Site administrators can promote any normal user account to a site administrator, as well as demote other site administrators to regular users.
Outside of instance-level security measures (SSL, subdomain isolation, configuring a firewall) that a site administrator can implement, there are steps your users can take to help protect your enterprise.
The audit log dashboard shows site administrators the actions performed by all users and organizations across your enterprise within the past 90 days, including details such as who performed the action, what the action was, and when the action was performed.
A user account is considered to be dormant if it has not been active for at least a month. You may choose to suspend dormant users to free up user licenses.
If a user leaves or moves to a different part of the company, you should remove or modify their ability to access your GitHub Enterprise Server instance.
You can place a legal hold on a user or organization to ensure that repositories they own cannot be permanently removed from your enterprise.
Site administrators can initiate an instance-wide audit of SSH keys.
You can create custom messages that users will see on your GitHub Enterprise Server instance.
You may need to rebuild contributions data to link existing commits to a user account.
Site administrators can view, add, edit, and delete global webhooks to track events for the enterprise.
All GitHub docs are open source. See something that's wrong or unclear? Submit a pull request.
Or, learn how to contribute.