A security process that identifies known vulnerabilities in network devices, often integrated via external tools.