From da20ca5d16a9fd345c33dfe76fa22f613483fa76 Mon Sep 17 00:00:00 2001 From: Isaac Brown <101839405+isaacmbrown@users.noreply.github.com> Date: Tue, 21 May 2024 14:52:28 +0100 Subject: [PATCH] Add secret scanning note to 3.13 release notes (#50698) --- data/release-notes/enterprise-server/3-13/0-rc1.yml | 3 +++ 1 file changed, 3 insertions(+) diff --git a/data/release-notes/enterprise-server/3-13/0-rc1.yml b/data/release-notes/enterprise-server/3-13/0-rc1.yml index 13ac5f5d48..101f388a66 100644 --- a/data/release-notes/enterprise-server/3-13/0-rc1.yml +++ b/data/release-notes/enterprise-server/3-13/0-rc1.yml @@ -88,6 +88,9 @@ sections: # https://github.com/github/releases/issues/3566 - | In the secret scanning list view, users can apply a filter to display alerts that are the result of having bypassed push protection. For more information, see "[AUTOTITLE](/code-security/secret-scanning/managing-alerts-from-secret-scanning)." + # https://github.com/github/releases/issues/3180 + - | + To increase coverage of secret scanning across an instance, users can enable secret scanning in repositories owned by their personal account. Enterprise owners can disable this feature, or automatically enable it for all new user-owned repositories, in the enterprise settings. See "[AUTOTITLE](/admin/code-security/managing-github-advanced-security-for-your-enterprise/managing-github-advanced-security-features-for-your-enterprise)." - heading: Code scanning notes: