Whitepaper

TENDING TO THE RED FOREST: CONSIDERATIONS AND HARSH REALITIES OF A RED FOREST IMPLEMENTATION

19 November 2019
Christo Erasmus and Christopher Panayi

Adequately securing the Active Directory (AD) environment is a challenge facing most large organizations. An attacker’s control over your AD means control over your systems, users, and administrators.

The implementation of Microsoft’s Enhanced Security Administrative Environment (ESAE), well known as the Red Forest method, is a commonly-used mitigation. However, the complexity of an environment, the impact of Red Forest on existing operations, or other such complications mean that organizations fall prey to (or simply resort to) an incomplete implementation. This makes the extent of the solution’s impact hard to quantify, and the security of their AD uncertain.

In this whitepaper

Written by Consultant and Active Directory specialist, Christo Erasmus, and Technical Director, Christopher Panayi, this paper addresses the known challenges of applying Red Forest to your AD environment. Implementation strategies and recommended prioritizations are provided for the purpose of achieving well-segregated and managed systems. Our insights come from practical, on-the-ground experience with instances of the Red Forest model in real-world environments. 

Sign up for the latest insights

Speak to a Consultant

Fill out your details below to discuss your AD environment

Accreditations & Certificates

F-Secure Consulting (F-Secure Cyber Security (Pty) Ltd) is a level 4 contributor to B-BBEE with a procurement recognition level of 100%. Learn more and download our B-BBEE certificate. Click here to read the press release.

Follow us
@fsecure_consult F-Secure-Consulting f-secure-foundry fsecurelabs