question

DanHoffa-5449 avatar image
4 Votes"
DanHoffa-5449 asked GaryLongstaff-3209 edited

Windows failed to apply the Deployed Printer Connections settings.

I am experiencing an issue with Deployment of Printers from GPO. This just started last week after I replaced existing 2012r2 DC and 2012R2 Print Server with New 2019 DC and Print Server If a user had already gotten their printers from GPO they are present and work. If a user needs printers to load from GPO they will not. When we run gpupdate /force we get this "Windows failed to apply the Deployed Printer Connections settings. Deployed Printer Connections settings might have its own log file. Please click on the "More information" link."

All other GPOs are processing and working properly.

I have 4 other DCs (3 - 2012r2 and 1 -2019) and 3 other Print Servers (2 - 2012R2 and 1 - 2019) Workstations are all Win10 assorted flavors (1908 through 21H2)

Since I list all printers in the Directory. I can still install the printers manually from the Printer Servers through "Add Printer" and they install without issue even for none admin users.

Microsoft has really made a mess with this recent security update. Did they ever test this with GPO deployment of printers before dumping it out there?

Anyone else seeing this behavior? Has anyone fixed this behavior?

windows-server-2019windows-10-securitywindows-group-policywindows-server-2012windows-server-print
· 7
5 |1600 characters needed characters left characters exceeded

Up to 10 attachments (including images) can be used with a maximum of 3.0 MiB each and 30.0 MiB total.

I had the same issue as this but was able to resolve it by changing the way i mapped printers in GPO.
Initially i was getting this issue when tryng to map printers via the User GPO settings in; User Configuration - Policies - Windows Settings - Deployed Printers

However when i started mapping them using the User Configuration - Preferences - Control Panel Settings - Printers
They started to map every logon and i also didnt get the gp error "Windows failed to apply the Deployed Printer Connections settings. Deployed Printer Connections settings might have its own log file. Please click on the "More information" link."

Hope this helps

2 Votes 2 ·

Hi,
I had the same issue.
I temporarily set RestrictDriverInstallationToAdministrators to 0.

As said by you I've tried to use this GPO
User Configuration - Preferences - Control Panel Settings - Printers
but every time I access to my computer the printers start to map and lost default printer.

I can't set default printer via GPO because the same GPO is applied to all users in all offices.

There are any workarounds? I can't deploy printers to computer because there isn't GPO option to deploy shared Printers like in User Settings and my printers are installed in a print server that share them.

0 Votes 0 ·

The stranger part is that this has caused Print Servers that have not had the updates to not deploy via GPO. Most recent print server I installed was 2019 and fully updated with 9/21 rollup. This is when My problem started and it was only that server at first. With in a few hours all my print servers stopped deploying printers from GPO. My other 3 print servers have not had the 9/21 update. 2 of them (1 - 2012R2 and 1 - 2019) have had the 8/21 update and 1 of them (1- 2012R2) has only had 7/21 update.

That single server having the 9/21 update broke all the rest in a few hours.

Microsoft needs to stop passing the buck and admit the screwed everyone that uses print servers and come up with a real fix for the issue.

0 Votes 0 ·

I have updated server 2019 on 24/09/2021 after I had the first report of missing printers , so my issue appeared before 09/21 update.

Don't you think it may be more related to updates on the Windows 10 devices?

Some of my devices works fine - for sure the computers which I updated recently got this issue.
I will need to check computers which do not have this issue and check when those been updated.

0 Votes 0 ·

I don't believe it has to do with the Workstations. I have workstations that haven't been updated in a year that printer deployment via GPO now does work. It doesn't seem to matter if it is 1908 that hasn't been updated in a year or if it is 21h2 that is fully updated.

0 Votes 0 ·

I came across this yesterday after moving printers to a new server after the original took a nose dive. Some users were able to get the new connections with just a gpupdate, some required log off/on or reboot, others refused to work at all. GPResult showed the same as others - there was an error and to click More Information, a link which doesn't seem to exist. I changed those GPOs to deploy via Control Panel instead, which I'd really rather not do. Hopefully they get it resolved soon!

0 Votes 0 ·

Did you ever find anything that works for you? I am still fighting this issue.

0 Votes 0 ·
dn-1506 avatar image
2 Votes"
dn-1506 answered KloubekMichal-5249 published
· 1
5 |1600 characters needed characters left characters exceeded

Up to 10 attachments (including images) can be used with a maximum of 3.0 MiB each and 30.0 MiB total.

This helped me !! Thanks

0 Votes 0 ·
GaryLongstaff-3209 avatar image
0 Votes"
GaryLongstaff-3209 answered GaryLongstaff-3209 edited

Okay so Microsoft as usual 'passed the buck' to others. We have all had to look at creating a Reg policy for Point and Print
HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows NT\Printers\PointAndPrint
value name="RestrictDriverInstallationToAdministrators"
type=REG_DWORD
value=0

After the most recent updates MS forced the restriction and this still impacts older printer drivers even after the reg hack. After plenty of head scratching and investigations: 1.You must have Type 3 drivers 2. If you have older packages NOT classed as packaged it appears MS still doesn't allow them without issues: using kix script-even if you have disabled the Point and Print registry, the user is still prompted with the 'Trust this printer and install option', to which you need to supply and admin account . Once installed all fine the next time around. IF using GPO Targeting the printer configured in GPO doesn't appear in the printer options list when trying to print. Found the following in the event log of the client machine [even though the driver does exist on the server]
193141-untitled-1.jpg
[1]The column where the Package column have 'false' against them will likely be issues:
193096-capture.jpg
I had been scratching my head for days testing and wondering why the Brother HL-5450DN worked but not the Brother HL-L8250CDN as there just didn't appear to be a reason for it, well there is thanks to MS. :( So, to sum up: 1. You will require new drivers from the manufacturer’s website. 2. look at ways to possibly build a 'package' to be deployed by systems like SCCM.

Just another shambles!


untitled-1.jpg (35.6 KiB)
capture.jpg (77.6 KiB)
5 |1600 characters needed characters left characters exceeded

Up to 10 attachments (including images) can be used with a maximum of 3.0 MiB each and 30.0 MiB total.

Viliusumskas-5436 avatar image
0 Votes"
Viliusumskas-5436 answered Viliusumskas-5436 edited

We experience exactly the same behaviour. I've spent one full day and I think this is a bug in how Microsoft fixed PrintNightmare vulnerability and printer deployment via Deployed Printer Connection GPO.

I'm dumping all test information here in case someone needs it. The tests where performed on Windows Server 2019 print server and Windows 10 clients with latest 2021-12 CU installed, though I don't think OS version matters that much.

First thing you need to understand is that the behaviour and how GPO settings described in this MS article https://support.microsoft.com/en-us/topic/kb5005652-manage-new-point-and-print-default-driver-installation-behavior-cve-2021-34481-873642bf-2634-49c5-a23b-6d8e9a302872 work depends on the type of the driver.


If you are using only V4 drivers there are three possible solutions (choose only one of them):



Solution 1
a) Set Computer Configuration -> Policies -> Administrative Templates -> Printers -> Only use Package Point and Print to Enabled.
b) Set Computer Configuration -> Policies -> Administrative Templates -> Printers -> Package Point and Print - Approved Servers to Enabled and specify FQDN of your print server.
c) Set Computer Configuration -> Policies -> Administrative Templates -> Printers -> Limit print driver installation to Administrators to Disabled.

This will allow to deploy printers via Deployed Printer Connection GPO targeting User Scope. I didn't find any information if this also enables PrintNightmare vulnerability. Here https://support.microsoft.com/en-us/topic/kb5005010-restricting-installation-of-new-printer-drivers-after-applying-the-july-6-2021-updates-31b91c02-05bc-4ada-a7ea-183b129578a7 Microsoft says that CVE-2021-34527 is only present if Point and Print Restrictions GPO is used and nothing about Package Point and Print. Even if it is, the vulnerability should be limited only to the attack vector coming from the FQDN specified earlier. Also, vulnerability should only be exploitable when attacker uses V3 packaged drivers, and not package-unaware drivers.



Solution 2
Use GPP instead of Deployed Printer Connection GPO to deploy printers. This will allow to deploy V4 printers without any other GPO/registry changes.



Solution 3
Change your Deployed Printer Connection GPO to use Computer Configuration instead of User Configuration and apply it to Computers OU instead of Users OU. This again will allow you to deploy V4 printers without any other GPO/registry changes.


