The scanning tool used by the University actively probes systems for vulnerabilities, performs a multi-level scan using an extensive database of known security holes to identify common system vulnerabilities such as but not limited to those included in the CERT, CIAC and SANS advisories. To learn more and to request and account read the Server Scanning Procedure document.