Mobile Logo in White


Software Security

Malicious programmers are constantly finding innovative ways to gain access to sensitive information through exploitation of weaknesses found in different systems. Security software can include protection features that attempt to nullify harmful attacks before they infect your computer or the network. These programs must be up-to-date to remain as effective as possible against exploitation. The following links will help inform and educate users about the best practices and controls implemented by UT Health San Antonio to lessen the risk to institutional information, equipment and the software running on it.

Anti-Malware Software

State, Federal and UT System requirements mandate that all computers connecting to the network install and maintain an approved anti-malware product.

Exemption Process

This is the process overview page for getting an exemption when a policy or requirement adversely impacts your business operations.

Least Privilege Enforcement

Limiting the effects of malware by restricting the available account permissions.

VPN (Secure Remote Access)

Information on setting up a secure network connection from off campus using a VPN. Includes information regarding remotely accessing your work computer.

Two-Factor Authentication Enrollment

Two-factor authentication (2FA), adds an additional layer of security to University computers.

Computer Registration Portal

A one-time portal login used to register computers, smartphones, and tablets.

Security Configuration Management

All hardware and software platforms must be configured in a secure manner to ensure the confidentiality, integrity and availability of University resources.

Password Management

This software automatically generates high-strength, random passwords and provides users with a secure digital vault that they can use to store and access their passwords from multiple devices.