4. Guideline for Using the Greenbone Security Manager¶
The following steps are fundamental in using the Greenbone Security Manager (GSM):
- Setting up the GSM → Chapter 5
- Upgrading the Greenbone operating system (GOS) → Chapter 6 and Chapter 7.3.3
- Performing a scan → Chapter 10
- Reading and using a report → Chapter 11.2.1
- Using notes to manage the results → Chapter 11.7
- Using overrides to manage false positives → Chapter 11.8
The following steps are more advanced: