How to set up smartphones and PCs. Informational portal
  • home
  • Reviews
  • Sandbox on pc to run. Sandbox for windows

Sandbox on pc to run. Sandbox for windows

Screen Virtualization options allows you to configure basic and advanced parameters of the Sandbox tool. After making changes, click OK to save your sandbox settings.

Note. The sandbox is only available in the paid versions of Avast Antivirus.

Change visual settings

Advanced settings management

The following settings determine how applications should be virtualized on your system. They are intended for advanced users.

Other sandbox settings

Use the tabs on the left side of the window to control various characteristics of the sandbox behavior.

Sandbox file storage

Sandbox file storage is a file space that is completely isolated from the rest of the system and other sandboxes.

When launching the application in the sandbox, all the files you need always are copied to the sandbox datastore, where they can be modified as needed without affecting the original files. Any new files created during virtualization are also saved to the sandbox file storage.

By default, this vault is created on the same disk as the original file. If there is not enough free space on a predefined disk or performance problems, you can select a different disk from the drop-down menu or specify a different location.

Note. When you close an application running in the sandbox, all modified and created files are deleted.

Web browsers

You can optimize virtualization and storage settings for sandboxed browsers.

Save trusted downloaded files: Save files downloaded while browsing the web in a virtualized window to your PC. This only applies to boot processes that have been determined to be safe. If you clear this check box, the downloaded files will be deleted when you close the browser running in the sandbox.

Exceptions: Cancel deletion of personalized web browser data when you close the sandbox. Activate your preferred options individually or check the box All settings and components to exclude all listed components and browser extensions and add-ons.

Service: Ability to manage storage settings.

  • Check the box Cache web browser files to save only virtualized files for browsers, which improve their sandbox performance.
  • Please select delete content to remove cached content, or check the box Automatically empty sandbox file storage and specify how often cached content should be removed.

Virtualized Processes

Screen Virtualized Processes can be useful if you need to run questionable applications in the sandbox on a regular basis. You can specify the sandbox always virtualize a specific application or multiple applications contained in a folder.

To add an app, manually enter its location in the text box or click the button Overview and select the file (with the extension .exe) and then press OK... Alternatively, you can right-click an application icon in Windows and select Always run in a sandbox.

To add a folder containing multiple applications, follow these steps.

  1. Click the down arrow next to Virtualized folders to expand this section.
  2. Click Overview and check the box next to the folder you want to virtualize, then click OK.

To add another item to the list, click Add... To remove an item, click the line you want, and then click Delete.

The location of files and folders can contain wildcards: ? and *

  • to run all executables in the sandbox, type in the text box * .exe;
  • to run in the sandbox all files from folders with a certain mark on any of your hard drives, add to the beginning of the path ?:\ (For example, ?: \ example \ *).

Note. If Avast marks a file as suspicious after scanning, but you need to use it regularly, we recommend adding it to exclusions by selecting Settings General Exceptions and then adding this file to the list Virtualized Processes so that it always runs automatically in the sandbox.

Confidentiality

Malicious applications running in the sandbox can attempt to hijack sensitive data that has been copied into the virtual environment. To prevent malware from accessing this data, the entire list of shared system locations is set by default to Blocked... Select option Allowed next to any file or program that you want to have access to during virtualization.

In chapter User-defined locations can Add own locations and choose one of the same options for them: Blocked or Allowed... Manually enter the folder location in the text box or click Overview OK.

To add another location to the list, click Add... To remove a location, click the line you want, and then click Delete.

Exceptions

Any files received during a sandbox session are deleted when you close the application that was running in it. If you want to keep certain files, you can save them to the folder indicated on the screen. Exceptions... We recommend that you use caution when sandboxing applications save files to an excluded location. If the application running in the sandbox is malicious, saving the file to a location on your PC can be dangerous.

To exclude a folder from being sandboxed:

  1. Manually enter the folder location in the text box or click Overview, select the checkbox for the folder you want, and then click OK.
  2. Run the sandboxed application again for the changes to take effect.

The folder specified in the exclusions can be used to permanently save files on your PC by sandbox applications.

To add another folder to the list, click Add... To delete a folder, click the line you want, and then click Delete.

Note. Folder locations can contain wildcard characters: ? and * ... An asterisk can substitute for zero or more characters, a question mark can substitute for only one character. For instance:

  • to exclude a folder and its subfolders, add to the end of the folder name \* , For example C: \ example \ *;
  • to exclude all marked folders on any of your hard drives, add to the beginning of the path ?:\ (For example, ?: \ example \ *).

