Advanced Search
Search Results
52 total results found
Public Documents
DTC MSA Security Baseline
Intro to DTC's Knowledge Base
06/10/2025 Nate Smith
Workstation Lifecycle: The Image Playbook
DTC's Client Portal Public Resources
HaloPSA Agent Handbook
ZeroTier
AI Assisted Documenting
Tips & Tricks to use AI for faster documenting!
Clients in HaloPSA
Client Financials
Capture
Restore
Deploy
Contractors
Organization Financials
Transfer FSMO Roles Using NTDSUTIL - Windows Server
On any domain controller, click Start, click Run, type Ntdsutil in the Open box, and then click OK. Microsoft Windows [Version 5.2.3790] (C) Copyright 1985-2003 Microsoft Corp. C:\WINDOWS>ntdsutil ntdsutil: Type roles, a...
Overview
1. Purpose This policy outlines DTC’s baseline security protections that can be universally applied with minimal end-user impact. These protections represent the default security posture DTC offers across systems, while additional or advanced protections ma...
5.1 Identity Management
5.1 Identity Management User Lifecycle Management: a. Provision unique identifiers for all users and devices. b. Deactivate user accounts after 1 year of inactivity. c. Disable local administrator accounts after 90 days of inactivity. ...
5.2 Compute Resources
5.2 Compute Resources Role-Based Access Control (RBAC): a. DTC retains and manages credentials for Built-In Administrator, Domain Administrator, and dtcadminaccounts. b. DTC creates unique administrator accounts for client-designated decision-m...
5.5 Workstations & Endpoints
5.5 Workstations & Endpoints Configuration Standards: a. Disable Windows Management Instrumentation (WMI), PowerShell, and Secure Shell (SSH) on workstations. SSH may be temporarily enabled by a DTC technician for troubleshooting and disabled upon ...
6. Additional Services and Clarifications
6. Additional Services and Clarifications This Baseline Security Protections Policy outlines the standard security measures implemented by DTC. Services or protections not specified herein fall into the following categories: Additional Add-Ons: Some s...
5.4 Network Security
5.4 Network Security a. All remote access is delivered via a Console Remote Access Solution or Network Remote Access solution (i.e., overlay network tunnels) with a Multi-Factor Authentication (MFA) enforcement feature for each end user. b. DTC con...
5.3 Data Protection
5.3 Data Protection Endpoints: a. Encrypt all Windows servers equipped with a Trusted Platform Module (TPM) using BitLocker with default settings. b. Encrypt all Storage Area Networks (SANs) utilizing their latest firmware's default encryptio...
Glossary
Glossary of Abbreviations ACL: Access Control ListCyber Readiness Center+1HackerCombat+1 ADUC: Active Directory Users and Computerscloudsecurelab.github.io+6Interlaced+6Webopedia+6 AES: Advanced Encryption Standard API: Application Progr...
Vendor Security & Technical Requirements
Overview DTC Inc. holds all vendors to a high standard, especially those providing products, platforms, or services critical to our operations, client delivery, or infrastructure. This document outlines our baseline requirements for security, technical intero...
🧠 Guide: How to Create AI Assisted Knowledge Base Articles in Bookstack
📘 Purpose This guide helps DTC team members properly document and migrate non-client-specific technical knowledge into Bookstack. This ensures consistent formatting, easy access, and high value for internal teams. Note: Bookstack is the official place for gen...
🧪 Generalize "Re-Used" Images
1. 🛠️ Manual Prep: Enter Audit Mode First Before proceeding with automation, you'll need to enter System Audit Mode: Open Terminal, PowerShell, or Command Prompt as Administrator. Run the following to clear or set the Administrator password: net user administ...
🧭 End-to-End Workstation Deployment Process
Introduction Workstation Lifecycle: The Image Playbook is DTC’s no‑nonsense recipe for shepherding a workstation from “in production” to “on the shelf” without data‑loss drama. The whole flow is anchored by MSP360 Backup, steered through a single NinjaRMM scr...
Welcome To The DTC Client Portal
“Simplicity breeds security.” Imagine opening a book that promises to make the complex world of IT support feel as effortless as turning a page. That’s exactly what the DTC Client Portal is designed to do for you and your team. Why this portal exists Our sing...
DTC Client Portal — End-User & Technician Guide
Last updated 2025-06-17 1 | What you see after sign-in UI element Purpose Quick tip Global search bar (top-centre) Search tickets, knowledge-base articles and FAQs. Enter a keyword such as printer offline or a ticket number. Tile grid (8 large but...
Client Portal FAQ
Getting Started What is the Client Portal? The Client Portal is your all-in-one platform to submit support tickets, communicate with our team, access helpful resources, and request IT services or solutions — all in one place. How do I access the Client Portal...
Client "Top Level"
What Is “Top Level” in HaloPSA? Definition “Top Level” is a custom, extra organizational field in HaloPSA that lets you group Clients however you like. How We Use It at DTC We combine two pieces of information into every client’s Top Level: Industry (e.g....
Tax Rules
1. What a Tax Rule IsTax Rule (HaloPSA) – an automation that, at the instant an invoice is saved or regenerated, evaluates defined conditions (Top Level, Item Group, etc.) and writes the correct tax onto each invoice line.Essentials• Runs only on Save / Regene...
Capture With MSP360
In our workstation lifecycle strategy, the Capture phase ensures every device has a valid, restorable image leading up to its scheduled replacement. We automate this through MSP360 and a custom script deployed via NinjaRMM, enabling us to capture the current s...
Restore From Cloud At Ridgebrook
🔧 Bare Metal Recovery from MSP360 (Staging Backup) 1. Boot into BIOS Setup Boot into the BIOS and make the following config changes: 1A. Disable Secure Boot - select Boot Configuration and turn the slider OFF to disable secure boot. Click Yes to confirm. ...