Skip to content

Commit 8af11f7

Browse files
subatoimchammer01
andauthored
Fix some dodgy versioning (#53526)
Co-authored-by: mc <42146119+mchammer01@users.noreply.github.com>
1 parent 9b3a06c commit 8af11f7

File tree

1 file changed

+0
-4
lines changed

1 file changed

+0
-4
lines changed

content/code-security/secret-scanning/using-advanced-secret-scanning-and-push-protection-features/custom-patterns/defining-custom-patterns-for-secret-scanning.md

Lines changed: 0 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -138,12 +138,8 @@ After your pattern is created, {% data variables.product.prodname_secret_scannin
138138
Before defining a custom pattern, you must ensure that you enable secret scanning for your enterprise account. For more information, see "[Enabling {% data variables.product.prodname_GH_advanced_security %} for your enterprise]({% ifversion fpt or ghec %}/enterprise-server@latest/{% endif %}/admin/advanced-security/enabling-github-advanced-security-for-your-enterprise)."
139139

140140
> [!NOTE]
141-
{% ifversion custom-pattern-dry-run-ga %}
142141
> * At the enterprise level, only the creator of a custom pattern can edit the pattern, and use it in a dry run.
143142
> * {% data reusables.secret-scanning.dry-runs-enterprise-permissions %}
144-
{% else %}
145-
> As there is no dry-run functionality, we recommend that you test your custom patterns in a repository before defining them for your entire enterprise. That way, you can avoid creating excess false-positive {% data variables.secret-scanning.alerts %}.
146-
{% endif %}
147143
148144
{% data reusables.enterprise-accounts.access-enterprise %}
149145
{% data reusables.enterprise-accounts.policies-tab %}{% ifversion security-feature-enablement-policies %}

0 commit comments

Comments
 (0)