From c7deeb24b8b7f5303810f2229e1073234394b27c Mon Sep 17 00:00:00 2001 From: DulceMV Date: Mon, 15 Aug 2016 17:57:33 +1000 Subject: [PATCH] Updated formatting --- ...able-pua-windows-defender-for-windows-10.md | 18 +++++++++--------- 1 file changed, 9 insertions(+), 9 deletions(-) diff --git a/windows/keep-secure/enable-pua-windows-defender-for-windows-10.md b/windows/keep-secure/enable-pua-windows-defender-for-windows-10.md index ebecf319f3..f26579cf99 100644 --- a/windows/keep-secure/enable-pua-windows-defender-for-windows-10.md +++ b/windows/keep-secure/enable-pua-windows-defender-for-windows-10.md @@ -74,18 +74,18 @@ You can use PowerShell to detect PUA without blocking them. In fact, you can run You can detect PUA without blocking them from your client. Gain insights into what can be blocked. - 1. Open PowerShell as Administrator:
+1. Open PowerShell as Administrator
- a. Click **Start**, type **powershell**, and press **Enter**. +    a. Click **Start**, type **powershell**, and press **Enter**. - b. Click **Windows PowerShell** to open the interface. - > [!NOTE] - > You may need to open an administrator-level version of PowerShell. Right-click the item in the Start menu, click **Run as administrator** and click **Yes** at the permissions prompt. -2. Enter the PowerShell command to enable audit mode: +    b. Click **Windows PowerShell** to open the interface. +    > [!NOTE] +    > You may need to open an administrator-level version of PowerShell. Right-click the item in the Start menu, click **Run as administrator** and click **Yes** at the permissions prompt. +2. Enter the PowerShell command to enable PUA in audit mode: - ```text - et-mpPreference -puaprotection 1 - ``` +  ```text +  et-mpPreference -puaprotection 1 +  ``` ##View PUA events