次の方法で共有


5.1 Security Considerations for Implementers

For all methods, the server MUST enforce that the DCOM security level is at least at the RPC_C_AUTHN_LEVEL_CONNECT level, and SHOULD be at the RPC_C_AUTHN_LEVEL_PKT_INTEGRITY level; the server MUST also evaluate the security principal rights to open a CIM namespace.<87> The server MUST fail the operation if the security requirements are not met.