Microsoft recently release version 2 of the Group Policy for Microsoft Office 2010.
Brief Description
How to use Group Policy to deploy and configure an installation of Microsoft Office 2010.
Overview
This book contains information about how to use Group Policy to deploy and configure an installation of Microsoft Office 2010. The audience for this book includes IT generalists, IT operations, help desk and deployment staff, IT messaging administrators, consultants, and other IT professionals.
I find Chapter IV particularly interesting. Here’s an excerpt from the Table of Contents:
IV. PLAN FOR OUTLOOK 2010 BY USING GROUP POLICY
Determine which features to enable or customize in Outlook 2010 146
AutoArchive 147
Contact Cards 148
Contact Card 149
Contact tab 149
Conversation view 153
Global Address List synchronization 154
Contact corrections that Outlook makes during GAL synchronization 154
Configuring GAL synchronization 155
Internet Calendars 157
Instant Search 158
Navigation Pane 159
Outlook Social Connector 162
Search Folders 164
SharePoint Server Colleague add-in 166
Plan an Exchange deployment in Outlook 2010 169
Overview 169
Choosing between Cached Exchange Mode and Online Mode 170
When to use Cached Exchange Mode 170
When to use Online Mode 170
Special considerations 171
How Cached Exchange Mode can help improve the Outlook user experience 172
Outlook features that can reduce the effectiveness of Cached Exchange Mode 173
Synchronization, disk space, and performance considerations 174
Manual synchronization of Exchange accounts no longer necessary 174
Offline Address Book access advantages 175
Offline folder (.ost file) recommendations 175
Managing performance issues 176
Managing Outlook folder sharing 176
Public Folder Favorites considerations 177
Managing Outlook behavior for perceived slow connections 177
Options for staging a Cached Exchange Mode deployment 178
Upgrading current Cached Exchange Mode users to Outlook 2010 180
Deploying Cached Exchange Mode to users who already have .ost files 181
Configuring Cached Exchange Mode 181
Additional resources 183
Plan for compliance and archiving in Outlook 2010 184
Planning a Retention Policy deployment 184
Defining your Retention Policies 185
Determining which types of policies to create 185
Personal Tags 186
Distribution lists 187
Retention policy warm up period and training 187
Educating users about Retention Policy 188
Users under legal hold or investigation 189
Recover Deleted Items 189
Copy on Write 189
Using Retention Hold 190
Using Litigation Hold 190
Planning a Personal Archive deployment 190
Determining your archive policies 191
Educating users about the Personal Archive 191
Outlook data files (.pst) in your organization 191
Choose security and protection settings for Outlook 2010 195
Overview 195
Specify how security settings are enforced in Outlook 196
Customize security settings by using Group Policy 196
Special environments 197
How administrator settings and user settings interact in Outlook 2010 198
Working with Outlook COM add-ins 198
Customize ActiveX and custom forms security in Outlook 2010 199
Customize how ActiveX controls behave in one-off forms 199
Customize custom forms security settings 200
Customize programmatic settings in Outlook 2010 201
Additional settings 202
Plan attachment settings in Outlook 2010 203
Overview 203
Add or remove Level 1 file name extensions 204
Add or remove Level 2 file name extensions 204
Configure additional attachment file restrictions 205
Plan for e-mail messaging cryptography in Outlook 2010 207
About Cryptographic messaging features in Outlook 2010 207
How Outlook 2010 implements cryptographic messaging 208
Digital IDs: A combination of public/private keys and certificates 208
Managing cryptographic digital IDs 209
Places to store digital IDs 209
Providing digital IDs to other users 209
Importing digital IDs 210
Renewing keys and certificates 210
Security labels and signed receipts 210
Configuring Outlook 2010 cryptographic settings 211
Configuring additional cryptography settings 216
Security policy settings for general cryptography 216
Plan for limiting junk e-mail in Outlook 2010 217
Overview 217
Supported account types 218
Support in Exchange Server 218
Configuring the Junk E-mail Filter user interface 219
Deploying default Junk E-mail Filter lists 220
Configuring Automatic picture download 221