Skip to content

Commit 1e08dd1

Browse files
authored
Merge pull request #41075 from github/repo-sync
Repo sync
2 parents abc116f + fca7373 commit 1e08dd1

File tree

9 files changed

+98
-32
lines changed

9 files changed

+98
-32
lines changed

content/admin/managing-iam/provisioning-user-accounts-with-scim/configuring-scim-provisioning-for-users.md

Lines changed: 8 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -58,6 +58,14 @@ If you're configuring SCIM provisioning for a new enterprise, make sure to compl
5858
{% else %}
5959

6060
* SCIM is a server-to-server protocol. Your instance's REST API endpoints must be accessible to your SCIM provider.
61+
62+
This table contains the network requirements to configure GHES SCIM with an IdP:
63+
64+
| System | Direction | Purpose | Protocol / Port | Notes |
65+
|------------|------------|----------|------------------|-------|
66+
| GitHub Enterprise Server | Inbound | Receives SCIM API requests from IdP for users and groups | TCP 443 (HTTPS) | [AUTOTITLE](/enterprise-server/rest/enterprise-admin/scim) must be reachable from IdP |
67+
| Identity Provider (IdP) | Outbound | Sends SCIM provisioning requests to GitHub for users and groups | TCP 443 (HTTPS) | IdP acts as SCIM client, initiating outbound HTTPS connections to GitHub's SCIM API endpoints. |
68+
6169
* For authentication, your instance must use SAML SSO, or a mix of SAML and built-in authentication.
6270
* You cannot mix SCIM with other external authentication methods. If you use CAS or LDAP, you will need to migrate to SAML before using SCIM.
6371
* After you have configured SCIM, you must keep SAML authentication enabled to continue using SCIM.

content/code-security/code-scanning/enabling-code-scanning/configuring-default-setup-for-code-scanning-at-scale.md

Lines changed: 0 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -45,7 +45,6 @@ For repositories that are not eligible for default setup, you can configure adva
4545
A repository must meet all the following criteria to be eligible for default setup, otherwise you need to use advanced setup.
4646

4747
* Advanced setup for {% data variables.product.prodname_code_scanning %} is not already enabled.
48-
* Uses Go, JavaScript/TypeScript, Python, or Ruby.
4948
{% data reusables.code-scanning.require-actions-ghcs %}
5049

5150
{% data reusables.code-scanning.default-setup-pre-enablement-explanation %}

content/code-security/code-scanning/enabling-code-scanning/configuring-default-setup-for-code-scanning.md

Lines changed: 3 additions & 8 deletions
Original file line numberDiff line numberDiff line change
@@ -56,11 +56,9 @@ Default setup uses the `none` build mode for {% data variables.code-scanning.no_
5656

5757
We recommend that you start using {% data variables.product.prodname_code_scanning %} with default setup. After you've initially configured default setup, you can evaluate {% data variables.product.prodname_code_scanning %} to see how it's working for you. If you find that something isn't working as you expect, you can customize default setup to better meet your needs. For more information, see [AUTOTITLE](/code-security/code-scanning/enabling-code-scanning/evaluating-default-setup-for-code-scanning).
5858

59-
### About adding non-compiled and compiled languages to your default setup
59+
### About adding new languages to your default setup
6060

61-
If the code in a repository changes to include Go, JavaScript/TypeScript, Python, or Ruby, {% data variables.product.prodname_dotcom %} will automatically update the {% data variables.product.prodname_code_scanning %} configuration to include the new language. If {% data variables.product.prodname_code_scanning %} fails with the new configuration, {% data variables.product.prodname_dotcom %} will resume the previous configuration automatically so the repository does not lose {% data variables.product.prodname_code_scanning %} coverage.
62-
63-
Compiled languages are not automatically included in default setup configuration because they often require more advanced configuration, but you can manually select any {% data variables.product.prodname_codeql %}-supported compiled language for analysis.
61+
If the code in a repository changes to include any {% data variables.product.prodname_codeql %}-supported languages, {% data variables.product.prodname_dotcom %} will automatically update the {% data variables.product.prodname_code_scanning %} configuration to include the new language. If {% data variables.product.prodname_code_scanning %} fails with the new configuration, {% data variables.product.prodname_dotcom %} will resume the previous configuration automatically so the repository does not lose {% data variables.product.prodname_code_scanning %} coverage.
6462

