You can also do it manually in PowerShell, here is an example (dirty) listing the titles of the first 200 mails of each mailbox:
No, but my detection experts will detect your underworld rebus technique!
Having logs is good, watching them is better.
However, since we operate in the world of witchcraft, if you use Microsoft's CloudAppSec log analysis tool, you won't see these accesses.
That's beautiful!
From what I understand, this category of access is filtered upstream and does not show up in Microsoft's security tools so as not to pollute the console. So either you do what you need to do and get drowned in useless logs or... uh... Joker!
So as it is, if someone uses this technique and steals all the emails of a user, it will be almost invisible.
To see these accesses, you have to go to the Azure administration portal (https://portal.azure.com) > then to :
Azure Active Directory