MS Print Spooler vulnerability

    Applies to:
  • SecureAuth Identity Platform
  • Legacy SecureAuth IdP
Deployment model:
  • Cloud
  • Hybrid
  • On Premises
  • Version Affected:  All


    Microsoft has announced a vulnerability in their Print Spooler service



    MS vulnerability



    The IdP has no need for the Print Spooler service to be running. We recommend that you disable the service as per the MS article above to protect your IdP. 


    Special Considerations:  

    The following Powershell will enable logging for that service so that if something does happen, there is a potential trail. It will also disable the Service.


    $spoolerLog = Get-LogProperties 'Microsoft-Windows-PrintService/Operational'
    if ($spoolerLog.Enabled -eq $false) {
    $spoolerLog.Enabled = $true
    Set-LogProperties -LogDetails $spoolerLog
    }$status = get-service -name spooler | select-object Status -ExpandProperty Status
    if ($status -eq "Running") {
    stop-service -Name spooler
    set-service -name spooler -status stopped -startupType disabled



    SecureAuth Knowledge Base Articles provide information based on specific use cases and may not apply to all appliances or configurations. Be advised that these instructions could cause harm to the environment if not followed correctly or if they do not apply to the current use case.

    Customers are responsible for their own due diligence prior to utilizing this information and agree that SecureAuth is not liable for any issues caused by misconfiguration directly or indirectly related to SecureAuth products.

    0 out of 0 found this helpful



    Please sign in to leave a comment.