Allow Print Spooler to Accept Client Connections using Intune Policy

Here, this post will help you in the deployment of the Allow Print Spooler To Accept Client Connections Policy. We’ll make use of Intune’s Settings Catalog to install this policy. We are using Configuration Profiles of Intune to deploy the Allow Print Spooler To Accept Client Connections Policy.

Allow Print Spooler To Accept Client Connections Policy governs the acceptance of client connections by the print spooler. When the policy is either not configured or enabled, the spooler consistently accepts client connections.

Conversely, when the policy is disabled, the spooler refuses client connections and prevents users from sharing printers. Any currently shared printers will remain shared. Restarting the spooler is necessary for changes to this policy to become effective.

Microsoft announced a change to the default behavior of point and print drivers on August 10, 2021. This alteration affects the default installation and updates behaviour of Point and Print drivers, now necessitating Administrator privileges.

Patch My PC

The details are documented in KB5005652—Managing the new Point and Print default driver installation behavior (CVE-2021-34481). This modification takes precedence over all Point and Print Group Policy settings, ensuring that only Administrators can install printer drivers from a print server using Point and Print.

Deploy Intune Allow Print Spooler To Accept Client Connections Policy Fig.1
Deploy Intune Allow Print Spooler To Accept Client Connections Policy Fig.1

Allow Print Spooler To Accept Client Connections Intune Policy

To create a Allow Print Spooler To Accept Client Connections Policy, follow the steps stated below:

  • Sign in to the Intune Admin Center portal https://intune.microsoft.com/.
  • Select Devices > Windows > Configuration profiles > Create a profile.

In Create Profile, I select Windows 10 and later in Platform and select Profile Type as Settings catalog. Click on the Create button.

Deploy Intune Allow Print Spooler To Accept Client Connections Policy Fig.2
Deploy Intune Allow Print Spooler To Accept Client Connections Policy Fig.2

On the Basics tab pane, I provide a name for the policy as “Allow Print Spooler To Accept Client Connections Policy.”

Adaptiva
  • Optionally, if you want, you can enter a policy description and proceed by selecting “Next
Deploy Intune Allow Print Spooler To Accept Client Connections Policy Fig.3
Deploy Intune Allow Print Spooler To Accept Client Connections Policy Fig.3

Now in Configuration Settings, Click Add Settings to browse or search the catalog for the settings I want to configure.

Deploy Intune Allow Print Spooler To Accept Client Connections Policy Fig.4
Deploy Intune Allow Print Spooler To Accept Client Connections Policy Fig.4

In the Settings Picker windows. I searched for the keyword Print Spooler. I found the category Administrative Templates\Printers and selected this.

  • When I select that option as stated above, I see the sub-category Allow Print Spooler to accept client connections. After selecting that, click the cross mark at the right-hand corner, as shown below.
Deploy Intune Allow Print Spooler To Accept Client Connections Policy Fig.5
Deploy Intune Allow Print Spooler To Accept Client Connections Policy Fig.5

Here in Administrative Templates, I have disabled the Allow Print Spooler to accept client connections.

Deploy Intune Allow Print Spooler To Accept Client Connections Policy Fig.6
Deploy Intune Allow Print Spooler To Accept Client Connections Policy Fig.6

Using Scope tags, you can assign a tag to filter the profile to specific IT groups. One can add scope tags (if required). More details on Intune Scope Tags Implementation Guide.

  • Click Next to continue.

Now in Assignments, in Included Groups, you need to click on Add Groups and choose Select Groups to include one or more groups. Click Next to continue.

Deploy Intune Allow Print Spooler To Accept Client Connections Policy Fig.7
Deploy Intune Allow Print Spooler To Accept Client Connections Policy Fig.7

In the Review + Create tab, I review settings. After clicking on Create, changes are saved, and the profile is assigned.

Deploy Intune Allow Print Spooler To Accept Client Connections Policy Fig.8
Deploy Intune Allow Print Spooler To Accept Client Connections Policy Fig.8

After successfully creating the “Allow Print Spooler To Accept Client Connections Policy,” a notification will appear in the top right-hand corner confirming the action. You can also verify the policy’s existence by navigating to the Configuration Profiles list, where it will be prominently displayed.

Your groups will receive your profile settings when the devices check in with the Intune service. The Policy applies to the device.

Intune Report for Allow Print Spooler To Accept Client Connections Policy

From the Intune Portal, you can view the Intune settings catalog profile report, which provides an overview of device configuration policies and deployment status.

