National Vulnerability Database

National Vulnerability Database

National Vulnerability
Database

Adobe Acrobat Reader DC Classic Track Version 1, Release 4 Checklist Details (Checklist Revisions)

Checklist Highlights

Checklist Name:
Adobe Acrobat Reader DC Classic Track
Checklist ID:
761
Version:
Version 1, Release 4
Type:
Compliance
Review Status:
Under Review
Authority:
Governmental Authority: Defense Information Systems Agency
Original Publication Date:
02/05/2016
Checklist Group:
View

Checklist Summary:

Adobe Acrobat Reader DC incorporates capabilities other than just a PDF reader. Adobe Acrobat Reader DC incorporates an interface to Adobe’s document cloud and Adobe’s online services. Adobe Acrobat Reader DC has two product tracks: Classic and Continuous. This STIG was written for the Classic track. The Classic track does not provide new features in the updates. Updates, security and platform enhancements, and bug fixes are only available on a quarterly basis. The Continuous track provides updates for new features, security and platform enhancements, and bug fixes when available in a silent update. The Adobe Acrobat Reader DC Classic Track STIG was also written for a Windows environment and published as a tool to improve the security of Department of Defense (DoD) information systems. This document is meant for use in conjunction with the Windows Operating System (OS) STIG and any appropriate STIG(s) applicable to the system.

Checklist Role:

  • Office Software

Known Issues:

Not provided.

Target Audience:

Developed for the DOD. This checklist has been created for IT professionals, particularly Windows system administrators and information security personnel. The document assumes that the reader has experience installing and administering applications on Windows-based systems in domain or standalone configurations.

Target Operational Environment:

  • Managed
  • Specialized Security-Limited Functionality (SSLF)

Testing Information:

Not provided.

Regulatory Compliance:

DoD 8500.1

Comments/Warnings/Miscellaneous:

Not provided.

Disclaimer:

It must be noted that the guidelines specified should be evaluated in a local, representative test environment before implementation within large user populations. The extensive variety of environments makes it impossible to test these guidelines for all potential software configurations. For some environments, failure to test before implementation may lead to a loss of required functionality.

Product Support:

Not provided.

Point of Contact:

Comments or proposed revisions to this document should be sent via email to the following address: disa.stig_spt@mail.mil. DISA Field Security Operations (FSO) will coordinate all change requests with the relevant DoD organizations before inclusion in this document.

Sponsor:

Not provided.

Licensing:

Not provided.

Change History:

updated to FINAL - 05/22/2017
added benchmark - 07/18/2017
Updated URL to reflect change to the DISA website - http --> https
Moved to FINAL - 08/29/2017
correction to resource title
updated to v1,r2 - 2/16/18
Updated to FINAL - 3/18/2018
Updated to v1,r3 - 4/25/18
Updated to FINAL - 5/25/18
updated to v1,r4 - 7/24/18
null
Updated to FINAL - 9/4/2018
Updated benchmark - 10/25/18
updated summary - 11/2/18

Dependency/Requirements:

URL Description

References:

Reference URL Description

NIST checklist record last modified on 11/02/2018


* This checklist is still undergoing review for inclusion into the NCP.