PrintNightmare: Securing Your Print Infrastructure

Introduction

Since 2021, the “PrintNightmare” issue has become a topic of concern. This class of vulnerabilities affects Windows-based devices, including servers, desktops, and laptops. The vulnerabilities are found in the print spooler service, which is enabled by default and responsible for managing printers and printing documents. This article aims to explore the PrintNightmare problem, its implications, and long-term solutions to secure your print infrastructure.

The Print Nightmare Story

Understanding the Problem

In June of 2021, a vulnerability in Microsoft’s print spooler software, known as CVE-2021-34527 or “PrintNightmare,” was identified. This vulnerability allows remote network access to exploit the system, gaining privileged access rights and executing malicious code. It poses a significant risk as attackers can remotely control the affected system, potentially stealing sensitive data or disrupting operations.

Print Spooler Service: A Brief Overview

The print spooler service is responsible for managing printer connections and operations on Windows-based devices. It facilitates communication between the device and printers, ensuring compatibility by downloading and installing the required printer drivers. Additionally, it handles print jobs by organizing queues, prioritizing tasks, and buffering data into the printer’s memory.

Domain controllers also utilize the print spooler service for managing printers on a network. However, this introduces a security vulnerability, as any authenticated user can remotely connect to the print spooler service of a domain controller, compromising network security controls.

The print spooler service also allows Windows devices to act as print clients or print servers. While this ease of use is convenient, it grants privileged access to the print spooler service across the entire network, bypassing security controls and automatically updating printer drivers.

The Risk with PrintNightmare

The PrintNightmare vulnerability enables attackers external to the network to upload malicious code disguised as a Dynamic-link Library (DLL). This code can be executed with administrator privileges across the network, providing an entry point for further attacks and potential data exfiltration. The presence of proof-of-concept code circulating in the hacker community further exacerbates this risk.

Continuing Challenges

Although efforts have been made to patch the PrintNightmare vulnerability, new flaws in the Windows print spooler service continue to be identified. These vulnerabilities, such as CVE-2021-34481, pose critical risks, including local privilege escalation and potential Remote Code Execution (RCE) exploits. To mitigate these risks, it is recommended to temporarily stop and disable the print spooler service until all security patches are applied.

Long-Term Protective Measures Against PrintNightmare

Option 1: Patching and Praying

Keeping up with security patches for printer spooler service vulnerabilities provides a level of protection. However, the existence of well-resourced hackers who exploit vulnerabilities before patches are released poses a significant risk. Organizations must consider the potential consequences of falling victim to attacks targeting their intellectual property or sensitive information.

Option 2: Moving Print Services to a Secure Cloud-Based Solution

To effectively address the vulnerabilities introduced by Windows-based print servers, a long-term solution should eliminate the inherent weaknesses. Migrating print services to a secure cloud-based print management solution offers several advantages:

  1. Elimination of Printer Driver Management: Legacy communication protocols used by printer drivers often introduce security vulnerabilities. A cloud-based solution that eliminates the reliance on manufacturer drivers ensures secure connectivity by default.
  2. Improved Security Controls: By using a cloud-based service, the need for network-wide access and exceptions for print services is eliminated. This simplifies configuration and enhances overall security.
  3. Mitigation of Legacy Protocol Risks: Older operating systems rely on legacy print protocols that can be exploited. Cloud-based secure printing solutions enforce secure protocols, minimizing the risks associated with legacy support.
  4. Isolation of Print Functions: Dedicated print servers separate print functions from multi-use servers, reducing vulnerabilities and potential misconfigurations.
  5. Enhanced Encryption: Cloud-based secure printing solutions encrypt all print file transmission and storage, protecting against eavesdropping and unauthorized access.

Pharos Cloud: A Secure Solution

Pharos Cloud offers a serverless printing infrastructure that ensures secure and direct-to-printer workflows for businesses. By replacing Windows-based print servers with Pharos Cloud’s cloud-based print management solution, organizations can eliminate print spooler services, printer drivers, and associated vulnerabilities.

