diff --git a/windows/security/threat-protection/microsoft-defender-antivirus/Onboard-Windows-10-multi-session-device.md b/windows/security/threat-protection/microsoft-defender-antivirus/Onboard-Windows-10-multi-session-device.md
index d458346a5c..067297e90d 100644
--- a/windows/security/threat-protection/microsoft-defender-antivirus/Onboard-Windows-10-multi-session-device.md
+++ b/windows/security/threat-protection/microsoft-defender-antivirus/Onboard-Windows-10-multi-session-device.md
@@ -77,10 +77,13 @@ This scenario uses a centrally located script and runs it using a domain-based g
1. Go to the **Actions** tab and click **New**. Ensure that **Start a program** is selected in the Action field.
Enter the following:
- > Action = "Start a program"
- > Program/Script = C:\WINDOWS\system32\WindowsPowerShell\v1.0\powershell.exe
- > Add Arguments (optional) = -ExecutionPolicy Bypass -command "& \\Path\To\Onboard-NonPersistentMachine.ps1"
- > Click **OK** and close any open GPMC windows.
+Action = "Start a program"
+
+Program/Script = C:\WINDOWS\system32\WindowsPowerShell\v1.0\powershell.exe
+
+Add Arguments (optional) = -ExecutionPolicy Bypass -command "& \\Path\To\Onboard-NonPersistentMachine.ps1"
+
+Click **OK** and close any open GPMC windows.
#### *Scenario 3: Onboarding using management tools*