Updated PUA-intune instructions

This commit is contained in:
DulceMV
2016-08-15 17:44:55 +10:00
committed by GitHub
parent eb999d270f
commit 64c69f0ae7

View File

@ -74,6 +74,20 @@ You can use PowerShell to detect PUA without blocking them. In fact, you can run
You can detect PUA without blocking them from your client. Gain insights into what can be blocked.
1. Open PowerShell as Administrator: <br>
a. Click **Start**, type **powershell**, and press **Enter**.
b. Click **Windows PowerShell** to open the interface.
> [!NOTE]
> You may need to open an administrator-level version of PowerShell. Right-click the item in the Start menu, click **Run as administrator** and click **Yes** at the permissions prompt.
2. Enter the PowerShell command to enable audit mode:
```text
et-mpPreference -puaprotection 1
##View PUA events
PUA events are reported in the Windows Event Viewer and not in SCCM or Intune. To view PUA events: