Use
"ping" settings to validate the existence of a target machine and
determine its operating system. If these settings are disabled,
Vulnerability Scanner scans all the IP addresses in the specified
IP address range – even those that are not used on any host machine
– thereby making the scanning attempt longer than it should be.