There are many ways to keep a system protected from perpetrators and hackers. One way is to conduct a vulnerability scan of the system. The vulnerability scan will detect misconfigurations and weaknesses in your system that could be used to infiltrate your system or expose system data.
View more information on the vulnerability scanning process.
How to Request This Service
Send an email to email@example.com requesting a scan of the system. Please include your contact information so we can discuss the process with you.
Faculty and staff who are responsible for supporting a university system may request a scan.
Vulnerability scans can be run during normal business hours (8 a.m. to 5 p.m., Monday - Friday). Depending on the situation, a scan can be run during or after regular business hours.
Please contact the IT Security Office at firstname.lastname@example.org.