You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/defender-for-cloud/azure-devops-extension.yml
+8-8Lines changed: 8 additions & 8 deletions
Original file line number
Diff line number
Diff line change
@@ -19,8 +19,9 @@ introduction: |
19
19
| [AntiMalware](https://www.microsoft.com/windows/comprehensive-security) | AntiMalware protection in Windows from Microsoft Defender for Endpoint, that scans for malware and breaks the build if malware has been found. This tool scans by default on windows-latest agent. | Not Open Source |
# command: 'run' | 'pre-job' | 'post-job'. Optional. The command to run. Default: run
109
-
# config: string. Optional. A file path to an MSDO configuration file ('*.gdnconfig').
110
-
# policy: 'azuredevops' | 'microsoft' | 'none'. Optional. The name of a well-known Microsoft policy. If no configuration file or list of tools is provided, the policy may instruct MSDO which tools to run. Default: azuredevops.
109
+
# config: string. Optional. A file path to an MSDO configuration file ('*.gdnconfig'). Vist the MSDO GitHub wiki linked below for additional configuration instructions
110
+
# policy: 'azuredevops' | 'microsoft' | 'none'. Optional. The name of a well-known Microsoft policy to determine the tools/checks to run. If no configuration file or list of tools is provided, the policy may instruct MSDO which tools to run. Default: azuredevops.
111
111
# categories: string. Optional. A comma-separated list of analyzer categories to run. Values: 'code', 'artifacts', 'IaC', 'containers'. Example: 'IaC, containers'. Defaults to all.
112
112
# languages: string. Optional. A comma-separated list of languages to analyze. Example: 'javascript,typescript'. Defaults to all.
113
-
# tools: string. Optional. A comma-separated list of analyzer tools to run. Values: 'bandit', 'binskim', 'eslint', 'templateanalyzer', 'terrascan', 'trivy'.
114
-
# break: boolean. Optional. If true, will fail this build step if any error level results are found. Default: false.
113
+
# tools: string. Optional. A comma-separated list of analyzer tools to run. Values: 'bandit', 'binskim', 'checkov', 'eslint', 'templateanalyzer', 'terrascan', 'trivy'.
114
+
# break: boolean. Optional. If true, will fail this build step if any high severity level results are found. Default: false.
115
115
# publish: boolean. Optional. If true, will publish the output SARIF results file to the chosen pipeline artifact. Default: true.
116
116
# artifactName: string. Optional. The name of the pipeline artifact to publish the SARIF result file to. Default: CodeAnalysisLogs*.
117
117
118
118
```
119
119
120
120
> [!NOTE]
121
121
> The artifactName 'CodeAnalysisLogs' is required for integration with
122
-
> Defender for Cloud. For additional tool configuration options and environment variables, see
123
-
> [the Microsoft Security DevOps wiki](https://github.com/microsoft/security-devops-action/wiki)
122
+
> Defender for Cloud. **For additional tool configuration options and environment variables, see
123
+
> [the Microsoft Security DevOps wiki](https://github.com/microsoft/security-devops-action/wiki)**
0 commit comments