Close Menu

    Subscribe to Updates

    Get the latest creative news from FooBar about art, design and business.

    What's Hot

    GitHub security advisory (AV26-383) – Canadian Centre for Cyber Security

    April 25, 2026

    The AI Compute Crunch Is Here (and It’s Affecting the Entire Economy)

    April 25, 2026

    ZDI-26-299: Docker Desktop Enhanced Container Isolation Exposed Dangerous Function Local Privilege Escalation Vulnerability

    April 25, 2026
    Facebook X (Twitter) Instagram
    • Demos
    • Technology
    • Gaming
    • Buy Now
    Facebook X (Twitter) Instagram Pinterest Vimeo
    Canadian Cyber WatchCanadian Cyber Watch
    • Home
    • News
    • Alerts
    • Tips
    • Tools
    • Industry
    • Incidents
    • Events
    • Education
    Subscribe
    Canadian Cyber WatchCanadian Cyber Watch
    Home»News»Microsoft traces Universal Print issues to Graph API code change
    News

    Microsoft traces Universal Print issues to Graph API code change

    adminBy adminApril 22, 2026No Comments3 Mins Read
    Share Facebook Twitter Pinterest LinkedIn Tumblr Reddit Telegram Email
    Share
    Facebook Twitter LinkedIn Pinterest Email


    Microsoft Universal Print

    Microsoft says that an ongoing Universal Print sharing issue that prevents users from creating some printer shares is due to a Microsoft Graph API code change.

    Universal Print is a cloud-based print solution designed to replace on-premises print server setups and provide Microsoft 365 customers with centralized print management capabilities.

    After confirming the issue (tracked under UP1287359) on Tuesday, Microsoft said that affected users may intermittently see “Sharing Print Failed” errors in the Universal Print portal when creating printer shares in some scenarios.

    image

    “Some users attempting to create printer shares created with the ‘Allow all users in my organization’ toggle enabled or with specific users or groups selected on the share creation screen are impacted,” Microsoft explained.

    “We’ve isolated a code change to Microsoft Graph API that introduced a code error, which increased Entra ID directory replication latency and exposed a pre-existing race condition in Universal Print’s share creation flow. This caused the retry logic to fail and the share operation to not complete as expected.”

    Although Microsoft has yet to share which regions or how many users are affected by this ongoing issue, it tagged it as an incident, a flag commonly used to describe critical service issues with noticeable user impact.

    Microsoft is now deploying a code change to correct the code error and shared a 13-step mitigation procedure that can help affected users work around the issue until it’s fixed:

    1. Go to the Azure portal, then Universal Print, then Printers
    2. Select the printer you want to share
    3. Click “Printer Share” (or “Share Printer”)
    4. Enter the share name
    5. Do NOT check “Allow all users in my organization.” Leave this unchecked.
    6. Do NOT select any specific users or groups at this step.
    7. Click “Share Printer”
    8. Wait 30 seconds for the share to fully propagate
    9. Navigate to Universal Print, then Printer Shares
    10. Select the newly created share
    11. Go to the “Members” tab (or “Access Control”)
    12. Add users or security groups manually
    13. If all users need access, add an organization-wide security group (e.g., “All Company”) from your Entra ID directory

    After applying the workaround, users are advised to wait 1 to 2 minutes and retry if the share creation still fails.

    Last month, Microsoft also released out-of-band updates to fix broken sign-ins with Microsoft accounts across multiple Microsoft apps.

    More recently, on Friday, Microsoft reverted a service update that was preventing some Microsoft Teams users from launching the desktop client, and released a set of emergency updates over the weekend to address known Windows Server issues causing security update installation problems and domain controllers entering a restart loop.


    article image

    AI chained four zero-days into one exploit that bypassed both renderer and OS sandboxes. A wave of new exploits is coming.

    At the Autonomous Validation Summit (May 12 & 14), see how autonomous, context-rich validation finds what’s exploitable, proves controls hold, and closes the remediation loop.

    Claim Your Spot



    Source link

    Share. Facebook Twitter Pinterest LinkedIn Tumblr Email
    Previous ArticleSpring security advisory (AV26-373) – Canadian Centre for Cyber Security
    Next Article CVE-2026-33262 | THREATINT
    admin
    • Website

    Related Posts

    News

    The AI Compute Crunch Is Here (and It’s Affecting the Entire Economy)

    April 25, 2026
    News

    Defending against China-nexus covert networks of compromised devices

    April 24, 2026
    News

    Waiting in the Apple Store

    April 24, 2026
    Add A Comment

    Comments are closed.

    Demo
    Top Posts

    Catchy & Intriguing

    March 17, 202662 Views

    The Grandparent Scam: How AI Voice Technology Makes This Old Con Deadlier Than Ever

    March 18, 202620 Views

    Global Takedown of Massive IoT Botnets Halts Record-Breaking Cyberattacks

    March 20, 202619 Views
    Stay In Touch
    • Facebook
    • YouTube
    • TikTok
    • WhatsApp
    • Twitter
    • Instagram
    Latest Reviews
    85
    Featured

    Pico 4 Review: Should You Actually Buy One Instead Of Quest 2?

    January 15, 2021 Featured
    8.1
    Uncategorized

    A Review of the Venus Optics Argus 18mm f/0.95 MFT APO Lens

    January 15, 2021 Uncategorized
    8.9
    Editor's Picks

    DJI Avata Review: Immersive FPV Flying For Drone Enthusiasts

    January 15, 2021 Editor's Picks

    Subscribe to Updates

    Get the latest tech news from FooBar about tech, design and biz.

    Demo
    Most Popular

    Catchy & Intriguing

    March 17, 202662 Views

    The Grandparent Scam: How AI Voice Technology Makes This Old Con Deadlier Than Ever

    March 18, 202620 Views

    Global Takedown of Massive IoT Botnets Halts Record-Breaking Cyberattacks

    March 20, 202619 Views
    Our Picks

    GitHub security advisory (AV26-383) – Canadian Centre for Cyber Security

    April 25, 2026

    The AI Compute Crunch Is Here (and It’s Affecting the Entire Economy)

    April 25, 2026

    ZDI-26-299: Docker Desktop Enhanced Container Isolation Exposed Dangerous Function Local Privilege Escalation Vulnerability

    April 25, 2026

    Subscribe to Updates

    Get the latest creative news from FooBar about art, design and business.

    Facebook X (Twitter) Instagram Pinterest
    • Home
    • Technology
    • Gaming
    • Phones
    • Buy Now
    © 2026 ThemeSphere. Designed by ThemeSphere.

    Type above and press Enter to search. Press Esc to cancel.