<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic FMC Deployment Failed with Sensitive Data Detection RegEx in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/fmc-deployment-failed-with-sensitive-data-detection-regex/m-p/3694750#M12688</link>
    <description>&lt;P&gt;I am trying to push a Sensitive Data Detection Policy to detect email and possible passwords being entered in a URL, but whenever I deploy the policy I am given a Snort validation error.&lt;/P&gt;
&lt;P&gt;FMC 6.2.3.2&lt;/P&gt;
&lt;P&gt;ASA with FP Module 6.2.2&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Here is the RegEx - Nothing special. Some word boundaries, and forward lookups.&lt;/P&gt;
&lt;P&gt;(?=.*?\b(u|usernames?|users?|uname)\b)(?=.*\b([a-zA-Z0-9.!#$%&amp;amp;'*+\/=?^_`\{|\}~-]+@[a-zA-Z0-9](?:[a-zA-Z0-9-]{0,61}[a-zA-Z0-9])?(?:\.[a-zA-Z0-9](?:[a-zA-Z0-9-]{0,61}[a-zA-Z0-9])?)))(?=.*\b(p|passwd|password|pswd|pass)\b).*$&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Here is the log message that is shown during a 'pigtail deploy' from the module itself.&lt;/P&gt;
&lt;P&gt;Validating snort configuration at /var/tmp/Apply_38654709268/code//SF/NGFW/PolicyApply.pm line 1945.&lt;BR /&gt;ACTQ: 08-24 18:13:04 FIREPOWER ActionQueueScrape.pl[378]: SYSTEM COMMAND: /usr/local/sf/bin/testSnortConfiguration.sh /var/sf/detection_engines/a9fbe130-830f-11e6-b01b-65ed47c105ae/libs /var/sf/detection_engines/a9fbe130-830f-11e6-b01b-65ed47c105ae/snort /var/sf/detection_engines/a9fbe130-830f-11e6-b01b-65ed47c105ae/snort.conf /var/cisco/deploy/sandbox/snortTest/output.txt /var/cisco/deploy/sandbox/snortTest/now --treat-drop-as-alert -G 2 -T -A none -Q --daq pcap --daq-dir /usr/local/sf/lib/daq -l /var/cisco/deploy/sandbox/snortTest/ --dirty-pig --suppress-config-log -d&lt;BR /&gt;ACTQ: 08-24 18:13:04 FIREPOWER ActionQueueScrape.pl[378]: SYSTEM RESULT: $VAR1 = {&lt;BR /&gt;ACTQ: 08-24 18:13:04 FIREPOWER ActionQueueScrape.pl[378]: 'stderr' =&amp;gt; undef,&lt;BR /&gt;ACTQ: 08-24 18:13:04 FIREPOWER ActionQueueScrape.pl[378]: 'stdout' =&amp;gt; '&amp;gt;&amp;gt; COMMAND TO RUN AT PROMPT&lt;BR /&gt;ACTQ: 08-24 18:13:04 FIREPOWER ActionQueueScrape.pl[378]: &amp;gt;&amp;gt; export LD_LIBRARY_PATH=/var/sf/detection_engines/a9fbe130-830f-11e6-b01b-65ed47c105ae/libs;&lt;BR /&gt;ACTQ: 08-24 18:13:04 FIREPOWER ActionQueueScrape.pl[378]: &amp;gt;&amp;gt; /var/sf/detection_engines/a9fbe130-830f-11e6-b01b-65ed47c105ae/snort -c /var/sf/detection_engines/a9fbe130-830f-11e6-b01b-65ed47c105ae/snort.conf -Z /var/cisco/deploy/sandbox/snortTest/now --treat-drop-as-alert -G 2 -T -A none -Q --daq pcap --daq-dir /usr/local/sf/lib/daq -l /var/cisco/deploy/sandbox/snortTest/ --dirty-pig --suppress-config-log -N &amp;gt; /var/cisco/deploy/sandbox/snortTest/output.txt 2&amp;gt;&amp;amp;1&lt;BR /&gt;ACTQ: 08-24 18:13:04 FIREPOWER ActionQueueScrape.pl[378]: &amp;gt;&amp;gt;&lt;BR /&gt;ACTQ: 08-24 18:13:04 FIREPOWER ActionQueueScrape.pl[378]: ',&lt;BR /&gt;ACTQ: 08-24 18:13:04 FIREPOWER ActionQueueScrape.pl[378]: 'rcode' =&amp;gt; 256&lt;BR /&gt;ACTQ: 08-24 18:13:04 FIREPOWER ActionQueueScrape.pl[378]: };&lt;BR /&gt;ACTQ: 08-24 18:13:04 FIREPOWER ActionQueueScrape.pl[378]: SYSTEM OUTPUT&lt;BR /&gt;ACTQ: 08-24 18:13:04 FIREPOWER ActionQueueScrape.pl[378]: Enabling inline operation&lt;BR /&gt;ACTQ: 08-24 18:13:04 FIREPOWER ActionQueueScrape.pl[378]: Running in Test mode&lt;BR /&gt;ACTQ: 08-24 18:13:04 FIREPOWER ActionQueueScrape.pl[378]: ERROR: SDF Pattern "(?=.*?\b(u|usernames?|users?|uname)\b)(?=.*\b([a-zA-Z0-9.!#$%&amp;amp;'*+\/=?^_`\{|\}~-]+@[a-zA-Z0-9](?:[a-zA-Z0-9-]{0,61}[a-zA-Z0-9])?(?:\.[a-zA-Z0-9](?:[a-zA-Z0-9-]{0,61}[a-zA-Z0-9])?)))(?=.*\b(p|passwd|password|pswd|pass)\b).*$" contains curly brackets with non-digits inside.&lt;BR /&gt;ACTQ: 08-24 18:13:04 FIREPOWER ActionQueueScrape.pl[378]: Fatal Error, Quitting..&lt;BR /&gt;ACTQ: 08-24 18:13:04 FIREPOWER ActionQueueScrape.pl[378]: Snort configuration invalid. at /var/tmp/Apply_38654709268/code//SF/NGFW/PolicyApply.pm line 1991, &amp;lt;OUTPUT&amp;gt; line 4.&lt;BR /&gt;ACTQ: 08-24 18:13:04 FIREPOWER ActionQueueScrape.pl[378]: Error validating snort configuration at /var/tmp/Apply_38654709268/code//SF/NGFW/PolicyApply.pm line 2041.&lt;BR /&gt;ACTQ: 08-24 18:13:04 FIREPOWER ActionQueueScrape.pl[378]: ERRORS:&lt;BR /&gt;ACTQ: 08-24 18:13:04 FIREPOWER ActionQueueScrape.pl[378]: $VAR1 = {&lt;BR /&gt;ACTQ: 08-24 18:13:04 FIREPOWER ActionQueueScrape.pl[378]: 'errorStruct' =&amp;gt; [&lt;BR /&gt;ACTQ: 08-24 18:13:04 FIREPOWER ActionQueueScrape.pl[378]: {&lt;BR /&gt;ACTQ: 08-24 18:13:04 FIREPOWER ActionQueueScrape.pl[378]: 'line_number' =&amp;gt; undef,&lt;BR /&gt;ACTQ: 08-24 18:13:04 FIREPOWER ActionQueueScrape.pl[378]: 'section' =&amp;gt; 'UNKNOWN',&lt;BR /&gt;ACTQ: 08-24 18:13:04 FIREPOWER ActionQueueScrape.pl[378]: 'uuid' =&amp;gt; undef,&lt;BR /&gt;ACTQ: 08-24 18:13:04 FIREPOWER ActionQueueScrape.pl[378]: 'message' =&amp;gt; 'ERROR: SDF Pattern "(?=.*?\\b(u|usernames?|users?|uname)\\b)(?=.*\\b([a-zA-Z0-9.!#$%&amp;amp;\'*+\\/=?^_`\\{|\\}~-]+@[a-zA-Z0-9](?:[a-zA-Z0-9-]{0,61}[a-zA-Z0-9])?(?:\\.