Vulnerability scanning identifies and creates an inventory of all the systems (including servers, desktops, laptops, virtual machines, containers, firewalls, switches, and printers) connected to a network. In this short video from Secure Cyber Defense, learn more about the advantages of having a known inventory to compare against a database of known vulnerabilities to see if any items are vulnerable to attacks.