Internet access

Set which applications will have access to the Internet when launched in the sandbox.

  • Allow All: All applications running in the sandbox will be given permission to access the Internet.
  • Block all: All applications running in the sandbox, including browsers, will be denied access to the Internet.
  • Allow certain apps: Certain applications running in the sandbox will be given permission to access the Internet.
    • Check the box Web browsers to allow Internet access to all browsers running in the sandbox.
    • To allow another app to access the sandboxed Internet, manually enter its location in the text box, or click Overview, check the box for the folder you want, and then click OK... To add another application to the list, click Add... To uninstall an application, click the line you want, and then click Delete.

Report file

Specify whether the sandbox will generate reports for virtualized applications. When contacting Avast Support for troubleshooting, the representative may ask you to provide a report file.

To generate automatic reports on sandbox activity, follow these steps.

  1. Check the box Create report file.
  2. Configure the following settings.
    • File type: by default all reports are generated in the format XML.
    • The sort order: Choose how you want to organize the sandbox activity: by time or by the categories listed in the list.
    • Delete logs: Set the number of days after which logs should be deleted.
  3. Click on OK.

All components listed Actions logged in the report are selected by default. Not it is recommended to change the default settings. This should only be done at the request of Avast Support representatives.

The report file is saved in one of the following locations.

  • Windows 10, Windows 8.1, Windows 8, Windows 7, or Windows Vista: C: \ ProgramData \ Avast Software \ Avast \ report
  • Windows XP: C: \ Documents and Settings \ All Users \ Application Data \ Avast Software \ Avast \ report

Sandboxie is a program that allows you to run applications in a protected virtual environment (sandbox) and exercise full control over their work.

How Sandboxie works

The sandbox creates a special protected shell. Any program launched through Sandboxie will not have access to system files, Windows registry, and will not be able to affect its performance in any way, because runs in an isolated environment.

Running applications in the sandbox allows you to protect the system from viruses and various malicious objects, completely isolating Windows from any unwanted impact.

In addition, Sandboxie makes web surfing more secure. By launching any browser (, etc.) in the sandbox, you do not have to be afraid of viruses and other malware from the Internet getting into your computer.

Sandboxie also protects against unwanted updates, is able to monitor e-mail, detecting viruses, Trojans, spyware and other malicious objects.

Free version limitations

Please note: Sandboxie is shareware. You can work with it for free only on condition of home, non-commercial use.

  1. Only one sandbox can run at a time;
  2. After 30 days from the moment of installation, a proposal will be displayed to update to the paid version (it is not necessary to update, the program will remain fully functional all the time, except for point 1.).

The paid version does not have the above restrictions.

Download Sandboxie

The latest version of Sandboxie for Windows 32 and 64-bit in Russian is available for download on our website.

Download Sandboxie for free, no registration.

Sandboxie is a program that allows you to run applications in a protected virtual environment (sandbox).

Version: Sandboxie 5.28

Size: 5.93 MB

Operating system: Windows 10, 8.1, 8, 7, XP

Russian language

Program status: Shareware

Developer: Ronen Tzur

Official site:

What's new in version: List of changes

Sandboxie creates an isolated environment on your computer. An isolated environment or "sandbox" is an environment where running programs do not have direct access to system files and important computer settings.

The processes occurring in the running program are isolated from the rest of the system. At the same time, the operating system is protected from changes that can occur when a potentially dangerous program is launched.

You can use the sandbox to run an unknown program or, after launching your browser, visit a potentially dangerous site without risking your computer.

If a malicious program nevertheless entered your computer, then it will not have access to system files in order to modify them. And when you exit the sandbox, all files that entered the sandbox will be deleted.

You can create your own sandbox using specialized programs that restrict access to system files. One such program is the Sandboxie program.

The Sandboxie program is a sandbox for potentially dangerous and unfamiliar programs, as well as for surfing the Internet safely.

Sandboxie is shareware. Upon completion of 30 days of work with the program, the program will ask you to switch to the paid version. But, most of the program's functions will work in free mode for as long as necessary. Only some of the functions of this program will be disabled (for example, the simultaneous launch of several "sandboxes").

You can download the Sandboxie program from the manufacturer's official website.

sandboxie download

After downloading the Sandboxie program to your computer, start its installation. In the program installation window, select Russian.

In the next window, you agree to install the driver for the Sandboxie program, and then click on the "Next" button. In the last window of the installation of the program, click on the "Finish" button.

