1. Click the File tab.
  2. In the Security Warning area, click Enable Content.
  3. Select Advanced Options.
  4. In the Microsoft Office Security Options dialog box, select Enable content for this session for each ActiveX control.

The following image is an example of the Security Warning area when ActiveX controls can be enabled for the duration of time that the file is open.

Notes:
Microsoft

Change ActiveX-control settings in Word, Access, Excel, PowerPoint, Publisher, and Visio

Use the following instructions to enable or disable ActiveX controls in the Trust Center.

  1. Click File > Options.
  2. Click Trust Center > Trust Center Settings > ActiveX Settings.
  3. Click the options you want, and then click OK.

The following is an example of the ActiveX Settings area of the Trust Center.

Important: If you change an ActiveX setting in Word, Access, Excel, PowerPoint, Publisher, or Visio, the settings are changed in all those programs.

ActiveX-control settings explained

The following explanations apply to ActiveX controls in files that are not in a trusted location or trusted documents.

Important: If you trust a file and do not want to receive security warnings about content containing ActiveX controls, or other active content, put the file in a trusted location.

Disable Activex In Microsoft Edge Windows 10

What is an ActiveX control and what are the risks?

ActiveX controls are small building blocks that create applications that work over the Internet through Web browsers. Examples include customized applications for collecting data, viewing certain kinds of files, and displaying animation. Common uses of ActiveX controls are command buttons, list boxes, and dialog boxes. Office programs also let you use ActiveX controls to improve some documents.

Disable Activex Microsoft Edge

Risk and potential damage

Activex Settings In Microsoft Edge

ActiveX controls can have unrestricted access to your computer and therefore can access your local file system and change your operating system registry settings. If a hacker uses an ActiveX control to take over your computer, the damage can be significant.