You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: content/admin/monitoring-activity-in-your-enterprise/reviewing-audit-logs-for-your-enterprise/displaying-ip-addresses-in-the-audit-log-for-your-enterprise.md
+1-1Lines changed: 1 addition & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -36,7 +36,7 @@ If members of your enterprise access {% data variables.location.product_location
36
36
* Interactions with a resource owned by the personal account, including a repository, gist, or project
37
37
* Interactions with a public repository owned by an organization in your enterprise
38
38
39
-
{% data variables.product.github %} does not display IP address in the audit log for `api.request` events triggered by GraphQL requests.
39
+
{% data variables.product.github %} does not display IP addresses in the audit log for `api.request` events that do not have repository context, such as requests triggered by GraphQL or requests to endpoints that reference only a user or organization.
40
40
41
41
## Enabling display of IP addresses in the audit log
Copy file name to clipboardExpand all lines: content/organizations/keeping-your-organization-secure/managing-security-settings-for-your-organization/displaying-ip-addresses-in-the-audit-log-for-your-organization.md
+2-2Lines changed: 2 additions & 2 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -36,9 +36,9 @@ After you enable the feature, you can access the audit log to view events that i
36
36
37
37
{% data variables.product.github %} displays an IP address for each event in the organization audit log that meets these criteria.
38
38
39
-
* The actor is an organization member or owner
39
+
* The actor is an organization member or owner.
40
40
* The target is either an organization-owned repository that is private or internal, or an organization resource that is not a repository, such as a project.
41
-
* For `api.request` events, the request was not triggered by GraphQL.
41
+
* For `api.request` events, the request must have repository context; requests triggered by GraphQL or to endpoints that reference only a user or organization do not meet this condition.
42
42
43
43
## Enabling display of IP addresses in the audit log
0 commit comments