The benefits of adopting Pharos Cloud include:

  1. Reduced Attack Surface: Centralized cloud print management minimizes security risks by eliminating the need for print spooler services on every Windows-based device, including domain controllers.
  2. Simplified Security Configuration: Security software no longer needs to include print services in allow lists and exceptions, closing potential security holes.
  3. Robust Encryption: Pharos Cloud employs strong encryption algorithms to protect print job communications and data at rest, ensuring maximum security.
  4. Compatibility and Ease of Use: Pharos Cloud seamlessly integrates with existing infrastructure and does not require workstation or printer fleet upgrades. It simplifies administration tasks and improves the overall printing experience.

By adopting Pharos Cloud’s cloud-based serverless secure printing service, organizations can mitigate the risks associated with the PrintNightmare vulnerability and future vulnerabilities yet to be discovered. This solution offers compatibility, enhanced security, and reduced administrative workload, ensuring a win-win situation for businesses while thwarting potential hackers.

Conclusion

Securing your print infrastructure is crucial in the face of vulnerabilities like PrintNightmare. Organizations must consider long-term solutions that address the weaknesses of Windows-based print servers. Migrating to a cloud-based print management solution, such as Pharos Cloud, offers enhanced security, reduced attack surfaces, simplified administration, and robust encryption. By proactively adopting these measures, businesses can wake up from the PrintNightmare without sacrificing their printing capabilities and ensure a more secure future.

Hope and Resilience: A New Years Message from our CEO

I wish a very Happy New Year to all of our partners, customers and friends on this first month of 2022!

As one year welcomes the next, millions of people are taking this time to reflect on the past year to assess what was and to envision the year ahead to make choices on what can be. So, I take this moment to share some of my thoughts with you.

Most anyone would describe 2021 as anything but a normal year. I heard one commentator referring to this past year as a ‘lost year’, but I believe 2021 challenged us to be more alive and more aware than most years. With so many unknowns between the pandemic, the impact of social distancing on work and life, the challenges of global supply shortages, the impacts of fires and natural disasters, unprecedented cybersecurity threats, and so much more sent our way, it is easy to feel lost and destabilized. However, the challenge to each of us has not changed. Each and every year, and each and every minute, our challenges are the same – to grow in resilience as individuals and a society. That is, to accept whatever life presents us and expand our ability to respond in the healthiest way possible.

I believe this is what it means to be human, to live a good and meaningful life. Any living being, individual, organization or society measures its health by its ability to adapt. Witness the adaptation of the virus to find ever new ways to accelerate its growth. We are no different, needing to assess the world as it is and choose actions that accelerate growth. This is why 2021 presented us so many opportunities to be more alive and more human than most years. It asked us to become more alert to changes around us and more adept at choosing healthy responses.

This is true for Pharos as well and how we serve in the world. While our customers’ fundamental needs changed little this past year – they still needed to create environments in which employees can work effectively and efficiently from wherever they may be, optimize the use of assets (the most valuable of which is time), and ensure a secure and safe work environment for their employees and customers they serve – the way those needs present themselves changed considerably.

The new hybrid workforce (working from home, the coffee shop and elsewhere) has become a longer-term reality, not the blip we once anticipated. This accelerated digital and cloud transformation from a vision of the future to today’s reality. Zero infrastructure and zero trust networks are becoming widespread – even mandatory in the Federal Government. There is more pressure than ever to act and adapt quickly and decisively.

In 2021, Pharos worked to support our customers facing these challenges. We significantly increased our investment in our safe, zero trust, global cloud printing infrastructure, enabling our customers to serve their end users better while reducing the time and cost burden on IT to manage the growing complexities of the new hybrid reality. We welcomed more clients to our cloud printing platform than in any other year, improving their employee experience and saving them time and money. We adapted our technologies to be zero touch so that employees can feel safe in shared workspaces. In short, we listened to the new problems that our clients are experiencing, and we adapted our services and technologies to meet them.

In a time of significant reductions in office printing, we experienced a strong year of growth serving our current clients. Printing may have declined, but as one client put it, printing remained a ‘dial-tone’ service that must be supplied to workers – even if in ever new ways.

