This is much easier to do than type the answer SO, because there are various palaces that need to be checked and aligned.
But the overall goal is to: 1) track the security account that was trying to access and start / activate the COM component, and 2) which COM component was faulty.
NOTE. The procedures described above increase the level of security, so do not forget to create excellent logs of all the changes that you make, so that you know what exactly to fix your problem, but also so that you can roll back everything that was inappropriate.
NOTE 2 One change at a time, regardless of the need to restart the server. \ - so you know what is fixed.
Start with the Windows logs - they usually log the exact security principal and the DCOM component that he was trying to access / activate. Usually both: the security context and the component are pretty obvious - in this case you can skip to dcomcnfg below.
One way to test timeirely , if you find a component / account, is to allow administrator rights to account security or EVERY access to the component and see how to fix the error
NOTE. These are temporary measures, only for verification. Remember to roll back everything.
Your ongoing configuration changes will be made in the MMC component snippet. You can either manually add it to a window with an elevated MMC, or, more simply, by running the following command under administrator rights:
/ "> DCOMCNFG
Try to find the component you are interested in in the "Component Services / Computers / My Computer / DCOM Configuration /" section, right-click and do "Properties": 
Go to the Security tab and set the Activate and Access permissions to the minimum that will fix your problem, but stay as close as possible to the locked state.
NOTE. I have never done this with MS Office middleware. Be sure to consider all the security implications:

This is pretty much how you get started. I did it for all tastes of Windows, and it always feels different. Often I have to rely on other methods of monitoring this condition: SysInternals spyware tools, Windows security auditing, COM + Applications properties, and several times direct modification of the file system or registry key ACL. In most cases, these were laboratory / dev machines, so hacks, like editing registry key systems, are fine.
And again - track and discard all the changes that you do not need!
source share