Installing and using a vulnerability scanner