Regarding Windows Print Spooler Remote Code Execution Vulnerability fix SCCM
Hi experts ,
Anyone applied fix from MECM baseline or proactive remediation ?
Option 2 – Disable inbound remote printing through Group Policy
You can also configure the settings via Group Policy as follows:
Computer Configuration / Administrative Templates / Printers
Disable the “Allow Print Spooler to accept client connections:” policy to block remote attacks.
You must restart the Print Spooler service for the group policy to take effect.
Impact of workaround This policy will block the remote attack vector by preventing inbound remote printing operations. The system will no longer function as a print server, but local printing to a directly attached device will still be possible.
– Registry changes :
“RegisterSpoolerRemoteRpcEndPoint” – Value 2
How we can restart the Print Spooler service with baseline only when GPO is applied ?
Answers ( 2 )
This is option 1 , we are going with option 2.
There is an option to use CMPivot to find out the problematic devices. Once you have the list, use a PowerShell script to disable the print spooler on Windows 10 device.