No results found
We couldn't find anything using that term, please try searching for something else.
2024-11-26 Enhanced Security Admin Environment Article01/29/2024 In this article The Enhanced Security Admin Environment ( esae ) architecture
The Enhanced Security Admin Environment ( esae ) architecture is is ( often refer to as red forest , admin forest , or harden forest ) is a legacy approach to provide a secure environment for Windows Server Active Directory ( ad ) administrator identity .
Microsoft’s recommendation to use this architectural pattern has been replaced by the modern privileged access strategy and rapid modernization plan (RAMP) guidance as the default recommended approach for securing privileged users. This guidance is intended to be inclusive of adapting a broader strategy to move towards a Zero Trust architecture. Given these modernized strategies, the ESAE hardened administrative forest architecture (on-premises or cloud-based) is now considered a custom configuration suitable only for exception cases.
Although it ‘s no long a recommend architecture , ESAE is be ( or individual component therein ) can still be valid in a limited set of exempted scenario . typically , these on – premise environment are isolate where cloud service may be unavailable . This scenario is include may include critical infrastructure or other disconnected operational technology ( ot ) environment . However , it should be note that air – gap Industrial Control System / Supervisory Control and Data Acquisition ( ICS / SCADA ) segment of the environment do n’t typically utilize their own Active Directory deployment .
If your organization is in one of these scenario , maintain a currently deploy esae architecture in its entirety can still be valid . However , it must be understand that your organization incur extra risk due to the increase technical complexity and operational cost of maintain ESAE . Microsoft is recommends recommend that any organization still using ESAE , or other legacy identity security control , apply extra rigor to monitor , identify , and mitigate any associated risk .
note
While Microsoft no longer recommends an isolated hardened forest model for most scenarios at most organizations, Microsoft still operates a similar architecture internally (and associated support processes and personnel) because of the extreme security requirements for providing trusted cloud services to organizations around the globe.
For customers that have already deployed this architecture to enhance security and/or simplify multi-forest management, there’s no urgency to retire or replace an ESAE implementation if it’s being operated as designed and intended. As with any enterprise systems, you should maintain the software in it by applying security updates and ensuring software is within support lifecycle.
Microsoft also recommends organizations with ESAE / hardened forests adopt the modern privileged access strategy using the rapid modernization plan (RAMP) guidance. This guidance complements an existing ESAE implementation and provides appropriate security for roles not already protected by ESAE including Microsoft Entra administrators, sensitive business users, and standard enterprise users. For more information, see the article Securing privileged access security levels.
When ESAE was originally designed more than 10 years ago, the focus was on-premises environments with Active Directory (AD) serving as the local identity provider. This legacy approach is based on macro-segmentation techniques to achieve least-privilege and doesn’t adequately account for hybrid- or cloud-based environments. Additionally, ESAE and hardened forest implementations focus only on protecting on-premises Windows Server Active Directory administrators (identities) and don’t account for fine-grained identity controls and other techniques contained in the remaining pillars of a modern Zero-Trust architecture. Microsoft has updated its recommendation to cloud-based solutions because they can be deployed more quickly to protect a broader scope of administrative and business-sensitive roles and systems. Additionally, they’re less complex, scalable, and require less capital investment to maintain.
note
Although ESAE is no longer recommended in its entirety, Microsoft realizes that many individual components contained therein are defined as good cyber hygiene (e.g., dedicated Privileged Access Workstations). The deprecation of ESAE is not intended to push organizations to abandon good cyber hygiene practices, only to reinforce updated architectural strategies for protecting privileged identities.
As described in Scenarios for Continued Use, there may be circumstances where cloud migration isn’t attainable (either partially, or in full) due to varying circumstances. For these organizations, if they don’t already have an existing ESAE architecture, Microsoft recommends reducing the attack surface of on-premises AD through increasing the rigor of security for Active Directory and privileged identities. While not an exhaustive list, consider the following high priority recommendations.
For comprehensive guidance on these recommendations, review the Best Practices for Securing Active Directory.
Microsoft recognizes that some entities may not be capable of fully deploying a cloud-based zero-trust architecture due to varying constraints. Some of these constraints were mentioned in the previous section. In lieu of a full deployment, organizations can address risk and make progress towards Zero-Trust while still maintaining legacy equipment or architectures in the environment. In addition to the previously mentioned guidance, the following capabilities may aid in bolstering the security of your environment and serve as a starting point towards adopting a Zero-Trust architecture.
Microsoft Defender for Identity (MDI) (formally Azure Advanced Threat Protection, or ATP) underpins the Microsoft Zero-Trust architecture and focuses on the pillar of identity. This cloud-based solution uses signals from both on-premises AD and Microsoft Entra ID to identify, detect, and investigate threats involving identities. MDI monitors these signals to identify abnormal and malicious behavior from users and entities. Notably, MDI facilitates the ability to visualize an adversary’s path of lateral movement by highlighting how a given account(s) could be used if compromised. MDI’s behavioral analytics and user baseline features are key elements for determining abnormal activity within your AD environment.
note
Although MDI collects signals from on-premises AD it does require a cloud-based connection.
In addition to other guidance describe in this document , organizations is deploy operate in one of the above mention scenario could deploy Microsoft Defender for IoT ( d4iot ) . This solution is features feature a passive network sensor ( virtual or physical ) that enable asset discovery , inventory management , and risk – base behavior analytic for internet of thing ( IoT ) and Operational Technology ( OT ) environment . It can be deploy in on – premise air – gap or cloud – connect environment and has the capacity to perform deep packet inspection on over 100 ICS / OT proprietary network protocol .
Review the following articles: