Skip to content

Commit 35cc37c

Browse files
authored
Clarified the conditions under which IP addresses are displayed in the audit log for api.request events. (#58083)
1 parent 0a38491 commit 35cc37c

File tree

2 files changed

+3
-3
lines changed

2 files changed

+3
-3
lines changed

content/admin/monitoring-activity-in-your-enterprise/reviewing-audit-logs-for-your-enterprise/displaying-ip-addresses-in-the-audit-log-for-your-enterprise.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -36,7 +36,7 @@ If members of your enterprise access {% data variables.location.product_location
3636
* Interactions with a resource owned by the personal account, including a repository, gist, or project
3737
* Interactions with a public repository owned by an organization in your enterprise
3838

39-
{% data variables.product.github %} does not display IP address in the audit log for `api.request` events triggered by GraphQL requests.
39+
{% data variables.product.github %} does not display IP addresses in the audit log for `api.request` events that do not have repository context, such as requests triggered by GraphQL or requests to endpoints that reference only a user or organization.
4040

4141
## Enabling display of IP addresses in the audit log
4242

content/organizations/keeping-your-organization-secure/managing-security-settings-for-your-organization/displaying-ip-addresses-in-the-audit-log-for-your-organization.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -36,9 +36,9 @@ After you enable the feature, you can access the audit log to view events that i
3636

3737
{% data variables.product.github %} displays an IP address for each event in the organization audit log that meets these criteria.
3838

39-
* The actor is an organization member or owner
39+
* The actor is an organization member or owner.
4040
* The target is either an organization-owned repository that is private or internal, or an organization resource that is not a repository, such as a project.
41-
* For `api.request` events, the request was not triggered by GraphQL.
41+
* For `api.request` events, the request must have repository context; requests triggered by GraphQL or to endpoints that reference only a user or organization do not meet this condition.
4242

4343
## Enabling display of IP addresses in the audit log
4444

0 commit comments

Comments
 (0)