diff --git a/windows/keep-secure/event-4688.md b/windows/keep-secure/event-4688.md
index 9c62824cd3..3d78b5e78a 100644
--- a/windows/keep-secure/event-4688.md
+++ b/windows/keep-secure/event-4688.md
@@ -175,7 +175,7 @@ This event generates every time a new process starts.
- **Process Command Line** \[Version 1, 2\] \[Type = UnicodeString\]**:** contains the name of executable and arguments which were passed to it. You must enable “Administrative Templates\\System\\Audit Process Creation\\Include command line in process creation events” group policy to include command line in process creation events:
-
+
By default **Process Command Line** field is empty.
diff --git a/windows/keep-secure/event-4713.md b/windows/keep-secure/event-4713.md
index 46884472bc..e1c4e5451c 100644
--- a/windows/keep-secure/event-4713.md
+++ b/windows/keep-secure/event-4713.md
@@ -101,7 +101,7 @@ This event is generated only on domain controllers.
This event shows changes in “Kerberos policy”. Here is location of Kerberos policies in Group Policy management console:
-
+
## Security Monitoring Recommendations