Use
"ping" settings to validate the existence of a target machine and
determine its operating system. If these settings are disabled,
Vulnerability Scanner scans all the IP addresses in the specified
IP address range – even those that are not used on any host machine
– thereby making the scanning attempt longer than it should be.
The page you're looking for can't be found or is under maintenance
Try again later or go to the home page
Go to home page