Advanced Search
Search Results
32 total results found
Public Documents
DTC MSA Security Baseline
Workstation Lifecycle: The Image Playbook
DTC's Client Portal Public Resources
NinjaOne RMM
Capturing, Storing, and Enhancing Windows Image
Capturing & Deploying the WIM
Field Final Installation
Transfer FSMO Roles Using NTDSUTIL - Windows Server
On any domain controller, click Start, click Run, type Ntdsutil in the Open box, and then click OK. Microsoft Windows [Version 5.2.3790] (C) Copyright 1985-2003 Microsoft Corp. C:\WINDOWS>ntdsutil ntdsutil: Type roles, a...
Overview
1. Purpose This policy outlines DTC’s baseline security protections that can be universally applied with minimal end-user impact. These protections represent the default security posture DTC offers across systems, while additional or advanced protections ma...
5.1 Identity Management
5.1 Identity Management User Lifecycle Management: a. Provision unique identifiers for all users and devices. b. Deactivate user accounts after 1 year of inactivity. c. Disable local administrator accounts after 90 days of inactivity. ...
5.2 Compute Resources
5.2 Compute Resources Role-Based Access Control (RBAC): a. DTC retains and manages credentials for Built-In Administrator, Domain Administrator, and dtcadminaccounts. b. DTC creates unique administrator accounts for client-designated decision-m...
5.5 Workstations & Endpoints
5.5 Workstations & Endpoints Configuration Standards: a. Disable Windows Management Instrumentation (WMI), PowerShell, and Secure Shell (SSH) on workstations. SSH may be temporarily enabled by a DTC technician for troubleshooting and disabled upon ...
6. Additional Services and Clarifications
6. Additional Services and Clarifications This Baseline Security Protections Policy outlines the standard security measures implemented by DTC. Services or protections not specified herein fall into the following categories: Additional Add-Ons: Some s...
5.4 Network Security
5.4 Network Security a. All remote access is delivered via a Console Remote Access Solution or Network Remote Access solution (i.e., overlay network tunnels) with a Multi-Factor Authentication (MFA) enforcement feature for each end user. b. DTC con...
5.3 Data Protection
5.3 Data Protection Endpoints: a. Encrypt all Windows servers equipped with a Trusted Platform Module (TPM) using BitLocker with default settings. b. Encrypt all Storage Area Networks (SANs) utilizing their latest firmware's default encryptio...
Glossary
Glossary of Abbreviations ACL: Access Control ListCyber Readiness Center+1HackerCombat+1 ADUC: Active Directory Users and Computerscloudsecurelab.github.io+6Interlaced+6Webopedia+6 AES: Advanced Encryption Standard API: Application Progr...
Vendor Security & Technical Requirements
Overview DTC Inc. holds all vendors to a high standard, especially those providing products, platforms, or services critical to our operations, client delivery, or infrastructure. This document outlines our baseline requirements for security, technical intero...
Ninja Policy Tree
Managed at - Administration | NinjaOne Windows Server (Default) MSA Windows Server Enterprise Flex Windows Server (unassigned as of 1/3/25) MSA Windows Server DTC - Blackpoint (assigned to DTC org) MSA Windows Server Dental MS...
Imaging an OS with Disk2vhd & Uploading to Azure Storage
1. Download Disk2vhd Disk2vhd is a utility from Sysinternals (Microsoft) that creates VHD/VHDX versions of physical disks. Download link: https://learn.microsoft.com/en-us/sysinternals/downloads/disk2vhd 2. Run Disk2vhd to Create the VHDX Steps: Extract th...
🧪 Offline Boot Testing & Generalization of VHDX OS Images
VHDX Imaging and Azure Upload Process Guide This guide follows the Disk2vhd imaging and Azure upload process. In networks where the .vhdx is synced to local hypervisor storage, the image must be tested offline to validate bootability before being generalized a...
Capture & Test
This guide outlines how to test and deploy a Windows image to a blank VHDX using the netboot.xyz PXE service to boot into Windows PE, and apply the image using DISM. This process assumes the image is hosted on a file share accessible from the ELDERBRAIN hyperv...
🖥️ Deploying a Windows Image to a Physical Workstation via netboot.xyz and Windows PE
This guide explains how to deploy a captured Windows image to a physical workstation using the netboot.xyz PXE service to boot into Windows PE, then apply the image using DISM. The image is stored in a network share on the ELDERBRAIN hypervisor at Ridgebrook. ...
🚀 Post-Image Workstation Preparation & Inventory Staging
This guide outlines the post-imaging standardization and preparation workflow for all end-user devices. The goal is to ensure each workstation is fully identified, visible in remote management, physically labeled, and neatly staged for final deployment. This p...
🚀 On-prem Staging
This guide outlines the post-imaging standardization and preparation workflow for all end-user devices. The goal is to ensure each workstation is fully identified, visible in remote management, physically labeled, and neatly staged for final deployment. This p...
On-Site Workstation Swap & Field Validation
🔄 On-Site Workstation Swap & Field Validation This guide outlines the process for returning on-site to the client location and performing the final phase of workstation deployment: replacing the old systems with the newly staged and prepared machines. It inclu...
🧭 End-to-End Workstation Deployment Process
This document provides an overview of the full workstation deployment lifecycle, from image capture to end-user production handoff. It serves as a reference index and policy for all team members and project stakeholders involved in device rollout and replaceme...
Welcome To The DTC Client Portal
“Simplicity breeds security.” Imagine opening a book that promises to make the complex world of IT support feel as effortless as turning a page. That’s exactly what the DTC Client Portal is designed to do for you and your team. Why this portal exists Our sing...