yes Yes
PAN-OS® Administrator’s Guide Version 10.2 186 ©2025 Palo Alto Networks, Inc. | https://docs.paloaltonetworks.com/content/dam/techdocs/en_US/pdf/pan-os/10-2/pan-os-admin/pan-os-admin.pdf |
186 | Firewall Administration
Access Level Description Administrator Role
Availability
Enable Read
Only
Disable
If you set this privilege to readonly, the administrator can see
the SAML IdP server profiles
but can’t manage them.
If you disable this privilege,
the administrator can’t see or
manage the SAML IdP server
profiles.
Scheduled
Config
Export
Specifies whether the
administrator can view, add,
edit, delete, or clone scheduled
Panorama configuration
exports.
If you set this privilege to readonly, the administrator can
view the scheduled exports but
can’t manage them.
If you disable this privilege,
the administrator can’t see or
manage the scheduled exports.
Panorama: Yes
Device Group/
Template: No
Yes No Yes
Software Specifies whether the
administrator can: view
information about software
updates installed on the
Panorama management server;
download, upload, or install
the updates; and view the
associated release notes.
If you set this privilege to
read-only, the administrator
can view information about
Panorama software updates
and view the associated release
notes but can’t perform any
related operations.
If you disable this privilege,
the administrator can’t see
Panorama software updates,
see the associated release
notes, or perform any related
operations.
Panorama: Yes
Device Group/
Template: No
Yes Yes Yes
PAN-OS® Administrator’s Guide Version 10.2 187 ©2025 Palo Alto Networks, Inc. | https://docs.paloaltonetworks.com/content/dam/techdocs/en_US/pdf/pan-os/10-2/pan-os-admin/pan-os-admin.pdf |
187 | Firewall Administration
Access Level Description Administrator Role
Availability
Enable Read
Only
Disable
The Panorama
> Device
Deployment
> Software
privilege controls
access to PAN-OS
software deployed
on firewalls
and Panorama
software deployed
on Dedicated Log
Collectors.
Dynamic
Updates
Specifies whether the
administrator can: view
information about content
updates installed on the
Panorama management
server (for example, WildFire
updates); download, upload,
install, or revert the updates;
and view the associated release
notes.
If you set this privilege to
read-only, the administrator
can view information about
Panorama content updates and
view the associated release
notes but can’t perform any
related operations.
If you disable this privilege,
the administrator can’t see
Panorama content updates, see
the associated release notes, or
perform any related operations.
Panorama: Yes
Device Group/
Template: No
Yes Yes Yes
PAN-OS® Administrator’s Guide Version 10.2 188 ©2025 Palo Alto Networks, Inc. | https://docs.paloaltonetworks.com/content/dam/techdocs/en_US/pdf/pan-os/10-2/pan-os-admin/pan-os-admin.pdf |
188 | Firewall Administration
Access Level Description Administrator Role
Availability
Enable Read
Only
Disable
The Panorama
> Device
Deployment
> Dynamic
Updates privilege
controls access to
content updates
deployed on
firewalls and
Dedicated Log
Collectors.
Support Specifies whether the
administrator can: view
Panorama support license
information, product alerts,
and security alerts; activate a
support license, and manage
cases. Only a superuser admin
can generate Tech Support
files.
If you set this privilege to
read-only, the administrator
can view Panorama support
information, product alerts,
and security alerts, but can’t
activate a support license,
generate Tech Support files, or
manage cases.
If you disable this privilege,
the administrator can’t: see
Panorama support information,
product alerts, or security
alerts; activate a support
license, generate Tech Support
files, or manage cases.
Panorama: Yes
Device Group/
Template: No
Yes Yes Yes
Device
Deployment
Sets the default state, enabled
or disabled, for all the privileges
associated with deploying
licenses and software or
content updates to firewalls
and Log Collectors.
Panorama: Yes
Device Group/
Template: Yes
Yes No Yes
PAN-OS® Administrator’s Guide Version 10.2 189 ©2025 Palo Alto Networks, Inc. | https://docs.paloaltonetworks.com/content/dam/techdocs/en_US/pdf/pan-os/10-2/pan-os-admin/pan-os-admin.pdf |
189 | Firewall Administration
Access Level Description Administrator Role
Availability
Enable Read
Only
Disable
The Panorama
> Software
and Panorama
> Dynamic
Updates
privileges control
the software
and content
updates installed
on a Panorama
management
server.
Software Specifies whether the
administrator can: view
information about the software
updates installed on firewalls
and Log Collectors; download,
upload, or install the updates;
and view the associated release
notes.
If you set this privilege to readonly, the administrator can
see information about the
software updates and view
the associated release notes
but can’t deploy the updates
to firewalls or dedicated Log
Collectors.
If you disable this privilege,
the administrator can’t see
information about the software
updates, see the associated
release notes, or deploy
the updates to firewalls or
Dedicated Log Collectors.
Panorama: Yes
Device Group/
Template: Yes
Yes Yes Yes
GlobalProtect
Client
Specifies whether the
administrator can: view
information about
GlobalProtect app software
updates on firewalls; download,
upload, or activate the updates;
and view the associated release
notes.
Panorama: Yes
Device Group/
Template: Yes
Yes Yes Yes
PAN-OS® Administrator’s Guide Version 10.2 190 ©2025 Palo Alto Networks, Inc. | https://docs.paloaltonetworks.com/content/dam/techdocs/en_US/pdf/pan-os/10-2/pan-os-admin/pan-os-admin.pdf |
190 | Firewall Administration
Access Level Description Administrator Role
Availability
Enable Read
Only
Disable
If you set this privilege to
read-only, the administrator
can see information about
GlobalProtect app software
updates and view the
associated release notes but
can’t activate the updates on
firewalls.
If you disable this privilege,
the administrator can’t
see information about
GlobalProtect app software
updates, see the associated
release notes, or activate the
updates on firewalls.
Dynamic
Updates
Specifies whether the
administrator can: view
information about the
content updates (for example,
Applications updates) installed
on firewalls and Dedicated Log
Collectors; download, upload,
or install the updates; and view
the associated release notes.
If you set this privilege to readonly, the administrator can
see information about the
content updates and view the
associated release notes but
can’t deploy the updates to
firewalls or Dedicated Log
Collectors.
If you disable this privilege,
the administrator can’t see
information about the content
updates, see the associated
release notes, or deploy
the updates to firewalls or
Dedicated Log Collectors.
Panorama: Yes
Device Group/
Template: Yes
Yes Yes Yes
Licenses Specifies whether the
administrator can view, refresh,
and activate firewall licenses.
Panorama: Yes
Device Group/
Template: Yes
Yes Yes Yes
PAN-OS® Administrator’s Guide Version 10.2 191 ©2025 Palo Alto Networks, Inc. | https://docs.paloaltonetworks.com/content/dam/techdocs/en_US/pdf/pan-os/10-2/pan-os-admin/pan-os-admin.pdf |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.