You have a Microsoft 365 subscription that uses Microsoft Defender XDR.
You are investigating an attacker that is known to use the Microsoft Graph API as an attack vector. The attacker performs the tactics shown the following table.

You need to search for malicious activities in your organization.
Which tactics can you analyze by using the MicrosoftGraphActivityLogs table?
Alonzo
4 months agoSherell
4 months agoNorah
4 months agoArlen
4 months agoShanda
5 months agoNan
5 months agoAlberta
5 months agoNada
5 months agoLou
5 months agoDarrin
5 months agoWhitney
5 months agoTyisha
5 months agoWilburn
5 months agoCathrine
1 year agoAlonzo
1 year agoValentin
1 year agoVirgilio
1 year agoCarmen
1 year agoRashida
1 year agoLina
1 year agoEvette
1 year agoKeva
1 year agoTomoko
1 year agoRosendo
1 year agoReita
1 year agoElizabeth
1 year agoAltha
1 year agoArdella
1 year agoAnnice
1 year agoElliot
1 year agoIzetta
1 year agoCrista
1 year agoElliot
1 year agoSabine
1 year agoElli
1 year agoClay
1 year agoCelestina
1 year agoLeoma
1 year ago