Understanding Active Directory Terminology: Navigating the Forest and Trees

Date: 05/08/2025

Hearing terms like “forest,” “trees,” and the associated “trust relationships” for the first time can be quite daunting. Active Directory itself is equally intimidating, often regarded as one of Microsoft’s most complex technologies. To effectively manage AD and comprehend its operations, the first step is to learn the basic terminology and understand how its components relate to each other. That’s what I’ll explain.

The highest level in the logical hierarchy of Active Directory (AD) is the forest. A forest refers to a completely independent Active Directory organization, possessing a specific set of attributes and serving as the organization’s security perimeter.

A forest can include one or multiple domains. All objects created within a forest share a common set of attributes. For example, a “user” object contains a first name, last name, address, phone number, group membership information, and other parameters. By modifying this set, we change it for all objects in the forest. This set is called the AD schema. It describes all the objects we can create and their structure.

By default, the first domain created in a forest is considered its root domain. A domain refers to a logical grouping of users and computers that supports centralized administration and security settings. It also serves as a replication unit—all domain controllers within a domain must participate in replication with one another.

Domains are typically named using the DNS namespace. Trust, in turn, is the relationship between two domains that enables permissions for accessing certain objects in another domain. A tree is simply a collection of domains that use connected namespaces. For example, if a domain is named example.com, then a child domain might be test.example.com. In summary, you can visualize this hierarchy as “Forest — Tree — Domain.”

Overall Structure
Overall Structure

Most organizations typically use a very basic structure: a single forest with a root domain that contains various objects like users and computers. A more complex structure is mainly found in large companies that have a substantial IT workforce and different levels of responsibility. Often, only architects have full access rights, while regular administrators have rights limited to their own domains.

That covers the initial terminology. In one of the upcoming issues, I’ll discuss the types of trust relationships.

Related posts:
2022.06.01 — WinAFL in practice. Using fuzzer to identify security holes in software

WinAFL is a fork of the renowned AFL fuzzer developed to fuzz closed-source programs on Windows systems. All aspects of WinAFL operation are described in the official documentation,…

Full article →
2022.02.15 — EVE-NG: Building a cyberpolygon for hacking experiments

Virtualization tools are required in many situations: testing of security utilities, personnel training in attack scenarios or network infrastructure protection, etc. Some admins reinvent the wheel by…

Full article →
2022.02.16 — Timeline of everything. Collecting system events with Plaso

As you are likely aware, forensic analysis tools quickly become obsolete, while hackers continuously invent new techniques enabling them to cover tracks! As…

Full article →
2022.06.02 — Climb the heap! Exploiting heap allocation problems

Some vulnerabilities originate from errors in the management of memory allocated on a heap. Exploitation of such weak spots is more complicated compared to 'regular' stack overflow; so,…

Full article →
2022.01.11 — Pentest in your own way. How to create a new testing methodology using OSCP and Hack The Box machines

Each aspiring pentester or information security enthusiast wants to advance at some point from reading exciting write-ups to practical tasks. How to do this in the best way…

Full article →
2022.02.09 — Dangerous developments: An overview of vulnerabilities in coding services

Development and workflow management tools represent an entire class of programs whose vulnerabilities and misconfigs can turn into a real trouble for a company using such software. For…

Full article →
2023.04.20 — Sad Guard. Identifying and exploiting vulnerability in AdGuard driver for Windows

Last year, I discovered a binary bug in the AdGuard driver. Its ID in the National Vulnerability Database is CVE-2022-45770. I was disassembling the ad blocker and found…

Full article →
2023.07.20 — Evil modem. Establishing a foothold in the attacked system with a USB modem

If you have direct access to the target PC, you can create a permanent and continuous communication channel with it. All you need for this…

Full article →
2023.03.26 — Poisonous spuds. Privilege escalation in AD with RemotePotato0

This article discusses different variations of the NTLM Relay cross-protocol attack delivered using the RemotePotato0 exploit. In addition, you will learn how to hide the signature of an…

Full article →
2023.06.08 — Croc-in-the-middle. Using crocodile clips do dump traffic from twisted pair cable

Some people say that eavesdropping is bad. But for many security specialists, traffic sniffing is a profession, not a hobby. For some reason, it's believed…

Full article →