diff --git a/content/code-security/security-overview/exporting-data-from-security-overview.md b/content/code-security/security-overview/exporting-data-from-security-overview.md index 996a7329f025..129fe6e5cb36 100644 --- a/content/code-security/security-overview/exporting-data-from-security-overview.md +++ b/content/code-security/security-overview/exporting-data-from-security-overview.md @@ -1,7 +1,7 @@ --- title: Exporting data from security overview shortTitle: Export data -intro: You can export CSV files of your organization's{% ifversion security-overview-export-dashboard-data %} overview,{% endif %} risk and coverage data from security overview. +intro: You can export CSV files of your organization's overview, risk, coverage, and {% data variables.product.prodname_codeql %} pull request alerts data from security overview. permissions: '{% data reusables.permissions.security-overview %}' versions: feature: security-overview-export-data @@ -20,7 +20,7 @@ redirect_from: {% data reusables.security-overview.download-csv-files %} -{% ifversion security-overview-export-dashboard-data %}The overview page contains data about security alerts across your organization, while the risk and coverage pages contain data about repositories and how they are affected by security alerts or covered by security features.{% endif %} +The overview page contains data about security alerts across your organization, while the risk and coverage pages contain data about repositories and how they are affected by security alerts or covered by security features. The {% data variables.product.prodname_codeql %} pull request alerts page contains data about {% data variables.product.prodname_codeql %} alerts that were caught in pull requests merged to the default branch. The CSV file you download will contain data corresponding to the filters you have applied to security overview. For example, if you add the filter `dependabot-alerts:enabled`, your file will only contain data for repositories that have enabled {% data variables.product.prodname_dependabot_alerts %}. @@ -35,10 +35,10 @@ The CSV file you download will contain data corresponding to the filters you hav {% data reusables.profile.access_org %} 1. In the "Organizations" section, select the organization for which you would like to download security overview data. {% data reusables.organizations.security-overview %} -1. In the "Security" sidebar, choose the page that you want to export data from by clicking on {% ifversion security-overview-export-dashboard-data %}**{% octicon "graph" aria-hidden="true" %}Overview**, {% endif %}**{% octicon "meter" aria-hidden="true" %} Coverage** or **{% octicon "shield" aria-hidden="true" %} Risk**. +1. In the "Security" sidebar, choose the page that you want to export data from by clicking on **{% octicon "graph" aria-hidden="true" %}Overview**, **{% octicon "meter" aria-hidden="true" %} Coverage**, **{% octicon "shield" aria-hidden="true" %} Risk** or **{% octicon "graph" aria-hidden="true" %} {% data variables.product.prodname_codeql %} pull request alerts**. 1. Next to the search bar, click {% octicon "download" aria-hidden="true" %} **Export CSV**. - It may take a moment for {% data variables.product.product_name %} to generate the CSV file of your data. Once the CSV file generates, the file will automatically start downloading, and a banner will appear confirming your report is ready. {% ifversion security-overview-export-dashboard-data %}If you are downloading the CSV from the overview page, you will also receive an email when your report is ready, containing a link to download the CSV.{% endif %} + It may take a moment for {% data variables.product.product_name %} to generate the CSV file of your data. Once the CSV file generates, the file will automatically start downloading, and a banner will appear confirming your report is ready. If you are downloading the CSV from the overview page, you will also receive an email when your report is ready, containing a link to download the CSV. {% ifversion secret-scanning-non-provider-patterns %} diff --git a/content/code-security/security-overview/viewing-metrics-for-pull-request-alerts.md b/content/code-security/security-overview/viewing-metrics-for-pull-request-alerts.md index 041b03424482..c017c09fcdf4 100644 --- a/content/code-security/security-overview/viewing-metrics-for-pull-request-alerts.md +++ b/content/code-security/security-overview/viewing-metrics-for-pull-request-alerts.md @@ -47,4 +47,5 @@ You can apply filters to the data. The metrics