๐‡๐Ž๐– ๐“๐Ž ๐ƒ๐ˆ๐’๐€๐๐‹๐„ ๐๐‘๐ˆ๐๐“ ๐’๐๐Ž๐Ž๐‹๐„๐‘ ๐Ž๐ ๐ƒ๐Ž๐Œ๐€๐ˆ๐ ๐‚๐Ž๐๐“๐‘๐Ž๐‹๐‹๐„๐‘๐’

Print Spooler is a service that takes care of print management. This includes, but is not limited to, managing printer drivers, scheduling print jobs, etc.

Print Spooler had a critical vulnerability in the past referred to as PrintNightmare (CVE-2021-34527). This vulnerability allowed attackers to execute code with administrator privileges.

The Print Spooler vulnerability was patched promptly, so if you have updated systems, the immediate risk associated with PrintNightmare is no longer present. And for normal systems, it is usually not feasible to disable Print Spooler. It would make printing impossible, which is usually not desirable.

But domain controllers are a critical part of Active Directory and need to be as secure as possible, which means blocking everything that is not needed. And you certainly should not need to print on domain controllers, so itโ€™s a good idea to disable Print Spooler on domain controllers.

๐Ÿ“บ Watch my YouTube video bellow on how to disable Print Spooler on Domain Controllers ๐Ÿ‘‡ ๐Ÿ‘‡
https://youtu.be/O80HHKdnbcQ

#cswlrd #printspooler #domaincontrollers #printnightmare #videotutorial

How to disable Print Spooler on Domain Controllers | Cybersecurity World

YouTube

All #sysadmins should review this article and the #CVE reports. Ensure ALL of your #domaincontrollers (at a minimum) and #WindowsServers are fully patched to prevent this vulnerability from being exploited. No one wants an #LDAP #DoS situation. What a nightmare that would be.

#StayCyberAware #BeCyberSafe

https://www.darkreading.com/vulnerabilities-threats/active-directory-flaw-can-crash-any-microsoft-server-connected-to-the-internet

Active Directory Flaw Can Crash Any Microsoft Server

Windows servers are vulnerable to a dangerous LDAP vulnerability that could be used to crash multiple servers at once and should be patched immediately.

Is there any reason to use server based backups for #ActiveDirectory #DomainControllers ? We can spin up VMs quickly, then promote a replacement. Restoring a DC from backup only introduces an old copy of the AD database, which will get replaced during replication.

An application was struggling with time drift issues, so everyone questioned the time on the #DomainControllers I queried the DCs using #Powershell and found that the time was consistent.

Afterward, I realized this is something I should know every day, not just when there's a reported time drift issue. So I included that script as part of my daily health checks.

Always room for more health checks. #ActiveDirectory #WhatTimeIsIt

Windows Exploit Released For Microsoft โ€˜Zerologonโ€™ Flaw

Security researchers and U.S. government authorities alike are urging admins to address Microsoft's critical privilege escalation flaw.

Threatpost - English - Global - threatpost.com