jump to search jump to main content

Description

  • Sign-in Required
  • For Faculty, Staff, Student, IT Partners
**Whenever reporting a system compromise, defaced website, or some other incident, either to UF network support or another organization, please make sure to include the following information: Your name and contact info. Those you contact may need to ask you for more information. Any applicable time-stamped system log files. Detailed log files are essential for others to understand security problems and compromises.**

Screenshot

Helpful Links and Contacts

UF Computing Help Desk Vulnerability Management
 Back to top