Adobe Acrobat Professional DC Continuous Track STIG Ver 2, Rel 1 Checklist Details (Checklist Revisions)
NOTE
This is not the current revision of this Checklist, view the current revision.
Supporting Resources:
-
Download Standalone XCCDF 1.1.4 - Adobe Acrobat Professional DC Continuous Track STIG - Ver 2, Rel 1
- Defense Information Systems Agency
-
Download GPOs - Group Policy Objects (GPOs) - January 2022
- Defense Information Systems Agency
Target:
Target | CPE Name |
---|---|
Adobe Acrobat Pro DC Continuous Track | cpe:/a:adobe:acrobat_dc:-::continuous (View CVEs) |
Checklist Highlights
- Checklist Name:
- Adobe Acrobat Professional DC Continuous Track STIG
- Checklist ID:
- 850
- Version:
- Ver 2, Rel 1
- Type:
- Compliance
- Review Status:
- Final
- Authority:
- Governmental Authority: Defense Information Systems Agency
- Original Publication Date:
- 04/27/2018
Checklist Summary:
The Adobe Acrobat Professional DC Continuous Track Security Technical Implementation Guide (STIG) was written for the full version of Adobe Acrobat Professional with default installation parameters. Adobe Acrobat Professional DC is software used for creating, editing, and printing Portable Document Format (PDF) files. Custom installations and deployments for mobile platforms such as Android and iOS are not covered in the guidance. The Adobe Acrobat Professional DC STIG is intended to be applied to a Windows desktop environment and is published as a tool to improve the security of Department of Defense (DoD) information systems. This document is meant for use in conjunction with the Windows Operating System (OS) STIG and any appropriate STIG(s) applicable to the system.
Checklist Role:
- Office Software
Known Issues:
Not provided.
Target Audience:
Developed for the DOD. This checklist has been created for IT professionals, particularly Windows system administrators and information security personnel. The document assumes that the reader has experience installing and administering applications on Windows-based systems in domain or standalone configurations.
Target Operational Environment:
- Managed
- Specialized Security-Limited Functionality (SSLF)
Testing Information:
Not provided.
Regulatory Compliance:
DoD 8500.1
Comments/Warnings/Miscellaneous:
Not provided.
Disclaimer:
It must be noted that the guidelines specified should be evaluated in a local, representative test environment before implementation within large user populations. The extensive variety of environments makes it impossible to test these guidelines for all potential software configurations. For some environments, failure to test before implementation may lead to a loss of required functionality.
Product Support:
Not provided.
Point of Contact:
Comments or proposed revisions to this document should be sent via email to the following address: disa.stig_spt@mail.mil. DISA Field Security Operations (FSO) will coordinate all change requests with the relevant DoD organizations before inclusion in this document.
Sponsor:
Not provided.
Licensing:
Not provided.
Change History:
corrected to reflect what's currently hosted by DISA - 6/18/18 Update to FINAL - 7/19/2018 Added GPOs - 8/6/18 Updated to FINAL - 9/6/2018 Updated GPO Resource - 11/29/2018 Corrected SHA for GPO file - 12/19/2018 updated GPO file - 2/8/19 Status Updated to FINAL - 3/8/19 Updated URLs - 6/4/19 Updated URLs - 6/24/19 Updated URLs - 8/9/19 Updated GPO file - 10/31/19 Updated GPO file per DISA - 1/29/2020 Updated GPO file per DISA - 2/3/2020 updated GPO file - 3/6/2020 updated resource title per DISA - 3/12/2020 updated GPO file - 4/27/2020 updated GPO per DISA - 7/7/2020 Updated GPO file per DISA - 8/5/2020 updated GPOs - 10/29/2020 Updated GPO - 12/4/2020 Updated GPO per DISA - 1/28/21 Updated GPO per DISA - 3/1/21 Updated GPO per DISA - 5/12/21 Updated resource per DISA - 7/29/21 Updated GPO - 8/9/21 null Updated GPO per DISA - 8/24/21 updated GPO files - 11/22/2021 Updated GPO per DISA - 2/17/22
Dependency/Requirements:
URL | Description |
---|
References:
Reference URL | Description |
---|