{"id":2524,"date":"2019-03-25T17:39:59","date_gmt":"2019-03-25T20:39:59","guid":{"rendered":"http:\/\/xexeu.elipse.com.br\/pt\/dcom-and-firewall-settings-in-windows-7-for-elipse-applications\/"},"modified":"2025-05-15T11:05:50","modified_gmt":"2025-05-15T14:05:50","slug":"dcom-and-firewall-settings-in-windows-7-for-elipse-applications","status":"publish","type":"post","link":"https:\/\/kb.elipse.com.br\/en\/dcom-and-firewall-settings-in-windows-7-for-elipse-applications\/","title":{"rendered":"DCOM and Firewall Settings in Windows 7 for Elipse applications."},"content":{"rendered":"<div style=\"text-align: justify;\">\n<p><span style=\"font-weight: bold; font-style: italic;\">*For Windows XP\/2003\/Vista\/2008, click <a href=\"https:\/\/kb.elipse.com.br\/en\/dcom-and-firewall-settings-in-windows-xp2003vista2008-for-elipse-applications\/\" target=\"_blank\" rel=\"noopener noreferrer\">here<\/a>*<\/span><br \/>\n<strong><br \/>\n1) Elipse DCOM Wizard<\/strong><\/p>\n<p align=\"justify\">Elipse DCOM Wizard is a wizard to configure DCOM (Distributed Component Object Model) and Windows Firewall to allow remote connections. It displays predefined settings for the main products by Elipse Software, but it can be also used to configure third-party products. <b><span style=\"color: #ff0000;\">By running the wizard, the settings described\u00a0below are applied automatically.<\/span><\/b><\/p>\n<p>Elipse DCOM Wizard <a href=\"https:\/\/www.elipse.com.br\/en\/downloads\/?key=DCOM+Wizard&#038;language=enus\">Download<\/a>.<\/p>\n<p><span style=\"font-weight: bold;\">2) Introduction<\/span><\/p>\n<p><span style=\"font-weight: bold;\">Firewalls <\/span>are barriers interposed between a private network and an external network, in order to prevent attacks or invasions. That is, they are security mechanisms (devices) that protect the company&#8217;s hardware and software from the dangers to which the system is exposed. These security mechanisms are both hardware- and software-based, and follow the security policy established by the company.<\/p>\n<p>Microsoft&#8217;s <span style=\"font-weight: bold;\">COM <\/span>(Component Object Model) is a distributed, platform-independent, object-oriented system for creating binary software components that can interact with each other. <span style=\"font-weight: bold;\">DCOM <\/span>(Distributed Component Object Model) allows applications to be distributed to the most relevant sites for the user and for the application. DCOM connection protocol offers transparent support, for a reliable and efficient communication between COM components. For this reason, this is the protocol used in OPC drivers.<\/p>\n<p>In order to have the Elipse systems functioning properly, you will need to make some adjustments in the settings of Firewall and DCOM, as discussed below. These settings must be performed both in the server and in the client<br \/>\nmachines, regardless of how communication takes place (either between<br \/>\nElipse modules or between OPC client and server).<\/p>\n<p><span style=\"font-weight: bold;\">3) Firewall<\/span><\/p>\n<p>To access the Firewall settings, a shortcut is available in the Control Panel (Fig.1).<\/p>\n<div style=\"text-align: center;\"><img loading=\"lazy\" title=\"\" src=\"http:\/\/kb.elipse.com.br\/pt-br\/images\/ID4162\/Figura1.png\" alt=\"\" width=\"500\" height=\"439\" align=\"bottom\" border=\"0\" \/><br \/>\n<span style=\"font-size: xx-small;\"><span style=\"font-weight: bold;\">Figure 1<\/span> &#8211; Activating the firewall<\/span><\/div>\n<p>If you choose to disable the Firewall, no further action is required to operate the OPC Server or any other feature of Elipse products (notice however that it will still be necessary to follow the instructions contained in the DCOM session). In case you need to activate the firewall, a few other steps must be followed. First, you must allow a few programs to communicate through the firewall in the window <span style=\"font-weight: bold;\">Allow programs to communicate through Windows Firewall<\/span> (Fig. 2).