check before: 2025-05-01
Product:
SharePoint, Windows, Windows Server
Platform:
Online, World tenant
Status:
Change type:
Admin impact
Links:
Details:
(Update: This post was updated to clarify that the change was Enabled by Default on Windows Server 2025 in May 2025 and to add information about how to configure this change.)
Microsoft has introduced a hardening change to strengthen the Microsoft RPC Netlogon protocol by blocking RPC anonymous requests used to locate domain controllers. This change was Enabled by Default in the May 2025 Windows security update for Windows Server 2025, and in the July 2025 Windows security update for all supported versions from Windows Server 2008 SP2 through Windows Server 2022. This change is configurable by policy after installing the August 2025 Windows security update. See the article, KB5066014-Netlogon RPC Hardening (CVE-2025-49716), for details.
After applying these updates and subsequent updates, Active Directory domain controllers will reject certain anonymous RPC requests. This may affect interoperability with services like Samba unless they are updated to meet the new access requirements.
To prepare for this update, review your environment for any dependencies on anonymous Netlogon RPC requests. If your organization uses Samba, refer to the Samba release notes for guidance on compatibility. It is also recommended to test the update in a staging environment to identify and address any potential disruptions before full deployment.
For more information, see the May or July KB update article that matches your server version's security update.
Change Category:
XXXXXXX ... free basic plan only
Scope:
XXXXXXX ... free basic plan only
Release Phase:
Created:
2025-07-11
updated:
2025-08-14
Task Type
XXXXXXX ... free basic plan only
Docu to Check
XXXXXXX ... free basic plan only
MS Preperations
XXXXXXX ... free basic plan only
MS Urgency
XXXXXXX ... free basic plan only
MS workload name
XXXXXXX ... free basic plan only
summary for non-techies**
XXXXXXX ... free basic plan only
Direct effects for Operations**
Interoperability Issues with Samba
Blocking anonymous RPC requests may lead to compatibility issues with Samba services, potentially disrupting file sharing and authentication processes.
- roles: System Administrator, Network Engineer
- references: https://support.microsoft.com/topic/kb5066014-netlogon-rpc-hardening-cve-2025-49716-38a0bc06-507c-47d4-be0f-ca1acab02c68, https://www.samba.org/samba/history/samba-4.22.3.html
User Authentication Failures
Users may experience authentication failures if their systems rely on anonymous RPC requests to access domain controllers, leading to access issues.
- roles: End User, Help Desk Support
- references: https://support.microsoft.com/topic/july-8-2025-kb5062572-os-build-20348-3932-d78a2b2a-1ce8-45ee-85a0-e51a897ec67f, https://learn.microsoft.com/openspecs/windows_protocols/ms-nrpc/ff8f970f-3e37-40f7-bd4b-af7336e4792f
Increased Support Tickets
The change may result in a surge of support tickets from users facing issues due to the hardening, impacting IT support resources.
- roles: Help Desk Support, IT Manager
- references: https://support.microsoft.com/topic/kb5066014-netlogon-rpc-hardening-cve-2025-49716-38a0bc06-507c-47d4-be0f-ca1acab02c68, https://support.microsoft.com/topic/may-13-2025-kb5058411-os-build-26100-4061-57181688-a692-49e5-b6cd-6e3919da12ca
Service Downtime
Services that depend on anonymous RPC requests may experience downtime if not properly updated to comply with the new security settings.
- roles: System Administrator, Application Owner
- references: https://support.microsoft.com/topic/july-8-2025-kb5062572-os-build-20348-3932-d78a2b2a-1ce8-45ee-85a0-e51a897ec67f, https://www.samba.org/samba/history/samba-4.22.3.html
Increased Configuration Complexity
The need to configure policies post-update may lead to increased complexity in system management, requiring additional training or resources.
- roles: System Administrator, IT Manager
- references: https://support.microsoft.com/topic/kb5066014-netlogon-rpc-hardening-cve-2025-49716-38a0bc06-507c-47d4-be0f-ca1acab02c68, https://learn.microsoft.com/openspecs/windows_protocols/ms-nrpc/ff8f970f-3e37-40f7-bd4b-af7336e4792f
Configutation Options**
XXXXXXX ... paid membership only
Opportunities**
Enhanced Security Compliance
By adopting the hardening change for the Microsoft RPC Netlogon protocol, organizations can significantly enhance their security posture against unauthorized access attempts, especially those exploiting anonymous requests. This is particularly crucial for organizations handling sensitive data or regulated information.
- next-steps: Conduct a security audit to identify potential vulnerabilities related to the RPC Netlogon protocol. Implement the hardening changes in a controlled environment and evaluate the impact on existing services.
