Chapter 7. Scanning the system for configuration compliance and vulnerabilities