Host Vulnerability Scanning is available to all OU departments, using the OU wired network.
OU Information Technology offers vulnerability scanning for your servers, workstations, or static web sites. Results can be used to proactively locate, identify, and assess vulnerabilities allowing the department to prioritize and re-mediate them before they are targeted and exploited by attackers. This helps protect University data and can mitigate the risk of unauthorized access, theft, or malicious destruction.
These scans are performed over the network, so there is no need for any software to be installed. One-time and scheduled recurring scans are available. If you require more thorough scans, we can work with you on either getting credentials or installing client software.
This service is available at no cost to OU departments.
- Scan specific hosts, or department networks.
- Evaluates a system for vulnerabilities that may be exploited via a network.
- Credentials may be used to provide a more comprehensive scan.
- Notifies users of unnecessary services, missing patches, weak authentication and weak encryption.