Use a tailoring file to customize the compliance policy, re-scan your hosts by using the Red Hat Satellite web UI, and evaluate the results.
Outcomes
Upload a tailoring file to Satellite Server.
Assign the tailoring file to a compliance policy.
Perform compliance scans by using a compliance policy that is customized with a tailoring file.
View and download the results of a compliance scan.
As the student user on the workstation machine, use the lab command to prepare your environment for this exercise, and to ensure that all required resources are available.
[student@workstation ~]$ lab start compliance-customize
Instructions
On the workstation machine, open a web browser and navigate to https://satellite.lab.example.com.
Log in as the admin user with redhat as the password.
Use the Operations organization as the default organization.
From the workstation machine, open a web browser and navigate to https://satellite.lab.example.com.
Accept the self-signed certificate and log in as the admin user with redhat as the password.
Set Satellite Server to use the Operations organization.
Navigate to and select .
At some resolutions, the list displays in a sidebar menu. If the list does not display at the top, then navigate to → from the sidebar menu.
Add the /home/student/RH415-tailoring.xml file to Satellite.
Name the tailoring file compliance-customize in Satellite.
In the Satellite Server web UI, navigate to → → . Click to add a new tailoring file.
On the page, enter compliance-customize for the .
Click to upload the /home/student/RH415-tailoring.xml tailoring file, and then click .
Create the compliance-customize compliance policy and use the compliance-customize tailoring file.
Use the rhel9 content SCAP content.
Use a monthly period with the first day of the month.
Enable the scan for the org-hostgroup1 hostgroup.
Navigate to → → .
Click .
Select the radio button and click .
Enter compliance-customize in the field and click .
Select the rhel9 content value for and the compliance-customize value for , and then click .
Select the Monthly value for , select the 1 value for , and then click .
Verify that the Default Location value is selected and click .
Verify that the Operations value is selected and click .
Select the org-hostgroup1 hostgroup and click .
Execute the Ansible roles to set up the host for OpenSCAP revisions.
Return to → → and select the serverd.lab.example.com host checkbox.
Click and select Run all Ansible roles from the list.
Verify the results of the role execution.
Run an OpenSCAP scan for the serverd host.
Navigate to → → .
Select the checkbox for the serverd host.
Click → .
Select the OpenSCAP job category and the Run OpenSCAP scans job template, then click .
View and download the results of the compliance-customize OpenSCAP scan.
Navigate to → → .
Click for the compliance-customize policy.
Click for the serverd host.
Browse through the results to find which rules the serverd machine is compliant with.
Click to download the results.