Once you realize that an incident has occurred, investigate who is responsible for it and how it came about. First check who accessed a file at a particular location or with a particular name, and then search for the part of the content that was leaked. Our user-friendly search filters will guide you through this process seamlessly.
After you have identified a suspicious log event, you can easily access the actions that preceded it in order to understand how and why it happened. It is only when you have understood the context of an incident that you can take the necessary measures to solve it.