SlideShare a Scribd company logo
Applying Protection
           Presented by:
           Eileen Shifflett
         Senior Consultant
  Corporate CFO Services, LLC
   eshifflett@corporatecfo.com
Protect Workbook
O Go to “Review” ribbon
O Choosing “protect workbook” merely…
  O Prohibits others from
    adding/deleting/moving worksheets
  O Does NOT prohibit others from changing
    individual cells (formulas and/or formatting)
Protect Worksheet
O Go to “Review” ribbon
O Choosing “protect worksheet” protects
 individual worksheet cells
  O User can choose from list to allow others to
    edit the worksheet for items such as:
    O Format cells
    O Insert/delete rows and columns
    O Add/edit hyperlinks
What if…
O Part of the worksheet needs to be
 accessible to the user and another section
 needs to be protected from the user…
How to…
O Choose cells you want user to have the ability
  to access
O Go to “review” ribbon
O Choose “allow users to edit ranges”
O Click “new” to set the range you want user to
  have access to
  O The “refers to cells” field will be populated with
     the range you pre-selected (but it can be edited
     if necessary or if you didn’t pre-select a range)
O Click “ok” and in the dialog box choose
  “protect sheet” to activate the protection
Contact Information
O Interested in half or full-day in-house
  training?
  O Call Corporate CFO at (240) 342-2221
O Ideas for other tips or problems with
  current spreadsheets
  O E-mail me at: eshifflett@corporatecfo.com

More Related Content

Similar to Protection

Oracle bi ee 12c home page,acting for other users,obiee 12c global header
Oracle bi ee 12c home page,acting for other users,obiee 12c  global headerOracle bi ee 12c home page,acting for other users,obiee 12c  global header
Oracle bi ee 12c home page,acting for other users,obiee 12c global header
onlinetrainingplacements
 
Oracle General ledger ivas
Oracle General ledger ivasOracle General ledger ivas
Oracle General ledger ivas
Ali Ibrahim
 
ALMA ANALYTICS internal training document IRAM - University of Western Australia
ALMA ANALYTICS internal training document IRAM - University of Western AustraliaALMA ANALYTICS internal training document IRAM - University of Western Australia
ALMA ANALYTICS internal training document IRAM - University of Western Australia
Nina Vesnić
 
Using my folio-guide
Using my folio-guideUsing my folio-guide
Using my folio-guideTim Noteboom
 
Ex13 lesson02
Ex13 lesson02Ex13 lesson02
Ex13 lesson02
sadejoseph
 
Excel review and view tab
Excel review and view tabExcel review and view tab
Excel review and view tab
abhijeet choudhary
 
Advexcellp
AdvexcellpAdvexcellp
User interface introduction openbravo
User interface introduction   openbravoUser interface introduction   openbravo
User interface introduction openbravo
Abul Khayer
 
Adv excel® 2013
Adv excel® 2013Adv excel® 2013
Adv excel® 2013Raghu nath
 
week 1.docx
week 1.docxweek 1.docx
week 1.docx
rom barcia
 

Similar to Protection (19)

Oracle bi ee 12c home page,acting for other users,obiee 12c global header
Oracle bi ee 12c home page,acting for other users,obiee 12c  global headerOracle bi ee 12c home page,acting for other users,obiee 12c  global header
Oracle bi ee 12c home page,acting for other users,obiee 12c global header
 
Oracle General ledger ivas
Oracle General ledger ivasOracle General ledger ivas
Oracle General ledger ivas
 
ALMA ANALYTICS internal training document IRAM - University of Western Australia
ALMA ANALYTICS internal training document IRAM - University of Western AustraliaALMA ANALYTICS internal training document IRAM - University of Western Australia
ALMA ANALYTICS internal training document IRAM - University of Western Australia
 
Using my folio-guide
Using my folio-guideUsing my folio-guide
Using my folio-guide
 
Ex13 lesson02
Ex13 lesson02Ex13 lesson02
Ex13 lesson02
 
Excel 2010 tutorial
Excel 2010 tutorialExcel 2010 tutorial
Excel 2010 tutorial
 
Manual de microsoft excel 2010
Manual de microsoft excel 2010Manual de microsoft excel 2010
Manual de microsoft excel 2010
 
Manual de microsoft excel 2010
Manual de microsoft excel 2010Manual de microsoft excel 2010
Manual de microsoft excel 2010
 
Excel review and view tab
Excel review and view tabExcel review and view tab
Excel review and view tab
 
Excel 2013
Excel 2013Excel 2013
Excel 2013
 
Microsoft Excel 2010 - Fast Course v2
Microsoft Excel 2010 - Fast Course v2Microsoft Excel 2010 - Fast Course v2
Microsoft Excel 2010 - Fast Course v2
 
Advexcellp
AdvexcellpAdvexcellp
Advexcellp
 
Pl lab solution
Pl lab solutionPl lab solution
Pl lab solution
 
Remark office OMR
Remark office OMRRemark office OMR
Remark office OMR
 
User interface introduction openbravo
User interface introduction   openbravoUser interface introduction   openbravo
User interface introduction openbravo
 
Adv excel® 2013
Adv excel® 2013Adv excel® 2013
Adv excel® 2013
 
Excel® 2013
Excel® 2013Excel® 2013
Excel® 2013
 
Access5
Access5Access5
Access5
 
week 1.docx
week 1.docxweek 1.docx
week 1.docx
 

Recently uploaded

Introduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - CybersecurityIntroduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - Cybersecurity
mikeeftimakis1
 
