The University of Texas at San Antonio

Office of Information Technology

Office of Information Security (OIS) Standards


OIS 34 – Standard for Threat Detection and Prevention



UTSA’s Office of Information Security (OIS) is charged with taking steps to preserve the security of the network and devices which are connected to the UTSA network, and is authorized to monitor network traffic and to probe systems, ports and devices for the purpose of identifying attacks and compromises within the network.



This standard supports HOP Policy 8-12 Information Resources Use and Security Policy.



This standard applies to all UTSA faculty, staff, and students.



If you have any questions about OIS 34 – Standard for Threat Detection and Prevention contact the following office:


The Office of Information Security



1. All devices connected to the UTSA network are subject to this monitoring, including those not owned and operated by the university.
2. OIS will monitor patterns and attributes of network traffic, but not the information content, except as needed to identify attacks and compromises or at the request of the UTSA legal staff.
3. When potential or confirmed attacks or compromises are detected or threats are identified, OIS may take steps to reduce or eliminate the associated risk. Actions which may be taken include, but are not limited to, blocking access from attack sources, restricting access to targeted UTSA systems, disabling account access, blocking access to vulnerable services and contacting those affected by these actions.



Effective Date: July 7, 2012

Last Revised: November 12, 2014

Reviewed: July 10, 2017