A Vulnerability Management program is a very important information security process that every organization should have implemented within their environment. Building a Vulnerability Management program is a critical piece of a quality security program. But in this case study, Stephen Miller focuses on authenticated scanning and the role it plays in a security program. Also he examines unauthenticated scans, which are limited in their ability to capture all vulnerability information and asset information on a given host. Many of the caveats that can found to be the result of using unauthenticated scans are explained in the case study.