are based on activity from the de * At the top of the page, next to the search box, click {% octicon "filter" aria-hidden="true" %} **Filter**. * Click {% octicon "plus" aria-hidden="true" %} **Add a filter**, then select a filter from the dropdown menu. * To search for repositories matching the selected filter, fill out the available fields for that filter, then click **Apply**. You can repeat this process to add as many filters as you would like to your search. - * Optionally, to remove a filter from your search, click {% octicon "filter" aria-hidden="true" %} **Filter**. In the row of the filter you want to remove, click {% octicon "x" aria-label="Delete FILTER-NUMBER: FILTER-PROPERTIES" %}, then click **Apply**. + * Optionally, to remove a filter from your search, click {% octicon "filter" aria-hidden="true" %} **Filter**. In the row of the filter you want to remove, click {% octicon "x" aria-label="Delete FILTER-NUMBER: FILTER-PROPERTIES" %}, then click **Apply**.{% ifversion security-overview-export-data %} +1. You can use the {% octicon "download" aria-hidden="true" %} **Export CSV** button to download a CSV file of the data currently displayed on the page for security research and in-depth data analysis. For more information, see "[AUTOTITLE](/code-security/security-overview/exporting-data-from-security-overview)." {% endif %} diff --git a/content/copilot/using-github-copilot/asking-github-copilot-questions-in-your-ide.md b/content/copilot/using-github-copilot/asking-github-copilot-questions-in-your-ide.md index d651a374c4a6..846109c73156 100644 --- a/content/copilot/using-github-copilot/asking-github-copilot-questions-in-your-ide.md +++ b/content/copilot/using-github-copilot/asking-github-copilot-questions-in-your-ide.md @@ -107,8 +107,7 @@ To see all available chat variables, type `#` in the chat prompt box. See also [ ## Using {% data variables.product.prodname_dotcom %} skills for {% data variables.product.prodname_copilot_short %} > [!NOTE] -> * The `@github` chat participant is currently in {% data variables.release-phases.public_preview %} and is subject to change. -> * This functionality is available with {% data variables.product.prodname_copilot_chat_short %} v0.20.3 or later and {% data variables.product.prodname_vscode_shortname %} or {% data variables.product.prodname_vscode_shortname %} Insiders 1.93 or later. +> This functionality is available with the {% data variables.product.prodname_copilot_chat_short %} extension v0.20.3 or later and {% data variables.product.prodname_vscode_shortname %} or {% data variables.product.prodname_vscode_shortname %} Insiders 1.93 or later. {% data variables.product.prodname_copilot_short %} has a collection of {% data variables.product.prodname_dotcom %}-specific skills that it can use to answer your questions. To access these skills in {% data variables.product.prodname_copilot_chat_short %} in {% data variables.product.prodname_vscode_shortname %}, include `@github` in your question. diff --git a/data/reusables/rai/copilot/copilot-chat-ide-leveraging-web-search.md b/data/reusables/rai/copilot/copilot-chat-ide-leveraging-web-search.md index 4289c1c7e9d1..c3fe82b2d504 100644 --- a/data/reusables/rai/copilot/copilot-chat-ide-leveraging-web-search.md +++ b/data/reusables/rai/copilot/copilot-chat-ide-leveraging-web-search.md @@ -1,8 +1,7 @@ ### Leveraging a web search to answer a question > [!NOTE] -> * Bing search integration in {% data variables.product.prodname_copilot_chat_short %} is currently in {% data variables.release-phases.public_preview %} and is subject to change. -> * The `@github` chat participant in {% data variables.product.prodname_vscode_shortname %} and {% data variables.product.prodname_vs %} is currently in {% data variables.release-phases.public_preview %} and is subject to change. For more information, see "[Supplemental Terms of Use for Microsoft Azure Previews](https://azure.microsoft.com/en-us/support/legal/preview-supplemental-terms)." +> Bing search integration in {% data variables.product.prodname_copilot_chat_short %} is currently in {% data variables.release-phases.public_preview %} and is subject to change. When you use the `@github` chat participant, {% data variables.product.prodname_copilot_chat %} can use a Bing search to help answer your question if this has been enabled by your administrator. diff --git a/data/reusables/security-overview/download-csv-files.md b/data/reusables/security-overview/download-csv-files.md index ef40b639fd8d..6d44581080fc 100644 --- a/data/reusables/security-overview/download-csv-files.md +++ b/data/reusables/security-overview/download-csv-files.md @@ -1 +1 @@ -You can download comma-separated values (CSV) files containing data from the {% ifversion security-overview-export-dashboard-data %} overview, {% endif %}risk and coverage pages of your organization's security overview. These files can be used for efforts like security research and in-depth data analysis, and can integrate easily with external datasets. +You can download comma-separated values (CSV) files containing data from the "Overview", "Risk", "Coverage" and "{% data variables.product.prodname_codeql %} pull request alerts" pages of your organization's security overview. These files can be used for efforts like security research and in-depth data analysis, and can integrate easily with external datasets. diff --git a/src/audit-logs/data/fpt/organization.json b/src/audit-logs/data/fpt/organization.json index b730c4319473..5ce31ba76feb 100644 --- a/src/audit-logs/data/fpt/organization.json +++ b/src/audit-logs/data/fpt/organization.json @@ -3024,6 +3024,11 @@ "description": "GitHub detected a secret and created a secret scanning alert.", "docs_reference_links": "/code-security/secret-scanning/managing-alerts-from-secret-scanning" }, + { + "action": "secret_scanning_alert.public_leak", + "description": "A secret scanning alert was leaked in a public repo.", + "docs_reference_links": "/code-security/secret-scanning/managing-alerts-from-secret-scanning" + }, { "action": "secret_scanning_alert.reopen", "description": "A secret scanning alert was reopened.", diff --git a/src/audit-logs/data/fpt/user.json b/src/audit-logs/data/fpt/user.json index 732408ee7f4e..f6392625eb24 100644 --- a/src/audit-logs/data/fpt/user.json +++ b/src/audit-logs/data/fpt/user.json @@ -64,11 +64,21 @@ "description": "A CSV export was requested on the \"CodeQL pull request alerts\" page.", "docs_reference_links": "N/A" }, + { + "action": "business.security_center_export_coverage", + "description": "A CSV export was requested on the \"Coverage\" page.", + "docs_reference_links": "N/A" + }, { "action": "business.security_center_export_overview_dashboard", "description": "A CSV export was requested on the \"Overview Dashboard\" page.", "docs_reference_links": "N/A" }, + { + "action": "business.security_center_export_risk", + "description": "A CSV export was requested on the \"Risk\" page.", + "docs_reference_links": "N/A" + }, { "action": "business.set_actions_fork_pr_approvals_policy", "description": "The policy for requiring approvals for workflows from public forks was changed for an enterprise.", diff --git a/src/audit-logs/data/ghec/enterprise.json b/src/audit-logs/data/ghec/enterprise.json index 95e5ce70a9fd..d816f6fbd3f9 100644 --- a/src/audit-logs/data/ghec/enterprise.json +++ b/src/audit-logs/data/ghec/enterprise.json @@ -36,7 +36,7 @@ }, { "action": "api.request", - "description": "An API request was made to a security-significant endpoint for the enterprise. This event is only included if API Request Events is enabled in the enterprise's audit log settings. This event is only available via audit log streaming.", + "description": "An API request was made to an endpoint for the enterprise, or an enterprise owned resource. This event is only included if API Request Events is enabled in the enterprise's audit log settings. This event is only available via audit log streaming.", "docs_reference_links": "/admin/monitoring-activity-in-your-enterprise/reviewing-audit-logs-for-your-enterprise/streaming-the-audit-log-for-your-enterprise#enabling-audit-log-streaming-of-api-requests" }, { @@ -564,11 +564,21 @@ "description": "A CSV export was requested on the \"CodeQL pull request alerts\" page.", "docs_reference_links": "N/A" }, + { + "action": "business.security_center_export_coverage", + "description": "A CSV export was requested on the \"Coverage\" page.", + "docs_reference_links": "N/A" + }, { "action": "business.security_center_export_overview_dashboard", "description": "A CSV export was requested on the \"Overview Dashboard\" page.", "docs_reference_links": "N/A" }, + { + "action": "business.security_center_export_risk", + "description": "A CSV export was requested on the \"Risk\" page.", + "docs_reference_links": "N/A" + }, { "action": "business.set_actions_fork_pr_approvals_policy", "description": "The policy for requiring approvals for workflows from public forks was changed for an enterprise.", @@ -3664,6 +3674,26 @@ "description": "Secret scanning push