Solved

IE Plugin Issue

Posted on 2016-07-29
4
59 Views
Last Modified: 2016-08-10
Hello Experts - we have a user who has the need to use a secure tunnel to access his customers network, up until recently this was not an issue.  But now for what ever reason he can no longer open a secure tunnel into their systems.  From the troubleshooting I've done the issue seems to be an Active-X Plugin getting blocked.  We have tried to get to that tunnel on various machines connected to our network all had the same end result, no joy. However if we use a local account instead of a domain user account it will launch fine.  I've checked with his customers Engineering team, everything works on their end, we have verified that other users are able to access.  I've spoken with our Engineering team for our company they have requested I collect the GPO logs and send to them for review.  What I did was ran rsop.msc is there a more comprehensive way of collecting these logs?  Or a better method of identifying if this plug-in is in-fact blocked or there is another under lying issue.

Troubleshooting down thus far:
- Reset IE Settings to Default
- Had Customer IT reset / recreate his account
- Updated all Certificates
- Added site to Trusted Site List, Compatibility List
- Tried with both IE 32-Bit / 64-Bit
0
Comment
Question by:ManieyaK_
  • 3
4 Comments
 
LVL 16

Accepted Solution

by:
FOX earned 500 total points
Comment Utility
I want you to go in to internet options click the security tab, go down to custom level, scroll down to active X controls and plugins and start disabling things that have to do with Active X and then try again.
0
 

Author Comment

by:ManieyaK_
Comment Utility
Foxluv - thank you for your speedy response I will try this and post back the results
0
 

Author Comment

by:ManieyaK_
Comment Utility
foxluv we've tried your suggestions no luck, we know are starting to lean towards this being blocked by a GP as this is effecting multiple users at this time.  Thank You for your comment.
0
 

Author Closing Comment

by:ManieyaK_
Comment Utility
Foxluv - Thank You :)
0

Featured Post

What Security Threats Are You Missing?

Enhance your security with threat intelligence from the web. Get trending threat insights on hackers, exploits, and suspicious IP addresses delivered to your inbox with our free Cyber Daily.

Join & Write a Comment

Even if you have implemented a Mobile Device Management solution company wide, it is a good idea to make sure you are taking into account all of the major risks to your electronic protected health information (ePHI).
ADCs have gained traction within the last decade, largely due to increased demand for legacy load balancing appliances to handle more advanced application delivery requirements and improve application performance.
Viewers will learn how to connect to a wireless network using the network security key. They will also learn how to access the IP address and DNS server for connections that must be done manually. After setting up a router, find the network security…
In this tutorial you'll learn about bandwidth monitoring with flows and packet sniffing with our network monitoring solution PRTG Network Monitor (https://www.paessler.com/prtg). If you're interested in additional methods for monitoring bandwidt…

762 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question

Need Help in Real-Time?

Connect with top rated Experts

6 Experts available now in Live!

Get 1:1 Help Now