Skip to content

Commit 68ae1e5

Browse files
Merge pull request #219515 from ElazarK/WI2011392-github-issuefix
fixed powershell command
2 parents cc0d8df + 055f93f commit 68ae1e5

File tree

1 file changed

+2
-2
lines changed

1 file changed

+2
-2
lines changed

articles/defender-for-cloud/powershell-onboarding.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -2,7 +2,7 @@
22
title: Onboard to Microsoft Defender for Cloud with PowerShell
33
description: This document walks you through the process of enabling Microsoft Defender for Cloud with PowerShell cmdlets.
44
ms.topic: quickstart
5-
ms.date: 11/09/2021
5+
ms.date: 11/24/2022
66
ms.custom: mode-api, ignite-2022
77
---
88
# Quickstart: Automate onboarding of Microsoft Defender for Cloud using PowerShell
@@ -66,7 +66,7 @@ These steps should be performed before you run the Defender for Cloud cmdlets:
6666
1. Configure a Log Analytics workspace to which the agents will report. You must have a Log Analytics workspace that you already created, that the subscription’s VMs will report to. You can define multiple subscriptions to report to the same workspace. If not defined, the default workspace will be used.
6767
6868
```powershell
69-
Set-AzSecurityWorkspaceSetting -Name "default" -Scope "/subscriptions/d07c0080-170c-4c24-861d-9c817742786c" -WorkspaceId"/subscriptions/d07c0080-170c-4c24-861d-9c817742786c/resourceGroups/myRg/providers/Microsoft.OperationalInsights/workspaces/myWorkspace"
69+
Set-AzSecurityWorkspaceSetting -Name "default" -Scope "/subscriptions/d07c0080-170c-4c24-861d-9c817742786c" -WorkspaceId "/subscriptions/d07c0080-170c-4c24-861d-9c817742786c/resourceGroups/myRg/providers/Microsoft.OperationalInsights/workspaces/myWorkspace"
7070
```
7171
7272
1. Auto-provision installation of the Log Analytics agent on your Azure VMs:

0 commit comments

Comments
 (0)