Best practices for user security→
There are steps your users can take to help protect your enterprise.
Auditing users across your enterprise→
The audit log dashboard shows site administrators the actions performed by all users and organizations across your enterprise within the past 90 days, including details such as who performed the action, what the action was, and when the action was performed.
Managing dormant users→
A user account is considered to be dormant if it has not been active for at least a month.
Placing a legal hold on a user or organization→
You can place a legal hold on a user or organization to ensure that repositories they own cannot be permanently removed from your enterprise.
Auditing SSH keys→
Site administrators can initiate an instance-wide audit of SSH keys.
Customizing user messages for your enterprise→
You can create custom messages that users will see on your enterprise.
Managing global webhooks→
Site administrators can view, add, edit, and delete global webhooks to track events for the enterprise.