Recently Updated Pages
Client "Top Level"
What Is “Top Level” in HaloPSA? Definition “Top Level” is a custom, extra organizational field ...
🧪 Offline Boot Testing & Generalization of VHDX OS Images
VHDX Imaging and Azure Upload Process Guide This guide follows the Disk2vhd imaging and Azure upl...
Client Portal FAQ
What user roles are there? Role Description Admin Full access — can view and manage every...
🛠️ Imaging a Physical Workstation (On-Prem)
Boot Path Best For USB – Hiren’s BootCD PE Networks without PXE/TFTP, restricted sites, on...
🖥️ Deploying a Windows Image to a Physical Workstation via netboot.xyz and Windows PE
This guide explains how to deploy a captured Windows image to a physical workstation using the ne...
DTC Client Portal — End-User & Technician Guide
Last updated 2025-06-17 1 | What you see after sign-in UI element Purpose Quick tip Gl...
Welcome To The DTC Client Portal
“Simplicity breeds security.” Imagine opening a book that promises to make the complex world of ...
🧭 End-to-End Workstation Deployment Process
This document provides an overview of the full workstation deployment lifecycle, from image captu...
On-Site Workstation Swap & Field Validation
🔄 On-Site Workstation Swap & Field Validation This guide outlines the process for returning on-si...
🚀 On-prem Staging
This guide outlines the post-imaging standardization and preparation workflow for all end-user de...
🚀 Post-Image Workstation Preparation & Inventory Staging
This guide outlines the post-imaging standardization and preparation workflow for all end-user de...
Capture & Test
This guide outlines how to test and deploy a Windows image to a blank VHDX using the netboot.xyz ...
Imaging an OS with Disk2vhd & Uploading to Azure Storage
1. Download Disk2vhd Disk2vhd is a utility from Sysinternals (Microsoft) that creates VHD/VHDX ve...
Ninja Policy Tree
Managed at - Administration | NinjaOne Windows Server (Default) MSA Win...
Vendor Security & Technical Requirements
Overview DTC Inc. holds all vendors to a high standard, especially those providing products, pla...
5.3 Data Protection
5.3 Data Protection Endpoints: a. Encrypt all Windows servers equipped with a Trusted...
5.5 Workstations & Endpoints
5.5 Workstations & Endpoints Configuration Standards: a. Disable Windows Management I...
Overview
1. Purpose This policy outlines DTC’s baseline security protections that can be universally ap...
6. Additional Services and Clarifications
6. Additional Services and Clarifications This Baseline Security Protections Policy outlines t...
5.2 Compute Resources
5.2 Compute Resources Role-Based Access Control (RBAC): a. DTC retains and manages cred...