Contents
Executive summary ......................................................................................................................iii
1. Introduction ............................................................................................................................ 1
2. Environment-agnostic settings ........................................................................................... 2
2.1. The sandbox ................................................................................................................................................... 2
2.1.1. Protected Mode .................................................................................................................................... 2
2.1.2. Protected View ..................................................................................................................................... 3
2.1.3. AppContainer ........................................................................................................................................ 4
2.2. Enhanced security and FeatureLockDown ........................................................................................ 4
2.3. Privileged locations ...................................................................................................................................... 5
2.4. Attachments .................................................................................................................................................... 6
3. Tailored settings .................................................................................................................... 7
3.1. Internet access from a document via hyperlink ................................................................................ 8
3.2. JavaScript ........................................................................................................................................................ 8
3.3. Internet access from the Reader application................................................................................... 10
3.4. Document Cloud interaction ................................................................................................................... 11
3.5. Other settings ............................................................................................................................................... 12
4. Adobe’s Customization Wizard and Group Policy .......................................................... 12
5. Removing previous versions of Adobe Reader ............................................................... 13
6. Conclusion ........................................................................................................................... 13
Works cited .................................................................................................................................. 14
Appendix: Configuring Settings for Adobe’s Acrobat Reader DC ....................................... 15
Figures
Figure 1: The Protected View yellow message bar .......................................................................................... 3
Tables
Table I: Configuring enhanced security, Protected Mode, Protected View, and AppContainer ..... 5
Table II: Locking privileged locations ...................................................................................................................... 6
Table III: Disabling attachments ............................................................................................................................... 6
Table IV: Adding attachment types to the allow list .......................................................................................... 7
Table V: Restricting hyperlinks .................................................................................................................................. 8
Table VI: Disabling JavaScript and enabling trusted locations .................................................................... 9
Table VII: Disabling online service access ......................................................................................................... 10
Table VIII: Disabling Internet access by the application ............................................................................... 11
Table IX: Disabling Document Cloud services .................................................................................................. 11
Table X: Other registry settings .............................................................................................................................. 12