Thank you for your interest towards F-Secure newsletter. You will shortly get an email to confirm the subscription.
19 November 2019
Christo Erasmus and Christopher Panayi
Written by Consultant and Active Directory specialist, Christo Erasmus, and Technical Director, Christopher Panayi, this paper addresses the known challenges of applying Red Forest to your AD environment. Implementation strategies and recommended prioritizations are provided for the purpose of achieving well-segregated and managed systems. Our insights come from practical, on-the-ground experience with instances of the Red Forest model in real-world environments.
Want to know more?
Register for our March 2020 Active Directory events, taking place in Johannesburg and Cape Town, South Africa.
Adequately securing the Active Directory (AD) environment is a challenge facing most large organizations. An attacker’s control over your AD means control over your systems, users, and administrators.
The implementation of Microsoft’s Enhanced Security Administrative Environment (ESAE), well known as the Red Forest method, is a commonly-used mitigation. However, the complexity of an environment, the impact of Red Forest on existing operations, or other such complications mean that organizations fall prey to (or simply resort to) an incomplete implementation. This makes the extent of the solution’s impact hard to quantify, and the security of their AD uncertain.