Skip to content

Commit 0226099

Browse files
authored
Update audit log event data (#52861)
1 parent a964295 commit 0226099

File tree

11 files changed

+72
-7
lines changed

11 files changed

+72
-7
lines changed

src/audit-logs/data/fpt/organization.json

Lines changed: 5 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -3024,6 +3024,11 @@
30243024
"description": "GitHub detected a secret and created a secret scanning alert.",
30253025
"docs_reference_links": "/code-security/secret-scanning/managing-alerts-from-secret-scanning"
30263026
},
3027+
{
3028+
"action": "secret_scanning_alert.public_leak",
3029+
"description": "A secret scanning alert was leaked in a public repo.",
3030+
"docs_reference_links": "/code-security/secret-scanning/managing-alerts-from-secret-scanning"
3031+
},
30273032
{
30283033
"action": "secret_scanning_alert.reopen",
30293034
"description": "A secret scanning alert was reopened.",

src/audit-logs/data/fpt/user.json

Lines changed: 10 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -64,11 +64,21 @@
6464
"description": "A CSV export was requested on the \"CodeQL pull request alerts\" page.",
6565
"docs_reference_links": "N/A"
6666
},
67+
{
68+
"action": "business.security_center_export_coverage",
69+
"description": "A CSV export was requested on the \"Coverage\" page.",
70+
"docs_reference_links": "N/A"
71+
},
6772
{
6873
"action": "business.security_center_export_overview_dashboard",
6974
"description": "A CSV export was requested on the \"Overview Dashboard\" page.",
7075
"docs_reference_links": "N/A"
7176
},
77+
{
78+
"action": "business.security_center_export_risk",
79+
"description": "A CSV export was requested on the \"Risk\" page.",
80+
"docs_reference_links": "N/A"
81+
},
7282
{
7383
"action": "business.set_actions_fork_pr_approvals_policy",
7484
"description": "The policy for requiring approvals for workflows from public forks was changed for an enterprise.",

src/audit-logs/data/ghec/enterprise.json

Lines changed: 36 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -36,7 +36,7 @@
3636
},
3737
{
3838
"action": "api.request",
39-
"description": "An API request was made to a security-significant endpoint for the enterprise. This event is only included if API Request Events is enabled in the enterprise's audit log settings. This event is only available via audit log streaming.",
39+
"description": "An API request was made to an endpoint for the enterprise, or an enterprise owned resource. This event is only included if API Request Events is enabled in the enterprise's audit log settings. This event is only available via audit log streaming.",
4040
"docs_reference_links": "/admin/monitoring-activity-in-your-enterprise/reviewing-audit-logs-for-your-enterprise/streaming-the-audit-log-for-your-enterprise#enabling-audit-log-streaming-of-api-requests"
4141
},
4242
{
@@ -564,11 +564,21 @@
564564
"description": "A CSV export was requested on the \"CodeQL pull request alerts\" page.",
565565
"docs_reference_links": "N/A"
566566
},
567+
{
568+
"action": "business.security_center_export_coverage",
569+
"description": "A CSV export was requested on the \"Coverage\" page.",
570+
"docs_reference_links": "N/A"
571+
},
567572
{
568573
"action": "business.security_center_export_overview_dashboard",
569574
"description": "A CSV export was requested on the \"Overview Dashboard\" page.",
570575
"docs_reference_links": "N/A"
571576
},
577+
{
578+
"action": "business.security_center_export_risk",
579+
"description": "A CSV export was requested on the \"Risk\" page.",
580+
"docs_reference_links": "N/A"
581+
},
572582
{
573583
"action": "business.set_actions_fork_pr_approvals_policy",
574584
"description": "The policy for requiring approvals for workflows from public forks was changed for an enterprise.",
@@ -3664,6 +3674,26 @@
36643674
"description": "Secret scanning push protection was enabled for a repository.",
36653675
"docs_reference_links": "/code-security/secret-scanning/protecting-pushes-with-secret-scanning"
36663676
},
3677+
{
3678+
"action": "repository_security_configuration.applied",
3679+
"description": "A code security configuration was applied to a repository.",
3680+
"docs_reference_links": "N/A"
3681+
},
3682+
{
3683+
"action": "repository_security_configuration.failed",
3684+
"description": "A code security configuration failed to attach to the repository.",
3685+
"docs_reference_links": "N/A"
3686+
},
3687+
{
3688+
"action": "repository_security_configuration.removed",
3689+
"description": "A code security configuration was removed from a repository.",
3690+
"docs_reference_links": "N/A"
3691+
},
3692+
{
3693+
"action": "repository_security_configuration.removed_by_settings_change",
3694+
"description": "A code security configuration was removed due to a change in repository or enterprise settings.",
3695+
"docs_reference_links": "N/A"
3696+
},
36673697
{
36683698
"action": "repository_visibility_change.clear",
36693699
"description": "The repository visibility change setting was cleared for an organization or enterprise.",
@@ -3779,6 +3809,11 @@
37793809
"description": "GitHub detected a secret and created a secret scanning alert.",
37803810
"docs_reference_links": "/code-security/secret-scanning/managing-alerts-from-secret-scanning"
37813811
},
3812+
{
3813+
"action": "secret_scanning_alert.public_leak",
3814+
"description": "A secret scanning alert was leaked in a public repo.",
3815+
"docs_reference_links": "/code-security/secret-scanning/managing-alerts-from-secret-scanning"
3816+
},
37823817
{
37833818
"action": "secret_scanning_alert.reopen",
37843819
"description": "A secret scanning alert was reopened.",

