You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: content/admin/enforcing-policies/enforcing-policies-for-your-enterprise/enforcing-policies-for-code-security-and-analysis-for-your-enterprise.md
+5-20Lines changed: 5 additions & 20 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -1,7 +1,7 @@
1
1
---
2
2
title: Enforcing policies for code security and analysis for your enterprise
3
-
intro: 'You can enforce policies to manage the use of {% ifversion security-feature-enablement-policies %}code security and analysis{% else %}{% data variables.product.prodname_GH_advanced_security %}{% endif %} features within your enterprise''s organizations.'
4
-
permissions: 'Enterprise owners can enforce {% ifversion security-feature-enablement-policies %}code security and analysis{% endif %} policies for {% data variables.product.prodname_GH_advanced_security %} in an enterprise.'
3
+
intro: 'You can enforce policies to manage the use of code security and analysis features within your enterprise''s organizations.'
4
+
permissions: 'Enterprise owners can enforce code security and analysis policies for {% data variables.product.prodname_GH_advanced_security %} in an enterprise.'
5
5
product: '{% data reusables.gated-features.ghas %}'
## About policies for code security and analysis in your enterprise
34
33
35
34
You can enforce policies to manage the use of code security and analysis features within organizations owned by your enterprise. You can allow or disallow people with admin access to a repository to enable or disable the security and analysis features.
36
35
37
36
Additionally, you can enforce policies for the use of {% data variables.product.prodname_GH_advanced_security %} in your enterprise's organizations and repositories.
38
-
{% else %}
39
-
40
-
## About policies for {% data variables.product.prodname_GH_advanced_security %} in your enterprise
41
-
42
-
{% data reusables.advanced-security.ghas-helps-developers %} For more information, see [AUTOTITLE](/get-started/learning-about-github/about-github-advanced-security).
43
-
44
-
{% ifversion ghes %}If you purchase a license for {% data variables.product.prodname_GH_advanced_security %}, any{% else %}Any{% endif %} organization on {% data variables.product.prodname_ghe_server %} can use {% data variables.product.prodname_advanced_security %} features. You can enforce policies to control how members of your enterprise on {% data variables.product.product_name %} use {% data variables.product.prodname_advanced_security %}.
45
-
46
-
{% endif %}
47
37
48
38
{% ifversion ghec %}
49
39
@@ -84,16 +74,13 @@ Across all organizations owned by your enterprise, you can allow members with ad
84
74
{% data reusables.enterprise.role-permission-hierarchy %}
85
75
86
76
{% data reusables.enterprise-accounts.access-enterprise %}
87
-
{% data reusables.enterprise-accounts.policies-tab %}{% ifversion security-feature-enablement-policies %}
88
-
{% data reusables.enterprise-accounts.code-security-and-analysis-policies %}{% else %}
89
-
{% data reusables.enterprise-accounts.advanced-security-policies %}{% endif %}{% ifversion security-feature-enablement-policies %}
77
+
{% data reusables.enterprise-accounts.policies-tab %}
78
+
{% data reusables.enterprise-accounts.code-security-and-analysis-policies %}
90
79
1. In the "{% data variables.product.prodname_GH_advanced_security %} policies" section, under "{% data variables.product.prodname_GH_advanced_security %} availability", select the dropdown menu and click a policy for the organizations owned by your enterprise.
91
80
92
-
{% data reusables.enterprise-accounts.advanced-security-organization-policy-drop-down %}{% endif %}
81
+
{% data reusables.enterprise-accounts.advanced-security-organization-policy-drop-down %}
93
82
{% data reusables.enterprise-accounts.advanced-security-individual-organization-policy-drop-down %}
## Enforcing a policy to manage the use of {% data variables.product.prodname_GH_advanced_security %} features in your enterprise's repositories
98
85
99
86
Across all of your enterprise's organizations, you can allow or disallow people with admin access to repositories to manage the use of {% data variables.product.prodname_GH_advanced_security %} features in the repositories. {% data reusables.advanced-security.ghas-must-be-enabled %}
@@ -114,8 +101,6 @@ Across all of your enterprise's organizations, you can allow or disallow people
114
101
{% data reusables.enterprise-accounts.code-security-and-analysis-policies %}
115
102
1. In the "{% data variables.product.prodname_GH_advanced_security %} policies" section, under "Enable or disable {% data variables.product.prodname_secret_scanning %} by repository admins", select the dropdown menu and click a policy.
