Previous Topic: Security ProcessingNext Topic: Trace Log and Configuration File Locations


Preparing for Execution

Before you execute an application that uses a generated COM proxy, address the following items: