During a network forensics investigation, which type of log is most useful for reconstructing the timeline of a security breach?