Prerequisites
- A source device that is known to have access controlled by Secure Access.
- An internet access rule near the top of the rule order that has a security profile with
File Inspection enabled.
To ensure that the traffic is not blocked by other security features, test the security profile in a rule that has all other security and acceptable use features disabled. Ensure that no other rule in the access policy hits the traffic first.