diff --git a/scripts/ms-sql-brute.nse b/scripts/ms-sql-brute.nse
index 1a04c76d7..629e67a1d 100644
--- a/scripts/ms-sql-brute.nse
+++ b/scripts/ms-sql-brute.nse
@@ -3,16 +3,13 @@
description = [[
Performs password guessing against Microsoft SQL Server (ms-sql). Works best in
-conjunction with the ms-sql-discover script.
+conjunction with the broadcast-ms-sql-discover script.
+
+SQL Server credentials required: No (will not benefit from mssql.username & mssql.password).
-SQL Server credentials required: No (will not benefit from
-mssql.username & mssql.password).
Run criteria:
-* Host script: Will run if the mssql.instance-all, mssql.instance-name
-or mssql.instance-port script arguments are used (see mssql.lua).
-* Port script: Will run against any services identified as SQL Servers, but only
-if the mssql.instance-all, mssql.instance-name
-and mssql.instance-port script arguments are NOT used.
+* Host script: Will run if the mssql.instance-all, mssql.instance-name or mssql.instance-port script arguments are used (see mssql.lua).
+* Port script: Will run against any services identified as SQL Servers, but only if the mssql.instance-all, mssql.instance-name and mssql.instance-port script arguments are NOT used.
WARNING: SQL Server 2005 and later versions include support for account lockout
policies (which are enforced on a per-user basis). If an account is locked out,
@@ -55,6 +52,10 @@ be disabled using the mssql.scanned-ports-only script argument.
-- even after a user has been locked out. This may result in many SQL
-- Server logins being locked out!
--
+-- @args ms-sql-brute.brute-windows-accounts Enable targeting Windows accounts
+-- as part of the brute force attack. This should be used in conjunction
+-- with the mssql library's mssql.domain argument.
+--
-- Created 01/17/2010 - v0.1 - created by Patrik Karlsson
-- Revised 02/01/2011 - v0.2 (Chris Woodbury)