GSM is able to enumerate several services along with their corresponding port(s), typically in the 49xxx range, on multiple devices. GSM recommends filtering incoming traffic to port 135. In trying to mitigate/decrease our attack surface what is the accepted/best practice course of action in this case?
I should also mention that I’ve set DFS Management (DCOM-In) on port 135 to “Allow if secure” in Windows Firewall. However, subsequent scans still turn up the vulnerability. The scanner is running on a trusted local domain.
Thank you for your reply. The services in question are already up to date and only accessible on the same internal subnet as the GSM scanner (no access from the Internet and our local network is segmented). It’s beginning to seem like this may be an “ignore/informational only” situation.