For more information, see Office Customization Tool (OCT) 2016 Help: Office security settings. For more information, see Tools available to manage policies.įor volume licensed versions of Office 2016, such as Office Professional Plus 2016, you can use the Office Customization Tool (OCT) to configure Trusted Locations. You can use Cloud Policy, the Microsoft Endpoint Manager admin center, or the Group Policy Management Console to configure and deploy policy settings to users in your organization. There are several policies that you can use to manage Trusted Locations in your organization. That is, grant Read permission to those users who don't have to change the files in the Trusted Locations and grant Full Control permission to those users who have to edit files. If a folder is shared, configure sharing permissions so that only authorized users have access to the shared folder.īe sure to use the principle of least privilege and grant permissions that are appropriate to a user. You can use the Trusted Location #1 policy to designate Trusted Locations for your users.ĭetermine folder sharing and folder security settings for Trusted Location foldersĪll folders that you specify as Trusted Locations must be secured to prevent malicious users from adding or modifying files in a Trusted Location. One or more applications can use the same Trusted Location. Instead, create a subfolder within those folders and specify only that folder as a Trusted Location. For example, the C: drive or the My Documents folder. We don't recommend that users specify root folders as Trusted Locations. Network locations can also be set as a Trusted Location, but it's not recommended. For more information, see Add, remove, or change a trusted location.īy default, only Trusted Locations local to the user's device are allowed. Unless blocked by policy, users can create and modify Trusted Locations in the Trust Center for their Office app. Here are some considerations to keep in mind when determining which folders to use as Trusted Locations: Determine the folders to designate as Trusted Locations Policies are also available for Project, but Project doesn't have Trusted Locations settings in the Trust Center. It’s important to choose the scenarios that are best for your organization and its security risk tolerance.
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |