![]() ![]() The latest security update released in November 2022 includes the following capabilities to manage this migration easily: We understand that DCOM hardening changes might cause app compatibility issues in your environment. It will keep the DCOM hardening enabled and remove the ability to disable it. The final phase of DCOM updates will be released in March 2023. That changed the hardening to enabled by default but retained the ability to disable the changes using registry key settings. The second phase of DCOM updates was released on June 14, 2022. You can enable them by modifying the registry as described in the “Registry setting to enable or disable the hardening changes” section below. In that update, DCOM hardening was disabled by default. The first phase of DCOM updates was released on June 8, 2021. Therefore, we recommended that you verify if client or server applications in your environment that use DCOM or RPC work as expected with the hardening changes enabled. Hardening changes in DCOM were required for CVE-2021-26414. ![]() DCOM is used for communication between the software components of networked devices. The Distributed Component Object Model (DCOM) Remote Protocol is a protocol for exposing application objects using remote procedure calls (RPCs). Registry setting to enable or disable the hardening changes - Fifth Note
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |