5.1 Security Considerations for Implementers

This protocol relies on the security features provided by DCOM [MS-DCOM]. Review the security considerations listed in [MS-RPCE] section 5.1, as these are also valid for DCOM and DCOM-based protocols.<14>