Overview of Office Security

Establishing the most secure computing environment possible requires limiting the vulnerability of applications and data to malicious attacks. Unfortunately, closing all the possible holes in an organization’s security is difficult, maybe impossible. Therefore, one of the best methods of establishing a more security-enhanced environment is to limit the number of possible avenues of attack.

The methods discussed in this chapter of the Microsoft Office 2003 Editions Resource Kit should help the administrator implement procedures to help limit direct assaults on data from external and internal attacks. Part of implementing these methods is training users on how to protect themselves and the company from attack. This ...

Get Microsoft® Office 2003 Editions Resource Kit now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.