Server IP : 184.154.167.98 / Your IP : 18.118.210.183 Web Server : Apache System : Linux pink.dnsnetservice.com 4.18.0-553.22.1.lve.1.el8.x86_64 #1 SMP Tue Oct 8 15:52:54 UTC 2024 x86_64 User : puertode ( 1767) PHP Version : 8.2.26 Disable Function : NONE MySQL : OFF | cURL : ON | WGET : ON | Perl : ON | Python : ON | Sudo : ON | Pkexec : ON Directory : /usr/share/scap-security-guide/ansible/ |
Upload File : |
--- ############################################################################### # # Ansible Playbook for CUSP - Common User Security Profile for Mozilla Firefox # # Profile Description: # This profile contains rules to harden Mozilla Firefox according to rule 6.1 in the Common User Security Guide for Fedora Workstation. # # Profile ID: xccdf_org.ssgproject.content_profile_cusp_firefox # Benchmark ID: xccdf_org.ssgproject.content_benchmark_FIREFOX # Benchmark Version: 0.1.75 # XCCDF Version: 1.2 # # This file can be generated by OpenSCAP using: # $ oscap xccdf generate fix --profile xccdf_org.ssgproject.content_profile_cusp_firefox --fix-type ansible ssg-firefox-ds.xml # # This Ansible Playbook is generated from an XCCDF profile without preliminary evaluation. # It attempts to fix every selected rule, even if the system is already compliant. # # How to apply this Ansible Playbook: # $ ansible-playbook -i "localhost," -c local playbook.yml # $ ansible-playbook -i "192.168.1.155," playbook.yml # $ ansible-playbook -i inventory.ini playbook.yml # ############################################################################### - name: Ansible Playbook for xccdf_org.ssgproject.content_profile_cusp_firefox hosts: all vars: tasks: