Product Guides

Interactive walkthroughs to explore Forestall workflows—at your pace.

Product GuideForestall walkthrough

Start Here

Identity Attack Surface ManagementFeb 2026

Getting Started: First Scan to First Findings

Run your first identity scan and review initial findings in under five minutes.

Getting StartedVisibility
4 minSysadminBeginner
Attack Path ManagementJan 2026

Attack Paths: Find the Fastest Route to Tier-0

Discover and prioritize attack paths that reach Tier-0 assets in your environment.

Attack PathsTier-0
5 minBlue TeamIntermediate
ComplianceDec 2025

Compliance: Generate CIS/Microsoft Baseline Scorecards

Generate GPO compliance scorecards against CIS and Microsoft baselines instantly.

ComplianceBaselines
4 minCISOBeginner
Identity Attack Surface ManagementFeb 2026

Getting Started: First Scan to First Findings

Run your first identity scan and review initial findings in under five minutes.

Getting StartedVisibility
4 minSysadminBeginner
Risk AssessmentFeb 2026

Executive Overview: Risk Posture in 2 Minutes

Get a high-level view of identity risk posture and key metrics for leadership.

ExecutiveReporting
2 minCISOBeginner
Attack Path ManagementJan 2026

Attack Paths: Find the Fastest Route to Tier-0

Discover and prioritize attack paths that reach Tier-0 assets in your environment.

Attack PathsTier-0
5 minBlue TeamIntermediate
Identity Attack Surface ManagementJan 2026

Shadow Admins: Detect Hidden Privilege

Find identities with effective admin access that bypass standard privilege groups.

PrivilegeShadow Admins
4 minIAMIntermediate
Credential DiscoveryDec 2025

Credential Discovery: Locate Exposed Secrets Safely

Scan shares and configs for exposed credentials without touching production data.

CredentialsExposure
6 minBlue TeamIntermediate
ComplianceDec 2025

Compliance: Generate CIS/Microsoft Baseline Scorecards

Generate GPO compliance scorecards against CIS and Microsoft baselines instantly.

ComplianceBaselines
4 minCISOBeginner
Reporting AutomationNov 2025

Remediation Workflow: From Finding to Ticket

Turn a security finding into an assigned remediation task with tracking.

RemediationWorkflow
3 minSysadminBeginner
Risk AssessmentNov 2025

Risk Triage: Prioritize What Matters First

Use risk scoring to focus remediation effort on the highest-impact exposures.

PrioritizationRisk
4 minBlue TeamIntermediate
Identity Attack Surface ManagementOct 2025

Multi-Forest Visibility: Consolidated Identity Graph

Explore a unified identity graph spanning multiple AD forests and domains.

HybridMulti-forest
6 minIAMAdvanced
Digital Forensic & Incident ResponseOct 2025

Incident Response: Identity Change Investigation

Investigate identity-related changes during a security incident with full timeline context.

InvestigationDFIR
5 minIncident ResponseIntermediate

Prefer a guided session?

We'll walk you through your environment and outline a PoC.

We respect your privacy

We use cookies to keep this site secure and working properly. With your permission, we also use optional cookies to understand usage and improve the experience. Cookie Policy

You can change your choice at any time.

Product Guides | Forestall