We use standardised scanning to reduce the risks associated with aggressive custom scans that are prone to crashing older network enabled equipment.
We take a consultative approach to work with the customer. Adversarial relationships are correct for legitimate threat actors, not pentester/customer interactions.
Rules of Engagement are clearly defined to minimise the risk of any unintended consequences or negative impacts.