mirror of
https://github.com/MicrosoftDocs/windows-itpro-docs.git
synced 2025-06-18 11:53:37 +00:00
Formatting update
This commit is contained in:
@ -79,15 +79,14 @@ You can use PowerShell to detect PUA without blocking them. In fact, you can run
|
|||||||
a. Click **Start**, type **powershell**, and press **Enter**.
|
a. Click **Start**, type **powershell**, and press **Enter**.
|
||||||
|
|
||||||
b. Click **Windows PowerShell** to open the interface.
|
b. Click **Windows PowerShell** to open the interface.
|
||||||
|
|
||||||
>[!NOTE]
|
>[!NOTE]
|
||||||
>You may need to open an administrator-level version of PowerShell. Right-click the item in the Start menu, click **Run as administrator** and click **Yes** at the permissions prompt.
|
>You may need to open an administrator-level version of PowerShell. Right-click the item in the Start menu, click **Run as administrator** and click **Yes** at the permissions prompt.
|
||||||
2. Enter the PowerShell command:
|
2. Enter the PowerShell command:
|
||||||
|
|
||||||
```text
|
```text
|
||||||
et-mpPreference -puaprotection 2
|
et-mpPreference -puaprotection 1
|
||||||
```
|
```
|
||||||
|
|
||||||
|
|
||||||
##View PUA events
|
##View PUA events
|
||||||
|
|
||||||
PUA events are reported in the Windows Event Viewer and not in SCCM or Intune. To view PUA events:
|
PUA events are reported in the Windows Event Viewer and not in SCCM or Intune. To view PUA events:
|
||||||
|
Reference in New Issue
Block a user