Scenario 1: An attacker uses a compromised user account to gain access to the AD and attempts to modify group memberships to include their account in a privileged group. This detection is triggered by the unusual modification patterns and high volume of group change requests.
Scenario 2: A legitimate system administrator performs an AD schema update without following the change management process, leading to the detection of unusual AD operations. The activity is verified as authorized but misdocumented.