diff --git a/content/code-security/secret-scanning/managing-alerts-from-secret-scanning.md b/content/code-security/secret-scanning/managing-alerts-from-secret-scanning.md index 7e94097dba80..87ea89bb416e 100644 --- a/content/code-security/secret-scanning/managing-alerts-from-secret-scanning.md +++ b/content/code-security/secret-scanning/managing-alerts-from-secret-scanning.md @@ -35,9 +35,15 @@ shortTitle: Manage secret alerts {% data reusables.repositories.navigate-to-repo %} {% data reusables.repositories.sidebar-security %} 1. In the left sidebar, under "Vulnerability alerts", click **{% data variables.product.prodname_secret_scanning_caps %}**. +{% ifversion secret-scanning-validity-check-partner-patterns %} +1. Optionally, to filter by alert validity status, under "{% data variables.product.prodname_secret_scanning_caps %}" select a status in the "Validity" dropdown menu and then click the filter that you would like to apply. Alternatively, filter using the `validity` key in the search field. You can filter alerts by specifying multiple validity statuses as a comma-separated string, for example `validity:active,unknown`. For more information about validity statuses, see "[Validating partner patterns](#validating-partner-patterns)" below. + {% data reusables.secret-scanning.validity-check-partner-patterns-beta %} + + {% data reusables.secret-scanning.validity-check-partner-patterns-enabled %} +{% endif %} 1. Under "{% data variables.product.prodname_secret_scanning_caps %}" click the alert you want to view. {% ifversion secret-scanning-validity-check-partner-patterns %} 1. Optionally, to perform a validity check on the token, on the top right-hand side of the alert, click {% octicon "sync" aria-hidden="true" %} **Verify secret**. For more information, see "[Validating partner patterns](#validating-partner-patterns)."

- {% note %} + {% note %} **Note:** You can only perform on-demand validity checks for patterns detected in the repository if automatic validity checks have been enabled for the repository. For more information, see "[Allowing validity checks for partner patterns in a repository](/repositories/managing-your-repositorys-settings-and-features/enabling-features-for-your-repository/managing-security-and-analysis-settings-for-your-repository#allowing-validity-checks-for-partner-patterns-in-a-repository)." @@ -81,7 +87,7 @@ You can enable automatic validity checks for supported partner patterns in the c If your repository has validity checks enabled, you can also perform an on-demand validity check for a secret by clicking {% octicon "sync" aria-hidden="true" %} **Verify secret** in the alert view. {% data variables.product.company_short %} will send the pattern to the relevant partner and display the validation status of the secret in the alert view. -You can use the validation status of a leaked secret to help prioritize the secrets needing remediation steps. +You can filter alerts for supported partner patterns by their validation status, and use the status of a leaked secret to help prioritize the secrets needing remediation steps. {% data reusables.secret-scanning.validity-check-table %} diff --git a/data/reusables/secret-scanning/validity-check-partner-patterns-enabled.md b/data/reusables/secret-scanning/validity-check-partner-patterns-enabled.md new file mode 100644 index 000000000000..8a0e52773450 --- /dev/null +++ b/data/reusables/secret-scanning/validity-check-partner-patterns-enabled.md @@ -0,0 +1 @@ +To be able to filter by validity status, you need to have enabled validity checks for partner patterns in a repository, or have organization owners and enterprise administrators enable the feature for all repositories in the organization or enterprise settings. For more information, see "[AUTOTITLE](/repositories/managing-your-repositorys-settings-and-features/enabling-features-for-your-repository/managing-security-and-analysis-settings-for-your-repository#allowing-validity-checks-for-partner-patterns-in-a-repository)," "[AUTOTITLE](/organizations/keeping-your-organization-secure/managing-security-settings-for-your-organization/managing-security-and-analysis-settings-for-your-organization#allowing-validity-checks-for-partner-patterns-in-an-organization)," and "[AUTOTITLE](/admin/code-security/managing-github-advanced-security-for-your-enterprise/managing-github-advanced-security-features-for-your-enterprise#managing-advanced-security-features)." diff --git a/data/reusables/secret-scanning/validity-check-table.md b/data/reusables/secret-scanning/validity-check-table.md index fb7789601a77..a04663e1046d 100644 --- a/data/reusables/secret-scanning/validity-check-table.md +++ b/data/reusables/secret-scanning/validity-check-table.md @@ -1,7 +1,6 @@ - | Validity | Result | - |-------------------------|--------------------------------------------------------------------------------| - | Active secret | {% data variables.product.company_short %} confirmed this secret is active | - | Active secret | {% data variables.product.company_short %} checked with this secret's provider and found that the secret is active | - | Possibly active secret | {% data variables.product.company_short %} does not support validation checks for this token type yet | - | Possibly active secret | {% data variables.product.company_short %} could not verify this secret | - | Secret appears inactive | You should make sure no unauthorized access has already occurred | + | Validity | Status | Result | + |-------------|------------|--------------------------------------------------------------------------------| + | Active secret | `active` | {% data variables.product.company_short %} checked with this secret's provider and found that the secret is active | + | Possibly active secret | `unknown` | {% data variables.product.company_short %} does not support validation checks for this token type yet | + | Possibly active secret | `unknown` | {% data variables.product.company_short %} could not verify this secret | + | Secret inactive | `inactive` | You should make sure no unauthorized access has already occurred |