Vulnerability Scans
Protect UCSC from potential threats and attacks by finding security weaknesses in system hardware and installed software. Vulnerability Scans are facilitated via the Rapid7 Insight Agent installed on all managed systems, and is one of the UCSC Security Software and Device Management Tools.
Get started
Features
- Periodically scans for security weaknesses in hardware and software
- Meets security audit and compliance needs
- Scanning tools are up to date on current and emerging threats
- All computers receiving managed computer support through Standard Desktop Services automatically get the software installed
- Available for University endpoint devices, including servers, workstations, and laptops
- Supported on Windows, MacOS, and Linux devices
- Compliant with regulations such as PCI-DSS and HIPAA
- Enables departments to comply with the Information Security Investment Project
Eligibility
Support
- Support for vulnerability scanning is available Monday through Friday, from 8:00 a.m. to 5:00 p.m. Scans can be performed during off hours to avoid interfering with business operations
- Learn more about Secure Computing in the ITS Knowledge Base
Cost
Vulnerability scans are provided at no cost
Policy
IT Support
Search the knowledge base, browse IT guides, and open a support request.