Windows Server 2019 must restrict unauthenticated Remote Procedure Call (RPC) clients from connecting to the RPC server on domain-joined member servers and standalone or nondomain-joined systems.
Overview
| Finding ID | Version | Rule ID | IA Controls | Severity |
| V-205814 | WN19-MS-000040 | SV-205814r971545_rule | CCI-001967 | medium |
| Description | ||||
| Unauthenticated RPC clients may allow anonymous access to sensitive information. Configuring RPC to restrict unauthenticated RPC clients from connecting to the RPC server will prevent anonymous connections. | ||||
| STIG | Date | |||
| Microsoft Windows Server 2019 Security Technical Implementation Guide | 2025-05-23 | |||
Details
Check Text (C-205814r971545_chk)
This applies to member servers and standalone or nondomain-joined systems. It is NA for domain controllers.
If the following registry value does not exist or is not configured as specified, this is a finding:
Registry Hive: HKEY_LOCAL_MACHINE
Registry Path: \SOFTWARE\Policies\Microsoft\Windows NT\Rpc\
Value Name: RestrictRemoteClients
Type: REG_DWORD
Value: 0x00000001 (1)
Fix Text (F-6079r355805_fix)
Configure the policy value for Computer Configuration >> Administrative Templates >> System >> Remote Procedure Call >> "Restrict Unauthenticated RPC clients" to "Enabled" with "Authenticated" selected.