Select the application in the list, and then click
The application is added
to the firewall policy and marked as
The application's checksum
is added to the list of allowed checksums.
Trusted applications are
allowed full and unconditional network access, including access to the
internet. For greater security, you can apply one or more
application rules to specify the conditions under which the
application can run.