I found a registry patch that worked for me on my Windows 10 Pro PC.
Patch Tuesday was a bit rough this week : sysadmin https://www.reddit.com/r/sysadmin/comments/pq6pju/patch_tuesday_was_a_bit_rough_this_week/hda7j46/?con_text=3
If you haven't rolled back the server update, try setting:
(DWORD) to 0 on the server and restart the spooler (or the server). This key's behavior defaulted to 0 prior to the September updates, but now it defaults to 1 (Enforcement). If your clients are up to date (patched since January 2021), they aren't supposed to see these errors. EOL clients like Windows 7 (without ESU) would be expected to get errors.
More info here: Managing deployment of Printer RPC binding changes for CVE-2021-1678 (KB4599464)
Setting that key to 0 reduces security, but if it works it would let you keep the patch installed (and uninstalling the patch effectively sets it to 0 unless manually added).
This only needs to be done on the PC where the printers are connected (print server/host). After adding this registry patch I was able to again print over the network from my laptop (client) PC. KB5005565 is still installed on both PCs. After adding the registry key, restart the PC and then test printing from both the print server/host and client PCs.
----------------------------------------------
The higher the degree, the greater the respect given to the humblest!RAD 11.3