Tech
News
Videos
Forums
Jobs
Books
Events
More
Interviews
Live
Learn
Training
Career
Members
Blogs
Challenges
Certification
Contribute
Article
Blog
Video
Ebook
Interview Question
.NET
.NET Core
.NET MAUI
.NET Standard
Active Directory
ADO.NET
Agile Development
AI
AJAX
AlbertAGPT
Alchemy
Alexa Skills
Algorand
Algorithms in C#
Android
Angular
ArcObject
ASP.NET
ASP.NET Core
Augmented Reality
Avalanche
AWS
Azure
Backbonejs
Big Data
BizTalk Server
Blazor
Blockchain
Bootstrap
Bot Framework
Business
Business Intelligence(BI)
C#
C# Corner
C# Strings
C, C++, MFC
Career Advice
Careers and Jobs
Chapters
ChatGPT
Cloud
Coding Best Practices
Cognitive Services
COM Interop
Compact Framework
Copilot
Cortana Development
Cosmos DB
Cryptocurrency
Cryptography
Crystal Reports
CSS
Current Affairs
Custom Controls
Cyber Security
Data Mining
Data Science
Databases & DBA
Databricks
Design Patterns & Practices
DevExpress
DevOps
DirectX
Dynamics CRM
Enterprise Development
Entity Framework
Error Zone
Exception Handling
F#
Files, Directory, IO
Flutter
Games Programming
GDI+
General
Generative AI
GO
Google Cloud
Google Development
Graphics Design
Graphite Studio
Hardware
Hiring and Recruitment
HoloLens
How do I
HTML 5
Infragistics
Internet & Web
Internet of Things
Ionic
Java
Java and .NET
JavaScript
JQuery
JSON
JSP
Knockout
Kotlin
Langchain
Leadership
Learn .NET
Learn iOS Programming
LINQ
Machine Learning
Metaverse
Microsoft 365
Microsoft Fabric
Microsoft Office
Microsoft Phone
Microsoft Teams
Mobile Development
MongoDB
MuleSoft
MySQL
NEAR
NetBeans
Networking
NFT
NoCode LowCode
Node.js
Office Development
OOP/OOD
Open Source
Operating Systems
Oracle
Outsourcing
Philosophy
PHP
Polygon
PostgreSQL
Power Apps
Power Automate
Power BI
Power Pages
Printing in C#
Products
Progress
Progressive Web Apps
Project Management
Public Speaking
Python
Q#
QlikView
Quantum Computing
R
React
React Native
Reports using C#
Robotics & Hardware
RPA
Ruby on Rails
RUST
Salesforce
Security
Servers
ServiceNow
SharePoint
Sharp Economy
SignalR
Smart Devices
Snowflake
Software Architecture/Engineering
Software Testing
Solana
Solidity
Sports
SQL
SQL Server
Startups
Stratis Blockchain
Swift
SyncFusion
Threading
Tools
TypeScript
Unity
UWP
Visual Basic .NET
Visual Studio
Vue.js
WCF
Wearables
Web API
Web Design
Web Development
Web3
Windows
Windows Controls
Windows Forms
Windows PowerShell
Windows Services
Workflow Foundation
WPF
Xamarin
XAML
XML
XNA
XSharp
Register
Login
1
Answer
Word and Excell and PPt Com Setting Issue in 2007 Server(office 2007)
Karthik
14y
2.2k
1
Reply
Hi,
I have Face Com Setting Issue ..i Have Solved Issue following Steps....but client Side is getting issue Some Time ...wt solution to solve this problem compleat solution any exe is there for this problem
If the computer belongs to a workgroup instead of a domain, make sure that it does not use simple file sharing. Open
Windows Explorer
or double click
My Computer
, click
Tools
, then go to
Folder Options
, click
View
and uncheck
Use simple file sharing (Recommended)
in
Advanced settings
.
Click
Start
, click
Programs
, click
Administrative Tools
, click
Component Services
.
Expand
Component Services
, expand
Computers
, and right-click
My Computer
. Select
Properties
.
Click
Default Properties
. Select
Enable Distributed COM on this computer
. Set the
Default Authentication Level
to
Connect
(
None
also works). Set the
Default Impersonation Level
to
Identify
(
Impersonate
also works).
Here are the rules regarding
Authentication Level
for J-Integra® applications:
The Authentication Level doesn't matter if you are running in native mode.
The machine hosting the COM client/server application must be set to
Connect
or
None
level authentication, as this is all that J-Integra® supports. It doesn't matter what the Authentication Level is on the machine running J-Integra®.
For COM-accessing-Java applications, the Authentication Level on the COM client machine must be set to
Connect
or
None
.
For Java-accessing-COM applications, the Authentication Level on the COM server machine must be set to
Connect
or
None
.
Click
Default COM Security
.
Under
Default Access Permissions
click
Edit Default
. Add
SYSTEM
,
INTERACTIVE
, and
NETWORK
. The user whose authentication credentials will be used to access the COM application must also be included in this list. There are many ways to do this. You can add the specific user or simply add a group the user belongs to. Possible values include:
Domain\Username
(A specific user)
Domain\Administrators
(All administrators on a specific domain)
Everyone
(All users)
Under
Default Launch Permissions
click
Edit Default
. Make sure the
Default Launch Permissions
have the same values as the
Default Access Permissions
.
Click
Default Protocols
. Make sure
Connection-oriented TCP/IP
is listed first.
You must now configure the COM application you wish to access. Expand
Component Services
, expand
Computers
, expand
My Computer
, and click
DCOM Config
. Right-click on the application you wish to configure. Select
Properties
. If your COM application is a DLL, you must first create a surrogate EXE for it using the
SetDllHost tool
. Once a surrogate EXE is created, the surrogate name will appear in the list of applications. Select
Properties
for the surrogate and continue on.
Click
General
. Set the
Authentication Level
to
Default
.
Click
Location
. Select
Run application on this computer
.
Click
Security
. Set
Launch Permissions
to
Use Default
. Set
Access Permissions
to
Use Default
. Set
Configuration Permissions
to
Use Default
.
Click
Identity
. Select
The launching user
. This setting specifies the account that will be used to run the COM application once it is launched by a client program.
The launching user
is the user account of the client process that launched the server, and is the recommended setting. Depending on the COM application you want to connect to, you may need to change this to:
The interactive user
- The user that is currently logged on to the machine hosting the COM application (use this if you are going to access MS Excel and make it visible).
This user
- Specify a user account that will always be used to run the COM application regardless of which user is accessing it.
For more information on
"How To Configure Office Applications to Run Under the Interactive User Account"
(which includes information on using Terminal Services), please see the
References
section at the bottom of this page.
Click
Endpoints
. Select
default system protocols
.
If you still get an "access denied" or "permission denied" error after configuring your DCOM settings, try rebooting your machine to allow the new settings to take effect.
Thanks And Regards
KARTHIK
Post
Reset
Cancel
Answers (
1
)
Next Recommended Forum
how to browse folder placed at a remote pc
How do i covert a List colletion to XML?