<\/p>\n<div style=\"text-align: center;\"><img loading=\"lazy\" title=\"\" src=\"http:\/\/kb.elipse.com.br\/pt-br\/images\/ID4162\/Figura2.png\" alt=\"\" width=\"500\" height=\"498\" align=\"bottom\" border=\"0\" \/><br \/>\n<span style=\"font-size: xx-small;\"><span style=\"font-weight: bold;\">Figure 2<\/span> &#8211; Allowing communication through the firewall<\/span><\/div>\n<p>Basically, you should add <span style=\"font-family: Courier New;\">E3Server.exe<\/span>, <span style=\"font-family: Courier New;\">E3OPCClient<span style=\"font-family: null;\">,<\/span> E3Run.exe<\/span>, and <span style=\"font-family: Courier New;\">Studio.exe<\/span> for E3, or <span style=\"font-family: Courier New;\">Elipse32.exe<\/span> for Elipse SCADA. For Elipse OPC Drivers, add <span style=\"font-family: Courier New;\">ED_OPC.exe<\/span>. You must also add <span style=\"font-family: Courier New;\">Opcenum.exe<\/span>, found at <span style=\"font-family: Courier New;\">C:Windowssystem32<\/span> (in 32-bit Windows) or <span style=\"font-family: Courier New;\">C:WindowsSysWOW64<\/span> (in 64-bit Windows), which will enable remote connection with OPC clients.<\/p>\n<p>In addition to these programs, you must also create new input rules to allow ports 135 (TCP and UDP) and 445 (TCP), used by DCOM, and 6515 (TCP), responsible for connecting the Viewer to E3Server and Hot-Standby, and for connecting the Studio to a remote E3Server. This can be done by clicking <span style=\"font-weight: bold;\">Advanced Settings<\/span> option on the Firewall homepage (Fig. 3).<\/p>\n<div style=\"text-align: center;\"><img loading=\"lazy\" title=\"\" src=\"http:\/\/kb.elipse.com.br\/pt-br\/images\/ID4162\/Figura3.png\" alt=\"\" width=\"500\" height=\"420\" align=\"bottom\" border=\"0\" \/><br \/>\n<span style=\"font-size: xx-small;\"><span style=\"font-weight: bold;\">Figure 3<\/span> &#8211; Allowing ports <\/span><\/div>\n<p>Once this is done, the application is ready to work with the Firewall.<\/p>\n<p><span style=\"font-weight: bold;\">4) DCOM<\/span><\/p>\n<p>To configure this option from the user interface, the administrator must open the <span style=\"font-weight: bold;\">Component Services Manager<\/span> (<span style=\"font-family: Courier New;\">DCOMCNFG<\/span>) and select <span style=\"font-weight: bold;\">Properties <\/span>from the context menu of the computer being set (Fig. 4).<\/p>\n<div style=\"text-align: center;\"><img loading=\"lazy\" title=\"\" src=\"http:\/\/kb.elipse.com.br\/pt-br\/images\/ID4162\/Figura4.PNG\" alt=\"\" width=\"406\" height=\"214\" align=\"bottom\" border=\"0\" \/><br \/>\n<span style=\"font-size: xx-small;\"><span style=\"font-weight: bold;\">Figure 4<\/span> &#8211; Selecting the computer to be configured<\/span><\/div>\n<p>A dialog box will be displayed (Fig. 5), and security must be configured on <span style=\"font-weight: bold;\">COM Security<\/span> tab.<\/p>\n<div style=\"text-align: center;\"><img loading=\"lazy\" title=\"\" src=\"http:\/\/kb.elipse.com.br\/pt-br\/images\/ID4162\/Figura5.PNG\" alt=\"\" width=\"404\" height=\"473\" align=\"bottom\" border=\"0\" \/><br \/>\n<span style=\"font-size: xx-small;\"><span style=\"font-weight: bold;\">Figure 5<\/span> &#8211; Configuring security<\/span><\/div>\n<p>Click <span style=\"font-weight: bold;\">Edit Limits\u2026<\/span> on <span style=\"font-weight: bold;\">Access Permissions<\/span>, add users <span style=\"font-family: Courier New;\">ANONYMOUS LOGON<\/span>, <span style=\"font-family: Courier New;\">Everyone<\/span>, and <span style=\"font-family: Courier New;\">SYSTEM<\/span>, and check the options <span style=\"font-weight: bold;\">Local Access<\/span> and <span style=\"font-weight: bold;\">Remote Access<\/span> for these users (Fig. 6).