If you notice the .img in the post further down, the epmap, netbios-ns, netbios-dgm, netbios-ssn and microsoft-ds ports are all seen as stealthed in the grc.com port scan results. This is not because the PC hs stealthed the ports, but because my internet provider blocks these ports off in their own servers. This is done in part due for added security, but it is chiefly a form of traffic restriction (restricts the providers clients from using these between themselves).
If the advice in the posts below is properly followed, the epmap (port 135) will be permanently closed without using a software tool or utility. The other ports, netbios-ns, netbios-dgm, netbios-ssn, microsoft-ds, complex-main (UPnP) and can be easily closed using proper steps without using any software tool. If a tool is desired to be used , then try this one.
Best regards, Oldsod