Skip to main content
Question

Test Rule not matching UDM Search results

  • January 30, 2026
  • 2 replies
  • 45 views

EP0
Forum|alt.badge.img

Hi there,

I am testing a detection rule with Zscaler, specifically trying to detect “malicious download” behaviors.

I have a simple single event query which returns results when ran in UDM search: 

$e.metadata.vendor_name = "Zscaler"
$e.metadata.log_type = "ZSCALER_WEBPROXY"
$e.metadata.event_type = "NETWORK_HTTP"
$e.security_result.action = "BLOCK"
(
    $e.security_result.threat_name = /malicious behavior/ nocase  
    or $e.security_result.description = /malicious/ nocase 
    or $e.security_result.associations.description = /sandbox/ nocase
)
$e.security_result.category_details = /Download|Shareware|FileHost/ nocase


However, using the same core logic as a YARA-L and with the same timeframe testing it with “RUN TEST”, I am getting no result:


This post Detection Rule Test | Community seems to suggest data freshness as a potential issue but I don’t believe this has something to do with it as the events occurred more than an hour ago.

I’m new to SecOps and I would appreciate if someone could help me figure out what I’m doing wrong or if I’m missing something here, thanks!
​​​​​​​

2 replies

b00ms1cl3
  • New Member
  • February 3, 2026

Have you tried using no case on the vendor_name in the rule. Your search has case sensitivity turned off, but cannot be turned off for rules.


EP0
Forum|alt.badge.img
  • Author
  • New Member
  • February 3, 2026

Have you tried using no case on the vendor_name in the rule. Your search has case sensitivity turned off, but cannot be turned off for rules.

Just tried $e.metadata.vendor_name = /Zscaler/ nocase in the rule and still the same thing, did not get a result 🙁