<\/p>\n<div style=\"text-align: center;\"><img loading=\"lazy\" title=\"\" src=\"http:\/\/kb.elipse.com.br\/pt-br\/images\/ID4162\/Figura6.PNG\" alt=\"\" width=\"367\" height=\"450\" align=\"bottom\" border=\"0\" \/><br \/>\n<span style=\"font-size: xx-small;\"><span style=\"font-weight: bold;\">Figure 6<\/span> &#8211; Setting access permissions<\/span><\/div>\n<p>Click <span style=\"font-weight: bold;\">Edit Limits\u2026<\/span> on <span style=\"font-weight: bold;\">Launch and Activation Permissions<\/span>, add users <span style=\"font-family: Courier New;\">ANONYMOUS LOGON<\/span> and <span style=\"font-family: Courier New;\">SYSTEM<\/span>, and check the options <span style=\"font-weight: bold;\">Remote Launch<\/span> and <span style=\"font-weight: bold;\">Remote Activation<\/span> for these users. You must also check these options for user <span style=\"font-family: Courier New;\">Everyone <\/span>(Fig. 7).<\/p>\n<div style=\"text-align: center;\"><img loading=\"lazy\" title=\"\" src=\"http:\/\/kb.elipse.com.br\/pt-br\/images\/ID4162\/Figura7.PNG\" alt=\"\" width=\"367\" height=\"450\" align=\"bottom\" border=\"0\" \/><br \/>\n<span style=\"font-size: xx-small;\"><span style=\"font-weight: bold;\">Figure 7<\/span> &#8211; Setting launch permissions<\/span><\/div>\n<p>You must then grant <span style=\"font-weight: bold;\">E3Server<\/span>&#8216;s access, initialization, and remote activation permissions to <span style=\"font-family: Courier New;\">ANONYMOUS LOGON<\/span> user. To do so, right-click E3Server and select <span style=\"font-weight: bold;\">Properties<\/span> on its context menu (Fig. 8).<\/p>\n<div style=\"text-align: center;\"><img loading=\"lazy\" title=\"\" src=\"http:\/\/kb.elipse.com.br\/pt-br\/images\/ID4162\/Figura8.PNG\" alt=\"\" width=\"500\" height=\"490\" align=\"bottom\" border=\"0\" \/><br \/>\n<span style=\"font-size: xx-small;\"><span style=\"font-weight: bold;\">Figure 8 <\/span>&#8211; Selecting E3Server&#8217;s properties<\/span><\/div>\n<p>Select <span style=\"font-weight: bold;\">Security <\/span>tab (Fig. 9).<\/p>\n<div style=\"text-align: center;\"><img loading=\"lazy\" title=\"\" src=\"http:\/\/kb.elipse.com.br\/pt-br\/images\/ID4162\/Figura9.PNG\" alt=\"\" width=\"404\" height=\"455\" align=\"bottom\" border=\"0\" \/><br \/>\n<span style=\"font-size: xx-small;\"><span style=\"font-weight: bold;\">Figure 9<\/span> &#8211; Setting E3Server&#8217;s security<\/span><\/div>\n<p>Click <span style=\"font-weight: bold;\">Edit <\/span>on <span style=\"font-weight: bold;\">Launch and Activation Permissions<\/span>, add user <span style=\"font-family: Courier New;\">ANONYMOUS LOGON<\/span>, and check the options <span style=\"font-weight: bold;\">Remote Launch<\/span> and <span style=\"font-weight: bold;\">Remote Activation<\/span> (Fig. 10).<\/p>\n<div style=\"text-align: center;\"><img loading=\"lazy\" title=\"\" src=\"http:\/\/kb.elipse.com.br\/pt-br\/images\/ID4162\/Figura10.PNG\" alt=\"\" width=\"367\" height=\"450\" align=\"bottom\" border=\"0\" \/><br \/>\n<span style=\"font-size: xx-small;\"><span style=\"font-weight: bold;\">Figure 10<\/span> &#8211; Setting E3Server&#8217;s launch permissions<\/span><\/div>\n<p>Click <span style=\"font-weight: bold;\">Edit <\/span>on <span style=\"font-weight: bold;\">Access Permissions<\/span>, add user <span style=\"font-family: Courier New;\">ANONYMOUS LOGON<\/span>, and check the option <span style=\"font-weight: bold;\">Remote Access<\/span> (Fig. 11).