1. Unusual Employee Behavior
An employee who typically shares minimal files suddenly shares a large set of documents, prompting a review to ensure compliance and legitimacy.
2. Compromised Account Using Sharing for Data Leak
An attacker gains access to an employee's account and uses SharePoint's sharing function to share sensitive folders externally, establishing persistence for future data access.