Hallo, Entdecker! An dieser Seite wird aktiv gearbeitet, oder sie wird noch übersetzt. Die neuesten und genauesten Informationen findest Du in unserer englischsprachigen Dokumentation.

Reviewing your security log

You can review the security log for your user account to better understand actions you've performed and actions others have performed that involve you.

Inhalt dieses Artikels

Did this doc help you?

Help us make these docs great!

All GitHub docs are open source. See something that's wrong or unclear? Submit a pull request.

Make a contribution

Oder, learn how to contribute.

Accessing your security log

The security log lists all actions performed within the last 90 days.

  1. Klicke in der oberen rechten Ecke einer beliebigen Seite auf Dein Profilfoto und klicke dann auf Settings (Einstellungen).

    Symbol „Settings" (Einstellungen) auf der Benutzerleiste

  2. In the user settings sidebar, click Security log.

    Security log tab

Searching your security log

Das Protokoll enthält die folgenden Informationen zu jeder Aktion:

  • an welchem Repository eine Aktion durchgeführt wurde,
  • der Benutzer, der die Aktion durchgeführt hat
  • die Aktion, die durchgeführt wurde,
  • in welchem Land die Aktion durchgeführt wurde,
  • Datum und Uhrzeit der Aktion.

Beachte, dass Du nicht mit Text nach Einträgen suchen kannst. Du kannst jedoch Suchabfragen mit den verschiedensten Filtern erstellen. Viele Operatoren, die für die Abfrage des Log verwendet werden - wie z.B. -, > oder < - haben das gleiche Format wie die Suche über GitHub. Weitere Informationen findest Du unter „Suchen nach GitHub.“

Vorgangsbasierte Suche

Verwende den Qualifizierer operation (Vorgang) um Aktionen für spezifische Typen von Vorgängen zu beschränken. Ein Beispiel:

  • operation:access (Vorgangszugriffe) findet alle Ereignisse, bei denen auf eine Ressource zugegriffen wurde.
  • operation:authentication (Vorgangsauthentifizierung) findet alle Ereignisse, bei denen ein Authentifizierungsereignis durchgeführt wurde.
  • operation:create (Vorgangserstellung) findet alle Ereignisse, bei denen eine Ressource erstellt wurde.
  • operation:modify (Vorgangsveränderung) findet alle Ereignisse, bei denen eine vorhandene Ressource verändert wurde.
  • operation:remove (Vorgangsentfernung) findet alle Ereignisse, bei denen eine vorhandene Ressource entfernt wurde.
  • operation:restore (Vorgangswiederherstellung) findet alle Ereignisse, bei denen eine vorhandene Ressource wiederhergestellt wurde.
  • operation:transfer (Vorgangsübertragung) findet alle Ereignisse, bei denen eine vorhandene Ressource übertragen wurde.

Suche basierend auf Repository

Verwende den Qualifizierer repo (Repository) um Aktionen auf ein spezifisches Repository einzuschränken. Ein Beispiel:

  • repo:my-org/our-repo findet alle Ereignisse, die im Repository our-repo der Organisation my-org aufgetreten sind.
  • repo:my-org/our-repo repo:my-org/another-repo findet alle Ereignisse, die in den Repositorys our-repo und another-repo der Organisation my-org aufgetreten sind.
  • -repo:my-org/not-this-repo schließt alle Ereignisse aus, die im Repository not-this-repo der Organisation my-org aufgetreten sind.

Beachte, dass Du den Kontonamen im Qualifizierer repo einfügen musst; nur nach repo:our-repo zu suchen, wird nicht funktionieren.

Suche nach Benutzer

Der Qualifizierer actor (Akteur) kann Ereignisse einschränken basierend darauf, wer die Aktion durchgeführt hat. Ein Beispiel:

  • actor:octocat findet alle Ereignisse in Verbindung mit Aktionen, die von octocat ausgeführt wurden.
  • actor:octocat actor:hubot findet alle Ereignisse in Verbindung mit Aktionen, die von octocat oder hubot ausgeführt wurden.
  • -actor:hubot schließt alle Ereignisse in Verbindung mit Aktionen aus, die von hubot ausgeführt wurden.

Beachten Sie, dass Sie nur den in GitHub verwendeten Benutzernamen, nicht den wirklichen Namen eines Benutzers, verwenden können.

