{"id":96875,"date":"2019-02-06T13:00:24","date_gmt":"2019-02-06T21:00:24","guid":{"rendered":"https:\/\/www.paloaltonetworks.com\/blog\/?p=96875"},"modified":"2019-02-06T13:43:55","modified_gmt":"2019-02-06T21:43:55","slug":"tech-docs-best-practices-served-day","status":"publish","type":"post","link":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/2019\/02\/tech-docs-best-practices-served-day\/","title":{"rendered":"Tech Docs: Best Practices Served All Day"},"content":{"rendered":"<p><a href=\"https:\/\/www.paloaltonetworks.com\/blog\/wp-content\/uploads\/2019\/02\/menu-full-500x603.png\"><img loading=\"lazy\" decoding=\"async\"  class=\" wp-image-96876 alignright lozad\"  data-src=\"https:\/\/www.paloaltonetworks.com\/blog\/wp-content\/uploads\/2019\/02\/menu-full-500x603.png\" alt=\"\" width=\"443\" height=\"534\" srcset=\"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2019\/02\/menu-full-500x603.png 500w, https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2019\/02\/menu-full-230x278.png 230w, https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2019\/02\/menu-full-768x927.png 768w, https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2019\/02\/menu-full-249x300.png 249w, https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2019\/02\/menu-full-33x40.png 33w, https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2019\/02\/menu-full.png 1204w\" sizes=\"auto, (max-width: 443px) 100vw, 443px\" \/><\/a>Start your day off right with a balanced serving of Palo Alto Networks best practices! Today\u2019s special, the <a href=\"https:\/\/docs.paloaltonetworks.com\/pan-os\/8-1\/pan-os-admin\/threat-prevention\/app-and-threat-content-updates\">Best Practices for Application and Threat Content Updates<\/a>, is hot off the griddle\u2026<\/p>\n<p>Content updates equip the firewall with the very latest App-IDs and threat signatures. While new App-IDs and threat signatures are delivered in a single package, you don\u2019t have to enable them at the same time. Instead, how you choose to deploy content updates might depend on your organization\u2019s network security and application availability requirements.\u00a0 This is where best practices come in. Start by identifying your organization as:<\/p>\n<ul>\n<li><strong>Mission-Critical<\/strong>\u2014Application availability is your #1 priority.<\/li>\n<li><strong>Security-First<\/strong>\u2014You\u2019re laser-focused on network security.<\/li>\n<li>A healthy mix of both!<\/li>\n<\/ul>\n<p>Our best practices will take it from there, and help you decide how to deploy content updates based on your needs.<\/p>\n<p>Take a look at our menu of content update best practices and pick and choose what works best for you.<\/p>\n<p>Hungry for more? Check out our <a href=\"https:\/\/docs.paloaltonetworks.com\/best-practices\">Best Practices library<\/a> for your next serving.<\/p>\n<p>And, if you haven\u2019t already seen it, be sure to check out our new <a href=\"https:\/\/docs.paloaltonetworks.com\/\">Tech Docs portal<\/a>.<\/p>\n<p>Have questions? Contact us at\u00a0<a href=\"mailto:documentation@paloaltonetworks.com\">documentation@paloaltonetworks.com<\/a>.<\/p>\n<p>&nbsp;<\/p>\n<p>&nbsp;<\/p>\n<p>&nbsp;<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Start your day off right with a balanced serving of Palo Alto Networks best practices! Today\u2019s special, the Best Practices for Application and Threat Content Updates, is hot off the griddle\u2026 Content &hellip;<\/p>\n","protected":false},"author":267,"featured_media":69485,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_jetpack_memberships_contains_paid_content":false,"footnotes":""},"categories":[587],"tags":[3967,51],"coauthors":[2871],"class_list":["post-96875","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-technical-documentation","tag-best-practices","tag-threats"],"jetpack_featured_media_url":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2018\/03\/techdocs_featured-Image.png","jetpack_sharing_enabled":true,"_links":{"self":[{"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/posts\/96875","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/users\/267"}],"replies":[{"embeddable":true,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/comments?post=96875"}],"version-history":[{"count":5,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/posts\/96875\/revisions"}],"predecessor-version":[{"id":96921,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/posts\/96875\/revisions\/96921"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/media\/69485"}],"wp:attachment":[{"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/media?parent=96875"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/categories?post=96875"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/tags?post=96875"},{"taxonomy":"author","embeddable":true,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/coauthors?post=96875"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}