What should I do if my UISO security scan reports vulnerabilities?

After the University Information Security Office (UISO) security scan of your Indiana University computer is complete, you will receive a summary of the results via email. If the scan reports vulnerabilities for devices assigned to you, visit Vulnerability Scanners to evaluate the issues that need to be addressed. The UISO categorizes vulnerabilities as high, medium, and low risks, and urges you to correct high risks within one day, medium risks within one week, and low risks within one month.

If you don't understand the information in the message or the instructions to correct the vulnerabilities, or if you would like information about evaluating your system in detail, email scanner-admin@uiso.iu.edu.

This is document ajye in the Knowledge Base.
Last modified on 2015-08-18 00:00:00.

  • Fill out this form to submit your issue to the UITS Support Center.
  • Please note that you must be affiliated with Indiana University to receive support.
  • All fields are required.

Please provide your IU email address. If you currently have a problem receiving email at your IU account, enter an alternate email address.

  • Fill out this form to submit your comment to the IU Knowledge Base.
  • If you are affiliated with Indiana University and need help with a computing problem, please use the I need help with a computing problem section above, or contact your campus Support Center.

Please provide your IU email address. If you currently have a problem receiving email at your IU account, enter an alternate email address.