[Now] Create concepts category for enterprise admin docs (#57847)
Co-authored-by: Isaac Brown <101839405+isaacmbrown@users.noreply.github.com>
This commit is contained in:
@@ -0,0 +1,65 @@
|
||||
---
|
||||
title: Audit log for an enterprise
|
||||
intro: 'To support debugging and internal and external compliance, {% data variables.product.github %} provides logs of audited{% ifversion ghes %} system,{% endif %} user, organization, and repository events.'
|
||||
shortTitle: Audit logs
|
||||
redirect_from:
|
||||
- /enterprise/admin/articles/audit-logging
|
||||
- /enterprise/admin/installation/audit-logging
|
||||
- /enterprise/admin/user-management/audit-logging
|
||||
- /admin/user-management/audit-logging
|
||||
- /admin/user-management/monitoring-activity-in-your-enterprise/audit-logging
|
||||
- /github/setting-up-and-managing-your-enterprise/managing-your-enterprise-users-with-your-identity-provider/auditing-activity-in-your-enterprise
|
||||
- /admin/authentication/managing-your-enterprise-users-with-your-identity-provider/auditing-activity-in-your-enterprise
|
||||
- /admin/identity-and-access-management/managing-iam-with-enterprise-managed-users/auditing-activity-in-your-enterprise
|
||||
- /admin/monitoring-activity-in-your-enterprise/reviewing-audit-logs-for-your-enterprise/about-the-audit-log-for-your-enterprise
|
||||
versions:
|
||||
ghes: '*'
|
||||
ghec: '*'
|
||||
contentType: concepts
|
||||
topics:
|
||||
- Auditing
|
||||
- Enterprise
|
||||
- Logging
|
||||
- Security
|
||||
---
|
||||
|
||||
## What are audit logs?
|
||||
|
||||
> [!NOTE]
|
||||
> {% data reusables.webhooks.webhooks-as-audit-log-alternative %}
|
||||
|
||||
{% data reusables.audit_log.retention-periods %}
|
||||
|
||||
{% data reusables.audit_log.audit-log-search-list-info-about-action %}
|
||||
|
||||
{% ifversion ghes %}Site administrators can review the audit log for an instance, which contains a wider range of events including system administrative events. To access the instance-level audit log:
|
||||
|
||||
{% data reusables.enterprise_site_admin_settings.access-settings %}
|
||||
1. In the left menu, click **Audit log**.{% endif %}
|
||||
|
||||
In addition to viewing your audit log, you can monitor activity in your enterprise in other ways, such as {% ifversion ghes %}viewing push logs and {% endif %}managing global webhooks. For more information, see [AUTOTITLE](/admin/monitoring-activity-in-your-enterprise/exploring-user-activity). You can also use the audit log, and other tools, to monitor the actions taken in response to security alerts. For more information, see [AUTOTITLE](/code-security/getting-started/auditing-security-alerts).
|
||||
|
||||
## How to use audit logs
|
||||
|
||||
As an enterprise owner{% ifversion ghes %} or site administrator{% endif %}, you can interact with the audit log data for your enterprise in several ways:
|
||||
* You can view the audit log for your enterprise. For more information, see [AUTOTITLE](/admin/monitoring-activity-in-your-enterprise/reviewing-audit-logs-for-your-enterprise/accessing-the-audit-log-for-your-enterprise).
|
||||
* You can search the audit log for specific events{% ifversion ghec %} and export audit log data{% endif %}. For more information, see [AUTOTITLE](/admin/monitoring-activity-in-your-enterprise/reviewing-audit-logs-for-your-enterprise/searching-the-audit-log-for-your-enterprise){% ifversion ghec %} and [AUTOTITLE](/admin/monitoring-activity-in-your-enterprise/reviewing-audit-logs-for-your-enterprise/exporting-audit-log-activity-for-your-enterprise){% endif %}.
|
||||
* You can identify all events that were performed by a specific access token. For more information, see [AUTOTITLE](/admin/monitoring-activity-in-your-enterprise/reviewing-audit-logs-for-your-enterprise/identifying-audit-log-events-performed-by-an-access-token).{% ifversion ghes %}
|
||||
* You can configure settings, such as the retention period for audit log events and whether Git events are included. For more information, see [AUTOTITLE](/admin/monitoring-activity-in-your-enterprise/reviewing-audit-logs-for-your-enterprise/configuring-the-audit-log-for-your-enterprise).{% endif %}
|
||||
{%- ifversion enterprise-audit-log-ip-addresses %}
|
||||
* You can display the IP address associated with events in the audit log. For more information, see [AUTOTITLE](/admin/monitoring-activity-in-your-enterprise/reviewing-audit-logs-for-your-enterprise/displaying-ip-addresses-in-the-audit-log-for-your-enterprise).
