Skip to content
macOSSystemCritical

Unified Logs

Apple's unified logging framework stores structured system, security, and application events in compressed .tracev3 files for roughly 30 days of retention.

artifact_type: macos_unified_log

Where to find it

Default filesystem paths and registry locations. Collect these with your preferred live-response or disk-image tooling.

  • $/private/var/db/diagnostics/
  • $/private/var/db/uuidtext/

Forensic significance

Common scenarios in which this artifact becomes decisive evidence.

  • Detecting persistence via LaunchDaemons/LaunchAgents
  • Tracing process spawn chains
  • Login/logout events for user-session alibi work
  • SSH / Screen Sharing lateral movement

MITRE ATT&CK mapping

Techniques this artifact can help detect or substantiate. Click a technique to view the official MITRE entry.

Tools that parse it

unJaena AI and other DFIR tools commonly used to extract evidence from this artifact.

unJaena AI
UnifiedLogReader
log command (macOS)
mac_apt

Related artifacts

Stop parsing artifacts by hand

unJaena AI ingests disk images, live-response output, and mobile backups, then automatically correlates every artifact on this page — and 200+ more — into an investigator-ready timeline.

Try unJaena AI