Ãå±±ÂÖ¼é

Skip to main content
             

 

Computer Systems Auditing

 

 

 

 

Overview

The Information Security Office can audit systems to determine weaknesses in the operating systems. Please provide the system's IP address, a contact name and number, and the name of the department requesting the audit.


Basic Service

• Computer scanning
• Detailed reporting
• Recommendations for enhanced security posture

Frequently Asked Questions

Q. Does a scan guarantee my system will not be compromised?
A: A scan is not a guarantee that a system will not be compromised. With companies constantly issuing software and operating system patches, it is possible that systems may be vulnerable to new attacks


Q. Am I required to go through a system audit?
A: If you store or access any type of sensitive information, you will be required to schedule a system audit. Please refer to the Systems Administrators/Developers web page under Policies.

Support

Phone: 915-747-6324
Email: security@utep.edu

Information Security Office

UTEP TECHNOLOGY SUPPORT

UTEP Library Room 300  |  ts.utep.edu  |  915-747-4357 (HELP)