<\/p>\n<div style=\"text-align: center;\"><img loading=\"lazy\" title=\"\" src=\"http:\/\/kb.elipse.com.br\/pt-br\/images\/ID4162\/Figura11.PNG\" alt=\"\" width=\"367\" height=\"450\" align=\"bottom\" border=\"0\" \/><br \/>\n<span style=\"font-size: xx-small;\"><span style=\"font-weight: bold;\">Figure 11<\/span> &#8211; Setting E3Server&#8217;s access permissions<\/span><\/div>\n<p>After that, you must grant <span style=\"font-weight: bold;\">E3Run<\/span>&#8216;s access, initialization, and remote activation permissions to <span style=\"font-family: Courier New;\">ANONYMOUS LOGON<\/span> user. To do so, right-click E3Run and select <span style=\"font-weight: bold;\">Properties<\/span> on its context menu (Fig. 12).<\/p>\n<div style=\"text-align: center;\"><img loading=\"lazy\" title=\"\" src=\"http:\/\/kb.elipse.com.br\/pt-br\/images\/ID4162\/Figura12.png\" alt=\"\" width=\"500\" height=\"322\" align=\"bottom\" border=\"0\" \/><br \/>\n<span style=\"font-size: xx-small;\"><span style=\"font-weight: bold;\">Figure 12 <\/span>&#8211; Selecting E3Run&#8217;s properties<\/span><\/div>\n<p>Select <span style=\"font-weight: bold;\">Security <\/span>tab (Fig. 13).<\/p>\n<div style=\"text-align: center;\"><img loading=\"lazy\" title=\"\" src=\"http:\/\/kb.elipse.com.br\/pt-br\/images\/ID4162\/Figura13.png\" alt=\"\" width=\"404\" height=\"455\" align=\"bottom\" border=\"0\" \/><br \/>\n<span style=\"font-size: xx-small;\"><span style=\"font-weight: bold;\">Figure 13<\/span> &#8211; Setting E3Run&#8217;s security<\/span><\/div>\n<p>Click <span style=\"font-weight: bold;\">Edit <\/span>on <span style=\"font-weight: bold;\">Launch and Activation Permissions<\/span>, add user <span style=\"font-family: Courier New;\">ANONYMOUS LOGON<\/span>, and check the options<span style=\"font-weight: bold;\"> Remote Launch<\/span> and <span style=\"font-weight: bold;\">Remote Activation<\/span> (Fig. 14).<\/p>\n<div style=\"text-align: center;\"><img loading=\"lazy\" title=\"\" src=\"http:\/\/kb.elipse.com.br\/pt-br\/images\/ID4162\/figura14.png\" alt=\"\" width=\"368\" height=\"450\" align=\"bottom\" border=\"0\" \/><br \/>\n<span style=\"font-size: xx-small;\"><span style=\"font-weight: bold;\">Figure 14<\/span> &#8211; Setting E3Run&#8217;s launch permissions<\/span><\/div>\n<p>Click <span style=\"font-weight: bold;\">Edit <\/span>on <span style=\"font-weight: bold;\">Access Permissions<\/span>, add user <span style=\"font-family: Courier New;\">ANONYMOUS LOGON<\/span>, and check the option<span style=\"font-weight: bold;\"> Remote Access<\/span> (Fig. 15).<\/p>\n<div style=\"text-align: center;\"><img loading=\"lazy\" title=\"\" src=\"http:\/\/kb.elipse.com.br\/pt-br\/images\/ID4162\/Figura15.png\" alt=\"\" width=\"369\" height=\"451\" align=\"bottom\" border=\"0\" \/><br \/>\n<span style=\"font-size: xx-small;\"><span style=\"font-weight: bold;\">Figure 15<\/span> &#8211; Setting E3Run&#8217;s access permissions<\/span><\/div>\n<p>Finally, if the application uses OPC, you must also grant <span style=\"font-weight: bold;\">OpcEnum<\/span>&#8216;s access, initialization, and remote activation permissions to <span style=\"font-family: Courier New;\">ANONYMOUS LOGON<\/span> user. To do so, right-click OpcEnum and select <span style=\"font-weight: bold;\">Properties <\/span>on its context menu (Fig. 16).<\/p>\n<div style=\"text-align: center;\"><img loading=\"lazy\" title=\"\" src=\"http:\/\/kb.elipse.com.br\/pt-br\/images\/ID4162\/Figura16.png\" alt=\"\" width=\"500\" height=\"532\" align=\"bottom\" border=\"0\" \/><br \/>\n<span style=\"font-size: xx-small;\"><span style=\"font-weight: bold;\">Figure 16<\/span> &#8211; Selecting OpcEnum&#8217;s properties<\/span><\/div>\n<p>Select <span style=\"font-weight: bold;\">Security <\/span>tab (Fig. 17).