Universal Access Toggle
Universal Access
Close Universal Access dialog
Universal Access Options
Skip to main content
Report a barrier
Turn link underline
On
Off
Accessibility portal
Apply
Visit
Give
Shop
Resources for
Future Students
Current Students
Parents and Families
Faculty and Staff
Alumni
Industry and Partners
Menu
IT Security Office
About
Menu item with children Submenu Toggle
Contact Us
Faculty & Staff
FAQ
IT Security Lab
Cyber Awareness
Menu item with children Submenu Toggle
Malware
Passwords
Phishing
Social Network Safety
Staying CyberSafe
Three Easy Steps
Wireless Network Safety
Incident Response
Menu item with children Submenu Toggle
Report an Incident
University Cyber Incident Response Guidelines
Dealing with Data Exposures
Dealing with Ransomware and Cryptolockers
Policies and Compliance
Menu item with children Submenu Toggle
Critical Security Controls
IT Risk Assessments
PCI-DSS Compliance
University Security Policies
Procedures
Menu item with children Submenu Toggle
Access Control Management
Account Management
Application Access Controls
Application Backups
Application Centralized Logging
Application Data Security Controls
Application Developer Training
Application Firewall
Application Inventory
Application Patching
Application Secure Software Development
Application Security Review
Application Software Security
Application Two Factor Authentication
Application Vulnerability Management
Audit Log Management
Continuous Vulnerability Management
Data Protection
Data Recovery
Email and Web Browser Protections
Endpoint Backups
Endpoint Centralized Logging
Endpoint Configuration Management
Endpoint Credentials and Access Control
Endpoint Data Security Controls
Endpoint Encryption
Endpoint Equipment Disposal
Endpoint Firewall
Endpoint Inventory
Endpoint Malware Protection
Endpoint Patching
Incident Response Management
Inventory and Control of Enterprise Assets
Inventory and Control of Software Assets
ITSO Approved Cryptographic Algorithms
Linux Systems Hardening
Malware Defenses
Network Infrastructure Management
Network Monitoring and Defense
Penetration Testing
Secure Configuration of Enterprise Assets and Software
Security Awareness and Skills Training
Server Backups
Server Centralized Logging
Server Credentials and Access Control
Server Data Security Controls
Server Equipment Disposal
Server Firewall
Server Intrusion Detection
Server Inventory
Server Malware Protection
Server Patching
Server Physical Protection
Server Security Review
Server sysadmin Training
Server Two Factor Authentication
Server Vulnerability Management
Service Provider Management
Quick Links
Menu item with children Submenu Toggle
4Help (Computing Assistance)
Calendars, Academic
Blacksburg Transit
Campus Map
Emergency Services
Corps of Cadets
Giving to Virginia Tech
Hokie SPA
Canvas
VT Google Apps Email
Exchange Email (Office 365)
University Status
Customize Quicklinks
Resources
Menu item with children Submenu Toggle
2 Factor Authentication
Encrypting Office Documents
Linux Systems Hardening
Printer Security Recommendations (PDF)
Protecting Sensitive Data
Request Security Trainings
SANS Monthly Security Awareness Newsletter
Securing Mobile Devices
Security Awareness Trainings
Surplussing Equipment
Using VeraCrypt
VT Password Rules
Windows 10 Privacy Settings
Services
Menu item with children Submenu Toggle
Application Reviews
Big Fix
Data Storage Finder
IT Risk Assessments
IT Security Reviews
Penetration Test
Restricted/Limited Access Network (RLAN)
Rights Management Services / Microsoft Information Protection
Security Awareness Training
Security Training
Training
Vulnerability Scanning
Software
Menu item with children Submenu Toggle
Blooming Password
cif
CoverVT
Find SSNs
Netscan
Spirion (Identity Finder)
Trainings
Menu item with children Submenu Toggle
Awareness Training
Apply
Visit
Give
Shop
Resources for
Future Students
Current Students
Parents and Families
Faculty and Staff
Alumni
Industry and Partners
Search
Search
Submit
IT Security Office
/
Tags
/
inventory
/
Explore
About
Cyber Awareness
Incident Response
Policies and Compliance
Procedures
Quick Links
Resources
Services
Software
Trainings
Tag: inventory
Endpoint Inventory
Server Inventory
Application Inventory
Inventory and Control of Enterprise Assets
Inventory and Control of Software Assets