🌐
GitHub
docs.github.com › code-security › secret-scanning › about-secret-scanning
About secret scanning - GitHub Docs
Public repositories: Secret scanning runs automatically for free. Organization-owned private and internal repositories: Available with GitHub Secret Protection enabled on GitHub Team or GitHub Enterprise Cloud.
Home
Get started, troubleshoot, and make the most of GitHub. Documentation for new users, developers, administrators, and all of GitHub's products.
Security and code quality
Build security and code quality into your GitHub workflow with integrated tooling.
GitHub Code Quality
Use GitHub Code Quality to flag code quality issues in pull requests and repository scans, apply Copilot-powered autofixes, and enforce standards with rulesets.
GitHub security features
Push protection for users automatically ... has secret scanning enabled. Push protection for users is on by default, but you can disable the feature at any time through your personal account settings. For more information, see Managing push protection for users. For accounts on GitHub Team and GitHub Enterprise Cloud, you ...
🌐
GitHub
docs.github.com › en › code-security › how-tos › secure-your-secrets › detect-secret-leaks › enabling-secret-scanning-for-your-repository
Enabling secret scanning for your repository - GitHub Docs
Public repositories: Secret scanning runs automatically for free. Organization-owned private and internal repositories: Available with GitHub Secret Protection enabled on GitHub Team or GitHub Enterprise Cloud.
🌐
GitHub
docs.github.com › en › enterprise-cloud@latest › code-security › secret-scanning › introduction › about-secret-scanning
About secret scanning - GitHub Enterprise Cloud Docs
Regardless of the enablement status of Advanced Security features, organizations on GitHub Team and GitHub Enterprise can run a free report to scan the code in the organization for leaked secrets.
🌐
GitHub
docs.github.com › en › enterprise-server@3.10 › code-security › secret-scanning › enabling-secret-scanning-features
Enabling secret scanning features - GitHub Enterprise Server 3.10 Docs
Learn how to enable secret scanning to detect secrets that are already visible in a repository, as well as push protection to proactively secure you against leaking additional secrets by blocking pushes containing secrets.
🌐
GitHub
docs.github.com › en › code-security › secret-scanning › enabling-secret-scanning-features
How-tos for detecting secret leaks - GitHub Docs
You can enable generic secret detection for your repository or organization. Alerts for generic secrets, such as passwords, are displayed in a separate list on the secret scanning alerts page.
🌐
GitHub
docs.github.com › en › enterprise-server@3.8 › code-security › secret-scanning › about-secret-scanning
About secret scanning - GitHub Enterprise Server 3.8 Docs
For more information, see "Defining custom patterns for secret scanning." GitHub stores detected secrets using symmetric encryption, both in transit and at rest. To rotate the encryption keys used for storing the detected secrets, you can contact us by visiting GitHub Enterprise Support. When you enable secret scanning for a repository or push commits to a repository with secret scanning enabled, GitHub scans the contents for secrets that match patterns defined by service providers and any custom patterns defined in your enterprise, organization, or repository.
🌐
GitHub
docs.github.com › en › enterprise-server@3.11 › code-security › secret-scanning › enabling-secret-scanning-features › enabling-secret-scanning-for-your-repository
Enabling secret scanning for your repository - GitHub Enterprise Server 3.11 Docs
When you enable Advanced Security, secret scanning may automatically be enabled for the repository due to the organization's settings. If "Secret scanning" is shown with an Enable button, you still need to enable secret scanning by clicking Enable.
🌐
GitHub
docs.github.com › en › github-ae@latest › code-security › secret-scanning › configuring-secret-scanning-for-your-repositories
Enabling secret scanning features - GitHub Enterprise Cloud Docs
Learn how to enable secret scanning to detect secrets that are already visible in a repository, as well as push protection to proactively secure you against leaking additional secrets by blocking pushes containing secrets. Secret scanning is available for the following repository types: ... Organization-owned repositories on GitHub Team or GitHub Enterprise Cloud with GitHub Secret Protection enabled
Find elsewhere
🌐
GitHub
docs.github.com › en › enterprise-cloud@latest › code-security › how-tos › secure-your-secrets › detect-secret-leaks › enabling-secret-scanning-for-non-provider-patterns
Enabling secret scanning for non-provider patterns - GitHub Enterprise Cloud Docs
If you cannot see the "Settings" tab, select the dropdown menu, then click Settings. In the "Security" section of the sidebar, click Advanced Security. Under "Secret Protection", to the right of "Non-provider patterns", click Enable.
