ADBP-XI-001290 – Adobe Acrobat Pro XI Adobe Cloud Synchronization must be disabled. Details By default, Adobe online services are tightly integrated in Adobe Acrobat. When the Adobe Cloud synchronization is disabled it...
ADBP-XI-000205 – Adobe Acrobat Pro XI Enhanced Security for standalone mode must be enabled. Details Enhanced Security (ES) is a sandbox capability that restricts access to system resources. ES can be configured in two...
ADBP-XI-000210 – Adobe Acrobat Pro XI Enhanced Security for browser mode must be enabled. Details Enhanced Security (ES) is a sandbox capability that restricts access to system resources and prevents PDF cross domain access....
ADBP-XI-000275 – Adobe Acrobat Pro XI PDF file attachments must be blocked. Details Acrobat Pro allows for files to be attached to PDF documents. Attachments represent a potential security risk because they...
ADBP-XI-000280 – Adobe Acrobat Pro XI access to unknown websites must be restricted. Details Acrobat provides the ability for the user to store a list of websites with an associated behavior of allow,...
ADBP-XI-000285 – Adobe Acrobat Pro XI access to websites must be blocked. Details PDF files can contain URLs that initiate connections to websites in order to share or get information. Any Internet...
ADBP-XI-000290 – Adobe Acrobat Pro XI must be configured to block Flash Content. Details Flash has a long history of vulnerabilities. Although Flash is no longer provided with Acrobat, if the system has...
ADBP-XI-000295 – The Adobe Acrobat Pro XI send and Track plugin for Outlook must be disabled. Details When enabled, the Adobe Send and Track button appears in Outlook. When an email is composed it enables the...
ADBP-XI-000840 – Adobe Acrobat Pro XI privileged file and folder locations must be disabled. Details Privileged Locations are the primary method Acrobat uses to allow users and admins to specify trusted content that should...
ADBP-XI-000955 – Adobe Acrobat Pro XI FIPS mode must be enabled. Details Use of weak or untested encryption algorithms undermines the purposes of using encryption to protect data. The application must...