This Application Security Guide describes configuration details for the Acrobat family of products, including sandboxing (Protected View and Protected Mode), enhanced security, scripting controls, attachments, and other features. The primary goal here is to encourage enterprise stakeholders who configure and deploy clients to manage them in a secure way. This content is designed for IT administrators, workflow owners, and technically savvy users who need to customize their application’s security capabilities.
Adobe provides a security model designed to help you protect your environment from security attacks. You should explore the options for tuning applications for the desired security level. The big picture is relatively simple: Acrobat products allow you to apply application-wide protections and disable risky features while at the same time allowing you to selectively assign trust to files, folders, hosts, protocols, apis, and other workflow components.
The easiest way to propagate settings across your organization is to configure an installed application and then use the Customization Wizard’s registry feature to copy the settings to the application installer.
Best practice checklist
Protect your systems and users
Assign trust to workflow components
Many HKCU settings have an HKLM mirror so that IT can disable, lock, and control permissions in a way that prevents end user changes.
|Preference Reference||A dictionary of plist and registry configuration preferences.|
|Enhanced Security Quick Key||A one page guide to enhanced security configuration.|
|IT-centric videos||A series of configuration and deployment videos for enterprise IT.|
|Flash Security in Acrobat||Describes the security model when Flash runs inside a PDF document.|
|Cross Domain Policy File Specification||A specification and guide for creating server-based cross domain policy files with examples.|
|Security Bulletins & Advisories||Keep abreast of the latest updates which mitigate security issues.|
|Security Notification Service||Receive alerts about vulnerabilities and updates.|
|Incident Response Team Blog||Get news and pre-notification of updates about all Adobe products.|
|Secure Software Eng. Team Blog||Track news and events from Adobe and the security software industry.|
© Copyright 2012-2013
Adobe Systems, Inc.
Updated Mar 29, 2013.