Once you've analyzed the most recent launch, you'll be able to select when to roll it out broadly as part of your deployment. The former identifies the IP addresses of the pc systems that host the Web page. These IP addresses are listed as they are classified as the addresses of the systems which can be serving the exploit code out to customers