← Back to Learn Centre

What is timeline analysis?

Timeline analysis is the process of arranging events in order to understand what happened during an incident.

Simple example

Responders line up sign-ins, email events, file changes, and security alerts to see when compromise started and what followed.

Why it matters

A timeline helps identify the entry point, scope, impact, and recovery priorities.

Common warning signs

  • The activity is unexpected or unusual for the business context.
  • The request or system behaviour creates pressure to act quickly.
  • Normal approval, verification, or security processes are bypassed.
  • There are signs of unauthorised access, data exposure, or system change.
  • Staff are unsure whether the request, message, or system behaviour is legitimate.

Cyber Doc view

This term should be understood in business context, not only as a technical issue. Good protection usually combines clear processes, appropriate technical controls, staff awareness, and a calm response plan.

What to do

Proactive steps

  • Keep logs with accurate timestamps.
  • Synchronise system clocks where possible.
  • Retain logs for important systems.
  • Document important changes and incidents.
  • Know where key logs are stored.

Reactive steps

  • Collect logs before they expire.
  • Record actions taken during response.
  • Compare events across email, endpoint, firewall, and cloud systems.
  • Identify first known suspicious activity.
  • Use the timeline to guide containment and recovery.

Related terms

  • Logging
  • Evidence preservation
  • Incident response