Frequently Asked Questions
Answers about ForestGuardian, how it works, and how we handle your data. Can't find what you need? Contact us.
Platform
What is ForestGuardian?
Forest Guardian is purpose built for small teams, public sector entities and MSPs to manage their AD environments. It continuously uncovers and prioritizes identity risks in Active Directory and hybrid environments. It shows how attackers could move through your environment and highlights the smallest set of changes that remove that risk.
How is it different from a SIEM or EDR?
SIEM and EDR focus on logs, alerts, and endpoint activity. ForestGuardian focuses on identity, showing how users, groups, permissions, and misconfigurations combine into real attack chains that those tools do not surface. ForestGuardian is designed to run alongside them.
Is ForestGuardian a replacement for penetration testing?
No. It complements penetration testing. A pentest shows what is exploitable at a point in time, while ForestGuardian tracks how that risk changes over time and helps reduce exposure between tests.
Does ForestGuardian use AI agents or exploit our environment?
No. ForestGuardian analyzes identity and configuration data to model attack chains. It does not deploy agents across systems or perform live exploitation. This makes it safe for production environments and suitable for organizations with strict change-control or compliance requirements.
Deployment
How does ForestGuardian collect data?
ForestGuardian uses a lightweight collector that gathers identity and configuration data and sends it securely for analysis.
Does the collector require Domain Admin rights?
No. Most collection works with a standard domain user account. Optional deeper checks, such as full file-share analysis and password auditing, can be enabled with elevated access if needed.
What operating systems can the collector run on?
Windows, Linux, and macOS. It can run from both domain-joined and non-domain-joined systems.
Does ForestGuardian make changes in our environment?
No. ForestGuardian is fully read-only and never modifies configurations, accounts, or permissions.
How often does it scan?
Scans can run on demand or on a schedule. ForestGuardian also tracks changes between scans to highlight drift and newly introduced risk.
Where is ForestGuardian hosted and where is our data stored?
ForestGuardian securely processes identity and configuration data required for analysis. We only collect what is necessary to identify risk, and data handling can be aligned to your security, compliance, and regional requirements. ForestGuardian does not require full directory replication or storage of sensitive credentials.
What is the performance impact on domain controllers?
The collector is designed to be low-impact. It reads directory data without placing a significant load on a domain controller’s CPU or affecting normal operations.
Detections
What types of issues does ForestGuardian detect?
Misconfigurations, privilege escalation paths, credential risks, and exposure across users, groups, ACLs, GPOs, trusts, and file shares.
What are attack chains?
Attack chains show how smaller issues combine into a full compromise path. For example, a standard user with elevated group membership gaining access to a system, pivoting through misconfigured permissions, and obtaining Domain Admin-level access.
What is the Identity Blueprint?
A visual map of your environment showing how users, groups, permissions, and trusts connect, with risk overlaid.
What is configuration drift?
ForestGuardian tracks changes such as new privileged accounts, group membership updates, ACL changes, and GPO modifications, so you can see how risk evolves over time.
Does it help us prioritize fixes?
Yes. It highlights the minimum set of changes that break the most dangerous attack paths so teams can focus on what actually reduces risk.
Reporting
Does ForestGuardian check for weak or compromised passwords?
Yes. Optional checks identify weak passwords, reuse, and potential exposure to known breaches using curated datasets of previously exposed credentials. Passwords do not leave your network, are not stored in clear text, and only risk indicators and findings are retained.
Can it analyze file shares and data exposure?
Yes. By default, it shows what a standard user can access. With elevated access, it can analyze all shares to identify sensitive data exposure and over-permissioning.
Does it detect credential exposure inside files?
Yes. It can identify risky files and patterns that may contain credentials or other sensitive data.
What does reporting look like?
Reports include an executive summary, detailed technical findings, attack chain visualizations, and prioritized remediation guidance. Change reports show improvements or regressions over time. Reports can be exported and shared, and findings can be used alongside your existing workflows via integrations such as email and webhooks.
Can we validate fixes?
Yes. Findings can be rechecked on demand or during the next scan.
Can ForestGuardian integrate with our workflows?
Yes. Findings and alerts can be used alongside existing processes and tooling, including email and webhook-based integrations.
Security
How does ForestGuardian handle security and privacy?
ForestGuardian is designed around security and privacy best practices, including minimal data collection, secure transmission, and read-only operation. We work with customers to meet internal security and compliance requirements and can support security reviews during onboarding.
Will ForestGuardian impact production systems?
No. It only reads data from Active Directory and does not perform intrusive actions or any changes to the environment.
Is data collected securely?
Yes. Only the identity and configuration data required for analysis are collected and transmitted securely.
Can it run in restricted environments?
Yes. The collector can run from non-domain-joined systems and across different operating systems.
Small Teams
Is ForestGuardian a fit for small or resource-constrained teams?
Yes. It helps small teams quickly identify their highest risk issues and focus on fixes that matter without adding operational overhead.
How much time will it take us to manage?
After setup, teams typically review new attack chains and drift on a regular cadence, focusing only on prioritized fixes.
We do not have deep AD expertise. Will we still get value?
Yes. Findings include clear remediation guidance so teams can safely fix issues without needing deep specialization.
Enterprise
How does ForestGuardian help before rolling out EDR, PAM, or Zero Trust?
It identifies identity weaknesses that could bypass those controls, including excessive privileges and hidden attack paths. This lets you enforce least privilege and build a solid foundation before adding more security layers.
Can it support enterprise-wide security initiatives?
Yes. It helps continuously measure and improve identity security posture and track progress over time.
Does it work in complex environments?
Yes. It is designed for large and hybrid environments with evolving identity relationships and infrastructure.
MSPs & MSSPs
Is ForestGuardian suitable for MSPs and MSSPs?
Yes. It supports multi-tenant environments, enabling providers to manage multiple clients from a single platform with separate workspaces, per-tenant reporting, and controlled access for internal teams and client stakeholders.
How does it help us deliver value to clients?
It produces clear, client-ready reports with prioritized findings and attack chain visibility, making it easy to demonstrate risk reduction over time.
Can we use it across different client environments?
Yes. The collector works across different operating systems and deployment models, including restricted environments.
Getting Started
How long does it take to get started?
Deployment is quick. The collector can be run within minutes, and initial results are available shortly after. Most customers are up and running, reviewing their first attack chains, in under an hour.
What does onboarding look like?
Download, configure, and run the collector, review findings, and begin prioritizing fixes. No complex setup is required. The collector can run on a single existing machine in the network; no additional servers or infrastructure are required.
Do you offer guidance on remediation?
Yes. Every finding includes clear remediation steps, and additional guidance can be provided as needed.
What will we see in a demo?
A walkthrough of attack chains, findings, and how ForestGuardian prioritizes fixes in a real or sample environment.
Do you need access to our environment for a demo?
No. A demo can be done using sample environments or by mapping to your setup.