| Vuln ID | Severity | Asset | STIG | Title | Status | Doc Status | Assigned To | Actions |
|---|---|---|---|---|---|---|---|---|
| V-220824 | CAT II | MONT-WS-92040 | Microsoft Windows 10 Security Technical ... | Unauthenticated RPC clients must be restricted fro... | - | |||
Check TextIf the following registry value does not exist or is not configured as specified, this is a finding: Registry Hive: HKEY_LOCAL_MACHINE Registry Path: \SOFTWARE\Policies\Microsoft\Windows NT\Rpc\ Value Name: RestrictRemoteClients Value Type: REG_DWORD Value: 1 Fix TextConfigure the policy value for Computer Configuration >> Administrative Templates >> System >> Remote Procedure Call >> "Restrict Unauthenticated RPC clients" to "Enabled" and "Authenticated". Finding DetailsEvaluate-STIG 1.2507.5 (Scan-Windows10_Checks) found this to be NOT A FINDING on 10/23/2025 ResultHash: 40E3D085D5C4B8BECD35CFE7A6BA8C4D346FDA19 ~~~~~ 'Restrict Unauthenticated RPC clients' is Enabled: (Authenticated) Registry Path: HKLM:\SOFTWARE\Policies\Microsoft\Windows NT\Rpc Value Name: RestrictRemoteClients Value: 0x00000001 (1) Type: REG_DWORD
Source: _Reviewed/MONT-WS-92040/Checklist/MONT-WS-92040_Win10_V3R4_20251023-142421.ckl
Scan Date: 2026-01-14T12:57:26.690022
Technology Area: Windows Operating System
|
||||||||
| V-220824 | CAT II | MONT-WS-92010 | Microsoft Windows 10 Security Technical ... | Unauthenticated RPC clients must be restricted fro... | - | |||
Check TextIf the following registry value does not exist or is not configured as specified, this is a finding: Registry Hive: HKEY_LOCAL_MACHINE Registry Path: \SOFTWARE\Policies\Microsoft\Windows NT\Rpc\ Value Name: RestrictRemoteClients Value Type: REG_DWORD Value: 1 Fix TextConfigure the policy value for Computer Configuration >> Administrative Templates >> System >> Remote Procedure Call >> "Restrict Unauthenticated RPC clients" to "Enabled" and "Authenticated". Finding DetailsEvaluate-STIG 1.2507.5 (Scan-Windows10_Checks) found this to be NOT A FINDING on 10/23/2025 ResultHash: 40E3D085D5C4B8BECD35CFE7A6BA8C4D346FDA19 ~~~~~ 'Restrict Unauthenticated RPC clients' is Enabled: (Authenticated) Registry Path: HKLM:\SOFTWARE\Policies\Microsoft\Windows NT\Rpc Value Name: RestrictRemoteClients Value: 0x00000001 (1) Type: REG_DWORD
Source: _Reviewed/MONT-WS-92010/Checklist/MONT-WS-92010_Win10_V3R4_20251023-141133.ckl
Scan Date: 2026-01-14T12:57:28.689048
Technology Area: Windows Operating System
|
||||||||
| V-220824 | CAT II | MONT-SW-89108 | Microsoft Windows 10 Security Technical ... | Unauthenticated RPC clients must be restricted fro... | - | |||
Check TextIf the following registry value does not exist or is not configured as specified, this is a finding: Registry Hive: HKEY_LOCAL_MACHINE Registry Path: \SOFTWARE\Policies\Microsoft\Windows NT\Rpc\ Value Name: RestrictRemoteClients Value Type: REG_DWORD Value: 1 Fix TextConfigure the policy value for Computer Configuration >> Administrative Templates >> System >> Remote Procedure Call >> "Restrict Unauthenticated RPC clients" to "Enabled" and "Authenticated". Finding DetailsEvaluate-STIG 1.2510.0 (Scan-Windows10_Checks) found this to be NOT A FINDING on 12/17/2025 ResultHash: 40E3D085D5C4B8BECD35CFE7A6BA8C4D346FDA19 ~~~~~ 'Restrict Unauthenticated RPC clients' is Enabled: (Authenticated) Registry Path: HKLM:\SOFTWARE\Policies\Microsoft\Windows NT\Rpc Value Name: RestrictRemoteClients Value: 0x00000001 (1) Type: REG_DWORD
Source: MONT-SW-89108_Win10_V3R5_20251217-203019.ckl
Scan Date: 2026-03-04T15:25:16.342077
Technology Area: Windows Operating System
|
||||||||
| V-220824 | CAT II | MONT-SW-89134 | Microsoft Windows 10 Security Technical ... | Unauthenticated RPC clients must be restricted fro... | - | |||
Check TextIf the following registry value does not exist or is not configured as specified, this is a finding: Registry Hive: HKEY_LOCAL_MACHINE Registry Path: \SOFTWARE\Policies\Microsoft\Windows NT\Rpc\ Value Name: RestrictRemoteClients Value Type: REG_DWORD Value: 1 Fix TextConfigure the policy value for Computer Configuration >> Administrative Templates >> System >> Remote Procedure Call >> "Restrict Unauthenticated RPC clients" to "Enabled" and "Authenticated". Finding DetailsEvaluate-STIG 1.2510.0 (Scan-Windows10_Checks) found this to be NOT A FINDING on 12/17/2025 ResultHash: 40E3D085D5C4B8BECD35CFE7A6BA8C4D346FDA19 ~~~~~ 'Restrict Unauthenticated RPC clients' is Enabled: (Authenticated) Registry Path: HKLM:\SOFTWARE\Policies\Microsoft\Windows NT\Rpc Value Name: RestrictRemoteClients Value: 0x00000001 (1) Type: REG_DWORD
Source: MONT-SW-89134_Win10_V3R5_20251217-201218.ckl
Scan Date: 2026-03-04T15:25:42.339596
Technology Area: Windows Operating System
|
||||||||