Vulnerability Scans

Protect UCSC from potential threats and attacks by finding security weaknesses in system hardware and installed software. Vulnerability Scans are facilitated via the Rapid7 Insight Agent installed on all managed systems, and is one of the UCSC Security Software and Device Management Tools.

  • Periodically scans for security weaknesses in hardware and software
  • Meets security audit and compliance needs
  • Scanning tools are up to date on current and emerging threats
  • All computers receiving managed computer support through Standard Desktop Services automatically get the software installed
  • Available for University endpoint devices, including servers, workstations, and laptops
  • Supported on Windows, MacOS, and Linux devices
  • Compliant with regulations such as PCI-DSS and HIPAA
  • Enables departments to comply with the Information Security Investment Project
  • Support for vulnerability scanning is available Monday through Friday, from 8:00 a.m. to 5:00 p.m. Scans can be performed during off hours to avoid interfering with business operations
  • Learn more about Secure Computing in the ITS Knowledge Base

Vulnerability scans are provided at no cost

Search the knowledge base, browse IT guides, and open a support request.

Last modified: May 08, 2025