Microsoft GZA-00006 Computer Accessories User Manual


 
Office 2008 Security
104
Distribute Office 2008 product updates
1. Configure the preferences for AutoUpdate. For more information, see Configuring
AutoUpdate for Office 2008 in the Office 2008 Deployment section.
2. Download updates and service packs for Office 2008 from the Downloads
page of the
Microsoft Web site (www.microsoft.com/mac) to a central location on your network.
3. Use Apple Remote Desktop or the Workgroup Manager to distribute updates to user
computers. For an introduction to Apple Remote Desktop, see Apple Remote
Desktop 3
on the Apple Web site (www.apple.com/remotedesktop). For detailed
information, see the Apple Remote Desktop Administrator's Guide
documentation
available for download from the Resources page in the same area of the Apple Web site.
For more information about Workgroup Manager, see Deploying Office 2008 preferences
in the Office 2008 Deployment section.
Office 2008 Security
Planning for security in Office 2008
Understanding security threats
To establish a secure computing environment, you must make sure that your applications and data
are not vulnerable to malicious attacks. By using the security options in Office 2008, you can
establish a security-enhanced environment by limiting the possible avenues of attack.
This guide presents many different methods to mitigate security threats that will help you limit
direct attacks on data from external and internal sources. An important part of implementing these
methods is training users about how to protect themselves and the company from attack. This
training usually builds user awareness of security issues, and establishes ownership of the data that
users want to protect. For example, you can educate your users to distinguish between low-risk
files and high-risk files. Low risk files can be internal documents that may not contain malicious
content, such as documents from colleagues or business partners. High-risk documents are
documents from unknown people or documents that pass through an unsecured Internet
connection. It is important that users evaluate risks and mitigate potential security threats. Users
shouldn't treat both types of files the same way.