Scenario 1: An internal host establishes multiple outbound connections to known TOR entry nodes. Investigation reveals that the host is compromised, and the attacker is using TOR to anonymize C2 communications and exfiltrate data.
Scenario 2: A sudden increase in encrypted network traffic is detected, with connections to uncommon IP addresses. Further analysis indicates that a security researcher within the organization was using TOR for legitimate testing purposes, causing the detection to trigger.