RPC Endpoint Mapper Authentication and Hardening (2024)



RPC Endpoint Mapper

This policy setting determines if RPC clients authenticate with the Endpoint Mapper Service when their call includes authentication data. The Endpoint Mapper Service on Windows NT4 (all service packs) is unable to process authentication data provided in this manner.

Disabling this policy means RPC clients won’t authenticate with the Endpoint Mapper Service, but they can still communicate with it on Windows NT4 Server.

The recommended state for this setting is: Enabled.

Enable RPC authentication

To modify these policies using the Group Policy Object (GPO) editor:

  1. ClickStart> typemsc> hitEnterto open theLocal Group Policy Editor.
  1. To enable the equivalent ofEnableAuthEpResolutionsettings, navigate toComputer Configuration\Administrative Templates\System\Remote Procedure Call\Enable RPC Endpoint Mapper Client Authentication, then select one of the two available settings:
  • Disabled– This setting is the default. RPC clients won’t authenticate to the Endpoint Mapper Service, but they’ll be able to communicate with the Endpoint Mapper Service on Windows NT4 Server.
  • Enabled– PC clients authenticate via the Endpoint Mapper Service for calls that contain authentication information. Clients making such calls won’t be able to communicate with the Windows NT4 Server Endpoint Mapper Service.

Changes to either setting require a system reboot for them to take effect.

Important Note *

The following Group Policy settings found inComputer Configuration\Windows Settings\Security Settings\Local Policies\Security Optionscannot be used withEnableAuthEpResolution:

  • Network security: Restrict NTLM: Incoming NTLM traffic -“Deny All Accounts”
  • Network security: Restrict NTLM: Outgoing NTLM traffic to remote servers -“Deny All”

It’s encouraged to move away from NTLM to better secure your environment. If faced with a choice between restricting NTLM and usingEnableAuthEpResolution, the recommended approach is that you restrict NTLM in your environment.

Enable RPC Endpoint Mapper Client Authentication via GPO

This policy setting will not be applied until the system is rebooted.

RegistryHiveHKEY_LOCAL_MACHINE
RegistryPathSoftware\Policies\Microsoft\Windows NT\Rpc
ValueNameEnableAuthEpResolution
ValueTypeREG_DWORD
EnabledValue1
DisabledValue0

Vulnerabilities

Vulnerabilities in the Microsoft RPC Endpoint Mapper service can have severe consequences, as they can potentially allow remote attackers to execute arbitrary code or escalate privileges on the target system.

The EternalBlue exploit, notably used in the WannaCry ransomware attack of 2017, targeted a vulnerability (CVE-2017-0143) in the Server Message Block (SMB) protocol on Windows systems. This vulnerability enabled attackers to execute remote code with SYSTEM privileges by exploiting improper handling of requests by the RPC Endpoint Mapper service.

CVE-2022-37958 While EternalBlue exploits a vulnerability solely within Microsoft's implementation of the Server Message Block (SMB) protocol, this vulnerability spans a much broader range of protocols. This code-execution vulnerability enables attackers to trigger the flaw through any Windows application protocol that requires authentication. This includes attempts to connect to an SMB share or through Remote Desktop.

Group Policy Guide for Baseline Hardening

Ensure ‘Enable RPC Endpoint Mapper Client Authentication’ is set to ‘Enabled’

This policy determines RPC client authentication with the Endpoint Mapper Service. Applying it to NT4 systems can cause issues, particularly with 1-way forest trusts

The impact of enabling the policy setting is that RPC clients will authenticate to the Endpoint Mapper Service for calls that contain authentication information. Clients making such calls will not be able to communicate with the Windows NT4 Server Endpoint Mapper Service.

The solution is to establish the recommended configuration via GP, set the following UI path to Enabled:

Computer Configuration\Policies\Administrative Templates\System\Remote Procedure Call\Enable RPC Endpoint Mapper Client Authentication

Note: This Group Policy path may not exist by default. It is provided by the Group Policy template RPC.admx/adml that is included with the Microsoft Windows 8.0 & Server 2012 (non-R2) Administrative Templates (or newer).

