Prevent Drive-By Viruses with IE9 ActiveX Filtering

ActiveX Filtering in Internet Explorer 9: A Security Enhancement
For those familiar with the evolution of web technologies, ActiveX controls are a well-known component. However, their history is also marked by various security vulnerabilities.
This article details how to leverage ActiveX filtering within Internet Explorer 9. This feature is designed to protect users from potential malware infections during web browsing.
Understanding the Risks Associated with ActiveX
ActiveX controls, while offering enhanced functionality, have historically been a target for malicious actors. Exploitable vulnerabilities within these controls could allow viruses and other malware to compromise a user’s system.
By implementing proper filtering, the risk of being affected by these vulnerabilities can be significantly reduced.
Enabling ActiveX Filtering in IE9
Internet Explorer 9 provides a built-in mechanism to mitigate the risks associated with ActiveX controls. This is achieved through the use of a filtering system.
Here’s how to configure it:
- Open Internet Explorer 9.
- Navigate to Tools, then select Internet Options.
- Within the Internet Options window, select the Security tab.
- Choose the Internet zone.
- Click the Custom Level… button.
Configuring ActiveX Controls Settings
The Custom Level settings allow for granular control over ActiveX controls. Several options are available to enhance security.
- Locate the ActiveX controls and plug-ins section.
- Ensure that “Run ActiveX controls and plug-ins” is set to “Prompt”.
- Consider setting “Binary and Script Behaviors” to “Disable” for increased protection.
Understanding the "Prompt" Setting
Selecting “Prompt” for “Run ActiveX controls and plug-ins” means that Internet Explorer will ask for your permission before running any ActiveX control.
This provides a crucial layer of defense, allowing you to prevent potentially harmful controls from executing automatically.
Additional Security Considerations
While ActiveX filtering is a valuable security measure, it’s important to maintain a comprehensive security posture.
This includes:
- Keeping your operating system and web browser up to date with the latest security patches.
- Using a reputable antivirus and anti-malware program.
- Practicing safe browsing habits, such as avoiding suspicious websites and downloads.
By combining ActiveX filtering with these additional measures, you can significantly reduce your risk of becoming a victim of malware.
Understanding ActiveX Controls
Developed by Microsoft, ActiveX represents a framework enabling code reuse across various applications, preventing redundant development efforts. These ActiveX Controls build upon Microsoft’s COM (Component Object Model) technology.
COM facilitates interoperability between programs; consequently, an ActiveX Control written in C# can seamlessly interact with others developed in C++.
Practical Applications of ActiveX
Consider a common example: the default installation of Internet Explorer lacks native Flash video playback capability.
However, through the integration of an ActiveX control provided by Adobe, this functionality is readily added, expanding the browser’s capabilities.
Essentially, ActiveX controls serve to augment and enhance the features of existing software.
Key Benefits of ActiveX Technology
- Code Reusability: Reduces development time and costs.
- Interoperability: Allows different programming languages to work together.
- Enhanced Functionality: Extends the capabilities of applications.
The power of ActiveX lies in its ability to provide a standardized method for adding features to software, streamlining development and improving user experience.
Potential Issues with ActiveX Controls
It's understandable to see the benefits of ActiveX Controls, and indeed, they can be quite useful. However, a significant concern arises from the security vulnerabilities frequently found within third-party plugins.
Specifically, within Internet Explorer, these controls can be downloaded and run without explicit user interaction. This creates a potential pathway for malicious software to infiltrate your system.
Understanding the Risks
A common attack vector is the "drive-by download," where simply visiting a compromised website can trigger the exploitation of a security flaw.
This allows for the silent installation of malware, potentially leading to infection. The inherent nature of background execution makes these attacks particularly insidious.
Therefore, while ActiveX Controls offer functionality, their associated security risks must be carefully considered.
- Third-party plugins are often sources of vulnerabilities.
- Internet Explorer's handling of ActiveX Controls allows for silent downloads.
- Drive-by attacks can exploit security holes without user awareness.
Protecting against these threats requires vigilance and a strong security posture.
Safeguarding Your System: A Guide to ActiveX Filtering
Internet Explorer 9 introduced a security feature known as ActiveX Filtering. This feature implements a whitelist-based protection system. When activated, it initially blocks all ActiveX Controls from running.
Should you then visit a website necessitating ActiveX Controls, you have the option to add it to a trusted list if you deem the site reliable. Only those sites explicitly included on this list will be permitted to execute these controls.
Enabling ActiveX Filtering
By default, ActiveX Control filtering is disabled within Internet Explorer 9. This allows any webpage containing an ActiveX Control to run without restriction. To activate the filtering mechanism, navigate to the Tools Menu, then select Safety, and finally choose the ActiveX Filtering option.
When a website attempts to initiate an ActiveX Control with filtering enabled, execution will be prevented, as illustrated below:

Managing the Whitelist
To authorize a website, click the "Filtered" button – identified by a small blue circle. Then, select the "Turn off ActiveX Filtering" option. This action adds the website to your whitelist, granting it permission to run ActiveX Controls.

Following this step, functionality requiring ActiveX Controls on that specific website will be restored.
