Back
🔒
Adobe Acrobat Reader DC Continuous Track STIG (Ver 2, Rel 1)
Medium
19 items
·
1 hour
testuser
Published 2 months ago
This checklist captures key security configuration and verification steps from the DISA STIG for Adobe Acrobat Reader DC Continuous Track. It’s for administrators and security teams who must harden Reader, deploy DISA GPO/Intune resources, and verify compliance in managed Windows environments.
Progress
0 / 19
- Verify Adobe Acrobat Reader DC product track — Confirm Continuous vs Classic before applying STIG settings.
- Check installation path for Continuous track (C:Program Files (x86)AdobeAcrobat Reader DC) — Continuous track defaults to this folder.
- Check Programs and Features entry to confirm 'Adobe Acrobat Reader DC' (Continuous) or 'Adobe Acrobat Reader MUI' (Classic) — Use Programs and Features if path is ambiguous.
- Install or update to the approved Continuous track version — Apply the organization's approved Reader build before policy changes.
- Download DISA SCAP, XCCDF, GPO, Intune and SCC resources — Obtain the latest STIG content, GPO and Intune packages from DISA.
- Apply DISA-provided GPO files to Active Directory — Import and link the GPO to target OUs.
- Import Intune policies into Microsoft Intune and assign to device groups — Upload and assign Intune policy packs for Reader DC.
- Configure silent automatic updates for the Continuous track — Set updates to silent so security fixes apply promptly.
- Disable Adobe Document Cloud and online services features — Block cloud integrations if not authorized by policy.
- Disable JavaScript execution in Acrobat Reader — Turn off JavaScript to reduce attack surface.
- Enable Protected View/Protected Mode and configure enhanced security — Ensure sandboxing and enhanced protection are enforced.
- Restrict or remove unnecessary plugins and browser extensions — Disable third-party plug-ins not required by users.
- Enforce browser PDF handling to use managed system viewer settings — Prevent unmanaged or legacy viewers from handling PDFs.
- Verify policy deployment and compliance on target hosts — Confirm settings applied and report noncompliance.
- Run gpresult /h or use GPO reporting to confirm GPO settings on a test host — Generate a report showing applied GPO settings.
- Check Intune device configuration status and compliance in the Intune portal — Review assignment and deployment success/failures.
- Enable auditing of Acrobat Reader installations and updates — Log installs/updates for incident response and tracking.
- Document exceptions, test impacts, and a phased roll-out plan — Test in representative environments before wide deployment.
- Subscribe to DISA STIG updates, SHA changes and resource feeds — Stay current with DISA resource and checksum updates.
Your Stats
🏆
0
Completed
📅
—
Last Done
⏱️
—
Last Time
Completion Rate
Items checked per run
⚡
—
Fastest Run
🔥
0
Streak
🚫
—
Most Skipped Step
🔄
0
Resets
📝 My Notes