You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: content/account-and-profile/setting-up-and-managing-your-github-user-account/managing-user-account-settings/managing-security-and-analysis-settings-for-your-user-account.md
+2-2Lines changed: 2 additions & 2 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -30,7 +30,7 @@ For an overview of repository-level security, see "[Securing your repository](/c
30
30
31
31
{% data reusables.user-settings.access_settings %}
32
32
{% data reusables.user-settings.security-analysis %}
33
-
3. Under "Configure security and analysis features", to the right of the feature, click **Disable all** or **Enable all**.
33
+
3. Under "Code security and analysis", to the right of the feature, click **Disable all** or **Enable all**.
34
34
{% ifversion ghes > 3.2 %}{% else %}{% endif %}
35
35
6. Optionally, enable the feature by default for new repositories that you own.
36
36
{% ifversion ghes > 3.2 %}{% else %}{% endif %}
@@ -43,7 +43,7 @@ For an overview of repository-level security, see "[Securing your repository](/c
43
43
44
44
{% data reusables.user-settings.access_settings %}
45
45
{% data reusables.user-settings.security-analysis %}
46
-
3. Under "Configure security and analysis features", to the right of the feature, enable or disable the feature by default for new repositories that you own.
46
+
3. Under "Code security and analysis", to the right of the feature, enable or disable the feature by default for new repositories that you own.
47
47
{% ifversion ghes > 3.2 %}{% else %}{% endif %}
Copy file name to clipboardExpand all lines: content/code-security/getting-started/github-security-features.md
+30-5Lines changed: 30 additions & 5 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -69,17 +69,38 @@ For all public repositories, the security overview shows which security features
69
69
70
70
## Available with {% data variables.product.prodname_GH_advanced_security %}
71
71
72
-
{% data reusables.advanced-security.ghas-availability %}
72
+
{% ifversion fpt %}
73
+
The following {% data variables.product.prodname_GH_advanced_security %} features are available and free of charge for public repositories on {% data variables.product.prodname_dotcom_the_website %}. Organizations that use {% data variables.product.prodname_ghe_cloud %} with a license for {% data variables.product.prodname_GH_advanced_security %} can use the full set of features in any of their repositories. For a list of the features available with {% data variables.product.prodname_ghe_cloud %}, see the [{% data variables.product.prodname_ghe_cloud %} documentation](/enterprise-cloud@latest/code-security/getting-started/github-security-features#available-with-github-advanced-security).
74
+
75
+
{% elsif ghec %}
76
+
Many {% data variables.product.prodname_GH_advanced_security %} features are available and free of charge for public repositories on {% data variables.product.prodname_dotcom_the_website %}. Organizations within an enterprise that has a {% data variables.product.prodname_GH_advanced_security %} license can use all the following features on their repositories. {% data reusables.advanced-security.more-info-ghas %}
77
+
78
+
{% elsif ghes %}
79
+
{% data variables.product.prodname_GH_advanced_security %} features are available for enterprises with a license for {% data variables.product.prodname_GH_advanced_security %}. The features are restricted to repositories owned by an organization. {% data reusables.advanced-security.more-info-ghas %}
80
+
81
+
{% elsif ghae %}
82
+
{% data variables.product.prodname_GH_advanced_security %} features are available for repositories owned by an organization. {% data reusables.advanced-security.more-info-ghas %}
83
+
{% endif %}
73
84
74
85
### {% data variables.product.prodname_code_scanning_capc %}
75
86
76
87
Automatically detect security vulnerabilities and coding errors in new or modified code. Potential problems are highlighted, with detailed information, allowing you to fix the code before it's merged into your default branch. For more information, see "[About code scanning](/github/finding-security-vulnerabilities-and-errors-in-your-code/about-code-scanning)."
77
88
78
-
### {% data variables.product.prodname_secret_scanning_caps %}
89
+
{% ifversion fpt or ghec %}
90
+
### {% data variables.product.prodname_secret_scanning_partner_caps %}
91
+
92
+
Automatically detect leaked secrets across all public repositories. {% data variables.product.company_short %} informs the relevant service provider that the secret may be compromised. For details of the supported secrets and service providers, see "[{% data variables.product.prodname_secret_scanning_caps %} patterns](/code-security/secret-scanning/secret-scanning-patterns)."
93
+
{% endif %}
79
94
80
-
Automatically detect tokens or credentials that have been checked into a repository. {% ifversion fpt or ghec %}{% data variables.product.prodname_secret_scanning_caps %} finds leaked secrets across all public repositories and informs the relevant service provider that the secret may be compromised. For details of the supported secrets and service providers, see "[{% data variables.product.prodname_secret_scanning_caps %} partners](/code-security/secret-scanning/secret-scanning-partners)."{% endif %}
81
-
{%- ifversion ghec or ghes or ghae %}
82
-
{% ifversion ghec %}In private repositories, you can view {% elsif ghes or ghae %}You can view {% endif %}any secrets that {% data variables.product.company_short %} has found in your code. You should treat tokens or credentials that have been checked into the repository as compromised.{% endif %} For more information, see "[About secret scanning](/github/administering-a-repository/about-secret-scanning)."
95
+
{% ifversion not fpt %}
96
+
### {% data variables.product.prodname_secret_scanning_GHAS_caps %}
97
+
98
+
{% ifversion ghec %}
99
+
Available only with a license for {% data variables.product.prodname_GH_advanced_security %}.
100
+
{% endif %}
101
+
102
+
Automatically detect tokens or credentials that have been checked into a repository. You can view alerts for any secrets that {% data variables.product.company_short %} finds in your code, so that you know which tokens or credentials to treat as compromised. For more information, see "[About secret scanning](/code-security/secret-scanning/about-secret-scanning#about-secret-scanning-for-advanced-security)."
103
+
{% endif %}
83
104
84
105
{% ifversion fpt or ghes > 3.1 or ghae-issue-4864 or ghec %}
85
106
### Dependency review
@@ -90,6 +111,10 @@ Show the full impact of changes to dependencies and see details of any vulnerabl
90
111
{% ifversion ghec or ghes > 3.1 or ghae-issue-4554 %}
91
112
### Security overview for organizations{% ifversion ghec or ghes > 3.4 or ghae-issue-6199 %}, enterprises,{% endif %} and teams
92
113
114
+
{% ifversion ghec %}
115
+
Available only with a license for {% data variables.product.prodname_GH_advanced_security %}.
116
+
{% endif %}
117
+
93
118
Review the security configuration and alerts for your organization and identify the repositories at greatest risk. For more information, see "[About the security overview](/code-security/security-overview/about-the-security-overview)."
0 commit comments