Workflows based on this trigger will search for new events every 5 minutes.

Sample Event

{    "@odata.type": "#microsoft.graph.security.alert",    "id": "da637551227677560813_-961444813",    "providerAlertId": "da637551227677560813_-961444813",    "incidentId": "28282",    "status": "new",    "severity": "low",    "classification": "unknown",    "determination": "unknown",    "serviceSource": "microsoftDefenderForEndpoint",    "detectionSource": "antivirus",    "detectorId": "e0da400f-affd-43ef-b1d5-afc2eb6f2756",    "tenantId": "b3c1b5fc-828c-45fa-a1e1-10d74f6d6e9c",    "title": "Suspicious execution of hidden file",    "description": "A hidden file has been launched. This activity could indicate a compromised host. Attackers often hide files associated with malicious tools to evade file system inspection and defenses.",    "recommendedActions": "Collect artifacts and determine scope\n�\tReview the machine timeline for suspicious activities that may have occurred before and after the time of the alert, and record additional related artifacts (files, IPs/URLs) \n�\tLook for the presence of relevant artifacts on other systems. Identify commonalities and differences between potentially compromised systems.\n�\tSubmit relevant files for deep analysis and review resulting detailed behavioral information.\n�\tSubmit undetected files to the MMPC malware portal\n\nInitiate containment & mitigation \n�\tContact the user to verify intent and initiate local remediation actions as needed.\n�\tUpdate AV signatures and run a full scan. The scan might reveal and remove previously-undetected malware components.\n�\tEnsure that the machine has the latest security updates. In particular, ensure that you have installed the latest software, web browser, and Operating System versions.\n�\tIf credential theft is suspected, reset all relevant users passwords.\n�\tBlock communication with relevant URLs or IPs at the organization�s perimeter.",    "category": "DefenseEvasion",    "assignedTo": null,    "alertWebUrl": "https://security.microsoft.com/alerts/da637551227677560813_-961444813?tid=b3c1b5fc-828c-45fa-a1e1-10d74f6d6e9c",    "incidentWebUrl": "https://security.microsoft.com/incidents/28282?tid=b3c1b5fc-828c-45fa-a1e1-10d74f6d6e9c",    "actorDisplayName": null,    "threatDisplayName": null,    "threatFamilyName": null,    "mitreTechniques": [        "T1564.001"    ],    "createdDateTime": "2021-04-27T12:19:27.7211305Z",    "lastUpdateDateTime": "2021-05-02T14:19:01.3266667Z",    "resolvedDateTime": null,    "firstActivityDateTime": "2021-04-26T07:45:50.116Z",    "lastActivityDateTime": "2021-05-02T07:56:58.222Z",    "comments": [],    "evidence": [        {            "@odata.type": "#microsoft.graph.security.deviceEvidence",            "createdDateTime": "2021-04-27T12:19:27.7211305Z",            "verdict": "unknown",            "remediationStatus": "none",            "remediationStatusDetails": null,            "firstSeenDateTime": "2020-09-12T07:28:32.4321753Z",            "mdeDeviceId": "73e7e2de709dff64ef64b1d0c30e67fab63279db",            "azureAdDeviceId": null,            "deviceDnsName": "tempDns",            "osPlatform": "Windows10",            "osBuild": 22424,            "version": "Other",            "healthStatus": "active",            "riskScore": "medium",            "rbacGroupId": 75,            "rbacGroupName": "UnassignedGroup",            "onboardingStatus": "onboarded",            "defenderAvStatus": "unknown",            "ipInterfaces": [                "1.1.1.1"            ],            "loggedOnUsers": [],            "roles": [                "compromised"            ],            "detailedRoles": [                "Main device"            ],            "tags": [                "Test Machine"            ],            "vmMetadata": {                "vmId": "ca1b0d41-5a3b-4d95-b48b-f220aed11d78",                "cloudProvider": "azure",                "resourceId": "/subscriptions/8700d3a3-3bb7-4fbe-a090-488a1ad04161/resourceGroups/WdatpApi-EUS-STG/providers/Microsoft.Compute/virtualMachines/NirLaviTests",                "subscriptionId": "8700d3a3-3bb7-4fbe-a090-488a1ad04161"            }        },        {            "@odata.type": "#microsoft.graph.security.fileEvidence",            "createdDateTime": "2021-04-27T12:19:27.7211305Z",            "verdict": "unknown",            "remediationStatus": "none",            "remediationStatusDetails": null,            "detectionStatus": "detected",            "mdeDeviceId": "73e7e2de709dff64ef64b1d0c30e67fab63279db",            "roles": [],            "detailedRoles": [                "Referred in command line"            ],            "tags": [],            "fileDetails": {                "sha1": "5f1e8acedc065031aad553b710838eb366cfee9a",                "sha256": "8963a19fb992ad9a76576c5638fd68292cffb9aaac29eb8285f9abf6196a7dec",                "fileName": "MsSense.exe",                "filePath": "C:\\Program Files\\temp",                "fileSize": 6136392,                "filePublisher": "Microsoft Corporation",                "signer": null,                "issuer": null            }        },        {            "@odata.type": "#microsoft.graph.security.processEvidence",            "createdDateTime": "2021-04-27T12:19:27.7211305Z",            "verdict": "unknown",            "remediationStatus": "none",            "remediationStatusDetails": null,            "processId": 4780,            "parentProcessId": 668,            "processCommandLine": "\"MsSense.exe\"",            "processCreationDateTime": "2021-08-12T12:43:19.0772577Z",            "parentProcessCreationDateTime": "2021-08-12T07:39:09.0909239Z",            "detectionStatus": "detected",            "mdeDeviceId": "73e7e2de709dff64ef64b1d0c30e67fab63279db",            "roles": [],            "detailedRoles": [],            "tags": [],            "imageFile": {                "sha1": "5f1e8acedc065031aad553b710838eb366cfee9a",                "sha256": "8963a19fb992ad9a76576c5638fd68292cffb9aaac29eb8285f9abf6196a7dec",                "fileName": "MsSense.exe",                "filePath": "C:\\Program Files\\temp",                "fileSize": 6136392,                "filePublisher": "Microsoft Corporation",                "signer": null,                "issuer": null            },            "parentProcessImageFile": {                "sha1": null,                "sha256": null,                "fileName": "services.exe",                "filePath": "C:\\Windows\\System32",                "fileSize": 731744,                "filePublisher": "Microsoft Corporation",                "signer": null,                "issuer": null            },            "userAccount": {                "accountName": "SYSTEM",                "domainName": "NT AUTHORITY",                "userSid": "S-1-5-18",                "azureAdUserId": null,                "userPrincipalName": null,                "displayName": "System"            }        },        {            "@odata.type": "#microsoft.graph.security.registryKeyEvidence",            "createdDateTime": "2021-04-27T12:19:27.7211305Z",            "verdict": "unknown",            "remediationStatus": "none",            "remediationStatusDetails": null,            "registryKey": "SYSTEM\\CONTROLSET001\\CONTROL\\WMI\\AUTOLOGGER\\SENSEAUDITLOGGER",            "registryHive": "HKEY_LOCAL_MACHINE",            "roles": [],            "detailedRoles": [],            "tags": []        }    ],    "systemTags": [        "Defender Experts"    ]}