Skip to content

Commit 70b0d89

Browse files
Learn Build Service GitHub AppLearn Build Service GitHub App
authored andcommitted
Merging changes synced from https://github.com/MicrosoftDocs/azure-devops-docs-pr (branch live)
2 parents c9e7ddb + cd9ed6e commit 70b0d89

File tree

4 files changed

+33
-25
lines changed

4 files changed

+33
-25
lines changed

docs/repos/security/configure-github-advanced-security-features.md

Lines changed: 13 additions & 24 deletions
Original file line numberDiff line numberDiff line change
@@ -9,7 +9,7 @@ ms.custom: cross-service
99
ms.author: laurajiang
1010
author: laurajjiang
1111
monikerRange: 'azure-devops'
12-
ms.date: 02/20/2025
12+
ms.date: 08/03/2025
1313
zone_pivot_groups: configure-ghazdo-bundled-individual-products
1414
---
1515

@@ -153,27 +153,17 @@ As mentioned, secret scanning repository scanning is automatically kicked off up
153153
To gain access to dependency scanning features, you need the **Code Security** product enabled for your repository.
154154
:::zone-end
155155

156-
Dependency scanning is a pipeline-based scanning tool. Results are aggregated per repository. We recommend that you add the dependency scanning task to all the pipelines that you want scanned.
157-
158-
>[!TIP]
159-
> For the most accurate scanning results, add the dependency scanning task after the build steps or package restore step in a pipeline that builds the code you wish to scan.
160-
161-
#### [YAML](#tab/yaml)
162-
163-
Add the task Advanced Security Dependency Scanning task ([AdvancedSecurity-Dependency-Scanning@1](/azure/devops/pipelines/tasks/reference/advanced-security-dependency-scanning-v1)) directly to your YAML pipeline file or select the **Advanced Security Dependency Scanning** task from the [task assistant](../../pipelines/get-started/yaml-pipeline-editor.md#use-task-assistant).
164-
165-
:::image type="content" source="media/dependency-scanning-config-yaml.png" lightbox="media/dependency-scanning-config-yaml.png" alt-text="Screenshot of dependency scanning pipeline setup for YAML.":::
166-
167-
#### [Classic](#tab/classic)
168-
169-
Add the `Advanced Security Dependency Scanning` task to your pipeline.
170-
171-
:::image type="content" source="media/dependency-scanning-config-classic.png" lightbox="media/dependency-scanning-config-classic.png" alt-text="Screenshot of dependency scanning pipeline setup for classic pipelines.":::
156+
Dependency scanning is a pipeline-based scanning tool. Results are aggregated per repository. For scanning your default branch, you can utilize the "Scan for vulnerable dependencies" setting from the repository settings page. This will automatically include the dependency scanning task into any pipeline targeting your default branch, or any pull request build targeting your default branch.
172157

158+
:::zone pivot="standalone-ghazdo"
159+
:::image type="content" source="media/dependency-one-click-code-security.png" lightbox="media/dependency-one-click-code-security.png" alt-text="Screenshot of dependency scanning one-click setup.":::
160+
:::zone-end
173161

174-
To generate alerts, run your first scan with a pipeline with the dependency scanning task included.
162+
:::zone pivot="bundled-ghazdo"
163+
:::image type="content" source="media/dependency-one-click-enablement.png" lightbox="media/dependency-one-click-enablement.png" alt-text="Screenshot of dependency scanning one-click setup.":::
164+
:::zone-end
175165

176-
---
166+
For more advanced setup or if you want to scan all branches, we recommend that you add the dependency scanning task to all the pipelines that you want scanned. See [Dependency scanning for GitHub Advanced Security for Azure DevOps](github-advanced-security-dependency-scanning-troubleshoot.md#manual-dependency-scanning-task-setup) for more details.
177167

178168
## Set up code scanning
179169

@@ -253,24 +243,23 @@ steps:
253243
254244
If the language specified is `cpp, java, csharp` or `swift`, custom build steps are required.
255245

