This protocol is implemented over DCOM and RPC. Therefore,
it has the prerequisites specified in [MS-DCOM]
as being common to protocols that depend on DCOM and RPC respectively.
This protocol also requires a compliant implementation of [PCSC3],
as well as any additional host OS facilities required to support the creation
on the target.
This protocol requires the use of a secure RPC connection.
The requestor is required to possess the credentials of an administrative user
on the target, and both requestor and target are required to support security
packages that implement support for impersonation as well as packet privacy and