cisco.meraki.meraki_mx_malware module -- Manage Malware Protection in the Meraki cloud
Note
This module is part of the cisco.meraki collection (version 2.18.2).
To install it, use: ansible-galaxy collection install cisco.meraki
.
To use it in a playbook, specify: cisco.meraki.meraki_mx_malware
.
DEPRECATED
- Removed in:
version 3.0.0
- Why:
Updated modules released with increased functionality
- Alternative:
cisco.meraki.networks_appliance_security_malware
Synopsis
Fully configure malware protection in a Meraki environment.
Parameters
Parameter |
Comments |
---|---|
List of files to whitelist. |
|
Human readable information about file. |
|
256-bit hash of file. |
|
List of URLs to whitelist. |
|
Human readable information about URL. |
|
URL string to allow. |
|
Authentication key provided by the dashboard. Required if environmental variable |
|
Hostname for Meraki dashboard. Can be used to access regional Meraki environments, such as China. |
|
Number of seconds to retry if server returns an internal server error. Default: :ansible-option-default:`60` |
|
Enabled or disabled state of malware protection. Choices: |
|
ID of network which configuration is applied to. |
|
Name of network which configuration is applied to. |
|
ID of organization. |
|
Name of organization. |
|
Instructs module whether response keys should be snake case (ex. Choices: |
|
Set amount of debug output during module execution. Choices: |
|
Number of seconds to retry if rate limiter is triggered. Default: :ansible-option-default:`165` |
|
Specifies whether object should be queried, created/modified, or removed. Choices: |
|
Time to timeout for HTTP requests. Default: :ansible-option-default:`30` |
|
If Only useful for internal Meraki developers. Choices: |
|
If Choices: |
|
Whether to validate HTTP certificates. Choices: |
Notes
Note
Some of the options are likely only used for developers within Meraki.
More information about the Meraki API can be found at https://dashboard.meraki.com/api_docs.
Some of the options are likely only used for developers within Meraki.
As of Ansible 2.9, Meraki modules output keys as snake case. To use camel case, set the
ANSIBLE_MERAKI_FORMAT
environment variable tocamelcase
.Ansible's Meraki modules will stop supporting camel case output in Ansible 2.13. Please update your playbooks.
Check Mode downloads the current configuration from the dashboard, then compares changes against this download. Check Mode will report changed if there are differences in the configurations, but does not submit changes to the API for validation of change.
Examples
- name: Enable malware protection
meraki_malware:
auth_key: abc123
state: present
org_name: YourOrg
net_name: YourNet
mode: enabled
delegate_to: localhost
- name: Set whitelisted url
meraki_malware:
auth_key: abc123
state: present
org_name: YourOrg
net_name: YourNet
mode: enabled
allowed_urls:
- url: www.ansible.com
comment: Ansible
- url: www.google.com
comment: Google
delegate_to: localhost
- name: Set whitelisted file
meraki_malware:
auth_key: abc123
state: present
org_name: YourOrg
net_name: YourNet
mode: enabled
allowed_files:
- sha256: e82c5f7d75004727e1f3b94426b9a11c8bc4c312a9170ac9a73abace40aef503
comment: random zip
delegate_to: localhost
- name: Get malware settings
meraki_malware:
auth_key: abc123
state: query
org_name: YourNet
net_name: YourOrg
delegate_to: localhost
Return Values
Common return values are documented here, the following are the fields unique to this module:
Key |
Description |
---|---|
List of administrators. Returned: success |
|
List of files which are whitelisted. Returned: success |
|
Comment about the whitelisted entity Returned: success |
|
sha256 hash of whitelisted file. Returned: success Sample: :ansible-rv-sample-value:`"e82c5f7d75004727e1f3b94426b9a11c8bc4c312a9170ac9a73abace40aef503"` |
|
List of URLs which are whitelisted. Returned: success |
|
Comment about the whitelisted entity Returned: success |
|
Mode to enable or disable malware scanning. Returned: success |
Status
This module will be removed in version 3.0.0. [deprecated]
For more information see DEPRECATED.