If you are using V3 packaged drivers there is only one solution:


Solution 1
a) Set Computer Configuration -> Policies -> Administrative Templates -> Printers -> Only use Package Point and Print to Enabled.
b) Set Computer Configuration -> Policies -> Administrative Templates -> Printers -> Package Point and Print - Approved Servers to Enabled and specify FQDN of your print server.
c) Set Computer Configuration -> Policies -> Administrative Templates -> Printers -> Limit print driver installation to Administrators to Disabled.

This will allow to deploy printers via Deployed Printer Connection GPO targeting User Scope. Again, it is unclear if this enables PrintNightmare vulnerability, but even if it's so, the vulnerability should be limited only to the attack vector coming from the FQDN specified earlier. Also, vulnerability should only be exploitable when attacker uses V3 packaged drivers, and not package-unaware drivers.


If you are using very old V3 package-unaware drivers the solution is a little bit different:


Solution 1
a) Set Computer Configuration -> Policies -> Administrative Templates -> Printers -> Package Point and Print - Approved Servers to Enabled and specify FQDN of your print server.
b) Set Computer Configuration -> Policies -> Administrative Templates -> Printers -> Point and Print Restrictions to Enabled, enable User can only point and print from these servers and specify FQDN of your print server. Also, don't forget set Security Prompts to your liking.
c) Set Computer Configuration -> Policies -> Administrative Templates -> Printers -> Limit print driver installation to Administrators to Disabled.

This will allow to deploy printers via Deployed Printer Connection GPO targeting User Scope, but if you choose to disable Security Prompts in step b) it also enables PrintNightmare vulnerability. Vulnerability can be exploited when using both V3 packaged and package-unaware drivers. It is limited to the attack vector coming from the FQDN specified earlier though. If Security Prompts are enabled vulnerability cannot be exploited.


Since I'm using only V4 drivers and I think it's a bug, I went with first Solution 1 and will wait until MS hopefully comes up with another fix.

Hope this helps.

P.S. I encourage everyone to have Feedback Hub ticket filled regarding this issue. Maybe our voices will be heard at some point.

5 |1600 characters needed characters left characters exceeded

Up to 10 attachments (including images) can be used with a maximum of 3.0 MiB each and 30.0 MiB total.

MatthewEvans-0982 avatar image
0 Votes"
MatthewEvans-0982 answered

I had the same issue as this but was able to resolve it by changing the way i mapped printers in GPO.
Initially i was getting this issue when tryng to map printers via the User GPO settings in; User Configuration - Policies - Windows Settings - Deployed Printers

However when i started mapping them using the User Configuration - Preferences - Control Panel Settings - Printers
They started to map every logon and i also didnt get the gp error "Windows failed to apply the Deployed Printer Connections settings. Deployed Printer Connections settings might have its own log file. Please click on the "More information" link."

Hope this helps

5 |1600 characters needed characters left characters exceeded

Up to 10 attachments (including images) can be used with a maximum of 3.0 MiB each and 30.0 MiB total.

AldenThompson-6632 avatar image
0 Votes"
AldenThompson-6632 answered AldenThompson-6632 commented

Same issue, Windows 10 various versions. We manage printing by users so it's not realistic to do a computer configuration. Deployment works if the user is a local admin but this is not feasible in all circumstances obviously.

· 1
5 |1600 characters needed characters left characters exceeded

Up to 10 attachments (including images) can be used with a maximum of 3.0 MiB each and 30.0 MiB total.

TerribleTedL-9901 avatar image
0 Votes"
TerribleTedL-9901 answered

We have a few machines that the GPO fails and some that do not. What I have found is KB5005699 was installed on all the machines having an issue. The unfortunate thing is, you cannot remove a servicing stack update, which this appears to be. Servicing stack 10.0.19041.1220. Not 100% if this is the issue, but none of the machines that are working correctly have this servicing stack update. They are all on Win10 version 21h1.

5 |1600 characters needed characters left characters exceeded

Up to 10 attachments (including images) can be used with a maximum of 3.0 MiB each and 30.0 MiB total.

BISG-1081 avatar image
0 Votes"
BISG-1081 answered

RalfAzevedo-5486, imo this problem has nothing to do with GPO. Windows updates - you can read a lot about, there is option to turn it off, but it`s on your risk. I had to install the updates by myself on most devices, so far it`s not asking to repeat this task. If you have a chance to do it manually, get to each PC try to print test page and if it will ask for permission than accept it with admin login.

