Today I reviewed my network discovery logs and started manually inputting some pending servers. I discovered that there are multiple ways to key in a windows server, with vastly different vulnerability recommendations. I use these recommendations in my intrusion policies and would like to know if there is any guidance for manually setting hosts.