- roles: IT Security Manager, System Administrator, Compliance Officer
- references: https://learn.microsoft.com/openspecs/windows_protocols/ms-nrpc/ff8f970f-3e37-40f7-bd4b-af7336e4792f, https://support.microsoft.com/topic/kb5066014-netlogon-rpc-hardening-cve-2025-49716-38a0bc06-507c-47d4-be0f-ca1acab02c68
Improved Service Interoperability
Reviewing and updating services like Samba in light of the new access requirements will ensure continued interoperability and prevent service disruptions. This proactive approach can help maintain seamless operations across different platforms.
- next-steps: Engage with the Samba team to understand the necessary updates and test these changes in a staging environment to ensure compatibility with the hardening changes before deployment.
- roles: System Administrator, Network Engineer, IT Operations Manager
- references: https://www.samba.org/samba/history/samba-4.22.3.html
Streamlined IT Operations
By preparing for the update and identifying dependencies on anonymous RPC requests, IT can streamline operations by reducing the risk of unexpected disruptions and improving overall service reliability.
- next-steps: Create a dependency mapping for all services using the Netlogon RPC protocol and assess their compatibility with the new security measures. Develop a communication plan to inform affected users about potential changes.
- roles: IT Operations Manager, System Administrator, Help Desk Manager
- references: https://support.microsoft.com/topic/july-8-2025-kb5062572-os-build-20348-3932-d78a2b2a-1ce8-45ee-85a0-e51a897ec67f
Potentional Risks**
XXXXXXX ... paid membership only
IT Security**
XXXXXXX ... paid membership only
explanation for non-techies**
XXXXXXX ... free basic plan only
** AI generated content. This information must be reviewed before use.
a free basic plan is required to see more details. Sign up here
A cloudsocut.one plan is required to see all the changed details. If you are already a customer, choose login.
If you are new to cloudscout.one please choose a plan.
change history
| Date | Property | old | new |
| 2025-08-14 | MC Messages | (Update: This post was updated to clarify that the change was Enabled by Default on Windows Server 2025 in May 2025 and to add information about how to configure this change.)
Microsoft has introduced a hardening change to strengthen the Microsoft RPC Netlogon protocol by blocking RPC anonymous requests used to locate domain controllers. This change was Enabled by Default in the May 2025 Windows security update for Windows Server 2025, and in the July 2025 Windows security update for all supported versions from Windows Server 2008 R2 through Windows Server 2022. This change is configurable by policy after installing the August 2025 Windows security update. See the article, KB5066014-Netlogon RPC Hardening (CVE-2025-49716), for details. After applying these updates and subsequent updates, Active Directory domain controllers will reject certain anonymous RPC requests. This may affect interoperability with services like Samba unless they are updated to meet the new access requirements. To prepare for this update, review your environment for any dependencies on anonymous Netlogon RPC requests. If your organization uses Samba, refer to the Samba release notes for guidance on compatibility. It is also recommended to test the update in a staging environment to identify and address any potential disruptions before full deployment. For more information, see the May or July KB update article that matches your server version's security update. | (Update: This post was updated to clarify that the change was Enabled by Default on Windows Server 2025 in May 2025 and to add information about how to configure this change.)
Microsoft has introduced a hardening change to strengthen the Microsoft RPC Netlogon protocol by blocking RPC anonymous requests used to locate domain controllers. This change was Enabled by Default in the May 2025 Windows security update for Windows Server 2025, and in the July 2025 Windows security update for all supported versions from Windows Server 2008 SP2 through Windows Server 2022. This change is configurable by policy after installing the August 2025 Windows security update. See the article, KB5066014-Netlogon RPC Hardening (CVE-2025-49716), for details. After applying these updates and subsequent updates, Active Directory domain controllers will reject certain anonymous RPC requests. This may affect interoperability with services like Samba unless they are updated to meet the new access requirements. To prepare for this update, review your environment for any dependencies on anonymous Netlogon RPC requests. If your organization uses Samba, refer to the Samba release notes for guidance on compatibility. It is also recommended to test the update in a staging environment to identify and address any potential disruptions before full deployment. For more information, see the May or July KB update article that matches your server version's security update. |
| 2025-08-14 | MC IsMajorChange | True | False |
| 2025-08-14 | MC Start Time | 08/14/2025 00:12:08 | 2025-08-14T06:22:21Z |
| 2025-08-14 | MC Last Updated | 08/14/2025 00:12:10 | 2025-08-14T06:22:22Z |
| 2025-08-14 | MC End Time | 08/14/2026 00:12:08 | 2026-08-14T06:22:21Z |
| 2025-08-14 | MC prepare | https://learn.microsoft.com/openspecs/windows_protocols/ms-nrpc/ff8f970f-3e37-40f7-bd4b-af7336e4792f
