fbpx
Frame-14

Privacy Ninja

        • DATA PROTECTION

        • CYBERSECURITY

        • Penetration Testing

          Secure your network against various threat points. VA starts at only S$1,000, while VAPT starts at S$4,000. With Price Beat Guarantee!

        • API Penetration Testing
        • Enhance your digital security posture with our approach that identifies and addresses vulnerabilities within your API framework, ensuring robust protection against cyber threats targeting your digital interfaces.

        • On-Prem & Cloud Network Penetration Testing
        • Boost your network’s resilience with our assessment that uncovers security gaps, so you can strengthen your defences against sophisticated cyber threats targeting your network

        • Web Penetration Testing
        • Fortify your web presence with our specialised web app penetration testing service, designed to uncover and address vulnerabilities, ensuring your website stands resilient against online threats

        • Mobile Penetration Testing
        • Strengthen your mobile ecosystem’s resilience with our in-depth penetration testing service. From applications to underlying systems, we meticulously probe for vulnerabilities

        • Cyber Hygiene Training
        • Empower your team with essential cybersecurity knowledge, covering the latest vulnerabilities, best practices, and proactive defence strategies

        • Thick Client Penetration Testing
        • Elevate your application’s security with our thorough thick client penetration testing service. From standalone desktop applications to complex client-server systems, we meticulously probe for vulnerabilities to fortify your software against potential cyber threats.

        • Source Code Review
        • Ensure the integrity and security of your codebase with our comprehensive service, meticulously analysing code quality, identifying vulnerabilities, and optimising performance for various types of applications, scripts, plugins, and more

        • Email Spoofing Prevention
        • Check if your organisation’s email is vulnerable to hackers and put a stop to it. Receive your free test today!

        • Email Phishing Excercise
        • Strengthen your defense against email threats via simulated attacks that test and educate your team on spotting malicious emails, reducing breach risks and boosting security.

        • Cyber Essentials Bundle
        • Equip your organisation with essential cyber protection through our packages, featuring quarterly breached accounts monitoring, email phishing campaigns, cyber hygiene training, and more. LAUNCHING SOON.

How To Fix Printers Asking For Admins Creds After PrintNightmare Patch

How To Fix Printers Asking For Admins Creds After PrintNightmare Patch

Some printers will request administrator credentials every time users try to print in Windows Point and Print environments due to a known issue caused by KB5005033 or later security updates addressing the PrintNightmare vulnerability.

This happens because, after installing these PrintNightmare patches, only administrators are allowed to install or update drivers via Point and Print.

The request for admin credentials is triggered automatically in environments where the print server has a newer driver than the client attempting to print.

“Certain printers in some environments using Point and Print might receive a prompt saying, ‘Do you trust this printer’ and requiring administrator credentials to install every time an app attempts to print to a print server or a print client connects to a print server,” Microsoft explains.

Also Read: Going Beyond DPO Meaning: Ever Heard of Outsourced DPO?

“This is caused by a print driver on the print client and the print server using the same filename, but the server has a newer version of the file.”

The complete list of impacted client and server platforms includes:

  • Client: Windows 10, version 21H1; Windows 10, version 20H2; Windows 10, version 2004; Windows 10, version 1909; Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10 Enterprise LTSC 2016; Windows 10, version 1607; Windows 10 Enterprise 2015 LTSB; Windows 8.1; Windows 7 SP1
  • Server: Windows Server 2022; Windows Server, version 20H2; Windows Server, version 2004; Windows Server, version 1909; Windows Server, version 1809; Windows Server 2019; Windows Server 2016; Windows Server 2012 R2; Windows Server 2012; Windows Server 2008 R2 SP1; Windows Server 2008 SP2

If you’re not using Point and Print, you should not be affected by this issue, and you’ll also be protected by default after installing security updates released since August 10.

Workaround available

Microsoft added that the known issue could be solved by ensuring that the same printer driver version is installed on the print server and all clients within your environment.

“Verify that you are using the latest drivers for all your printing devices and where possible, use the same version of the print driver on the print client and print server,” the company said.

If updating printer drivers across your environment does not fix these printing problems, you should reach out to your printer manufacturer (OEM) support team.

Additional information about this issue is available in the Frequently asked questions section of the KB5005652 support document.

In related news, according to user reports, PrintNightmare security updates released as part of this month’s Patch Tuesday are also breaking network printing.

Also Read: 5 Common Sections in an Agreement Form Example

Windows administrators have been experiencing wide-scale network printing problems after installing the fix for the last remaining PrintNightmare vulnerability.

BleepingComputer has reached out to Microsoft with questions about these ongoing issues but has not heard back.

0 Comments

KEEP IN TOUCH

Subscribe to our mailing list to get free tips on Data Protection and Data Privacy updates weekly!

Personal Data Protection

REPORTING DATA BREACH TO PDPC?

We have assisted numerous companies to prepare proper and accurate reports to PDPC to minimise financial penalties.
×

Hello!

Click one of our contacts below to chat on WhatsApp

× Chat with us