A vulnerability scan is designed to identify and prioritize security vulnerabilities within your systems (based on their severity & potential business impact). It is recommended to be performed regularly, at least once a month, to ensure ongoing protection.
The scope of these scans includes finding both internal and external vulnerabilities, misconfigurations, and system weaknesses across individual assets and applications. This process is non-intrusive and automated, serving as the initial step in testing security by identifying and reporting on potential vulnerabilities.