5 |1600 characters needed characters left characters exceeded

Up to 10 attachments (including images) can be used with a maximum of 3.0 MiB each and 30.0 MiB total.

RalfAzevedo-5486 avatar image
0 Votes"
RalfAzevedo-5486 answered TheAlanMorris commented

I started having similar problems a few weeks ago. Some users started asking for elevation to install the print server driver, something that didn't happen before. Other users from different OUs did not experience the problem.

I checked the GPOs and they are identical, the difference is the OR of each user. Printers have no security restriction, everyone can print to them.

RSOP fails 0x800702e4 in GPO deployment. I don't have the updates installed on the machines, I don't know what to do anymore. All printers are installed by machine and non-user permissions.

Anyone with any solution to help me?

· 2
5 |1600 characters needed characters left characters exceeded

Up to 10 attachments (including images) can be used with a maximum of 3.0 MiB each and 30.0 MiB total.

My guess is that either the Print Server or the DC that these affected users received a recent patch that the others have not yet. I'd check there

0 Votes 0 ·

this is the precise error
C:\>winerror 0x02e4
740 ERROR_ELEVATION_REQUIRED

The user needs to install the print software using the new default of administrator credentials.

0 Votes 0 ·
TGooT-2525 avatar image
0 Votes"
TGooT-2525 answered TGooT-2525 edited

A technician of us found the following solution to this:

reg add "HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows NT\Printers\PointAndPrint" /v RestrictDriverInstallationToAdministrators /t REG_DWORD /d 0 /f

Adding the above registry key to the client seems to have solved the issue. The queue is deployed automatically and the error message when doing a gpupdate is gone.

Solutions found on:
https://www.computerworld.com/article/3630629/windows-print-nightmare-continues-enterprise.html

We are not sure about the security aspects of this solution. It may however be a better one than giving local admin rights.

· 2
5 |1600 characters needed characters left characters exceeded

Up to 10 attachments (including images) can be used with a maximum of 3.0 MiB each and 30.0 MiB total.

Thanks for the response. I have been dealing with things other than this recently and have forgotten some of the details of things that I have read and tried.

Does this allow for Printer Deployment per User via GPO to process and load printer for the individual users?

Also if I am not mistaken doing this basically negates the Print Nightmare fix and opens you right back up to the same vulnerabilities.

0 Votes 0 ·

Yes, it works per User. Don't know for sure but I think it doesn't.

As described in https://msrc.microsoft.com/update-guide/vulnerability/CVE-2021-34527 the vulnerability is not present if (after Updating of course):

HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows NT\Printers\PointAndPrint
NoWarningNoElevationOnInstall = 0 (DWORD) or not defined (default setting) AND
UpdatePromptSettings = 0 (DWORD) or not defined (default setting)

We did not define any of them.

In https://docs.microsoft.com/en-us/answers/questions/517533/pint-server-and-print-nightmare-update.html there is an image posted by chmod771 which shows that the value "RestrictDriverInstallationToAdministrators" can be set without negating the fix if above values are not set or equal to 0.

Image: https://docs.microsoft.com/answers/storage/attachments/133726-383432-printnightmare-flowchart-v9.png

0 Votes 0 ·
JJ-4806 avatar image
0 Votes"
JJ-4806 answered BISG-1081 commented

So I ran into this issue as well recently and the only workaround I found was to set the user as a local admin on the machine they were using.

Once they were set as an administrator, ran GPUpdate /force, logged out and logged back in and all of the printers installed. Not a great solution, as it involved touching every machine but at least I can get it installed.

· 3
5 |1600 characters needed characters left characters exceeded

Up to 10 attachments (including images) can be used with a maximum of 3.0 MiB each and 30.0 MiB total.

It will be a problem when gp will update automatically than it will remove those printers.

I have tried that as well, it works as it should, but unfortunately I couldn't let users stay as administrators.

At this point I have redeployed printers as per machine - it does work. It's not ideal solution but does a job.

0 Votes 0 ·

Reading this gave me a stress ulcer. Have you tried to deploy to the machine instead of the person?

0 Votes 0 ·

Yes, that's what I did and it works fine. It still does show the error about deployed printers after updating gp, but that's possibly because I didn't remove deployed printers per user - there is no conflict. The only problem is that if you deployed printers per user you have more flexibility but I'm sure I don't have to explain that to you.

0 Votes 0 ·