Skip to content

Commit 25b189d

Browse files
myarbCopilotmchammer01
authored
Add firewall rule to restricting access through corporate proxies (#57324)
Co-authored-by: Copilot <[email protected]> Co-authored-by: mc <[email protected]>
1 parent ec66762 commit 25b189d

File tree

1 file changed

+1
-0
lines changed

1 file changed

+1
-0
lines changed

content/admin/configuring-settings/hardening-security-for-your-enterprise/restricting-access-to-githubcom-using-a-corporate-proxy.md

Lines changed: 1 addition & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -76,6 +76,7 @@ Because this restriction only applies to requests that are sent via a proxy that
7676
| {% data variables.product.prodname_pages %} | `github.io` | This is generally user-generated content that cannot accept data. You may not want to restrict access. |
7777
| {% data variables.product.prodname_github_codespaces %} | `github.dev` | To restrict access, block the endpoint entirely. |
7878
| SSH access | Port 22 on {% data variables.product.prodname_dotcom_the_website %} | To restrict access, block the endpoint entirely. |
79+
| SSH over HTTPS | `ssh.github.com` | To restrict access, block the endpoint entirely. |
7980
| {% data variables.product.github %}-hosted runners | Various | To enforce specific routing, use Azure private networking. See [AUTOTITLE](/admin/configuring-settings/configuring-private-networking-for-hosted-compute-products/about-azure-private-networking-for-github-hosted-runners-in-your-enterprise). |
8081

8182
### Endpoints that don't require restriction

0 commit comments

Comments
 (0)