Hi @Holmes, Sam ,
I reached out to a colleague on the Sentinel team to see if this is available, but as far as I am aware there nothing out-of-the-box for it. We have one example from our expert for process name entropy here: https://techcommunity.microsoft.com/t5/azure-sentinel/identifying-threat-hunting-opportunities-in-your-data/ba-p/915721
I'll update this post if my Sentinel colleague is able to provide additional resources.