Even as the omicron variant of COVID threatens renewed closures and worker shortages as we begin 2022, it also may usher in a final, and less severe, wave of infection. We will adapt – because that is what healthy species do. I look into the coming days with great optimism – because I look at the people around me, my Pharos colleagues, and those of you we serve and I see the hills we have climbed together. I know that there is no mountain too high for those committed to climb it.

Thank you for the faith you show in Pharos, and the choices you have made to make us part of your journey. We will, in 2022, strive every day to earn the great honor you do us by being a part of our journey.

We wish you health, happiness, faith, and resilience in this New Year!

Pharos Products and Log4j Exploit

December 15th Update: This blog post has been updated with new information as we learn more. For the latest information on Log4j impact on Pharos products and how we’re mitigating the risk of this exploit, please visit our Community Page

Background

Recently, a new zero-day vulnerability in the popular Java library Apache Log4j (CVE-2021-44228) was uncovered. This vulnerability allows attackers to inject arbitrary code in Log4j versions 2.0-2.14.1. This Java library is widely used by multiple closed and open source projects. 

This vulnerability is rated critical (CVSS severity level 10 out of 10), with immediate patching or mitigation recommended if affected, because it allows a possible Remote Code Execution when an attacker sends a malicious code string that gets logged by Log4j. That string allows the attacker to load Java onto a server and therefore take control. 

Impact of Apache Log4j Exploit on Pharos Products

After initial review, Pharos believes that Pharos customers are not impacted by the Log4j JNDI exploit.  

A non-customer facing cloud component used by Pharos was potentially susceptible to log4shell – specifically ElasticSearch, which is used by Pharos to log events across our infrastructure. We have applied patches to all production environments. In addition, Pharos has scanned all our logs and confirmed that no attempts were made to exploit this vulnerability.  

Pharos uses Java in our embedded solutions for some devices; however, the vulnerable library version is not used. 

For more detail and up-to-date information, please visit our technical page on this topic on our community site. If you have further questions, please reach out pharossecurityteam@pharos.com.

PrintNightmare: Securing Your Print Infrastructure

You have no doubt heard about the “PrintNightmare” problem in the news. It’s a class of vulnerabilities in just about every Windows-based device, including servers, desktops, and laptops. The problem is present in the print spooler service that is enabled by default and provides facilities for managing printers and printing documents.

This particular story started on June 8th when Microsoft’s weekly set of patches included a fix for CVE-2021-1675, a flaw in the print spooler service that allowed an attacker to exploit a local privilege escalation (LPE) vulnerability and execute malicious code using the print spooler service.

This is not the first time such a vulnerability has been identified and patched. There’s a long history of attackers using the print spooler service as an entry point to compromise systems. For example, the infamous Stuxnet malware that affected the Iranian nuclear facilities in 2010 used a similar mechanism.

So, what has this got to do with PrintNightmare? Well, it was the actions of a security researcher looking at June’s printer server patch that led to its discovery.

The Print Nightmare Story

What is the Problem?

A vulnerability in Microsoft’s print spooler software was identified on July 1st in CVE-2021-34527, which was dubbed “PrintNightmare.” This is distinct from the previous month’s disclosure with a different attack vector but through the same print spooler service. Any remote network access can exploit this vulnerability, while the earlier CVE-2021-1675 can be thought of as a local version of PrintNightmare. It allows an attacker to gain remote access and execute malicious code with privileged access rights. Exploiting this Remote Code Execution (RCE) means they effectively control the affected system to steal sensitive data passively or disrupt operations.

What is a Print Spooler Service?

In essence, the printer spooler service manages the connection and operation of any printer connected to a Windows-based device. It downloads and installs the printer drivers needed to allow the device to talk to any printer in its specific language, irrespective of the protocols used by the manufacturer of the printer. It manages print jobs, documents sent by the device to the printer by organizing the queueing of jobs, ordering queued jobs by priority, buffering the data into the printer’s memory.

