Hunting for common security weaknesses using Microsoft Defender for Endpoint.