Getting Started Guide This is a step-by-step guide to configuring your Phoenix Security account to start gathering and managing vulnerabilities.