MinerAlert
The Information Security Office can audit systems to determine weaknesses in the operating systems. Please provide the system's IP address, a contact name and number, and the name of the department requesting the audit.
• Computer scanning
• Detailed reporting
• Recommendations for enhanced security posture
Q. Does a scan guarantee my system will not be compromised?
A: A scan is not a guarantee that a system will not be compromised. With companies constantly issuing software and operating system patches, it is possible that systems may be vulnerable to new attacks
Q. Can I initiate a scan on my own device?
A: If you have Microsoft Defender downloaded on your device, you can safely run a simple scan on your device. By searching for “Microsoft Defender” on Mac or “Windows Security” on Windows; or seeing if the Microsoft Shield Icon has a checkmark which indicates that it’s running.
If you don't find it on your device, you may contact Technology Support for assitance on getting the tool.
Q. Am I required to go through a system audit?
A: If you store or access any type of sensitive information (more information at Standard 9: Data Classification), you will be required to schedule a system audit. Please refer to our Policies page, and you can visit our technology security resources page on for information on the responsibilities of a system administrator.