Skip to content

Commit 5be87cb

Browse files
authored
Merge pull request github#16026 from github/repo-sync
repo sync
2 parents 21ffb0b + 95705fb commit 5be87cb

File tree

84 files changed

+3446
-211
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

84 files changed

+3446
-211
lines changed
42.8 KB
Loading
21 KB
Loading
78 KB
Loading
24.2 KB
Loading
32.4 KB
Loading
16.4 KB
Loading

content/account-and-profile/setting-up-and-managing-your-github-user-account/managing-user-account-settings/managing-security-and-analysis-settings-for-your-user-account.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -30,7 +30,7 @@ For an overview of repository-level security, see "[Securing your repository](/c
3030

3131
{% data reusables.user-settings.access_settings %}
3232
{% data reusables.user-settings.security-analysis %}
33-
3. Under "Configure security and analysis features", to the right of the feature, click **Disable all** or **Enable all**.
33+
3. Under "Code security and analysis", to the right of the feature, click **Disable all** or **Enable all**.
3434
{% ifversion ghes > 3.2 %}!["Enable all" or "Disable all" button for "Configure security and analysis" features](/assets/images/enterprise/3.3/settings/security-and-analysis-disable-or-enable-all.png){% else %}!["Enable all" or "Disable all" button for "Configure security and analysis" features](/assets/images/help/settings/security-and-analysis-disable-or-enable-all.png){% endif %}
3535
6. Optionally, enable the feature by default for new repositories that you own.
3636
{% ifversion ghes > 3.2 %}!["Enable by default" option for new repositories](/assets/images/enterprise/3.3/settings/security-and-analysis-enable-by-default-in-modal.png){% else %}!["Enable by default" option for new repositories](/assets/images/help/settings/security-and-analysis-enable-by-default-in-modal.png){% endif %}
@@ -43,7 +43,7 @@ For an overview of repository-level security, see "[Securing your repository](/c
4343

4444
{% data reusables.user-settings.access_settings %}
4545
{% data reusables.user-settings.security-analysis %}
46-
3. Under "Configure security and analysis features", to the right of the feature, enable or disable the feature by default for new repositories that you own.
46+
3. Under "Code security and analysis", to the right of the feature, enable or disable the feature by default for new repositories that you own.
4747
{% ifversion ghes > 3.2 %}![Checkbox for enabling or disabling a feature for new repositories](/assets/images/enterprise/3.3/settings/security-and-analysis-enable-or-disable-feature-checkbox.png){% else %}![Checkbox for enabling or disabling a feature for new repositories](/assets/images/help/settings/security-and-analysis-enable-or-disable-feature-checkbox.png){% endif %}
4848

4949
## Further reading

content/code-security/getting-started/github-security-features.md

Lines changed: 30 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -69,17 +69,38 @@ For all public repositories, the security overview shows which security features
6969

7070
## Available with {% data variables.product.prodname_GH_advanced_security %}
7171

72-
{% data reusables.advanced-security.ghas-availability %}
72+
{% ifversion fpt %}
73+
The following {% data variables.product.prodname_GH_advanced_security %} features are available and free of charge for public repositories on {% data variables.product.prodname_dotcom_the_website %}. Organizations that use {% data variables.product.prodname_ghe_cloud %} with a license for {% data variables.product.prodname_GH_advanced_security %} can use the full set of features in any of their repositories. For a list of the features available with {% data variables.product.prodname_ghe_cloud %}, see the [{% data variables.product.prodname_ghe_cloud %} documentation](/enterprise-cloud@latest/code-security/getting-started/github-security-features#available-with-github-advanced-security).
74+
75+
{% elsif ghec %}
76+
Many {% data variables.product.prodname_GH_advanced_security %} features are available and free of charge for public repositories on {% data variables.product.prodname_dotcom_the_website %}. Organizations within an enterprise that has a {% data variables.product.prodname_GH_advanced_security %} license can use all the following features on their repositories. {% data reusables.advanced-security.more-info-ghas %}
77+
78+
{% elsif ghes %}
79+
{% data variables.product.prodname_GH_advanced_security %} features are available for enterprises with a license for {% data variables.product.prodname_GH_advanced_security %}. The features are restricted to repositories owned by an organization. {% data reusables.advanced-security.more-info-ghas %}
80+
81+
{% elsif ghae %}
82+
{% data variables.product.prodname_GH_advanced_security %} features are available for repositories owned by an organization. {% data reusables.advanced-security.more-info-ghas %}
83+
{% endif %}
7384

