Skip to main content
Advanced Search
Search Terms
Content Type

Exact Matches
Tag Searches
Date Options
Updated after
Updated before
Created after
Created before

Search Results

32 total results found

Public Documents

DTC MSA Security Baseline

Workstation Lifecycle: The Image Playbook

DTC's Client Portal Public Resources

NinjaOne RMM

Public Documents

Capturing, Storing, and Enhancing Windows Image

Workstation Lifecycle: The Image Playbook

Capturing & Deploying the WIM

Workstation Lifecycle: The Image Playbook

Field Final Installation

Workstation Lifecycle: The Image Playbook

Transfer FSMO Roles Using NTDSUTIL - Windows Server

On any domain controller, click Start, click Run, type Ntdsutil in the Open box, and then click OK. ​Microsoft Windows [Version 5.2.3790] (C) Copyright 1985-2003 Microsoft Corp. C:\WINDOWS>ntdsutil ntdsutil: Type roles, a...

Windows
Server
Active Directory

Overview

DTC MSA Security Baseline

1. Purpose This policy outlines DTC’s baseline security protections that can be universally applied with minimal end-user impact. These protections represent the default security posture DTC offers across systems, while additional or advanced protections ma...

5.1 Identity Management

DTC MSA Security Baseline

5.1 Identity Management User Lifecycle Management: a. Provision unique identifiers for all users and devices.​ b. Deactivate user accounts after 1 year of inactivity.​ c. Disable local administrator accounts after 90 days of inactivity.​ ...

5.2 Compute Resources

DTC MSA Security Baseline

5.2 Compute Resources Role-Based Access Control (RBAC): a. DTC retains and manages credentials for Built-In Administrator, Domain Administrator, and dtcadminaccounts.​ b. DTC creates unique administrator accounts for client-designated decision-m...

5.5 Workstations & Endpoints

DTC MSA Security Baseline

5.5 Workstations & Endpoints Configuration Standards: a. Disable Windows Management Instrumentation (WMI), PowerShell, and Secure Shell (SSH) on workstations. SSH may be temporarily enabled by a DTC technician for troubleshooting and disabled upon ...

6. Additional Services and Clarifications

DTC MSA Security Baseline

6. Additional Services and Clarifications This Baseline Security Protections Policy outlines the standard security measures implemented by DTC. Services or protections not specified herein fall into the following categories:​ Additional Add-Ons: Some s...

5.4 Network Security

DTC MSA Security Baseline

5.4 Network Security a. All remote access is delivered via a Console Remote Access Solution or Network Remote Access solution (i.e., overlay network tunnels) with a Multi-Factor Authentication (MFA) enforcement feature for each end user. b. DTC con...

5.3 Data Protection

DTC MSA Security Baseline

5.3 Data Protection Endpoints: a. Encrypt all Windows servers equipped with a Trusted Platform Module (TPM) using BitLocker with default settings.​ b. Encrypt all Storage Area Networks (SANs) utilizing their latest firmware's default encryptio...

Glossary

DTC MSA Security Baseline

Glossary of Abbreviations ACL: Access Control List​Cyber Readiness Center+1HackerCombat+1 ADUC: Active Directory Users and Computers​cloudsecurelab.github.io+6Interlaced+6Webopedia+6 AES: Advanced Encryption Standard​ API: Application Progr...

Vendor Security & Technical Requirements

Overview DTC Inc. holds all vendors to a high standard, especially those providing products, platforms, or services critical to our operations, client delivery, or infrastructure. This document outlines our baseline requirements for security, technical intero...

Ninja Policy Tree

Public Documents NinjaOne RMM

Managed at - Administration | NinjaOne Windows Server (Default) MSA Windows Server Enterprise Flex Windows Server (unassigned as of 1/3/25) MSA Windows Server DTC - Blackpoint (assigned to DTC org) MSA Windows Server Dental MS...

Imaging an OS with Disk2vhd & Uploading to Azure Storage

Workstation Lifecycle: The Image Playbook Capturing, Storing, and Enhancing Windo...

1. Download Disk2vhd Disk2vhd is a utility from Sysinternals (Microsoft) that creates VHD/VHDX versions of physical disks. Download link: https://learn.microsoft.com/en-us/sysinternals/downloads/disk2vhd 2. Run Disk2vhd to Create the VHDX Steps: Extract th...

🧪 Offline Boot Testing & Generalization of VHDX OS Images

Workstation Lifecycle: The Image Playbook Capturing, Storing, and Enhancing Windo...

VHDX Imaging and Azure Upload Process Guide This guide follows the Disk2vhd imaging and Azure upload process. In networks where the .vhdx is synced to local hypervisor storage, the image must be tested offline to validate bootability before being generalized a...

Capture & Test

Workstation Lifecycle: The Image Playbook Capturing & Deploying the WIM

This guide outlines how to test and deploy a Windows image to a blank VHDX using the netboot.xyz PXE service to boot into Windows PE, and apply the image using DISM. This process assumes the image is hosted on a file share accessible from the ELDERBRAIN hyperv...

🖥️ Deploying a Windows Image to a Physical Workstation via netboot.xyz and Windows PE

Workstation Lifecycle: The Image Playbook Capturing & Deploying the WIM

This guide explains how to deploy a captured Windows image to a physical workstation using the netboot.xyz PXE service to boot into Windows PE, then apply the image using DISM. The image is stored in a network share on the ELDERBRAIN hypervisor at Ridgebrook. ...

🚀 Post-Image Workstation Preparation & Inventory Staging

Workstation Lifecycle: The Image Playbook Capturing & Deploying the WIM

This guide outlines the post-imaging standardization and preparation workflow for all end-user devices. The goal is to ensure each workstation is fully identified, visible in remote management, physically labeled, and neatly staged for final deployment. This p...

🚀 On-prem Staging

Workstation Lifecycle: The Image Playbook Field Final Installation

This guide outlines the post-imaging standardization and preparation workflow for all end-user devices. The goal is to ensure each workstation is fully identified, visible in remote management, physically labeled, and neatly staged for final deployment. This p...

On-Site Workstation Swap & Field Validation

Workstation Lifecycle: The Image Playbook Field Final Installation

🔄 On-Site Workstation Swap & Field Validation This guide outlines the process for returning on-site to the client location and performing the final phase of workstation deployment: replacing the old systems with the newly staged and prepared machines. It inclu...

🧭 End-to-End Workstation Deployment Process

Workstation Lifecycle: The Image Playbook

This document provides an overview of the full workstation deployment lifecycle, from image capture to end-user production handoff. It serves as a reference index and policy for all team members and project stakeholders involved in device rollout and replaceme...

Welcome To The DTC Client Portal

DTC's Client Portal Public Resources

“Simplicity breeds security.” Imagine opening a book that promises to make the complex world of IT support feel as effortless as turning a page. That’s exactly what the DTC Client Portal is designed to do for you and your team. Why this portal exists Our sing...