Vulnerability Management

Whenever reporting a system compromise, defaced website, or some other incident, either to UF network support or another organization, please make sure to include the following information: Your name and contact info. Those you contact may need to ask you for more information. Any applicable time-stamped system log files. Detailed log files are essential for others to understand security problems and compromises.