@BPry, The matching security rule is "PROD-WEB-WHITELISTED-URLs" (see screenshot) and from there I've followed the path to the file blocking profile: security rule "PROD-WEB-WHITELISTED-URLs" -> security profile group "ZUR-MITIGATION-NO-URL-FILTER" -> file blocking profile "ZUR-FILE-BLOCK-DEFAULT" ZUR-FILE-BLOCK-DEFAULT contains 3 rules: 1) Name: DOWNLOAD-ALERT-DEFAULT Apps: any File Types: any Direction: download Action: alert 2) Name: DOWNLOAD-BLOCK-DEFAULT Apps: any File Types: bat, cmd, cpl, dll, dmg, exe, gzip, iso, lnk, mp3, msi, ocx, pif, powershell, tar, vbe, wmf Direction: download Action: alert 3) Name: UPLOAD-BLOCK-DEFAULT Apps: any File Types: any Direction: upload Action: block I cannot find anything in this file blocking profile that would block a CSV. Once again: afaik this file blocking profile hasn't change lately but the CSV download worked before with it. Maybe a bug with one of the latest "Applications and Threats" updates? I've found following list but I don't understand where exactly the file type IDs are used? https://live.paloaltonetworks.com/t5/Configuration-Articles/FileType-list-with-the-Threat-ID-number/ta-p/56119 Best Regards, Denis
... View more