Domain controllers often also use the same printer spooler service to manage the addition and removal of printers to a network. Domain controllers inherently run with system privileges, manage security authentication requests within a computer network domain, and allow host access to domain resources. As a result, any authenticated user can remotely connect to a domain controller’s print spooler service, a significant weakness at the core of the network’s security controls.

The print spooler service also allows any device running a Windows operating system to act as a print client, printing to a local printer, or as a print server, allowing any networked devices to access its local printer. Its problem is that we have grown used to connecting a new printer anywhere on a network and reasonably painlessly using that printer from any device connected to that network. This useability is down to the privileged access that the print spooler service has across the entire network, bypassing security controls and offering the ability to update printer drivers to the latest version automatically.

So, what is the Risk with PrintNightmare?

The problem with the PrintNightmare vulnerability is that an attacker external to the network can upload malicious code disguised as a Dynamic-link library (DLL) and execute this with administrator privileges across the network. Additionally, this flaw provides an entry point for uploading additional malicious programs or exfiltrating sensitive information.

The concern with PrintNightmare is that such code is already in existence thanks to a security researcher publishing a proof of concept for June’s patched LPE vulnerability that identified the presence of July’s RCE vulnerability. While Microsoft has issued an emergency patch for this second flaw, it’s safe to say that copies of the proof of concept code will be circulating amongst the hacker community and probably being exploited.

Is that the End of the Story?

Sadly the “PrintNightmare” vulnerability may have been patched, but more flaws in the Windows print spooler service have been identified – and more will be discovered.

The latest, CVE-2021-34481, identifies a critical elevation of local privileges. Another potential defect with a possible RCE exploit has been reported but is yet to be assigned a CVE number. The official advice for the short-term fix is to stop and disable the print spooler service on all devices until this flaw is patched.

Update 8/13/2021: we address a new one, CVE-2021-36958, on our Community site.

The downside of the recommended advice is that you will lose the ability to print until all security patches are applied. Also, it won’t plug the holes from the vulnerabilities that are not yet patched. Although the various short term fixes published on the internet are temporary solutions, a long term solution is essential to protect your infrastructure effectively.

Long Term Protective Measures Against PrintNightmare

Option 1: Patching and Praying

Keeping up to date with security patches for the printer spooler service vulnerabilities will provide a level of protection. Still, it seems like it’s just a matter of time before the next PrintNightmare is found. The CVE database currently contains 37 records for the printer spooler service, and more vulnerabilities are known to have been found.

The problem is that well-resourced hackers may find and exploit a vulnerability before Microsoft is made aware of its existence and creates and distributes a security patch. This window of opportunity for the hackers means that any organization using Windows-based print servers is potentially at risk from remote attack. A well-organized, typically state-backed hacking collective will silently use such a window of opportunity to plant malware within as many vulnerable organizations as possible. This strategy enables them to complete any attack later, even when the original vulnerability has been found, patched, and resolved.

For organizations that present an attractive target to hackers, this risk may be substantial. Intellectual property and sensitive commercial information are as much a target as cash reserves. The financial or reputational cost of falling victim to an attack could result in the collapse of the business.

Option 2: Permanently Counter Windows Print Server Vulnerabilities by Moving Print Services

Windows-based print servers introduce a significant range of attack points that an attacker can exploit. Windows print server security will always contain exploitable weaknesses. Therefore, any long-term solution will need to address these if it is to be effective. Moving print services to a secure cloud-based print management solution will address all these points.

Eliminate the need for printer driver management, which often allows weak legacy communications protocols

The installed printer drivers on a network are only as secure as the technologies used to implement their communications protocols – well outside the network administrators’ control. For example, the Simple Network Management Protocol (SNMP) and other commonly used protocols are vulnerable to man-in-the-middle attacks through file replacement, proxy monitoring, or other means. This gives an attacker the ability to compromise the integrity of the server and provide the base for lateral movement and privilege escalation across the network.

Eliminate drivers and eliminate this attack surface. A cloud-based secure printing solution that does not rely on manufacturer drivers doesn’t require a network administrator to configure communications protocols, enforcing secure connectivity by default.

