Microsoft has confirmed that a failure in the Universal Print sharing system - the cloud solution that replaces local printing servers and allows to manage printers from Microsoft 365 - is caused by a change in the Microsoft Graphh API code. The incident, identified in the Microsoft message center as UP1287359, causes some attempts to create printer compartments to end up with "Sharing Print Failed" errors on the Universal Print portal.
According to the information disseminated by the company itself, the problem particularly affects the situations in which the impressions are shared by activating the option of allowing the all users of the organisation or when certain users or groups are selected during the creation of the shared resource. Microsoft explains that a change in Microsoft Graphh generated an error that increased latency in the replication of the Entre ID directory (before Azure AD) and, as a result, brought out a previous career condition in Universal Print's sharing creation flow.

This had two adverse effects: on the one hand, the late replication of the directory made information on users and groups not immediately available; on the other, the process's reattempt logic did not act correctly against this latency, so the sharing operation was not completed as expected. Microsoft has described the matter as an incident - a label that is often reserved for failures with a significant impact on users - but has not yet publicly broken down the affected regions or the exact number of customers involved.
While deploying a correction to the Graphh code, Microsoft has facilitated a mitigation procedure that allows to remove the failure and complete the task of sharing printers by avoiding the conditions that trigger the error. In essence, the recommendation is to first create the sharing without marking the global access box or assigning users or groups in the same operation; after waiting a few seconds for the configuration to spread, you have to return to the shared resource and manually add the accounts or groups that should have access, preferably opting for an organizational security group if the intention is to give access to the entire company.
It is a compromise solution that, while adding extra steps to the normal flow, reduces exposure to the late replication of the directory and allows to continue operating until the correction is fully effective. Microsoft also recommends waiting between one and two minutes and retrying to create if the first attempt fails, as the availability of information in Enter ID can improve in that interval.
Universal Print is part of a growing set of cloud-managed services whose proper operation depends on coordination between components such as Entre ID, Microsoft Graphh and management portals. Universal Print official documentation and management guides remain a useful reference for managers who need to check configurations, compatibilities or permissions: Universal Print documentation. For those who want to deepen on how Microsoft communicates changes and corrections to its unified API, the Microsoft Graphh change log is also a relevant reading: Microsoft Graphh change log.
The event is a practical reminder that an apparently clamped modification in a platform API can have cascade effects on dependent services. In this case, the error in Graph did not directly break the printing logic, but altered replication times and made visible a latent career condition in Universal Print; timing and replication failures are often the most difficult to detect and reproduce in distributed environments.

It is not the first time in recent weeks that Microsoft is forced to issue urgent patches or reverse updates for problems with user experience in extensive services. In April and early May the company launched off-cycle updates to correct problems that affected the start-up with Microsoft accounts and, in another case, reversed an update that prevented users from opening the Microsoft Teams desktop client. Emergency corrections related to update and reboot problems have also been published on some Windows servers. These movements show how the company prioritizes rapid mitigation when the stability of critical services is compromised.
For IT administrators and managers the practical recommendation is to monitor the state of service and apply Microsoft's time guidelines if necessary. The Microsoft message centre and documentation are the official sources where warnings, mitigation instructions and correction deployments are published: regularly consult the UP1287359 message at your management center and Microsoft support pages to be aware of the final resolution.
Meanwhile, applying the mitigation indicated by Microsoft allows to keep cloud printing operational at a small additional operating cost. And it also serves as an invitation to review management processes and automations that involve assumptions about the immediacy of directory replication, so that corporate environments are less vulnerable to this type of intermittent latences.
Related
More news on the same subject.

18-year-old Ukrainian youth leads a network of infostealers that violated 28,000 accounts and left $250,000 in losses
The Ukrainian authorities, in coordination with US agents. They have focused on an operation of infostealer which, according to the Ukrainian Cyber Police, was allegedly adminis...

RAMPART and Clarity redefine the safety of IA agents with reproducible testing and governance from the start
Microsoft has presented two open source tools, RAMPART and Clarity, aimed at changing the way the safety of IA agents is tested: one that automates and standardizes technical te...

The digital signature is in check: Microsoft dismands a service that turned malware into apparently legitimate software
Microsoft announced the disarticulation of a "malware-signing-as-a-service" operation that exploited its device signature system to convert malicious code into seemingly legitim...

A single GitHub workflow token opened the door to the software supply chain
A single GitHub workflow token failed in the rotation and opened the door. This is the central conclusion of the incident in Grafana Labs following the recent wave of malicious ...

WebWorm 2025: the malware that is hidden in Discord and Microsoft Graphh to evade detection
The latest observations by cyber security researchers point to a change in worrying tactics of an actor linked to China known as WebWorm: in 2025 it has incorporated back doors ...

Identity is no longer enough: continuous verification of the device for real-time security
Identity remains the backbone of many security architectures, but today that column is cracking under new pressures: advanced phishing, real-time proxyan authentication kits and...

The dark matter of identity is changing the rules of corporate security
The Identity Gap: Snapshot 2026 report published by Orchid Security puts numbers to a dangerous trend: the "dark matter" of identity - accounts and credentials that are neither ...