Detect threats using Microsoft Graph activity logs - Part 2