Connect With Me:

Blog

Forest Security Boundary
Securing the forest boundary
by Robin Granberg/ on 01 Oct 2022

Securing the forest boundary

In the article SID filter as security boundary between domains? (Part 7) - Trust account attack - from trusting to trusted , by Jonas Bülow Knudsen, Martin Sohn Christensen, Tobias Thorbjørn Munch Torp, they describe how the security boundary of the forest can be breached by an admin in the trusting forest and I will explain how you can mitigate this problem.

ACL
Finding Highly Privileged Accounts in ACL's - Part 1
by Robin Granberg/ on 27 Apr 2020

Finding Highly Privileged Accounts in ACL's - Part 1

When trying to identify the highly privileged accounts in an Active Directory you might start with the members of the built-in administrative groups like Domain Admin etc.