The program can be launched from the Start menu => All Programs => Sandboxie. There are several points for launching the program for specific purposes.

The Sandboxie program can also be launched from the Notification Panel (tray) by clicking on the program icon. From a shortcut on the Desktop, you can launch a browser in the "sandbox", the one that is selected as the default browser on your system.

Start Sandboxie to make a few settings for the program. The main window of the program displays the sandbox created by default.

Now let's consider this question: how to set up Sandboxie.

Setting up Sandboxie

To configure the program, right-click on the name of the "sandbox". After that, in the context menu, click on the Sandbox Settings item.

In the sandbox settings window - "DefaultBox", in the "Behavior" section, you can check the box next to the "Do not show the Sandboxie indicator in the window title" if you do not want the windows open in the "sandbox" to be marked with a special icon. You can do this at your discretion.

When you click on the yellow field in the "Color" window that opens, you can choose a color to display a thin border around the window of the program running in the "sandbox". After these settings, if you have changed something in the program settings, click on the "Apply" button.

In the "Recovery" section, in the "Quick recovery" subsection, you can select folders for quick recovery if you want to change the default program settings.

In the "Immediate Recovery" subsection, you can exclude files, folders or file extension types from immediate recovery if these files are saved by a program running in the "sandbox".

In the "Deletion" section in the "Deletion suggestion" subsection, you can check the box "Never delete this sandbox or clear its contents" in order not to lose the data stored in the "sandbox".

In the "Restrictions" section, in the "Internet access" subsection, you can add programs to the list or remove programs from the list of programs that can access the Internet. You can allow or block programs from accessing the Internet while they are in Safe Run. If you click on the block all programs button, then all programs running in the "sandbox" will be blocked from accessing the Internet.

In the "Applications" section, you can select the rules of behavior for various programs running in the Sandboxie program.

In the "Sandbox" section of the menu, clicking on the "Set storage folder" item, you can change the disk on which the "sandbox" will be stored if you have little space on the "C" drive.

After clicking on the "Create a new sandbox" item, you can create an unlimited number of "sandboxes", each with its own settings, to launch programs with different behavior settings from your "sandbox".

This mode of launching several sandboxes at the same time, works only in the paid version of the program, after the completion of the trial period of work with the program.

Each virtual space works separately, sandboxes are isolated from the system and from each other. By default, the application offers one Sandbox DefaultBox isolated space.

How to use Sandboxie

The first way... In order to run the program in safe mode, right-click on the name of the "sandbox" and in the context menu, click on the item "Run in sandbox". In the list of launch items, you can select the appropriate item to launch the program.

You can launch your browser, your default mail client, or launch any program from here or from the Start menu. You can also launch Explorer in Safe Run if you click on the "Launch Windows Explorer" item.

After that, Explorer will be launched in a protected environment. To close Explorer, right-click on the program folder in the Sandboxie Management window, and select “End Program” in the context menu, or simply close Explorer in the usual way for programs by clicking on the red button.

Second way... It will be even easier to launch the program in Sandboxie by simply clicking on the folder or shortcut of the program, and then select the "Run in Sandbox" item in the context menu.

If you have created several sandboxes, then the Sandboxie program will prompt you to select the desired sandbox to launch the program. Select the sandboxed environment, and then click on the "OK" button.

The program then runs in an isolated environment. When you hover the mouse cursor over a program running in the sandbox, a thin colored border will be visible around the program window.

File recovery in Sandboxie

The Sandboxie program does not allow files from the program running in the "sandbox" to enter the operating system without your permission. All files created by the program or downloaded from the Internet will be deleted by default after you close the sandbox.

Working in the Sandboxie program, you can create and save files in regular folders on your computer. These files will not be visible until you give Sandboxie permission to move data from sandbox to normal.

After you have downloaded some files from the Internet using a browser running in an isolated environment, these files will be located in the place where the downloads are saved on your computer.

But, you will not see these files while they are in the sandbox. You will need to move these files from your sandbox to your regular environment.

In Sandboxie, this is called "recovering" files. There are three file recovery modes: Immediate Recovery, Fast Recovery, and Manual Recovery.

Immediate recovery in Sandboxie

This is the best way to restore, as it can automatically invoke the restore function as soon as the files are created. By default, the program monitors the Downloads, Documents, Favorites, and Desktop folders especially closely.

You can add other folders to these folders at your discretion in the program settings (right-click on the sandbox folder => "Sandbox settings" => "Recovery").