Avoid unconstrained network-wide access, required for print processes using allow lists and exceptions in security software that bypass protective controls

One feature of shared print queues is they require access to specific Transmission Control Protocol (TCP) ports and often require access to hidden shares and different privileged folders within the Windows operating system. This requires installed security software to blanket allow these operations across the network, open access that an attacker who has penetrated the network can exploit to extend their reach.

Eliminate the need for your network security controls to include exceptions for print services, by moving print infrastructure to the cloud, simplifying configuration and enhancing security robustness.

Default support for printers connected to devices running older operating systems allows the use of weak legacy print protocols that can be exploited

The print spooler services and their Point-and-Print functionality have been present in all Windows versions dating back to NT4 in the 1990s. As a result, they include support for legacy protocols that enable them to manage Windows clients that do not support the latest Server Message Block (SMB) and Common Internet File System (CIFS) protocols.

While this legacy support simplifies integration with older systems, it allows an attacker to exploit the inherent weaknesses in older protocols. If networks include legacy systems that cannot be upgraded, then this risk cannot be removed. Upgrading and hardening systems to eliminate this risk has the potential for introducing misconfiguration problems and compatibility issues.

Cloud-based secure printing solutions eliminate the need for your network administrator to configure print mechanisms and enforces secure protocols by default.

Remove print spoolers and servers from multi-use servers

Most typical infrastructures are not afforded the luxury of having a dedicated print server. Usually, the print server device also performs other functions such as file-sharing or an internal web server. Unfortunately, these multiple uses open the potential for vulnerabilities or misconfiguration of Access Control Lists (ACLs) or Active Directory group memberships that allow unauthorized users access to the print server function.

By replacing print servers with a cloud service, companies eliminate the associated risks that multi-use servers can create.

Encrypt all print file transmission and storage to prevent eavesdropping

The standard implementation of the printer spooler service passes data across the network in an unencrypted form where it is vulnerable to eavesdropping or interference while in transit or at rest in a temporary storage location, including within the printer.

Cloud-based secure printing solutions protect your data in transit and at rest using robust encryption algorithms managed by the solution provider.

Eliminating the Print Nightmare Risk

The fundamental problem with print servers is that they cannot be securely locked down without disabling the ability for users to print documents across a network.

The best long-term protective measure is arguably to eliminate the need for the printer spooler service from the network. This not only removes the risk but has the added benefit of reducing your infrastructure overhead and administration workload.

This is where Pharos can help. Pharos Beacon provides a completely serverless printing infrastructure that delivers both secure and direct-to-printer workflows for businesses.

Pharos Beacon as a Solution

Removing Windows-based print servers from your network may sound like a radical concept. Still, Pharos has been providing serverless printing services since 2015, using trusted technology utilized on over 2,250,000 desktops worldwide. The Pharos Beacon cloud-based print management solution replaces legacy Windows printers with a secure service that eliminates print spooler services, printer drivers, and all the vulnerabilities they bring to your infrastructure.

Adopting a centrally managed cloud print management solution will reduce the attack surface for your organization by eliminating the need for a printer spooler service to be running on every Windows-based device, including the domain controllers. The removal of the printer spooler service from a domain controller represents eliminating a significant security weakness in the network.

Being a cloud-based service, security software running on your network does not need to include print services in the allow lists and exceptions. This closes any potential holes in your security controls that an unauthorized user can exploit to transverse around your network in the search for additional vulnerabilities.

Pharos Beacon encrypts all communications channels used for print jobs to eliminate any risk of eavesdropping on an organization’s network, accessing potentially sensitive information as it transits from the end-user device to the printer. Its Secure Print facility also encrypts the data for print jobs while at rest utilizing a zero-knowledge AES-256 encryption algorithm to maximize protection.

The final and critical point is that this service does not require clients to upgrade their workstations or existing printer fleet. Instead, what it does is remove an expensive security problem from your network and improve the printing experience for your IT administrators and users alike, thanks to our best-in-class cloud technologies.

