Content
Threat Timeline
The threat timeline is how vedSecure turns raw detections into a readable incident story. It links process ancestry, file activity, user context, and response actions into one record.
Last updated: April 15, 2026
What the timeline records
Timelines preserve execution order, actor relationships, affected artifacts, and operator intervention so a responder can reconstruct what happened without jumping between disconnected views.
- Initial entry point
- Parent-child process chain
- File and folder activity
- Quarantine or termination actions
- Follow-up scans and restore decisions
Why timelines matter
A good timeline speeds up judgment. It reduces the gap between seeing a detection and understanding whether the event was contained, partial, repeated, or tied to larger endpoint compromise.