Scenario 1: An internal host starts copying an executable file to multiple systems within a short period. Investigation reveals that the file is a piece of ransomware spreading through the network using SMB protocol.
Scenario 2: A sudden spike in network traffic is detected, with numerous hosts receiving a script file. Further analysis indicates that an IT administrator was deploying a critical software update using an automated script, causing the detection to trigger.