Stay Ahead of Vulnerabilities With Dynamic Inventory of Network Device Configurations