Skip to content

Commit 83af859

Browse files
vgrllucascosti
andauthored
Add GHES enterprise audit log events, add redirect (github#26777)
Co-authored-by: Lucas Costi <[email protected]>
1 parent 8d1b17a commit 83af859

File tree

3 files changed

+42
-2
lines changed

3 files changed

+42
-2
lines changed

content/admin/monitoring-activity-in-your-enterprise/reviewing-audit-logs-for-your-enterprise/accessing-the-audit-log-for-your-enterprise.md

Lines changed: 1 addition & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -9,6 +9,7 @@ redirect_from:
99
- /articles/viewing-the-audit-logs-for-organizations-in-your-enterprise-account
1010
- /github/setting-up-and-managing-your-enterprise-account/viewing-the-audit-logs-for-organizations-in-your-enterprise-account
1111
- /github/setting-up-and-managing-your-enterprise/viewing-the-audit-logs-for-organizations-in-your-enterprise-account
12+
- /admin/user-management/managing-organizations-in-your-enterprise/viewing-the-audit-logs-for-organizations-in-your-enterprise
1213
versions:
1314
ghec: '*'
1415
ghes: '*'

content/admin/monitoring-activity-in-your-enterprise/reviewing-audit-logs-for-your-enterprise/audit-log-events-for-your-enterprise.md

Lines changed: 35 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -192,6 +192,16 @@ Action | Description
192192
| `commit_comment.update` | A commit comment was updated.
193193
{%- endif %}
194194

195+
{%- ifversion ghes %}
196+
### `config_entry` category actions
197+
198+
| Action | Description
199+
|--------|-------------
200+
| `config_entry.create` | A configuration setting was created. These events are only visible in the site admin audit log. The type of events recorded relate to:</br>- Enterprise settings and policies</br>- Organization and repository permissions and settings</br>- Git, Git LFS, {% data variables.product.prodname_github_connect %}, {% data variables.product.prodname_registry %}, project, and code security settings.
201+
| `config_entry.destroy` | A configuration setting was deleted. These events are only visible in the site admin audit log. The type of events recorded relate to:</br>- Enterprise settings and policies</br>- Organization and repository permissions and settings</br>- Git, Git LFS, {% data variables.product.prodname_github_connect %}, {% data variables.product.prodname_registry %}, project, and code security settings.
202+
| `config_entry.update` | A configuration setting was edited. These events are only visible in the site admin audit log. The type of events recorded relate to:</br>- Enterprise settings and policies</br>- Organization and repository permissions and settings</br>- Git, Git LFS, {% data variables.product.prodname_github_connect %}, {% data variables.product.prodname_registry %}, project, and code security settings.
203+
{%- endif %}
204+
195205
{%- ifversion fpt or ghec or ghes > 3.2 or ghae-issue-4864 %}
196206
### `dependabot_alerts` category actions
197207

@@ -367,6 +377,14 @@ Action | Description
367377
| `external_identity.update` | An Okta user's settings were updated. For more information, see "[Mapping Okta groups to teams](/admin/identity-and-access-management/configuring-authentication-and-provisioning-with-your-identity-provider/mapping-okta-groups-to-teams)."
368378
{%- endif %}
369379

380+
### `gist` category actions
381+
382+
| Action | Description
383+
|--------|-------------
384+
| `gist.create` | A gist is created.
385+
| `gist.destroy` | A gist is deleted.
386+
| `gist.visibility_change` | The visibility of a gist is changed.
387+
370388
### `git` category actions
371389

372390
| Action | Description
@@ -1075,6 +1093,14 @@ Action | Description
10751093
| `repository_image.create` | An image to represent a repository was uploaded.
10761094
| `repository_image.destroy` | An image to represent a repository was deleted.
10771095

1096+
### `repository_invitation` category actions
1097+
1098+
| Action | Description
1099+
|--------|-------------
1100+
| `repository_invitation.accept` | An invitation to join a repository was accepted.
1101+
| `repository_invitation.create` | An invitation to join a repository was sent.
1102+
| `repository_invitation.reject` | An invitation to join a repository was canceled.
1103+
10781104
### `repository_projects_change` category actions
10791105

