Use this dialog box to assign, create, and edit profile-based trusted application policies. Trusted applications are safe in any environment, have no known vulnerabilities, and are allowed to perform all operations except those that suggest that the applications have been compromised.