You are working as a network administrator for xyz.com. 25 employees from your company connect to a terminal server named Server 3 to run applications and to gain access to the Internet. These employees report that they receive security messages while browsing Internet Web sites. The employees report that they cannot modify the Internet Explorer security settings on their client computers while connected to Server 3. What should you do to allow these employees to modify the Internet Explorer security settings on their client computers while connected to Server 3?