5.1 Security Considerations for Implementers

This protocol relies on the security features that are provided by DCOM as specified in [MS-DCOM]. Review the security considerations that are listed in [MS-RPCE] section 5.1 because those considerations are also valid for DCOM and DCOM-based protocols.