IT Security

Host Vulnerability Scanning

Providing automatic host auditing and vulnerability management across the campus

Host vulnerability scanning services provide automatic host auditing and vulnerability management across the campus.

As part of this service, departments can benefit from tools and services currently offered by the IT Security Group on campus.
The available services include: network discovery and mapping, an indicator of compromise scanning; vulnerability assessment, reporting and remediation tracking.
 
The Security Office offers the following Vulnerability Management Tools:
 
  • Qualys, which will scan hosts for vulnerabilities.  After scans are complete, the Security Office will provide a report with the consolidated findings and scan results as actionable data.
 
  • THOR/SPARK, an Advanced Persistent Threat (APT) scanner that helps detect cyber-attacks. THOR can be used as a full-featured compromise assessment, IoC scanner for Windows.  SPARK is a fast, lightweight IoC scanner available for Windows, Linux, and macOS.  
Available to 
 
Eligibility
Eligibility varies per service. Contact your ITCC for details.
 
Requirements 
Only available for campus departments via service request.
 
Getting Started:
 
 
 

 

Available to

Eligibility

Eligibility varies per service. Contact your ITCC for details.

Requirements

Only available for campus departments via service request.

Getting Started

Create a service request through the catalog in ServiceNow, or send an email to security@ucla.edu which will create a service request.