How to submit hashes to see if Endpoint Protection (SEP) covers the threat