zscaler.ziacloud.zia_atp_malware_settings module – Updates the malware protection policy configuration details.
Note
This module is part of the zscaler.ziacloud collection (version 2.0.3).
It is not included in ansible-core
.
To check whether it is installed, run ansible-galaxy collection list
.
To install it, use: ansible-galaxy collection install zscaler.ziacloud
.
You need further requirements to be able to use this module,
see Requirements for details.
To use it in a playbook, specify: zscaler.ziacloud.zia_atp_malware_settings
.
New in zscaler.ziacloud 2.0.0
Synopsis
Updates the malware protection policy configuration details.
Requirements
The below requirements are needed on the host that executes this module.
Zscaler SDK Python can be obtained from PyPI https://pypi.org/project/zscaler-sdk-python/
Parameters
Parameter |
Comments |
---|---|
Indicates whether malicious files that automatically render advertisements and install adware are allowed or blocked Choices:
|
|
Indicates whether packet capture (PCAP) is enabled or disabled for adware Choices:
|
|
A string that contains the obfuscated API key. |
|
The client ID for OAuth2 authentication. |
|
The client secret for OAuth2 authentication. |
|
The Zscaler cloud name provisioned for your organization. Choices:
|
|
A string that contains the password for the API admin. |
|
The private key for JWT-based OAuth2 authentication. |
|
A dict containing authentication credentials. |
|
Obfuscated API key. |
|
OAuth2 client ID. |
|
OAuth2 client secret. |
|
Zscaler cloud name. Choices:
|
|
Password for the API admin. |
|
Private key for OAuth2 JWT. |
|
Sandbox Cloud environment. |
|
Sandbox API Key. |
|
Whether to use the legacy Zscaler API client. Choices:
|
|
Email ID of the API admin. |
|
Vanity domain for OAuth2. |
|
Indicates whether to allow or block malicious programs that can encrypt files and prevent users from accessing their devices, files, or data until a ransom payment is made. Choices:
|
|
Indicates whether packet capture (PCAP) is enabled or disabled for ransomware Choices:
|
|
Indicates whether to allow or block file download from tools that are common from remote access sites Choices:
|
|
Indicates whether packet capture (PCAP) is enabled or disabled for remote access tools Choices:
|
|
The Sandbox cloud environment for API access. |
|
A string that contains the Sandbox API Key. |
|
Indicates whether malicious files that covertly gather information about a user or an organization are allowed or blocked Choices:
|
|
Indicates whether packet capture (PCAP) is enabled or disabled for spyware Choices:
|
|
Specifies the desired state of the resource. Choices:
|
|
Allows or blocks malicious programs such as Trojan viruses that are presented as beneficial or useful Choices:
|
|
Indicates whether packet capture (PCAP) is enabled or disabled for Trojan viruses Choices:
|
|
Allows or blocks unwanted files that are downloaded alongside intentional programs downloaded by users Choices:
|
|
Indicates whether packet capture (PCAP) is enabled or disabled for unwanted applications Choices:
|
|
Whether to use the legacy Zscaler API client. Choices:
|
|
A string that contains the email ID of the API admin. |
|
The vanity domain provisioned by Zscaler for OAuth2 flows. |
|
Indicates if malicious programs that cause damage to systems and data are allowed or blocked. This setting applies to any viruses that don’t fit into the more specific malware categories. Choices:
|
|
Indicates whether packet capture (PCAP) is enabled or disabled for viruses Choices:
|
|
Indicates whether malicious programs that duplicate themselves to spread malicious code to other devices are allowed or blocked Choices:
|
|
Indicates whether packet capture (PCAP) is enabled or disabled for worms Choices:
|
Notes
Note
Check mode is not supported.
Examples
- name: Updates the malware protection policy configuration details
zscaler.ziacloud.zia_atp_malware_settings:
provider: '{{ provider }}'
adware_blocked: true
adware_capture: false
ransomware_blocked: true
ransomware_capture: false
remote_access_tool_blocked: true
remote_access_tool_capture: false
spyware_blocked: true
spyware_capture: false
trojan_blocked: true
trojan_capture: false
unwanted_applications_blocked: true
unwanted_applications_capture: false
virus_blocked: true
virus_capture: false
worm_blocked: true
worm_capture: false