You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: content/admin/configuring-settings/hardening-security-for-your-enterprise/restricting-network-traffic-to-your-enterprise-with-an-ip-allow-list.md
+27Lines changed: 27 additions & 0 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -126,6 +126,33 @@ To ensure seamless use of the OIDC CAP while still applying the policy to OAuth
126
126
1. Optionally, to allow installed {% data variables.product.company_short %} and {% data variables.product.prodname_oauth_apps %} to access your enterprise from any IP address, select **Skip IdP check for applications**.
127
127
1. Click **Save**.
128
128
129
+
## Restricting access to user-owned resources with the IP allow list
130
+
131
+
> [!NOTE]
132
+
> User-level IP allow list enforcement is only available for enterprises that use {% data variables.product.prodname_emus %}.
133
+
134
+
By default, your enterprise's IP allow list does not restrict access to repositories and other resources owned by {% data variables.enterprise.prodname_managed_users %}. You can enable user-level enforcement to extend IP allow list restrictions to user-owned resources, including:
135
+
136
+
* User-owned repositories and their forks
137
+
* User profile pages
138
+
139
+
This ensures that all locations where enterprise code may reside—not just organization-owned repositories—are only accessible from allowed IP addresses.
140
+
141
+
### Enabling user-level enforcement
142
+
143
+
{% data reusables.enterprise-accounts.access-enterprise %}
144
+
{% data reusables.enterprise-accounts.settings-tab %}
145
+
{% data reusables.enterprise-accounts.security-tab %}
146
+
1. Under "IP allow list", select **Enable IP allow list user-level enforcement**.
147
+
1. Click **Save**.
148
+
149
+
> [!IMPORTANT]
150
+
> Before enabling user-level enforcement, add all IP addresses that your {% data variables.enterprise.prodname_managed_users %} use to connect to the enterprise IP allow list. If a user connects from an IP address that isn’t on the allow list, they won’t be able to access their user-owned resources.
151
+
152
+
### Disabling user-level enforcement
153
+
154
+
To stop enforcing the IP allow list on user-owned resources, follow the same steps above and deselect **Enable IP allow list user-level enforcement**, then click **Save**. Access to user-owned resources will no longer be restricted by the IP allow list.
155
+
129
156
## Using {% data variables.product.prodname_actions %} with an IP allow list
130
157
131
158
{% data reusables.actions.ip-allow-list-self-hosted-runners %}
Copy file name to clipboardExpand all lines: content/code-security/how-tos/manage-security-alerts/manage-dependabot-alerts/viewing-and-updating-dependabot-alerts.md
+6-1Lines changed: 6 additions & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -62,12 +62,17 @@ By default, alerts are sorted by **Most important**, which helps you prioritize
62
62
63
63

64
64
65
+
{% ifversion dependabot-alerts-assignees %}
66
+
1. On the right panel, select an assignee by using the **Assignees** dropdown list. This clearly communicates who is responsible for triaging the alert so that no effort is wasted on repetitive analysis without worrying that alerts might fall through the cracks.
67
+
{% endif %}
68
+
65
69
1. Optionally, to suggest an improvement to the related security advisory, on the right-hand side of the alert details page, click **Suggest improvements for this advisory on the {% data variables.product.prodname_advisory_database %}**. See [AUTOTITLE](/code-security/security-advisories/working-with-global-security-advisories-from-the-github-advisory-database/editing-security-advisories-in-the-github-advisory-database).
66
70
67
71
### Tips for prioritizing alerts
68
72
69
73
* Use the **Most important** sort order to focus on alerts with the highest potential impact.
70
-
* Prioritize alerts that affect production dependencies over development dependencies.
74
+
* Prioritize alerts that affect production dependencies over development dependencies.{% ifversion dependabot-alerts-assignees %}
75
+
* Use the **Assignees** feature to clarify who is responsible for addressing each alert, so your team can track and remediate vulnerabilities more effectively.{% endif %}
71
76
* Use {% data variables.dependabot.auto_triage_rules %} to automatically prioritize or manage alerts. See [AUTOTITLE](/code-security/concepts/supply-chain-security/about-dependabot-auto-triage-rules).
72
77
73
78
For more information about supported ecosystems and manifest files for dependency scope, see [AUTOTITLE](/code-security/reference/supply-chain-security/supported-ecosystems-and-manifests-for-dependency-scope).
Copy file name to clipboardExpand all lines: content/copilot/concepts/agents/coding-agent/about-custom-agents.md
+2-1Lines changed: 2 additions & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -27,7 +27,7 @@ The {% data variables.copilot.agent_profile %} defines the {% data variables.cop
27
27
***Prompt**: Custom instructions that define the agent's behavior and expertise.
28
28
***Tools** (optional): Specific tools the agent can access. By default, agents can access all available tools, including built-in tools and MCP server tools.
