Skip to main content


Computer Systems Auditing






The Information Security Office can audit systems to determine weaknesses in the operating systems. Please provide the system's IP address, a contact name and number, and the name of the department requesting the audit.

Basic Service

• Computer scanning
• Detailed reporting
• Recommendations for enhanced security posture

Frequently Asked Questions

Q. Does a scan guarantee my system will not be compromised?
A: A scan is not a guarantee that a system will not be compromised. With companies constantly issuing software and operating system patches, it is possible that systems may be vulnerable to new attacks

Q. Am I required to go through a system audit?
A: If you store or access any type of sensitive information, you will be required to schedule a system audit. Please refer to the Systems Administrators/Developers web page under Policies.


Phone: 915-747-6324

Information Security Office


UTEP Library Room 300  |  |  915-747-4357 (HELP)