main reading charts and graphs on a tablet device
577 gradient

Title

Security Vulnerability Monitoring

Detect, mitigate, and report on security vulnerabilities found in systems and software.

Overview

Reduce the vulnerability of University systems and the network to hacking, denial of service, and other security risks from both inside and outside the University by using technical vulnerability scanning tools to detect and report on information security weaknesses of a computer system.

Vulnerability scanning is only allowed for systems for which you are specifically authorized (e.g., your unit if that is your responsibility). University Information Security is the only unit authorized to scan throughout the University of Minnesota network.

Getting Started

Intended Audience

Students
Instructors
Researchers
Staff & Departments

Cost

University-funded: No charge