Security articles for end users (Office 2010)
Applies to: Office 2010
Topic Last Modified: 2011-08-05
IT pros can share the Microsoft Office 2010 security resources that are listed in this article with end users in their organizations. These resources include articles, videos, and training courses that are designed to assist end users who use Office 2010 applications. The resources are listed in a series of tables that are organized into the following categories:
Overview
New Security Features
Outlook/Access/Excel/PowerPoint/Visio/Word
Access only
To see a list of all security and privacy related articles for a specific program, such as Word, PowerPoint, or another Office program, go to the Office.com website, select the support tab, select All Support, select the application you want, and then select Security and privacy.
Overview
Resource | Description |
---|---|
Self-paced training that assists the user in becoming familiar with the security features that help protect files in Microsoft Excel 2010, Microsoft PowerPoint 2010, and Microsoft Word 2010. |
|
Discusses the Trust Center, where you can find security and privacy settings for Office 2010 programs. |
New Security Features
Resource | Feature |
---|---|
Protected View, a new security feature in Office 2010 that helps protect your computer by opening files in a restricted environment so they can be examined before they are opened for editing in Excel, PowerPoint, or Word. |
|
Office File Validation, a new security feature in Office 2010 that helps protect your computer by scanning and validating Office binary file formats before they are opened. |
Outlook
Resource | Description |
---|---|
How Outlook helps protect you from viruses, spam, and phishing |
Describes how Outlook 2010 helps protect your computer from viruses, spam, and phishing. |
Describes the default behavior of Outlook 2010, which does not allow you to receive certain kinds of files as attachments. |
|
Explains how message encryption works in Outlook 2010 and includes procedures for encrypting e-mail messages. |
|
Explains what Information Rights Management (IRM) is and how you can use it to restrict permission to content in e-mail messages in Microsoft Outlook. |
Access, Excel, PowerPoint, Visio, and Word
Resource | Description |
---|---|
Explains how to work with ActiveX controls that are in your files, how to change their settings, and how to enable or disable them by using the Message Bar and the Trust Center. |
|
Describes the risks involved when you work with macros, and how to enable or disable macros in the Trust Center. |
|
Explains what trusted documents are, when to use them, and how to configure their settings. |
|
Describes trusted locations, how and where you can create them, and the precautions that you should take before you use a trusted location. |
|
Lists active-content types that can be blocked by the Trust Center and cause Message Bars to appear when you open files. Active content types include macros, add-ins, and data connections. |
Access only
Resource | Description |
---|---|
Summarizes the security features that are offered by Access 2010, and explains how to use the tools that Access provides for helping to secure a database. |
|
Discusses how trust works in Access 2010, how it differs from security in earlier versions of Access, and what factors that you should consider when you decide whether to trust a database. |
|
Set or change Access 2003 user-level security in Access 2010 |
Explains how the Access 2003 security features work, and how to start and use them in Access 2010. |
Explains how, by default, Access 2010 disables several database objects unless you apply a digital signature to them or you place the database in a trusted location. The article also lists the components that Access disables. |
|
Explains how to create your own security certificate to show that you believe that a database is safe and that its content can be trusted. |