The Micro softGraphActivityLogs table in Microsoft Defender XDR (formerly part of Microsoft 365 Defender and Microsoft Sentinel) records API activity involving the Microsoft Graph API . This includes calls made to endpoints that interact with Azure AD, Exchange Onlin e, SharePoint, Teams, and other Microsoft 365 services.
According to Microsoft’s official documentation:
“The MicrosoftGraphActivityLogs table provides visibility into activities performed via Microsoft Graph API. These include directory enumeration, mailb ox data access, policy queries, and user management actions. The table helps detect misuse of Graph API for reconnaissance or lateral movement.”
Here’s how it applies to the tactics listed:
Tactic1 – Conditional Access policy reconnaissance Attackers can u se Graph API calls (e.g., GET /identity/conditionalAccess/policies ) to enumerate Conditional Access policies. This activity is logged in MicrosoftGraphActivityLogs , showing which API endpoints were accessed, by whom, and when.
Tactic2 – Mailbox reconnaissa nce Using Graph API calls such as GET /users/{id}/messages , attackers can read or enumerate mailbox data. These API interactions are also captured within MicrosoftGraphActivityLogs , allowing analysts to correlate them to potential reconnaissance behavior.
Tactic3 – Invites guest users to the tenant Graph API requests like POST /invitations are used to invite external users (B2B collaboration). These events are also recorded in the same table, providing audit visibility into cross-tenant invitation attempts.
Because all three tactics — Conditional Access reconnaissance, mailbox reconnaissance, and guest user invitations — involve the Microsoft Graph API , they are all detectable through the MicrosoftGraphActivityLogs table.
Therefore, the verified correct answ er is:
✅ D. Tactic1, Tactic2, and Tactic3