5.1 Security Considerations for Implementers

This protocol introduces no security considerations except those that apply to DCOM interfaces. For more information, see [MS-DCOM] section 5.