UCF STIG Viewer Logo
Changes are coming to https://stigviewer.com. Take our survey to help us understand your usage and how we can better serve you in the future.
Take Survey

Print spoolers are not configured to restrict access to authorized users and restrict users to managing their own individual jobs.


Overview

Finding ID Version Rule ID IA Controls Severity
V-6796 MFD05.001 SV-7021r1_rule ECAN-1 IAIA-1 IAIA-2 Medium
Description
If unauthorized users are allowed access to the print spooler they can queue large print file creating a denial of service for other users. If users are not restricted to manipulating only files they created, they could create ad denial of service by changing the print order of existing files or deleting other users files. The SA will ensure print spoolers are configured to restrict access to authorized user and restrict users to managing their own individual jobs.
STIG Date
Multifunction Device and Network Printers STIG 2019-01-04

Details

Check Text ( C-3002r1_chk )
The reviewer will, with the assistance of the SA, verify that the print spoolers are configured to restrict access to authorized users and restrict users to managing their own individual jobs.
Fix Text (F-6463r1_fix)
Configure the print spoolers to restrict access to authorized users and restrict users to managing their own individual jobs.