Ensure that your GitHub Enterprise users are safe. You can audit their security settings or enforce best practices across your instance.
Outside of instance-level security measures (SSL, subdomain isolation, configuring a firewall) that a site administrator can implement, there are steps your users can take to help protect your GitHub Enterprise instance.
You can require organization members and outside collaborators to enable two-factor authentication for their personal accounts in an organization, making it harder for malicious actors to access an organization's repositories and settings.
A user account is considered to be dormant if it has not been active for at least a month. You may choose to suspend dormant users to free up license seats.
The GitHub Enterprise audit log dashboard shows site administrators the actions performed by all users and organizations across your GitHub Enterprise instance within the past 90 days. It includes details such as who performed the action, what the action was, and when it was performed.
If a user leaves or moves to a different part of the company, you should remove or modify their ability to access your GitHub Enterprise instance.