System-created authentication records can be used for compliance scans and vulnerability scans.
Using PC, you can allow the system to create authentication records automatically using the scan data discovered for running instances. Then, in VM, you can choose to include those system created authentication records in vulnerability scans by selecting the option "Include system created authentication records in scans".