Skip to main content
Skip to main site menu
University Information Security Office
Search
Menu
Search this site
Close the search box
×
Search
Requests for UIS Services
Security Standards
Toggle sub-navigation
Close this sub-navigation
Security Standards for Georgetown Technology
Risk Classifications for Georgetown Assets and Data
Toggle sub-navigation
Minimum Security
Toggle sub-navigation
Security Considerations for Cloud Services
Toggle sub-navigation
Be Cyber Smart!
Close
Requests for UIS Services
Open sub-navigation
Close sub-navigation
Security Standards
Open sub-navigation
Close sub-navigation
Security Standards for Georgetown Technology
Open sub-navigation
Close sub-navigation
Risk Classifications for Georgetown Assets and Data
Open sub-navigation
Close sub-navigation
Minimum Security
Open sub-navigation
Close sub-navigation
Security Considerations for Cloud Services
Open sub-navigation
Close sub-navigation
Be Cyber Smart!
Open sub-navigation
Close sub-navigation
Home
▸
UIS.204.1T Critical Vulnerabilities Implementation Guide
UIS.204.1T Critical Vulnerabilities Implementation Guide
In support of UIS.204 Vulnerability Management Policy
please pardon our dust