Action one: Initial Evaluation – Recognize the challenges and important value product. It should also include a security Evaluation vulnerability scanner. Review In the event the system is obtainable to everyone or limited to the licensed users and administrators alone.Use automated systems to actively scan the concentrate on networks and devices