Determining Which Host Operating Systems the System Can Detect
Procedure
Step 1 | Choose . |
Step 2 | Click Custom Operating Systems. |
Step 3 | Click Create Custom Fingerprint. |
Step 4 | View the lists of options in the drop-down lists in the OS Vulnerability Mappings section. These options are the operating systems that the system can fingerprint. |
What to do next
As needed, see Identifying Host Operating Systems.