CM101 CM-KB-Knowledge Base



Adding Trusted Sites through Group Policy

Submitted By

Scott Deruniec

Submitted When


Quick Summary

Add Trusted Sites through Group Policy

Possible Applications


Useful Links


Other Notes



After you have disabled IE Enhanced Security from Server Manager:





And you still get an error like the below:



Then try the below.


Note: This done through Group Policy because it is a User Based Setting, Not a Machine Based Setting.


First Method worked on the 2012 R2 Environment at JH.



Stolen from:


The first method is fairly straightforward.


First Method: Internet Explorer Maintenance. Wait, where is it in Windows Server 2012 R2? (Appendix B: Replacements for Internet Explorer Maintenance or see that link for further reading Missing Internet Explorer Maintenance settings for Internet Explorer 11)


So, if you are migrating a Windows Server 2008 R2's domain to Windows Server 2012 R2, be advised to replace those GPOs that use the Internet Maintenance Options.


The PRO of that Method:


- Easy to edit.


The CON of that Method:


- For adding only one trusted site, you will finish with all Internet Settings (including Zone Setting).


When deployed that way those settings get burned in the user profile, thus even if you remove the GPO, it will leave a lot of settings behind. That is the greatest drawback of these methods, as it's hard to remove any error in the settings. Be advised that method can bring problem if you edit it with a version of Internet Explorer not the same as the client computers. If you edit it when Internet Explorer is in Enhanced Security mode, then the target Internet Explorer will inherit those settings.


Second method: User Configuration->Preferences->Control Panel Settings->Internet Settings... Oh wait again, it's unavailable.


The correct step is this way: User Configuration > Administrative Templates > Windows Components > Internet Explorer > Internet Control Panel > Security Page


“Site to Zone Assignment List” , click “Enable” and edit the list.


Add the site and the number two for Trusted Site. (1 = Intranet, 2 = trusted sites, 3 = Internet Zone and 4 = Restricted Site Zone.


To have a list like that (2 is for trusted site)


* 2


* 2


* 2


The PRO of that method:


- It standardizes all domain-joined computers as they will use the same list for everyone.


- It blocks users from entering new trusted sites. Though this can be a con for small offices or for Power Users wanting more autonomy.


The CON of this method:


- It block user for entering new trusted sites. This can be considered a PRO in big offices, as the list is standardized by the IT's team.


After performing these steps, if your users receive this warning “The current webpage is trying to open a site on your intranet. Do you want to allow this?” when they navigate from the Internet Zone to the Trusted zone. You can tweak the behaviour with a simple registry key with the Windows preference.


HKEY_LOCAL_MACHINE \SOFTWARE\Policies\Microsoft\Windows\CurrentVersion\Internet Settings\Zones\2


Value Name: 2101 Value Type: REG_DWORD Value: 0x0 (0)


Official description of the setting: This policy setting allows you to manage whether Web sites from less privileged zones, such as Restricted Sites, can navigate into this zone. If you enable this policy setting, Web sites from less privileged zones can open new windows in, or navigate into, this zone. The security zone will run without the added layer of security that is provided by the Protection from Zone Elevation security feature. If you select Prompt in the drop-down box, a warning is issued to the user that potentially risky navigation is about to occur. If you disable this policy setting, the possibly harmful navigations are prevented. The Internet Explorer security feature will be on in this zone as set by Protection from Zone Elevation feature control. If you do not configure this policy setting, a warning is issued to the user that potentially risky navigation is about to occur.


For a complete list of registry key versus the GPO list please see that link: Group Policy Settings Reference for Windows and Windows Server