You have a Microsoft 365 subscription that uses Microsoft Defender XDR.
You are investigating an attacker that is known to use the Microsoft Graph API as an attack vector. The attacker performs the tactics shown the following table.
You need to search for malicious activities in your organization.
Which tactics can you analyze by using the MicrosoftGraphActivityLogs table?
Avaris
Highly Voted 1 year, 1 month agosmanzana
Most Recent 11 months, 2 weeks agosmanzana
11 months, 2 weeks agoVokuhila
1 year, 1 month agoladdu001
1 year, 2 months ago