Skip to content
This repository has been archived by the owner on Jun 13, 2023. It is now read-only.

Latest commit

 

History

History
84 lines (57 loc) · 7.92 KB

File metadata and controls

84 lines (57 loc) · 7.92 KB

Adobe Reader DC

Group Policy Objects for User and Computer policy and Group Policy template files are included in the SHB. The settings implemented in the GPOs are from the NSA Information Assurance guidance paper Recommendations for Configuring Adobe Acrobat Reader DC in a Windows Environment.

Using the continuous track version of Adobe Reader DC (ARDC) is recommended.

Updating the Adobe Reader DC Group Policy templates

The Group Policy template files need to be copied to specific a location on the file system. The location to copy the files to varies depending on if it is a domain versus a standalone system.

Updating the Adobe Reader DC Group Policy templates for a domain

If the domain administrators have configured a Group Policy Central Store for the domain, then copy the ReaderDC.admx file to \\Fully Qualified Domain Name\SYSVOL\Fully Qualified Domain Name\Policies\PolicyDefinitions\ and copy the ReaderDC.adml file to \\Fully Qualified Domain Name\SYSVOL\Fully Qualified Domain Name\Policies\PolicyDefinitions\en-us\

If the domain administrators have not configured a Group Policy Central Store for the domain, then copy the ReaderDC.admx file to %SystemRoot%\PolicyDefinitions\, typically C:\Windows\PolicyDefinitions\, and copy the ReaderDC.adml file to %SystemRoot%\PolicyDefinitions\en-us\ folder on the domain controller.

Updating the Adobe Reader DC Group Policy templates for a standalone system

%SystemRoot%\PolicyDefinitions\, typically C:\Windows\PolicyDefinitions\, contains Group Policy templates used by Local Group Policy on a standalone system. Copy the ReaderDC.admx file to %SystemRoot%\PolicyDefinitions\ and copy the ReaderDC.adml file to %SystemRoot%\PolicyDefinitions\en-us\ folder on the domain controller.

Importing the Adobe Reader DC Group Policy

Importing the Adobe Reader DC domain Group Policy

Use the PowerShell Group Policy commands to import the Adobe Reader DC Group Policy into a domain. Run the following command on a domain controller from a PowerShell prompt running as a domain administrator.

Invoke-ApplySecureHostBaseline -Path '.\Secure-Host-Baseline' -PolicyNames 'Adobe Reader'

Importing the Adobe Reader DC local Group Policy

Use Microsoft's LGPO tool to apply the Adobe Reader DC Group Policy to a standalone system. Run the following command from a command prompt running as a local administrator.

Invoke-ApplySecureHostBaseline -Path '.\Secure-Host-Baseline' -PolicyNames 'Adobe Reader' -ToolPath '.\LGPO\lgpo.exe'

Compliance

The Compliance folder contains a Nessus (aka ACAS in the DoD) .audit file to check compliance with the settings implemented in the Group Policy Object.

Download Adobe Reader DC

An offline installer for Adobe Reader DC can be downloaded from the Adobe Reader DC enterprise download site. The latest version (Version 2015.023.20053) can also be directly downloaded here.

You can use the Get-AdobeReaderOfflineInstaller command in the Adobe Reader PowerShell module in the scripts folder to download a specific version of Adobe Reader DC. Example: Get-AdobeReaderOfflineInstaller -Version '2015.023.20053'. Adobe Reader DC version numbers that can be used with this script can be found on the Adobe Reader for Windows 10 page. You can also use the Get-AdobeReaderPatch -Version '2015.023.20053' command to download just the .msp file to update an existing Adobe Reader install.

Managing updates

Adobe Reader DC installs a task that executes an update check every time a user logs in. After a successful update check, another update check will not occur for 3 days even though the task runs at every user login. Manually running the installed task named Adobe Acrobat Update Task will result in an error of The user account does not have permission to run this task. Systems may rarely automatically update since the task can't successfully execute. A [new task](./Adobe Reader x64 Update Task.xml?raw=true) has been included in this repository which can be imported to a system using the Register-ScheduledTask command.

Register-ScheduledTask -Xml ((Get-Content -Path '.\Secure-Host-Baseline\Adobe Reader\Adobe Reader x64 Update Task.xml') | Out-String) -TaskName 'Adobe Reader x64 Update Task'

Alternatively, the provided Install-AdobeUpdateTask command from the Adobe Reader PowerShell module can be used to install the task on a system.

To force an update check to occur within the 3 day waiting period, delete the following registry value names under HKCU\Software\Adobe\Adobe ARM\1.0\ARM:

  • tLastT_AdobeARM
  • tLastT_Reader
  • tTimeWaitedFilesInUse_AdobeARM
  • tTimeWaitedFilesInUse_Reader

The updater will also not execute if the Adobe Reader EULA has not been accepted which may result in some systems not getting updated. This behavior can be prevented by creating a DWORD registry value named iDisableCheckEula under HKLM\Software\Adobe\Adobe ARM\1.0\ARM or HKLM\Software\WOW6432Node\Adobe\Adobe ARM\1.0\ARM and setting the value to 1. This value can be configured using the provided Group Policy template.

There is a log in each user's %TEMP% folder at %TEMP%\AdobeARM.log that can be used for troubleshooting the update process. An example log excerpt of when an update does not occur due to the 3 day waiting period:

[2016-07-30 12:21:05:0030] Too soon to check for arm update
[2016-07-30 12:21:05:0062] Last check for updates not expired
[2016-07-30 12:21:05:0062]    Error Code: 120300

Use the Invoke-AdobeUpdate -Force command from the Adobe ReaderPoweShell module to force an update to occur without having to wait for the waiting period to expire.

Guidance

NSA Information Assurance has a security guide for Adobe Reader DC called Recommendations for Configuring Adobe Acrobat Reader DC in a Windows Environment

Links