256-
257246
#### [Classic](#tab/classic)
258247

259248
Add the tasks in the following order:
260-
1. `Advanced Security Initialize CodeQL`
249+
1. `Advanced Security Initialize CodeQL` ([AdvancedSecurity-Codeql-Init@1](/azure/devops/pipelines/tasks/reference/advanced-security-codeql-init-v1))
261250
1. Add your own custom build steps
262-
1. `Advanced Security Perform CodeQL Analysis`
251+
1. `Advanced Security Perform CodeQL Analysis` ([AdvancedSecurity-Codeql-Analyze@1](/azure/devops/pipelines/tasks/reference/advanced-security-codeql-analyze-v1))
263252

264253
:::image type="content" source="media/code-scanning-config-classic-tasks.png" alt-text="Screenshot of code scanning pipeline setup for YAML." lightbox="media/code-scanning-config-classic-tasks.png" :::
265254

255+
---
256+
266257
Also, specify which language you're analyzing in the `Initialize CodeQL` task. If the language specified is `cpp, java, csharp` or `swift`, custom build steps are required.
267258

268259
If you're running on a self-hosted agent, select the `Enable automatic CodeQL detection and installation` to automatically use the latest CodeQL bits on your agent if you didn't manually install the latest CodeQL bundle to your agent tool cache.
269260

270261
To generate alerts, run your first scan with a pipeline with the code scanning tasks included.
271262

272-
---
273-
274263
## Set up pull request annotations
275264

276265
For both dependency scanning and code scanning, annotations automatically configure for pull requests where a build validation policy applies with dependency scanning and/or code scanning tasks included in your pipeline. For more information on configuring build validation policies, see [Build validation](../git/branch-policies.md#build-validation).

docs/repos/security/github-advanced-security-dependency-scanning-troubleshoot.md

Lines changed: 20 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -18,7 +18,26 @@ Learn how to troubleshoot dependency scanning issues in GitHub Advanced Security
1818

1919
## Prerequisites
2020

21-
[!INCLUDE [github-advanced-security-prerequisites](includes/github-advanced-security-prerequisites.md)]
21+
[!INCLUDE [github-advanced-security-prerequisites](includes/github-advanced-security-prerequisites.md)]
22+
23+
## Manual dependency scanning task setup
24+
25+
>[!TIP]
26+
> For the most accurate scanning results, add the dependency scanning task after the build steps or package restore step in a pipeline that builds the code you wish to scan.
27+
28+
### [YAML](#tab/yaml)
29+
30+
Add the task Advanced Security Dependency Scanning task ([AdvancedSecurity-Dependency-Scanning@1](/azure/devops/pipelines/tasks/reference/advanced-security-dependency-scanning-v1)) directly to your YAML pipeline file or select the **Advanced Security Dependency Scanning** task from the [task assistant](../../pipelines/get-started/yaml-pipeline-editor.md#use-task-assistant).
31+
32+
:::image type="content" source="media/dependency-scanning-config-yaml.png" lightbox="media/dependency-scanning-config-yaml.png" alt-text="Screenshot of dependency scanning pipeline setup for YAML.":::
33+
34+
### [Classic](#tab/classic)
35+
36+
Add the `Advanced Security Dependency Scanning` ([AdvancedSecurity-Dependency-Scanning@1](/azure/devops/pipelines/tasks/reference/advanced-security-dependency-scanning-v1)) task to your pipeline.
37+
38+
:::image type="content" source="media/dependency-scanning-config-classic.png" lightbox="media/dependency-scanning-config-classic.png" alt-text="Screenshot of dependency scanning pipeline setup for classic pipelines.":::
39+
40+
---
2241

2342
## Dependency scanning not identifying any components
2443
If the dependency scanning task is completing without flagging any components and failing to generate alerts for components with known vulnerabilities, ensure that you at have a package restore step before the `AdvancedSecurity-Dependency-Scanning@1` task.
51.7 KB
Loading
24.5 KB
Loading

0 commit comments

Comments
 (0)