From c7a1ca2a365a677d919bca430c3e17afe1164d37 Mon Sep 17 00:00:00 2001 From: Gunnar Haslinger Date: Fri, 19 Aug 2016 22:09:54 +0200 Subject: [PATCH] Correct Typo in PowerShell Command --- .../keep-secure/enable-pua-windows-defender-for-windows-10.md | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/windows/keep-secure/enable-pua-windows-defender-for-windows-10.md b/windows/keep-secure/enable-pua-windows-defender-for-windows-10.md index b2d0ca16e4..519d416711 100644 --- a/windows/keep-secure/enable-pua-windows-defender-for-windows-10.md +++ b/windows/keep-secure/enable-pua-windows-defender-for-windows-10.md @@ -59,7 +59,7 @@ You can use PowerShell to detect PUA without blocking them. In fact, you can run 2. Enter the PowerShell command: ```text - et-mpPreference -puaprotection 2 + set-mpPreference -puaprotection 2 ``` > [!NOTE] > PUA events are reported in the Windows Event Viewer and not in SCCM.