zscaler.ziacloud.zia_sandbox_rules module – Adds a Sandbox policy rule
Note
This module is part of the zscaler.ziacloud collection (version 2.0.3).
It is not included in ansible-core
.
To check whether it is installed, run ansible-galaxy collection list
.
To install it, use: ansible-galaxy collection install zscaler.ziacloud
.
You need further requirements to be able to use this module,
see Requirements for details.
To use it in a playbook, specify: zscaler.ziacloud.zia_sandbox_rules
.
New in zscaler.ziacloud 2.0.0
Synopsis
Adds a Sandbox policy rule
Requirements
The below requirements are needed on the host that executes this module.
Zscaler SDK Python can be obtained from PyPI https://pypi.org/project/zscaler-sdk-python/
Parameters
Parameter |
Comments |
---|---|
A string that contains the obfuscated API key. |
|
The threat categories to which the rule applies Choices:
|
|
The action configured for the rule that must take place if the traffic matches the rule criteria Choices:
|
|
Minimum threat score can be set between 40 to 70 |
|
The client ID for OAuth2 authentication. |
|
The client secret for OAuth2 authentication. |
|
The Zscaler cloud name provisioned for your organization. Choices:
|
|
The departments to which the Sandbox Rule applies |
|
Additional information about the rule |
|
Determines whether the Sandbox Rule is enabled or disabled Choices:
|
|
The threat categories to which the rule applies Choices:
|
|
Indicates whether a First-Time Action is specifically configured for the rule. The First-Time Action takes place when users download unknown files. The action to be applied is specified using the firstTimeOperation field. Choices:
|
|
The action that must take place when users download unknown files for the first time Choices:
|
|
The groups to which the Sandbox Rule applies |
|
Unique identifier for the Sandbox Rule |
|
Labels that are applicable to the rule. |
|
The location groups to which the Sandbox Rule applies |
|
The locations to which the Sandbox Rule applies |
|
Indicates whether to enable or disable the AI Instant Verdict option To have the Zscaler service use AI analysis to instantly assign threat scores to unknown files. This option is available to use only with specific rule actions such as Quarantine and Allow and Scan for First-Time Action. Choices:
|
|
Name of the Sandbox Rule |
|
Rule order number of the Sandbox Rule |
|
A string that contains the password for the API admin. |
|
The private key for JWT-based OAuth2 authentication. |
|
The protocols to which the rule applies Choices:
|
|
A dict containing authentication credentials. |
|
Obfuscated API key. |
|
OAuth2 client ID. |
|
OAuth2 client secret. |
|
Zscaler cloud name. Choices:
|
|
Password for the API admin. |
|
Private key for OAuth2 JWT. |
|
Sandbox Cloud environment. |
|
Sandbox API Key. |
|
Whether to use the legacy Zscaler API client. Choices:
|
|
Email ID of the API admin. |
|
Vanity domain for OAuth2. |
|
Admin rank of the Sandbox Rule Default: |
|
The Sandbox cloud environment for API access. |
|
A string that contains the Sandbox API Key. |
|
Specifies the desired state of the resource. Choices:
|
|
The URL categories to which the rule applies Use the info resource zia_url_categories_info to retrieve the category names. |
|
Whether to use the legacy Zscaler API client. Choices:
|
|
A string that contains the email ID of the API admin. |
|
The users to which the Sandbox Rule applies |
|
The vanity domain provisioned by Zscaler for OAuth2 flows. |
|
The list of ZPA Application Segments for which this rule is applicable. This field is applicable only for the ZPA forwarding method. |
|
Indicates the external ID. Applicable only when this reference is of an external entity. |
|
The name of the Application Segment |
Notes
Note
Check mode is supported.
Examples
- name: Create/update firewall filtering rule
zscaler.ziacloud.zia_cloud_firewall_filtering_rule:
provider: '{{ provider }}'
state: present
name: "Ansible_Example_Rule"
description: "TT#1965232865"
action: "ALLOW"
enabled: true
order: 1
enable_full_logging: true
exclude_src_countries: true
source_countries:
- BR
- CA
- US
dest_countries:
- BR
- CA
- US
device_trust_levels:
- "UNKNOWN_DEVICETRUSTLEVEL"
- "LOW_TRUST"
- "MEDIUM_TRUST"
- "HIGH_TRUST"