For it professionals: Group Policy for Microsoft Office 2010




Yüklə 1.48 Mb.
səhifə1/71
tarix27.04.2016
ölçüsü1.48 Mb.
  1   2   3   4   5   6   7   8   9   ...   71



For IT professionals:
Group Policy for Microsoft Office 2010


Microsoft Corporation

Published: January 2011

Author: Microsoft Office System and Servers Team (itspdocs@microsoft.com)

Abstract


This book contains information about how to use Group Policy to deploy and configure an installation of Microsoft Office 2010. The audience for this book includes IT generalists, IT operations, help desk and deployment staff, IT messaging administrators, consultants, and other IT professionals.

The content in this book is a copy of selected content in the Office 2010 Resource Kit technical library (http://go.microsoft.com/fwlink/?LinkId=181453) as of the publication date. For the most current content, see the technical library on the Web.



This document is provided “as-is”. Information and views expressed in this document, including URL and other Internet Web site references, may change without notice. You bear the risk of using it.

Some examples depicted herein are provided for illustration only and are fictitious.  No real association or connection is intended or should be inferred.

This document does not provide you with any legal rights to any intellectual property in any Microsoft product. You may copy and use this document for your internal, reference purposes.

© 2011 Microsoft Corporation. All rights reserved.

Microsoft, Access, Active Directory, Backstage, Excel, Groove, Hotmail, InfoPath, Internet Explorer, Outlook, PerformancePoint, PowerPoint, SharePoint, Silverlight, Windows, Windows Live, Windows Mobile, Windows PowerShell, Windows Server, and Windows Vista are either registered trademarks or trademarks of Microsoft Corporation in the United States and/or other countries.

The information contained in this document represents the current view of Microsoft Corporation on the issues discussed as of the date of publication. Because Microsoft must respond to changing market conditions, it should not be interpreted to be a commitment on the part of Microsoft, and Microsoft cannot guarantee the accuracy of any information presented after the date of publication.

Contents


For IT professionals:
Group Policy for Microsoft Office 2010 1

Abstract 1

Contents iii

Getting help xii

I. Overview of Group Policy and Office 2010 1

Group Policy overview for Office 2010 2

Local and Active Directory-based Group Policy 2

Group Policy processing 3

Policy inheritance 4

Synchronous and asynchronous processing 4

Fast Logon Optimization feature 4

Slow links processing 4

Group Policy refresh interval 5

Triggering a Group Policy refresh 5

Changing how Group Policy processes GPOs 5

Change the link order 6

Block inheritance 6

Enforce a GPO link 6

Disable a GPO link 6

Use security filtering 6

Use Windows Management Instrumentation filtering 7

Use loopback processing 7

Administrative Templates 8

Administrative Template files 8

Administrative Template files for Office 2010 9

True policies vs. user preferences 10

True policies 10

Preferences 11

Group Policy management tools 11

Group Policy Management Console 11

Group Policy Object Editor 12

System requirements for GPMC and Group Policy Object Editor 12

Office Customization Tool and Group Policy 13

Planning for Group Policy in Office 2010 15

Planning for Group Policy 15

Define business objectives and security requirements 15

Evaluate your current environment 16

Design managed configurations based on business and security requirements 17

Determine the scope of application 18

Test and stage Group Policy deployments 18

Involve key stakeholders 19

FAQ: Group Policy (Office 2010) 20

Q: When should I use Group Policy instead of Office Configuration Tool (OCT)? 20

Q: Where can I find a list of Group Policies that are available for Office 2010? 20

Q: What is the difference between the two workbooks Office2010GroupPolicyAndOCTSettings_Reference.xls and Office2010GroupPolicyAndOCTSettings.xls? 20

Q: What is the difference between .adm, .admx, and .adml administrative template files? 21

Q: Do the Office 2010 .admx template files work with the 2007 Office system? Or must I download the 2007 Office system template files separately? 21

Q: How do I install the Office 2010 Group Policy templates? 21

Q: How can I map a specific UI element in Office 2010 to a Group Policy setting? 22

Q: How can I use Group Policy to disable commands and menu items? 22

Q. Why does Microsoft not support the use of Group Policy Software Installation to deploy Office 2010? 23

Q. What are the advantages and limitations of deploying Office 2010 using Group Policy computer startup scripts? 23

Office 2010 Administrative Template files (ADM, ADMX, ADML) and Office Customization Tool 25

Overview of new and removed Group Policy and OCT settings 25

Group Policy settings location 25

New administrative templates 26

OCT settings and availability 26

Preventing conflicts with earlier versions of Group Policy settings 26

Installing the settings 27

Files included in this download 27

II. Plan for customizing Office 2010 by using Group Policy 32

Plan for accessibility in Office 2010 33

Increase the visibility of violations 33

Control what the checker reports 33

Group Policy settings for Excel 2010 33

Group Policy settings for PowerPoint 2010 35

Group Policy settings for Word 2010 36

Plan for spelling checker settings in Office 2010 40

Office 2010 general spelling checker settings 41

InfoPath 2010 spelling checker settings 43

OneNote 2010 spelling checker settings 44

Outlook 2010 spelling checker settings 44

PowerPoint 2010 spelling checker settings 45

Publisher 2010 spelling checker settings 46

Word 2010 spelling checker settings 46

Plan for using compatibility mode in Office 2010 48

Overview of Office document compatibility in Office 2010 48

Is using compatibility mode right for your organization? 49

Preparing Office 2010 users for using compatibility features 49

Changing default file formats and other settings for Office 2010 documents 51

Default file format 52

Set default compatibility mode on file creation (Word 2010 only) 53

Save As Open XML in compatibility mode (Word 2010 only) 53

Planning security settings for binary files that are opened in Office 2010 53

Office File Validation 54

Office Protected View 54

Group Policy and Office Customization Tool (OCT) settings that address OpenDocument Format (ODF) and Office Open XML (OOXML) file formats in Office 2010 56

About the settings 56

Excel 2010 settings 57

PowerPoint 2010 settings 61

Word 2010 settings 66

III. Plan for security by using Group Policy 76

Security policies and settings in Office 2010 77

Plan COM object categorization for Office 2010 78

About COM object categorization 78

Configure Group Policy security settings for COM object categorization 78

Add COM object categorization in registry 79

Plan file block settings for Office 2010 81

Blocking file format types by using Group Policy or the OCT 81

Planning considerations for configuring file block settings 81

Group Policy and OCT settings 82

How to find the settings 82

About the “Set default file block behavior” setting 83

Excel 2010 settings 83

PowerPoint 2010 settings 99

Word 2010 settings 104

Plan password complexity settings for Office 2010 117

About planning password length and complexity settings 117

Enforce password length and complexity 117

Determine minimum password length requirement 118

Determine the password rules level 119

Determine domain time-out value 120

Related password length and complexity settings 120

Plan digital signature settings for Office 2010 121

What is a digital signature? 121

What digital signatures accomplish 121

Requirements for digital signatures 122

Digital signatures in the business environment 122

Compatibility issues 122

Digital certificate: Self-signed or issued by CAs 123

Certificates created by using a corporate PKI 124

Commercial certificates 124

Using digital signatures 125

Time stamp digital signatures 125

Configure digital signatures 126

Plan privacy options for Office 2010 128

About planning privacy options 128

Suppress the Welcome to Microsoft Office 2010 dialog box 129

Configure privacy options 130

Related privacy options 131

Plan for Information Rights Management in Office 2010 133

IRM overview 133

How IRM works in Office 2010 134

Using IRM with an RMS server 134

Using IRM without a local RMS server 135

Setting up IRM for Office 2010 136

Setting up RMS server access 136

Installing the Rights Management client software 136

Defining and deploying permissions policies 136

Permissions rights 137

Predefined groups of permissions 138

Advanced permissions 138

Deploying rights policy templates 138

Configuring IRM settings for Office 2010 139

Office 2010 IRM settings 139

Office 2010 IRM registry key options 140

Configuring IRM settings for Outlook 2010 142

Outlook 2010 IRM settings 142

Outlook 2010 IRM registry key options 143

IV. Plan for Outlook 2010 by using Group Policy 144

Determine which features to enable or customize in Outlook 2010 145

AutoArchive 146

Contact Cards 147

Contact Card 148

Contact tab 148

Conversation view 152

Global Address List synchronization 153

Contact corrections that Outlook makes during GAL synchronization 153

Configuring GAL synchronization 154

Internet Calendars 156

Instant Search 157

Navigation Pane 158

Outlook Social Connector 161

Search Folders 163

SharePoint Server Colleague add-in 165

Plan an Exchange deployment in Outlook 2010 168

Overview 168

Choosing between Cached Exchange Mode and Online Mode 169

When to use Cached Exchange Mode 169

When to use Online Mode 169

Special considerations 170

How Cached Exchange Mode can help improve the Outlook user experience 171

Outlook features that can reduce the effectiveness of Cached Exchange Mode 172

Synchronization, disk space, and performance considerations 173

Manual synchronization of Exchange accounts no longer necessary 173

Offline Address Book access advantages 174

Offline folder (.ost file) recommendations 174

Managing performance issues 175

Managing Outlook folder sharing 175

Public Folder Favorites considerations 176

Managing Outlook behavior for perceived slow connections 176

Options for staging a Cached Exchange Mode deployment 177

Upgrading current Cached Exchange Mode users to Outlook 2010 179

Deploying Cached Exchange Mode to users who already have .ost files 179

Configuring Cached Exchange Mode 180

Additional resources 181

Plan for compliance and archiving in Outlook 2010 183

Planning a Retention Policy deployment 183

Defining your Retention Policies 183

Determining which types of policies to create 184

Personal Tags 185

Distribution lists 185

Retention policy warm up period and training 186

Educating users about Retention Policy 187

Users under legal hold or investigation 188

Recover Deleted Items 188

Copy on Write 188

Using Retention Hold 189

Using Litigation Hold 189

Planning a Personal Archive deployment 189

Determining your archive policies 189

Educating users about the Personal Archive 190

Outlook data files (.pst) in your organization 190

Choose security and protection settings for Outlook 2010 194

Overview 194

Specify how security settings are enforced in Outlook 195

Customize security settings by using Group Policy 195

Special environments 196

How administrator settings and user settings interact in Outlook 2010 197

Working with Outlook COM add-ins 197

Customize ActiveX and custom forms security in Outlook 2010 198

Customize how ActiveX controls behave in one-off forms 198