## Enforcing a policy to manage the use of {% data variables.secret-scanning.generic-secret-detection %} for {% data variables.product.prodname_secret_scanning %} in your enterprise's repositories
Copy file name to clipboardExpand all lines: content/admin/managing-code-security/managing-github-advanced-security-for-your-enterprise/configuring-dependency-review-for-your-appliance.md
intro: 'To help users understand dependency changes when reviewing pull requests, you can enable, configure, and disable dependency review for {% data variables.product.prodname_ghe_server %}.'
5
5
product: '{% data reusables.gated-features.dependency-review %}'
Copy file name to clipboardExpand all lines: content/admin/managing-code-security/managing-github-advanced-security-for-your-enterprise/enabling-github-advanced-security-for-your-enterprise.md
+1-1Lines changed: 1 addition & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -23,7 +23,7 @@ topics:
23
23
24
24
When you enable {% data variables.product.prodname_GH_advanced_security %} for your enterprise, repository administrators in all organizations can enable the features unless you set up a policy to restrict access. See [AUTOTITLE](/admin/policies/enforcing-policies-for-your-enterprise/enforcing-policies-for-code-security-and-analysis-for-your-enterprise).
25
25
26
-
{% ifversion secret-scanning-enterprise-level-api %}{% data reusables.secret-scanning.secret-scanning-enterprise-level-api %}{% endif %}
26
+
{% data reusables.secret-scanning.secret-scanning-enterprise-level-api %}
27
27
28
28
For guidance on a phased deployment of GitHub Advanced Security, see [AUTOTITLE](/code-security/adopting-github-advanced-security-at-scale/introduction-to-adopting-github-advanced-security-at-scale).
Copy file name to clipboardExpand all lines: content/admin/managing-code-security/managing-github-advanced-security-for-your-enterprise/managing-github-advanced-security-features-for-your-enterprise.md
+3-2Lines changed: 3 additions & 2 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -3,7 +3,8 @@ title: Managing GitHub Advanced Security features for your enterprise
3
3
intro: 'You can control {% data variables.product.prodname_GH_advanced_security %} features that secure and analyze code across all organizations owned by your enterprise.'
4
4
permissions: 'Enterprise owners can manage {% data variables.product.prodname_advanced_security %} features for organizations in an enterprise.'
5
5
versions:
6
-
feature: secret-scanning-enterprise-level
6
+
ghec: '*'
7
+
ghes: '*'
7
8
type: how_to
8
9
topics:
9
10
- Alerts
@@ -31,7 +32,7 @@ To manage individual {% data variables.product.prodname_GH_advanced_security %}
31
32
32
33
{% endif %}
33
34
34
-
{% ifversion secret-scanning-enterprise-level-api %}{% data reusables.secret-scanning.secret-scanning-enterprise-level-api %}{% endif %}
35
+
{% data reusables.secret-scanning.secret-scanning-enterprise-level-api %}
35
36
36
37
{% ifversion ghes %}For information about buying a license for {% data variables.product.prodname_GH_advanced_security %}, see [AUTOTITLE](/billing/managing-billing-for-your-products/managing-billing-for-github-advanced-security/about-billing-for-github-advanced-security).{% elsif ghec %}For information about buying a license for {% data variables.product.prodname_GH_advanced_security %}, see [AUTOTITLE](/billing/managing-billing-for-your-products/managing-billing-for-github-advanced-security/signing-up-for-github-advanced-security).{% endif %}
Copy file name to clipboardExpand all lines: content/code-security/secret-scanning/enabling-secret-scanning-features/enabling-push-protection-for-your-repository.md
+1-1Lines changed: 1 addition & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -36,7 +36,7 @@ If you're an organization owner, you can enable push protection for multiple rep
36
36
37
37
Organization owners, security managers, and repository administrators can also enable push protection for {% data variables.product.prodname_secret_scanning %} via the API. For more information, see [AUTOTITLE](/rest/repos#update-a-repository) and expand the "Properties of the `security_and_analysis` object" section.
38
38
39
-
{% ifversion secret-scanning-enterprise-level %}
39
+
{% ifversion ghec or ghes %}
40
40
41
41
If your organization is owned by an enterprise account, an enterprise owner can also enable push protection at the enterprise level. For more information, see [AUTOTITLE](/admin/code-security/managing-github-advanced-security-for-your-enterprise/managing-github-advanced-security-features-for-your-enterprise).