6563
## Configuring default setup for a repository
6664

@@ -79,7 +77,6 @@ Compiled languages are not automatically included in default setup configuration
7977
{% ifversion ghas-products %}
8078

8179
![Screenshot of the "{% data variables.product.prodname_code_scanning_caps %}" section of "{% data variables.product.UI_advanced_security %}" settings. The "Default setup" button is highlighted with an orange outline.](/assets/images/help/security/default-code-scanning-setup-ghas.png)
82-
8380

8481
{% else %}
8582

@@ -89,11 +86,9 @@ Compiled languages are not automatically included in default setup configuration
8986

9087
You will then see a "{% data variables.product.prodname_codeql %} default configuration" dialog summarizing the {% data variables.product.prodname_code_scanning %} configuration automatically created by default setup.
9188

92-
> [!NOTE]
93-
> If your repository contains _only_ compiled {% data variables.product.prodname_codeql %}-supported languages (for example, Java), you will be taken to the settings page to select the languages you want to add to your default setup configuration.
9489

9590
1. Optionally, to customize your {% data variables.product.prodname_code_scanning %} setup, click **{% octicon "pencil" aria-hidden="true" aria-label="pencil" %} Edit**.
96-
* To add or remove a language from the analysis performed by default setup, select or deselect that language in the "Languages" section. If you would like to analyze a {% data variables.product.prodname_codeql %}-supported compiled language with default setup, select that language here.
91+
* To add or remove a language from the analysis performed by default setup, select or deselect that language in the "Languages" section.
9792
* To specify the {% data variables.product.prodname_codeql %} query suite you would like to use, select your preferred query suite in the "Query suites" section.
9893

9994
1. Review the settings for default setup on your repository, then click **Enable {% data variables.product.prodname_codeql %}**. This will trigger a workflow that tests the new, automatically generated configuration.

content/code-security/securing-your-organization/managing-the-security-of-your-organization/managing-your-github-advanced-security-license-usage.md

Lines changed: 5 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -57,6 +57,11 @@ To learn about licensing for {% data variables.product.prodname_GHAS_cs_and_sp %
5757

5858
The simplest way to turn off all {% data variables.product.prodname_cs_or_sp %} features for one or more repositories is to create a security configuration where the product is disabled at the top level. You can apply this custom configuration to repositories where you want to turn off paid features.
5959

60+
To prevent future enablement of security features, we recommend you ask your enterprise administrator to set the enterprise account's {% data variables.product.prodname_AS %} policies so that:
61+
* {% data variables.product.prodname_AS %} is **not available**.
62+
* Repository administrators are **not allowed** to enable or disable {% data variables.product.prodname_AS %} features for their repositories.
63+
See [AUTOTITLE](/admin/enforcing-policies/enforcing-policies-for-your-enterprise/enforcing-policies-for-code-security-and-analysis-for-your-enterprise).
64+
6065
> [!TIP]
6166
> Ensure that you give your custom configuration a very clear name, for example: "No Code Security" or "Secret Protection and Supply chain only" to avoid confusion.
6267
Lines changed: 72 additions & 20 deletions
Original file line numberDiff line numberDiff line change
@@ -1,44 +1,96 @@
11
---
22
title: 'Interpreting secret risk assessment results'
33
shortTitle: 'Interpret results'
4-
intro: 'Use the results from your {% data variables.product.prodname_secret_risk_assessment %} report to improve your organization''s security.'
4+
intro: 'Understand the results from your {% data variables.product.prodname_secret_risk_assessment %} and prioritize leak remediation.'
5+
permissions: 'Organization owners, security managers, and users with the **admin** role'
56
allowTitleToDifferFromFilename: true
6-
type: how_to
77
versions:
88
feature: secret-risk-assessment
99
topics:
10-
- Code Security
11-
- Secret scanning
1210
- Secret Protection
1311
- Organizations
1412
- Security
13+
contentType: tutorials
1514
---
1615

