Trust an application
If you use role-based administration:
- You must have the Policy setting - firewall right to configure a firewall policy.
- You cannot edit a policy if it is applied outside your active sub-estate.
To trust an application on a group of computers:
- The application is added to the firewall policy and marked as Trusted.
- The application's checksum is added to the list of allowed checksums.
Trusted applications are allowed full and unconditional network access, including access to the internet. For greater security, you can apply one or more application rules to specify the conditions under which the application can run.