Content

Threat Timeline

The threat timeline is how vedSecure turns raw detections into a readable incident story. It links process ancestry, file activity, user context, and response actions into one record.

Last updated: April 15, 2026

What the timeline records

Timelines preserve execution order, actor relationships, affected artifacts, and operator intervention so a responder can reconstruct what happened without jumping between disconnected views.

  • Initial entry point
  • Parent-child process chain
  • File and folder activity
  • Quarantine or termination actions
  • Follow-up scans and restore decisions

Why timelines matter

A good timeline speeds up judgment. It reduces the gap between seeing a detection and understanding whether the event was contained, partial, repeated, or tied to larger endpoint compromise.