I think I see the confusion now. the first port shows this example from NSM.
set security zones security-zone global address-book address p1 192.168.1.13/32
set security zones security-zone global address-book address p2 192.168.1.14/32
set security zones security-zone global address-book address h1 192.168.1.11/32
set security zones security-zone global address-book address h2 192.168.1.12/32
set security zones security-zone global address-book address-set p-bgp-router address p1
set security zones security-zone global address-book address-set p-bgp-router address p2
set security zones security-zone global address-book address-set h-bgp-router address h1
set security zones security-zone global address-book address-set h-bgp-router address h2
set security policies from-zone global to-zone global policy 15 match source-address p-bgp-router
set security policies from-zone global to-zone global policy 15 match destination-address h-bgp-router
set security policies from-zone global to-zone global policy 15 match application junos-bgp
set security policies from-zone global to-zone global policy 15 then permit
As pointed out in the first response this is NOT a global policy. These commands are creating a new secuirty zone called global that is no differerent than trust or untrust, just named global.
As noted in all the documentation the true global policy is configured at this hierarchy.
security policies global