Dealing with CVE-2021-34527 #printnightmare. What is ManageEngine's plan to help out its customers?
I've been following the #printnightmare exploit since last wednesday when it was published. since then i've seen guidance from microsoft with respect to handling it here:
what i haven't seen since then is any knowledgebase articles or posting in the desktop central forums about how to tackle this from within desktop central. i have clients which i want to push out the a specific GPO related to remote connections to the print spooler and restarting the net spooler service, but i've heard nothing from desktop central in this forum about a template coming from manageengine to help with this task..
Does anyone have any good information to share that ManageEngine is taking this seriously and working on this? if i want to resolve this manually, i wouldn't need desktop central as a tool!