From 3eb4e1cfad30f6674b3fbae8b47521709c5ef728 Mon Sep 17 00:00:00 2001 From: Lovina Saldanha <69782111+Lovina-Saldanha@users.noreply.github.com> Date: Thu, 15 Oct 2020 14:47:27 +0530 Subject: [PATCH] Update Onboard-Windows-10-multi-session-device.md minor edits --- .../Onboard-Windows-10-multi-session-device.md | 11 +++++++---- 1 file changed, 7 insertions(+), 4 deletions(-) diff --git a/windows/security/threat-protection/microsoft-defender-antivirus/Onboard-Windows-10-multi-session-device.md b/windows/security/threat-protection/microsoft-defender-antivirus/Onboard-Windows-10-multi-session-device.md index d458346a5c..067297e90d 100644 --- a/windows/security/threat-protection/microsoft-defender-antivirus/Onboard-Windows-10-multi-session-device.md +++ b/windows/security/threat-protection/microsoft-defender-antivirus/Onboard-Windows-10-multi-session-device.md @@ -77,10 +77,13 @@ This scenario uses a centrally located script and runs it using a domain-based g 1. Go to the **Actions** tab and click **New**. Ensure that **Start a program** is selected in the Action field. Enter the following: - > Action = "Start a program"
- > Program/Script = C:\WINDOWS\system32\WindowsPowerShell\v1.0\powershell.exe
- > Add Arguments (optional) = -ExecutionPolicy Bypass -command "& \\Path\To\Onboard-NonPersistentMachine.ps1"
- > Click **OK** and close any open GPMC windows.
+Action = "Start a program" + +Program/Script = C:\WINDOWS\system32\WindowsPowerShell\v1.0\powershell.exe + +Add Arguments (optional) = -ExecutionPolicy Bypass -command "& \\Path\To\Onboard-NonPersistentMachine.ps1" + +Click **OK** and close any open GPMC windows. #### *Scenario 3: Onboarding using management tools*