src/audit-logs/data/ghec/organization.json

Lines changed: 5 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -3024,6 +3024,11 @@
30243024
"description": "GitHub detected a secret and created a secret scanning alert.",
30253025
"docs_reference_links": "/code-security/secret-scanning/managing-alerts-from-secret-scanning"
30263026
},
3027+
{
3028+
"action": "secret_scanning_alert.public_leak",
3029+
"description": "A secret scanning alert was leaked in a public repo.",
3030+
"docs_reference_links": "/code-security/secret-scanning/managing-alerts-from-secret-scanning"
3031+
},
30273032
{
30283033
"action": "secret_scanning_alert.reopen",
30293034
"description": "A secret scanning alert was reopened.",

src/audit-logs/data/ghec/user.json

Lines changed: 10 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -64,11 +64,21 @@
6464
"description": "A CSV export was requested on the \"CodeQL pull request alerts\" page.",
6565
"docs_reference_links": "N/A"
6666
},
67+
{
68+
"action": "business.security_center_export_coverage",
69+
"description": "A CSV export was requested on the \"Coverage\" page.",
70+
"docs_reference_links": "N/A"
71+
},
6772
{
6873
"action": "business.security_center_export_overview_dashboard",
6974
"description": "A CSV export was requested on the \"Overview Dashboard\" page.",
7075
"docs_reference_links": "N/A"
7176
},
77+
{
78+
"action": "business.security_center_export_risk",
79+
"description": "A CSV export was requested on the \"Risk\" page.",
80+
"docs_reference_links": "N/A"
81+
},
7282
{
7383
"action": "business.set_actions_fork_pr_approvals_policy",
7484
"description": "The policy for requiring approvals for workflows from public forks was changed for an enterprise.",

src/audit-logs/data/ghes-3.11/enterprise.json

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -31,7 +31,7 @@
3131
},
3232
{
3333
"action": "api.request",
34-
"description": "An API request was made to a security-significant endpoint for the enterprise. This event is only included if API Request Events is enabled in the enterprise's audit log settings. This event is only available via audit log streaming.",
34+
"description": "An API request was made to an endpoint for the enterprise, or an enterprise owned resource. This event is only included if API Request Events is enabled in the enterprise's audit log settings. This event is only available via audit log streaming.",
3535
"docs_reference_links": "/admin/monitoring-activity-in-your-enterprise/reviewing-audit-logs-for-your-enterprise/streaming-the-audit-log-for-your-enterprise#enabling-audit-log-streaming-of-api-requests"
3636
},
3737
{

src/audit-logs/data/ghes-3.12/enterprise.json

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -31,7 +31,7 @@
3131
},
3232
{
3333
"action": "api.request",
34-
"description": "An API request was made to a security-significant endpoint for the enterprise. This event is only included if API Request Events is enabled in the enterprise's audit log settings. This event is only available via audit log streaming.",
34+
"description": "An API request was made to an endpoint for the enterprise, or an enterprise owned resource. This event is only included if API Request Events is enabled in the enterprise's audit log settings. This event is only available via audit log streaming.",
3535
"docs_reference_links": "/admin/monitoring-activity-in-your-enterprise/reviewing-audit-logs-for-your-enterprise/streaming-the-audit-log-for-your-enterprise#enabling-audit-log-streaming-of-api-requests"
3636
},
3737
{

src/audit-logs/data/ghes-3.13/enterprise.json

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -31,7 +31,7 @@
3131
},
3232
{
3333
"action": "api.request",
34-
"description": "An API request was made to a security-significant endpoint for the enterprise. This event is only included if API Request Events is enabled in the enterprise's audit log settings. This event is only available via audit log streaming.",
34+
"description": "An API request was made to an endpoint for the enterprise, or an enterprise owned resource. This event is only included if API Request Events is enabled in the enterprise's audit log settings. This event is only available via audit log streaming.",
3535
"docs_reference_links": "/admin/monitoring-activity-in-your-enterprise/reviewing-audit-logs-for-your-enterprise/streaming-the-audit-log-for-your-enterprise#enabling-audit-log-streaming-of-api-requests"
3636
},
3737
{

src/audit-logs/data/ghes-3.14/enterprise.json

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -31,7 +31,7 @@
3131
},
3232
{
3333
"action": "api.request",
34-
"description": "An API request was made to a security-significant endpoint for the enterprise. This event is only included if API Request Events is enabled in the enterprise's audit log settings. This event is only available via audit log streaming.",
34+
"description": "An API request was made to an endpoint for the enterprise, or an enterprise owned resource. This event is only included if API Request Events is enabled in the enterprise's audit log settings. This event is only available via audit log streaming.",
3535
"docs_reference_links": "/admin/monitoring-activity-in-your-enterprise/reviewing-audit-logs-for-your-enterprise/streaming-the-audit-log-for-your-enterprise#enabling-audit-log-streaming-of-api-requests"
3636
},
3737
{

src/audit-logs/data/ghes-3.15/enterprise.json

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -31,7 +31,7 @@
3131
},
3232
{
3333
"action": "api.request",
34-
"description": "An API request was made to a security-significant endpoint for the enterprise. This event is only included if API Request Events is enabled in the enterprise's audit log settings. This event is only available via audit log streaming.",
34+
"description": "An API request was made to an endpoint for the enterprise, or an enterprise owned resource. This event is only included if API Request Events is enabled in the enterprise's audit log settings. This event is only available via audit log streaming.",
3535
"docs_reference_links": "/admin/monitoring-activity-in-your-enterprise/reviewing-audit-logs-for-your-enterprise/streaming-the-audit-log-for-your-enterprise#enabling-audit-log-streaming-of-api-requests"
3636
},
3737
{

0 commit comments

Comments
 (0)