MinerAlert
The Information Security Office can audit systems to determine weaknesses in the operating systems. Please provide the system's IP address, a contact name and number, and the name of the department requesting the audit.
• Computer scanning
• Detailed reporting
• Recommendations for enhanced security posture
Q. Does a scan guarantee my system will not be compromised?
A: A scan is not a guarantee that a system will not be compromised. With companies constantly issuing software and operating system patches, it is possible that systems may be vulnerable to new attacks
Q. Am I required to go through a system audit?
A: If you store or access any type of sensitive information, you will be required to schedule a system audit. Please refer to the Systems Administrators/Developers web page under Policies.