Skip to content

Commit 985612e

Browse files
rafalfittMichaelGrafnetter
authored andcommitted
Added a warning on RPC dynamic range resitrictions
1 parent dd1ef8a commit 985612e

File tree

1 file changed

+7
-1
lines changed

1 file changed

+7
-1
lines changed

ADDS/README.md

Lines changed: 7 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -696,9 +696,15 @@ from the default 49152-65535 interval to a narrower one, such as 5000-6000.
696696

697697
However, this approach does not seem to provide any security benefits.
698698
Restricting the RPC port range does not prevent any hacking techniques or mitigate any security vulnerabilities,
699-
nor does it simplify the configuration of network firewalls.
699+
nor does it simplify the configuration of network firewalls. Furthermore, going too far can lead to port exhaustion.
700700
We have therefore decided against including this setting in the `DCFWTool`.
701701

702+
Microsoft recommends:
703+
- Don’t restrict AD/Netlogon to static ports without exhaustively discussing the risks involved.
704+
- Don’t restrict the RPC dynamic range without exhaustively discussing the risks involved.
705+
706+
Source: [Stop Worrying and Love the Outage, Vol II: DCs, custom ports, and Firewalls/ACLs](https://techcommunity.microsoft.com/blog/askds/stop-worrying-and-love-the-outage-vol-ii-dcs-custom-ports-and-firewallsacls/4062773)
707+
702708
### RPC Filters
703709

704710
#### RPC over Named Pipes

0 commit comments

Comments
 (0)