| Outbound PII Exfiltration – Email | high | active | Compliance | 3/5/2026 |
| Financial Data Upload to Unsanctioned Cloud | critical | active | Finance | 3/5/2026 |
| Source Code Exfiltration via USB | high | active | Engineering | 3/5/2026 |
| Mass File Download from SharePoint | medium | active | IT | 3/5/2026 |
| Malicious File Upload Detection | critical | active | Security | 3/5/2026 |
| Suspicious Email Behavior | medium | active | Security | 3/5/2026 |
| Privileged User Anomaly Detection | critical | active | Security | 3/5/2026 |
| Impossible Travel Detection | high | active | Security | 3/5/2026 |
| External Sharing of Confidential Files | high | active | Compliance | 3/5/2026 |
| High-Risk User Behavior | critical | active | Security | 3/5/2026 |
| Data Transfer to Personal Email | high | active | Compliance | 3/5/2026 |
| Ransomware Behavior Detection | critical | active | Security | 3/5/2026 |
| Excessive Permission Granting | medium | active | IT | 3/5/2026 |
| Data Movement to Unapproved SaaS | medium | active | IT | 3/5/2026 |
| Phishing Link Click Detection | high | active | Security | 3/5/2026 |
| Sensitive Data in Chat Messages | medium | active | Compliance | 3/5/2026 |
| High-Risk File Sharing Behavior | high | active | Compliance | 3/5/2026 |
| Suspicious Browser Extensions | medium | active | IT | 3/5/2026 |
| Data Access Outside Business Hours | medium | active | Compliance | 3/5/2026 |
| High-Volume Email Forwarding Rule Creation | high | active | Security | 3/5/2026 |