in the attached document - a step by step guide on how to generate  a differential report in order to see persistent vulnerability