Configuring Nessus for vulnerability scanning