Software Secure Access
Activity Manage

Prerequisites

  • A source device that is known to have access controlled by Secure Access.
  • An internet access rule near the top of the rule order that has a security profile with File Inspection enabled.

    To ensure that the traffic is not blocked by other security features, test the security profile in a rule that has all other security and acceptable use features disabled. Ensure that no other rule in the access policy hits the traffic first.