From c786da7ca1b5a23b809189aa9d209e333e0118c7 Mon Sep 17 00:00:00 2001 From: Joey Caparas Date: Thu, 15 Feb 2018 17:19:30 -0800 Subject: [PATCH] typo --- ...ver-endpoints-windows-defender-advanced-threat-protection.md | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/windows/security/threat-protection/windows-defender-atp/configure-server-endpoints-windows-defender-advanced-threat-protection.md b/windows/security/threat-protection/windows-defender-atp/configure-server-endpoints-windows-defender-advanced-threat-protection.md index 4a952a3d15..808f13b4ca 100644 --- a/windows/security/threat-protection/windows-defender-atp/configure-server-endpoints-windows-defender-advanced-threat-protection.md +++ b/windows/security/threat-protection/windows-defender-atp/configure-server-endpoints-windows-defender-advanced-threat-protection.md @@ -54,7 +54,7 @@ You’ll be able to onboard in the same method available for Windows 10 client e - Name: ForceDefenderPassiveMode - Value: 1 - b. Run the following PowerSHell command to verify that the passive mode was configured: + b. Run the following PowerShell command to verify that the passive mode was configured: ```Get-WinEvent -FilterHashtable @{ProviderName="Microsoft-Windows-Sense" ;ID=84}``` c. Confirm that a recent event containing the passive mode event is found: