Remote Procedure Call (RPC) Service Endpoint Functionality
Applies To: Windows Server 2008
Administrators can configure the Remote Procedure Call (RPC) service (RpcSs) to listen on a subset of the computer's network interfaces using RPC Firewall Filters. The administrator can use RPC Firewall Filters to block some interfaces from being accessed over a given network interface and while allowing other interfaces to be accessed over the same network interface. RPC Firewall Filters make it possible for an administrator to configure network interface access on a per-interface level of detail.
RPC Firewall Filters comprise a set of rules and conditions that the administrator specifies. The Ep_add Layer filter supports port addition to processes that host a given interface. By creating an Ep_add Layer filter, an administrator can force an interface to receive calls over the port that the administrator specifies when the administrator creates the filter. If the port that is specified in the RPC Firewall Filter is already in use, the system registers a port conflict error.
Events
Event ID | Source | Message |
---|---|---|
Microsoft-Windows-RPC-Events |
Application (%1) (PID: %2) has failed to add endpoint %3:%4 for interface with unique identifier %5 with error %6. User Action: Verify that the machine has sufficient memory and that no other process is listening on the endpoint. | |
Microsoft-Windows-RPC-Events |
Application (%1) (PID: %2) has failed to complete a COM/RPC call because of an invalid message from the server. User Action: Try the operation again. If the problem persists, contact your system administrator. |