Using the Network Vulnerability Scanner