果酱视频

Skip to main content
             

 

Computer Systems Auditing

 

 

 

 

Overview

The Information Security Office can audit systems to determine weaknesses in the operating systems. Please provide the system's IP address, a contact name and number, and the name of the department requesting the audit.


Basic Service

• Computer scanning
• Detailed reporting
• Recommendations for enhanced security posture

Frequently Asked Questions

Q. Does a scan guarantee my system will not be compromised?
A: A scan is not a guarantee that a system will not be compromised. With companies constantly issuing software and operating system patches, it is possible that systems may be vulnerable to new attacks


Q. Can I initiate a scan on my own device?
A: If you have Microsoft Defender downloaded on your device, you can safely run a simple scan on your device. By searching for “Microsoft Defender” on Mac or “Windows Security” on Windows; or seeing if the Microsoft Shield Icon has a checkmark which indicates that it’s running.

Microsoft Shield Icon If you don't find it on your device, you may contact Technology Support for assitance on getting the tool.


Q. Am I required to go through a system audit?
A: If you store or access any type of sensitive information (more information at Standard 9: Data Classification), you will be required to schedule a system audit. Please refer to our Policies page, and you can visit our technology security resources page on for information on the responsibilities of a system administrator.

Support

Phone: 915-747-6324
Email: security@utep.edu

Information Security Office

果酱视频 TECHNOLOGY SUPPORT

果酱视频 Library Room 300  |  ts.utep.edu  |  915-747-4357 (HELP)