ARCHIVED: If your UISO security scan reports vulnerabilities

This content has been archived, and is no longer maintained by Indiana University. Resources linked from this page may no longer be available or reliable.

After the University Information Security Office (UISO) security scan of your Indiana University computer is complete, you will receive a summary of the results via email. If the scan reports vulnerabilities for devices assigned to you, visit Vulnerability Scanners to evaluate the issues that need to be addressed. The UISO categorizes vulnerabilities as high, medium, and low risks, and urges you to correct high risks within one day, medium risks within one week, and low risks within one month.

If you don't understand the information in the message or the instructions to correct the vulnerabilities, or if you would like information about evaluating your system in detail, email

This is document ajye in the Knowledge Base.
Last modified on 2018-06-21 15:23:23.

Contact us

For help or to comment, email the UITS Support Center.