diff --git a/windows/security/threat-protection/microsoft-defender-antivirus/Onboard-Windows-10-multi-session-device.md b/windows/security/threat-protection/microsoft-defender-antivirus/Onboard-Windows-10-multi-session-device.md index d458346a5c..067297e90d 100644 --- a/windows/security/threat-protection/microsoft-defender-antivirus/Onboard-Windows-10-multi-session-device.md +++ b/windows/security/threat-protection/microsoft-defender-antivirus/Onboard-Windows-10-multi-session-device.md @@ -77,10 +77,13 @@ This scenario uses a centrally located script and runs it using a domain-based g 1. Go to the **Actions** tab and click **New**. Ensure that **Start a program** is selected in the Action field. Enter the following: - > Action = "Start a program"
- > Program/Script = C:\WINDOWS\system32\WindowsPowerShell\v1.0\powershell.exe
- > Add Arguments (optional) = -ExecutionPolicy Bypass -command "& \\Path\To\Onboard-NonPersistentMachine.ps1"
- > Click **OK** and close any open GPMC windows.
+Action = "Start a program" + +Program/Script = C:\WINDOWS\system32\WindowsPowerShell\v1.0\powershell.exe + +Add Arguments (optional) = -ExecutionPolicy Bypass -command "& \\Path\To\Onboard-NonPersistentMachine.ps1" + +Click **OK** and close any open GPMC windows. #### *Scenario 3: Onboarding using management tools*