Network Registration & Vulnerability Scans

To register your Personal Computer, Server or Printer on the UNH Network, go to  Network Registration.   See UNH Network Operations  for more information on secure networks, scanning and other services.

Registering your computer on the network

The first time you connect a computer to the UNH Network, you must register the computer using your UNH username and password. Registering confirms that the computer belongs to a member of the UNH community who is authorized to use UNH Information Technology resources. You provide Information Technology contact information needed to contact you in case your computer is found to be vulnerable or disrupting network traffic.

Registering a departmental server or printer

File servers must be registered with IT to receive a static IP address. By registering your server you provide information needed to contact you in case your server is found to be vulnerable or disrupting network traffic.  Most printers today contain both memory and data processing capability and are treated as file servers for the purpose of network registration.

Vulnerability Scanning

Computers, servers, printers and other devices that are registered and connected to the UNH network are checked periodically for basic vulnerabilities that could be attributed to lack of sufficient operating system updates, appropriate virus protection or other practices. UNH Network Operations conducts this service using standard industry tools and does not view the contents of the computer, server or printer. As an owner, administrator or user of a computer, you are urged to use the UNH Server Best Practices guidelines protect your computer.

  What happens if my computer or server is found to be vulnerable or causing problems?  

If your computer or server is found to be vulnerable or causing problems on the UNH network, IT may temporarily disconnect the device from the UNH Network until we can contact you and work with you to determine what is causing the problem.  If you are properly registered on the UNH Network, you will receive notifications by email when the scanning system finds critical vulnerabilities ("security holes")  and you must follow the provided recommendation(s) to address the problems and regain access to the UNH Network.  In addition to the email recommendations, you should also use product manuals, system 'help' features or information provided by the manufacturer's website for guidance on how to fix security holes.

It is important to note that a lack of communication from UNH IT to the owner of a computer or the administrator of a server does not mean that the device is well protected.      

Custom Fields
  • Author: UNH Information Security Services
  • Department: Information Security Services
Attached Files
There are no attachments for this article.
Related Articles RSS Feed
How to Determine if Your Windows Device is Automatically Updating
Viewed 721 times since Thu, Nov 2, 2017
Vendor Contracts: Privacy Considerations, Security Review, and NDA
Viewed 2597 times since Mon, May 4, 2015
UNH Information Security Services - Tax Season Resources
Viewed 410 times since Wed, Feb 21, 2018
Recommended tools for SFTP/FTP
Viewed 340 times since Mon, Sep 10, 2018
Things to Consider if Your UNH Account has been Compromised
Viewed 603 times since Wed, Aug 16, 2017
Microsoft Security Essentials and Windows Defender Usage
Viewed 7172 times since Wed, Aug 12, 2015
Antivirus Software for Mac
Viewed 8778 times since Wed, Aug 12, 2015
Using Facebook, Google or other Social Login Services
Viewed 1102 times since Fri, Aug 26, 2016
System Center 2012 Endpoint Protection for Mac Installation
Viewed 4949 times since Wed, Aug 12, 2015
Why Can’t I Forward Emails to Phishing.Report@unh.edu?
Viewed 492 times since Thu, Feb 22, 2018
MENU