protection was enabled for a repository.", "docs_reference_links": "/code-security/secret-scanning/protecting-pushes-with-secret-scanning" }, + { + "action": "repository_security_configuration.applied", + "description": "A code security configuration was applied to a repository.", + "docs_reference_links": "N/A" + }, + { + "action": "repository_security_configuration.failed", + "description": "A code security configuration failed to attach to the repository.", + "docs_reference_links": "N/A" + }, + { + "action": "repository_security_configuration.removed", + "description": "A code security configuration was removed from a repository.", + "docs_reference_links": "N/A" + }, + { + "action": "repository_security_configuration.removed_by_settings_change", + "description": "A code security configuration was removed due to a change in repository or enterprise settings.", + "docs_reference_links": "N/A" + }, { "action": "repository_visibility_change.clear", "description": "The repository visibility change setting was cleared for an organization or enterprise.", @@ -3779,6 +3809,11 @@ "description": "GitHub detected a secret and created a secret scanning alert.", "docs_reference_links": "/code-security/secret-scanning/managing-alerts-from-secret-scanning" }, + { + "action": "secret_scanning_alert.public_leak", + "description": "A secret scanning alert was leaked in a public repo.", + "docs_reference_links": "/code-security/secret-scanning/managing-alerts-from-secret-scanning" + }, { "action": "secret_scanning_alert.reopen", "description": "A secret scanning alert was reopened.", diff --git a/src/audit-logs/data/ghec/organization.json b/src/audit-logs/data/ghec/organization.json index b730c4319473..5ce31ba76feb 100644 --- a/src/audit-logs/data/ghec/organization.json +++ b/src/audit-logs/data/ghec/organization.json @@ -3024,6 +3024,11 @@ "description": "GitHub detected a secret and created a secret scanning alert.", "docs_reference_links": "/code-security/secret-scanning/managing-alerts-from-secret-scanning" }, + { + "action": "secret_scanning_alert.public_leak", + "description": "A secret scanning alert was leaked in a public repo.", + "docs_reference_links": "/code-security/secret-scanning/managing-alerts-from-secret-scanning" + }, { "action": "secret_scanning_alert.reopen", "description": "A secret scanning alert was reopened.", diff --git a/src/audit-logs/data/ghec/user.json b/src/audit-logs/data/ghec/user.json index 732408ee7f4e..f6392625eb24 100644 --- a/src/audit-logs/data/ghec/user.json +++ b/src/audit-logs/data/ghec/user.json @@ -64,11 +64,21 @@ "description": "A CSV export was requested on the \"CodeQL pull request alerts\" page.", "docs_reference_links": "N/A" }, + { + "action": "business.security_center_export_coverage", + "description": "A CSV export was requested on the \"Coverage\" page.", + "docs_reference_links": "N/A" + }, { "action": "business.security_center_export_overview_dashboard", "description": "A CSV export was requested on the \"Overview Dashboard\" page.", "docs_reference_links": "N/A" }, + { + "action": "business.security_center_export_risk", + "description": "A CSV export was requested on the \"Risk\" page.", + "docs_reference_links": "N/A" + }, { "action": "business.set_actions_fork_pr_approvals_policy", "description": "The policy for requiring approvals for workflows from public forks was changed for an enterprise.", diff --git a/src/audit-logs/data/ghes-3.11/enterprise.json b/src/audit-logs/data/ghes-3.11/enterprise.json index b9625490a0b8..33899ea78129 100644 --- a/src/audit-logs/data/ghes-3.11/enterprise.json +++ b/src/audit-logs/data/ghes-3.11/enterprise.json @@ -31,7 +31,7 @@ }, { "action": "api.request", - "description": "An API request was made to a security-significant endpoint for the enterprise. This event is only included if API Request Events is enabled in the enterprise's audit log settings. This event is only available via audit log streaming.", + "description": "An API request was made to an endpoint for the enterprise, or an enterprise owned resource. This event is only included if API Request Events is enabled in the enterprise's audit log settings. This event is only available via audit log streaming.", "docs_reference_links": "/admin/monitoring-activity-in-your-enterprise/reviewing-audit-logs-for-your-enterprise/streaming-the-audit-log-for-your-enterprise#enabling-audit-log-streaming-of-api-requests" }, { diff --git a/src/audit-logs/data/ghes-3.12/enterprise.json b/src/audit-logs/data/ghes-3.12/enterprise.json index 