After the file is saved to your computer, Sandboxie will immediately show the "Restore Immediate" window. You can click on the "Restore" button, and if you click on the "Restart" button, then "Repair and investigate" or "Restore and run".

Fast recovery in Sandboxie

Fast recovery transfers files from sandboxed environment using fast manual mode. You can configure the program to restore files saved in the "sandbox" when accessing this mode.

Manual recovery in Sandboxie

If you want to clear the "sandbox" by right-clicking on the name of the "sandbox" and selecting the "Delete content" context menu item. After that, the "Delete Sandbox" window appears.

In this window, you can select files that are in an isolated environment, "Restore to the same folder", "Restore to any folder" or "Add folder". If you click on the "Delete Sandbox" button, then all processes in it are terminated and all its contents are deleted.

Using the Sandboxie program allows you to achieve more security while using your computer. You can safely run some programs in an isolated environment, surf the Internet safely.

Sandboxing tools also have some antivirus programs such as.

Conclusions of the article

The Sandboxie program runs applications in the sandbox, thereby preventing possible dangerous components from entering the system. Also, using this program, you can test new programs without installing them on your computer.

You can endlessly look at fire, water and the activity of programs isolated in the sandbox. Thanks to virtualization, you can send the results of this activity - often unsafe - into oblivion with one click.

However, virtualization is also used for research purposes: for example, you wanted to control the impact of a freshly compiled program on the system or run two different versions of an application at the same time. Or create a standalone application that will not leave any traces on the system. There are many options for using the sandbox. It is not the program that dictates its conditions in the system, but you show it the way and allocate resources.

If you are not satisfied with the slowness of the process, you can stream virtualization using the ThinApp Converter tool. Installers will be created based on the config you specified.

In general, the developers advise to produce all these preparations under sterile conditions, on a fresh OS, so that all the nuances of the installation are taken into account. For these purposes, you can use a virtual machine, but, of course, this will leave its mark on the speed of work. VMware ThinApp is already quite heavy on system resources, and not only in scan mode. However, as they say, slowly but surely.

BufferZone

  • Site: www.trustware.com
  • Developer: Trustware
  • License: freeware

BufferZone controls Internet and program activity of applications using a virtual zone, closely approaching firewalls. In other words, it uses rules-driven virtualization. BufferZone works easily in conjunction with browsers, instant messengers, email and P2P clients.

At the time of this writing, the developers warned about possible problems when working with Windows 8. The program can kill the system, after which it will have to be removed through safe mode. This is due to the BufferZone drivers, which come into serious conflict with the OS.

What gets under the BufferZone radar can be tracked in the main Summary section. You determine the number of restricted applications yourself: the Programs to run inside BufferZone list is intended for this. It already includes potentially unsafe applications like browsers and email clients. A red border appears around the window of the captured app, giving you the confidence to surf safely. If you want to run outside the zone - no problem, the control can be bypassed through the context menu.

In addition to the virtual zone, there is such a thing as a private zone. You can add sites that require the strictest confidentiality to be added to it. It should be noted right away that the function works only in Internet Explorer retro versions. More modern browsers have built-in anonymity features.

In the Policy section, the policy is configured in relation to installers and updates, as well as programs launched from devices and network sources. See also Configurations for Advanced Policy. There are six levels of control, depending on which the BufferZone relation to programs changes: no protection (1), automatic (2) and semi-automatic (3), notifications about the launch of all (4) and unsigned programs (5), maximum protection (6) ...

As you can see, the value of BufferZone lies in total internet control. If you need more flexible rules, then any firewall will help you. BufferZone also has it, but more for show: it allows you to block applications, network addresses and ports. From a practical point of view, it is not very convenient for actively accessing the settings.

Evalaze

  • Site: www.evalaze.de/en/evalaze-oxid/
  • Developer: Dögel GmbH
  • License: freeware / commercial (2142 euro)

The main feature of Evalaze is the flexibility of virtualized applications: they can be run from removable media or from a networked environment. The program allows you to create completely stand-alone distributions that operate in an emulated file system and registry environment.

The main feature of Evalaze is a user-friendly wizard that is understandable without reading the manual. First, you make an OS image before installing the program, then you install it, make a test run, and configure it. Next, following the Evalaze wizard, you analyze the changes. It is very similar to the principle of work of uninstallers (for example, Soft Organizer).

Virtualized applications can work in two modes: in the first case, write operations are redirected to the sandbox, in the second, the program will be able to write and read files on the real system. Whether the program will delete traces of its activities or not is up to you, the Delete Old Sandbox Automatic option is at your service.

