MC447990 – DCOM authentication hardening: What you need to know (archived)

cloudscout.one Icon

check before: 2023-03-23

Product:

Microsoft 365 admin center

Platform:

World tenant

Status:

Change type:

Admin impact

Links:

Details:

A new blog article tells the comprehensive story of the ongoing Distributed Component Object Model (DCOM) authentication hardening process: DCOM authentication hardening: What you need to know. This article explains the timeline of the phased rollout documented in KB5004442, and the key dates which ultimately lead to default enablement for the security of servers and client devices. Keep your organization protected with the latest Windows updates, enable or test DCOM authentication hardening, and monitor for compatibility with our troubleshooting guidance for several common scenarios for Windows devices.


When will this happen:
As explained in KB5004442, the phased rollout of DCOM authentication hardening changes follows the timeline originally established since June 2021:


September 2021: The September 2021 update fixed several compatibility issues and introduced event logs for additional monitoring.
June 2022: All updates beginning with June 2022 programmatically enable the requirements of Packet Level Integrity (RPC_C_AUTHN_LEVEL_PKT_INTEGRITY), unless an admin manually disables them.
November 2022: The November 8 update will automatically raise authentication level for all non-anonymous activation requests from DCOM clients to RPC_C_AUTHN_LEVEL_PKT_INTEGRITY if it’s below Packet Integrity.
March 2023: Finally, DCOM authentication hardening will be enabled by default to help prevent malicious actors from accessing your server and networked devices.

Change Category:
XXXXXXX ... free basic plan only

Scope:
XXXXXXX ... free basic plan only

Release Phase:

Created:
2022-10-20

updated:
2022-10-21

Task Type

XXXXXXX ... free basic plan only

Docu to Check

XXXXXXX ... free basic plan only

MS How does it affect me

XXXXXXX ... free basic plan only

MS Preperations

XXXXXXX ... free basic plan only

MS Urgency

XXXXXXX ... free basic plan only

MS workload name

XXXXXXX ... free basic plan only

** AI generated content. This information is not reliable.

the free basic plan is required to see all details. Sign up here


change history

DatePropertyoldnew
2022-10-21MC MessagesA new blog article tells the comprehensive story of the ongoing Distributed Component Object Model (DCOM) authentication hardening process: DCOM authentication hardening: What you need to know. Previously documented in KB5004442, this article informs the timeline of the phased rollout, ultimately leading to default enablement for the security of servers and client devices. Keep your organization protected with the latest Windows updates, enable or test DCOM authentication hardening, and monitor for compatibility with our troubleshooting guidance for several common scenarios for Windows devices.


When will this happen:
As explained in KB5004442, the phased rollout of DCOM authentication hardening changes follows the timeline originally established June 2021:
September 2021: The September 2021 update fixed several compatibility issues and introduced event logs for additional monitoring.
June 2022: All updates beginning with June 2022 programmatically enable the requirements of Packet Level Integrity (RPC_C_AUTHN_LEVEL_PKT_INTEGRITY), unless an admin manually disables them.
November 2022: The November 8 update will automatically raise authentication level for all non-anonymous activation requests from DCOM clients to RPC_C_AUTHN_LEVEL_PKT_INTEGRITY if it’s below Packet Integrity.
March 2023: Finally, DCOM authentication hardening will be enabled by default to prevent any malicious actors from accessing your server and networked devices.
A new blog article tells the comprehensive story of the ongoing Distributed Component Object Model (DCOM) authentication hardening process: DCOM authentication hardening: What you need to know. This article explains the timeline of the phased rollout documented in KB5004442, and the key dates which ultimately lead to default enablement for the security of servers and client devices. Keep your organization protected with the latest Windows updates, enable or test DCOM authentication hardening, and monitor for compatibility with our troubleshooting guidance for several common scenarios for Windows devices.


When will this happen:
As explained in KB5004442, the phased rollout of DCOM authentication hardening changes follows the timeline originally established since June 2021:


September 2021: The September 2021 update fixed several compatibility issues and introduced event logs for additional monitoring.
June 2022: All updates beginning with June 2022 programmatically enable the requirements of Packet Level Integrity (RPC_C_AUTHN_LEVEL_PKT_INTEGRITY), unless an admin manually disables them.
November 2022: The November 8 update will automatically raise authentication level for all non-anonymous activation requests from DCOM clients to RPC_C_AUTHN_LEVEL_PKT_INTEGRITY if it’s below Packet Integrity.
March 2023: Finally, DCOM authentication hardening will be enabled by default to help prevent malicious actors from accessing your server and networked devices.
2022-10-21MC TitleDCOM authentication hardening: What you need to know DCOM authentication hardening: What you need to know
2022-10-21MC IsMajorChangeFalseTrue
2022-10-21MC Start Time10/19/2022 23:31:252022-10-20T21:38:51Z
2022-10-21MC Last Updated10/19/2022 23:31:272022-10-20T21:42:50Z

Last updated 4 months ago

Share to MS Teams

Login to your account

Welcome Back, We Missed You!