Security and protection for Office 2010
Applies to: Office 2010
Topic Last Modified: 2011-07-12
The security documentation that is listed and described in the following table includes overview, planning, and configuration articles.
In this documentation:
Overview articles
Planning articles
Configuration articles
Overview articles
Article | Description |
---|---|
Provides an overview of new security controls in Office 2010 that make it easier for IT professionals to build a robust defense against threats while maintaining information worker productivity. |
|
Understand security threats and countermeasures for Office 2010 |
Provides information to help you plan for a secure desktop configuration for Office 2010, including which security risks and threats are relevant to Office 2010, and which might pose a risk to the organization's business assets or processes. |
This white paper highlights the new security features and enhancements that were introduced in Microsoft Office 2010 to help protect organizations from exploits that target users who use Office applications. |
Planning articles
Article | Description |
---|---|
Describes features in Microsoft Outlook 2010 that can help keep an organization’s e-mail messaging secure. |
|
Provides a summary of Information Rights Management (IRM) technology and how it works in Office applications. |
|
Provides information about how to use the Trusted Locations feature in Office 2010 to differentiate safe files from potentially harmful files. |
|
Provides information about how to use the Trusted Publishers feature in Office 2010 to designate content publishers that you trust. |
|
Describes how to control the way add-ins behave, or to prevent users from running add-ins, by modifying the Office 2010 add-in settings. |
|
Describes how to change the way Microsoft ActiveX controls behave in Office 2010 by modifying ActiveX control settings. |
|
Describes how to control the way Visual Basic for Applications (VBA) and VBA macros behave by modifying Office 2010 VBA and VBA macros settings. |
|
Describes how to control the behavior of certain COM objects in Office 2010 by using COM object categorization. |
|
Provides information about how to configure Protected View, a new security feature in Office 2010 that helps mitigate exploits to your computer by opening files in a restricted environment so they can be examined before the files are opened for editing. |
|
Provides information about how to configure Office File Validation, a new security feature in Office 2010 that helps prevent file format attacks by scanning Office binary file formats before the files are opened. |
|
Provides information about settings to enforce strong passwords, such as password length and complexity rules, when you use the Encrypt with Password feature in Microsoft Excel 2010, Microsoft PowerPoint 2010, and Microsoft Word 2010. |
|
Provides information about cryptography and encryption in Microsoft Office 2010, and describes the settings that you can use to encrypt data. |
|
Provides information about how to digitally sign documents by using Microsoft Excel 2010, Microsoft PowerPoint 2010, and Microsoft Word 2010. |
|
Describes how to configure privacy options in Office 2010 to meet an organization’s security requirements. |
|
Provides information about Group Policy and Office Customization Tool (OCT) settings that you can configure to block specific file format types for Microsoft Excel 2010, Microsoft PowerPoint 2010, and Microsoft Word 2010. |
Configuration articles
Article | Description |
---|---|
Provides information and procedures to configure security settings for Office 2010 by using the Office Customization Tool (OCT) and Group Policy. |