🌐
GitHub
github.com › orgs › community › discussions › 149172
Secret Scanning Basics · community · Discussion #149172
If you have an older repository, you can turn on secret scanning by clicking on the "Enable" button in the secret scanning section of the page. When it comes to enterprise and organization permissions there are settings to automatically turn ...
🌐
GitHub
docs.github.com › en › enterprise-server@3.11 › code-security › secret-scanning › enabling-secret-scanning-features
Enabling secret scanning features - GitHub Enterprise Server 3.11 Docs
Learn how to enable secret scanning to detect secrets that are already visible in a repository, as well as push protection to proactively secure you against leaking additional secrets by blocking pushes containing secrets.
🌐
GitHub
docs.github.com › en › enterprise-server@3.8 › code-security › secret-scanning › configuring-secret-scanning-for-your-repositories
Configuring secret scanning for your repositories - GitHub Enterprise Server 3.8 Docs
For more information, see "Enforcing policies for code security and analysis for your enterprise." You can enable secret scanning for any repository that is owned by an organization. Once enabled, secret scanning scans for any secrets in your entire Git history on all branches present in your GitHub repository.
🌐
GitHub
docs.github.com › en › enterprise-server@3.12 › code-security › secret-scanning › enabling-secret-scanning-features
Enabling secret scanning features - GitHub Enterprise Server 3.12 Docs
Learn how to enable secret scanning to detect secrets that are already visible in a repository, as well as push protection to proactively secure you against leaking additional secrets by blocking pushes containing secrets.
🌐
GitHub
docs.github.com › en › enterprise-cloud@latest › code-security › secret-scanning › copilot-secret-scanning › enabling-ai-powered-generic-secret-detection
Enabling Copilot secret scanning's generic secret detection - GitHub Enterprise Cloud Docs
When creating the custom security configuration, ensure that "Secret Protection" is set to Enabled, and that the dropdown menu for "Scan for generic secrets" is also set to Enabled.
🌐
GitHub
docs.github.com › en › enterprise-server@3.14 › code-security › secret-scanning › enabling-secret-scanning-features
Enabling secret scanning features - GitHub Enterprise Server 3.14 Docs
Learn how to enable secret scanning to detect secrets that are already visible in a repository, as well as push protection to proactively secure you against leaking additional secrets by blocking pushes containing secrets.
🌐
GitHub
docs.github.com › en › get-started › learning-about-github › about-github-advanced-security
About GitHub Advanced Security - GitHub Docs
To run the feature on your private or internal repositories, you must purchase the relevant GitHub Advanced Security product. You must be on a GitHub Team or GitHub Enterprise plan ...
🌐
Microsoft Learn
learn.microsoft.com › en-us › azure › devops › repos › security › github-advanced-security-secret-scanning
Set up secret scanning for GitHub Advanced Security - Azure Repos | Microsoft Learn
February 25, 2026 - To defend against this threat, GitHub Advanced Security for Azure DevOps scans for credentials and other sensitive content in your source code. Push protection also prevents any credentials from being leaked in the first place. You need either GitHub Advanced Security for Azure DevOps or, if you're using the standalone experience, GitHub Secret Protection for Azure DevOps enabled.
🌐
GitHub
docs.github.com › en › enterprise-server@3.1 › code-security › secret-scanning › about-secret-scanning
About secret scanning - GitHub Enterprise Server 3.1 Docs
Secret scanning is available for ... more information, see "GitHub's products." Note: Your site administrator must enable secret scanning for your GitHub Enterprise Server ......
🌐
GitHub
docs.github.com › enterprise-cloud@latest › code-security › secret-scanning › defining-custom-patterns-for-secret-scanning
Defining custom patterns for secret scanning - GitHub Enterprise Cloud Docs
You can define your own custom patterns to extend the capabilities of secret scanning by generating one or more regular expressions. Repository owners, organization owners, security managers, enterprise administrators, and users with the admin role