Occasional network vulnerability scans are conducted on devices attached to the Texas A&M network. Information from scans is used to notify owners of vulnerabilities, validate firewall access requests and gather network census data. Hosts must be scanned for network vulnerabilities to have ports opened.
To request a vulnerability scan for a host you own, go to the Scan
Read more information about vulnerability scans