Zones provide Application Control as outbound protection
Whenever a program requests access permission or server permission, it is trying to communicate with a computer or network in a specific Zone. For each program you can grant or deny the following permissions:
- Access permission for the Trusted Zone.
- Access permission for the Public Zone.
- Server permission for the Trusted Zone.
- Server permission for the Public Zone.
By granting access or server permission for the Trusted Zone, you enable a program to communicate only with the computers and networks you have put in that Zone. This is a highly secure strategy. Even if a program is tampered with, or given permission accidentally, it can only communicate with a limited number of networks or computers.
By granting access or server permission for the Public Zone, however, you enable a program to communicate with any computer or network, anywhere.

|
Note - Advanced users can specify the ports and protocols a particular program can use, the hosts it can access, and other details. For more information, see Creating an expert rule for a Program.
|
|
|