SlideShare a Scribd company logo
Sponsored byUnderstanding“RedForest”:The3-Tier
EnhancedSecurityAdminEnvironment
(ESAE)andAlternativeWaystoProtect
PrivilegedCredentials
© 2017 Monterey Technology Group Inc.
Thanks to
 Made possible by
Preview of key
points
 Very important concepts
 PtH
 Logon types are not created equal
 Security dependencies
 Clean source
 The problem with AD Forests
 The 3-tier AD security zone design
 DeployingTier 0 in a “red” forest
 Completing the Enhanced SecurityAdministrative Environment
 Beyond
 How far does ESAE get you?
 Alternatives and gaps
 Privilege management
Pass-the-hash
 To view this webcast: https://www.quest.com/webcast-
ondemand/understanding-red-forest-the-3tier-enhanced-
security-admin-environment8121798/
 And related to credential artifact theft
 Randy Smith/QuestWebinar: Deep Dive: Understanding Pass-
the-Hash Attacks and How to Prevent
 https://www.quest.com/webcast-ondemand/-understanding-
pass-the-hash-attacks830251
Logon types
are not
created equal
 The difference between interactive and network logons
 Same goes for other logon types
Interactive
logon
Network
logon
hash
hash
Security
dependencies
 Control relationships create security dependencies
Subject Controls Object
Security dependency
The problem
withAD
forests
 Domains inside a forest are not security boundaries
 The forest is the “security boundary”
 A lot risks with admin accounts in the same forest they
administer
 Privilege escalation
 Credential theft
 Control over each other
 No security zones
The 3-tier
design
Tier 0 – Domain Admins
Tier 1 – Server Admins
Tier 2 –Workstation
Admins
Tier isolation
 Accounts
 Servers
 Workstations
 Logon types
 Cross-restrictions
DeployingTier
0 in a “red”
forest
 Tier Zero should be in a different forest
 Production forest trusts red forest
 No domain admin or similarly privileged accounts in production
forest
 Except emergency access account – built-in Administrator
 Red forest dedicated to simply holdingTier 0 accounts for
administering production forest
 Tier 0 accounts do not have privileged access to red forest
 Accounts needed for that purpose might be considerTier -1
The parts
Domain Admins
Administrators
Administrator
The parts trust
Domain Admins
Administrators
Administrator
Delegated Permissions
Domain Admins
Administrators
Administrator
The parts trust
Domain Admins
Administrators
Role B
Role A
Role C
Administrator
Domain Admins
Administrators
Administrator
Delegated Permissions
The parts trust
Interactive logon
Domain controller
Network logon
Completing
the Enhanced
Security
Administrative
Environment
 Identifying who needs what
 Classification into tiers
 Creating roles
 Cleaning up old accounts
 Quest Enterprise Reporter
 Training
 Privileged AdministrativeWorkstations
Beyond  How far does ESAE get you?
 Alternatives and gaps
 Privilege management
How far does
ESAE get you?
 Manages risk for
 Active Directory
 Windows OS
 Doesn’t address
 Many applications aren't compatible with being administered
by accounts from an external forest using a standard trust
 UNIX/Linux
 Devices
Alternatives
and gaps
 ESAE doesn’t stop with a red forest
 Tier 1 should be secured with a privilege management solution
 Check out Quest PAM/PSM solutions
 2 factor authentication
 MS assumes smart cards
 But one time password has significant advantages
 Quest Defender
 Alternative: proxy technology
 Active Roles
 GPO Admin
Bottom line
 Really need to understand security dependencies
 Identify control relationships
 Implementing ESAE
 Need good reporting
 How best to address them
 Red forest is one way to address those risks in AD and Windows
 Privileged Account and Session Management Solutions
 Go beyond AD andWindows
 Proxy technologies provide a compelling alternative or
compliment to isolated red forest
 Understand the limitations of smart cards and the advantages
of OTP
 Check outQuest
© 2017 Monterey Technology Group Inc.
“Red Forest”
Bryan Patton, CISSP
Identify who is doing
what
Confidential22
Executive Order 13636 issued February 12, 2013
NIST Framework
Confidential23
Identify applications on assets that require administrative rights
Confidential24
What are some privileged accounts in an environment?
Identify Privileged Accounts
• Domain Admins
• Enterprise Admins
• Local Administrators
• SA
• Helpdesk
• OU Admins
• Service Accounts
• Unknown
Confidential25
Identification of known Privileged Accounts
Confidential26
Identification of unknown Privileged Accounts
Confidential27
Identification of Privileges on computer accounts
Confidential28
Identification of third party software on DC’s
Confidential29
Identification of what accounts are doing
Protection
Confidential31
Changes to Active Directory via proxy
Confidential32
Protect Active Directory- Enforce Least Privilege Access
Confidential33
Protect Workstations- Enforce Least Privilege Access
Confidential34
Protect hardware- block USB
Confidential35
Protect- Implement Group Policy
Confidential36
Protect- Workflow Approval Process
Request Review Approve Commit
Immediate
Schedule
Email
Approve?
Approve
Deny
View
Details
Rejection
Comments
Email
Approve?
Approve
Deny
View
Details
Rejection
Comments
Email
Confidential37
Protect- Prevent “Privileged Users” from performing actions
Detect
Confidential39
Detect- What can we do?
Confidential40
Detect- GPO Changes outside of version control system
Respond
Confidential42
Respond- Quickly search to identify relationships
Confidential43
Respond- Changes through Active Roles
Confidential44
Respond- Changes outside of Active Roles
Confidential45
Pre and post actions enable users to execute custom scripts before or after a
GPOADmin action to facilitate integration with internal processes and systems.
Respond after making a change to a GPO
Confidential46
Respond- use data to change what accounts are allowed to do
Recover
Confidential48
Recovery Active Directory from attribute to Forest level
Confidential49
Recovery a GPO to a specific version

