Scan-on-Demand for Devices

Vulnerability scanning of machines (Windows, MacOS, Linux), available both on request from the IT Security Office and as self-service using scan-on-demand tools.

 
Conduct Device Scan Risk Acceptance or Reclassification Vulnerability Scanning Onboarding General Support Service Administration

Service Offerings (5)

Conduct Device Scan
ITSO performs scan on customers behalf.
Risk Acceptance or Reclassification
Requests to accept or reclassify a vulnerability risk finding.
Vulnerability Scanning Onboarding
Request onboarding for server vulnerability scanning software. Prior to submitting this request, please log in at tenable.security.cornell.edu using your NetID.
Service Administration
This service entry is intended for CIT internal use, this is not a customer support form. Work classified and requested here represents service administration and management tasks that are required for delivering service but are activities that do not represent customer support work.