diff --git a/Nmap/README.md b/Nmap/README.md
index d461619..7f30a9a 100644
--- a/Nmap/README.md
+++ b/Nmap/README.md
@@ -1,12 +1,177 @@
-# Nmap Integration [](https://myservice.socfortress.co/explore?left=%7B%22datasource%22:%22WAZUH%22,%22queries%22:%5B%7B%22refId%22:%22A%22,%22query%22:%22_id:$get_alert_id.hits.hits.#._id%22,%22alias%22:%22%22,%22metrics%22:%5B%7B%22id%22:%221%22,%22type%22:%22logs%22,%22settings%22:%7B%22limit%22:%22500%22%7D%7D%5D,%22bucketAggs%22:%5B%5D,%22timeField%22:%22timestamp%22%7D%5D,%22range%22:%7B%22from%22:%22now-6h%22,%22to%22:%22now%22%7D%7D) [](https://hunt.socfortress.co) [](https://servicedesk.socfortress.co/help/2979687893)
---------------------------------------------------------------
-### Wazuh and NMAP integration to scan network subnets for open ports and services. In this integration we’ll use python-nmap (https://pypi.org/project/python-nmap/) to scan for open ports/services found in different subnets.
+[](https://www.socfortress.co/)
-### [Tutorial](https://github.com/juaromu/wazuh-nmap)
-----------------------------------------------------------------------------------
+# Nmap Integration [](https://www.socfortress.co/trial.html)
+> Wazuh and NMAP integration to scan network subnets for open ports and services. In this integration we’ll use python-nmap (https://pypi.org/project/python-nmap/) to scan for open ports/services found in different subnets.
-
-
-
+
+## Intro
+
+Wazuh and NMAP integration to scan network subnets for open ports and services.
+
+In this integration we’ll use python-nmap (https://pypi.org/project/python-nmap/) to scan for open ports/services found in different subnets.
+
+NMAP port scanners can be installed in different Wazuh agents placed in different network segments. The NMAP output is converted to JSON and appended to each agent’s active responses file.
+
+The scan can be scheduled via cron jobs to be executed once a week, month, etc. It can also be triggered using Wazu’s wodle command integration.
+
+
+## Requirements
+
+
+* NMAP installed in every agent to run the network scan.
+* python-nmap ([https://pypi.org/project/python-nmap/](https://pypi.org/project/python-nmap/)) installed.
+
+
+## Python-nmap
+
+Python-nmap is a python library which helps in using nmap port scanner. It allows to easilly manipulate nmap scan results and will be a perfect tool for systems administrators who want to automate scanning tasks and reports. It also supports nmap script outputs.
+
+
+## Python script run on agents
+
+
+```
+################################
+### Python Script to Run Network Scans and append results to Wazuh Active Responses Log
+### Requirements:
+### NMAP installed in Agent
+### python-nmap (https://pypi.org/project/python-nmap/)
+### Replace the Array "subnets" with the subnets to scan from this agent.
+### Do NOT include subnets with a network firewall in the path of the agent and the subnet.
+################################
+import nmap
+import time
+import json
+nm = nmap.PortScanner()
+#Add subnets to scan to the Subnets Array
+subnets=['192.168.252.0/24','192.168.1.0/24']
+for subnet in subnets:
+ json_output={}
+ nm.scan(subnet)
+ for host in nm.all_hosts():
+ json_output['nmap_host']=host
+ for proto in nm[host].all_protocols():
+ if proto not in ["tcp", "udp"]:
+ continue
+ json_output['nmap_protocol']=proto
+ lport = list(nm[host][proto].keys())
+ lport.sort()
+ for port in lport:
+ hostname = ""
+ json_output['nmap_port']=port
+ for h in nm[host]["hostnames"]:
+ hostname = h["name"]
+ json_output['nmap_hostname']=hostname
+ hostname_type = h["type"]
+ json_output['nmap_hostname_type']=hostname_type
+ json_output['nmap_port_name']=nm[host][proto][port]["name"]
+ json_output['nmap_port_state']=nm[host][proto][port]["state"]
+ json_output['nmap_port_product']=nm[host][proto][port]["product"]
+ json_output['nmap_port_extrainfo']=nm[host][proto][port]["extrainfo"]
+ json_output['nmap_port_reason']=nm[host][proto][port]["reason"]
+ json_output['nmap_port_version']=nm[host][proto][port]["version"]
+ json_output['nmap_port_conf']=nm[host][proto][port]["conf"]
+ json_output['nmap_port_cpe']=nm[host][proto][port]["cpe"]
+ with open("/var/ossec/logs/active-responses.log", "a") as active_response_log:
+ active_response_log.write(json.dumps(json_output))
+ active_response_log.write("\n")
+ time.sleep(2)
+```
+
+
+This script can be placed in any folder in the agent’s file system and its execution can be scheduled using cron.
+
+
+## Detection Rules (Wazuh Manager)
+
+
+```
+Let SOCFortress Professional Services Take Your Open Source SIEM to the Next Level
+
+
-
+
+
+