From 4de7b9e9349c552f1dbf810631c631849c64bd7b Mon Sep 17 00:00:00 2001 From: amirsc3 <42802974+amirsc3@users.noreply.github.com> Date: Mon, 13 Apr 2020 18:41:36 +0300 Subject: [PATCH] Update configure-endpoints-vdi.md fixed typo... should be "accumulated" instead of "accumelated" --- .../microsoft-defender-atp/configure-endpoints-vdi.md | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/windows/security/threat-protection/microsoft-defender-atp/configure-endpoints-vdi.md b/windows/security/threat-protection/microsoft-defender-atp/configure-endpoints-vdi.md index 2310049183..a8ea3f78e2 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/configure-endpoints-vdi.md +++ b/windows/security/threat-protection/microsoft-defender-atp/configure-endpoints-vdi.md @@ -113,7 +113,7 @@ Refer to the article below for guidance on offboarding script:
https://docs.microsoft.com/en-us/windows/security/threat-protection/microsoft-defender-atp/configure-endpoints-script#offboard-machines-using-a-local-script
2. Ensure the sensor is off by running 'sc query sense'.
3. Service the image as needed.
-4. Run the below commands using PsExec.exe (which can be downloaded from https://download.sysinternals.com/files/PSTools.zip) to cleanup the cyber folder contents that the sensor may have accumelated since boot:
+4. Run the below commands using PsExec.exe (which can be downloaded from https://download.sysinternals.com/files/PSTools.zip) to cleanup the cyber folder contents that the sensor may have accumulated since boot:
*PsExec.exe -s cmd.exe*
*cd "C:\ProgramData\Microsoft\Windows Defender Advanced Threat Protection\Cyber"*
*del ``*.*`` /f /s /q*