Active Directory · Part 2

Active Directory – Part 2: Domains, Trees & Forests

Part 1 covered what Active Directory is and how it works inside a single environment. Part 2 goes one level up: how AD scales across domains, trees, forests, acquisitions, and enterprise boundaries.

Quick idea: A domain is where identities live, a tree is a group of related domains, and a forest is the highest-level Active Directory boundary.
Domain

The core administrative unit where users, computers, policies, and authentication live.

Tree

A group of domains that share a continuous DNS namespace and automatic trusts.

Forest

The top-level AD container and the true security boundary.

What Is a Domain?

A domain is the fundamental unit of Active Directory. Everything from Part 1 — the Domain Controller, Kerberos authentication, Group Policy, objects, and attributes — lives inside a domain.

Think of a domain as a single, self-contained administrative boundary. Most small-to-medium organizations run a single domain with one DNS namespace, one set of Domain Controllers, and one shared identity system.

Name

Every domain has a DNS name, such as corp.contoso.com or london.fabrikam.com.

Boundary

Policies, permissions, and administration are scoped inside the domain unless access is explicitly granted elsewhere.

Security

A domain is not the true security boundary. The forest is the real security boundary in AD.

What Is a Tree?

A tree is a collection of domains that share a contiguous DNS namespace and are connected by automatic trust relationships. The moment you add a child domain to an existing domain, you have created a tree.

contoso.com
├── europe.contoso.com
│   └── uk.europe.contoso.com
└── asia.contoso.com

All of these domains form a single tree because they share the contoso.com namespace. The structure is literally tree-like: a root domain at the top, with branches spreading below.

Trusts: How Domains Talk to Each Other

When two domains exist in the same tree, Active Directory automatically creates a trust relationship between them. A trust means one domain accepts that another domain has already authenticated its users properly.

Important: A trust does not automatically grant access. It only makes cross-domain access possible. Permissions still need to be assigned explicitly.

Trusts inside a tree are usually transitive and two-way. If domain A trusts domain B, and domain B trusts domain C, then domain A can trust domain C through the chain.

What Is a Forest?

A forest is the top-level container in Active Directory. It is a collection of one or more trees that share a common schema, configuration, and Global Catalog, but they do not need to share the same DNS namespace.

The first domain created in an AD deployment becomes the forest root domain. This is a special domain. It cannot be removed without destroying the forest, and it holds forest-wide administrative roles such as the Schema Master and Domain Naming Master.

The Forest as the True Security Boundary

The forest, not the domain, is where Active Directory draws the hard security line. This matters because a highly privileged administrator in one domain may be able to escalate or affect other domains inside the same forest.

If an organization needs genuine separation — for example, after an acquisition where two IT teams must remain isolated — separate forests are usually the cleaner security design.

The Real-World Company Analogy

Imagine a large company called Meridian Group. It owns multiple businesses: Meridian Financial, Meridian Logistics, and Apex Technologies.

Meridian Logistics is simple. It runs one domain: meridian-logistics.com. One office, one IT team, one domain.

Meridian Financial is more complex. It has regional IT teams in the US, APAC, and EMEA. It runs a tree with meridian-financial.com as the root and child domains such as us.meridian-financial.com, apac.meridian-financial.com, and emea.meridian-financial.com.

Apex Technologies was acquired, but it kept its own AD environment. It runs a separate forest: apex-tech.internal. Access between Meridian and Apex must be controlled using a forest trust.

Interactive Explorer

The diagram below shows how domains, trees, forests, and trusts fit together in a real enterprise-style structure.

AD Structure
Forest
Tree
Domain
Trust
FOREST: meridian.corp TREE: meridian-financial.com TREE: meridian-logistics.com meridian-financial.com Tree root / Forest root us. North America emea. Europe / Middle East apac. Asia Pacific uk.emea. United Kingdom meridian-logistics.com Single domain — tree root SEPARATE FOREST: apex-tech.internal forest trust apex-tech.internal Separate forest

Domains, Trees & Forests

This diagram shows how a real enterprise can structure Active Directory. A forest contains trees, trees contain domains, and domains contain users, computers, groups, and policies.

The separate forest at the bottom represents an acquired company that kept its own AD security boundary.

click any domain to explore it
Real-world scenarios

A UK analyst in uk.emea.meridian-financial.com needs access to a report in us.meridian-financial.com. Because both domains are in the same tree, no manual trust needs to be created. Permissions still need to be assigned, but authentication can flow through the trust chain.

A baseline password policy can be applied higher in the structure, while regional domains apply additional requirements where needed. This is why OU and domain design matters before Group Policy becomes complex.

Apex Technologies keeps a separate forest after acquisition. A selective forest trust allows controlled access without merging both AD environments into one security boundary.

Schema changes apply at the forest level. If Meridian extends its schema for a major application, that change affects domains inside the Meridian forest, but not the separate Apex forest.

What This Means in Practice

Once you understand domains, trees, and forests, you can read an organization’s AD structure and quickly understand where administrative boundaries exist, what cross-domain access is possible, and where the true security perimeter sits.

Key takeaway: Domains organize administration, trees organize related namespaces, and forests define the real security boundary. If you understand that difference, AD architecture becomes much easier to troubleshoot and explain.
Next in this series

Active Directory – Part 3 will continue the fundamentals series and go deeper into the next core building blocks of AD.