Once you've handled persistence and credentials, the macOS examiner's next job is timeline construction. Four sources matter.
Time Machine on macOS 11+ stores hourly snapshots locally for 24 hours and uses APFS replication to a destination drive if one is configured. tmutil listbackups lists destination backups; tmutil listlocalsnapshots / lists local ones. Each is a full read-only image of the volume at that point. Mount with mount_apfs -s com.apple.TimeMachine.2026-05-15-143000.local /Volumes/snap1. You can walk a file's history backwards across deletions, which is how a "wiped" project folder gets reconstructed in a Bengaluru source-code-theft matter.
Unified Logging lives at /var/db/diagnostics/ as .tracev3 files keyed against the UUID-to-format-string database at /var/db/uuidtext/. The query interface is the log command:
log show --start "2026-05-10 09:00:00" --end "2026-05-10 18:00:00" \
--predicate 'subsystem == "com.apple.xpc.launchd"' --info --debug
A SOCO who only knows /var/log/system.log will see a near-empty file and conclude nothing happened. The reality is that Unified Logging captures process launches, network state changes, USB attach events, authorisation prompts and far more, in compact binary form. mac_apt extracts Unified Log entries into CSVs for offline review.
Spotlight maintains .Spotlight-V100 on every indexed volume. The store is binary and proprietary, but mdfind against a mounted image lets you replicate the user's search experience. More importantly, the MDImporter plugins record every imported file's metadata, which sometimes preserves filenames of files long deleted.
FSEvents at /.fseventsd/ is the filesystem event log: every create, modify, delete, rename, with a 64-bit event ID and a flag set. Tools: FSEventsParser (David Cowen) and mac_apt. FSEvents lasts weeks to months depending on volume size and activity. In a 2024 Hyderabad insider-data-exfil case, an FSEvents parse showed a 4 a.m. burst of file renames in ~/Projects/, immediately followed by a Drop-classified set of writes to /Volumes/SanDisk, which placed the suspect at the workstation with the device.