Zdieľať cez


Plan security for Office 2010

 

Applies to: Office 2010

Topic Last Modified: 2011-07-08

Banner stating end of support date for Office 2010 with link to more info

New security controls are available in Microsoft Office 2010 to help you plan a robust defense against threats while maintaining information worker productivity.

An organization's success often depends on the productivity of its information workers and the integrity and confidentiality of its intellectual property. Many IT departments find it difficult to satisfy these business needs because protection often comes at the expense of productivity. The articles listed in the following table describe the new security controls that are available in Microsoft Office 2010.

Article Description

Security overview for Office 2010

Provides an overview of new security controls in Microsoft Office 2010 that make it easier for IT professionals to build a robust defense against threats while maintaining information worker productivity.

Understand security threats and countermeasures for Office 2010

Provides information to help you plan for a secure desktop configuration for Office 2010, including which security risks and threats are relevant to Office 2010, and which might pose a risk to the organization's business assets or processes.

Plan Trusted Locations settings for Office 2010

Provides information about how to use the Trusted Locations feature in Office 2010 to differentiate safe files from potentially harmful files.

Plan Trusted Publishers settings for Office 2010

Provides information about how to use the Trusted Publishers feature in Office 2010 to designate content publishers that you trust.

Plan security settings for add-ins for Office 2010

Describes how to control the way add-ins behave, or to prevent users from running add-ins, by modifying the Office 2010 add-in settings.

Plan security settings for ActiveX controls for Office 2010

Describes how to change the way Microsoft ActiveX controls behave in Office 2010 by modifying ActiveX control settings.

Plan security settings for VBA macros for Office 2010

Describes how to control the way Visual Basic for Applications (VBA) and VBA macros behave by modifying Microsoft Office 2010 VBA and VBA macros settings.

Plan COM object categorization for Office 2010

Describes how to control the behavior of certain COM objects in Office 2010 by using COM object categorization.

Plan Protected View settings for Office 2010

Provides information about how to configure Protected View, a new security feature in Office 2010 that helps mitigate exploits to your computer by opening files in a restricted environment so they can be examined before the files are opened for editing.

Plan Office File Validation settings for Office 2010

Provides information about how to configure Office File Validation, a new security feature in Office 2010 that helps prevent file format attacks by scanning Office binary file formats before the files are opened.

Plan password complexity settings for Office 2010

Provides information about settings to enforce strong passwords, such as password length and complexity rules, when you use the Encrypt with Password feature in Microsoft Excel 2010, Microsoft PowerPoint 2010, and Microsoft Word 2010.

Plan cryptography and encryption settings for Office 2010

Provides information about cryptography and encryption in Microsoft Office 2010, and describes the settings that you can use to encrypt data.

Plan digital signature settings for Office 2010

Provides information about how to digitally sign documents by using Microsoft Excel 2010, Microsoft PowerPoint 2010, and Microsoft Word 2010.

Plan privacy options for Office 2010

Describes how to configure privacy options in Office 2010 to meet an organization’s security requirements.

Plan file block settings for Office 2010

Provides information about Group Policy and Office Customization Tool (OCT) settings that you can configure to block specific file format types for Microsoft Excel 2010, Microsoft PowerPoint 2010, and Microsoft Word 2010.

Plan for Information Rights Management in Office 2010

Provides a summary of Information Rights Management (IRM) technology and how it works in Office applications.

Plan for security and protection in Outlook 2010

Describes features in Microsoft Outlook 2010 that can help keep an organization’s e-mail messaging secure.

Security articles for end users (Office 2010)

Lists and categorizes key Office 2010 security-related articles, videos, and training courses that IT administrators might want to share with end users.