From 1cc362993a127c361a42b9403157b6c5c5b1dc3c Mon Sep 17 00:00:00 2001 From: DulceMV Date: Mon, 15 Aug 2016 18:08:21 +1000 Subject: [PATCH] Formatting update --- .../enable-pua-windows-defender-for-windows-10.md | 5 ++--- 1 file changed, 2 insertions(+), 3 deletions(-) diff --git a/windows/keep-secure/enable-pua-windows-defender-for-windows-10.md b/windows/keep-secure/enable-pua-windows-defender-for-windows-10.md index 1909c44e6d..f446b1e25b 100644 --- a/windows/keep-secure/enable-pua-windows-defender-for-windows-10.md +++ b/windows/keep-secure/enable-pua-windows-defender-for-windows-10.md @@ -79,15 +79,14 @@ You can use PowerShell to detect PUA without blocking them. In fact, you can run     a. Click **Start**, type **powershell**, and press **Enter**.     b. Click **Windows PowerShell** to open the interface. + >[!NOTE] >You may need to open an administrator-level version of PowerShell. Right-click the item in the Start menu, click **Run as administrator** and click **Yes** at the permissions prompt. 2. Enter the PowerShell command: - ```text - et-mpPreference -puaprotection 2 + et-mpPreference -puaprotection 1 ``` - ##View PUA events PUA events are reported in the Windows Event Viewer and not in SCCM or Intune. To view PUA events: