You also have the option to configure the RestrictDriverInstallationToAdministrators registry setting to prevent non-administrators from installing signed printer drivers on a print server. Microsoft recommends that you immediately install this update on all supported Windows client and server operating system, starting with devices that currently host the print server role.
The installed root certificates in the system’s Trusted Root Certification Authorities trusts signed drivers. By default, administrators can install signed and unsigned printer drivers to a print server. After installing this and later Windows updates, users who are not administrators can only install signed print drivers to a print server. Key changes include:Īddresses a remote code execution exploit in the Windows Print Spooler service, known as “PrintNightmare”, as documented in CVE-2021-34527. This security update includes quality improvements. Updates a remote code execution exploit in the Windows Print Spooler service, known as “PrintNightmare”, as documented in CVE-2021-34527. To view other notes and messages, see the Windows 10, version 1809 update history home page.
For information about Windows update terminology, see the article about the types of Windows updates and the monthly quality update types.