PrintNightmare (Microsoft Print Spooler Exploit)

July 8th, 2021 Update

Due to the problems found with Microsoft Patch that was released on June 6th, our rolling deployment has been paused until the patch is re-released correctly. This is to limit the number of emergency patch cycle we have to run. In the meantime, we are rolling out a mitigation to the vulnerability that does not require a reboot. We do not expect any side-affects from our testing however as always please reach out to our support desk if you are having a problem.

Hear From Our
Happy Clients

Read Our Reviews

July 7th, 2021 Update

As you may be aware, there has been a critical vulnerability discovered in the core printing feature of all Windows Operating Systems. We have been watching this closely and keeping an eye on systems for behavior indicating that the vulnerability was exploited.
Yesterday at 7pm EST Microsoft released a patch out-of-band of their normal patch cycle that addresses the security issue. We’ll be beginning an immediate rolling upgrade schedule, out of band of our normal patching schedule, to address the issue. This patch only applies to CURRENTLY supported Windows Operating systems.

PLEASE NOTE: Emergency maintenance is required ASAP to patch your systems and keep them secure.

As the patch is installed, end-users will be prompted to reboot their machines. If this is not done within 24 hours, the user will be prompted again and then a restart may be forced (with a 10-minute delay for users to save their work).

Servers will patch and reboot after hours.

Due to the severe nature of this vulnerability, we will not be able to honor normal server and workstation reboot preferences.