You are here: Compliance Check Types > Windows Content > Windows Command Line Examples (Nessus Compliance Checks)

Windows Content Command Line Examples

In this section, we will create a fake text document with a .tns extension and then run several simple to complex .audit files against it. As we go through each example, we will try each supported case of the Windows Content parameters.

We will also use the nasl command line binary. For each of the .audit files we are showing, you can easily drop these into your Nessus 6 or SecurityCenter scan policies, but for quick audits of one system, this way is very efficient. The command we will execute each time from the /opt/nessus/bin directory will be:

# ./nasl -t <IP> /opt/nessus/lib/nessus/plugins/compliance_check_windows_file_content.nbin

Where <IP> is the IP address of the system you will be auditing.

With Nessus, when running the .nbin (or any other plugin), it will prompt you for the credentials of the target system, plus the location of the .audit file.

This section includes the following information:

Copyright © 2017. Tenable Network Security, Inc. All rights reserved. Tenable Network Security, Nessus, SecurityCenter Continuous View, Passive Vulnerability Scanner, and Log Correlation Engine are registered trademarks of Tenable Network Security, Inc. All other products or services are trademarks of their respective owners.