10801106
| Action | Description
@@ -1242,10 +1268,18 @@ Action | Description
12421268
{%- endif %}
12431269
| `staff.repo_lock` | An organization{% ifversion ghes %}, repository or site{% else %} or repository{% endif %} administrator locked (temporarily gained full access to) a user's private repository.
12441270
| `staff.repo_unlock` | An organization{% ifversion ghes %}, repository or site{% else %} or repository{% endif %} administrator unlocked (ended their temporary access to) a user's private repository.
1245-
| `staff.unlock` | An enterprise owner{% ifversion ghes %} or site administrator{% endif %} unlocked (temporarily gained full access to) all of a user's private repositories.
1271+
{%- ifversion ghes %}
1272+
| `staff.search_audit_log` | A site administrator performed a search of the site admin audit log.
1273+
{%- endif %}
12461274
| `staff.set_domain_token_expiration` | {% ifversion ghes %}A site administrator or {% endif %}GitHub staff set the verification code expiry time for an organization or enterprise domain. {% ifversion ghec or ghes > 3.1 %}For more information, see "[Verifying or approving a domain for your organization](/organizations/managing-organization-settings/verifying-or-approving-a-domain-for-your-organization)" and "[Verifying or approving a domain for your enterprise](/admin/configuration/configuring-your-enterprise/verifying-or-approving-a-domain-for-your-enterprise)."{% endif %}
1275+
{%- ifversion ghes %}
1276+
| `staff.unlock` | A site administrator unlocked (temporarily gained full access to) all of a user's private repositories.
1277+
{%- endif %}
12471278
| `staff.unverify_domain` | {% ifversion ghes %}A site administrator or {% endif %}GitHub staff unverified an organization or enterprise domain. {% ifversion ghec or ghes > 3.1 %}For more information, see "[Verifying or approving a domain for your organization](/organizations/managing-organization-settings/verifying-or-approving-a-domain-for-your-organization)" and "[Verifying or approving a domain for your enterprise](/admin/configuration/configuring-your-enterprise/verifying-or-approving-a-domain-for-your-enterprise)."{% endif %}
12481279
| `staff.verify_domain` | {% ifversion ghes %}A site administrator or {% endif %}GitHub staff verified an organization or enterprise domain. {% ifversion ghec or ghes > 3.1 %}For more information, see "[Verifying or approving a domain for your organization](/organizations/managing-organization-settings/verifying-or-approving-a-domain-for-your-organization)" and "[Verifying or approving a domain for your enterprise](/admin/configuration/configuring-your-enterprise/verifying-or-approving-a-domain-for-your-enterprise)."{% endif %}
1280+
{%- ifversion ghes %}
1281+
| `staff.view_audit_log` | A site administrator viewed the site admin audit log.
1282+
{%- endif %}
12491283

12501284
### `team` category actions
12511285

data/reusables/audit_log/audit-log-action-categories.md

Lines changed: 6 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -25,6 +25,9 @@
2525
| `codespaces` | Contains activities related to an organization's codespaces.
2626
{%- endif %}
2727
| `commit_comment` | Contains activities related to updating or deleting commit comments.
28+
{%- ifversion ghes %}
29+
| `config_entry` | Contains activities related to configuration settings. These events are only visible in the site admin audit log.
30+
{%- endif %}
2831
{%- ifversion fpt or ghec or ghes > 3.2 or ghae-issue-4864 %} |
2932
| `dependabot_alerts` | Contains organization-level configuration activities for {% data variables.product.prodname_dependabot_alerts %} in existing repositories. For more information, see "[About alerts for vulnerable dependencies](/github/managing-security-vulnerabilities/about-alerts-for-vulnerable-dependencies)."
3033
| `dependabot_alerts_new_repos` | Contains organization-level configuration activities for {% data variables.product.prodname_dependabot_alerts %} in new repositories created in the organization.
@@ -59,6 +62,7 @@
5962
| `external_group` | Contains activities related to Okta groups.
6063
| `external_identity` | Contains activities related to a user in an Okta group.
6164
{%- endif %}
65+
| `gist` | Contains activities related to Gists.
6266
| `git` | Contains activities related to Git events.
6367
| `hook` | Contains activities related to webhooks.
6468
| `integration` | Contains activities related to integrations in an account.
@@ -138,7 +142,8 @@
138142
| `repository_content_analysis` | Contains activities related to [enabling or disabling data use for a private repository](/articles/about-github-s-use-of-your-data).
139143
| `repository_dependency_graph` | Contains repository-level activities related to enabling or disabling the dependency graph for a {% ifversion fpt or ghec %}private {% endif %}repository. For more information, see "[About the dependency graph](/github/visualizing-repository-data-with-graphs/about-the-dependency-graph)."
140144
{%- endif %}
141-
| `repository_image` | Contains activities related images for a repository.
145+
| `repository_image` | Contains activities related to images for a repository.
146+
| `repository_invitation` | Contains activities related to invitations to join a repository.
142147
| `repository_projects_change` | Contains activities related to enabling projects for a repository or for all repositories in an organization.
143148
{%- ifversion ghec or ghes or ghae %}
144149
| `repository_secret_scanning` | Contains repository-level activities related to secret scanning. For more information, see "[About secret scanning](/github/administering-a-repository/about-secret-scanning)."

0 commit comments

Comments
 (0)