Building a Secure Hosting Environment for Red Forest Domain Controllers

Now Available On-Demand

With the onslaught of attacks on Active Directory, everyone is scrambling to lockdown AD – especially in terms of privileged access. To do this, many enterprises are considering a Red Forest architecture (aka Enhanced Security Admin Environment or ESAE), but it’s challenging to ensure the security of your red forest domain controllers from inception through ongoing operation.

In this real-training-for-free event, we’ll discuss how to deploy, operationalize, and maintain a Red Forest architecture. Red Forest DCs become the most security-critical systems in your network, and we’ll share information about how to set up a red forest environment, how to harden all systems, and how to maintain a secure environment.

Join us as we discuss:

  1. Clean source
  2. Encrypted disks
  3. Physical tampering
  4. Network isolation
  5. Audit trail
  6. Hardened virtualization infrastructure
  7. Secure administrative workstations

Watch today.

Your e-mail address is used to communicate with you about your registration, related products and services, and offers from select vendors. Refer to our Privacy Policy for additional information.