MinerAlert

The Information Security Office can audit systems to determine weaknesses in the operating systems. Please provide the system's IP address, a contact name and number, and the name of the department requesting the audit.
• Computer scanning
• Detailed reporting
• Recommendations for enhanced security posture
Q. Does a scan guarantee my system will not be compromised? 
 A: A scan is not a guarantee that a system will not be compromised. With companies constantly issuing software and operating system patches, it is possible that systems may be vulnerable to new attacks
Q. Can I initiate a scan on my own device? 
 A: If you have Microsoft Defender downloaded on your device, you can safely run a simple scan on your device. By searching for “Microsoft Defender” on Mac or “Windows Security” on Windows; or seeing if the Microsoft Shield Icon has a checkmark which indicates that it’s running.
 If you don't find it on your device, you may contact Technology Support for assitance on getting the tool.
 If you don't find it on your device, you may contact Technology Support for assitance on getting the tool.
Q. Am I required to go through a system audit? 
 A: If you store or access any type of sensitive information (more information at Standard 9: Data Classification), you will be required to schedule a system audit. Please refer to our Policies page, and you can visit our technology security resources page on for information on the responsibilities of a system administrator.