Versions Compared

Key

  • This line was added.
  • This line was removed.
  • Formatting was changed.

...

  1. Check the “Vulnerability scan schedule” to see what’s on the list for the current month
  2. Copy all the links listed for that month


     

  3. In the code, comment out any automatic emails so they won’t get sent.

  4. Check the .htaccess file to make sure that the itsoscan security office can access the sites.
    Remove the #(hashtag) in the “CUWA2FARequire CIT-2FA-Exempt” line to allow them to scan with Duo disabled.



  5. Send an email to security-services@cornell.edu requesting a scan.

    Please run a security scan on our test sites https://testspi.aad.cornell.edu/ and https://testconnect.aad.cornell.edu/ at your earliest convenience. We have prepared for it by turning off notifications and disabling the automated emails.

  6. Check the reports that come back for any issues more than low-level risk

  7. When any issues are dealt with save the zipped scan reports on the S-drive and delete them from your computer

...