The main component of the Access Zones policy rule is the definition of the Trusted Zone. All objects that are not in the Trusted Zone are automatically in the Internet Zone. If necessary, you can create new Trusted Zone objects to use in different policy rules
You can add and remove network objects from a Trusted Zone.
Note - A computer can have only one Trusted Zone. This means that if the Access Zones policy has more than one rule, and more than one Trusted Zone applies to a computer, only the last Trusted Zone is enforced.
To define the Trusted Zone:
The Edit Properties - Access Zones window opens.
The Select New Object Type window opens.
The Properties window for the selected object opens.
To create a new Trusted Zone object:
The Properties window opens.