• External scanning looks at your network and systems from the outside, simulating the perspective of a hacker trying to break in via the internet.
  • Internal scanning reviews the systems inside your network, checking for risks that could be exploited by employees, contractors, or anyone who has gained access to your internal environment.

Both approaches are important for a full view of your security posture.