Detect threats using Microsoft Graph Logs - Part 1