From d9dc2922d35489f1edafac692c770134f56478de Mon Sep 17 00:00:00 2001 From: DulceMV Date: Mon, 1 Aug 2016 17:36:52 +1000 Subject: [PATCH 1/2] Updated note formatting --- .../enable-pua-windows-defender-for-windows-10.md | 5 ++++- 1 file changed, 4 insertions(+), 1 deletion(-) diff --git a/windows/keep-secure/enable-pua-windows-defender-for-windows-10.md b/windows/keep-secure/enable-pua-windows-defender-for-windows-10.md index f5e42b6b5a..a8a6320a00 100644 --- a/windows/keep-secure/enable-pua-windows-defender-for-windows-10.md +++ b/windows/keep-secure/enable-pua-windows-defender-for-windows-10.md @@ -52,7 +52,10 @@ You can use PowerShell to detect PUA without blocking them. In fact, you can run a. Click **Start**, type **powershell**, and press **Enter**. b. Click **Windows PowerShell** to open the interface. - > **Note:**  You may need to open an administrator-level version of PowerShell. Right-click the item in the Start menu, click **Run as administrator** and click **Yes** at the permissions prompt. + + > [!NOTE] + > You may need to open an administrator-level version of PowerShell. Right-click the item in the Start menu, click **Run as administrator** and click **Yes** at the permissions prompt. + 2. Enter the PowerShell command: ```text From 752b258d66555f01bf97f12ed9d17f3de75d6618 Mon Sep 17 00:00:00 2001 From: DulceMV Date: Mon, 1 Aug 2016 17:38:36 +1000 Subject: [PATCH 2/2] Fixed space issue --- .../keep-secure/enable-pua-windows-defender-for-windows-10.md | 1 + 1 file changed, 1 insertion(+) diff --git a/windows/keep-secure/enable-pua-windows-defender-for-windows-10.md b/windows/keep-secure/enable-pua-windows-defender-for-windows-10.md index a8a6320a00..322d36d515 100644 --- a/windows/keep-secure/enable-pua-windows-defender-for-windows-10.md +++ b/windows/keep-secure/enable-pua-windows-defender-for-windows-10.md @@ -43,6 +43,7 @@ If you are using these versions | See these topics System Center Configuration Manager (current branch) version 1606 | [Create a new antimalware policy](https://technet.microsoft.com/en-US/library/mt613199.aspx#To-create-a-new-antimalware-policy)
[Real-time Protection Settings](https://technet.microsoft.com/en-US/library/mt613199.aspx#Real-time-Protection-Settings) System Center 2012 R2 Endpoint Protection
System Center 2012 Configuration Manager
System Center 2012 Configuration Manager SP1
System Center 2012 Configuration Manager SP2
System Center 2012 R2 Configuration Manager
System Center 2012 Endpoint Protection SP1
System Center 2012 Endpoint Protection
System Center 2012 R2 Configuration Manager SP1| [How to Deploy Potentially Unwanted Application Protection Policy for Endpoint Protection in Configuration Manager](https://technet.microsoft.com/library/hh508770.aspx#BKMK_PUA) + ***Use PUA audit mode in SCCM*** You can use PowerShell to detect PUA without blocking them. In fact, you can run audit mode on individual machines. This feature is useful if your company is conducting an internal software security compliance check and you’d like to avoid any false positives.