Solved

How to Enable Allow previously unused ActiveX controls to run without prompt via Group Policy

Posted on 2008-10-29
5
6,806 Views
Last Modified: 2012-08-13
Hi,
I have been looking and looking and looking for this setting within GPM and I cannot seem to find it anywhere.  I am starting to wondering if I need to update the GPM somehow in order to get this option.

I would like to "Enable" the IE 7 Internet Zone security setting for "Allow previously unused ActiveX controls to run without prompt" via Group Policies.

I am running Windows Server 2003 R2 32-bit Standard Edition with GPM v.1.0.2

Is there a newer version than this and if so, where can I find it?

Client side is Windows XP Pro 32-bit with SP2 & SP3.

Thanks for all your help.

Bob
0
Comment
Question by:rsnellman
  • 3
5 Comments
 
LVL 19

Expert Comment

by:MrLonandB
ID: 22835466
0
 

Author Comment

by:rsnellman
ID: 22835646
MrLonandB,
Thanks for the link, but I already tried that and it still didn't help.  I am looking for the specific setting called "Allow previously unused ActiveX controls to run without prompt" within IE 7 Settings.

It can be found by going to IE 7 - Internet Properties - Security Tab - Custom Level (within Internet Zone) - ActiveX controls and plug-ins.

This setting is not available within IE 6, only IE 7.

Thanks for trying.

Anyone else?
0
 

Author Comment

by:rsnellman
ID: 22925025
Does anybody else know why I cannot find the previously mentioned setting for IE 7 browser in the GPM?

Bob
0
 

Accepted Solution

by:
rsnellman earned 0 total points
ID: 23467611
This setting has to be done with a registry setting and pused from GP.
0
 
LVL 4

Expert Comment

by:dmccurdy51
ID: 27052801
This is the Group Policy Object.

Turn Off First-Run Opt-IN
0

Featured Post

Netscaler Common Configuration How To guides

If you use NetScaler you will want to see these guides. The NetScaler How To Guides show administrators how to get NetScaler up and configured by providing instructions for common scenarios and some not so common ones.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

The new Gmail Phishing Scam going around is surprising even the savviest of users with its sophisticated techniques.
One of the biggest threats facing all high-value targets are APT's.  These threats include sophisticated tactics that "often starts with mapping human organization and collecting intelligence on employees, who are nowadays a weaker link than network…
This tutorial will walk an individual through the process of transferring the five major, necessary Active Directory Roles, commonly referred to as the FSMO roles to another domain controller. Log onto the new domain controller with a user account t…
This Micro Tutorial hows how you can integrate  Mac OSX to a Windows Active Directory Domain. Apple has made it easy to allow users to bind their macs to a windows domain with relative ease. The following video show how to bind OSX Mavericks to …

776 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question