More Related Content

PDF
An ACE in the Hole - Stealthy Host Persistence via Security Descriptors
PDF
The Unintended Risks of Trusting Active Directory
PDF
Red forest Design ESAE
PPTX
(Ab)Using GPOs for Active Directory Pwnage
PPTX
Abusing Microsoft Kerberos - Sorry you guys don't get it
PPTX
PSConfEU - Offensive Active Directory (With PowerShell!)
PPT
Secure shell ppt
PPTX
Detect HTTP Brute Force attack using Snort IDS/IPS on PFSense Firewall
An ACE in the Hole - Stealthy Host Persistence via Security Descriptors
The Unintended Risks of Trusting Active Directory
Red forest Design ESAE
(Ab)Using GPOs for Active Directory Pwnage
Abusing Microsoft Kerberos - Sorry you guys don't get it
PSConfEU - Offensive Active Directory (With PowerShell!)
Secure shell ppt
Detect HTTP Brute Force attack using Snort IDS/IPS on PFSense Firewall

What's hot (20)

PDF
Hunting for Privilege Escalation in Windows Environment
PPTX
Kerberos
PDF
I'm in your cloud... reading everyone's email. Hacking Azure AD via Active Di...
PDF
How MITRE ATT&CK helps security operations
PPTX
Introduction to Public Key Infrastructure
PDF
Ace Up the Sleeve
PPTX
PowerShell for Practical Purple Teaming
PDF
Introduction to red team operations
PPTX
File system.
PPTX
Six Degrees of Domain Admin - BloodHound at DEF CON 24
PPTX
Defending Your "Gold"
PPT
PKI and Applications
PDF
CS6701 CRYPTOGRAPHY AND NETWORK SECURITY
PDF
Mapping to MITRE ATT&CK: Enhancing Operations Through the Tracking of Interac...
PDF
Users and groups in Linux
PPT
ssh.ppt
PDF
A Threat Hunter Himself
PDF
Carlos García - Pentesting Active Directory Forests [rooted2019]
PDF
ATT&CKING Containers in The Cloud
PDF
Derbycon - The Unintended Risks of Trusting Active Directory
Hunting for Privilege Escalation in Windows Environment
Kerberos
I'm in your cloud... reading everyone's email. Hacking Azure AD via Active Di...
How MITRE ATT&CK helps security operations
Introduction to Public Key Infrastructure
Ace Up the Sleeve
PowerShell for Practical Purple Teaming
Introduction to red team operations
File system.
Six Degrees of Domain Admin - BloodHound at DEF CON 24
Defending Your "Gold"
PKI and Applications
CS6701 CRYPTOGRAPHY AND NETWORK SECURITY
Mapping to MITRE ATT&CK: Enhancing Operations Through the Tracking of Interac...
Users and groups in Linux
ssh.ppt
A Threat Hunter Himself
Carlos García - Pentesting Active Directory Forests [rooted2019]
ATT&CKING Containers in The Cloud
Derbycon - The Unintended Risks of Trusting Active Directory
Ad

