Ecosyste.ms: Awesome
An open API service indexing awesome lists of open source software.
https://github.com/rhymeswithmogul/printnightmare-registry-changes
Make sure your computer has the proper mitigations against PrintNightmare.
https://github.com/rhymeswithmogul/printnightmare-registry-changes
powershell powershell-core powershell-module printnightmare
Last synced: 27 days ago
JSON representation
Make sure your computer has the proper mitigations against PrintNightmare.
- Host: GitHub
- URL: https://github.com/rhymeswithmogul/printnightmare-registry-changes
- Owner: rhymeswithmogul
- License: agpl-3.0
- Created: 2021-07-27T21:30:50.000Z (over 3 years ago)
- Default Branch: main
- Last Pushed: 2021-07-28T15:49:41.000Z (over 3 years ago)
- Last Synced: 2024-09-29T04:21:14.694Z (about 1 month ago)
- Topics: powershell, powershell-core, powershell-module, printnightmare
- Language: PowerShell
- Homepage: https://www.powershellgallery.com/packages/PrintNightmareMitigations
- Size: 26.4 KB
- Stars: 4
- Watchers: 1
- Forks: 0
- Open Issues: 0
-
Metadata Files:
- Readme: README.md
- Changelog: CHANGELOG.md
- License: LICENSE
- Code of conduct: CODE_OF_CONDUCT.md
- Authors: AUTHORS
Awesome Lists containing this project
README
# PrintNightmare Mitigations
Make sure your computer has the proper mitigations against PrintNightmare by using this PowerShell module. [If you have the correct updates installed](https://msrc.microsoft.com/update-guide/en-US/vulnerability/CVE-2021-34527), you will need to add or edit registry settings for full protection. This module will help.
## How to install this
Most users should grab it from PowerShell Gallery:
```powershell
Install-Module PrintNightmareMitigations
```You may also download and install this manually.
## How to run this
Run `Set-PrintNightmareMitigations` to patch this computer. Changes do not require a reboot. The optional parameter, `-RestrictDriverInstallationToAdministrators`, provides optional extra protection.
```powershell
Set-PrintNightmareMitigations [-RestrictDriverInstallationToAdministrators]
```To see if this computer has been patched, run:
```powershell
Test-PrintNightmareMitigations
```## Use Group Policy if possible
While this module can test if the correct GPO's are being applied, you should use Group Policy in a domain environment. That will make your life easier. This module is better suited for standalone or workgroup computers.
0