5.1 Security Considerations for Implementers

There are no special security considerations specific to this protocol. General security considerations pertaining to the underlying remote procedure call (RPC)-based transport apply, as described in [MS-RPCE]. This protocol usually requires authentication, but generally does not restrict any caller who is authenticated.