Skip to main content

Recently Updated Pages

Client "Top Level"

What Is “Top Level” in HaloPSA? Definition “Top Level” is a custom, extra organizational field ...

Updated 1 week ago by Nate Smith

🧪 Offline Boot Testing & Generalization of VHDX OS Images

Workstation Lifecycle: The Image Playbook Capturing, Storing, and Enhancing Windo...

VHDX Imaging and Azure Upload Process Guide This guide follows the Disk2vhd imaging and Azure upl...

Updated 1 week ago by Nate Smith

Client Portal FAQ

DTC's Client Portal Public Resources

What user roles are there? Role Description Admin Full access — can view and manage every...

Updated 1 week ago by Nate Smith

🛠️ Imaging a Physical Workstation (On-Prem)

Workstation Lifecycle: The Image Playbook Field Final Installation

Boot Path Best For USB – Hiren’s BootCD PE Networks without PXE/TFTP, restricted sites, on...

Updated 1 week ago by Nate Smith

🖥️ Deploying a Windows Image to a Physical Workstation via netboot.xyz and Windows PE

Workstation Lifecycle: The Image Playbook Capturing & Deploying the WIM

This guide explains how to deploy a captured Windows image to a physical workstation using the ne...

Updated 1 week ago by Nate Smith

DTC Client Portal — End-User & Technician Guide

DTC's Client Portal Public Resources

Last updated 2025-06-17 1  |  What you see after sign-in UI element Purpose Quick tip Gl...

Updated 2 weeks ago by Nate Smith

Welcome To The DTC Client Portal

DTC's Client Portal Public Resources

“Simplicity breeds security.” Imagine opening a book that promises to make the complex world of ...

Updated 2 weeks ago by Nate Smith

🧭 End-to-End Workstation Deployment Process

Workstation Lifecycle: The Image Playbook

This document provides an overview of the full workstation deployment lifecycle, from image captu...

Updated 2 weeks ago by Nate Smith

On-Site Workstation Swap & Field Validation

Workstation Lifecycle: The Image Playbook Field Final Installation

🔄 On-Site Workstation Swap & Field Validation This guide outlines the process for returning on-si...

Updated 2 weeks ago by Nate Smith

🚀 On-prem Staging

Workstation Lifecycle: The Image Playbook Field Final Installation

This guide outlines the post-imaging standardization and preparation workflow for all end-user de...

Updated 2 weeks ago by Nate Smith

🚀 Post-Image Workstation Preparation & Inventory Staging

Workstation Lifecycle: The Image Playbook Capturing & Deploying the WIM

This guide outlines the post-imaging standardization and preparation workflow for all end-user de...

Updated 2 weeks ago by Nate Smith

Capture & Test

Workstation Lifecycle: The Image Playbook Capturing & Deploying the WIM

This guide outlines how to test and deploy a Windows image to a blank VHDX using the netboot.xyz ...

Updated 2 weeks ago by Nate Smith

Imaging an OS with Disk2vhd & Uploading to Azure Storage

Workstation Lifecycle: The Image Playbook Capturing, Storing, and Enhancing Windo...

1. Download Disk2vhd Disk2vhd is a utility from Sysinternals (Microsoft) that creates VHD/VHDX ve...

Updated 2 weeks ago by Nate Smith

Ninja Policy Tree

Public Documents NinjaOne RMM

Managed at - Administration | NinjaOne Windows Server (Default) MSA Win...

Updated 1 month ago by Mike Cooper

Vendor Security & Technical Requirements

Overview DTC Inc. holds all vendors to a high standard, especially those providing products, pla...

Updated 2 months ago by Nate Smith

5.3 Data Protection

DTC MSA Security Baseline

5.3 Data Protection Endpoints: a. Encrypt all Windows servers equipped with a Trusted...

Updated 3 months ago by Nate Smith

5.5 Workstations & Endpoints

DTC MSA Security Baseline

5.5 Workstations & Endpoints Configuration Standards: a. Disable Windows Management I...

Updated 3 months ago by Mike Cooper

Overview

DTC MSA Security Baseline

1. Purpose This policy outlines DTC’s baseline security protections that can be universally ap...

Updated 3 months ago by Mike Cooper

6. Additional Services and Clarifications

DTC MSA Security Baseline

6. Additional Services and Clarifications This Baseline Security Protections Policy outlines t...

Updated 3 months ago by Mike Cooper

5.2 Compute Resources

DTC MSA Security Baseline

5.2 Compute Resources Role-Based Access Control (RBAC): a. DTC retains and manages cred...

Updated 3 months ago by Mike Cooper