56db7e62-0a85-4531-9e71-97528bd04e43
Unauthenticated RPC clients may allow anonymous access to sensitive information. Configuring RPC to restrict unauthenticated RPC clients from connecting to the RPC server will prevent anonymous connections.
To fix this Configure the policy value for:
Computer Configuration
|_ Administrative Templates
|_ System
|_ Remote Procedure Call
|_ Restrict Unauthenticated RPC clients to "Enabled" with "Authenticated" selected.
STIG: Server:
2022: https://www.stigviewer.com/stig/microsoft_windows_server_2022/2023-09-11/finding/V-254431
2019: https://www.stigviewer.com/stig/microsoft_windows_server_2019/2023-09-11/finding/V-205814 / https://www.stigviewer.com/stig/windows_server_2019/2020-06-15/finding/V-93453
2016: https://www.stigviewer.com/stig/microsoft_windows_server_2016/2023-08-22/finding/V-225010 / https://www.stigviewer.com/stig/windows_server_2016/2020-06-16/finding/V-73541
Desktop:
W11: https://www.stigviewer.com/stig/microsoft_windows_11/2023-09-29/finding/V-253383
W10: https://www.stigviewer.com/stig/microsoft_windows_10/2023-09-29/finding/V-220824 / https://www.stigviewer.com/stig/windows_10/2021-08-18/finding/V-220824
NIST 800-171R2: 3.4.7
NIST 800-53: CM-7(1)
CAT: II
CSA CMM v4: AIS-02, IVS-03, IVS-04
PCI DSS v4.0: 1.2.7
CMMC V2: CM.L2-3.4.7
CMMC: CM.3.068
Rule-ID: SV-253383r877039_rule
STIG-ID: WN11-CC-000165
Vuln-ID: V-253383