Defender for Cloud: Fileless Attack Technique Detected
Suspicious activity
Defender for Cloud: Fileless Attack Technique Detected
Risk Level
Informational (4)
Platform(s)
Description
The memory of the process specified below contains evidence of a fileless attack technique. Fileless attacks are used by attackers to execute code while evading detection by security software.
Recommended Mitigation
It is recommended to review the permissions which were used to make this operation.