Microsoft GZA-00006 用户手册

下载
页码 146
Office 2008 Security 
 
 
104 
Distribute Office 2008 product updates 
1.  Configure the preferences for AutoUpdate. For more information, se
 in the Office 2008 Deployment section. 
2.  Download updates and service packs for Office 2008 from the 
 page of the 
Microsoft Web site (www.microsoft.com/mac) to a central location on your network. 
3.  Use Apple Remote Desktop or the Workgroup Manager to distribute updates to user 
computers. For an introduction to Apple Remote Desktop, see Apple Remote 
Desktop 3
 on the Apple Web site (www.apple.com/remotedesktop). For detailed 
information, see the 
 documentation 
available for download from the Resources page in the same area of the Apple Web site. 
For more information about Workgroup Manager, see 
 
in the Office 2008 Deployment section. 
Office 2008 Security 
Planning for security in Office 2008 
Understanding security threats 
To establish a secure computing environment, you must make sure that your applications and data 
are not vulnerable to malicious attacks. By using the security options in Office 2008, you can 
establish a security-enhanced environment by limiting the possible avenues of attack. 
This guide presents many different methods to mitigate security threats that will help you limit 
direct attacks on data from external and internal sources. An important part of implementing these 
methods is training users about how to protect themselves and the company from attack. This 
training usually builds user awareness of security issues, and establishes ownership of the data that 
users want to protect. For example, you can educate your users to distinguish between low-risk 
files and high-risk files. Low risk files can be internal documents that may not contain malicious 
content, such as documents from colleagues or business partners. High-risk documents are 
documents from unknown people or documents that pass through an unsecured Internet 
connection. It is important that users evaluate risks and mitigate potential security threats. Users 
shouldn't treat both types of files the same way.