Similar to Understanding "Red Forest" - The 3-Tier ESAE and Alternative Ways to Protect Privileged Credentials (20)

PPTX
Reduciendo riesgos a través de controles de acceso, manejo de privilegios y a...
PDF
Securing DevOps through Privileged Access Management
PDF
MSFT Cloud Architecture Information Protection
PPTX
Big Data Security: Facing the challenge
PPTX
Securing IT Against Modern Threats with Microsoft Cloud Tools - #EUCloudSummi...
PPTX
3. Cloud-Infrastructure-and-Entitlements-Management.pptx
PDF
Webinar hiware
PDF
ASMC 2017 - Martin Vliem - Security < productivity < security: syntax ...
PPTX
Understanding Database Encryption & Protecting Against the Insider Threat wit...
PDF
Privleged Access Management
PDF
Privileged identity management
 
PPTX
Teknisen tietoturvan minimivaatimukset
PPTX
ciso-workshop-3-identity-protection.pptx
PDF
Cloud Security for Startups - From A to E(xit)
PDF
Anomali Detect 19 - Nickels & Pennington - Turning Intelligence into Action w...
PPTX
Securely Harden Microsoft 365 with Secure Score
PPTX
Identity & Access Management - Securing Your Data in the 21st Century Enterprise
PPTX
CoLabora March 2022 - Improve security posture by implementing new Azure AD ...
PPTX
19.) security pivot (policy byod nac)
PPTX
19.) security pivot (policy byod nac)
Reduciendo riesgos a través de controles de acceso, manejo de privilegios y a...
Securing DevOps through Privileged Access Management
MSFT Cloud Architecture Information Protection
Big Data Security: Facing the challenge
Securing IT Against Modern Threats with Microsoft Cloud Tools - #EUCloudSummi...
3. Cloud-Infrastructure-and-Entitlements-Management.pptx
Webinar hiware
ASMC 2017 - Martin Vliem - Security < productivity < security: syntax ...
Understanding Database Encryption & Protecting Against the Insider Threat wit...
Privleged Access Management
Privileged identity management
 
Teknisen tietoturvan minimivaatimukset
ciso-workshop-3-identity-protection.pptx
Cloud Security for Startups - From A to E(xit)
Anomali Detect 19 - Nickels & Pennington - Turning Intelligence into Action w...
Securely Harden Microsoft 365 with Secure Score
Identity & Access Management - Securing Your Data in the 21st Century Enterprise
CoLabora March 2022 - Improve security posture by implementing new Azure AD ...
19.) security pivot (policy byod nac)
19.) security pivot (policy byod nac)
Ad

More from Quest (20)

