Skip to content

Commit

Permalink
updated GPO
Browse files Browse the repository at this point in the history
  • Loading branch information
ZephrFish authored Jul 1, 2021
1 parent c4b9b58 commit 42dd021
Showing 1 changed file with 1 addition and 1 deletion.
2 changes: 1 addition & 1 deletion README.md
Original file line number Diff line number Diff line change
Expand Up @@ -25,7 +25,7 @@ If in doubt as to how to do this, the following steps can be taken:
5. If the "Anonymous Logon", "Authenticated Users" or "Everyone" groups are members, select each and click "Remove".

## GPO
The following GPO can be set to deny client connections to the spooler, which is a potential work around where disabling the spooler service altogether might not be an option. Note: this has been tested against domain controllers, it has not been confirmed to fix the issue against endpoints
The following GPO can be set to deny client connections to the spooler, which is a potential work around where disabling the spooler service altogether might not be an option. Note: this has been tested against domain controllers and endpoints(W7/W10) and users can still add/remove printers and print however it stops the exploit from working.

`Computer Configuration -> Administrative Templates -> Printers -> Allow Print Spooler to accept client connections`
set this to Disabled:
Expand Down

0 comments on commit 42dd021

Please sign in to comment.