Determining Which Host Operating Systems the System Can Detect
Procedure
1 |
Choose . |
2 |
Click Custom Operating Systems. |
3 |
Click Create Custom Fingerprint. |
4 |
View the lists of options in the drop-down lists in the OS Vulnerability Mappings section. These options are the operating systems that the system can fingerprint. |
What to do next
As needed, see Identifying Host Operating Systems.