From 3eb4e1cfad30f6674b3fbae8b47521709c5ef728 Mon Sep 17 00:00:00 2001
From: Lovina Saldanha <69782111+Lovina-Saldanha@users.noreply.github.com>
Date: Thu, 15 Oct 2020 14:47:27 +0530
Subject: [PATCH] Update Onboard-Windows-10-multi-session-device.md
minor edits
---
.../Onboard-Windows-10-multi-session-device.md | 11 +++++++----
1 file changed, 7 insertions(+), 4 deletions(-)
diff --git a/windows/security/threat-protection/microsoft-defender-antivirus/Onboard-Windows-10-multi-session-device.md b/windows/security/threat-protection/microsoft-defender-antivirus/Onboard-Windows-10-multi-session-device.md
index d458346a5c..067297e90d 100644
--- a/windows/security/threat-protection/microsoft-defender-antivirus/Onboard-Windows-10-multi-session-device.md
+++ b/windows/security/threat-protection/microsoft-defender-antivirus/Onboard-Windows-10-multi-session-device.md
@@ -77,10 +77,13 @@ This scenario uses a centrally located script and runs it using a domain-based g
1. Go to the **Actions** tab and click **New**. Ensure that **Start a program** is selected in the Action field.
Enter the following:
- > Action = "Start a program"
- > Program/Script = C:\WINDOWS\system32\WindowsPowerShell\v1.0\powershell.exe
- > Add Arguments (optional) = -ExecutionPolicy Bypass -command "& \\Path\To\Onboard-NonPersistentMachine.ps1"
- > Click **OK** and close any open GPMC windows.
+Action = "Start a program"
+
+Program/Script = C:\WINDOWS\system32\WindowsPowerShell\v1.0\powershell.exe
+
+Add Arguments (optional) = -ExecutionPolicy Bypass -command "& \\Path\To\Onboard-NonPersistentMachine.ps1"
+
+Click **OK** and close any open GPMC windows.
#### *Scenario 3: Onboarding using management tools*