This workflow template enables organizations to automate the process of receiving detailed security analysis reports. Users provide a hash for lookup, and the workflow retrieves VirusTotal engine statistics, generating a HTML table with findings. The results are then conveniently sent to an email recipient via SMTP. This is particularly useful for cybersecurity teams that need to swiftly assess and distribute threat intelligence regarding potential malicious files or software within their network.
Optional Triggers
Webhook,Slack,"Microsoft Teams"
Use Cases
null
Workflow Breakdown
Change the recipient and integration names in the first set variables step
Run the workflow and an email will be sent to the user with a table of the details
Vendors
Utils, VirusTotal, Email
Workflow Output
Email result to the recipient on findings on the hash.
Tips
Setup the SMTP integration in the tenant for use with this workflow