mirror of
https://github.com/ansible-lockdown/Windows-11-CIS.git
synced 2026-05-09 04:19:07 +02:00
Typos & Fixes
Signed-off-by: Stephen Williams <stephenw@mindpointgroup.com>
This commit is contained in:
+1
-1
@@ -680,7 +680,7 @@ win11cis_sebatchlogonright: Administrators
|
||||
# WDAG Discovered Enabled - WDAGUtilityAccount
|
||||
# Hyper V & WDAG Discovered Enabled - WDAGUtilityAccount,NT VIRTUAL MACHINE\Virtual Machines
|
||||
# Settings Note:
|
||||
# If you defining your own input list them in win10cis_seservicelogonright by commas and no spacing between them.
|
||||
# If you defining your own input list them in win11cis_seservicelogonright by commas and no spacing between them.
|
||||
# NOTE: Improper Accounts Or Groups listed here will FAIL task. When adding place items in ""
|
||||
# Default: []
|
||||
win11cis_seservicelogonright: []
|
||||
|
||||
+49
-22
@@ -1,27 +1,54 @@
|
||||
---
|
||||
|
||||
galaxy_info:
|
||||
author: "MindPoint Group"
|
||||
description: "Ansible Role to Apply The Windows 11 Enterprise CIS Benchmark"
|
||||
company: "MindPoint Group"
|
||||
license: MIT
|
||||
role_name: windows_11_cis
|
||||
namespace: mindpointgroup
|
||||
min_ansible_version: 2.14
|
||||
|
||||
galaxy_tags:
|
||||
- system
|
||||
- security
|
||||
- cis
|
||||
- hardening
|
||||
- benchmark
|
||||
- microsoft
|
||||
- windows
|
||||
- complianceascode
|
||||
- compliance
|
||||
|
||||
collections:
|
||||
author: "MindPoint Group"
|
||||
description: "Ansible Role to Apply The Windows 11 Enterprise CIS Benchmark"
|
||||
company: "MindPoint Group"
|
||||
license: MIT
|
||||
role_name: windows_11_cis
|
||||
namespace: mindpointgroup
|
||||
min_ansible_version: "2.16"
|
||||
platforms:
|
||||
- name: Windows
|
||||
versions:
|
||||
- "all"
|
||||
galaxy_tags:
|
||||
- auditpolicy
|
||||
- automation
|
||||
- azure
|
||||
- benchmark
|
||||
- cis
|
||||
- cisbenchmark
|
||||
- ciscompliance
|
||||
- cloudhardening
|
||||
- compliance
|
||||
- compliancehardening
|
||||
- complianceascode
|
||||
- configurationmanagement
|
||||
- encryption
|
||||
- eventlogging
|
||||
- hardening
|
||||
- infrastructureascode
|
||||
- logging
|
||||
- microsoft
|
||||
- monitoring
|
||||
- oshardening
|
||||
- patchmanagement
|
||||
- patching
|
||||
- policymanagement
|
||||
- privilegedaccess
|
||||
- remediation
|
||||
- security
|
||||
- system
|
||||
- systemintegrity
|
||||
- vulnerabilitymanagement
|
||||
- windows
|
||||
- win11
|
||||
- windowssecurity
|
||||
- windowsserver
|
||||
- windows11
|
||||
collections:
|
||||
- ansible.windows
|
||||
- community.windows
|
||||
- community.general
|
||||
|
||||
dependencies: []
|
||||
dependencies: []
|
||||
|
||||
+4
-6
@@ -36,12 +36,10 @@
|
||||
ansible.builtin.set_fact:
|
||||
discovered_cloud_based_system: true
|
||||
when:
|
||||
- ansible_system_vendor == 'Microsoft Corporation'
|
||||
- ansible_virtualization_type == 'Hyper-V' or
|
||||
ansible_virtualization_type == 'hvm' or
|
||||
ansible_virtualization_type == 'kvm'
|
||||
tags:
|
||||
- always
|
||||
- not ansible_virtualization_type == 'VMware' or
|
||||
(ansible_system_vendor == 'Microsoft Corporation' and
|
||||
ansible_virtualization_type in ['Hyper-V', 'hvm', 'kvm'])
|
||||
tags: always
|
||||
|
||||
- name: PRELIM | Check Hyper-V Installation
|
||||
ansible.windows.win_shell: Get-WindowsOptionalFeature -Online -FeatureName Microsoft-Hyper-V-All | Select-Object -Property State | ft -hide
|
||||
|
||||
@@ -10,6 +10,6 @@
|
||||
██║░░░░░██║░░██║██║░░██╗██╔═██╗░██║░░██║██║░░██║░░████╔═████║░██║╚████║
|
||||
███████╗╚█████╔╝╚█████╔╝██║░╚██╗██████╔╝╚█████╔╝░░╚██╔╝░╚██╔╝░██║░╚███║
|
||||
╚══════╝░╚════╝░░╚════╝░╚═╝░░╚═╝╚═════╝░░╚════╝░░░░╚═╝░░░╚═╝░░╚═╝░░╚══╝
|
||||
.------------------------------.
|
||||
| SUPPORTED BY MINDPOINT GROUP |
|
||||
'------------------------------'
|
||||
.-----------------------------------------------------.
|
||||
| SUPPORTED BY MINDPOINT GROUP, A TYTO ATHENE COMPANY |
|
||||
'-----------------------------------------------------'
|
||||
|
||||
Reference in New Issue
Block a user