CISA Warns To Disable Windows Print Spooler On Servers Not Used For Printing

The Cybersecurity and Infrastructure Security Agency (CISA) has issued a notification regarding the critical PrintNightmare zero-day vulnerability and warned admins to disable the Windows Print Spooler service on servers not used for printing.

"Additionally, administrators should employ the following best practice from Microsoft's how-to guides, published January 11, 2021," with those guides recommending the Print Spooler to be disabled on all the Domains Controllers and Active Directory admin systems via a Group Policy Object.

To mitigate future attacks the feature is recommended to be disabled on all servers that don't require it.



Read More

Got Something To Say?

Your email address will not be published. Required fields are marked *