Scenario 1: Phishing attack leading to ransomware encryption
An employee receives an email that appears to be from Microsoft, prompting them to approve an OAuth request. Unknowingly, they grant permissions to a malicious application, which immediately begins encrypting files across their OneDrive. The M365 Ransomware detection triggers an alert due to rapid file modifications, prompting an investigation that identifies the compromised account and stops further damage.
Scenario 2: IT-admin initiated bulk file changes
An IT administrator is migrating large amounts of SharePoint data to a new site, causing a surge in file modifications. The detection is triggered, but upon review, the security team confirms it as a planned migration, avoiding unnecessary incident response actions.