mirror of
https://github.com/MicrosoftDocs/windows-itpro-docs.git
synced 2025-06-16 10:53:43 +00:00
pencil edits
fixed errant indents
This commit is contained in:
@ -40,16 +40,16 @@ In this section we share PowerShell samples to
|
|||||||
Set-ExecutionPolicy -ExecutionPolicy Bypass
|
Set-ExecutionPolicy -ExecutionPolicy Bypass
|
||||||
```
|
```
|
||||||
|
|
||||||
>For more details, refer to [PowerShell documentation](https://docs.microsoft.com/powershell/module/microsoft.powershell.security/set-executionpolicy)
|
For more details, refer to [PowerShell documentation](https://docs.microsoft.com/powershell/module/microsoft.powershell.security/set-executionpolicy)
|
||||||
|
|
||||||
## Get token
|
## Get token
|
||||||
|
|
||||||
- Run the below
|
Run the below:
|
||||||
|
|
||||||
> - $tenantId: ID of the tenant on behalf of which you want to run the query (i.e., the query will be run on the data of this tenant)
|
- $tenantId: ID of the tenant on behalf of which you want to run the query (i.e., the query will be run on the data of this tenant)
|
||||||
> - $appId: ID of your AAD app (the app must have 'Run advanced queries' permission to Microsoft Defender ATP)
|
- $appId: ID of your AAD app (the app must have 'Run advanced queries' permission to Microsoft Defender ATP)
|
||||||
> - $appSecret: Secret of your AAD app
|
- $appSecret: Secret of your AAD app
|
||||||
> - $suspiciousUrl: The URL
|
- $suspiciousUrl: The URL
|
||||||
|
|
||||||
|
|
||||||
```
|
```
|
||||||
|
Reference in New Issue
Block a user