Your network contains a terminal server named S25 that is utilized by 15 employees to run applications and to gain access to the Internet. One day, these employees report that they receive security messages while browsing Internet Web sites. They are unable to modify the Internet Explorer security settings on their client computers. Which of the following should you do to allow these employees to modify the Internet Explorer security settings on their client computers while connected to S25?