Skip to main content

This version of GitHub Enterprise Server will be discontinued on 2024-06-29. No patch releases will be made, even for critical security issues. For better performance, improved security, and new features, upgrade to the latest version of GitHub Enterprise Server. For help with the upgrade, contact GitHub Enterprise support.

Managing your code scanning configuration

You can manage your existing code scanning configuration with the help of metrics and logging outputs generated by your analysis.

Who can use this feature?

Code scanning is available for organization-owned repositories in GitHub Enterprise Server. This feature requires a license for GitHub Advanced Security. For more information, see "About GitHub Advanced Security."

About the tool status page for code scanning

The tool status page shows useful information about all of your code scanning tools. If code scanning is not working as you'd expect, the tool status page is a good starting point for debugging problems.

Editing your configuration of default setup

You can edit your existing configuration of default setup for code scanning to better meet your code security needs.

CodeQL query suites

You can choose from different built-in CodeQL query suites to use in your CodeQL code scanning setup.

Viewing code scanning logs

You can view the output generated during code scanning analysis in your GitHub Enterprise Server instance.

C and C++ queries for CodeQL analysis

Explore the queries that CodeQL uses to analyze code written in C or C++ when you select the default or the security-extended query suite.

C# queries for CodeQL analysis

Explore the queries that CodeQL uses to analyze code written in C# when you select the default or the security-extended query suite.

Go queries for CodeQL analysis

Explore the queries that CodeQL uses to analyze code written in Go (Golang) when you select the default or the security-extended query suite.

Java and Kotlin queries for CodeQL analysis

Explore the queries that CodeQL uses to analyze code written in Java or Kotlin when you select the default or the security-extended query suite.

JavaScript and TypeScript queries for CodeQL analysis

Explore the queries that CodeQL uses to analyze code written in JavaScript or TypeScript when you select the default or the security-extended query suite.

Python queries for CodeQL analysis

Explore the queries that CodeQL uses to analyze code written in Python when you select the default or the security-extended query suite.

Ruby queries for CodeQL analysis

Explore the queries that CodeQL uses to analyze code written in Ruby when you select the default or the security-extended query suite.

Swift queries for CodeQL analysis

Explore the queries that CodeQL uses to analyze code written in Swift when you select the default or the security-extended query suite.