7485
### {% data variables.product.prodname_code_scanning_capc %}
7586

7687
Automatically detect security vulnerabilities and coding errors in new or modified code. Potential problems are highlighted, with detailed information, allowing you to fix the code before it's merged into your default branch. For more information, see "[About code scanning](/github/finding-security-vulnerabilities-and-errors-in-your-code/about-code-scanning)."
7788

78-
### {% data variables.product.prodname_secret_scanning_caps %}
89+
{% ifversion fpt or ghec %}
90+
### {% data variables.product.prodname_secret_scanning_partner_caps %}
91+
92+
Automatically detect leaked secrets across all public repositories. {% data variables.product.company_short %} informs the relevant service provider that the secret may be compromised. For details of the supported secrets and service providers, see "[{% data variables.product.prodname_secret_scanning_caps %} patterns](/code-security/secret-scanning/secret-scanning-patterns)."
93+
{% endif %}
7994

80-
Automatically detect tokens or credentials that have been checked into a repository. {% ifversion fpt or ghec %}{% data variables.product.prodname_secret_scanning_caps %} finds leaked secrets across all public repositories and informs the relevant service provider that the secret may be compromised. For details of the supported secrets and service providers, see "[{% data variables.product.prodname_secret_scanning_caps %} partners](/code-security/secret-scanning/secret-scanning-partners)."{% endif %}
81-
{%- ifversion ghec or ghes or ghae %}
82-
{% ifversion ghec %}In private repositories, you can view {% elsif ghes or ghae %}You can view {% endif %}any secrets that {% data variables.product.company_short %} has found in your code. You should treat tokens or credentials that have been checked into the repository as compromised.{% endif %} For more information, see "[About secret scanning](/github/administering-a-repository/about-secret-scanning)."
95+
{% ifversion not fpt %}
96+
### {% data variables.product.prodname_secret_scanning_GHAS_caps %}
97+
98+
{% ifversion ghec %}
99+
Available only with a license for {% data variables.product.prodname_GH_advanced_security %}.
100+
{% endif %}
101+
102+
Automatically detect tokens or credentials that have been checked into a repository. You can view alerts for any secrets that {% data variables.product.company_short %} finds in your code, so that you know which tokens or credentials to treat as compromised. For more information, see "[About secret scanning](/code-security/secret-scanning/about-secret-scanning#about-secret-scanning-for-advanced-security)."
103+
{% endif %}
83104

84105
{% ifversion fpt or ghes > 3.1 or ghae-issue-4864 or ghec %}
85106
### Dependency review
@@ -90,6 +111,10 @@ Show the full impact of changes to dependencies and see details of any vulnerabl
90111
{% ifversion ghec or ghes > 3.1 or ghae-issue-4554 %}
91112
### Security overview for organizations{% ifversion ghec or ghes > 3.4 or ghae-issue-6199 %}, enterprises,{% endif %} and teams
92113

114+
{% ifversion ghec %}
115+
Available only with a license for {% data variables.product.prodname_GH_advanced_security %}.
116+
{% endif %}
117+
93118
Review the security configuration and alerts for your organization and identify the repositories at greatest risk. For more information, see "[About the security overview](/code-security/security-overview/about-the-security-overview)."
94119
{% endif %}
95120

0 commit comments

Comments
 (0)