The "File Prevalence Check on MS Defender for Endpoint" workflow template is designed for threat hunting by assessing the distribution of a file within an organization using its SHA1 hash. It fetches file statistics and evaluates the organization's prevalence against predefined thresholds to determine the risk level. The workflow outputs a JSON risk assessment, guiding whether to halt, review, or proceed with automated remediation based on the file's prevalence.
Use Cases
Threat Hunting
Workflow Breakdown
Fetch org + global file statistics by file's SHA1 hash.
Evaluate orgPrevalence against HIGH / MEDIUM / LOW thresholds.
Output risk assessment JSON
Vendors
Utils, Microsoft Defender for Endpoint
Workflow Output
JSON risk assessment with a verdict: HIGH (> High Prevalence Threshold): hard stop, do not remediate. MEDIUM (LowâHigh Prevalence Threshold): soft stop, analyst review required. LOW (< Low Prevalence Threshold): cleared for automated remediation.
