From 90a9d652034f99cf8fc9f164a7fc9c74fbf2da9c Mon Sep 17 00:00:00 2001 From: Joey Caparas Date: Thu, 16 Mar 2017 15:34:46 -0700 Subject: [PATCH] minor update to code --- ...ent-custom-ti-windows-defender-advanced-threat-protection.md | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/windows/keep-secure/experiment-custom-ti-windows-defender-advanced-threat-protection.md b/windows/keep-secure/experiment-custom-ti-windows-defender-advanced-threat-protection.md index b02f51a68f..016f35c526 100644 --- a/windows/keep-secure/experiment-custom-ti-windows-defender-advanced-threat-protection.md +++ b/windows/keep-secure/experiment-custom-ti-windows-defender-advanced-threat-protection.md @@ -43,7 +43,7 @@ This step will guide you in creating an alert definition and an IOC for a malici 2. Copy and paste the following PowerShell script. This script will upload a sample alert definition and IOC to Windows Defender ATP which you can use to generate an alert. >[!NOTE] - >Make sure you replace the `authUrl`, `clientID`, and `clientSecret` values with your details which you saved in when you enabled the threat intelligence application. + >Make sure you replace the `authUrl`, `clientId`, and `clientSecret` values with your details which you saved in when you enabled the threat intelligence application. [!code[ExampleScript](./code/example-script.ps1#L1-L60)]