


You can enable this policy through the registry using the command: reg add "HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows\DriverInstall\Restrictions" /v AllowUserDeviceClasses /t REG_DWORD/d 1 /f When you enable this policy, members of the local Users group can install a new device driver for any device that matches the specified device classes. You can find a full list of the device class GUIDs in Windows here.


Click the Show button and in the appeared window add two lines with device class GUID corresponding to printers: In this case, we are interested in the policy Allow non-administrators to install drivers for these device setup classes in the GPO section Computer Configuration > Policies > Administrative Templates > System > Driver Installation.Įnable the policy and specify the device classes that users should be allowed to install. The next step is to allow the user to install the printer drivers via GPO. However, this policy does not allow downloading and installing an untrusted (not-signed) printer driver.Īdding Printer Device GUIDs Allowed to Install via GPO Then you can set the policy value to Disable, any unprivileged user can install a printer driver as a part of a shared printer connection to a computer. This policy allows non-administrators to install printer drivers when connecting a shared network printer (the printer’s driver downloaded from the print-server host). Find the policy Devices: Prevent users from installing printer drivers. Expand the following branch in the Group Policy editor: Computer Configuration > Policies > Windows Settings > Security Settings > Local Policies > Security Options.
