Skip to content

Commit 595407b

Browse files
authored
Fixed alignment
1 parent aa8998b commit 595407b

File tree

1 file changed

+7
-7
lines changed

1 file changed

+7
-7
lines changed

defender-endpoint/api/exposed-apis-full-sample-powershell.md

Lines changed: 7 additions & 7 deletions
Original file line numberDiff line numberDiff line change
@@ -55,19 +55,19 @@ In this section, we share PowerShell samples to
5555

5656
2. If your policy doesn't allow you to run the PowerShell commands, you can run the following command:
5757

58-
```
59-
Set-ExecutionPolicy -ExecutionPolicy Bypass
60-
```
58+
```
59+
Set-ExecutionPolicy -ExecutionPolicy Bypass
60+
```
6161

62-
For more information, see [PowerShell documentation](/powershell/module/microsoft.powershell.security/set-executionpolicy)
62+
For more information, see [PowerShell documentation](/powershell/module/microsoft.powershell.security/set-executionpolicy).
6363

6464
## Get token
6565

6666
Run the following command, using your information as follows:
6767

68-
- `$tenantId`: ID of the tenant on behalf of which you want to run the query (that is, the query is run on the data of this tenant)
69-
- `$appId`: ID of your Microsoft Entra app (the app must have 'Run advanced queries' permission to Defender for Endpoint)
70-
- `$appSecret`: Secret of your Microsoft Entra app
68+
- `$tenantId`: ID of the tenant on behalf of which you want to run the query (that is, the query is run on the data of this tenant).
69+
- `$appId`: ID of your Microsoft Entra app (the app must have 'Run advanced queries' permission to Defender for Endpoint).
70+
- `$appSecret`: Secret of your Microsoft Entra app.
7171
- `$suspiciousUrl`: The URL
7272

7373

0 commit comments

Comments
 (0)