You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
@@ -681,12 +682,22 @@ Here is a mnemotechnical example of a static RPC port configuration:
681
682
| DFSR | 5722/TCP |
682
683
| WMI | 24158/TCP |
683
684
685
+
These sorts of changes should be thoroughly planned
686
+
and the transition from dynamic ports to static ones should always be coordinated with the networking team
687
+
to prevent any Active Directory (AD) outages.
688
+
Microsoft's Directory Services support team emphasizes this point clearly:
689
+
690
+
> [!WARNING]
691
+
> Don't restrict AD/Netlogon to static ports without exhaustively discussing the risks involved,
692
+
> and heavily documenting it.
693
+
684
694
References:
685
695
686
696
-[How to restrict Active Directory RPC traffic to a specific port](https://learn.microsoft.com/en-us/troubleshoot/windows-server/active-directory/restrict-ad-rpc-traffic-to-specific-port)
687
697
-[Configuring DFSR to a Static Port - The rest of the story](https://techcommunity.microsoft.com/t5/ask-the-directory-services-team/configuring-dfsr-to-a-static-port-the-rest-of-the-story/ba-p/396746)
688
698
-[Setting Up a Fixed Port for WMI](https://learn.microsoft.com/en-us/windows/win32/wmisdk/setting-up-a-fixed-port-for-wmi)
689
699
-[RPC Load Balancing Best Practices](https://learn.microsoft.com/en-us/windows/win32/rpc/load-balancing-best-practices)
700
+
-[Stop Worrying and Love the Outage, Vol II: DCs, custom ports, and Firewalls/ACLs](https://techcommunity.microsoft.com/blog/askds/stop-worrying-and-love-the-outage-vol-ii-dcs-custom-ports-and-firewallsacls/4062773)
690
701
691
702
### RPC Dynamic Port Allocation
692
703
@@ -698,12 +709,11 @@ However, this approach does not seem to provide any security benefits.
698
709
Restricting the RPC port range does not prevent any hacking techniques or mitigate any security vulnerabilities,
699
710
nor does it simplify the configuration of network firewalls. Furthermore, going too far can lead to port exhaustion.
700
711
We have therefore decided against including this setting in the `DCFWTool`.
712
+
This is in accordance with the [recommendation](https://techcommunity.microsoft.com/blog/askds/stop-worrying-and-love-the-outage-vol-ii-dcs-custom-ports-and-firewallsacls/4062773)
713
+
from Microsoft's Directory Services support team:
701
714
702
-
Microsoft recommends:
703
-
- Don’t restrict AD/Netlogon to static ports without exhaustively discussing the risks involved.
704
-
- Don’t restrict the RPC dynamic range without exhaustively discussing the risks involved.
705
-
706
-
Source: [Stop Worrying and Love the Outage, Vol II: DCs, custom ports, and Firewalls/ACLs](https://techcommunity.microsoft.com/blog/askds/stop-worrying-and-love-the-outage-vol-ii-dcs-custom-ports-and-firewallsacls/4062773)
715
+
> [!WARNING]
716
+
> Don't restrict the RPC dynamic range without exhaustively discussing the risks involved, and heavily documenting it.
0 commit comments