Scenario 1: An internal host generates multiple directory listing commands targeting various shared folders across the network. Investigation reveals that the host is compromised, and the attacker is mapping out available resources to identify sensitive data.
Scenario 2: A sudden increase in SMB traffic is detected, with multiple access attempts to administrative shares. Further analysis indicates that a security team was performing a scheduled network audit, causing the detection to trigger.