[a-zA-Z0-9](?:[a-zA-Z0-9-]{0,61}[a-zA-Z0-9])?)))(?=.*\\b(p|passwd|password|pswd|pass)\\b).*$" contains curly brackets with non-digits inside.&lt;BR /&gt;ACTQ: 08-24 18:13:04 FIREPOWER ActionQueueScrape.pl[378]: '&lt;BR /&gt;ACTQ: 08-24 18:13:04 FIREPOWER ActionQueueScrape.pl[378]: }&lt;BR /&gt;ACTQ: 08-24 18:13:04 FIREPOWER ActionQueueScrape.pl[378]: ],&lt;BR /&gt;ACTQ: 08-24 18:13:04 FIREPOWER ActionQueueScrape.pl[378]: 'errorLines' =&amp;gt; [&lt;BR /&gt;ACTQ: 08-24 18:13:04 FIREPOWER ActionQueueScrape.pl[378]: 'ERROR: SDF Pattern "(?=.*?\\b(u|usernames?|users?|uname)\\b)(?=.*\\b([a-zA-Z0-9.!#$%&amp;amp;\'*+\\/=?^_`\\{|\\}~-]+@[a-zA-Z0-9](?:[a-zA-Z0-9-]{0,61}[a-zA-Z0-9])?(?:\\.[a-zA-Z0-9](?:[a-zA-Z0-9-]{0,61}[a-zA-Z0-9])?)))(?=.*\\b(p|passwd|password|pswd|pass)\\b).*$" contains curly brackets with non-digits inside.&lt;BR /&gt;ACTQ: 08-24 18:13:04 FIREPOWER ActionQueueScrape.pl[378]: '&lt;BR /&gt;ACTQ: 08-24 18:13:04 FIREPOWER ActionQueueScrape.pl[378]: ]&lt;BR /&gt;ACTQ: 08-24 18:13:04 FIREPOWER ActionQueueScrape.pl[378]: };&lt;BR /&gt;ACTQ: 08-24 18:13:04 FIREPOWER ActionQueueScrape.pl[378]: $VAR1 = bless( {&lt;BR /&gt;ACTQ: 08-24 18:13:04 FIREPOWER ActionQueueScrape.pl[378]: '-stacktrace' =&amp;gt; 'Snort configuration validation failed due to ERROR: SDF Pattern "(?=.*?\\b(u|usernames?|users?|uname)\\b)(?=.*\\b([a-zA-Z0-9.!#$%&amp;amp;\'*+\\/=?^_`\\{|\\}~-]+@[a-zA-Z0-9](?:[a-zA-Z0-9-]{0,61}[a-zA-Z0-9])?(?:\\.[a-zA-Z0-9](?:[a-zA-Z0-9-]{0,61}[a-zA-Z0-9])?)))(?=.*\\b(p|passwd|password|pswd|pass)\\b).*$" contains curly brackets with non-digits inside.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;As you can see, the '\' characters are being appended and negated by another '\' making the RegEx malformed. I have opened a TAC case on this but they are saying they can't look at RegEx, but are not explaining why the RegEx is being rewritten in the policy deploy process. When going back to the policy itself, I am seeing the correct RegEx. It is only in the deploy logs that shows the invalid one.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;ACTQ: 08-24 18:13:04 FIREPOWER ActionQueueScrape.pl[378]: ERROR: SDF Pattern "(?=.*?\b(u|usernames?|users?|uname)\b)(?=.*\b([a-zA-Z0-9.!#$%&amp;amp;'*+\/=?^_`\{|\}~-]+@[a-zA-Z0-9](?:[a-zA-Z0-9-]{0,61}[a-zA-Z0-9])?(?:\.[a-zA-Z0-9](?:[a-zA-Z0-9-]{0,61}[a-zA-Z0-9])?)))(?=.*\b(p|passwd|password|pswd|pass)\b).*$" contains curly brackets with non-digits inside.