ANALYZING A COMPUTER IN THIS PROCEDURE, YOU USE THE SECURITY CONFIGURA...

1. In the Security Templates console you created, click the Security Configuration

And Analysis heading in the scope pane.