Watch this video on YouTube
You are investigating a potential fileless malware infection on a network. What initial step should you take to detect malicious activities?