You can wake up from the PrintNightmare without turning off printing

The “PrintNightmare” story has highlighted the myriad of security issues that printer services can introduce into your business’s infrastructure. The migration to a cloud-based serverless secure printing service can eliminate not just the “PrintNightmare” risks but all future risks created by weaknesses in the Windows printer spooler services code that have yet to be found. Added benefits are compatibility with existing infrastructure and a reduced IT administration workload. The good news is that Pharos can help you achieve this painlessly and cost-effectively; everybody wins except the hackers.

Pharos and “PrintNightmare” Windows vulnerability

July 1, 2021 — Over the last 24 hours, a zero-day exploit leveraging a vulnerability in the Windows Print Spooler Service has been publicly published and acknowledged by Microsoft. The exploit, termed “PrintNightmare” (CVE-2021-1675) does not currently have a complete fix from Microsoft.

While the vulnerability leverages the print spooler process to enable a Remote Code Execution vulnerability, the risk extends beyond printing to the underlying operating system at the desktop and server level. Some security experts and teams are suggesting disabling of the Windows Print Spooler Service.The US Cybersecurity and Infrastructure Security Agency (CISA) is recommending that administrators disable the Windows Print spooler service in Domain Controllers and systems that do not print.

Many Pharos’ Blueprint and Uniprint customers leverage the Windows Print Spooler Service as a print file transport layer to the Blueprint and Uniprint job storage services. Disabling the Print Spooler Service for these customers and end user clients will result in print interruption.

However, we recommend that all customers follow the security precautions and recommendations of your IT Security teams.

As the Pharos Beacon cloud platform does not use the Windows Print Spooler, it is unaffected by the disabling of the Spooling Service on servers (though disabling it on desktops will prevent all print from Windows).

Clients who are unsure about whether they are relying on Windows Print Spooling or looking to reduce reliance on Windows Print Spooling should contact Pharos support for guidance and support.

In the meantime, Pharos will continue to monitor the PrintNightmare vulnerability and communicate to our partners and clients as the threat evolves and as the vulnerability is eliminated.

Pharos Products and Services Unaffected by the SolarWinds Exploit

The Pharos Security Team has been watching with heightened awareness the developing cyberattack on federal and corporate computing systems by way of vulnerabilities found in several versions of the SolarWinds Orion software platform.

Pharos does not use SolarWinds Orion software for internal or cloud-based systems. We have completed an audit of all computing platforms within Pharos to ensure that the SolarWinds product is not resident on any devices within our IT infrastructure.

As such, we are confident that neither Pharos nor any of our customers are exposed to this threat by the use of Pharos products and services.

We will continue to monitor the situation and the actions and directives emerging from the joint activity of the Federal Bureau of Investigation (FBI), the Cybersecurity and Infrastructure Security Agency (CISA), and the Office of the Director of National Intelligence (ODNI). We will embrace any actions recommended or required.

As the situation evolves, Pharos will continue to update our website and inform customers should any concerns arise related to our internal, cloud, or deployed products in customer locations.

For more information on this developing story:

A Moment of Reckoning [By Microsoft President Brad Smith]

Pharos Is Now Chrome Enterprise Recommended!

We are thrilled to announce that Google has recognized Pharos Systems as a Chrome Enterprise Recommended partner! Chrome Enterprise Recommended is Google’s partner program for third-party solutions that are verified by Google to meet certain technical and support standards for Chrome OS and Chrome devices. (See Solution Brief on Google.com)

As part of this partnership, Pharos Beacon has been validated by Google as a Chrome Enterprise Recommended solution, optimized for rapid deployment and seamless integration with Google’s Chrome OS and Chrome browser with the Pharos Chrome Print extension. It’s now easier than ever for Chromebook users to print securely and confidently!

The Growing Influence of Chrome OS Devices

Today’s workforce spends more time than ever in the cloud, and Chrome OS devices are becoming increasingly popular in enterprises all over the world. It’s no surprise that IT leaders are investing in cloud-native devices as part of their endpoint strategy. Especially now, as unpredictable global changes have accelerated the urgency to enable remote workers with speed and scale.

