From 41e3c053baf297d777776a82531c4563d7427130 Mon Sep 17 00:00:00 2001 From: DulceMV Date: Mon, 15 Aug 2016 18:18:43 +1000 Subject: [PATCH] Fixed formatting issue --- .../keep-secure/enable-pua-windows-defender-for-windows-10.md | 4 ++-- 1 file changed, 2 insertions(+), 2 deletions(-) diff --git a/windows/keep-secure/enable-pua-windows-defender-for-windows-10.md b/windows/keep-secure/enable-pua-windows-defender-for-windows-10.md index 3cdafbf7c3..96b6232f20 100644 --- a/windows/keep-secure/enable-pua-windows-defender-for-windows-10.md +++ b/windows/keep-secure/enable-pua-windows-defender-for-windows-10.md @@ -49,7 +49,7 @@ System Center 2012 R2 Endpoint Protection
System Center 2012 Configuration Ma You can use PowerShell to detect PUA without blocking them. In fact, you can run audit mode on individual machines. This feature is useful if your company is conducting an internal software security compliance check and you’d like to avoid any false positives. -1. Open PowerShell as Administrator
+1. Open PowerShell as Administrator:
a. Click **Start**, type **powershell**, and press **Enter**. @@ -74,7 +74,7 @@ You can use PowerShell to detect PUA without blocking them. In fact, you can run You can detect PUA without blocking them from your client. Gain insights into what can be blocked. -1. Open PowerShell as Administrator
+1. Open PowerShell as Administrator:
a. Click **Start**, type **powershell**, and press **Enter**.