mirror of
https://github.com/MicrosoftDocs/windows-itpro-docs.git
synced 2025-06-19 04:13:41 +00:00
updated formatting
This commit is contained in:
@ -73,7 +73,7 @@ You can use PowerShell to detect PUA without blocking them. In fact, you can run
|
|||||||
###Use PUA audit mode in Intune
|
###Use PUA audit mode in Intune
|
||||||
|
|
||||||
You can detect PUA without blocking them from your client. Gain insights into what can be blocked.
|
You can detect PUA without blocking them from your client. Gain insights into what can be blocked.
|
||||||
|
|
||||||
1. Open PowerShell as Administrator: <br>
|
1. Open PowerShell as Administrator: <br>
|
||||||
|
|
||||||
a. Click **Start**, type **powershell**, and press **Enter**.
|
a. Click **Start**, type **powershell**, and press **Enter**.
|
||||||
@ -85,8 +85,9 @@ You can use PowerShell to detect PUA without blocking them. In fact, you can run
|
|||||||
|
|
||||||
```text
|
```text
|
||||||
et-mpPreference -puaprotection 1
|
et-mpPreference -puaprotection 1
|
||||||
|
```
|
||||||
|
|
||||||
|
|
||||||
##View PUA events
|
##View PUA events
|
||||||
|
|
||||||
PUA events are reported in the Windows Event Viewer and not in SCCM or Intune. To view PUA events:
|
PUA events are reported in the Windows Event Viewer and not in SCCM or Intune. To view PUA events:
|
||||||
|
Reference in New Issue
Block a user