Search based on the action performed

Category NameDescription
account_recovery_tokenContains all activities related to adding a recovery token.
billingContains all activities related to your billing information.
marketplace_agreement_signatureContains all activities related to signing the GitHub Marketplace Developer Agreement.
marketplace_listingContains all activities related to listing apps in GitHub Marketplace.
oauth_accessContains all activities related to OAuth Apps you've connected with.
payment_methodContains all activities related to paying for your GitHub subscription.
profile_pictureContains all activities related to your profile picture.
projectContains all activities related to project boards.
public_keyContains all activities related to your public SSH keys.
repoContains all activities related to the repositories you own.
sponsorsContains all events related to GitHub Sponsors and sponsor buttons (see "About GitHub Sponsors" and "Displaying a sponsor button in your repository")
two_factor_authenticationContains all activities related to two-factor authentication.
userContains all activities related to your account.

A description of the events within these categories is listed below.

The account_recovery_token category

ActionDescription
confirmTriggered when you successfully store a new token with a recovery provider.
recoverTriggered when you successfully redeem an account recovery token.
recover_errorTriggered when a token is used but GitHub is not able to validate it.

The billing category

ActionDescription
change_billing_typeTriggered when you change how you pay for GitHub.
change_emailTriggered when you change your email address.

The marketplace_agreement_signature category

ActionDescription
createTriggered when you sign the GitHub Marketplace Developer Agreement.

The marketplace_listing category

ActionDescription
approveTriggered when your listing is approved for inclusion in GitHub Marketplace.
createTriggered when you create a listing for your app in GitHub Marketplace.
delistTriggered when your listing is removed from GitHub Marketplace.
redraftTriggered when your listing is sent back to draft state.
rejectTriggered when your listing is not accepted for inclusion in GitHub Marketplace.

The oauth_access category

ActionDescription
createTriggered when you grant access to an OAuth App.
destroyTriggered when you revoke an OAuth App's access to your account.

The payment_method category

ActionDescription
clearTriggered when a payment method on file is removed.
createTriggered when a new payment method is added, such as a new credit card or PayPal account.
updateTriggered when an existing payment method is updated.

The profile_picture category

ActionDescription
updateTriggered when you set or update your profile picture.

The project category

ActionDescription
createTriggered when a project board is created.
renameTriggered when a project board is renamed.
updateTriggered when a project board is updated.
deleteTriggered when a project board is deleted.
linkTriggered when a repository is linked to a project board.
unlinkTriggered when a repository is unlinked from a project board.
project.accessTriggered when a project board's visibility is changed.
update_user_permissionTriggered when an outside collaborator is added to or removed from a project board or has their permission level changed.

The public_key category

ActionDescription
createTriggered when you add a new public SSH key to your GitHub account.
deleteTriggered when you remove a public SSH key to your GitHub account.

The repo category

ActionDescription
accessTriggered when you a repository you own is switched from "private" to "public" (or vice versa).
add_memberTriggered when a GitHub user is invited to have collaboration access to a repository.
add_topicTriggered when a repository owner adds a topic to a repository.
archivedTriggered when a repository owner archives a repository.
createTriggered when a new repository is created.
destroyTriggered when a repository is deleted.
disableTriggered when a repository is disabled (e.g., for insufficient funds).
enableTriggered when a repository is re-enabled.
remove_memberTriggered when a GitHub user is removed from a repository as a collaborator.
remove_topicTriggered when a repository owner removes a topic from a repository.
renameTriggered when a repository is renamed.
transferTriggered when a repository is transferred.
transfer_startTriggered when a repository transfer is about to occur.
unarchivedTriggered when a repository owner unarchives a repository.