<\/p>\n<div style=\"text-align: center;\"><img loading=\"lazy\" title=\"\" src=\"http:\/\/kb.elipse.com.br\/pt-br\/images\/ID4162\/Figura17.png\" alt=\"\" width=\"402\" height=\"454\" align=\"bottom\" border=\"0\" \/><br \/>\n<span style=\"font-size: xx-small;\"><span style=\"font-weight: bold;\">Figure 17<\/span> &#8211; Setting OpcEnum&#8217;s security<\/span><\/div>\n<p>Click <span style=\"font-weight: bold;\">Edit <\/span>on <span style=\"font-weight: bold;\">Launch and Activation Permissions<\/span>, add users <span style=\"font-family: Courier New;\">ANONYMOUS LOGON<\/span> and <span style=\"font-family: Courier New;\">SYSTEM<\/span>, and check the options <span style=\"font-weight: bold;\">Remote Launch<\/span> and <span style=\"font-weight: bold;\">Remote Activation<\/span> (Fig. 18).<\/p>\n<div style=\"text-align: center;\"><img loading=\"lazy\" title=\"\" src=\"http:\/\/kb.elipse.com.br\/pt-br\/images\/ID4162\/Figura18.png\" alt=\"\" width=\"366\" height=\"449\" align=\"bottom\" border=\"0\" \/><br \/>\n<span style=\"font-size: xx-small;\"><span style=\"font-weight: bold;\">Figure 18<\/span> &#8211; Setting OpcEnum&#8217;s launch permissions<\/span><\/div>\n<p>Click <span style=\"font-weight: bold;\">Edit <\/span>on <span style=\"font-weight: bold;\">Access Permissions<\/span>, add users <span style=\"font-family: Courier New;\">ANONYMOUS LOGON<\/span> and <span style=\"font-family: Courier New;\">SYSTEM<\/span>, and check the option <span style=\"font-weight: bold;\">Remote Access<\/span> (Fig. 19).<\/p>\n<div style=\"text-align: center;\">\n<p><img loading=\"lazy\" title=\"\" src=\"http:\/\/kb.elipse.com.br\/pt-br\/images\/ID4162\/Figura19.png\" alt=\"\" width=\"366\" height=\"450\" align=\"bottom\" border=\"0\" \/><br \/>\n<span style=\"font-size: xx-small;\"><span style=\"font-weight: bold;\">Figure 19<\/span> &#8211; Setting E3Run&#8217;s access permissions<\/span><\/p>\n<p>&nbsp;<\/p>\n<div align=\"justify\">For Elipse E3 versions 4.6 or higher, you will also need to grant permissions for accessing, initializing, and remotely activating <b>E3OPCClient <\/b>to ANONYMOUS LOGON user.<\/div>\n<\/div>\n<p><span style=\"font-weight: bold;\"><br \/>\nNOTE<\/span>: It is essential that all computers on the network use the same settings suggested in this article, otherwise they too will refuse the connection to the OPC Server.<\/p>\n<p><b>5) Network<\/b><\/p>\n<p>To establish OPC communication with the<br \/>\nsettings in this article, all the computers involved must be in the same<br \/>\nMicrosoft domain, or at least in Work Groups with necessarily the same<br \/>\nuser and the same password in all computers (the user won&#8217;t necessarily<br \/>\nneed to be logged in, only to have been already created).<\/p>\n<p>All computers in the network must be able to &#8220;spot&#8221; each other <b>by their names<\/b> to exchange information; sharing only the IP or a folder won&#8217;t be enough for establishing OPC communication.<\/p>\n<\/div>\n","protected":false},"excerpt":{"rendered":"<p>*For Windows XP\/2003\/Vista\/2008, click here* 1) Elipse DCOM Wizard Elipse DCOM Wizard is a wizard to configure DCOM (Distributed Component Object Model) and Windows Firewall to allow remote connections. It&hellip;<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_exactmetrics_skip_tracking":false,"_exactmetrics_sitenote_active":false,"_exactmetrics_sitenote_note":"","_exactmetrics_sitenote_category":0},"categories":[737,770,773,756,775,757,824],"tags":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v19.8 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>DCOM and Firewall Settings in Windows 7 for Elipse applications. - Elipse Knowledgebase<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/kb.elipse.com.br\/en\/dcom-and-firewall-settings-in-windows-7-for-elipse-applications\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"DCOM and Firewall Settings in Windows 7 for Elipse applications.\" \/>\n<meta property=\"og:description\" content=\"*For Windows XP\/2003\/Vista\/2008, click here* 1) Elipse DCOM Wizard Elipse DCOM Wizard is a wizard to configure DCOM (Distributed Component Object Model) and Windows Firewall to allow remote connections. It&hellip;\" \/>\n<meta property=\"og:url\" content=\"https:\/\/kb.elipse.com.br\/en\/dcom-and-firewall-settings-in-windows-7-for-elipse-applications\/\" \/>\n<meta property=\"og:site_name\" content=\"Elipse Knowledgebase\" \/>\n<meta property=\"article:publisher\" content=\"http:\/\/www.facebook.com\/elipsesoftware\" \/>\n<meta property=\"article:published_time\" content=\"2019-03-25T20:39:59+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2025-05-15T14:05:50+00:00\" \/>\n<meta property=\"og:image\" content=\"http:\/\/kb.elipse.com.br\/pt-br\/images\/ID4162\/Figura1.png\" \/>\n<meta name=\"author\" content=\"Elipse Software\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Elipse Software\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"10 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/kb.elipse.com.br\/en\/dcom-and-firewall-settings-in-windows-7-for-elipse-applications\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/kb.elipse.com.br\/en\/dcom-and-firewall-settings-in-windows-7-for-elipse-applications\/\"},\"author\":{\"name\":\"Elipse Software\",\"@id\":\"https:\/\/kb.elipse.com.br\/#\/schema\/person\/def69ea453ea60b250497b89225a9f87\"},\"headline\":\"DCOM and Firewall Settings in Windows 7 for Elipse applications.\",\"datePublished\":\"2019-03-25T20:39:59+00:00\",\"dateModified\":\"2025-05-15T14:05:50+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/kb.elipse.com.br\/en\/dcom-and-firewall-settings-in-windows-7-for-elipse-applications\/\"},\"wordCount\":2144,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\/\/kb.elipse.com.br\/#organization\"},\"articleSection\":[\"Domain \/ E3Server \/ HotStandBy\",\"Elipse Scada\",\"OPCServer\",\"OPCServer\",\"Other\",\"Other\",\"Elipse Drivers OPC Altus TCP\/IP\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/kb.elipse.com.br\/en\/dcom-and-firewall-settings-in-windows-7-for-elipse-applications\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/kb.elipse.com.br\/en\/dcom-and-firewall-settings-in-windows-7-for-elipse-applications\/\",\"url\":\"https:\/\/kb.elipse.com.br\/en\/dcom-and-firewall-settings-in-windows-7-for-elipse-applications\/\",\"name\":\"[:pt]DCOM and Firewall Settings in Windows 7 for Elipse applications.[:en]DCOM and Firewall Settings in Windows 7 for Elipse applications.[:] - Elipse Knowledgebase\",\"isPartOf\":{\"@id\":\"https:\/\/kb.elipse.com.br\/#website\"},\"datePublished\":\"2019-03-25T20:39:59+00:00\",\"dateModified\":\"2025-05-15T14:05:50+00:00\",\"breadcrumb\":{\"@id\":\"https:\/\/kb.elipse.com.br\/en\/dcom-and-firewall-settings-in-windows-7-for-elipse-applications\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/kb.elipse.com.br\/en\/dcom-and-firewall-settings-in-windows-7-for-elipse-applications\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/kb.elipse.com.br\/en\/dcom-and-firewall-settings-in-windows-7-for-elipse-applications\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"In\u00edcio\",\"item\":\"https:\/\/kb.elipse.com.br\/en\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"DCOM and Firewall Settings in Windows 7 for Elipse applications.\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/kb.elipse.com.br\/#website\",\"url\":\"https:\/\/kb.elipse.com.br\/\",\"name\":\"Elipse Knowledgebase\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\/\/kb.elipse.com.br\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/kb.elipse.com.br\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/kb.elipse.com.br\/#organization\",\"name\":\"Elipse Software\",\"url\":\"https:\/\/kb.elipse.com.br\/\",\"sameAs\":[\"http:\/\/www.facebook.com\/elipsesoftware\"],\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/kb.elipse.com.br\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/kb.elipse.com.br\/wp-content\/uploads\/2019\/05\/schererelipse-com-br\/logoElipse.png\",\"contentUrl\":\"https:\/\/kb.elipse.com.br\/wp-content\/uploads\/2019\/05\/schererelipse-com-br\/logoElipse.png\",\"width\":161,\"height\":58,\"caption\":\"Elipse Software\"},\"image\":{\"@id\":\"https:\/\/kb.elipse.com.br\/#\/schema\/logo\/image\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\/\/kb.elipse.com.br\/#\/schema\/person\/def69ea453ea60b250497b89225a9f87\",\"name\":\"Elipse Software\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/kb.elipse.com.br\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/ff1f7ec38f4687b06f6851d97b3cd2d0?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/ff1f7ec38f4687b06f6851d97b3cd2d0?s=96&d=mm&r=g\",\"caption\":\"Elipse Software\"},\"url\":\"https:\/\/kb.elipse.com.br\/en\/author\/webmasterelipse-com-br\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"DCOM and Firewall Settings in Windows 7 for Elipse applications. - Elipse Knowledgebase","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/kb.elipse.com.br\/en\/dcom-and-firewall-settings-in-windows-7-for-elipse-applications\/","og_locale":"en_US","og_type":"article","og_title":"[:pt]DCOM and Firewall Settings in Windows 7 for Elipse applications.[:en]DCOM and Firewall Settings in Windows 7 for Elipse applications.[:] - Elipse Knowledgebase","og_description":"*For Windows XP\/2003\/Vista\/2008, click here* 1) Elipse DCOM Wizard Elipse DCOM Wizard is a wizard to configure DCOM (Distributed Component Object Model) and Windows Firewall to allow remote connections. It&hellip;","og_url":"https:\/\/kb.elipse.com.br\/en\/dcom-and-firewall-settings-in-windows-7-for-elipse-applications\/","og_site_name":"Elipse Knowledgebase","article_publisher":"http:\/\/www.facebook.com\/elipsesoftware","article_published_time":"2019-03-25T20:39:59+00:00","article_modified_time":"2025-05-15T14:05:50+00:00","og_image":[{"url":"http:\/\/kb.elipse.com.br\/pt-br\/images\/ID4162\/Figura1.png"}],"author":"Elipse Software","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Elipse Software","Est. reading time":"10 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/kb.elipse.com.br\/en\/dcom-and-firewall-settings-in-windows-7-for-elipse-applications\/#article","isPartOf":{"@id":"https:\/\/kb.elipse.com.br\/en\/dcom-and-firewall-settings-in-windows-7-for-elipse-applications\/"},"author":{"name":"Elipse Software","@id":"https:\/\/kb.elipse.com.br\/#\/schema\/person\/def69ea453ea60b250497b89225a9f87"},"headline":"DCOM and Firewall Settings in Windows 7 for Elipse applications.","datePublished":"2019-03-25T20:39:59+00:00","dateModified":"2025-05-15T14:05:50+00:00","mainEntityOfPage":{"@id":"https:\/\/kb.elipse.com.br\/en\/dcom-and-firewall-settings-in-windows-7-for-elipse-applications\/"},"wordCount":2144,"commentCount":0,"publisher":{"@id":"https:\/\/kb.elipse.com.br\/#organization"},"articleSection":["Domain \/ E3Server \/ HotStandBy","Elipse Scada","OPCServer","OPCServer","Other","Other","Elipse Drivers OPC Altus TCP\/IP"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/kb.elipse.com.br\/en\/dcom-and-firewall-settings-in-windows-7-for-elipse-applications\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/kb.elipse.com.br\/en\/dcom-and-firewall-settings-in-windows-7-for-elipse-applications\/","url":"https:\/\/kb.elipse.com.br\/en\/dcom-and-firewall-settings-in-windows-7-for-elipse-applications\/","name":"[:pt]DCOM and Firewall Settings in Windows 7 for Elipse applications.