You have a Microsoft 365 subscription that uses Microsoft Defender XDR.
You are investigating an attacker that is known to use the Microsoft Graph API as an attack vector. The attacker performs the tactics shown the following table.
You need to search for malicious activities in your organization.
Which tactics can you analyze by using the MicrosoftGraphActivityLogs table?
Cathrine
3 months agoAlonzo
3 months agoValentin
2 months agoVirgilio
2 months agoCarmen
2 months agoRashida
2 months agoLina
2 months agoEvette
2 months agoKeva
2 months agoTomoko
3 months agoRosendo
3 months agoReita
3 months agoElizabeth
3 months agoAltha
4 months agoArdella
3 months agoAnnice
3 months agoElliot
4 months agoIzetta
4 months agoCrista
4 months agoElliot
4 months agoSabine
4 months agoElli
3 months agoClay
3 months agoCelestina
3 months agoLeoma
4 months ago