Use Windows Sandbox as a security feature
In this article, I will be showing you how to use Windows Sandbox as a security feature in Windows 10 and 11. Windows Sandbox is a useful and important feature that can help you to test an application in an isolated environment without touching the host OS or configuring a VM for a Sandbox. Please see How to Make More Space Available on the Windows 11 Taskbar. Also, see how to Fix the “Windows Installer Service Could Not Be Accessed” Error While Installing an application, and How to Configure Windows Sandbox.
Make the software or website available for testing in the Sandbox by opening it directly in the Windows Sandbox. A sandbox is temporary! Once the Sandbox is closed everything is lost and you have to start all over again.
The only disadvantage with Windows Sandbox VM is that its previous state does not survive a reboot which means it cannot be used for the installation of some software that needed a reboot to complete installation.
Windows Sandbox as a security feature
The Windows Sandbox relies on the host environment for many things like using the same internet and having the same default Microsoft Edge internet browser.
Software and applications installed on the host aren’t directly available in the sandbox. If you need specific applications available inside the Windows Sandbox environment, they must be explicitly installed within the OS (environment).
Launch the OpenPhis Webpage
We shall be opening a URL from the website OpenPhish which contains Phishing websites.
To confirm they are truly phishing websites. I will open one of the websites on my two systems that are protected with Bitdefender and TrendMicro respectively. We will see the response on this website.
Please see How to Improve Website Response Using Traffic Manager, and how to fix Error: Response code 50, LDAP insufficient access. See how to fix Error: Response code 50, LDAP insufficient access, and how to enable or disable Windows Defender Credential Guard.
View BitDefender Response
1: This is a system that is protected by Bitdefender and the response. Lastly, see how to fix “The executor requires OSType=windows, but Docker Engine supports only OSType=linux“.
You may want to see how to set up a VM via PXE boot on a Generation 1 VM, and Enable HyperV on Windows: How to install Windows 11 on HyperV
View TrendMicro Response
2. This is a system that is protected by TrendMicro and the response
3. But we may want to check what exactly is on the website. The best place to do that is on Windows Sandbox. This is isolated from the host OS. Please see how to Create Shared Folder in Windows Sandbox.
The image below shows the phishing website. Whatever you do on this website in this Windows Sandbox will not have any effect on your host environment.
Let us assume you don’t have a BitDefender or TrendMicro installed on your system. You need to protect your system from being infected, this is where Windows Sandbox will come into play.
4. I will be downloading malicious software from this Website and installing it on the Windows Sandbox.
It makes sense to know that you will be notified that the file is malicious. And can decide if you want to go ahead with the installation. You will not be afraid to install this file simply because you are in a Sandbox environment.
To make use of this Windows Sandbox to test an application. You are not sure of the performance and effect on your Windows Operating System. So the best thing to do is to isolate the installation using Windows Sandbox.
You may want to know How to Configure Windows Sandbox and if you want to read more on virtual environments then read these: 3 Ways to Convert VMware VMs to Hyper-V, and How to install Oracle VirtualBox on a Mac device.
FAQ on Windows Sandbox
Windows Sandbox is a versatile tool with various use cases, including:
– It’s an ideal environment for testing potentially harmful or untrusted applications without affecting your main system.
– You can use it for secure web browsing, isolating your online activities from your host system.
– Safely open and view documents or files of unknown origin.
– It provides a clean environment for testing software and code, and you can quickly reset it to a pristine state.
– Security professionals can use it to analyze suspicious software or malware in a controlled environment
While Windows Sandbox is meant to be a disposable environment, you can make some customizations. You can install additional software, change settings, and perform tasks within the sandbox. However, keep in mind that any changes are not persistent; once you close the sandbox, they’re discarded. Customizations within the sandbox do not affect your main Windows installation.
Windows Sandbox provides a level of security by isolating applications in a separate environment. However, it’s not foolproof and should not be considered a complete security solution. Malware or vulnerabilities could still pose risks, so it’s essential to exercise caution when running untrusted applications or files in Windows Sandbox. It’s wise to pair it with other security measures.
I hope you found this blog post on how to use Windows Sandbox as a security feature in Windows interesting and helpful. In case you have any questions do not hesitate to ask in the comment section.




