You are here: Additional Information > Appendix C: XSL Transform to .audit Conversion > Identify the XML File to Use

Identify the XML File to Use

Determine the XML file you are going to use. Verify the location of the file, and that it is XML content. For example:

[tater@pearl ~]# ls top-applications.xml

-rw-r--r-- 1 tater gpigs 3857 2011-09-08 21:20 top-applications.xml

[tater@pearl ~]# head top-applications.xml

<?xml version="1.0"?>

<report reportname="top-applications" logtype="appstat">

<result name="Top applications" logtype="appstat" start="2013/01/29 00:00:00" start-epoch="1359446400" end="2013/01/29 23:59:59" end-epoch="1359532799" generated-at="2013/01/30 02:02:09" generated-at-epoch="1359540129" range="Tuesday, January 29, 2013">

<entry>

[..]

Copyright © 2017. Tenable Network Security, Inc. All rights reserved. Tenable Network Security, Nessus, SecurityCenter Continuous View, Passive Vulnerability Scanner, and Log Correlation Engine are registered trademarks of Tenable Network Security, Inc. All other products or services are trademarks of their respective owners.