check before: 2023-03-23
Product:
Microsoft 365 admin center
Platform:
World tenant
Status:
Change type:
Admin impact
Links:
Details:
A new blog article tells the comprehensive story of the ongoing Distributed Component Object Model (DCOM) authentication hardening process: DCOM authentication hardening: What you need to know. This article explains the timeline of the phased rollout documented in KB5004442, and the key dates which ultimately lead to default enablement for the security of servers and client devices. Keep your organization protected with the latest Windows updates, enable or test DCOM authentication hardening, and monitor for compatibility with our troubleshooting guidance for several common scenarios for Windows devices.
When will this happen:
As explained in KB5004442, the phased rollout of DCOM authentication hardening changes follows the timeline originally established since June 2021:
September 2021: The September 2021 update fixed several compatibility issues and introduced event logs for additional monitoring.
June 2022: All updates beginning with June 2022 programmatically enable the requirements of Packet Level Integrity (RPC_C_AUTHN_LEVEL_PKT_INTEGRITY), unless an admin manually disables them.
November 2022: The November 8 update will automatically raise authentication level for all non-anonymous activation requests from DCOM clients to RPC_C_AUTHN_LEVEL_PKT_INTEGRITY if it’s below Packet Integrity.
March 2023: Finally, DCOM authentication hardening will be enabled by default to help prevent malicious actors from accessing your server and networked devices.
Change Category:
XXXXXXX ... free basic plan only
Scope:
XXXXXXX ... free basic plan only
Release Phase:
Created:
2022-10-20
updated:
2022-10-21
Task Type
XXXXXXX ... free basic plan only
Docu to Check
XXXXXXX ... free basic plan only
MS How does it affect me
XXXXXXX ... free basic plan only
MS Preperations
XXXXXXX ... free basic plan only
MS Urgency
XXXXXXX ... free basic plan only
MS workload name
XXXXXXX ... free basic plan only
** AI generated content. This information is not reliable.
the free basic plan is required to see all details. Sign up here
change history
Date | Property | old | new |
2022-10-21 | MC Messages | A new blog article tells the comprehensive story of the ongoing Distributed Component Object Model (DCOM) authentication hardening process: DCOM authentication hardening: What you need to know. Previously documented in KB5004442, this article informs the timeline of the phased rollout, ultimately leading to default enablement for the security of servers and client devices. Keep your organization protected with the latest Windows updates, enable or test DCOM authentication hardening, and monitor for compatibility with our troubleshooting guidance for several common scenarios for Windows devices.
When will this happen: As explained in KB5004442, the phased rollout of DCOM authentication hardening changes follows the timeline originally established June 2021: September 2021: The September 2021 update fixed several compatibility issues and introduced event logs for additional monitoring. June 2022: All updates beginning with June 2022 programmatically enable the requirements of Packet Level Integrity (RPC_C_AUTHN_LEVEL_PKT_INTEGRITY), unless an admin manually disables them. November 2022: The November 8 update will automatically raise authentication level for all non-anonymous activation requests from DCOM clients to RPC_C_AUTHN_LEVEL_PKT_INTEGRITY if it’s below Packet Integrity. March 2023: Finally, DCOM authentication hardening will be enabled by default to prevent any malicious actors from accessing your server and networked devices. | A new blog article tells the comprehensive story of the ongoing Distributed Component Object Model (DCOM) authentication hardening process: DCOM authentication hardening: What you need to know. This article explains the timeline of the phased rollout documented in KB5004442, and the key dates which ultimately lead to default enablement for the security of servers and client devices. Keep your organization protected with the latest Windows updates, enable or test DCOM authentication hardening, and monitor for compatibility with our troubleshooting guidance for several common scenarios for Windows devices.
When will this happen: As explained in KB5004442, the phased rollout of DCOM authentication hardening changes follows the timeline originally established since June 2021: September 2021: The September 2021 update fixed several compatibility issues and introduced event logs for additional monitoring. June 2022: All updates beginning with June 2022 programmatically enable the requirements of Packet Level Integrity (RPC_C_AUTHN_LEVEL_PKT_INTEGRITY), unless an admin manually disables them. November 2022: The November 8 update will automatically raise authentication level for all non-anonymous activation requests from DCOM clients to RPC_C_AUTHN_LEVEL_PKT_INTEGRITY if it’s below Packet Integrity. March 2023: Finally, DCOM authentication hardening will be enabled by default to help prevent malicious actors from accessing your server and networked devices. |
2022-10-21 | MC Title | DCOM authentication hardening: What you need to know | DCOM authentication hardening: What you need to know |
2022-10-21 | MC IsMajorChange | False | True |
2022-10-21 | MC Start Time | 10/19/2022 23:31:25 | 2022-10-20T21:38:51Z |
2022-10-21 | MC Last Updated | 10/19/2022 23:31:27 | 2022-10-20T21:42:50Z |
Last updated 4 months ago