Skip to content

Commit d4f32bd

Browse files
committed
Line edits2
1 parent 5e8122f commit d4f32bd

File tree

4 files changed

+9
-9
lines changed

4 files changed

+9
-9
lines changed

learn-pr/github/configure-use-secret-scanning-github-repository/5-exercise.yml

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -4,7 +4,7 @@ title: Exercise
44
metadata:
55
unitType: exercise
66
title: Exercise - Exclude files from secret scanning
7-
description: This exercise checks your knowledge on excluding files from being scanned by secret scanning. It's automatically graded via a workflow once you have completed the instructions.
7+
description: This exercise checks your knowledge on excluding files from secret scanning. It's automatically graded via a workflow once you have completed the instructions.
88
ms.date: 06/05/2025
99
author: rmcmurray
1010
ms.author: robmcm

learn-pr/github/configure-use-secret-scanning-github-repository/includes/3-configure-secret-scanning.md

Lines changed: 5 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -7,7 +7,7 @@ This unit walks you through the necessary steps to enable secret scanning at the
77
Follow these steps to enable secret scanning and push protection on a private repository:
88

99
1. In your repository, navigate to **Settings**.
10-
1. In the **Security** section select **Advanced Security**.
10+
1. In the **Security** section, select **Advanced Security**.
1111
1. Select the **Enable** button next to **Secret Protection**
1212
1. Review the impact of enabling and select **Enable Secret Protection**.
1313
1. If you see a **Disable** button, it means that secret scanning was already enabled at organization level.
@@ -17,9 +17,9 @@ Follow these steps to enable secret scanning and push protection on a private re
1717

1818
## Enable secret scanning for an organization
1919

20-
Enabling secret scanning at the organization level ensures that secret scanning is enabled by default on all private repositories where GitHub Advanced Security is enabled. In order to configure, you'll need to setup [GitHub Advanced Security](https://docs.github.com/en/get-started/learning-about-github/about-github-advanced-security).
20+
Enabling secret scanning at the organization level ensures that secret scanning is enabled by default on all private repositories where GitHub Advanced Security is enabled. In order to configure, you'll need to set up [GitHub Advanced Security](https://docs.github.com/en/get-started/learning-about-github/about-github-advanced-security).
2121

22-
Once setup, you can configure [Global Secret Scanning settings](https://docs.github.com/en/code-security/securing-your-organization/enabling-security-features-in-your-organization/configuring-global-security-settings-for-your-organization#configuring-global-secret-scanning-settings).
22+
Once set up, you can configure [Global Secret Scanning settings](https://docs.github.com/en/code-security/securing-your-organization/enabling-security-features-in-your-organization/configuring-global-security-settings-for-your-organization#configuring-global-secret-scanning-settings).
2323

2424
## Exclude files from being scanned
2525

@@ -48,13 +48,13 @@ When a new secret is detected, GitHub notifies all users with access to security
4848
- Organization owners and enterprise owners, if they're administrators of repositories where secrets were leaked
4949

5050
> [!NOTE]
51-
> Commit authors who've accidentally committed secrets will be notified, regardless of their notification preferences.
51+
> Commit authors who have accidentally committed secrets will be notified, regardless of their notification preferences.
5252

5353
You'll receive an email notification if:
5454

5555
- You're watching the repository.
5656
- You've enabled notifications for **All Activity** or for custom **Security alerts** on the repository.
57-
- In your notification settings, under "Subscriptions", then under "Watching", you have selected to receive notifications by email.
57+
- In your notification settings, under "Subscriptions," then under "Watching," you have selected to receive notifications by email.
5858

5959
## Configure recipients of secret scanning alerts
6060

learn-pr/github/configure-use-secret-scanning-github-repository/includes/4-use-secret-scanning.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -55,7 +55,7 @@ Follow these steps to create a custom pattern for a private repository:
5555

5656
### For an organization
5757

58-
Follow the steps below to create a custom pattern for an organization:
58+
Follow the steps listed to create a custom pattern for an organization:
5959

6060
1. In your organization, navigate to **Settings > Advanced Security > Global Settings**.
6161
1. Under **Custom patterns**, select **New pattern**.

learn-pr/github/configure-use-secret-scanning-github-repository/includes/7-summary.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -8,9 +8,9 @@ Secret scanning is enabled by default on all public repositories and can be enab
88
- Titles, descriptions, and comments in pull requests
99
- Titles, descriptions, and comments in GitHub Discussions
1010

11-
GitHub will alert you when secrets are detected so the appropriate actions can be taken to secure your code according to the type of secret that was committed. And with push protection enabled, secret leaks can be prevented by blocking commits that contain known secrets.
11+
GitHub will alert you when secrets are detected so the appropriate actions can be taken to secure your code according to the type of secret that was committed. And with push protection enabled, secret leaks can be prevented by blocking commits that contain known secrets.
1212

13-
For private repositories, the secret scanning configuration options also enable you to exclude specific files from scans, choose the people to notify of alerts, and create custom patterns for the secrets in your project that aren't automatically detected by GitHub.
13+
For private repositories, the secret scanning configuration options also enable you to exclude specific files from scans, choose the people to notify of alerts, and create custom patterns for the secrets in your project not automatically detected by GitHub.
1414

1515
With secret scanning in GitHub, you can be aware of exposed secrets and respond accordingly to protect your assets.
1616

0 commit comments

Comments
 (0)