From 1ba191ec71afb0eb4ed13f7aa9f59b58625bb583 Mon Sep 17 00:00:00 2001 From: DulceMV Date: Mon, 15 Aug 2016 18:24:00 +1000 Subject: [PATCH] Fixed formatting errors --- .../keep-secure/enable-pua-windows-defender-for-windows-10.md | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/windows/keep-secure/enable-pua-windows-defender-for-windows-10.md b/windows/keep-secure/enable-pua-windows-defender-for-windows-10.md index 96b6232f20..b2d0ca16e4 100644 --- a/windows/keep-secure/enable-pua-windows-defender-for-windows-10.md +++ b/windows/keep-secure/enable-pua-windows-defender-for-windows-10.md @@ -72,7 +72,7 @@ You can use PowerShell to detect PUA without blocking them. In fact, you can run ###Use PUA audit mode in Intune - You can detect PUA without blocking them from your client. Gain insights into what can be blocked. + You can detect PUA without blocking them from your client so you can gain insights into what can be blocked. 1. Open PowerShell as Administrator: