Watch this video on YouTube
What actions should be taken before using a vulnerability scanner to scan a network?