You have a Microsoft 365 subscription that uses Microsoft Defender XDR.
You are investigating an attacker that is known to use the Microsoft Graph API as an attack vector. The attacker performs the tactics shown the following table.
You need to search for malicious activities in your organization.
Which tactics can you analyze by using the MicrosoftGraphActivityLogs table?
Optimizor_IT
1Â month agouser636
8Â months, 2Â weeks agog_man_rap
8Â months, 3Â weeks ago90158a0
10Â months, 1Â week ago