PPTX
DBA vs Deadlock: How to Out-Index a Deadly Blocking Scenario
PPTX
Got Open Source?
PDF
SQL Server 2017 Enhancements You Need To Know
PPTX
Quest to the Cloud - Identifying the Barriers to Accelerate Office 365 Adoption
PPTX
Top 10 Enterprise Reporter Reports You Didn't Know You Needed
PDF
Migrating to Windows 10: Starting Fast. Finishing Strong
PDF
The Cost of Doing Nothing: A Ransomware Backup Story
PDF
Ensuring Rock-Solid Unified Endpoint Management
PDF
Effective Patch and Software Update Management
PDF
Predicting the Future of Endpoint Management in a Mobile World
PDF
Investigating and Recovering from a Potential Hybrid AD Security Breach
PPTX
Who’s Watching the Watchers? Fixing and Preventing Inappropriate Privileged A...
PDF
Sounding the Alarm with Real-Time AD Detection and Alerting
PDF
Identifying Hybrid AD Security Risks with Continuous Assessment
PDF
Reducing the Chance of an Office 365 Security Breach
PPTX
Office 365 Best Practices That You Are Not Thinking About
PDF
How to Restructure Active Directory with ZeroIMPACT
PDF
How to Secure Access Control in Office 365 Environments
PDF
Your Biggest Systems Management Challenges – and How to Overcome Them
PDF
Top Five Office 365 Migration Headaches and How to Avoid Them
DBA vs Deadlock: How to Out-Index a Deadly Blocking Scenario
Got Open Source?
SQL Server 2017 Enhancements You Need To Know
Quest to the Cloud - Identifying the Barriers to Accelerate Office 365 Adoption
Top 10 Enterprise Reporter Reports You Didn't Know You Needed
Migrating to Windows 10: Starting Fast. Finishing Strong
The Cost of Doing Nothing: A Ransomware Backup Story
Ensuring Rock-Solid Unified Endpoint Management
Effective Patch and Software Update Management
Predicting the Future of Endpoint Management in a Mobile World
Investigating and Recovering from a Potential Hybrid AD Security Breach
Who’s Watching the Watchers? Fixing and Preventing Inappropriate Privileged A...
Sounding the Alarm with Real-Time AD Detection and Alerting
Identifying Hybrid AD Security Risks with Continuous Assessment
Reducing the Chance of an Office 365 Security Breach
Office 365 Best Practices That You Are Not Thinking About
How to Restructure Active Directory with ZeroIMPACT
How to Secure Access Control in Office 365 Environments
Your Biggest Systems Management Challenges – and How to Overcome Them
Top Five Office 365 Migration Headaches and How to Avoid Them

Recently uploaded (20)

PPTX
VVF-Customer-Presentation2025-Ver1.9.pptx
PPTX
Online Work Permit System for Fast Permit Processing
PDF
Claude Code: Everyone is a 10x Developer - A Comprehensive AI-Powered CLI Tool
PPTX
ai tools demonstartion for schools and inter college
PDF
Addressing The Cult of Project Management Tools-Why Disconnected Work is Hold...
PDF
Nekopoi APK 2025 free lastest update
PDF
System and Network Administration Chapter 2
PDF
Understanding Forklifts - TECH EHS Solution
PDF
Audit Checklist Design Aligning with ISO, IATF, and Industry Standards — Omne...
PDF
2025 Textile ERP Trends: SAP, Odoo & Oracle
PPTX
Agentic AI Use Case- Contract Lifecycle Management (CLM).pptx
PDF
Digital Strategies for Manufacturing Companies
PPTX
Oracle E-Business Suite: A Comprehensive Guide for Modern Enterprises
PDF
Design an Analysis of Algorithms I-SECS-1021-03
PPTX
L1 - Introduction to python Backend.pptx
PPTX
history of c programming in notes for students .pptx
PDF
Design an Analysis of Algorithms II-SECS-1021-03
PPTX
ISO 45001 Occupational Health and Safety Management System
PDF
PTS Company Brochure 2025 (1).pdf.......
PPTX
Odoo POS Development Services by CandidRoot Solutions
VVF-Customer-Presentation2025-Ver1.9.pptx
Online Work Permit System for Fast Permit Processing
Claude Code: Everyone is a 10x Developer - A Comprehensive AI-Powered CLI Tool
ai tools demonstartion for schools and inter college
Addressing The Cult of Project Management Tools-Why Disconnected Work is Hold...
Nekopoi APK 2025 free lastest update
System and Network Administration Chapter 2
Understanding Forklifts - TECH EHS Solution
Audit Checklist Design Aligning with ISO, IATF, and Industry Standards — Omne...
2025 Textile ERP Trends: SAP, Odoo & Oracle
Agentic AI Use Case- Contract Lifecycle Management (CLM).pptx
Digital Strategies for Manufacturing Companies
Oracle E-Business Suite: A Comprehensive Guide for Modern Enterprises
Design an Analysis of Algorithms I-SECS-1021-03
L1 - Introduction to python Backend.pptx
history of c programming in notes for students .pptx
Design an Analysis of Algorithms II-SECS-1021-03
ISO 45001 Occupational Health and Safety Management System
PTS Company Brochure 2025 (1).pdf.......
Odoo POS Development Services by CandidRoot Solutions

Understanding "Red Forest" - The 3-Tier ESAE and Alternative Ways to Protect Privileged Credentials