Jump to content

Pums and Pups


Recommended Posts

Depending on your environment, you may want to leave PUMs alone.  There are legitimate changes that network administrators make through GPOs that would be considered a PUM in a regular users' environment.

 

You could always set it to "Show in results list, but do not check for removal" so you can at least see what is being found and deal with it manually.

Link to post
Share on other sites

Create an account or sign in to comment

You need to be a member in order to leave a comment

Create an account

Sign up for a new account in our community. It's easy!

Register a new account

Sign in

Already have an account? Sign in here.

Sign In Now
  • Recently Browsing   0 members

    • No registered users viewing this page.
Back to top
×
×
  • Create New...

Important Information

This site uses cookies - We have placed cookies on your device to help make this website better. You can adjust your cookie settings, otherwise we'll assume you're okay to continue.