&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;is being rewritten with&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;ACTQ: 08-24 18:13:04 FIREPOWER ActionQueueScrape.pl[378]: 'ERROR: SDF Pattern "(?=.*?\\b(u|usernames?|users?|uname)\\b)(?=.*\\b([a-zA-Z0-9.!#$%&amp;amp;\'*+\\/=?^_`\\{|\\}~-]+@[a-zA-Z0-9](?:[a-zA-Z0-9-]{0,61}[a-zA-Z0-9])?(?:\\.[a-zA-Z0-9](?:[a-zA-Z0-9-]{0,61}[a-zA-Z0-9])?)))(?=.*\\b(p|passwd|password|pswd|pass)\\b).*$" contains curly brackets with non-digits inside.&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;Does anyone have any idea how to fix this, or to adjust the RegEx to make it so it is not rewritten in policy deploy?&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;Thank you much.&lt;/SPAN&gt;&lt;/P&gt;</description>
    <pubDate>Fri, 21 Feb 2020 16:09:02 GMT</pubDate>
    <dc:creator>CRadoumis</dc:creator>
    <dc:date>2020-02-21T16:09:02Z</dc:date>
    <item>
      <title>FMC Deployment Failed with Sensitive Data Detection RegEx</title>
      <link>https://community.cisco.com/t5/network-security/fmc-deployment-failed-with-sensitive-data-detection-regex/m-p/3694750#M12688</link>
      <description>&lt;P&gt;I am trying to push a Sensitive Data Detection Policy to detect email and possible passwords being entered in a URL, but whenever I deploy the policy I am given a Snort validation error.&lt;/P&gt;
&lt;P&gt;FMC 6.2.3.2&lt;/P&gt;
&lt;P&gt;ASA with FP Module 6.2.2&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Here is the RegEx - Nothing special. Some word boundaries, and forward lookups.&lt;/P&gt;
&lt;P&gt;(?=.*?\b(u|usernames?|users?|uname)\b)(?=.*\b([a-zA-Z0-9.!#$%&amp;amp;'*+\/=?^_`\{|\}~-]+@[a-zA-Z0-9](?:[a-zA-Z0-9-]{0,61}[a-zA-Z0-9])?(?:\.[a-zA-Z0-9](?:[a-zA-Z0-9-]{0,61}[a-zA-Z0-9])?)))(?=.*\b(p|passwd|password|pswd|pass)\b).*$&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Here is the log message that is shown during a 'pigtail deploy' from the module itself.&lt;/P&gt;
&lt;P&gt;Validating snort configuration at /var/tmp/Apply_38654709268/code//SF/NGFW/PolicyApply.pm line 1945.&lt;BR /&gt;ACTQ: 08-24 18:13:04 FIREPOWER ActionQueueScrape.pl[378]: SYSTEM COMMAND: /usr/local/sf/bin/testSnortConfiguration.sh /var/sf/detection_engines/a9fbe130-830f-11e6-b01b-65ed47c105ae/libs /var/sf/detection_engines/a9fbe130-830f-11e6-b01b-65ed47c105ae/snort /var/sf/detection_engines/a9fbe130-830f-11e6-b01b-65ed47c105ae/snort.conf /var/cisco/deploy/sandbox/snortTest/output.txt /var/cisco/deploy/sandbox/snortTest/now --treat-drop-as-alert -G 2 -T -A none -Q --daq pcap --daq-dir /usr/local/sf/lib/daq -l /var/cisco/deploy/sandbox/snortTest/ --dirty-pig --suppress-config-log -d&lt;BR /&gt;ACTQ: 08-24 18:13:04 FIREPOWER ActionQueueScrape.pl[378]: SYSTEM RESULT: $VAR1 = {&lt;BR /&gt;ACTQ: 08-24 18:13:04 FIREPOWER ActionQueueScrape.pl[378]: 'stderr' =&amp;gt; undef,&lt;BR /&gt;ACTQ: 08-24 18:13:04 FIREPOWER ActionQueueScrape.pl[378]: 'stdout' =&amp;gt; '&amp;gt;&amp;gt; COMMAND TO RUN AT PROMPT&lt;BR /&gt;ACTQ: 08-24 18:13:04 FIREPOWER ActionQueueScrape.pl[378]: &amp;gt;&amp;gt; export LD_LIBRARY_PATH=/var/sf/detection_engines/a9fbe130-830f-11e6-b01b-65ed47c105ae/libs;&lt;BR /&gt;ACTQ: 08-24 18:13:04 FIREPOWER ActionQueueScrape.pl[378]: &amp;gt;&amp;gt; /var/sf/detection_engines/a9fbe130-830f-11e6-b01b-65ed47c105ae/snort -c /var/sf/detection_engines/a9fbe130-830f-11e6-b01b-65ed47c105ae/snort.conf -Z /var/cisco/deploy/sandbox/snortTest/now --treat-drop-as-alert -G 2 -T -A none -Q --daq pcap --daq-dir /usr/local/sf/lib/daq -l /var/cisco/deploy/sandbox/snortTest/ --dirty-pig --suppress-config-log -N &amp;gt; /var/cisco/deploy/sandbox/snortTest/output.txt 2&amp;gt;&amp;amp;1&lt;BR /&gt;ACTQ: 08-24 18:13:04 FIREPOWER ActionQueueScrape.pl[378]: &amp;gt;&amp;gt;&lt;BR /&gt;ACTQ: 08-24 18:13:04 FIREPOWER ActionQueueScrape.pl[378]: ',&lt;BR /&gt;ACTQ: 08-24 18:13:04 FIREPOWER ActionQueueScrape.pl[378]: 'rcode' =&amp;gt; 256&lt;BR /&gt;ACTQ: 08-24 18:13:04 FIREPOWER ActionQueueScrape.pl[378]: };&lt;BR /&gt;ACTQ: 08-24 18:13:04 FIREPOWER ActionQueueScrape.pl[378]: SYSTEM OUTPUT&lt;BR /&gt;ACTQ: 08-24 18:13:04 FIREPOWER ActionQueueScrape.pl[378]: Enabling inline operation&lt;BR /&gt;ACTQ: 08-24 18:13:04 FIREPOWER ActionQueueScrape.pl[378]: Running in Test mode&lt;BR /&gt;ACTQ: 08-24 18:13:04 FIREPOWER ActionQueueScrape.pl[378]: ERROR: SDF Pattern "(?=.*?\b(u|usernames?|users?|uname)\b)(?=.*\b([a-zA-Z0-9.!#$%&amp;amp;'*+\/=?^_`\{|\}~-]+@[a-zA-Z0-9](?:[a-zA-Z0-9-]{0,61}[a-zA-Z0-9])?(?:\.[a-zA-Z0-9](?:[a-zA-Z0-9-]{0,61}[a-zA-Z0-9])?)))(?=.*\b(p|passwd|password|pswd|pass)\b).*$" contains curly brackets with non-digits inside.&lt;BR /&gt;ACTQ: 08-24 18:13:04 FIREPOWER ActionQueueScrape.pl[378]: Fatal Error, Quitting..&lt;BR /&gt;ACTQ: 08-24 18:13:04 FIREPOWER ActionQueueScrape.pl[378]: Snort configuration invalid. at /var/tmp/Apply_38654709268/code//SF/NGFW/PolicyApply.pm line 1991, &amp;lt;OUTPUT&amp;gt; line 4.&lt;BR /&gt;ACTQ: 08-24 18:13:04 FIREPOWER ActionQueueScrape.pl[378]: Error validating snort configuration at /var/tmp/Apply_38654709268/code//SF/NGFW/PolicyApply.pm line 2041.&lt;BR /&gt;ACTQ: 08-24 18:13:04 FIREPOWER ActionQueueScrape.pl[378]: ERRORS:&lt;BR /&gt;ACTQ: 08-24 18:13:04 FIREPOWER ActionQueueScrape.pl[378]: $VAR1 = {&lt;BR /&gt;ACTQ: 08-24 18:13:04 FIREPOWER ActionQueueScrape.pl[378]: 'errorStruct' =&amp;gt; [&lt;BR /&gt;ACTQ: 08-24 18:13:04 FIREPOWER ActionQueueScrape.pl[378]: {&lt;BR /&gt;ACTQ: 08-24 18:13:04 FIREPOWER ActionQueueScrape.pl[378]: 'line_number' =&amp;gt; undef,&lt;BR /&gt;ACTQ: 08-24 18:13:04 FIREPOWER ActionQueueScrape.pl[378]: 'section' =&amp;gt; 'UNKNOWN',&lt;BR /&gt;ACTQ: 08-24 18:13:04 FIREPOWER ActionQueueScrape.pl[378]: 'uuid' =&amp;gt; undef,&lt;BR /&gt;ACTQ: 08-24 18:13:04 FIREPOWER ActionQueueScrape.pl[378]: 'message' =&amp;gt; 'ERROR: SDF Pattern "(?=.*?\\b(u|usernames?|users?|uname)\\b)(?=.*\\b([a-zA-Z0-9.!#$%&amp;amp;\'*+\\/=?^_`\\{|\\}~-]+@[a-zA-Z0-9](?:[a-zA-Z0-9-]{0,61}[a-zA-Z0-9])?(?:\\.[a-zA-Z0-9](?:[a-zA-Z0-9-]{0,61}[a-zA-Z0-9])?)))(?=.*\\b(p|passwd|password|pswd|pass)\\b).*$" contains curly brackets with non-digits inside.&lt;BR /&gt;ACTQ: 08-24 18:13:04 FIREPOWER ActionQueueScrape.pl[378]: '&lt;BR /&gt;ACTQ: 08-24 18:13:04 FIREPOWER ActionQueueScrape.pl[378]: }&lt;BR /&gt;ACTQ: 08-24 18:13:04 FIREPOWER ActionQueueScrape.pl[378]: ],&lt;BR /&gt;ACTQ: 08-24 18:13:04 FIREPOWER ActionQueueScrape.pl[378]: 'errorLines' =&amp;gt; [&lt;BR /&gt;ACTQ: 08-24 18:13:04 FIREPOWER ActionQueueScrape.pl[378]: 'ERROR: SDF Pattern "(?=.*?\\b(u|usernames?|users?|uname)\\b)(?=.*\\b([a-zA-Z0-9.!#$%&amp;amp;\'*+\\/=?^_`\\{|\\}~-]+@[a-zA-Z0-9](?:[a-zA-Z0-9-]{0,61}[a-zA-Z0-9])?(?:\\.[a-zA-Z0-9](?:[a-zA-Z0-9-]{0,61}[a-zA-Z0-9])?)))(?=.*\\b(p|passwd|password|pswd|pass)\\b).*$" contains curly brackets with non-digits inside.&lt;BR /&gt;ACTQ: 08-24 18:13:04 FIREPOWER ActionQueueScrape.pl[378]: '&lt;BR /&gt;ACTQ: 08-24 18:13:04 FIREPOWER ActionQueueScrape.pl[378]: ]&lt;BR /&gt;ACTQ: 08-24 18:13:04 FIREPOWER ActionQueueScrape.pl[378]: };&lt;BR /&gt;ACTQ: 08-24 18:13:04 FIREPOWER ActionQueueScrape.pl[378]: $VAR1 = bless( {&lt;BR /&gt;ACTQ: 08-24 18:13:04 FIREPOWER ActionQueueScrape.pl[378]: '-stacktrace' =&amp;gt; 'Snort configuration validation failed due to ERROR: SDF Pattern "(?=.*?\\b(u|usernames?|users?|uname)\\b)(?=.*\\b([a-zA-Z0-9.!#$%&amp;amp;\'*+\\/=?^_`\\{|\\}~-]+@[a-zA-Z0-9](?:[a-zA-Z0-9-]{0,61}[a-zA-Z0-9])?(?:\\.[a-zA-Z0-9](?:[a-zA-Z0-9-]{0,61}[a-zA-Z0-9])?)))(?=.*\\b(p|passwd|password|pswd|pass)\\b).*$" contains curly brackets with non-digits inside.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;As you can see, the '\' characters are being appended and negated by another '\' making the RegEx malformed. I have opened a TAC case on this but they are saying they can't look at RegEx, but are not explaining why the RegEx is being rewritten in the policy deploy process. When going back to the policy itself, I am seeing the correct RegEx. It is only in the deploy logs that shows the invalid one.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;ACTQ: 08-24 18:13:04 FIREPOWER ActionQueueScrape.pl[378]: ERROR: SDF Pattern "(?=.*?\b(u|usernames?|users?|uname)\b)(?=.*\b([a-zA-Z0-9.!#$%&amp;amp;'*+\/=?^_`\{|\}~-]+@[a-zA-Z0-9](?:[a-zA-Z0-9-]{0,61}[a-zA-Z0-9])?(?:\.[a-zA-Z0-9](?:[a-zA-Z0-9-]{0,61}[a-zA-Z0-9])?)))(?=.*\b(p|passwd|password|pswd|pass)\b).*$" contains curly brackets with non-digits inside.&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;is being rewritten with&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;ACTQ: 08-24 18:13:04 FIREPOWER ActionQueueScrape.pl[378]: 'ERROR: SDF Pattern "(?=.*?\\b(u|usernames?|users?|uname)\\b)(?=.*\\b([a-zA-Z0-9.!#$%&amp;amp;\'*+\\/=?^_`\\{|\\}~-]+@[a-zA-Z0-9](?:[a-zA-Z0-9-]{0,61}[a-zA-Z0-9])?(?:\\.[a-zA-Z0-9](?:[a-zA-Z0-9-]{0,61}[a-zA-Z0-9])?)))(?=.*\\b(p|passwd|password|pswd|pass)\\b).*$" contains curly brackets with non-digits inside.&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;Does anyone have any idea how to fix this, or to adjust the RegEx to make it so it is not rewritten in policy deploy?&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;Thank you much.&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Fri, 21 Feb 2020 16:09:02 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/fmc-deployment-failed-with-sensitive-data-detection-regex/m-p/3694750#M12688</guid>
      <dc:creator>CRadoumis</dc:creator>
      <dc:date>2020-02-21T16:09:02Z</dc:date>
    </item>
    <item>
      <title>Re: FMC Deployment Failed with Sensitive Data Detection RegEx</title>
      <link>https://community.cisco.com/t5/network-security/fmc-deployment-failed-with-sensitive-data-detection-regex/m-p/3694760#M12690</link>
      <description>Based on the error message, there is a curly bracket without digits in the&lt;BR /&gt;regex which is this one {|\}&lt;BR /&gt;&lt;BR /&gt;Try to replace it or for testing remove it.&lt;BR /&gt;</description>
      <pubDate>Fri, 24 Aug 2018 19:41:05 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/fmc-deployment-failed-with-sensitive-data-detection-regex/m-p/3694760#M12690</guid>
      <dc:creator>Mohammed al Baqari</dc:creator>
      <dc:date>2018-08-24T19:41:05Z</dc:date>
    </item>
  </channel>
</rss>

