Plan security for Office 2010
Applies to: Office 2010
Topic Last Modified: 2011-07-08
New security controls are available in Microsoft Office 2010 to help you plan a robust defense against threats while maintaining information worker productivity.
An organization's success often depends on the productivity of its information workers and the integrity and confidentiality of its intellectual property. Many IT departments find it difficult to satisfy these business needs because protection often comes at the expense of productivity. The articles listed in the following table describe the new security controls that are available in Microsoft Office 2010.
Article | Description |
---|---|
Provides an overview of new security controls in Microsoft Office 2010 that make it easier for IT professionals to build a robust defense against threats while maintaining information worker productivity. |
|
Understand security threats and countermeasures for Office 2010 |
Provides information to help you plan for a secure desktop configuration for Office 2010, including which security risks and threats are relevant to Office 2010, and which might pose a risk to the organization's business assets or processes. |
Provides information about how to use the Trusted Locations feature in Office 2010 to differentiate safe files from potentially harmful files. |
|
Provides information about how to use the Trusted Publishers feature in Office 2010 to designate content publishers that you trust. |
|
Describes how to control the way add-ins behave, or to prevent users from running add-ins, by modifying the Office 2010 add-in settings. |
|
Describes how to change the way Microsoft ActiveX controls behave in Office 2010 by modifying ActiveX control settings. |
|
Describes how to control the way Visual Basic for Applications (VBA) and VBA macros behave by modifying Microsoft Office 2010 VBA and VBA macros settings. |
|
Describes how to control the behavior of certain COM objects in Office 2010 by using COM object categorization. |
|
Provides information about how to configure Protected View, a new security feature in Office 2010 that helps mitigate exploits to your computer by opening files in a restricted environment so they can be examined before the files are opened for editing. |
|
Provides information about how to configure Office File Validation, a new security feature in Office 2010 that helps prevent file format attacks by scanning Office binary file formats before the files are opened. |
|
Provides information about settings to enforce strong passwords, such as password length and complexity rules, when you use the Encrypt with Password feature in Microsoft Excel 2010, Microsoft PowerPoint 2010, and Microsoft Word 2010. |
|
Provides information about cryptography and encryption in Microsoft Office 2010, and describes the settings that you can use to encrypt data. |
|
Provides information about how to digitally sign documents by using Microsoft Excel 2010, Microsoft PowerPoint 2010, and Microsoft Word 2010. |
|
Describes how to configure privacy options in Office 2010 to meet an organization’s security requirements. |
|
Provides information about Group Policy and Office Customization Tool (OCT) settings that you can configure to block specific file format types for Microsoft Excel 2010, Microsoft PowerPoint 2010, and Microsoft Word 2010. |
|
Provides a summary of Information Rights Management (IRM) technology and how it works in Office applications. |
|
Describes features in Microsoft Outlook 2010 that can help keep an organization’s e-mail messaging secure. |
|
Lists and categorizes key Office 2010 security-related articles, videos, and training courses that IT administrators might want to share with end users. |