Create a complete audit trail of each user’s interaction with the data to detect and stop insider threats, malware and cyber attacks before its to late and your data is either stolen, manipulated or destroyed. BrickStor’s user behavior capabilities allow you to view top users and files through the UI as well as review the behavior of a user or activity on a file. Quickly find out who deleted a file. As with other log data User Behavior Audit Logs can be streamed to SIEMs and log repositories including Splunk and ELK. The log includes the ID of the user, file path, source IP and file protocol used to access the file.