Pages

Fix Printer Error 0x00000bc4 or 0x00000709 in Windows

 

Fix: Printer Error 0x00000bc4 or 0x00000709 in Windows 11 22H2

 

After updating Windows 11 to version 22H2, your network printers may stop working. Also, the error code 0x00000bc4 (Desc: ERROR_PRINTER_NOT_FOUND) or 0x00000709 (Desc: ERROR_INVALID_PRINTER_NAME) appears when adding a new network printer.

Operation could not be completed (error 0x00000bc4).

 

No Printers Were Found.

The printer name is invalid.

 

Cause

Windows 11 version 22H2 introduced a new group policy named “Configure RPC Connection settings.” This policy setting controls which protocol and protocol settings to use for outgoing RPC connections to a remote print spooler.

The default setting in 22H2 blocks Windows from finding your network printers. This causes your existing printers to be erased, and adding them manually causes the error 0x00000bc4.

Ezoic

Setting “Configure RPC Connection settings” to “RPC over named pipes” fixes the issue.

Solution

To fix the network printer error 0x00000bc4, try these steps:

 

1.    Launch the Local Group Policy Editor (gpedit.msc)

2.    Go to the following section:

Administrative Templates → Printers → Configure RPC connection settings

3.     Select “RPC over named pipes” from the dropdown, and click OK.





4.     Exit the Group Policy Editor.

Registry Setting for the above GPO

[HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows NT\Printers\RPC]

Ezoic

There are 2 values that can be configured:

RpcUseNamedPipeProtocol REG_DWORD

0: RpcOverTcp (default)
1: RpcOverNamedPipes

Credits

Printer issue finally resolved. A brand new printer policy in Win11 22H2 is the culprint. "RPC Connection settings. Need to change over to Named Pipes and it works again.#msintune #Memcm pic.twitter.com/7xPS7Xxs0o

 

 

 

https://www.winhelponline.com/blog/printer-error-0x00000bc4-0x00000709-windows-11-22h2/

How to View classic Device and Printers in windows 11

 

How to Open “Device and Printers” in Windows 11

In Windows 11 22H2 and up, when you double-click “Devices and Printers” from the classic Control Panel, it redirects you to the Settings → Bluetooth & devices page. You may wonder how to access the classic Device and Printers Control Panel applet.



In Windows 11 22H2 and higher, the old Devices and Printers interface can still be accessed using one of the methods below.

Type the following command and click OK.

shell:::{A8A91A66-3A7D-4424-8D24-04E180695C7A}

Option 2: Via Settings

  1. Open Settings.
  2. Select “Bluetooth & devices” in the left pane.
  3. Click “Devices” in the right pane.
  4. Click “More devices and printer settings.”


Option 3: Using the Devices and Printers shortcut icon

  1. Open Control Panel (control.exe)
  2. Select the “Small icons” view.
  3. Right-click the “Devices and Printers” icon and click Create shortcut.




Option 4: Add “Devices and Printers (Classic)” icon to Control Panel.

To add “Devices and Printers (Classic)” to the Control Panel, you can apply the following registry fix.

  1. Download devices-and-printers-classic-cpl.reg (zipped)
  2. Unzip and run the enclosed REG file.
  3. Click Yes to confirm.

Close and reopen the Control Panel. The newly added item will appear in the Category view as well as the “All Icons” view.





Ordinary PC LAN cards and server PC LAN cards differ in several key aspects:

 Ordinary PC LAN cards and server PC LAN cards differ in several key aspects:


1. Performance:

    - Server LAN cards: High-speed, high-throughput, and low-latency (e.g., 10GbE, 25GbE, 40GbE)

    - Ordinary PC LAN cards: Standard speeds (e.g., 1GbE, 100Mbps)

2. Reliability and Durability:

    - Server LAN cards: Built with high-quality components, robust design, and redundant features for continuous operation

    - Ordinary PC LAN cards: Standard components, less robust design

3. Scalability:

    - Server LAN cards: Support multiple ports, teaming, and bonding for increased bandwidth and redundancy

    - Ordinary PC LAN cards: Typically single-port, limited scalability

4. Management and Security:

    - Server LAN cards: Advanced management features, VLAN support, and enhanced security options

    - Ordinary PC LAN cards: Basic management, limited security features

5. Compatibility:

    - Server LAN cards: Designed for server operating systems, compatible with various server hardware

    - Ordinary PC LAN cards: Designed for desktop operating systems, compatible with standard PC hardware

6. Power Management:

    - Server LAN cards: Support wake-on-LAN, remote management, and power-saving features

