How do you perform a vulnerability scan?
A vulnerability scan is performed by a piece of software that resides either on a system inside the network, or more often on a cloud service. Modern scanners are very powerful and have a lot of automation built-in, so for a basic scan you can just point it to the right place and set it to run automatically at regular intervals.