Jaa


Security articles for end users (Office 2010)

 

Applies to: Office 2010

Topic Last Modified: 2011-08-05

Banner stating end of support date for Office 2010 with link to more info

IT pros can share the Microsoft Office 2010 security resources that are listed in this article with end users in their organizations. These resources include articles, videos, and training courses that are designed to assist end users who use Office 2010 applications. The resources are listed in a series of tables that are organized into the following categories:

  • Overview

  • New Security Features

  • Outlook/Access/Excel/PowerPoint/Visio/Word

  • Access only

To see a list of all security and privacy related articles for a specific program, such as Word, PowerPoint, or another Office program, go to the Office.com website, select the support tab, select All Support, select the application you want, and then select Security and privacy.

Overview

Resource Description

Office 2010 Security: Protecting your files

Self-paced training that assists the user in becoming familiar with the security features that help protect files in Microsoft Excel 2010, Microsoft PowerPoint 2010, and Microsoft Word 2010.

View my options and settings in the Trust Center

Discusses the Trust Center, where you can find security and privacy settings for Office 2010 programs.

New Security Features

Resource Feature

What is Protected View?

Protected View, a new security feature in Office 2010 that helps protect your computer by opening files in a restricted environment so they can be examined before they are opened for editing in Excel, PowerPoint, or Word.

Office 2010 Security video: file validation

Office File Validation, a new security feature in Office 2010 that helps protect your computer by scanning and validating Office binary file formats before they are opened.

Outlook

Resource Description

How Outlook helps protect you from viruses, spam, and phishing

Describes how Outlook 2010 helps protect your computer from viruses, spam, and phishing.

Blocked attachments in Outlook

Describes the default behavior of Outlook 2010, which does not allow you to receive certain kinds of files as attachments.

Encrypt e-mail messages

Explains how message encryption works in Outlook 2010 and includes procedures for encrypting e-mail messages.

Introduction to IRM for e-mail messages

Explains what Information Rights Management (IRM) is and how you can use it to restrict permission to content in e-mail messages in Microsoft Outlook.

Access, Excel, PowerPoint, Visio, and Word

Resource Description

Enable or disable ActiveX settings in Office files

Explains how to work with ActiveX controls that are in your files, how to change their settings, and how to enable or disable them by using the Message Bar and the Trust Center.

Enable or disable macros in Office files

Describes the risks involved when you work with macros, and how to enable or disable macros in the Trust Center.

Trusted documents

Explains what trusted documents are, when to use them, and how to configure their settings.

Add, remove, or modify a trusted location for your files

Describes trusted locations, how and where you can create them, and the precautions that you should take before you use a trusted location.

Active content types in your files

Lists active-content types that can be blocked by the Trust Center and cause Message Bars to appear when you open files. Active content types include macros, add-ins, and data connections.

Access only

Resource Description

Introduction to Access 2010 security

Summarizes the security features that are offered by Access 2010, and explains how to use the tools that Access provides for helping to secure a database.

Decide whether to trust a database

Discusses how trust works in Access 2010, how it differs from security in earlier versions of Access, and what factors that you should consider when you decide whether to trust a database.

Set or change Access 2003 user-level security in Access 2010

Explains how the Access 2003 security features work, and how to start and use them in Access 2010.

How database objects behave when trusted and untrusted

Explains how, by default, Access 2010 disables several database objects unless you apply a digital signature to them or you place the database in a trusted location. The article also lists the components that Access disables.

Show trust by adding a digital signature

Explains how to create your own security certificate to show that you believe that a database is safe and that its content can be trusted.