Timeline
Overview
Evidence: Timeline Description: Collect Timeline Category: System Platform: Windows Short Name: timeline Is Parsed: Yes Sent to Investigation Hub: Yes Collect File(s): Yes
Background
Windows Timeline provides a chronological record of user activities, including application usage, file access, and system events. This data is essential for understanding user behavior and reconstructing activity timelines.
Data Collected
This collector gathers structured data about timeline.
Timeline Data
ID
Primary key (auto-increment)
1
ActivityID
Activity identifier
12345678-1234-1234-1234-123456789012
Username
Username
Administrator
ApplicationName
Application name
Microsoft Edge
Platform
Platform
Windows
ParentActivityID
Parent activity ID
87654321-4321-4321-4321-210987654321
AppActivityID
Application activity ID
app-activity-123
ActivityType
Activity type
1
ActivityStatus
Activity status
0
Tag
Activity tag
web-browsing
Priority
Activity priority
1
IsLocalOnly
Local only flag
0
PlatformDeviceID
Platform device ID
device-123
DDSDeviceID
DDS device ID
dds-456
Payload
Activity payload
{"url":"https://example.com"}
IsRead
Read status
1
ETag
Entity tag
12345
LastModifiedTime
Last modified time
2023-10-15 14:30:25
ExpirationTime
Expiration time
2023-10-16 14:30:25
CreatedInCloud
Created in cloud time
2023-10-15 14:30:25
StartTime
Activity start time
2023-10-15 14:30:25
EndTime
Activity end time
2023-10-15 14:35:25
LastModifiedOnClient
Last modified on client
2023-10-15 14:30:25
OriginalLastModifiedOnClient
Original last modified on client
2023-10-15 14:30:25
LocalExpirationTime
Local expiration time
2023-10-16 14:30:25
Collection Method
This collector parses the necessary data from the timeline
table.
This collector collects files from the following locations:
%LOCALAPPDATA%\ConnectedDevicesPlatform\
Usage
This evidence is crucial for forensic investigations as it provides chronological user activity records. It helps investigators understand user behavior, detect unauthorized activities, and reconstruct activity timelines. The data can reveal application usage, file access patterns, and potential security incidents. Analysts can use this information to identify user compromises, trace activities, and assess user security posture.
Notes
This data may contain sensitive information that should be handled according to data protection requirements. Ensure proper chain of custody is maintained during collection and analysis.
Last updated
Was this helpful?