|
||||
{%- endif %}
|
||||
* You can stream audit and Git events data from {% data variables.product.prodname_dotcom %} to an external data management system. For more information, see [AUTOTITLE](/admin/monitoring-activity-in-your-enterprise/reviewing-audit-logs-for-your-enterprise/streaming-the-audit-log-for-your-enterprise).
|
||||
{%- ifversion ghes %}
|
||||
* You can forward audit and system logs, from your enterprise to an third-party hosted monitoring system. For more information, see [AUTOTITLE](/admin/monitoring-activity-in-your-enterprise/exploring-user-activity/log-forwarding).
|
||||
{%- endif %}
|
||||
* You can use the Audit log API to view actions performed in your enterprise. For more information, see [AUTOTITLE](/admin/monitoring-activity-in-your-enterprise/reviewing-audit-logs-for-your-enterprise/using-the-audit-log-api-for-your-enterprise).
|
||||
|
||||
For a full list of audit log actions that may appear in your enterprise audit log, see [AUTOTITLE](/admin/monitoring-activity-in-your-enterprise/reviewing-audit-logs-for-your-enterprise/audit-log-events-for-your-enterprise).
|
||||
|
||||
## Further reading
|
||||
|
||||
* [AUTOTITLE](/organizations/keeping-your-organization-secure/managing-security-settings-for-your-organization/reviewing-the-audit-log-for-your-organization)
|
||||
{%- ifversion ghes %}
|
||||
* [AUTOTITLE](/admin/enterprise-management/monitoring-your-appliance/about-system-logs)
|
||||
{%- endif %}
|
||||
@@ -0,0 +1,41 @@
|
||||
---
|
||||
title: Enterprise policies
|
||||
intro: 'With enterprise policies, you can manage the policies for all the organizations owned by your enterprise.'
|
||||
versions:
|
||||
ghec: '*'
|
||||
ghes: '*'
|
||||
shortTitle: Policies
|
||||
contentType: concepts
|
||||
topics:
|
||||
- Enterprise
|
||||
- Policies
|
||||
redirect_from:
|
||||
- /admin/policies/enforcing-policies-for-your-enterprise/about-enterprise-policies
|
||||
- /admin/enforcing-policies/enforcing-policies-for-your-enterprise/about-enterprise-policies
|
||||
---
|
||||
|
||||
## What are enterprise policies and why are they important?
|
||||
|
||||
To help you enforce business rules and regulatory compliance, policies provide a single point of management for all the organizations owned by an enterprise account.
|
||||
|
||||
{% data reusables.enterprise.about-policies %}
|
||||
|
||||
For example, with the "Base permissions" policy, you can allow organization owners to configure the "Base permissions" policy for their organization, or you can enforce a specific base permissions level, such as "Read", for all organizations within the enterprise.
|
||||
|
||||
## What are the steps to enforce enterprise policies?
|
||||
|
||||
By default, no enterprise policies are enforced. To identify policies that should be enforced to meet the unique requirements of your business, we recommend reviewing all the available policies in your enterprise account, starting with repository management policies.
|
||||
|
||||
While you're configuring enterprise policies, to help you understand the impact of changing each policy, you can view the current configurations for the organizations owned by your enterprise.
|
||||
|
||||
{% data reusables.enterprise.repo-policy-rules-alternative %}
|
||||
|
||||
For a full list of repository management policies, see [AUTOTITLE](/admin/policies/enforcing-policies-for-your-enterprise/enforcing-repository-management-policies-in-your-enterprise).
|
||||
|
||||
{% ifversion ghes %}
|
||||
Another way to enforce standards within your enterprise is to use pre-receive hooks, which are scripts that run on {% data variables.location.product_location %} to implement quality checks. For more information, see [AUTOTITLE](/admin/policies/enforcing-policy-with-pre-receive-hooks).
|
||||
{% endif %}
|
||||
|
||||
## Further reading
|
||||
|
||||
* [AUTOTITLE](/admin/overview/about-enterprise-accounts)
|
||||
14
content/admin/concepts/security-and-compliance/index.md
Normal file
14
content/admin/concepts/security-and-compliance/index.md
Normal file
@@ -0,0 +1,14 @@
|
||||
---
|
||||
title: Security and compliance
|
||||
shortTitle: Security and compliance
|
||||
intro: 'Learn the key concepts around enterprise governance and compliance, including policy enforcement and audit logging.'
|
||||
versions:
|
||||
ghes: '*'
|
||||
ghec: '*'
|
||||
topics:
|
||||
- Enterprise
|
||||
children:
|
||||
- /enterprise-policies
|
||||
- /audit-log-for-an-enterprise
|
||||
contentType: concepts
|
||||
---
|
||||
Reference in New Issue
Block a user