7b06ca1baba9..57e0dbe0f05d 100644 --- a/src/audit-logs/data/ghes-3.12/enterprise.json +++ b/src/audit-logs/data/ghes-3.12/enterprise.json @@ -31,7 +31,7 @@ }, { "action": "api.request", - "description": "An API request was made to a security-significant endpoint for the enterprise. This event is only included if API Request Events is enabled in the enterprise's audit log settings. This event is only available via audit log streaming.", + "description": "An API request was made to an endpoint for the enterprise, or an enterprise owned resource. This event is only included if API Request Events is enabled in the enterprise's audit log settings. This event is only available via audit log streaming.", "docs_reference_links": "/admin/monitoring-activity-in-your-enterprise/reviewing-audit-logs-for-your-enterprise/streaming-the-audit-log-for-your-enterprise#enabling-audit-log-streaming-of-api-requests" }, { diff --git a/src/audit-logs/data/ghes-3.13/enterprise.json b/src/audit-logs/data/ghes-3.13/enterprise.json index cd97fa9fed3b..fc2c81cb967e 100644 --- a/src/audit-logs/data/ghes-3.13/enterprise.json +++ b/src/audit-logs/data/ghes-3.13/enterprise.json @@ -31,7 +31,7 @@ }, { "action": "api.request", - "description": "An API request was made to a security-significant endpoint for the enterprise. This event is only included if API Request Events is enabled in the enterprise's audit log settings. This event is only available via audit log streaming.", + "description": "An API request was made to an endpoint for the enterprise, or an enterprise owned resource. This event is only included if API Request Events is enabled in the enterprise's audit log settings. This event is only available via audit log streaming.", "docs_reference_links": "/admin/monitoring-activity-in-your-enterprise/reviewing-audit-logs-for-your-enterprise/streaming-the-audit-log-for-your-enterprise#enabling-audit-log-streaming-of-api-requests" }, { diff --git a/src/audit-logs/data/ghes-3.14/enterprise.json b/src/audit-logs/data/ghes-3.14/enterprise.json index 38b4c99d2376..5017309617bf 100644 --- a/src/audit-logs/data/ghes-3.14/enterprise.json +++ b/src/audit-logs/data/ghes-3.14/enterprise.json @@ -31,7 +31,7 @@ }, { "action": "api.request", - "description": "An API request was made to a security-significant endpoint for the enterprise. This event is only included if API Request Events is enabled in the enterprise's audit log settings. This event is only available via audit log streaming.", + "description": "An API request was made to an endpoint for the enterprise, or an enterprise owned resource. This event is only included if API Request Events is enabled in the enterprise's audit log settings. This event is only available via audit log streaming.", "docs_reference_links": "/admin/monitoring-activity-in-your-enterprise/reviewing-audit-logs-for-your-enterprise/streaming-the-audit-log-for-your-enterprise#enabling-audit-log-streaming-of-api-requests" }, { diff --git a/src/audit-logs/data/ghes-3.15/enterprise.json b/src/audit-logs/data/ghes-3.15/enterprise.json index 456e0876df21..34c2111377ff 100644 --- a/src/audit-logs/data/ghes-3.15/enterprise.json +++ b/src/audit-logs/data/ghes-3.15/enterprise.json @@ -31,7 +31,7 @@ }, { "action": "api.request", - "description": "An API request was made to a security-significant endpoint for the enterprise. This event is only included if API Request Events is enabled in the enterprise's audit log settings. This event is only available via audit log streaming.", + "description": "An API request was made to an endpoint for the enterprise, or an enterprise owned resource. This event is only included if API Request Events is enabled in the enterprise's audit log settings. This event is only available via audit log streaming.", "docs_reference_links": "/admin/monitoring-activity-in-your-enterprise/reviewing-audit-logs-for-your-enterprise/streaming-the-audit-log-for-your-enterprise#enabling-audit-log-streaming-of-api-requests" }, { diff --git a/src/audit-logs/lib/config.json b/src/audit-logs/lib/config.json index 6138130954ba..203765980b75 100644 --- a/src/audit-logs/lib/config.json +++ b/src/audit-logs/lib/config.json @@ -3,5 +3,5 @@ "apiOnlyEvents": "This event is not available in the web interface, only via the REST API, audit log streaming, or JSON/CSV exports.", "apiRequestEvent": "This event is only available via audit log streaming." }, - "sha": "30a09f504125749aff6a164e2f7a4518c5096b2d" + "sha": "50b493f0914184eb8479e18ead886625a6fc2ed6" } \ No newline at end of file