We’re proud to be among Google’s recommended solution partners and we look forward to an exciting future serving Chromebook users together.

Included in this urgency is the need to provide employees with easy access to printing while protecting the security and confidentiality of printed documents. This is what Pharos does best.

As a Chrome Enterprise Recommended partner, the Pharos development team worked directly with Google to validate the functionality, quality, and security of the Pharos Chrome Print extension and the secure transmission of documents into the Pharos Beacon cloud platform.

We’re proud to be among Google’s recommended solution partners and we look forward to an exciting future serving Chrome users together. Now, enterprises all over the world can invest in Chrome OS devices with confidence, knowing there’s a community of partners who are validated to extend Chrome OS functionality and provide support to the growing ecosystem of users, technology partners, and best-of-breed solutions!

You can learn more about our Chrome Enterprise Recommended status here, and you can learn more about the program here at Google’s Chrome Enterprise Recommended program page.

Uniprint 9.1 Service Pack 3 Now Available!

We are happy to announce the latest update to Uniprint 9.1! This update provides new Chromebook support for customers who are currently using Google Cloud Print (GCP), which Google is retiring in December.

Customers planning to phase out GCP but still support Chromebook printing now have the flexibility to transition to the new solution any time before the end of the year. The update does not interfere with the existing Pharos GCP service; that will continue to work as long as the Google Cloud Print service is active. With this update, site administrators point users to the Pharos Chrome Print extension in Google’s Chrome Web Store.

Users simply install the extension and enter their school’s server name, which is provided by the site administrator. From that point forward, students print as they normally do. The Pharos development team worked closely with Google to help ensure a seamless and secure transition away from GCP.

Service Pack 3 also adds support for our new touchless printing option, which will be available via our updated mobile app later this summer. This important new feature makes it easy for site administrators to provide touchless printing workflows for students and staff who prefer not to touch printer control panels, to reduce their exposure to shared surfaces.

The touchless printing workflow is simple, fast, and fun: people use the Pharos Print app (iOS and Android) to scan a QR code affixed to the printer. Users can manage the print jobs in their queue and confirm or change job details right from their mobile device—without ever making contact with the printer interface. Site administrators can also customize the QR codes with their school’s brand.

Complete documentation for this release is available here.

Beyond Student Print: Exceed Your Savings Goals with a Campus-wide Solution

Beyond Student Print: Exceed Your Savings Goals with a Campus-wide Solution

There’s a growing trend in higher education to streamline technology and related services, yet many university campuses still employ multiple software solutions to solve similar problems.

In this webinar (recorded on 11/6/19) Marisa Benson, Associate Vice President at Northern Illinois University, describes NIU’s success moving beyond student pay-for-print toward a comprehensive, campus-wide printing solution across all NIU campuses and departments, both academic and administrative. NIU is marching towards annual savings of $1.05M per year when compared to their 2016 baseline.

Watch this recorded session to learn how you can achieve similar results for YOUR organization!

Optimize Print with Pharos

Learn more about how to simplify print security, increase IT productivity, and cut waste with Pharos Cloud. Schedule a meeting with us today.

Request More Information
Screenshots of Pharos Cloud on mobile and desktop devices.

Pharos Uniprint: Product Roadmap for Higher Education

Pharos Uniprint: Product Roadmap for Higher Education

Uniprint provides everything you need to manage print operations at your college or university, including Beacon Analytics, hosted on our native cloud platform. Beacon Analytics helps reveal the hidden costs in your environment, enabling you to take informed actions that eliminate waste and create a more efficient and sustainable print environment across campus.

In this recorded webinar, you’ll learn what’s new in Pharos Uniprint and some of the future innovations our product teams have been working on.

Optimize Print with Pharos

Learn more about how to simplify print security, increase IT productivity, and cut waste with Pharos Cloud. Schedule a meeting with us today.

Request More Information
Screenshots of Pharos Cloud on mobile and desktop devices.