This version of GitHub Enterprise Server was discontinued on 2024-07-09. No patch releases will be made, even for critical security issues. For better performance, improved security, and new features, upgrade to the latest version of GitHub Enterprise Server. For help with the upgrade, contact GitHub Enterprise support.
Managing your code scanning configuration
You can manage your existing code scanning configuration with the help of metrics and logging outputs generated by your analysis.
Who can use this feature?
Code scanning is available for organization-owned repositories in GitHub Enterprise Server. This feature requires a license for GitHub Advanced Security. For more information, see "About GitHub Advanced Security."
About the tool status page for code scanning
The tool status page shows useful information about all of your code scanning tools. If code scanning is not working as you'd expect, the tool status page is a good starting point for debugging problems.
Editing your configuration of default setup
You can edit your existing configuration of default setup for code scanning to better meet your code security needs.
CodeQL query suites
You can choose from different built-in CodeQL query suites to use in your CodeQL code scanning setup.
Viewing code scanning logs
You can view the output generated during code scanning analysis in your GitHub Enterprise Server instance.
C and C++ queries for CodeQL analysis
Explore the queries that CodeQL uses to analyze code written in C or C++ when you select the default
or the security-extended
query suite.
C# queries for CodeQL analysis
Explore the queries that CodeQL uses to analyze code written in C# when you select the default
or the security-extended
query suite.
Go queries for CodeQL analysis
Explore the queries that CodeQL uses to analyze code written in Go (Golang) when you select the default
or the security-extended
query suite.
Java and Kotlin queries for CodeQL analysis
Explore the queries that CodeQL uses to analyze code written in Java or Kotlin when you select the default
or the security-extended
query suite.
JavaScript and TypeScript queries for CodeQL analysis
Explore the queries that CodeQL uses to analyze code written in JavaScript or TypeScript when you select the default
or the security-extended
query suite.
Python queries for CodeQL analysis
Explore the queries that CodeQL uses to analyze code written in Python when you select the default
or the security-extended
query suite.
Ruby queries for CodeQL analysis
Explore the queries that CodeQL uses to analyze code written in Ruby when you select the default
or the security-extended
query suite.
Swift queries for CodeQL analysis
Explore the queries that CodeQL uses to analyze code written in Swift when you select the default
or the security-extended
query suite.