Fileless malware attacks

protection against fileless malware attacks - should PowerShell 2.0 be unchecked?