Scenario 1: An internal host generates a high number of failed Kerberos authentication attempts targeting various user accounts within a short period. Investigation reveals that the host is compromised, and the attacker is using it to brute-force Kerberos passwords.
Scenario 2: A spike in Kerberos authentication traffic is detected, originating from an IP address associated with a network security assessment. Verification with the IT department confirms that the activity is part of a scheduled security test.