Create a complete audit trail of each user’s interaction with the data to detect and stop insider threats, malware and cyber-attacks before it’s too late and your data is either stolen, manipulated or destroyed. BrickStor’s user behavior capabilities allow you to view top users and files through the UI as well as perform advanced analysis. The UBA capability has additive filters making it easy to review the behavior of a user or activity on a file based on time of day, source IP, file type and more. Quickly find out who deleted a file. As with other log data User Behavior Audit Logs can be streamed to SIEMs and log repositories including Splunk and ELK. The log includes the ID of the user, file path, source IP and file protocol used to access the file.