    - Ordinary PC LAN cards: Limited power management capabilities

7. Operating Temperature:

    - Server LAN cards: Designed for high-temperature environments (e.g., data centers)

    - Ordinary PC LAN cards: Standard temperature range

8. Certification and Compliance:

    - Server LAN cards: Meet strict industry standards (e.g., IEEE, PCI-SIG)

    - Ordinary PC LAN cards: Meet basic industry standards

9. Warranty and Support:

    - Server LAN cards: Extended warranty, dedicated support, and maintenance options

    - Ordinary PC LAN cards: Standard warranty, limited support


Server LAN cards prioritize performance, reliability, and scalability, making them suitable for demanding server environments. Ordinary PC LAN cards cater to standard desktop needs, focusing on basic connectivity and affordability.

To permanently disable USB mass storage and CD/DVD drives for protecting data theft:

 To permanently disable USB mass storage and CD/DVD drives for protecting data theft:


Method 1: Group Policy Editor (Windows Pro/Enterprise)


1. Press Win + R, type gpedit.msc, and press Enter.

2. Navigate to:

    - Computer Configuration > Administrative Templates > System > Removable Storage Access

3. Enable:

    - "Removable Storage: Deny execute access"

    - "Removable Storage: Deny read access"

    - "Removable Storage: Deny write access"

4. Navigate to:

    - Computer Configuration > Administrative Templates > System > Device Installation > Device Installation Restrictions

5. Enable:

    - "Prevent installation of devices that match any of these IDs"

    - Add USB mass storage devices (e.g., USBSTOR) and CD/DVD drives (e.g., CDROM) to the list


Method 2: Registry Editor (All Windows versions)


1. Press Win + R, type regedit, and press Enter.

2. Navigate to:

    - HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows\RemovableStorageDevices

3. Create a new DWORD (32-bit) value:

    - Name: Deny_Execute

    - Value: 1

4. Create another new DWORD (32-bit) value:

    - Name: Deny_Read

    - Value: 1

5. Create another new DWORD (32-bit) value:

    - Name: Deny_Write

    - Value: 1

6. Navigate to:

    - HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\Class

7. Find and delete the following keys (if present):

    - {4D36E967-E325-11CE-BFC1-08002BE10318} (CD/DVD drives)

    - {53F5630D-B6BF-11D0-94F2-00A0C91EFB8B} (USB mass storage devices)


Method 3: Device Manager


1. Press Win + X and select Device Manager.

2. Expand "Disk drives" and right-click on each USB mass storage device.

3. Select "Disable device" or "Uninstall device".

4. Expand "DVD/CD-ROM drives" and right-click on each CD/DVD drive.

5. Select "Disable device" or "Uninstall device".


Additional Measures


1. Set BIOS/UEFI settings to disable USB mass storage and CD/DVD drives.

2. Use physical locks or secure storage for devices.

3. Implement data encryption and access controls.

4. Monitor system logs for unauthorized access attempts.


Remember to test your system after applying these changes to ensure they don't interfere with legitimate device functionality.

JS-34 Instalation Door Acces

 

STANDALONE ACCESS CONTROL


        JS-34

Category:RFID Readers

Features:
Capacity : 2000cards/codes ,
Three accesses : card, Pin, Card+Pin,
Outdoor: IP66


TECHNICAL SPECIFICATIONS

  • Capacity : 2000cards/codes
  • Three accesses : card, Pin, Card+Pin
  • Water Resistant : IP68
  • Static electricity : 30mA
  • Ambient temperature : -450C~600C
  • Electric lock output : 3A
  • Short-circuit Protect : 100μ5
  • Card type : EM/MF
  • Working voltage : DC12V+10%
  • Reading Range : 5-8cm
  • Humidity : 10% to 90% RH
  • Door Opening Time : 0-99s (Adjustable) Backlight keypad Metal case, anti-vandal Multi-function standalone access controller and reader, WG26 Input / output


Circuit diagram 







Disable and Enable USB Storage acces

 

Step 1: Enable Group Policy Auditing

·         Launch the 'Server Manager'and open the Group Policy Management Console(GPMC).

·         In the left pane, expand the 'Forest'and 'Domains' nodes to reveal the specified domain you want to track the changes for.

·         Expand the domain a right click 'Default Domain Policy'.You can also choose a domain policy that is universal throughout the domain, or create a new GPO and link it to the Default Domain Policy.

·         Click on 'Edit' of the desired group policy, to open up the Group Policy Management Editor.

