ICAP bypass policies such as the one below are not bypassing ICAP properly when UPE CloudSWG tenant had Content Security Policy (CSP) enabled.
<proxy>
url.domain=test.com request.icap_service(no)
<cache>
url.domain=test.com response.icap_service(no)
CSP policy is a way to enable ICAP scanning (there are other ways to enable ICAP scanning e.g using response.icap_service(servicename_1,servicename_2, fail_open|fail_closed)) which the CSP policies are always evaluated last causing the above mentioned ICAP CPL policies to be overridden hence causing the bypass to not work.
To properly bypass ICAP scanning with CSP policy enabled, all you need to do is to install the following define statement into your CPL layer with the url domains within. Note that it has to be exactly "define list domain BC_Cloud_Not_AV_Scannable_domains" with the "end" clause after all needed ICAP bypass domains.
E.g.
#if enforcement=wss
define list domain BC_Cloud_Not_AV_Scannable_domains
test.com
color.com
browser.com
end
#endif