Events
Mar 17, 9 PM - Mar 21, 10 AM
Join the meetup series to build scalable AI solutions based on real-world use cases with fellow developers and experts.
Register nowThis browser is no longer supported.
Upgrade to Microsoft Edge to take advantage of the latest features, security updates, and technical support.
Azure DevOps Services | Azure DevOps Server 2022 - Azure DevOps Server 2019
Visual Studio 2019 | Visual Studio 2022
Team Foundation Version Control administrators can add check-in policy requirements. These check-in policies require users to take actions when they conduct a check-in to source control. For example, a user can be required to associate a work item with a changeset. For more information about check-ins, see Develop code and manage pending changes.
Note
You can set Visual Studio check-in policies through Team Explorer as documented in this article, the tf.exe configure command, or through registry keys declared in the pkgdef of a Visual Studio extension. Policies only apply to a single installation of Visual Studio on your computer. If you have multiple installations of Visual Studio, you need to set the check-in policy on each installation.
From Visual Studio Team Explorer, select Settings, and then select Source Control under Team Project.
In the Source Control Settings dialog box, select the Check-in Policy tab, and then select Add.
In the Add Check-in Policy dialog box, select the policy types you want, and then select OK.
You can select from the following policies:
If you select Code Analysis, in the Code Analysis Policy Editor, select the checkboxes for the types of code analysis that you want, and then select OK.
Options are:
For more information about how to use code analysis tools, see Create Code Analysis Check-In Policies.
If you select Custom Path Policy, in the Custom Path Policy dialog box, select a child policy to operate on, and enter one or more values in Source Control Path Filter (RegEx) to specify allowed paths. Select Add for each value, and then select OK.
Apply a separate Custom Path Policy for each child policy that you want to use custom paths.
Note
If you apply this policy to an enabled child policy, you get a message that The selected policy is currently enabled. It should be disabled or it will end up running twice. You can remove or disable the original policy from the Check-in Policy screen.
If you select Forbidden Patterns Policy, in the Forbidden Patterns dialog box, list the pattern or patterns to forbid, and then select OK.
If you select Work Items Query Policy, in the Query Policy dialog box, navigate to and select a saved shared work item query, and then select OK.
When you're satisfied with the check-in policies settings, select OK. The new check-in policy displays with future check-ins.
Events
Mar 17, 9 PM - Mar 21, 10 AM
Join the meetup series to build scalable AI solutions based on real-world use cases with fellow developers and experts.
Register now