Advanced Search
Search Results
110 total results found
Public Documents
Transfer FSMO Roles Using NTDSUTIL - Windows Server
On any domain controller, click Start, click Run, type Ntdsutil in the Open box, and then click OK. Microsoft Windows [Version 5.2.3790] (C) Copyright 1985-2003 Microsoft Corp. C:\WINDOWS>ntdsutil ntdsutil: Type roles, a...
DTC MSA Security Baseline
Intro to DTC's Knowledge Base
06/10/2025 Nate Smith
DTC's Client Public Resources
ZeroTier
DTC VS Others
AI Assisted Documenting
Tips & Tricks to use AI for faster documenting!
Your Computer
Overview
1. Purpose This policy outlines DTC’s baseline security protections that can be universally applied with minimal end-user impact. These protections represent the default security posture DTC offers across systems, while additional or advanced protections ma...
5.1 Identity Management
5.1 Identity Management User Lifecycle Management: a. Provision unique identifiers for all users and devices. b. Deactivate user accounts after 1 year of inactivity. c. Disable local administrator accounts after 90 days of inactivity. ...
5.2 Compute Resources
5.2 Compute Resources Role-Based Access Control (RBAC): a. DTC retains and manages credentials for Built-In Administrator, Domain Administrator, and dtcadminaccounts. b. DTC creates unique administrator accounts for client-designated decision-m...
5.5 Workstations & Endpoints
5.5 Workstations & Endpoints Configuration Standards: a. Disable Windows Management Instrumentation (WMI), PowerShell, and Secure Shell (SSH) on workstations. SSH may be temporarily enabled by a DTC technician for troubleshooting and disabled upon ...
6. Additional Services and Clarifications
6. Additional Services and Clarifications This Baseline Security Protections Policy outlines the standard security measures implemented by DTC. Services or protections not specified herein fall into the following categories: Additional Add-Ons: Some s...
5.4 Network Security
5.4 Network Security a. All remote access is delivered via a Console Remote Access Solution or Network Remote Access solution (i.e., overlay network tunnels) with a Multi-Factor Authentication (MFA) enforcement feature for each end user. b. DTC con...
5.3 Data Protection
5.3 Data Protection Endpoints: a. Encrypt all Windows servers equipped with a Trusted Platform Module (TPM) using BitLocker with default settings. b. Encrypt all Storage Area Networks (SANs) utilizing their latest firmware's default encryptio...
Glossary
Glossary of Abbreviations ACL: Access Control ListCyber Readiness Center+1HackerCombat+1 ADUC: Active Directory Users and Computerscloudsecurelab.github.io+6Interlaced+6Webopedia+6 AES: Advanced Encryption Standard API: Application Progr...