1. Unauthorized data exfiltration via forwarding rule
An attacker compromises an employee's account and sets a rule to forward all emails containing specific keywords (e.g., "contract" or "confidential") to an external address.
2. Legitimate rule for administrative tasks
An executive forwards emails to their assistant for better task management, but the rule's sudden creation flags an alert for review.