5. Guideline for Using the Greenbone Security Manager

The following steps are fundamental in using the Greenbone Security Manager (GSM):

The following steps are more advanced: