If you want to suppress the user first starts Microsoft Office 2010 when the “Welcome to Microsoft Office 2010″ dialog box, you can configure privacy options. “Welcome to Microsoft Office 2010″ dialog box, also known as opt-Wizard or the “Recommended Settings” dialog, which allows the user to enable or disable some Internet-based services to help protect and improve the Office 2010 applications.
Planning privacy options
If the user selects “Use recommended settings”, the following security and privacy settings option is enabled:
• System for Windows Vista and newer operating system and Office 2010 applications automatically install recommended updates and critical updates.
• applications to connect to Office.com to get updated Help content, and to receive installation of Office 2010 applications to help target content.
• be able to periodically download a small application files that help identify system problems and will prompt the user to send the error report to Microsoft.
• User Registered Customer Experience Improvement Program.
If the user selects “only install updates” will be for Windows Vista and newer Windows operating system and Office 2010 applications automatically install recommended updates and critical updates. Users will be notified about new optional software. For Windows XP, will install high-priority updates. However, privacy options in Office 2010 applications has not changed, which means in effect is the default privacy option. If the user selects “Do not change” in the Windows Security Center will not change the automatic update, and privacy options in Office 2010 has not changed, which means in effect is the default privacy option.
Office 2010 applications, the default privacy options are as follows:
• Office 2010 applications are not connected to Office.com to get updated Help content, and is not detected on your computer, Office applications to provide users with improved search results.
• Office 2010 applications do not download a small program to help diagnose the problem, and not to send Microsoft error message information.
• users do not enroll in Customer Experience Improvement Program.
As the “Welcome to Microsoft Office 2010″ dialog box allows the user to enable or disable some Internet-based service, so you may need to prevent the dialog box appears and configure these services separately. If you suppress the dialog box, it is recommended that you enable all Internet-based service, you can configure privacy options to do this.
Secure desktop configuration is defense in depth strategy for any organization is an important part. But in the plan include security of Microsoft Office 2010 desktop configurations, you must understand with Office 2010-related security risks and threats, and then determine which of these security risks and threats to the organization’s business assets or a business process risk. Must also determine what privacy risks and threats to users’ personal information and private information risk.
Information security risks
Most IT professionals and IT security specialists to information security risks fall into three categories:
• security risk because unauthorized users and malicious code attempts to access in the organization of the talk, write and create content, these risks will pose a threat to the organization’s intellectual property rights.
• integrity of the risks due to unauthorized users and malicious code will attempt to destroy the organization depends on business data, these risks will pose a threat to business resources. Risk of endangering the integrity of critical information including the organization of any business assets, such as database servers, data files and e-mail server.
• availability of risk due to unauthorized users and malicious code will attempt to destroy your way of doing business, and information the way the staff work done, these risks will pose a threat to business processes. Business intelligence processes, applications, features and functionality, and document workflow processes may be the availability of risks.
To help ensure that your organization does not suffer from the threat of the three types of risk, we recommend using defense in depth security strategy; that included a multi-overlap defense against unauthorized users to malicious code and security policy. Defense layer typically includes:
• perimeter network protection, such as firewalls and proxy servers.
• physical security measures, such as physical security of data centers and server rooms.
• Desktop security tools, such as personal firewalls, virus scanners and spyware detection.
If Office 2010 is part of the organizational environment, the defense in depth strategy must also include the Office 2010 together with mechanisms to provide mitigation. Mitigation mechanisms, including many technical, settings and features. Use of these mechanisms help to alleviate the threat of Office 2010 applications, and protect intellectual property in the heart of the company, business resources and business processes.
Office 2010 security model can help organizations mitigate the risk of all three. However, every organization has different infrastructure capabilities, the efficiency of different production requirements and different desktop security requirements. To determine the organization mitigate these business risks of the exact way you need to assess the threat of use of these risks and threat agents.