NOTE - this is not finished and will likely NOT work as is.
Just putting it out here for people to look at, hack on and give feedback...
Two new scripts - audit_subnet_windows and nmap_windows.
I have slightly changed the naming convention for scripts. If the script name ends in _windows then it is meant to be run from a Windows machine. I will apply the same logic to Linux and OSX scripts. If anyone has an idea for a naming convention for scripts, please do post.
"audit subnet windows" will take a subnet and mask on the command line (read the documentation in the script) and attempt to ping (or use nmap) to determine if there is a device at a given address within the subnet. If there is, it will start audit_nmap (if nmap is installed) or audit_windows (if nmap not installed). There is an option to explicitly NOT use nmap, even if it is installed.
"nmap windows" will attempt to determine the type of device (a Windows machine, or not). If it thinks it is a Windows machine, it will start "audit windows", if not it will test to see if SNMP is installed, then stop (as I said - not finished). This does not (yet) submit details on a non-Windows machine to the OAv2 server.
Note that you will need to rename the scripts to *.vbs from *.txt.
Have a play and please leave feedback below
UPDATE - nmap_windows updated.