The sponsors category

ActionDescription
repo_funding_link_button_toggleTriggered when you enable or disable a sponsor button in your repository (see "Displaying a sponsor button in your repository")
repo_funding_links_file_actionTriggered when you change the FUNDING file in your repository (see "Displaying a sponsor button in your repository")
sponsor_sponsorship_cancelTriggered when you cancel a sponsorship (see "Downgrading a sponsorship")
sponsor_sponsorship_createTriggered when you sponsor a developer (see "Sponsoring an open source contributor")
sponsor_sponsorship_preference_changeTriggered when you change whether you receive email updates from a sponsored developer (see "Managing your sponsorship")
sponsor_sponsorship_tier_changeTriggered when you upgrade or downgrade your sponsorship (see "Upgrading a sponsorship" and "Downgrading a sponsorship")
sponsored_developer_approveTriggered when your GitHub Sponsors account is approved (see "Setting up GitHub Sponsors for your user account")
sponsored_developer_createTriggered when your GitHub Sponsors account is created (see "Setting up GitHub Sponsors for your user account")
sponsored_developer_profile_updateTriggered when you edit your sponsored developer profile (see "Editing your profile details for GitHub Sponsors")
sponsored_developer_request_approvalTriggered when you submit your application for GitHub Sponsors for approval (see "Setting up GitHub Sponsors for your user account")
sponsored_developer_tier_description_updateTriggered when you change the description for a sponsorship tier (see "Changing your sponsorship tiers")
sponsored_developer_update_newsletter_sendTriggered when you send an email update to your sponsors (see "Contacting your sponsors")
waitlist_invite_sponsored_developerTriggered when you are invited to join GitHub Sponsors from the waitlist (see "Setting up GitHub Sponsors for your user account")
waitlist_joinTriggered when you join the waitlist to become a sponsored developer (see "Setting up GitHub Sponsors for your user account")

The successor_invitation category

ActionDescription
acceptTriggered when you accept a succession invitation (see "Maintaining ownership continuity of your user account's repositories")
cancelTriggered when you cancel a succession invitation (see "Maintaining ownership continuity of your user account's repositories")
createTriggered when you create a succession invitation (see "Maintaining ownership continuity of your user account's repositories")
declineTriggered when you decline a succession invitation (see "Maintaining ownership continuity of your user account's repositories")
revokeTriggered when you revoke a succession invitation (see "Maintaining ownership continuity of your user account's repositories")

The two_factor_authentication category

ActionDescription
enabledTriggered when two-factor authentication is enabled.
disabledTriggered when two-factor authentication is disabled.

The user category

ActionDescription
add_emailTriggered when you add a new email address.
createTriggered when you create a new user account.
remove_emailTriggered when you remove an email address.
renameTriggered when you rename your account.
change_passwordTriggered when you change your password.
forgot_passwordTriggered when you ask for a password reset.
loginTriggered when you log in to GitHub.
failed_loginTriggered when you failed to log in successfully.
two_factor_requestedTriggered when GitHub asks you for your two-factor authentication code.
show_private_contributions_countTriggered when you publicize private contributions on your profile.
hide_private_contributions_countTriggered when you hide private contributions on your profile.
report_contentTriggered when you report an issue or pull request, or a comment on an issue, pull request, or commit.

The user_status category

ActionDescription
updateTriggered when you set or change the status on your profile. For more information, see "Setting a status."
destroyTriggered when you clear the status on your profile.

Exporting your security log

Du kannst das Protokoll als JSON-Daten oder als CSV-Datei (Comma-Separated Value) exportieren.

Schaltfläche „Export"

Um die Ergebnisse Deines Exports zu filtern, suche mit einem oder mehreren dieser unterstützten Qualifizierer, bevor Du das Dropdownmenü Export verwendest.

QualifiziererBeispielwert
actionteam.create
actoroctocat
Benutzercodertocat
orgocto-org
repoocto-org/documentation
erstellt am2019-06-01

Nachdem Du das Log als JSON oder CSV exportiert hast, siehst Du die folgenden Schlüssel und Werte in der resultierenden Datei.

SchlüsselBeispielwert
actionteam.create
actoroctocat
Benutzercodertocat
orgocto-org
repoocto-org/documentation
created_at1429548104000 (der Zeitstempel gibt die Zeit in Millisekunden seit Beginn der UNIX-Zeit an)
data.hook_id245
data.events["issues", "issue_comment", "pull_request", "pull_request_review_comment"]
data.events_were["push", "pull_request", "issues"]
data.target_loginoctocat
data.old_userhubot
data.teamocto-org/engineering

Did this doc help you?

Help us make these docs great!

All GitHub docs are open source. See something that's wrong or unclear? Submit a pull request.

Make a contribution

Oder, learn how to contribute.