— Sloth Boss
Where do you find the timestamps needed to build a timeline? This paper identifies the different types of logs used in timeline building, including system logs (like the Windows Event Log), application logs, and network firewall logs. You'll understand that each log source provides a different piece of the puzzle, from user logins to website visits and blocked connections. Knowing what logs to collect is a key skill for any incident responder or forensic analyst.