Many interesting features are available only in the commercial version of Evalaze. Among them - editing environment elements (such as files and registry keys), importing projects, setting the reading mode. However, the license costs more than two thousand euros, which, you must agree, slightly exceeds the psychological price barrier. At a similarly unaffordable price, the use of an online virtualization service is offered. As a consolation, the developer's site has prepared virtual sample applications.

Cameyo

  • Site: www.cameyo.com
  • Developer: Cameyo
  • License: freeware

A quick inspection of Cameyo suggests that the functions are similar to Evalaze, and in three clicks you can "blind" a distribution kit with a virtualized application. The packer takes a snapshot of the system, compares it to the changes after installing the software, and creates an ecosystem to launch.

The most important difference from Evalaze is that the program is completely free and does not block any options. The settings are conveniently concentrated: switching the virtualization method with saving to disk or memory, choosing the isolation mode: saving documents to specified directories, prohibiting writing or full access. In addition to this, you can customize the virtual environment using the file and registry key editor. Each folder also has one of three isolation levels that can be easily overridden.

You can specify the sandbox cleaning mode after exiting the standalone application: remove traces, without cleaning, and write registry changes to a file. Integration with Explorer and the ability to bind to specific file types in the system are also available, which is not even available in paid Cameyo counterparts.

However, the most interesting thing is not the local part of Cameyo, but the online packer and public virtual applications. It is enough to specify the URL or upload the MSI or EXE installer to the server, specifying the system bit, and the output is a stand-alone package. From now on, it is available under the roof of your cloud.

Summary

Sandboxie will be the best choice for sandbox experiments. The program is the most informative among the listed tools; the monitoring function is available in it. A wide range of settings and good options for managing a group of applications.

It does not have any unique functions, but it is very simple and trouble-free. An interesting fact: the article was written inside this "sandbox", and by an unfortunate mistake all the changes went into the "shadow" (read: astral). If not for Dropbox, this page would have published a completely different text - most likely by a different author.

Evalaze offers not an integrated approach to virtualization, but an individual one: you control the launch of a specific application by creating artificial living conditions for this. There are advantages and disadvantages here. However, taking into account the cut-downs of the free version of Evalaze, the dignity will fade in your eyes.

Cameyo carries a certain "cloudy" flavor: the application can be downloaded from the website, put on a USB flash drive or in Dropbox - this is convenient in many cases. True, it leads to associations with fast food: there is no need to vouch for the quality and correspondence of the content to the description.

But if you prefer to cook according to the recipe, VMware ThinApp- your option. This is a solution for experts who care about every nuance. A set of unique features is complemented by the capabilities of the console. You can convert applications from the command line using configs, scripts - individually and in batch.

BufferZone is a sandbox with a firewall function. This hybrid is far from perfect and relevant to the settings, but you can use BufferZone to control Internet activity and applications, protect against viruses and other threats.

How to use 360 ​​Sandbox 360 sandbox is part of 360 Total Security antivirus software. Suspicious files can be fully quarantined in the 360 ​​sandbox, under conditions that can guarantee the security of our system. In short, a 360 sandbox is a completely isolated virtual space ("sandbox"). Even if there is a virus or Trojan in the running applications, they will not harm the real computer system. How can 360 sandbox be used? Now I will share these methods with you.
1. Open 360 Total Security.
1.1 Open Sandbox. Click Tool box, the sandbox button will appear.

1.2 Click sandbox. A switch will appear in the upper right corner of the interface to activate the sandbox.


1.3 If you disable the sandbox, the program will no longer run in isolated space. When you click this button, a dialog box will appear. Click “OK” and the sandbox mode will be disabled.


1.4 If the sandbox is activated and you want to run a program in it, simply left-click on the interface to find the main application or program shortcut.

1.5 If the sandbox memory is insufficient, you can clear it to save disk space. Be sure to make sure all important files are backed up before clearing the sandbox memory.

2. File List You can use the following 3 tabs to browse files in the sandbox.


3. Running List Here you can stop a program running in the sandbox.


4. My Toys If you suspect that some software is unsafe or may contain a virus or Trojan horse, use the Add auto-sandbox program to deal with it. Proceed as shown below:

5. You can simplify these steps. Operational approach: 360 Sandbox - Advanced Settings - Notification “Add‘ Run in sandbox ’at context menu”. If you right-click on the program on the desktop, you will see the “Run in sandbox” command on the shortcut menu. You can choose sandbox cleanup according to your options.

Top related articles