17-
The {% data variables.product.prodname_secret_risk_assessment %} dashboard displays point-in-time insights into the secrets detected in your organization. {% data reusables.secret-risk-assessment.link-conceptual-information %}
16+
## Introduction
17+
18+
In this tutorial, you'll interpret your secret risk assessment results, and learn how to:
19+
20+
* Understand risk metrics on the dashboard
21+
* Identify high-risk secret leaks
22+
* Prioritize secrets for remediation
1823

1924
## Prerequisites
2025

21-
You need to generate a {% data variables.product.prodname_secret_risk_assessment %} report and wait for the scan to complete before being able to view and export the results. See [AUTOTITLE](/code-security/securing-your-organization/understanding-your-organizations-exposure-to-leaked-secrets/viewing-the-secret-risk-assessment-report-for-your-organization#generating-an-initial-secret-risk-assessment) and [Exporting the {% data variables.product.prodname_secret_risk_assessment %} to CSV](/code-security/securing-your-organization/understanding-your-organizations-exposure-to-leaked-secrets/viewing-the-secret-risk-assessment-report-for-your-organization#exporting-the-secret-risk-assessment-to-csv).
26+
You must generate a {% data variables.product.prodname_secret_risk_assessment %} report and wait for the scan to complete. See [AUTOTITLE](/code-security/securing-your-organization/understanding-your-organizations-exposure-to-leaked-secrets/viewing-the-secret-risk-assessment-report-for-your-organization#generating-an-initial-secret-risk-assessment).
27+
28+
## Step 1: Understand your dashboard metrics
29+
30+
Once your assessment completes, review the key metrics at the top of the dashboard:
31+
32+
* **Total secrets**: Total number of secret leaks found across your organization
33+
* **Public leaks**: Distinct secrets found in **public** repositories
34+
* **Preventable leaks**: Leaks that push protection could have prevented
35+
36+
You can also determine the number of secrets found in your **private repositories** by subtracting the number of public leaks from your total secrets. While remediating these secrets is less immediately important, they still pose risk if someone gains unauthorized access to your repositories, or if a repository is made public.
37+
38+
## Step 2: Understand secret categories
39+
40+
Look at the **Secret categories** section to understand **what types of secrets** were leaked.
41+
42+
* **Provider patterns**: Specific secret formats for known services (AWS, Azure, {% data variables.product.github %} tokens)
43+
* **Generic patterns**: Generic secret formats like private keys, API keys, passwords
44+
45+
Provider patterns are often easier to identify and revoke because you know exactly which service they belong to. Generic patterns may require more investigation.
46+
47+
## Step 3: Identify how many repositories are affected
48+
49+
Check the **Repositories with leaks** metric, which shows how many of your repositories contain secret leaks.
50+
51+
If a **high percentage** of repositories contain leaks, this may indicate:
52+
* A widespread culture issue around secret management
53+
* A need for organization-wide training
54+
* Missing guardrails like push protection, which blocks secrets before they are committed
55+
56+
If only a **few** repositories contain leaks, you can:
57+
* Focus remediation efforts on specific teams
58+
* Use the leak information to determine which repositories are high-risk areas
59+
60+
## Step 4: Review leaked secrets by type
61+
62+
Scroll to the bottom to see the detailed **Secret type** table, which includes:
63+
64+
* **Secret type**: The specific kind of secret
65+
* **Distinct repositories**: How many different repositories contain this type
66+
* **Secrets found**: Total count of this secret type across all repositories
67+
68+
The table sorts by highest count automatically, helping you identify the greatest risks.
69+
70+
If you see **many secrets of the same type** (for example, multiple AWS keys), this indicates:
71+
* Developers may not be using environment variables
72+
* Missing documentation on secret management
73+
74+
## Step 5: Prioritizing remediation and related actions
2275

23-
## Prioritizing high-risk leaks for remediation
76+
Now that you understand the metrics, prioritize remediation based on risk.
2477

25-
To understand your secrets' footprint and exposure to secrets leaks, review the **Total secrets**,**Public leaks** and **Secret locations** metrics.
78+
The highest priority secrets are **leaked provider patterns in public repositories**, because they are:
2679

27-
Next, identify the areas in your organization where leaked secrets pose the highest threat to security.
80+
* Accessible to anyone on the internet
81+
* Often easier to identify and revoke, since you know which service they belong to
2882

29-
* **Leaked secrets that are still active** usually present the greatest risk to security. Prioritize any active secrets for remediation ahead of inactive secrets. For more information about checking the validity of a detected credential, see [AUTOTITLE](/enterprise-cloud@latest/code-security/secret-scanning/enabling-secret-scanning-features/enabling-validity-checks-for-your-repository) in the {% data variables.product.prodname_ghe_cloud %} documentation.
30-
* Similarly, **secrets leaked in public repositories** are usually considered a higher risk and priority, than those secrets leaked in private {% ifversion ghec or ghes %}or internal {% endif %}repositories.
31-
* The **Repositories with leaks** metric can indicate how frequent, or the extent of, secret leaks across your organization. A large proportion of repositories with secret leaks may suggest that developer education and increased security awareness around secrets is important for your organization.
83+
Next, you can address secrets that present lower risk or require more extensive efforts to remediate. These can be:
3284

33-
## Identifying areas of exposure
85+
* **Generic patterns in public repositories**, which may require investigation to identify the service or system they belong to
86+
* **Private repository leaks**, that represent a lower immediate risk but should still be addressed
3487

35-
Review the **Preventable leaks** and **Secret categories** metrics to understand your current secret detection coverage, in addition to learning how {% data variables.product.github %} can help prevent future secret leaks.
88+
Finally, look for the following indicators, which may require additional prevention efforts beyond leak remediation:
3689

37-
* Secret leaks that could have been prevented using {% data variables.product.prodname_GH_secret_protection %} features such as {% data variables.product.prodname_secret_scanning %} and push protection are shown by the **Preventable leaks** metric.
38-
* Using the **Secret categories** metric and the **Token type** table, search for patterns in the type of secrets leaked across your organization.
39-
* Common areas and repeated occurrences of leaked secrets may suggest particular CI/CD workflows or development processes in your organization that are contributing to the results.
40-
* You may also be able to identify specific teams, repositories, or networks that are more prone to secret leaks, and therefore require additional security measures or management to be put in place.
90+
* **Many repositories with leaks**: Indicates need for organization-wide training and improved security awareness
91+
* **Repeated secret types**: Suggests specific workflows or teams need targeted intervention
92+
* **Common secret categories**: May point to particular CI/CD processes requiring security improvements
4193

42-
## Adopt {% data variables.product.prodname_GH_secret_protection %} to prevent leaks
94+
## Next steps
4395

44-
We recommend purchasing {% data variables.product.prodname_GH_secret_protection %} products to improve your organization's exposure to secret leaks and optimize your secret detection rates. {% data variables.product.prodname_GH_secret_protection %} is a continuous monitoring and detection solution that is the most effective path for secure development. See [AUTOTITLE](/code-security/securing-your-organization/understanding-your-organizations-exposure-to-leaked-secrets/choosing-github-secret-protection).
96+
{% data variables.product.prodname_GH_secret_protection %} provides continuous monitoring and push protection to help remediate any remaining secrets and prevent future leaks. To help you evaluate whether {% data variables.product.prodname_GH_secret_protection %} is right for your organization, you can estimate the cost before enabling it. See [AUTOTITLE](/code-security/securing-your-organization/understanding-your-organizations-exposure-to-leaked-secrets/estimating-the-price-of-secret-protection).