Enhancing Security with Automated Hardening

Implementing automated hardening measures for the RPC Endpoint Mapper Client Authentication mechanism can significantly bolster the overall security posture of Windows systems. By automating the process of applying recommended security configurations, organizations can ensure consistent and timely mitigation of known vulnerabilities related to this critical component.

Automated hardening eliminates the potential for human error during manual configuration and guarantees that all systems within the environment adhere to the latest security best practices. Additionally, it streamlines the process of keeping systems up-to-date with the latest security updates, reducing the window of exposure to potential threats.

By embracing automated hardening strategies, organizations can proactively protect their Windows infrastructure from exploitation attempts targeting RPC Endpoint Mapper Client Authentication vulnerabilities, minimizing the risk of remote code execution, privilege escalation, and other malicious activities.

RPC Endpoint Mapper Authentication and Hardening (2024)
Top Articles
Balance Sheet Reduction: Progress to Date and a Look Ahead
Lazy loading in React
Creepshotorg
Big Spring Skip The Games
Blairsville Online Yard Sale
Swimgs Yung Wong Travels Sophie Koch Hits 3 Tabs Winnie The Pooh Halloween Bob The Builder Christmas Springs Cow Dog Pig Hollywood Studios Beach House Flying Fun Hot Air Balloons, Riding Lessons And Bikes Pack Both Up Away The Alpha Baa Baa Twinkle
Worcester On Craigslist
Chelactiv Max Cream
All Obituaries | Buie's Funeral Home | Raeford NC funeral home and cremation
Aris Rachevsky Harvard
Unforeseen Drama: The Tower of Terror’s Mysterious Closure at Walt Disney World
Music Go Round Music Store
Best Nail Salons Open Near Me
Jail View Sumter
‘The Boogeyman’ Review: A Minor But Effectively Nerve-Jangling Stephen King Adaptation
Gazette Obituary Colorado Springs
Inbanithi Age
TeamNet | Agilio Software
Deshuesadero El Pulpo
Craigslist Lake Charles
Craiglist.nj
Black Panther 2 Showtimes Near Epic Theatres Of Palm Coast
Japanese Emoticons Stars
Bj's Tires Near Me
Datingscout Wantmatures
Hoofdletters voor God in de NBV21 - Bijbelblog
Dubois County Barter Page
Unm Hsc Zoom
Stolen Touches Neva Altaj Read Online Free
Bus Dublin : guide complet, tarifs et infos pratiques en 2024 !
Gas Prices In Henderson Kentucky
Where Do They Sell Menudo Near Me
Kips Sunshine Kwik Lube
The best Verizon phones for 2024
Toth Boer Goats
Empires And Puzzles Dark Chest
Ticket To Paradise Showtimes Near Regal Citrus Park
Skip The Games Grand Rapids Mi
Wrigley Rooftops Promo Code
Ross Dress For Less Hiring Near Me
How to Print Tables in R with Examples Using table()
The power of the NFL, its data, and the shift to CTV
Yale College Confidential 2027
Stosh's Kolaches Photos
Top 1,000 Girl Names for Your Baby Girl in 2024 | Pampers
Bonecrusher Upgrade Rs3
Race Deepwoken
Food and Water Safety During Power Outages and Floods
Cryptoquote Solver For Today
Compete My Workforce
Public Broadcasting Service Clg Wiki
Latest Posts
Article information

Author: Terrell Hackett

Last Updated:

Views: 5861

Rating: 4.1 / 5 (52 voted)

Reviews: 91% of readers found this page helpful

Author information

Name: Terrell Hackett

Birthday: 1992-03-17

Address: Suite 453 459 Gibson Squares, East Adriane, AK 71925-5692

Phone: +21811810803470

Job: Chief Representative

Hobby: Board games, Rock climbing, Ghost hunting, Origami, Kabaddi, Mushroom hunting, Gaming

Introduction: My name is Terrell Hackett, I am a gleaming, brainy, courageous, helpful, healthy, cooperative, graceful person who loves writing and wants to share my knowledge and understanding with you.