https://support.microsoft.com/help/5051987 https://support.microsoft.com/help/5062572 https://support.microsoft.com/help/5062592 https://support.microsoft.com/help/5062597 https://support.microsoft.com/topic/july-8-2025-kb5062618-security-only-update-34a3726e-1e9b-4f72-a61b-b2d6f8c59835 https://support.microsoft.com/topic/july-8-2025-kb5062619-security-only-update-3bde872d-c66a-45e5-8d3c-a1e2608ccfde https://support.microsoft.com/topic/july-8-2025-kb5062624-monthly-rollup-ef8674af-85d1-49dd-8ba0-9535c77bfff1 https://support.microsoft.com/topic/july-8-2025-kb5062632-monthly-rollup-6b00fd29-2f8e-4167-8633-bd081870d49e https://www.samba.org/samba/history/samba-4.22.3.html | https://learn.microsoft.com/openspecs/windows_protocols/ms-nrpc/ff8f970f-3e37-40f7-bd4b-af7336e4792f
https://support.microsoft.com/topic/july-8-2025-kb5062572-os-build-20348-3932-d78a2b2a-1ce8-45ee-85a0-e51a897ec67f https://support.microsoft.com/topic/kb5066014-netlogon-rpc-hardening-cve-2025-49716-38a0bc06-507c-47d4-be0f-ca1acab02c68 https://support.microsoft.com/topic/may-13-2025-kb5058411-os-build-26100-4061-57181688-a692-49e5-b6cd-6e3919da12ca https://www.samba.org/samba/history/samba-4.22.3.html |
| 2025-08-14 | MC Last Updated | 07/10/2025 20:46:01 | 2025-08-14T00:12:10Z |
| 2025-08-14 | MC Messages | As part of our ongoing commitment to security, we're introducing a hardening change to the Microsoft RPC Netlogon protocol. This update strengthens access controls by blocking anonymous RPC requests that could previously be used to locate domain controllers. This change is not configurable and cannot be reverted via policy.
When this will happen This change was introduced in the July 2025 Windows security update for all supported versions of Windows Server from Windows Server 2008 R2 through Window Server 2022. For Windows Server 2025, the change was included in the February 2025 Windows security update and subsequent updates. | (Update: This post was updated to clarify that the change was Enabled by Default on Windows Server 2025 in May 2025 and to add information about how to configure this change.)
Microsoft has introduced a hardening change to strengthen the Microsoft RPC Netlogon protocol by blocking RPC anonymous requests used to locate domain controllers. This change was Enabled by Default in the May 2025 Windows security update for Windows Server 2025, and in the July 2025 Windows security update for all supported versions from Windows Server 2008 R2 through Windows Server 2022. This change is configurable by policy after installing the August 2025 Windows security update. See the article, KB5066014-Netlogon RPC Hardening (CVE-2025-49716), for details. After applying these updates and subsequent updates, Active Directory domain controllers will reject certain anonymous RPC requests. This may affect interoperability with services like Samba unless they are updated to meet the new access requirements. To prepare for this update, review your environment for any dependencies on anonymous Netlogon RPC requests. If your organization uses Samba, refer to the Samba release notes for guidance on compatibility. It is also recommended to test the update in a staging environment to identify and address any potential disruptions before full deployment. For more information, see the May or July KB update article that matches your server version's security update. |
| 2025-08-14 | MC End Time | 07/10/2026 20:46:00 | 2026-08-14T00:12:08Z |
| 2025-08-14 | MC Start Time | 07/10/2025 20:46:00 | 2025-08-14T00:12:08Z |
| 2025-08-14 | MC Title | Security hardening for Microsoft RPC Netlogon protocol | (Updated) Security hardening for Microsoft RPC Netlogon protocol |
| 2025-08-14 | MC How Affect | After installing the applicable Windows security update, Active Directory domain controllers will reject certain anonymous RPC requests made through the Netlogon RPC server. These requests are typically used for domain controller location and may impact interoperability with some third-party file and print services, including Samba.
If your organization uses Samba or similar services, you may experience disruptions unless those services are updated to comply with the new access requirements. What you can do to prepare Review your environment for dependencies on anonymous Netlogon RPC requests. If your organization uses Samba, please refer to the Samba release notes for guidance on compatibility. Test the update in a staging environment before broad deployment to identify any potential service disruptions. Additional information This change has been documented in the KB articles associated to the updates introducing the new security hardening: Windows Server 2025: https://support.microsoft.com/help/5051987 Windows Server 2025 Datacenter: Azure Edition (Hotpatch Baseline): https://support.microsoft.com/help/5051987 Windows Server 2022: https://support.microsoft.com/help/5062572 Windows Server 2022 Datacenter: Azure Edition (Hotpatch Baseline): https://support.microsoft.com/help/5062572 Windows Server 2012 R2: https://support.microsoft.com/help/5062597 Windows Server 2012: https://support.microsoft.com/help/5062592 Windows Server 2008 R2 SP1: https://support.microsoft.com/help/5062632 / https://support.microsoft.com/help/5062619 Windows Server 2008: SP2: https://support.microsoft.com/help/5062624 / https://support.microsoft.com/help/5062618-; |
Last updated 3 days ago ago