Title: Adding a Security Zone to Internet Explorer

Author: Uzi Paz
E-Mail: For e-mail contact: user is uzi4wg and domain is uzipaz.com my e-mail address as a picture
First version date: 12 October 2001
Recent version: 19 September 2002
Legal Notice: While as far as I know all the information here is exact and
correct, as I'm giving this information as a free service, I'm taking no responsibility.
Parent Page: http://www.uzipaz.com

1. Introduction

Internet Exporer allows you to set up different security settings to different sites and web pages, according to some categorization which categorizes them into different security zones.
While you may wish to allow sites that are considered as trusted to execute on your computer a code that has the permission to do in your computer whatever it wants, you are likely to limit other sites on the Internet to do only what is defined by you as safe.
While the different security settings, and their meaning will be the subject of a different article, this one is dedicated to a case, where the 4 security zones may not be enough, and you wish to make the definition of the security permissions for each site more detailed by adding further security zones for specific sites, and then define the exact security permissions for those sites, and the exact sites that will have those security zones.

We did not count here the "My Computer" security zone in the security zones. This security zone is not visible by default. Yet, we do recommend to make it visible, and to also set its permission in order to tighten security further. This is explained in "Basic Steps to protect a personal computer on the Internet".

2. Testing of the Added Security Zones

In the rest of this article I shall explain how to add a fifth security zone to Internet Explorer. This security zone, can then be set according to your wish, and you may decide which sites, and web pages will be part of this zone. I myself added this zone to my Internet Explorer, version 5.5 on my Win98, and in all my tests it seems to work fine.

Although I believe that this trick works in other version of Internet Explorer, and in other versions of Windows, I have never tested it. I also believe that you can use this trick to add more than one zone, to have six or more security zones, I never tested it myself, and thus I don't know if there is any practical limit to the number of security zones that can be added to Internet Explorer. I would certainly appreciate any report you may provide related to this issue.

3. A Word of Caution Regarding Registry Tweaking

During the process of adding the security zone, you should edit your registry files.
The registry files hold all the information Windows and the various programs, need to operate.
In order to make the changes in the registry files, we shall use the standard program that comes with Windows - regedit.

Making mistakes while making the changes in the registry files, such as deleting the wrong registry keys, may cause immediate problems in Windows or in other applications, and may even cause Windows to stop working, depending on the exact type of mistake. It is thus important to at least know how to backup you registry files, and how to restore them in case things go wrong. Any change that you make using regedit, applies immediately. Fpr further information on how to use regedit, see: http://www.winguides.com/registry/article.php?id=1&page=3 .

4. Adding a Security Zone to Internet Explorer

I shall assume here that you already have some experience with using the regedit command.

In order to add the fifth security zone, you should enter regedit, and there, to go to the following registry key:
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Zones

You will find there five numbers: 0,1,2,3,4  related to five security zones that you already have.
The security zone number zero related to the security settings regarding running files from your own computer ("My Computer" security zone). It is not visible by default, although we recommend to make it visible in order to tighten the computer's security (as commented above).

The other four security zones (numbers 1 to 4) are the different security zones that you can set on your Internet Explorer. While marking each of those five numbers, you can see in the right pane of regedit window, the different entries and their values. You will find there among other things, the name and description of each of those zones.
The different zones and their names according to those entries are then:
Zone 0 - "My Computer"
Zone 1 - "Local Intranet"
Zone 2 - "Trusted Sites"
Zone 3 - "Internet"
Zone 4 - "Restricted Sites"

By default, only zones 1-4 are apparent in Internet Explorer.

The natural guess, is that if you wish to add another security zone, you should simply copy one of the other zones and name it "5", so that under the "Zones" key there will be 6 subkeys 0,1,2,3,4,5.

Which security zone we would like to base our "5" security zone on? the "Trusted sites" zone seems to be the appropriate one to copy, because its options seem to be the one that I wish to have.
For this example, let us assume that I want to call this security zone "Experimental".

The easiest way to copy the subkey is to export it first into a .reg file.
I do this by marking the "2" key, (the subkey of "Zones") and then from the "Registry" menu, I choose
Export Registry File". I then choose a name for this file - let us assume that I chose the name:
experimental.reg .
I check that it is set to export only this selected branch, and I note in which directory this file is saved.
Then I press OK to export it.

Now, I exit from regedit, and edit the experimental.reg file using a simple text editor (Please notice that you should use a text editor and not a word processor. Please notice that you don't edit, but rather execute the experimental.reg file by doublclicking it, so you don't wish at this stage to doubleclick it).

So you open it using a text editor (Notepad is fine. I myself prefer to use Gvim, but it is a matter of taste),
and then you change the registry key on those lines (in this file) from "2" to "5". You wish this file to build a registry key with the number 5 in it.
After all lines refer to the "5" registry key. You should change the name and the description of the zone from what is written there (which is the name and description of the "trusted zone" to the name and description you wish your new security zone to have.

Pernsonally, I preferred to also change its icon in the Internet explorer, from the default icon of trusted sites to a different one, so I changed the value of the icon registry entry to "inetcpl.cpl#1307".

After making those changes, save the edited experimental.reg file, and doubleclick it to build the new security zone.

Now you may enter Internet Explorer, and there from the "Tools" menu, "Internet options" submenu, and "Security" page, you will see the security zone that you have just added. You may then set it to custom, and customize it the way you wish, (the instructions on how to customize the security zones is a bit different from version to version of Internet Explorer. You might need to browse the Internet Explorer's menus a bit in order to find where it is done. The instructions in this paragraph, refer to version 5.5).

5. A Comment About the Choice of Icons

We offered to replace the original reference to the Icon of "Trusted Zone": "inetcpl.cpl#00004480" (which is equivalent to "inetcpl.cpl#4480") to "inetcpl.cpl#1307", but you might wish to set it to a different icon.
So you might ask yourself how to refer to a different icon. Trying to provide the location of a simple icon file in that entery does not work. In fact, those references are not directly into icons but rather to icon groups. Internet Explorer needs to use both icons of sizes 16x16 and 32x32 for the zones, thus the question becomes, how to look for different icon groups and the references to those icon groups.

I use a program called "Resource Hacker" for that. Resource Hacker can be found on http://www.users.on.net/johnson/resourcehacker/ .
If you open with resource hacker, the inetcpl.cpl file, you will see there, under "Icon group" different group numbers, and for each of them a "subfolder" with some standard number, and the various icons (typically the same icon in different sizes and resolutions). You will find that the icon for the trusted size can be found in the "Icon Group" under the number 4480. This suggests that the right reference to that icon is
"inetcpl.cpl#4480". Notice that the reference should be to the icon groups rather than the actual icons themselves. Many other .dll, .exe, .cpl, .ocx, and .scr files hold relevant icon groups inside them, and you may use the resource hacker to browse them and to find the exact reference for them.
I also heard of another program that can be used instead of the resource hacker, and I give here the reference although I myself didn't check it: http://www.copseystrain.com/iconsucker/ .