Customize custom forms security settings 199

Customize programmatic settings in Outlook 2010 200

Additional settings 201

Plan attachment settings in Outlook 2010 202

Overview 202

Add or remove Level 1 file name extensions 203

Add or remove Level 2 file name extensions 203

Configure additional attachment file restrictions 204

Plan for e-mail messaging cryptography in Outlook 2010 206

About Cryptographic messaging features in Outlook 2010 206

How Outlook 2010 implements cryptographic messaging 206

Digital IDs: A combination of public/private keys and certificates 207

Managing cryptographic digital IDs 207

Places to store digital IDs 208

Providing digital IDs to other users 208

Importing digital IDs 209

Renewing keys and certificates 209

Security labels and signed receipts 209

Configuring Outlook 2010 cryptographic settings 210

Configuring additional cryptography settings 215

Security policy settings for general cryptography 215

Plan for limiting junk e-mail in Outlook 2010 216

Overview 216

Supported account types 217

Support in Exchange Server 217

Configuring the Junk E-mail Filter user interface 217

Deploying default Junk E-mail Filter lists 219

Configuring Automatic picture download 220

V. Plan for SharePoint Workspace 2010 by using Group Policy 222

Group Policy for SharePoint Workspace 2010 223

VI. Customize Office 2010 by using Group Policy 227

Customize language setup and settings for Office 2010 228

Overview 228

Before you begin 229

Deploy a default language version of Office 229

Specify which languages to install 230

Deploy different languages to different groups of users 231

Identify installed languages 232

Customize language settings 233

Use Group Policy to enforce language settings 233

Use a Setup customization file to specify default language settings 233

Use the Language Preferences tool to modify language settings 234

Customize and install the Office 2010 Proofing Tools Kit 234

Customize the Office 2010 Proofing Tools Kit 235

Installing the Office Proofing Tools Kit 2010 on a single computer 235

Enforce settings by using Group Policy in Office 2010 237

Start GPMC 237

Create a GPO 238

Load Office 2010 Administrative Templates to a GPO 238

Edit a GPO 240

Link a GPO 241

Disable user interface items and shortcut keys in Office 2010 242

Using Group Policy to disable UI items and keyboard shortcuts 242

Disabling commands by using control IDs 243

Disabling shortcut keys by using virtual key codes 244

Disabling predefined user interface items and shortcut keys 247

VII. Customize security by using Group Policy 249

Configure security for Office 2010 250

Process overview 250

Before you begin 250

Plan security settings 250

Review required permissions 251

Tool prerequisites 251

Configure security settings by using the OCT 252

Configure security settings by using Group Policy 252

Configure Information Rights Management in Office 2010 254

Overview 254

Before you begin 254

Turn off Information Rights Management 255

Configure automatic license caching for Outlook 255

Enforce e-mail expiration 255

Deploy rights policy templates 256

VIII. Customize Outlook 2010 by using Group Policy 257

Enable SharePoint Server 2010 Colleague in Outlook 2010 258

Overview 258

Before you begin 258

Configure Colleagues for My Site 258

Configure Outlook Anywhere in Outlook 2010 261

Overview 261

Before you begin 262

Use the OCT to configure Outlook Anywhere 262

Use Group Policy to lock down Outlook Anywhere settings 263

Verification 263

Configure Cached Exchange Mode in Outlook 2010 265

Overview 265

Before you begin 266

Configure Cached Exchange Mode 266

Manage trusted add-ins for Outlook 2010 270

Overview 270

Before you begin 270

Get the hash value for a trusted add-in 270

Specify the trusted add-in by using Group Policy 271

Remove the Security Hash Generator Tool 272

Configure junk e-mail settings in Outlook 2010 273

Overview 273

Before you begin 274

Create and deploy Junk E-mail Filter lists 274

Configure the Junk E-mail Filter 275

Configure automatic picture download 276

IX. Customize SharePoint Workspace 2010 by using Group Policy 278

Configure SharePoint Workspace 2010 279

Configure and customize SharePoint Workspace 2010 280

Before you begin 280

Review customization options for SharePoint Workspace 2010 282

Control use of Groove workspaces 282

Enable IPv6 282

Prefer IPv4 282

Remove legacy files and registry settings 282

Prevent Windows Search crawling for SharePoint Workspace 282

Require Secure Socket Layer protection for external client connections 283

Customize SharePoint Workspace in a managed environment 283

Customize SharePoint Workspace 2010 by using Active Directory Group Policy objects or the Office Customization Tool 283

Verify installation 286

Test SharePoint Workspace connections 287

Before you begin 287

Test SharePoint Workspace synchronization with SharePoint Server 287

Test Groove workspace synchronization among peer clients 289

  1   2   3   4   5   6   7   8   9   ...   71


Verilənlər bazası müəlliflik hüququ ilə müdafiə olunur ©azrefs.org 2016
rəhbərliyinə müraciət

    Ana səhifə