So this post should really be given credit to
@rhsiv and not me.
@rhsiv has been following this thread and trying to find out why "Mr. Smarty-Pants"
@Sky-Knight doesn't have these issues with multiple Print Spooler Vulnerability security updates from Microsoft and some of us do.
@rhsiv is out of the office on a client site (actually doing meaningful work) and I'm in the office.
So "Hold on to your Butts" as here comes our reasoning.
If you are installing your printers to a central machine (Workstation, Server, Print Server, etc) and then sharing them out you've probably experienced an issue from a Print Spooler update regardless if it's a network printer or USB printer. However, if your client machines are connecting to a network printer directly (via IP or hostname) you don't see these problems.
For a long time I never used any type of Print Server. I didn't even use a GPO within a DC to push them out. I would often just install the network printer based on it's IP and have everyone print directly. I even wrote batch scripts to install several printers at one time and make sure they got the driver I wanted them to have. Worked well but kind of a pain to manage.
Alas! Let's just use a Print Server like the DC, share 'em, and then push everything out via GPO. Worked great....up until a few month ago.
I believe
@Sky-Knight is pushing his printers out through GPO, but, he is having those clients print directly to the printer and not going through a "shared" printer on a Print Server. Is that correct
@Sky-Knight? If it is, that's the missing link. Have we found your "magic sauce"?