Understanding Active Directory Terminology: Navigating the Forest and Trees

Date: 05/08/2025

Hearing terms like “forest,” “trees,” and the associated “trust relationships” for the first time can be quite daunting. Active Directory itself is equally intimidating, often regarded as one of Microsoft’s most complex technologies. To effectively manage AD and comprehend its operations, the first step is to learn the basic terminology and understand how its components relate to each other. That’s what I’ll explain.

The highest level in the logical hierarchy of Active Directory (AD) is the forest. A forest refers to a completely independent Active Directory organization, possessing a specific set of attributes and serving as the organization’s security perimeter.

A forest can include one or multiple domains. All objects created within a forest share a common set of attributes. For example, a “user” object contains a first name, last name, address, phone number, group membership information, and other parameters. By modifying this set, we change it for all objects in the forest. This set is called the AD schema. It describes all the objects we can create and their structure.

By default, the first domain created in a forest is considered its root domain. A domain refers to a logical grouping of users and computers that supports centralized administration and security settings. It also serves as a replication unit—all domain controllers within a domain must participate in replication with one another.

Domains are typically named using the DNS namespace. Trust, in turn, is the relationship between two domains that enables permissions for accessing certain objects in another domain. A tree is simply a collection of domains that use connected namespaces. For example, if a domain is named example.com, then a child domain might be test.example.com. In summary, you can visualize this hierarchy as “Forest — Tree — Domain.”

Overall Structure
Overall Structure

Most organizations typically use a very basic structure: a single forest with a root domain that contains various objects like users and computers. A more complex structure is mainly found in large companies that have a substantial IT workforce and different levels of responsibility. Often, only architects have full access rights, while regular administrators have rights limited to their own domains.

That covers the initial terminology. In one of the upcoming issues, I’ll discuss the types of trust relationships.

Related posts:
2022.06.01 — Cybercrime story. Analyzing Plaso timelines with Timesketch

When you investigate an incident, it's critical to establish the exact time of the attack and method used to compromise the system. This enables you to track the entire chain of operations…

Full article →
2022.02.09 — Dangerous developments: An overview of vulnerabilities in coding services

Development and workflow management tools represent an entire class of programs whose vulnerabilities and misconfigs can turn into a real trouble for a company using such software. For…

Full article →
2023.02.21 — Pivoting District: GRE Pivoting over network equipment

Too bad, security admins often don't pay due attention to network equipment, which enables malefactors to hack such devices and gain control over them. What…

Full article →
2022.01.12 — Post-quantum VPN. Understanding quantum computers and installing OpenVPN to protect them against future threats

Quantum computers have been widely discussed since the 1980s. Even though very few people have dealt with them by now, such devices steadily…

Full article →
2022.06.03 — Vulnerable Java. Hacking Java bytecode encryption

Java code is not as simple as it seems. At first glance, hacking a Java app looks like an easy task due to a large number of available…

Full article →
2023.07.07 — Evil Ethernet. BadUSB-ETH attack in detail

If you have a chance to plug a specially crafted device to a USB port of the target computer, you can completely intercept its traffic, collect cookies…

Full article →
2023.03.26 — Poisonous spuds. Privilege escalation in AD with RemotePotato0

This article discusses different variations of the NTLM Relay cross-protocol attack delivered using the RemotePotato0 exploit. In addition, you will learn how to hide the signature of an…

Full article →
2022.06.01 — F#ck AMSI! How to bypass Antimalware Scan Interface and infect Windows

Is the phrase "This script contains malicious content and has been blocked by your antivirus software" familiar to you? It's generated by Antimalware Scan Interface…

Full article →
2022.02.09 — Kernel exploitation for newbies: from compilation to privilege escalation

Theory is nothing without practice. Today, I will explain the nature of Linux kernel vulnerabilities and will shown how to exploit them. Get ready for an exciting journey:…

Full article →
2022.02.09 — F#ck da Antivirus! How to bypass antiviruses during pentest

Antiviruses are extremely useful tools - but not in situations when you need to remain unnoticed on an attacked network. Today, I will explain how…

Full article →