Tutorial

This is a step-by-step process from the first login, to installing the scanner on the target server, to triaging the list of vulnerabilities for the first time.