With the setup wizard, you can prepare your scan in five easy steps. You are guided through the individual steps and receive the first report of your environment at the end.
The first step is to name your task. The task forms the frame for all the following settings. You also select a scan mode. The mode determines how intensively the scan should check your systems.
Targets are used to define your public IP addresses to be scanned for vulnerabilities.
Use credentials to perform an authenticated scan. In addition, you can schedule the task by creating a timetable. These steps are optional.
Your registered IP addresses must be validated once. The validation ensures that only verified hosts are scanned.
After all necessary settings have been completed, your scan will be started and you receive your first report. You will find all vulnerabilities found sorted by severity.