This protocol relies on the security features that are
provided by DCOM as specified in
[MS-DCOM].
Review the security considerations that are listed in [MS-RPCE]
section 5.1
because those considerations are also valid for DCOM and DCOM-based protocols.