Security Services

Information Assurance (IA) provides services to U-M units and the university at large.

Attack Recognition & Mitigation

IA offers network monitoring that can provide a department, unit, or research team with information about who is using the network, the applications being used, and when the network is used. This information is useful for detecting activity that indicates potential security and policy violations, and for resolving these issues.

Disaster Recovery/Business Continuity Planning

Disaster recovery planning is a service offered by IA to assist units in planning for reasonably foreseeable business interruptions and in taking appropriate, cost justifiable actions. To support units in their disaster planning efforts, IA offers a Disaster Recovery/Business Continuity Planning service as a Michigan IT Security Service. For units who wish to conduct disaster planning efforts on their own, IA provides a template and additional information about disaster recovery planning.

Education & Awareness

IA develops materials and activities to help educate the campus community on IT security topics. These materials include online how-to documentation for those who manage their own computer security and various events aimed at students, faculty and staff.

Incident Response

The Information Assurance incident response team provides the university with rapid identification, analysis, and response to a security incident.

  • MiWorkspace Units: Report IT security incidents to the ITS Service Center. The Service Center will involve IA as appropriate.
  • Non-MiWorkspace Units: Report all incidents to the unit security coordinator designated by your school, college, or department or to your department.

If the incident seems serious or urgent, you can also contact IA directly by sending email to For more information, see Report an IT Incident.

Managed Security Services

IA offers Managed Security Services to units needing assistance with performing information security coordination and administration activities. Through this program, one IA Information Security Coordinator will work with the unit to provide consistent, reliable information security services, which are listed on Managed Security Services.

Michigan IT Security Services

These services, available to U-M departments, can be ordered through the Michigan IT website. Details about the services are also available there.

Network Security

Campus networking and IA experts apply a multi-layered approach to network security. Elements of network security currently include:

  • Intrusion Prevention System (IPS). The Network IPS sits at the border between university networks and the internet, protecting networks from malicious traffic coming from outside the university.
  • Firewalls. Virtual, data center, and custom unit firewalls protect regulated data at the network border and specific unit resources in the data centers and other campus locations.
  • Malicious-Website Blocking (DNS Redirection). IA is piloting Domain Name Service (DNS) Redirection as an additional tool to protect you from malicious websites when you are on most U-M networks on the Ann Arbor campus.

Risk Analysis

Each university unit must undergo regular risk analyses of all its sensitive and mission-critical computing environments according to the Information Security Risk Management standard. For additional information about completing a RECON assessment please see: Completing a RECON Assessment.

More information about this service is available on the Michigan IT Services Portal website as part of the IT Security Essential service. U-M's risk assessment methodology and tool, RECON, is adapted from security controls developed by the National Institute of Standards and Technology (NIST) (U.S. Department of Commerce).

IT User Advocate

The IT User Advocate works with the University of Michigan community to ensure that U-M information technology policies and guidelines are followed, and to respond to computer abuse and misuse of U-M electronic resources.

Vulnerability Scanning

Vulnerability scanning is a process of remotely examining hosts on a network for known, detectable vulnerabilities. IA offers several Vulnerability Scanning Services, including a free monthly scanning service to units that would like regular scans of their networks without the cost of maintaining their own local scanning infrastructure. This service is an appropriate option for networks that are accessible from campus, or where the scanner can be allowed through a firewall. IA also provides quarterly vulnerability scans and vulnerability scanning tools for units.