mirror of
https://github.com/MicrosoftDocs/windows-itpro-docs.git
synced 2025-05-14 22:37:22 +00:00
MarkDown code blocks & whitespace (ref. #9053)
Corrections to PR #9053 / commit9856688ff2
A misunderstanding in PR #9053 caused the addition of unneeded & unwanted blank lines within the PowerShell PUA code blocks for the 3 variations of `Set-MpPreference -PUAProtection` and the console output, as well as missing the opportunity to add editorial blank lines below the code blocks, for easier future editing. Ref. PR #9053 / commit9856688ff2
This commit is contained in:
parent
9856688ff2
commit
87d4839f8b
@ -134,19 +134,17 @@ For System Center 2012 Configuration Manager, see [How to Deploy Potentially Unw
|
|||||||
##### To enable PUA protection
|
##### To enable PUA protection
|
||||||
|
|
||||||
```PowerShell
|
```PowerShell
|
||||||
|
|
||||||
Set-MpPreference -PUAProtection Enabled
|
Set-MpPreference -PUAProtection Enabled
|
||||||
|
|
||||||
```
|
```
|
||||||
|
|
||||||
Setting the value for this cmdlet to `Enabled` turns the feature on if it has been disabled.
|
Setting the value for this cmdlet to `Enabled` turns the feature on if it has been disabled.
|
||||||
|
|
||||||
##### To set PUA protection to audit mode
|
##### To set PUA protection to audit mode
|
||||||
|
|
||||||
```PowerShell
|
```PowerShell
|
||||||
|
|
||||||
Set-MpPreference -PUAProtection AuditMode
|
Set-MpPreference -PUAProtection AuditMode
|
||||||
|
|
||||||
```
|
```
|
||||||
|
|
||||||
Setting `AuditMode` detects PUAs without blocking them.
|
Setting `AuditMode` detects PUAs without blocking them.
|
||||||
|
|
||||||
##### To disable PUA protection
|
##### To disable PUA protection
|
||||||
@ -154,10 +152,9 @@ Setting `AuditMode` detects PUAs without blocking them.
|
|||||||
We recommend keeping PUA protection turned on. However, you can turn it off by using the following cmdlet:
|
We recommend keeping PUA protection turned on. However, you can turn it off by using the following cmdlet:
|
||||||
|
|
||||||
```PowerShell
|
```PowerShell
|
||||||
|
|
||||||
Set-MpPreference -PUAProtection Disabled
|
Set-MpPreference -PUAProtection Disabled
|
||||||
|
|
||||||
```
|
```
|
||||||
|
|
||||||
Setting the value for this cmdlet to `Disabled` turns the feature off if it has been enabled.
|
Setting the value for this cmdlet to `Disabled` turns the feature off if it has been enabled.
|
||||||
|
|
||||||
See [Use PowerShell cmdlets to configure and run Microsoft Defender Antivirus](use-powershell-cmdlets-microsoft-defender-antivirus.md) and [Defender cmdlets](https://docs.microsoft.com/powershell/module/defender/index) for more information on how to use PowerShell with Microsoft Defender Antivirus.
|
See [Use PowerShell cmdlets to configure and run Microsoft Defender Antivirus](use-powershell-cmdlets-microsoft-defender-antivirus.md) and [Defender cmdlets](https://docs.microsoft.com/powershell/module/defender/index) for more information on how to use PowerShell with Microsoft Defender Antivirus.
|
||||||
@ -167,7 +164,6 @@ See [Use PowerShell cmdlets to configure and run Microsoft Defender Antivirus](u
|
|||||||
PUA events are reported in the Windows Event Viewer, but not in Microsoft Endpoint Manager or in Intune. You can also use the `Get-MpThreat` cmdlet to view threats that Microsoft Defender Antivirus handled. Here's an example:
|
PUA events are reported in the Windows Event Viewer, but not in Microsoft Endpoint Manager or in Intune. You can also use the `Get-MpThreat` cmdlet to view threats that Microsoft Defender Antivirus handled. Here's an example:
|
||||||
|
|
||||||
```console
|
```console
|
||||||
|
|
||||||
CategoryID : 27
|
CategoryID : 27
|
||||||
DidThreatExecute : False
|
DidThreatExecute : False
|
||||||
IsActive : False
|
IsActive : False
|
||||||
|
Loading…
x
Reference in New Issue
Block a user