updated formatting

This commit is contained in:
DulceMV
2016-08-15 17:53:18 +10:00
committed by GitHub
parent fe61324097
commit 4e2902dd70

View File

@ -73,7 +73,7 @@ You can use PowerShell to detect PUA without blocking them. In fact, you can run
###Use PUA audit mode in Intune ###Use PUA audit mode in Intune
You can detect PUA without blocking them from your client. Gain insights into what can be blocked. You can detect PUA without blocking them from your client. Gain insights into what can be blocked.
1. Open PowerShell as Administrator: <br> 1. Open PowerShell as Administrator: <br>
a. Click **Start**, type **powershell**, and press **Enter**. a. Click **Start**, type **powershell**, and press **Enter**.
@ -85,8 +85,9 @@ You can use PowerShell to detect PUA without blocking them. In fact, you can run
```text ```text
et-mpPreference -puaprotection 1 et-mpPreference -puaprotection 1
```
##View PUA events ##View PUA events
PUA events are reported in the Windows Event Viewer and not in SCCM or Intune. To view PUA events: PUA events are reported in the Windows Event Viewer and not in SCCM or Intune. To view PUA events: