Network based scans test endpoints and servers for exploitable vulnerabilities. Examples are improperly configured administrator accounts, anonymous access to system files and directories, and obsolete versions of system software. A heavy scan tests for several hundred system vulnerabilities.
Note - Scans are available for University of Iowa systems & addresses only
Vulnerability Scan Request Form: https://workflow.uiowa.edu/form/scan
Please allow 3-5 working days for your scan to be scheduled and completed
Report a Security Incident
The University community and affiliates should report misuse(s)/ abuse(s) of campus IT resources, incidents involving system/ network compromises or the disclosure of sensitive and or personal information to the Information Security and Policy Office for further investigation.