A security analyst is preparing for a comprehensive vulnerability assessment of their organization's network. Which of the following should be performed FIRST to ensure that the assessment covers all networked devices?
Creating a schedule for regular scanning intervals
Conducting map scans
Deploying intrusion prevention systems (IPS)
Reviewing regulatory compliance requirements for asset data