Solved

How to allow ActiveX control to install via a Group Policy.

Posted on 2006-07-12
5
36,590 Views
Last Modified: 2010-05-18
I'm trying to figure out how to allow a specific ActiveX control to automatically install on a user's computer.  Currently, a user goes to the web page and it prompts them to install a file (activex.cab).  The users only have the button to click OK.  If the user then goes into IE and changes to prompt for unsigned ActiveX controls the user can then go to the site again and get the same prompt for the activex.cab file but with a button to install.  The user can then install it and be on their way.

How can I create a group policy to automatically install the ActiveX component without requiring any user intervention?

Thanks.
0
Comment
Question by:tidewaterskanska
5 Comments
 
LVL 13

Expert Comment

by:prashsax
Comment Utility
Open IE.

Tools->Internet Options->Security.

Make sure Internet Icon is selected.

Click Custom Level, now choose all the radio buttons for ActiveX control download on your machine.
0
 
LVL 11

Expert Comment

by:knoxzoo
Comment Utility
Run gpedit.msc.
Go to User Configuration, Administrative Templates, Internet Explorer
0
 
LVL 5

Accepted Solution

by:
Davidshc76 earned 500 total points
Comment Utility
Computer Configuration and User Configuration, in the Administrative Templates\Windows Components\Internet Explorer\Internet Control Panel\Security Page\Local Machine Zone


1. Download Signed ActiveX Controls                          Enable (Don't select Prompt)
2. Download UnSigned ActiveX Controls                      Enable

Reference :- www.quantrimang.com/download/ebooks/mangxpsp2.doc

automatically install the ActiveX component without requiring any user intervention if both enable....
0

Featured Post

Find Ransomware Secrets With All-Source Analysis

Ransomware has become a major concern for organizations; its prevalence has grown due to past successes achieved by threat actors. While each ransomware variant is different, we’ve seen some common tactics and trends used among the authors of the malware.

Join & Write a Comment

SHARE your personal details only on a NEED to basis. Take CHARGE and SECURE your IDENTITY. How do I then PROTECT myself and stay in charge of my own Personal details (and) - MY own WAY...
Big data transfers via information superhighways require special attention and protection. Learn more about the IT-regulations of the country where your server is located. Analyze cloud providers and their encryption systems for safe data transit. S…
Sending a Secure fax is easy with eFax Corporate (http://www.enterprise.efax.com). First, Just open a new email message.  In the To field, type your recipient's fax number @efaxsend.com. You can even send a secure international fax — just include t…
Access reports are powerful and flexible. Learn how to create a query and then a grouped report using the wizard. Modify the report design after the wizard is done to make it look better. There will be another video to explain how to put the final p…

771 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question

Need Help in Real-Time?

Connect with top rated Experts

16 Experts available now in Live!

Get 1:1 Help Now