PrintNightmare = CRITICAL vulnerability (2021): Print Spooler: Windows service (manages print jobs), Vulnerability: Remote attackers can install malicious print drivers β SYSTEM-level code execution, Exploitation: Unauthenticated remote code execution (RCE), Active attacks: Widespread exploitation (ransomware gangs), Patch: Microsoft patches available, maar defense-in-depth: Disable remote spooler. Attack: Attacker β network β send malicious print driver install request β Print Spooler executes β SYSTEM compromise.
PowerShell Modules Vereist
Primary API: Microsoft Graph API Connection:Connect-MgGraph Required Modules: Microsoft.Graph.DeviceManagement
Implementatie
Disable remote spooler: Policy: Allow Print Spooler to accept client connections: Disabled, Effect: Print Spooler cannot accept remote connections (local printing ONLY), Printers: Network printing via print server (not direct), Workstations: NO direct network printing (security > convenience).
Vereisten
Intune subscription
Windows 10/11
Print infrastructure: Dedicated print servers (not workstation direct printing)
Implementatie
Intune Settings Catalog: Printers β Allow Print Spooler to accept client connections: Disabled. Effect: Workstations cannot act as print servers. Printing: Via dedicated print servers.
Compliance
Microsoft Security Advisory (PrintNightmare), CIS Windows Benchmark, BIO 12.06.
Monitoring
Gebruik PowerShell-script allow-print-spooler-to-accept-client-connections-is-set-to-disabled.ps1 (functie Invoke-Monitoring) β Controleren.
Remediatie
Gebruik PowerShell-script allow-print-spooler-to-accept-client-connections-is-set-to-disabled.ps1 (functie Invoke-Remediation) β Herstellen.
Compliance & Frameworks
CIS M365: Control Windows - Print Spooler (L1) -
BIO: 12.06.01 -
Automation
Gebruik het onderstaande PowerShell script om deze security control te monitoren en te implementeren. Het script bevat functies voor zowel monitoring (-Monitoring) als remediation (-Remediation).