This depends on the type of the scan. A quick routine scan emulates the attackers approach and will run without being noticed. An assessment scan is more through and there should be minimal downtime associated with the vulnerability scanning service. However, depending on the scope of the scan, some systems may also need to be taken offline temporarily. Our team will work with you to schedule deep scans during off-peak hours to minimize disruptions.