Group Policy for Microsoft Office 2010

Microsoft recently release version 2 of the Group Policy for Microsoft Office 2010.

Brief Description
How to use Group Policy to deploy and configure an installation of Microsoft Office 2010.

Overview
This book contains information about how to use Group Policy to deploy and configure an installation of Microsoft Office 2010. The audience for this book includes IT generalists, IT operations, help desk and deployment staff, IT messaging administrators, consultants, and other IT professionals.

I find Chapter IV particularly interesting. Here’s an excerpt from the Table of Contents:

IV. PLAN FOR OUTLOOK 2010 BY USING GROUP POLICY
Determine which features to enable or customize in Outlook 2010    146
AutoArchive    147
Contact Cards    148
Contact Card    149
Contact tab    149
Conversation view    153
Global Address List synchronization    154
Contact corrections that Outlook makes during GAL synchronization    154
Configuring GAL synchronization    155
Internet Calendars    157
Instant Search    158
Navigation Pane    159
Outlook Social Connector    162
Search Folders    164
SharePoint Server Colleague add-in    166
Plan an Exchange deployment in Outlook 2010    169
Overview    169
Choosing between Cached Exchange Mode and Online Mode    170
When to use Cached Exchange Mode    170
When to use Online Mode    170
Special considerations    171
How Cached Exchange Mode can help improve the Outlook user experience    172
Outlook features that can reduce the effectiveness of Cached Exchange Mode    173
Synchronization, disk space, and performance considerations    174
Manual synchronization of Exchange accounts no longer necessary    174
Offline Address Book access advantages    175
Offline folder (.ost file) recommendations    175
Managing performance issues    176
Managing Outlook folder sharing    176
Public Folder Favorites considerations    177
Managing Outlook behavior for perceived slow connections    177
Options for staging a Cached Exchange Mode deployment    178
Upgrading current Cached Exchange Mode users to Outlook 2010    180
Deploying Cached Exchange Mode to users who already have .ost files    181
Configuring Cached Exchange Mode    181
Additional resources    183
Plan for compliance and archiving in Outlook 2010    184
Planning a Retention Policy deployment    184
Defining your Retention Policies    185
Determining which types of policies to create    185
Personal Tags    186
Distribution lists    187
Retention policy warm up period and training    187
Educating users about Retention Policy    188
Users under legal hold or investigation    189
Recover Deleted Items    189
Copy on Write    189
Using Retention Hold    190
Using Litigation Hold    190
Planning a Personal Archive deployment    190
Determining your archive policies    191
Educating users about the Personal Archive    191
Outlook data files (.pst) in your organization    191
Choose security and protection settings for Outlook 2010    195
Overview    195
Specify how security settings are enforced in Outlook    196
Customize security settings by using Group Policy    196
Special environments    197
How administrator settings and user settings interact in Outlook 2010    198
Working with Outlook COM add-ins    198
Customize ActiveX and custom forms security in Outlook 2010    199
Customize how ActiveX controls behave in one-off forms    199
Customize custom forms security settings    200
Customize programmatic settings in Outlook 2010    201
Additional settings    202
Plan attachment settings in Outlook 2010    203
Overview    203
Add or remove Level 1 file name extensions    204
Add or remove Level 2 file name extensions    204
Configure additional attachment file restrictions    205
Plan for e-mail messaging cryptography in Outlook 2010    207
About Cryptographic messaging features in Outlook 2010    207
How Outlook 2010 implements cryptographic messaging    208
Digital IDs: A combination of public/private keys and certificates    208
Managing cryptographic digital IDs    209
Places to store digital IDs    209
Providing digital IDs to other users    209
Importing digital IDs    210
Renewing keys and certificates    210
Security labels and signed receipts    210
Configuring Outlook 2010 cryptographic settings    211
Configuring additional cryptography settings    216
Security policy settings for general cryptography    216
Plan for limiting junk e-mail in Outlook 2010    217
Overview    217
Supported account types    218
Support in Exchange Server    218
Configuring the Junk E-mail Filter user interface    219
Deploying default Junk E-mail Filter lists    220
Configuring Automatic picture download    221

About The Author

Leave a Comment

Your email address will not be published. Required fields are marked *

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

Scroll to Top