mirror of
https://github.com/MicrosoftDocs/windows-itpro-docs.git
synced 2025-06-18 11:53:37 +00:00
updated formatting
This commit is contained in:
@ -73,7 +73,7 @@ You can use PowerShell to detect PUA without blocking them. In fact, you can run
|
||||
###Use PUA audit mode in Intune
|
||||
|
||||
You can detect PUA without blocking them from your client. Gain insights into what can be blocked.
|
||||
|
||||
|
||||
1. Open PowerShell as Administrator: <br>
|
||||
|
||||
a. Click **Start**, type **powershell**, and press **Enter**.
|
||||
@ -85,8 +85,9 @@ You can use PowerShell to detect PUA without blocking them. In fact, you can run
|
||||
|
||||
```text
|
||||
et-mpPreference -puaprotection 1
|
||||
|
||||
```
|
||||
|
||||
|
||||
##View PUA events
|
||||
|
||||
PUA events are reported in the Windows Event Viewer and not in SCCM or Intune. To view PUA events:
|
||||
|
Reference in New Issue
Block a user