Skip to content
macOSFilesystemHigh

FSEvents

Per-volume filesystem change journal. Records creation, deletion, rename, and ownership changes for every file — the macOS analogue of USN journal.

artifact_type: macos_fseventsd

Where to find it

Default filesystem paths and registry locations. Collect these with your preferred live-response or disk-image tooling.

  • $/.fseventsd/
  • $/Volumes/{volume}/.fseventsd/

Forensic significance

Common scenarios in which this artifact becomes decisive evidence.

  • Proving file deletion even after Trash is emptied
  • Detecting anti-forensic rename patterns
  • Ransomware — volume-wide file rename telemetry

MITRE ATT&CK mapping

Techniques this artifact can help detect or substantiate. Click a technique to view the official MITRE entry.

Tools that parse it

unJaena AI and other DFIR tools commonly used to extract evidence from this artifact.

unJaena AI
FSEventsParser (G-C Partners)
mac_apt

Related artifacts

Stop parsing artifacts by hand

unJaena AI ingests disk images, live-response output, and mobile backups, then automatically correlates every artifact on this page — and 200+ more — into an investigator-ready timeline.

Try unJaena AI