In any environment, it is wise to not install unneeded software. Software and services which are rarely used may be run only when needed.
Microsoft Windows print spooler vulnerability affects systems actively running the print server. The service unfortunately runs as Administrator, so the vulnerability is significant. The CERT notice of July 2021 notes, "... VulNote for a critical remote code execution vulnerability in the Windows Print spooler service ..."
In MS Windows 10, let's set the service to MANUAL and create a script to start the service when needed. To begin, run services.msc as Administrator from the Start menu. Set the Print Spooler service to Manual.
Create a file named printspoolerstart_RunAsAdministrator.bat.
Using a text editor such as Notepad, place these lines in the file named printspoolerstart_RunAsAdministrator.bat
@echo off
echo This should be Run As Administrator to start Print Spooler service.
pause
net start spooler
pause
Save and close the file.
Run the file as Administrator.
Refresh the Services windows to verify the service is running.