External vulnerability scans are scheduled through the Protect Identity Vulnerability Assessment portal. When the scans are executed our scanning, infrastructure assesses the hosts identified in the scan criteria against our threat intelligence and signatures to identify any existing threats, vulnerabilities, or weaknesses. The results are then recorded in our solution and available via the Protect Identity Vulnerability Assessment portal so that you can review remediation steps and take any necessary actions. Upon remediating you can rescan the hosts to determine the status of your security posture.