content/copilot/concepts/prompting/response-customization.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -12,7 +12,7 @@ redirect_from:
1212
- /copilot/concepts/code-review/coding-guidelines
1313
- /copilot/concepts/response-customization
1414
contentType: concepts
15-
category:
15+
category:
1616
- Configure Copilot
1717
---
1818

content/copilot/how-tos/set-up/install-copilot-extension.md

Lines changed: 3 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -156,13 +156,15 @@ To see instructions for other popular coding environments, use the tool switcher
156156

157157
Starting from {% data variables.product.prodname_vs %} 2022 Version 17.10, the unified {% data variables.product.prodname_copilot_short %} and {% data variables.copilot.copilot_chat %} extension is included by default as a built-in component. For more information, see [Install {% data variables.product.prodname_copilot %} in {% data variables.product.prodname_vs %}](https://learn.microsoft.com/en-us/visualstudio/ide/visual-studio-github-copilot-install-and-states?ref_product=copilot&ref_type=engagement&ref_style=text) in the Microsoft documentation.
158158

159+
The following instructions are for versions 2022 17.8 and 2022 17.9 of {% data variables.product.prodname_vs %} for Windows.
160+
159161
## Installing the {% data variables.product.prodname_copilot %} extension in {% data variables.product.prodname_vs %}
160162

161163
1. Make sure you have access to {% data variables.product.prodname_copilot %}. For information, see [AUTOTITLE](/copilot/about-github-copilot/what-is-github-copilot#getting-access-to-copilot).
162164

163165
1. Make sure you have a compatible version of {% data variables.product.prodname_vs %} installed. {% data reusables.copilot.visual-studio-version %}
164166

165-
1. Install the {% data variables.product.prodname_copilot %} in {% data variables.product.prodname_vs %} See [Install {% data variables.product.prodname_copilot %} in {% data variables.product.prodname_vs %}](https://learn.microsoft.com/en-us/visualstudio/ide/visual-studio-github-copilot-install-and-states?ref_product=copilot&ref_type=engagement&ref_style=text) in the Microsoft documentation.
167+
1. Install the {% data variables.product.prodname_copilot %} extension in {% data variables.product.prodname_vs %}. See [Install {% data variables.product.prodname_copilot %} in {% data variables.product.prodname_vs %}](https://learn.microsoft.com/en-us/visualstudio/ide/visual-studio-github-copilot-install-and-states?ref_product=copilot&ref_type=engagement&ref_style=text) in the Microsoft documentation.
166168

167169
1. After installing the {% data variables.product.prodname_copilot %} extension, to enable {% data variables.product.prodname_copilot %}, ensure you have added your {% data variables.product.prodname_dotcom %} account to {% data variables.product.prodname_vs %}. For more information, see [Add your {% data variables.product.prodname_dotcom %} accounts to your {% data variables.product.prodname_vs %} keychain](https://learn.microsoft.com/en-us/visualstudio/ide/work-with-github-accounts?ref_product=copilot&ref_type=engagement&ref_style=text) in the Microsoft documentation.
168170

content/site-policy/github-terms/github-copilot-extension-developer-policy.md

Lines changed: 3 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -7,7 +7,9 @@ topics:
77
- Legal
88
---
99

10-
> Last Updated: September 6, 2024
10+
> Last Updated: October 20, 2025
11+
12+
> [!WARNING] We are deprecating GitHub Copilot Extensions on November 10, 2025, in favor of the Model Context Protocol (MCP). You can read more about this change in our [changelog post](https://github.blog/changelog/2025-09-24-deprecate-github-copilot-extensions-github-apps/).
1113
1214
This Agreement is a legal agreement between you (“You”) and GitHub, Inc. (“GitHub”, “we”, or “us”). By clicking “I Agree”, you’re agreeing to be bound by all the terms of this Agreement. If you are entering into this Agreement on behalf of a company or other legal entity, you represent that you have the legal authority to bind the entity to this Agreement, in which case “You” will mean the entity you represent.
1315

0 commit comments

Comments
 (0)