Internal vulnerability scans require you to configure a Protect Identity scanning server within your network. The scanning server can either be a physical server or a virtual server and we support most virtual environments (VMware, VirtualBox, Microsoft Hyper-V, and Citrix XEN to name a few). Upon configuring the internal scanning server and confirming secure connectivity back to the Protect Identity SOC you can schedule the vulnerability scan through the Protect Identity Vulnerability Assessment portal. When the scans are executed our solution communicates directly with the scanning server within your network to assesses the hosts identified in the scan criteria against our threat intelligence and signatures to identify any existing threats, vulnerabilities, or weaknesses. The results are then recorded in our solution and available via the Protect Identity Vulnerability Assessment portal so that you can review remediation steps and take any necessary actions. Upon remediating you can rescan the hosts to determine the status of your security posture.