Connect with us

Hi, what are you looking for?

SecurityWeekSecurityWeek

Endpoint Security

Microsoft Announces Public Preview of Application Guard for Office

Microsoft informed administrators on Monday that Application Guard for Office, a feature designed to protect users against malicious documents, is now available in public preview.

Microsoft informed administrators on Monday that Application Guard for Office, a feature designed to protect users against malicious documents, is now available in public preview.

Application Guard for Office (its full name is Microsoft Defender Application Guard for Office) has been available in private preview. The feature, which is currently disabled by default, is available to customers who have a 365 E5 or 365 E5 Security license.

Application Guard for Office prevents untrusted files from accessing trusted resources by running potentially unsafe Office files in a secure container isolated through hardware-based virtualization.

“When Office opens files in Application Guard, users can securely read, edit, print, and save those files without having to re-open files outside the container,” explained Eric Wayne, a senior Office deployment engineer at Microsoft.

Microsoft has provided detailed instructions for enabling Application Guard for Office. The company pointed out that when the feature is enabled, users will be informed both in the Office splash screen when they open an untrusted file, and while they are working with the opened file.

Microsoft Application Guard for Office

Microsoft is also offering Windows Defender Application Guard for its Edge and Internet Explorer web browsers, which is designed to provide protection against malicious files downloaded from the internet.

Related: Microsoft Brings Safe Documents, Application Guard to More 365 ProPlus Users

Related: Microsoft Makes Automated Incident Response in Office 365 ATP Available

Advertisement. Scroll to continue reading.

Related: Microsoft Adds New Security Features to Office 365

Related: Researcher Details Sophisticated macOS Attack via Office Document Macros

Written By

Eduard Kovacs (@EduardKovacs) is a managing editor at SecurityWeek. He worked as a high school IT teacher for two years before starting a career in journalism as Softpedia’s security news reporter. Eduard holds a bachelor’s degree in industrial informatics and a master’s degree in computer techniques applied in electrical engineering.

Click to comment

Trending

Daily Briefing Newsletter

Subscribe to the SecurityWeek Email Briefing to stay informed on the latest threats, trends, and technology, along with insightful columns from industry experts.

Join the session as we discuss the challenges and best practices for cybersecurity leaders managing cloud identities.

Register

SecurityWeek’s Ransomware Resilience and Recovery Summit helps businesses to plan, prepare, and recover from a ransomware incident.

Register

Expert Insights

Related Content

Endpoint Security

Today, on January 10, 2023, Windows 7 Extended Security Updates (ESU) and Windows 8.1 have reached their end of support dates.

Application Security

Virtualization technology giant VMware on Tuesday shipped urgent updates to fix a trio of security problems in multiple software products, including a virtual machine...

Endpoint Security

Gigabyte has announced BIOS updates that remove a recently identified backdoor feature in hundreds of its motherboards.

Endpoint Security

Several major companies have published advisories in response to the Downfall vulnerability affecting Intel CPUs.

Application Security

Microsoft on Tuesday pushed a major Windows update to address a security feature bypass already exploited in global ransomware attacks.The operating system update, released...

Endpoint Security

The Zero Day Dilemma

CISO Strategy

Varied viewpoints as related security concepts take on similar traits create substantial confusion among security teams trying to evaluate and purchase security technologies.

Endpoint Security

When establishing visibility and security controls across endpoints, security professionals need to understand that each endpoint bears some or all responsibility for its own...