Vulnerability Management

Middlebury's Information Security workgroup manages a vulnerability management program for the server infrastructure at Middlebury and Monterey. Additionally, desktop systems can be scanned for weaknesses and security concerns. This information is used to mitigate threats and to generate better configurations for our operating system environment. To augment these vulnerability scans and validate the information found in these checks, an automated auditing process is also conducted on an as needed basis.

Vulnerability Management Scan Request

If you would like to have a system scanned for vulnerabilities please complete the form below.

A vulnerability scan is what most people should request. An exploitation audit should only be completed with consultation with the Information Security Department.