29
29
30
-
Organization and enterprise-level {% data variables.copilot.agent_profiles %} can also include MCP server configurations using the `mcp-server` property.
30
+
{% data variables.copilot.agent_profiles_caps %} can also include MCP server configurations using the `mcp-server` property.
31
31
32
32
### Example {% data variables.copilot.agent_profile %}
33
33
@@ -79,3 +79,4 @@ To create your own {% data variables.copilot.custom_agents_short %}, see:
Copy file name to clipboardExpand all lines: content/copilot/concepts/agents/coding-agent/mcp-and-coding-agent.md
+1-1Lines changed: 1 addition & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -46,7 +46,7 @@ For details of how to set up MCP servers for {% data variables.copilot.copilot_c
46
46
47
47
## MCP servers for {% data variables.copilot.custom_agents_short %}
48
48
49
-
Organization and enterprise administrators can also configure MCP servers as part of {% data variables.copilot.custom_agents_short %}.
49
+
You can also configure MCP servers for {% data variables.copilot.custom_agents_short %}.
50
50
51
51
MCP servers configured in {% data variables.copilot.custom_agents_short %} are available only to that specific agent and follow the same processing order as other MCP configurations, with {% data variables.copilot.copilot_custom_agent_short %} MCP settings processed after default servers but before repository-level configurations.
Copy file name to clipboardExpand all lines: content/copilot/how-tos/use-copilot-agents/coding-agent/create-custom-agents.md
+3-3Lines changed: 3 additions & 3 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -80,16 +80,16 @@ To update an {% data variables.copilot.agent_profile %}, from the agents dropdow
80
80
81
81
## Configuring an {% data variables.copilot.agent_profile %}
82
82
83
-
An {% data variables.copilot.agent_profile %} is a Markdown file with YAML frontmatter that specifies the {% data variables.copilot.copilot_custom_agent_short %}'s name, description, available tools, and MCP server configurations (for organization/enterprise level agents). Configuring an {% data variables.copilot.agent_profile %} involves defining the agent's identity, capabilities, tool access, and behavioral instructions.
83
+
An {% data variables.copilot.agent_profile %} is a Markdown file with YAML frontmatter that specifies the {% data variables.copilot.copilot_custom_agent_short %}'s name, description, available tools, and MCP server configurations. Configuring an {% data variables.copilot.agent_profile %} involves defining the agent's identity, capabilities, tool access, and behavioral instructions.
84
84
85
85
For detailed configuration information about YAML properties, tools, MCP server setup, tool aliases, and how {% data variables.copilot.custom_agents_short %} are processed, see [AUTOTITLE](/copilot/reference/custom-agents-configuration).
86
86
87
87
To configure your {% data variables.copilot.agent_profile %}:
88
88
89
89
1. Optionally, write a `name` for your {% data variables.copilot.copilot_custom_agent_short %}. If unset, the name will default to the filename (without the `.md` or `.agent.md` suffix).
90
90
1. Write a brief `description` (required) explaining what your agent does and its specific capabilities or domain expertise.
91
-
1. In the `tools` property, define which tools the agent can use. This is a list of tool names or aliases, including tools from MCP servers configured in the repository settings or the {% data variables.copilot.agent_profile %} (for example, `tools: ["read", "edit", "search", "some-mcp-server/tool-1"]`). If you omit this property, the agent will have access to all available tools.
92
-
1.If creating an organization or enterprise level agent on {% data variables.product.github %}, you can use the `mcp-servers` property to optionally configure MCP servers that will be available only to this agent to extend its capabilities.
91
+
1. In the `tools` property, define which tools the agent can use. This is a list of tool names or aliases, including tools from MCP servers configured in the repository settings or the {% data variables.copilot.agent_profile %} (for example, `tools: ["read", "edit", "search", "some-mcp-server/tool-1"]`). If you omit this property, the agent will have access to all available tools. See "Tools" in [AUTOTITLE](/copilot/reference/custom-agents-configuration#tools).
92
+
1.Optionally, in the `mcp-servers` property, you can configure MCP servers that will be available only to this agent to extend its capabilities. See "MCP server configuration details" in [AUTOTITLE](/copilot/reference/custom-agents-configuration#mcp-server-configuration-details).
93
93
1. If you are creating and using the {% data variables.copilot.agent_profile %} in {% data variables.product.prodname_vscode_shortname %}, JetBrains IDEs, Eclipse, or Xcode, you can also use the `model` property to control which AI model the agent should use.
94
94
1. Optionally, set the `target` property to either `vscode` or `github-copilot` if you want to only use the agent in a specific environment. The agent will be available in both environments if you omit the property.
95
95
1. Write the agent's prompt. Define the agent's behavior, expertise, and instructions in the Markdown content below the YAML frontmatter. The prompt can be a maximum of 30,000 characters.
0 commit comments