Remote Management: Unauthenticated RPC clients must be restricted from connecting to the RPC server

56db7e62-0a85-4531-9e71-97528bd04e43

Unauthenticated RPC clients may allow anonymous access to sensitive information. Configuring RPC to restrict unauthenticated RPC clients from connecting to the RPC server will prevent anonymous connections.

Remediation

To fix this Configure the policy value for:
Computer Configuration
|_ Administrative Templates
|_ System
|_ Remote Procedure Call
|_ Restrict Unauthenticated RPC clients to "Enabled" with "Authenticated" selected.

STIG: Server:
2022: https://www.stigviewer.com/stig/microsoft_windows_server_2022/2023-09-11/finding/V-254431
2019: https://www.stigviewer.com/stig/microsoft_windows_server_2019/2023-09-11/finding/V-205814 / https://www.stigviewer.com/stig/windows_server_2019/2020-06-15/finding/V-93453
2016: https://www.stigviewer.com/stig/microsoft_windows_server_2016/2023-08-22/finding/V-225010 / https://www.stigviewer.com/stig/windows_server_2016/2020-06-16/finding/V-73541

Desktop:
W11: https://www.stigviewer.com/stig/microsoft_windows_11/2023-09-29/finding/V-253383
W10: https://www.stigviewer.com/stig/microsoft_windows_10/2023-09-29/finding/V-220824 / https://www.stigviewer.com/stig/windows_10/2021-08-18/finding/V-220824

NIST 800-171R2: 3.4.7
NIST 800-53: CM-7(1)
CAT: II
CSA CMM v4: AIS-02, IVS-03, IVS-04
PCI DSS v4.0: 1.2.7
CMMC V2: CM.L2-3.4.7
CMMC: CM.3.068
Rule-ID: SV-253383r877039_rule
STIG-ID: WN11-CC-000165
Vuln-ID: V-253383