Scenario 1: An internal server receives multiple remote access attempts via RDP from an external IP address. Investigation reveals that an attacker used stolen credentials to attempt unauthorized access during off-hours.
Scenario 2: A sudden increase in SSH connection attempts from an external IP is detected. Further analysis indicates that a legitimate third-party vendor was performing scheduled maintenance, causing the detection to trigger.