- An attacker gains initial access to an internal host, uses RPC to deploy malware on a file server, and establishes persistence for further compromise.
- IT deploys new endpoint management software that uses RPC calls for installing updates across the organization.