Print server and Print Nightmare update

Manuel Galdamez 121 Reputation points
2021-08-17T16:16:05.733+00:00

Hi All,

I'm having issues with some Print Servers after running Windows Updates and installed

2021-08 Cumulative Update for Windows Server 2019 for x64-based Systems (KB5005030)

After the update installation I'm getting the error "Connect to printer Windows cannot connect to the printer. Operation failed with error 0x0000011b" and the printer fails to install.

Is there any workaround to keep Print Severs up and running?

I cannot permanently remove the August update, because the Print Nightmare update will come again in Sept Cummulative Update.

I also tried to revert the configurations using:
* “Allow Print Spooler to accept client connections” policy
* HKEY_LOCAL_MACHINE \Software\Policies\Microsoft\Windows NT\Printers\PointAndPrint.

Nothing worked. I will appreciate any advice.

Thanks,

Manuel

Windows Server Printing
Windows Server Printing
Windows Server: A family of Microsoft server operating systems that support enterprise-level management, data storage, applications, and communications.Printing: Printer centralized deployment and management, scan and fax resources management, and document services
641 questions
{count} votes

54 answers

Sort by: Most helpful
  1. Marcio Azevedo 1 Reputation point
    2021-10-14T20:24:47.757+00:00

    After 2 days trying to find a solution and changing every imaginable Windows 10 setting, we purchased a printer with ethernet connection (a Brother laser printer in our case) and the problem was solved in a few minutes, that was the best thing I did this year. I understand this may not help larger companies with a complex infrastructure but smaller companies should not waste time uninstalling packages or changing settings.

    0 comments No comments

  2. Allinace Z 16 Reputation points
    2021-10-15T09:46:26.287+00:00

    Shared printers did not work again with new update KB5006670 on Win10 21H1
    sucks


  3. MarlboroMan 1 Reputation point
    2021-10-15T14:44:38.5+00:00

    I am wondering if the new cumulative update for October just pushed out will mess up shared network printers hosted on a print server. I have held off on applying the updates for it.


  4. Ruan Sardinha 1 Reputation point
    2021-11-04T18:58:22.787+00:00

    Senhores,

    Acredito que o problema relacionado a correção da vulnerabilidade foi corrigido no pacote de atualização 21H1, não é mais preciso alterar o registro do Windows e consequentemente, tornar a maquina vulnerável. Para voltar a imprimir, basta logar com uma conta administrador e reiniciar o serviço Spooler de Impressão.

    0 comments No comments

  5. Turps3000 1 Reputation point
    2021-10-23T13:27:07.627+00:00

    @Manuel Galdamez

    So, after following this message board and following most of what has been done before. E.g preloading drivers, placing DLLs in C:\Windows\System32\spool\drivers\x64\3, or some other changes, only half worked or was inconsistent. I came up with the approach below. I am aware that this will allow the vulnerability, but it will restrict it to a single or chosen print servers, which you can monitor with any desired VS/Network tools. Also make sure that DC have printer server spooler turned off (which you should be doing anyway) and the printer server is NOT facing the outside/externally (which to me would be nuts!) then this way will work for you….

    This approach will do the following,
    Allow a certain print server to install to non admins. All other print servers or other machines are not allowed to add drivers via non admin accounts.

    Allow you to carry on using GPO while you move to a better process like uni print.

    No extra settings need to be added or reloaded via Intune/SCCM

    Create the following rekey’s in GPP via Computer – Preferences – Windows settings – Registry – DO NOT USE A POLICY for some of the settings EVEN though they are located in the point and print template…..as this will not apply correctly. ALSO MAKE SURE THAT YOU ALSO APPLY IN ORDER AS MENTIONED BELOW 1-9. It’s very important the “RestrictDriverInstallationToAdministrators” is last to be applied. Also just apply it to your Machine OUs and you don’t have to change your existing printer policy.

    Hive - HKEY_LOCAL_MACHINE
    Key path - SOFTWARE\Policies\Microsoft\Windows NT\Printers\PointAndPrint
    Value name – Restricted
    Value Type – REG_DWORD
    Value data - 1

    Hive - HKEY_LOCAL_MACHINE
    Key path - SOFTWARE\Policies\Microsoft\Windows NT\Printers\PointAndPrint
    Value name – TrustedServers
    Value Type – REG_DWORD
    Value data – 1

    Hive - HKEY_LOCAL_MACHINE
    Key path - SOFTWARE\Policies\Microsoft\Windows NT\Printers\PointAndPrint
    Value name – ServerList
    Value Type – REG_SZ
    Value data – YOURPRINTSERVERNAME01@keyman .COM; YOURPRINTSERVERNAME02@keyman .COM

    Hive - HKEY_LOCAL_MACHINE
    Key path - SOFTWARE\Policies\Microsoft\Windows NT\Printers\PointAndPrint
    Value name – InForest
    Value Type – REG_DWORD
    Value data – 1

    Hive - HKEY_LOCAL_MACHINE
    Key path - SOFTWARE\Policies\Microsoft\Windows NT\Printers\PointAndPrint
    Value name – NoWarningNoElevationOnInstall
    Value Type – REG_DWORD
    Value data – 1

    Hive - HKEY_LOCAL_MACHINE
    Key path - SOFTWARE\Policies\Microsoft\Windows NT\Printers\PointAndPrint
    Value name – UpdatePromptSettings
    Value Type – REG_DWORD
    Value data – 1

    Hive - HKEY_LOCAL_MACHINE
    Key path - SOFTWARE\Policies\Microsoft\Windows NT\Printers\PointAndPrint
    Value name – PackagePointAndPrintServerList
    Value Type – REG_DWORD
    Value data – 1

    Hive - HKEY_LOCAL_MACHINE
    Key path - SOFTWARE\Policies\Microsoft\Windows NT\Printers\PackagePointAndPrint\ListofServers
    Value name – YOURPRINTSERVERNAME01; YOURPRINTSERVERNAME02
    Value Type – REG_SZ
    Value data – YOURPRINTSERVERNAME01@keyman .COM; YOURPRINTSERVERNAME02@keyman .COM

    Hive - HKEY_LOCAL_MACHINE
    Key path - SOFTWARE\Policies\Microsoft\Windows NT\Printers\PointAndPrint
    Value name – RestrictDriverInstallationToAdministrators
    Value Type – REG_DWORD
    Value data – 0

    0 comments No comments