You have a Microsoft 365 subscription that uses Microsoft Defender XDR.
You are investigating an attacker that is known to use the Microsoft Graph API as an attack vector. The attacker performs the tactics shown the following table.
You need to search for malicious activities in your organization.
Which tactics can you analyze by using the MicrosoftGraphActivityLogs table?
Tomoko
5 days agoAltha
19 days agoAnnice
11 days agoElliot
22 days agoIzetta
28 days agoCrista
29 days agoElliot
1 months agoSabine
1 months agoClay
2 days agoCelestina
8 days agoLeoma
26 days ago