Sarah, a security analyst at Study Shark, receives an urgent request from her manager. There's been a suspicious login attempt to a high-level executive's account, and they need to investigate similar activities from the past six months. Sarah knows she needs to use Microsoft Defender for Cloud Apps to complete this task. Which feature should Sarah use in Microsoft Defender for Cloud Apps to query login activities from the past six months?