Skip to main content
Advanced Search
Search Terms
Content Type

Exact Matches
Tag Searches
Date Options
Updated after
Updated before
Created after
Created before

Search Results

69 total results found

Overview

DTC MSA Security Baseline

1. Purpose This policy outlines DTC’s baseline security protections that can be universally applied with minimal end-user impact. These protections represent the default security posture DTC offers across systems, while additional or advanced protections ma...

5.1 Identity Management

DTC MSA Security Baseline

5.1 Identity Management User Lifecycle Management: a. Provision unique identifiers for all users and devices.​ b. Deactivate user accounts after 1 year of inactivity.​ c. Disable local administrator accounts after 90 days of inactivity.​ ...

5.2 Compute Resources

DTC MSA Security Baseline

5.2 Compute Resources Role-Based Access Control (RBAC): a. DTC retains and manages credentials for Built-In Administrator, Domain Administrator, and dtcadminaccounts.​ b. DTC creates unique administrator accounts for client-designated decision-m...

5.5 Workstations & Endpoints

DTC MSA Security Baseline

5.5 Workstations & Endpoints Configuration Standards: a. Disable Windows Management Instrumentation (WMI), PowerShell, and Secure Shell (SSH) on workstations. SSH may be temporarily enabled by a DTC technician for troubleshooting and disabled upon ...

6. Additional Services and Clarifications

DTC MSA Security Baseline

6. Additional Services and Clarifications This Baseline Security Protections Policy outlines the standard security measures implemented by DTC. Services or protections not specified herein fall into the following categories:​ Additional Add-Ons: Some s...

5.4 Network Security

DTC MSA Security Baseline

5.4 Network Security a. All remote access is delivered via a Console Remote Access Solution or Network Remote Access solution (i.e., overlay network tunnels) with a Multi-Factor Authentication (MFA) enforcement feature for each end user. b. DTC con...

5.3 Data Protection

DTC MSA Security Baseline

5.3 Data Protection Endpoints: a. Encrypt all Windows servers equipped with a Trusted Platform Module (TPM) using BitLocker with default settings.​ b. Encrypt all Storage Area Networks (SANs) utilizing their latest firmware's default encryptio...

Glossary

DTC MSA Security Baseline

Glossary of Abbreviations ACL: Access Control List​Cyber Readiness Center+1HackerCombat+1 ADUC: Active Directory Users and Computers​cloudsecurelab.github.io+6Interlaced+6Webopedia+6 AES: Advanced Encryption Standard​ API: Application Progr...

Vendor Security & Technical Requirements

Overview DTC Inc. holds all vendors to a high standard, especially those providing products, platforms, or services critical to our operations, client delivery, or infrastructure. This document outlines our baseline requirements for security, technical intero...

🧠 Guide: How to Create AI Assisted Knowledge Base Articles in Bookstack

Intro to DTC's Knowledge Base AI Assisted Documenting

📘 Purpose This guide helps DTC team members properly document and migrate non-client-specific technical knowledge into Bookstack. This ensures consistent formatting, easy access, and high value for internal teams. Note: Bookstack is the official place for gen...

Welcome To The DTC Client Portal

DTC's Client Public Resources Client Self-Service Halo Portal

“Simplicity breeds security.” Imagine opening a book that promises to make the complex world of IT support feel as effortless as turning a page. That’s exactly what the DTC Client Portal is designed to do for you and your team. Why this portal exists Our sing...

Client Portal FAQ

DTC's Client Public Resources Client Self-Service Halo Portal

Getting Started What is the Client Portal? The Client Portal is your all-in-one platform to submit support tickets, communicate with our team, access helpful resources, and request IT services or solutions — all in one place. How do I access the Client Po...

Client "Top Level"

What Is “Top Level” in HaloPSA? Definition “Top Level” is a custom, extra organizational field in HaloPSA that lets you group Clients however you like. How We Use It at DTC We combine two pieces of information into every client’s Top Level: Industry (e.g....

Welcome to DTC's Knowledge Base

Intro to DTC's Knowledge Base

This is the go-to place for all things DTC tech — from everyday IT basics to advanced specialties. You'll find professional, reliable documentation and insights that power our teams and keep us on point. Can't see some documents or getting "page not found" err...

Windows Workstations MSA Standard Configuration

This document provides a comprehensive overview of the workstation configuration and optimization scripts in the enhancement/workstation-standards feature branch. Overview These PowerShell scripts are designed for MSP deployment via RMM platforms to standard...

What do I do when I see the Bitlocker Recovery Screen?

DTC's Client Public Resources Your Computer

You probably recognize this screen, if not a screenshot is below. This is what to do when you see the Bitlocker Recovery Screen!Bitlocker Recovery Key Entry Guide When you see the blue "Bitlocker recovery" screen: Step 1: Press Esc to open more recovery opti...

DTC & Black Talon

DTC VS Others

DTC Security Services vs Black Talon Security A comparison of DTC's security offerings against Black Talon Security for transparent positioning and sales conversations. Last updated: March 2026 | Owner: Nate Smith Blackpoint CompassOne — What DTC Has Access T...

Signing Up & Logging In

Intro to DTC's Knowledge Base

How to Sign Up for BookStack BookStack is where DTC keeps internal knowledge — SOPs, guides, policies, and technical documentation. Signing in with your DTC Microsoft account gives you access to private content that isn't visible to the public. What You'll Nee...