[:en]DCOM and Firewall Settings in Windows 7 for Elipse applications.[:] - Elipse Knowledgebase","isPartOf":{"@id":"https:\/\/kb.elipse.com.br\/#website"},"datePublished":"2019-03-25T20:39:59+00:00","dateModified":"2025-05-15T14:05:50+00:00","breadcrumb":{"@id":"https:\/\/kb.elipse.com.br\/en\/dcom-and-firewall-settings-in-windows-7-for-elipse-applications\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/kb.elipse.com.br\/en\/dcom-and-firewall-settings-in-windows-7-for-elipse-applications\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/kb.elipse.com.br\/en\/dcom-and-firewall-settings-in-windows-7-for-elipse-applications\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"In\u00edcio","item":"https:\/\/kb.elipse.com.br\/en\/"},{"@type":"ListItem","position":2,"name":"DCOM and Firewall Settings in Windows 7 for Elipse applications."}]},{"@type":"WebSite","@id":"https:\/\/kb.elipse.com.br\/#website","url":"https:\/\/kb.elipse.com.br\/","name":"Elipse Knowledgebase","description":"","publisher":{"@id":"https:\/\/kb.elipse.com.br\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/kb.elipse.com.br\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/kb.elipse.com.br\/#organization","name":"Elipse Software","url":"https:\/\/kb.elipse.com.br\/","sameAs":["http:\/\/www.facebook.com\/elipsesoftware"],"logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/kb.elipse.com.br\/#\/schema\/logo\/image\/","url":"https:\/\/kb.elipse.com.br\/wp-content\/uploads\/2019\/05\/schererelipse-com-br\/logoElipse.png","contentUrl":"https:\/\/kb.elipse.com.br\/wp-content\/uploads\/2019\/05\/schererelipse-com-br\/logoElipse.png","width":161,"height":58,"caption":"Elipse Software"},"image":{"@id":"https:\/\/kb.elipse.com.br\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/kb.elipse.com.br\/#\/schema\/person\/def69ea453ea60b250497b89225a9f87","name":"Elipse Software","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/kb.elipse.com.br\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/ff1f7ec38f4687b06f6851d97b3cd2d0?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/ff1f7ec38f4687b06f6851d97b3cd2d0?s=96&d=mm&r=g","caption":"Elipse Software"},"url":"https:\/\/kb.elipse.com.br\/en\/author\/webmasterelipse-com-br\/"}]}},"_links":{"self":[{"href":"https:\/\/kb.elipse.com.br\/en\/wp-json\/wp\/v2\/posts\/2524"}],"collection":[{"href":"https:\/\/kb.elipse.com.br\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/kb.elipse.com.br\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/kb.elipse.com.br\/en\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/kb.elipse.com.br\/en\/wp-json\/wp\/v2\/comments?post=2524"}],"version-history":[{"count":4,"href":"https:\/\/kb.elipse.com.br\/en\/wp-json\/wp\/v2\/posts\/2524\/revisions"}],"predecessor-version":[{"id":16945,"href":"https:\/\/kb.elipse.com.br\/en\/wp-json\/wp\/v2\/posts\/2524\/revisions\/16945"}],"wp:attachment":[{"href":"https:\/\/kb.elipse.com.br\/en\/wp-json\/wp\/v2\/media?parent=2524"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/kb.elipse.com.br\/en\/wp-json\/wp\/v2\/categories?post=2524"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/kb.elipse.com.br\/en\/wp-json\/wp\/v2\/tags?post=2524"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}