Groups to be created that segment the environment for scanning: Windows Servers, Linux Servers and HP/UX Servers. Group creation is critical as is asset definition, location, location and criticality. Network ID scan should provide you the IP list and other OS info. Vulnerability Scanner needs to be set up by the network ID scan of all the IP addresses to be entered by device type, criticality, location , operating system level, OS type, OS level and IP address.”]
Source: https://www.csoonline.com/article/2136275/initial-setup-of-your-vulnerability-scanner-.html

