![]() ![]() ![]() ![]() Proton gathers data both on the installed ActiveX components on all systems in the enterprise and correlates the usage activity of web applications that load any given ActiveX control. Gathering ActiveX data at the enterprise levelīrowsium Proton was designed to provide a true enterprise-level solution for managing ActiveX in the organization, regardless of size. Knowing which ActiveX controls are required is undoubtedly helpful but leaving unneeded ActiveX controls installed presents a security vulnerability. In addition to the scale issues, Process Explorer only offers half of the answers IT administrators need to effectively manage ActiveX in the organization and enable a smooth transition to Edge IE Mode. Organizations with even only a handful of applications find Process Explorer unhelpful at a simple scale. While that works well as a ‘one-off’ solution, it requires more than a dozen steps to identify the ActiveX components being loaded, and it’s an impractical approach for an enterprise-level problem. Tools like Process Explorer were designed as troubleshooting resources for IT administrators to drill into a specific application case and identify the detailed system resources are being accessed in that single situation. It’s equally important to identify which installed ActiveX components aren’t needed and can be safely removed, helping to reduce attack surface and avoid unnecessary patching/update cycles. Knowing which applications require ActiveX control is critical to rationalizing and securing the system. A compromised ActiveX component can make the entire user system vulnerable. ![]() ActiveX represents a security threat and operations challenge because it is installed and has system access. The modern web uses flexible, load-on-demand extensions that don’t require administrative privilege. One of the complexities of ActiveX centers around the fact they are installed binary components. It is essential to understand which ActiveX controls are in use as those organizations look to adequately use Edge IE Mode after the Internet Explorer end of life date.ĪctiveX use must be tracked and controlled Many organizations still rely on legacy applications built using ActiveX technology. ![]()
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. Archives
January 2023
Categories |