This is a potential security issue, you are being redirected to https://nvd.nist.gov
|Adobe Acrobat Pro DC Continuous Track||cpe:/a:adobe:acrobat_dc:-::continuous (View CVEs)|
The Adobe Acrobat Professional DC Continuous Track Security Technical Implementation Guide (STIG) was written for the full version of Adobe Acrobat Professional with default installation parameters. Adobe Acrobat Professional DC is software used for creating, editing, and printing Portable Document Format (PDF) files. Custom installations and deployments for mobile platforms such as Android and iOS are not covered in the guidance. The Adobe Acrobat Professional DC STIG is intended to be applied to a Windows desktop environment and is published as a tool to improve the security of Department of Defense (DoD) information systems. This document is meant for use in conjunction with the Windows Operating System (OS) STIG and any appropriate STIG(s) applicable to the system.
Developed for the DOD. This checklist has been created for IT professionals, particularly Windows system administrators and information security personnel. The document assumes that the reader has experience installing and administering applications on Windows-based systems in domain or standalone configurations.
It must be noted that the guidelines specified should be evaluated in a local, representative test environment before implementation within large user populations. The extensive variety of environments makes it impossible to test these guidelines for all potential software configurations. For some environments, failure to test before implementation may lead to a loss of required functionality.
Comments or proposed revisions to this document should be sent via email to the following address: email@example.com. DISA Field Security Operations (FSO) will coordinate all change requests with the relevant DoD organizations before inclusion in this document.
corrected to reflect what's currently hosted by DISA - 6/18/18 Update to FINAL - 7/19/2018 Added GPOs - 8/6/18 Updated to FINAL - 9/6/2018 Updated GPO Resource - 11/29/2018 Corrected SHA for GPO file - 12/19/2018 updated GPO file - 2/8/19 Status Updated to FINAL - 3/8/19 Updated URLs - 6/4/19 Updated URLs - 6/24/19 Updated URLs - 8/9/19 Updated GPO file - 10/31/19 Updated GPO file per DISA - 1/29/2020 Updated GPO file per DISA - 2/3/2020 updated GPO file - 3/6/2020 updated resource title per DISA - 3/12/2020 updated GPO file - 4/27/2020 updated GPO per DISA - 7/7/2020 Updated GPO file per DISA - 8/5/2020 updated GPOs - 10/29/2020 Updated GPO - 12/4/2020