You have a Microsoft 365 subscription that uses Microsoft Defender XDR.
You are investigating an attacker that is known to use the Microsoft Graph API as an attack vector. The attacker performs the tactics shown the following table.
You need to search for malicious activities in your organization.
Which tactics can you analyze by using the MicrosoftGraphActivityLogs table?
Cathrine
28 days agoAlonzo
30 days agoRashida
4 days agoLina
8 days agoEvette
10 days agoKeva
10 days agoTomoko
1 months agoRosendo
19 days agoReita
22 days agoElizabeth
30 days agoAltha
2 months agoArdella
1 months agoAnnice
1 months agoElliot
2 months agoIzetta
2 months agoCrista
2 months agoElliot
2 months agoSabine
2 months agoElli
1 months agoClay
1 months agoCelestina
1 months agoLeoma
2 months ago