Configure vulnerability scanning software appropriately