To track the assignment of the policy, you need to select the relevant policy from the Configuration Profiles list, which is the Allow Print Spooler To Accept Client Connections Policy. Then, you can review the device and user check-in status to determine whether the policy has been successfully applied.

  • If you require more detailed information, you can click on “View Report” to access additional insights.
Deploy Intune Allow Print Spooler To Accept Client Connections Policy Fig.9
Deploy Intune Allow Print Spooler To Accept Client Connections Policy Fig.9

Intune MDM Event Log – Allow Print Spooler To Accept Client Connections Policy

To verify the successful implementation of String or integer policies for the Allow Print Spooler To Accept Client Connections Policy on Windows 10 or 11 devices through Intune, you can leverage event IDs 813 and 814.

These event IDs provide valuable insights into the Allow Print Spooler To Accept Client Connections Policy’s application status and the specific value assigned to the policy on those devices. In the case of this particular policy, the value is String and is linked to the event ID 814.

By analyzing these event IDs, you can clearly understand the policy’s application status and the corresponding value associated with it on the devices in question.

To confirm this, you can check the Event log path – Applications and Services Logs – Microsoft – Windows – Devicemanagement-Enterprise-Diagnostics-Provider – Admin.

MDM PolicyManager: Set policy string, Policy: (RegisterSpoolerRemoteRpcEndPoint), Area: (ADMX_Printing2), EnrollmentID requesting merge: (5B88AEF1-09E8-43BB-B144-7254ACBBDF3E), Current User: (Device), String: (<disabled/>), Enrollment Type: (0x6), Scope: (0x0).

Deploy Intune Allow Print Spooler To Accept Client Connections Policy Fig.10
Deploy Intune Allow Print Spooler To Accept Client Connections Policy Fig.10

When I opened the above Event log, I found that the Allow Print Spooler To Accept Client Connections Policy I applied to the device was successfully implemented.

  • By reviewing the log entry shown in the above image, the Event Viewer, I came across essential information, including the Area and Enrollment ID.

These details play a significant role in identifying the corresponding registry path. To locate the specific information, please consult the table provided below:

AreaPolicyStringScopedEvent ID
ADMX_Printing2RegisterSpoolerRemoteRpcEndPointDisabledDevice814
Table 1 – Deploy Intune Allow Print Spooler To Accept Client Connections Policy

The details presented in the table above for the Deploy Intune Allow Print Spooler To Accept Client Connections Policy can be employed to access the registry settings that hold the group policy configurations on a specific computer. T

To accomplish this, you can execute “REGEDIT.exe” on the target computer and navigate to the precise registry path where these settings are stored.

Computer\HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\PolicyManager\providers\5B88AEF1-09E8-43BB-B144-7254ACBBDF3E\default\Device\ADMX_Printing2

When you navigate the above path in the Registry Editor, you will find the registry key named RegisterSpoolerRemoteRpcEndPoint. Also, when I navigated to the above path, I saw that the Registry Key was created successfully.

Registry NameData
RegisterSpoolerRemoteRpcEndPointDisabled
Table 2 – Deploy Intune Allow Print Spooler To Accept Client Connections Policy
Deploy Intune Allow Print Spooler To Accept Client Connections Policy Fig.11
Deploy Intune Allow Print Spooler To Accept Client Connections Policy Fig.11

Windows CSP Details RegisterSpoolerRemoteRpcEndPoint

We will see Windows CSP Details for this Policy setting RegisterSpoolerRemoteRpcEndPoint. Activating Windows User Account Control (UAC) for updating current print drivers can be valuable in addressing the PrintNightmare vulnerability (CVE-2021-34527) and other potential Print Spooler attacks.

Even though the Point and Print default driver installation behaviour takes precedence over this configuration, it remains crucial to set up UAC as a safeguard in case the behaviour is reversed.

CSP URI – ./Device/Vendor/MSFT/Policy/Config/ADMX_Printing2/RegisterSpoolerRemoteRpcEndPoint

Deploy Intune Allow Print Spooler To Accept Client Connections Policy Fig.12
Deploy Intune Allow Print Spooler To Accept Client Connections Policy Fig.12

We are on WhatsApp. To get the latest step-by-step guides and news updates, Join our Channel. Click hereHTMD WhatsApp.

Author

Abhinav Rana is working as an SCCM and Intune Admin with several years of experience. He loves to help the community by sharing his knowledge. He is a B.Tech graduate in Information Technology.

Leave a Comment

This site uses Akismet to reduce spam. Learn how your comment data is processed.