·         Expand 'Computer Configuration'-->Policies-->Windows Settings-->Administrative Templates-->System-->Removable Storage Access.

 

 




 






Double click the All Removable Storage classes: Deny all access policy. Select Enabled and click OK.

 

1.    Close the Group Policy Editor

2.    Restart the computer to apply the changes.





2. Disable Usb Drives in Registry Editor

 

This method works in all editions of running Windows 10, and it disconnects only USB drives, without affecting the mouse, keyboard, and printer connected via USB. Before editing the registry, it is recommended to create a system restore point.

Open Windows registry editor: in the search bar or in the menu to execute (run with the Win + R keys) enter the regedit command and press the Enter key.




















How to use a Group Policy Object to block access to USB storage devices





In the modern workplace, just about every member of staff owns and uses at least one USB storage device. (In this article, “USB storage device” refers to any USB device that can store data, including, but not limited to, flash drives, external hard drives, smartphones, tablets, portable gaming devices, cameras and MP3 players).

However, the portability and widespread adoption of USB storage devices pose a significant security threat. For example, an employee could inadvertently connect an infected device to an endpoint, which may result in malware spreading to the company’s network. Alternatively, USB storage devices may be used to exfiltrate sensitive information or install unauthorized applications, which could lead to further security concerns.

Thankfully, Microsoft has made it relatively simple to block the use of unauthorized USB storage devices. In this article, we’ll show you the exact steps to disable USB storage devices using a Group Policy Object (GPO).

Note: To restrict access to external drives with a GPO, you need to be running Windows Server 2008 (or newer); on desktops, you need Windows Vista or newer. Older versions of Windows and Windows Server will need to use third-party tools to block access to external media, which are not covered in this article.

Apply a GPO to an organizational unit

  1. Open the Group Policy Management Console (gpmc.msc).
  2. Right-click on the organizational unit (OU) you want to apply the policy to and click Create a GPO in this domain, and Link it here.
  3. Enter a name for the policy (e.g. Block USB Devices) and click OK.
  4. In the Linked Group Policy Objects tab, right-click the policy you created in Step 4 and click Edit.
  5. Navigate through the console tree to Computer Configuration > Policies > Administrative Templates > System > Removable Storage Access.
  6. In the Removable Storage Access section, you’ll find a number of policies for a variety of storage devices. Policies include:
    • CD and DVD: Deny execute access.
    • CD and DVD: Deny read access.
    • CD and DVD: Deny write access.
    • Custom Classes: Deny read access.
    • Custom Classes: Deny write access.
    • Floppy Drives: Deny execute access.
    • Floppy Drives: Deny read access.
    • Floppy Drives: Deny write access.
    • Removable Disks: Deny execute access.
    • Removable Disks: Deny read access.
    • Removable Disks: Deny write access.
    • All Removable Storage classes: Deny all access.
    • All Removable Storage: Allow direct access in remote sessions.
    • Tape Drives: Deny execute access.
    • Tape Drives: Deny read access.
    • Tape Drives: Deny write access.
    • WPD Devices: Deny read access.
    • WPD Devices: Deny write access.
  7. To deny access to all storage devices, double click All Removable Storage classes: Deny all access, tick Enabled and click OK. Once this policy is enabled, the system will detect when a USB storage device is connected and display an error message stating that the drive is not accessible and access is denied.

Apply a GPO to specific users

In the previous section, we blocked access to all removable media for all users within the selected OU. However, there are often situations where you’ll want to apply a GPO only to a specific group or groups. To do so:

  1. Open the Group Policy Management Console.
  2. In the navigation pane, find and select the GPO.
  3. Click the Delegation tab.
  4. Click Advanced.
  5. Select Authenticated Users.
  6. Scroll down to the Apply group policy permission and untick Allow.
  7. Click Add, enter the name of the group you wish to apply the policy to and click OK.
  8. Select the group you added in Step 7, scroll down the permission list to Apply group policy and tick Allow. The GPO will now only be applied to users who are in this group.

Exempt a group from a GPO

In other situations, you may wish to apply a GPO to an OU but still allow certain users (such as administrators) to be able to access USB storage devices. To do so:

  1. Open the Group Policy Management Console.
  2. In the navigation pane, find and select the GPO.
  3. Click the Delegation tab.
  4. Click Advanced.
  5. Click Add, enter the name of the group you wish to exempt from the policy and click OK.
  6. Select the group you added in Step 5, scroll down to the Apply group policy permission and tick Deny.
  7. Click OK, and then click Yes if prompted by the Windows Security dialog box. The GPO will now not apply to users in this group.


apkaluva