Network based scans test endpoints and servers for exploitable vulnerabilities. Examples are improperly configured administrator accounts, anonymous access to system files and directories, and obsolete versions of system software. A heavy scan tests for several hundred system vulnerabilities.

Note - Scans are available for University of Iowa systems & addresses only

Vulnerability Scan Request Form: https://workflow.uiowa.edu/form/scan
Please allow 3-5 working days for your scan to be scheduled and completed

 

Report a Security Incident

The University community and affiliates should report misuse(s)/ abuse(s) of campus IT resources, incidents involving system/ network compromises or the disclosure of sensitive and or personal information to the Information Security and Policy Office for further investigation.