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptx
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptxSecstrike : Reverse Engineering & Pwnable tools for CTF.pptx
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptx
nkrafacyberclub
 
Climate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing DaysClimate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing Days
Kari Kakkonen
 
National Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practicesNational Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practices
Quotidiano Piemontese
 
DevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA ConnectDevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA Connect
Kari Kakkonen
 
Epistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI supportEpistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI support
Alan Dix
 
GridMate - End to end testing is a critical piece to ensure quality and avoid...
GridMate - End to end testing is a critical piece to ensure quality and avoid...GridMate - End to end testing is a critical piece to ensure quality and avoid...
GridMate - End to end testing is a critical piece to ensure quality and avoid...
ThomasParaiso2
 
The Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and SalesThe Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and Sales
Laura Byrne
 
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
James Anderson
 
Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !
KatiaHIMEUR1
 
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdfObservability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Paige Cruz
 
20240605 QFM017 Machine Intelligence Reading List May 2024
20240605 QFM017 Machine Intelligence Reading List May 202420240605 QFM017 Machine Intelligence Reading List May 2024
20240605 QFM017 Machine Intelligence Reading List May 2024
Matthew Sinclair
 
GraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge GraphGraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge Graph
Guy Korland
 
Uni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems Copilot event_05062024_C.Vlachos.pdfUni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems S.M.S.A.
 
PCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase TeamPCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase Team
ControlCase
 
Communications Mining Series - Zero to Hero - Session 1
Communications Mining Series - Zero to Hero - Session 1Communications Mining Series - Zero to Hero - Session 1
Communications Mining Series - Zero to Hero - Session 1
DianaGray10
 
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024
GraphSummit Singapore | The Art of the  Possible with Graph - Q2 2024GraphSummit Singapore | The Art of the  Possible with Graph - Q2 2024
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024
Neo4j
 
Pushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 daysPushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 days
Adtran
 
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdfFIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance
 
Removing Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software FuzzingRemoving Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software Fuzzing
Aftab Hussain
 

Recently uploaded (20)

Introduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - CybersecurityIntroduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - Cybersecurity
 
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptx
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptxSecstrike : Reverse Engineering & Pwnable tools for CTF.pptx
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptx
 
Climate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing DaysClimate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing Days
 
National Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practicesNational Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practices
 
DevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA ConnectDevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA Connect
 
Epistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI supportEpistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI support
 
GridMate - End to end testing is a critical piece to ensure quality and avoid...
GridMate - End to end testing is a critical piece to ensure quality and avoid...GridMate - End to end testing is a critical piece to ensure quality and avoid...
GridMate - End to end testing is a critical piece to ensure quality and avoid...
 
The Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and SalesThe Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and Sales
 
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
 
Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !
 
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdfObservability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
 
20240605 QFM017 Machine Intelligence Reading List May 2024
20240605 QFM017 Machine Intelligence Reading List May 202420240605 QFM017 Machine Intelligence Reading List May 2024
20240605 QFM017 Machine Intelligence Reading List May 2024
 
GraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge GraphGraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge Graph
 
Uni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems Copilot event_05062024_C.Vlachos.pdfUni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems Copilot event_05062024_C.Vlachos.pdf
 
PCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase TeamPCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase Team
 
Communications Mining Series - Zero to Hero - Session 1
Communications Mining Series - Zero to Hero - Session 1Communications Mining Series - Zero to Hero - Session 1
Communications Mining Series - Zero to Hero - Session 1
 
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024
GraphSummit Singapore | The Art of the  Possible with Graph - Q2 2024GraphSummit Singapore | The Art of the  Possible with Graph - Q2 2024
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024
 
Pushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 daysPushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 days
 
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdfFIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
 
Removing Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software FuzzingRemoving Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software Fuzzing
 

Protection

  • 1. Applying Protection Presented by: Eileen Shifflett Senior Consultant Corporate CFO Services, LLC eshifflett@corporatecfo.com
  • 2. Protect Workbook O Go to “Review” ribbon O Choosing “protect workbook” merely… O Prohibits others from adding/deleting/moving worksheets O Does NOT prohibit others from changing individual cells (formulas and/or formatting)
  • 3. Protect Worksheet O Go to “Review” ribbon O Choosing “protect worksheet” protects individual worksheet cells O User can choose from list to allow others to edit the worksheet for items such as: O Format cells O Insert/delete rows and columns O Add/edit hyperlinks
  • 4. What if… O Part of the worksheet needs to be accessible to the user and another section needs to be protected from the user…
  • 5. How to… O Choose cells you want user to have the ability to access O Go to “review” ribbon O Choose “allow users to edit ranges” O Click “new” to set the range you want user to have access to O The “refers to cells” field will be populated with the range you pre-selected (but it can be edited if necessary or if you didn’t pre-select a range) O Click “ok” and in the dialog box choose “protect sheet” to activate the protection
  • 6. Contact Information O Interested in half or full-day in-house training? O Call Corporate CFO at (240) 342-2221 O Ideas for other tips or problems with current spreadsheets O E-mail me at: eshifflett@corporatecfo.com