How-to

Qualys: Identify If Your System is a Candidate for Scanning

Follow the University Technical Vulnerability Management Standard. Critical systems include: 

  • Security Level High or Medium systems or network devices per the Data Security Classification Policy,
  • Single-user systems in scope for compliance with HIPAA or PCI DSS.

Sign In

Intended Audience

Students
Instructors
Researchers
Staff & Departments
Health Sciences Affiliates
IT Staff and Partners