Copy file name to clipboardExpand all lines: content/code-security/secret-scanning/using-advanced-secret-scanning-and-push-protection-features/custom-patterns/defining-custom-patterns-for-secret-scanning.md
+2-4Lines changed: 2 additions & 4 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -142,11 +142,9 @@ Before defining a custom pattern, you must ensure that you enable secret scannin
142
142
> * {% data reusables.secret-scanning.dry-runs-enterprise-permissions %}
143
143
144
144
{% data reusables.enterprise-accounts.access-enterprise %}
145
-
{% data reusables.enterprise-accounts.policies-tab %}{% ifversion security-feature-enablement-policies %}
145
+
{% data reusables.enterprise-accounts.policies-tab %}
146
146
{% data reusables.enterprise-accounts.code-security-and-analysis-policies %}
147
-
1. Under "{% ifversion code-security-wording-only-enterprise %}Code security{% else %}Code security and analysis{% endif %}", click **Security features**.{% else %}
148
-
{% data reusables.enterprise-accounts.advanced-security-policies %}
149
-
{% data reusables.enterprise-accounts.advanced-security-security-features %}{% endif %}
147
+
1. Under "{% ifversion code-security-wording-only-enterprise %}Code security{% else %}Code security and analysis{% endif %}", click **Security features**.
150
148
1. Under "Secret scanning custom patterns", click **New pattern**.
151
149
{% data reusables.advanced-security.secret-scanning-add-custom-pattern-details %}
Copy file name to clipboardExpand all lines: content/code-security/secret-scanning/using-advanced-secret-scanning-and-push-protection-features/custom-patterns/managing-custom-patterns.md
+2-4Lines changed: 2 additions & 4 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -55,11 +55,9 @@ You can enable {% data variables.product.prodname_secret_scanning %} as a push p
55
55
Before enabling push protection for a custom pattern at enterprise level, you must also{% ifversion custom-pattern-dry-run-ga %} test your custom patterns using dry runs. {% data reusables.secret-scanning.dry-runs-enterprise-permissions %}{% else %} test your custom patterns in a repository before defining them for your entire enterprise, as there is no dry-run functionality. That way, you can avoid creating excess false-positive {% data variables.secret-scanning.alerts %}.{% endif %}
56
56
57
57
{% data reusables.enterprise-accounts.access-enterprise %}
58
-
{% data reusables.enterprise-accounts.policies-tab %}{% ifversion security-feature-enablement-policies %}
58
+
{% data reusables.enterprise-accounts.policies-tab %}
59
59
{% data reusables.enterprise-accounts.code-security-and-analysis-policies %}
60
-
1. Under "{% ifversion code-security-wording-only-enterprise %}Code security{% else %}Code security and analysis{% endif %}", click **Security features**.{% else %}
61
-
{% data reusables.enterprise-accounts.advanced-security-policies %}
62
-
{% data reusables.enterprise-accounts.advanced-security-security-features %}{% endif %}
60
+
1. Under "{% ifversion code-security-wording-only-enterprise %}Code security{% else %}Code security and analysis{% endif %}", click **Security features**.
63
61
{% data reusables.advanced-security.secret-scanning-edit-custom-pattern %}
Copy file name to clipboardExpand all lines: content/code-security/security-advisories/working-with-global-security-advisories-from-the-github-advisory-database/browsing-security-advisories-in-the-github-advisory-database.md
+1-1Lines changed: 1 addition & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -85,7 +85,7 @@ For any {% data variables.product.company_short %}-reviewed advisory in the {% d
85
85
1. Optionally, to filter the list, use the search bar or the drop-down menus. The "Organization" drop-down menu allows you to filter the {% data variables.product.prodname_dependabot_alerts %} per owner (organization or user).
86
86
1. For more details about the advisory, and for advice on how to fix the vulnerable repository, click the repository name.
87
87
88
-
{% ifversion security-advisories-ghes %}
88
+
{% ifversion ghes %}
89
89
90
90
## Accessing the local advisory database on {% data variables.product.prodname_ghe_server %}
Copy file name to clipboardExpand all lines: content/code-security/security-advisories/working-with-global-security-advisories-from-the-github-advisory-database/editing-security-advisories-in-the-github-advisory-database.md
+1-1Lines changed: 1 addition & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -42,7 +42,7 @@ Only repository owners and administrators can edit repository-level security adv
42
42
43
43
You can also open a pull request directly on an advisory file in the [github/advisory-database](https://github.com/github/advisory-database) repository. For more information, see the [contribution guidelines](https://github.com/github/advisory-database/blob/main/CONTRIBUTING.md).
44
44
45
-
{% ifversion security-advisories-ghes %}
45
+
{% ifversion ghes %}
46
46
47
47
## Editing advisories from {% data variables.product.prodname_ghe_server %}
When a contributor bypasses a push protection block for a secret, {% data variables.product.prodname_dotcom %} also sends an email alert to the organization owners, security managers, and repository administrators who have opted in for email notifications.
0 commit comments