To learn more about the vulnerability, see Microsoft Security Bulletin MS16-087.
- After you install this security update, in order to deploy Point and Print drivers from print servers to clients, you must apply the following Windows update rollup on the Windows 8.1 or Windows Server 2012 R2 printer server:3000850 November 2014 update rollup for Windows RT 8.1, Windows 8.1, and Windows Server 2012 R2
- All future security and non-security updates for Windows RT 8.1, Windows 8.1, and Windows Server 2012 R2 require update 2919355 to be installed. We recommend that you install update 2919355 on your Windows RT 8.1-based, Windows 8.1-based, or Windows Server 2012 R2-based computer so that you receive future updates.
- If you install a language pack after you install this update, you must reinstall this update. Therefore, we recommend that you install any language packs that you need before you install this update. For more information, see Add language packs to Windows.
- 3170455 MS16-087: Description of the security update for Windows print spooler components: July 12, 2016
- 3163912 Cumulative update for Windows 10: July 12, 2016
- 3172985 Cumulative update for Windows 10 Version 1511 and Windows Server 2016 Technical Preview 4: July 12, 2016
Known issuesIf you're using network printing in your environment, you may experience one of the following issues:
- You may be prompted by a warning about installing a printer driver, or the driver may fail to install without notification after you apply MS16-087. The symptoms here depend on the specific scenario.
Scenario 1For non-package-aware v3 printer drivers, the following warning message may be displayed when users try to connect to point-and-print printers:
Scenario 2Package-aware drivers must be signed with a trusted certificate. The verification process checks whether all the files that are included in the driver are hashed in the catalog. If that verification fails, the driver is deemed untrustworthy. In this situation, driver installation is blocked, and the following warning message is displayed:
Scenario 3For non-interactive scenarios (for example, the printer is installed through an automated script), when the printer driver matches the criteria that's described in either Scenario 1 or Scenario 2, printer installation fails, and no warning message is displayed.
In these situations, contact your network administrator to obtain an updated driver from the printer manufacturer.
Guidance for network administrators:
- Update the affected printer driver. Package-aware V3 printer drivers were introduced in Windows Vista. Installing a package-aware printer driver will resolve the issue.
- If a specific legacy printer does not have the appropriate printer driver available, preinstalling the problematic printer driver on the client system will resolve the issue.
- After you apply security update MS16-087 (KB 3170455 ) and try to connect to a trusted package-aware printer that is installed on a system that is running Windows 8.1 or Windows Server 2012 R2, you cannot connect to the printer.
To resolve this issue, apply the following Windows update rollup on the Windows 8.1 or Windows Server 2012 R2 printer server:3000850 November 2014 update rollup for Windows RT 8.1, Windows 8.1, and Windows Server 2012 R2
Oct 2016 Update: Mitigation for known issuesMicrosoft has released an update for October 2016 that lets network administrators configure policies that permit the installation of print drivers that they consider are safe. This update also allows for network administrators to deploy printer connections that they consider safe.
The updates are contained in the following roll-up packages.
|Windows 10 RTM||KB 3192440|
|Windows 10 1511||KB 3192441|
|Windows 10 1607||KB 3194798|
|Windows 7 and Windows Server 2008 R2||KB 3192403|
|Windows Server 2012||KB 3192406|
|Windows 8.1 and Windows Server 2012 R2||KB 3192404|
Configuring Group Policy to add print servers to allowed list
- Click Start, and then click Run.
- Type gpedit.msc, and then click OK.
- Expand Computer Configuration, and then expand Administrative Templates.
- Click Printers.
- Double click Point and Print Restrictions, and then select the Enabled option.
- Under Options, select the Users can only point and print to these servers check box, and then type the fully qualified server names in the text box, separated by semi-colons.
- Under Security Prompts, select Do not show warning or elevation prompt in both the When installing drivers for a new connection and When updating drivers for an existing connection lists.
- Click Apply, and then OK.
- In the Printers policy page, double-click Package Point and Print – Approved servers.
- Select the Enabled option.
- Under Options, click Show.
- Type one fully qualified server name in each row.
- Click OK.
- Click Apply, and then click OK.
- If you are using a stand-alone client, restart the client, and then verify that these policies are in effect.
- If you use domain policies, push the policies to the domain clients, and then verify that these policies are in effect.
Oct 2016 Update Frequently Asked Questions
- Q: Should we uninstall the previous update?
A: No. The previous update fixes the vulnerability. The October 2016 update provides mitigation to give network administrators the ability to install drivers they consider to be safe.
- Q: Even with the October 2016 update installed and the group policies configured, the "Do you trust this printer" message is still displayed when I try to install a local printer. Why is that?
A: This mitigation targets network printers and not local printers, so this behavior is expected.
Note If you do receive the "Do you trust this printer" message, either replace your current driver by using a trusted package-aware driver, or install the driver files to the local driver store before you install the local printer. For more information, see the Guidance for network administrators section.
Method 1: Windows Update
Note For Windows RT 8.1, this update is available through Windows Update only.
Article ID: 3170005 - Last Review: Apr 11, 2017 - Revision: 2