Information about this from Microsoft can be found here:
At the moment one of the work arounds is:
Option 2 – Disable inbound remote printing through Group Policy
You can also configure the settings via Group Policy as follows:
Computer Configuration / Administrative Templates / Printers
Disable the “Allow Print Spooler to accept client connections:” policy to block remote attacks.
You must restart the Print Spooler service for the group policy to take effect.
Impact of workaround This policy will block the remote attack vector by preventing inbound remote printing operations. The system will no longer function as a print server, but local printing to a directly attached device will still be possible.
You can also make that settings change via Endpoint Manager and Intune.
You’ll need to ensure you have an Administrative template (ADMX) profile in the Device Configuration profiles. If not, then simply create one.
In that Administrative policy settings do a search for ‘spool’ or the like. You should find the above setting under \printers – Allow Print Spooler to accept client connections, which you should then set to Disable as shown.
if you then save the policy it should be pushed out to all machines. According to the CVE, you’ll also need to restart the spooler service as well. You can do this with the following PowerShell command once the policy has taken effect:
restart-service –name spooler
Perhaps a reboot is easier anyway?
You’ll need to be careful about potential disabling existing printing configurations with shared machines, so it will be best to monitor the impact just in case.
Hopefully, a patch will become available soon for this but even when it does, I think leaving the setting disabled in general is a good idea!