
The following bat file can be run as an administrator to toggle the print spooler back on when you want to print and off when you finish printing. Double-click “ Printer Spooler” in the Services list.To restart the spooler service, follow these steps: The spooler must be restarted for changes to this policy to take effect. However, all printers currently shared will continue to be shared. When the policy is disabled, Microsoft says the spooler will automatically reject the client connections and prevent users from sharing printers. Double-tap the Allow Print Spooler to accept client connections policy.In Group Policy editor, navigate to the following path: Computer Configuration > Administrative Templates > Printers.Open Start Menu or Windows Search and enter gpedit.msc to open the Local Group Policy Editor.To mitigate the PrintNightmare vulnerability using Group Policy editor on Windows 10 Pro and Enterprise, follow these steps: Right-click on the Start Menu or press Windows+X.ĭisable Print Spooler service on Windows 10 using Group Policy editor.To mitigate the PrintNightmare vulnerability using PowerShell, follow these steps:


Disable Print Spooler service on Windows 10 using PowerShell In this guide, we will highlight the steps to disable the Windows Print Spooler service and mitigate the PrintNightmare CVE-2021-34527 vulnerability. Thankfully, you can temporarily disable the Windows Print Spooler service to mitigate the vulnerability until a proper fix is released. However, researchers have revealed that Microsoft's patch is incomplete and attackers can still abuse the vulnerability to gain access to the system. To deploy Microsoft's patch, you need to check for updates under Updates & Security > Windows Update and apply the latest July update, and reboot the system when prompted.Īlternatively, you can install the emergency update manually from the Microsoft Update catalog if you are unable to do so via the normal Windows Update procedure. Yesterday, Microsoft released multiple Windows updates to fix the widely reported " PrintNightmare" vulnerability in the Windows Print Spooler service.Īccording to Microsoft, this vulnerability is impacting all Windows 10 versions, including the most recent May 2021 Update (version 21H1) and version 20H2 (October 2020 Update).
