Microsoft Office 2010 and Microsoft Sharepoint 2010 was released on May 12, 2010. (Sidenote, my birthday so I'm kinda honored. XD) In this post, I'll focus more on Microsoft Office 2010 since Sharepoint 2010 is for the corporate environment.
So, what's new in Office 2010? For one, there's actually 2 editions of Office 2010. There's the 32-bit version and the 64-bit version available. 32-bit versions are meant for normal usage, while 64-bit versions allow expert Microsoft Excel users to crunch Excel spreadsheets that are larger than 2GB. If you possess a 64-bit computer, it doesn't mean that you have to install the 64-bit edition of Microsoft Office 2010. You can still install the 32-bit edition if you're using Office 2010 for normal work purposes.
There are also new security features in Office 2010 to protect end users from the evolving IT threats that are present in the IT world. Microsoft Office 2010 takes a four layer approach in protecting end users:
Hardening the attack surface
This defensive layer helps harden the attack surface of Office 2010 applications by using a countermeasure known as Data Execution Prevention (DEP). DEP helps prevent buffer overflow exploits by identifying files that attempt to run code from a part of memory reserved only for data. By default, DEP is enabled in Office 2010. You can manage DEP settings in the Trust Center or through Group Policy settings.
Reducing the attack surface
This defensive layer helps reduce the attack surface of Office 2010 applications by limiting the kinds of files that applications can open and by preventing applications from running certain kinds of code that is embedded in files. To do this, Office applications use the following three countermeasures:
-Office File Validation This software component scans files for format differences and based on the implemented setting can prevent a file from being opened for editing if the format is not valid. A file that contains a file format exploit against an Office 2010 application is one example of a file that is not valid. By default, Office File Validation is enabled and is primarily managed through Group Policy settings.
-File block settings Introduced in the 2007 Microsoft Office system to reduce the attack surface, these settings enable you to prevent applications from opening and saving certain file types. In addition, you can specify what will occur if you allow a file type to be opened. For example, you can specify whether a file type is opened in Protected View and whether editing is allowed. Several new file block settings have been added in Office 2010. You can manage file block settings in the Trust Center and through Group Policy settings.
-Office ActiveX kill bit This new Office 2010 feature enables you to prevent specific ActiveX controls from running in Office 2010 applications without affecting how those controls run in Microsoft Internet Explorer. By default, Office ActiveX kill bit is not configured. However, you can configure this countermeasure by modifying the registry.
Mitigating exploits
This defensive layer helps mitigate exploits by opening potentially harmful files in an isolated sandbox environment. This sandbox environment, known as Protected View, enables users to preview files before they open them for editing in an application. By default, Protected View is enabled. However, you can turn it off and manage it in the Trust Center and through Group Policy settings.
Improving the user experience
This defensive layer mitigates exploits by reducing the number of security decisions users make and by improving the way users make security decisions. For example, documents that are considered untrustworthy are automatically opened in Protected View without any user feedback. Users can read and close these documents without making any security decisions, which in most cases means that they can effectively finish their work without being confronted with security prompts. If a user wants to edit a document that is in Protected View they can select the option to allow editing. Once editing is allowed, the document will not be opened in Protected View again. If the document contains active content, such as ActiveX controls and macros, a Message Bar appears that prompts the user whether to enable the active content. Once active content is enabled, the user will not be prompted again with the Message Bar for active content. You can configure Message Bar settings and Trusted Documents settings in the Trust Center and through Group Policy settings.
Remember the notorious Office logo located at the top left hand corner in 2007? It is now replaced by the traditional File, Edit... tabs and what's more, you can now customize a new feature called the Ribbon. The ribbon is at the top of the work area in the Office applications, which provides a consistent appearance and behavior. Tabs organize commands in logical groups. Along with the main tabs, which are always present on the screen, the ribbon provides contextual tabs that appear when you are working on a particular object (for example, a table, chart, or image). The contextual tabs provide the appropriate tools at the appropriate time for a particular object.
So, here's my little article on Microsoft Office 2010. I hope it helped! |