Scenario 1: An external attacker compromises an internal system and begins transferring large volumes of sensitive data to a remote server. The detection is triggered by the unusual volume and destination of the outbound data transfers.
Scenario 2: An insider threat scenario where an employee uses a personal email account to send sensitive documents to an unauthorized external address. The detection is triggered by the unauthorized use of personal email for data transfer.