"It is recommended that you get the latest nmap from
their download page. Next, launch nmap on the local network IP
range, in this example it is 192.168.96.0/22, but YMMV. The
interesting argument here is the --script which utilizes the NSE
(Nmap scripting engine) in order to assess whether or not the
current windows machine nmap is connected to is vulnerable. So
let's launch the scan:"