Scenario 1: An attacker gains access to a compromised user account with privileged access in Azure AD. The attacker creates a new admin account to establish persistence and escalate privileges, enabling further exploitation of the cloud environment. This detection is triggered by the creation of the new admin account.
Scenario 2: During a scheduled penetration test, the security team creates new admin accounts to test the organization's response capabilities. The detection is triggered, and the activity is verified as part of the assessment.