Image: inspiring.team/ Shutterstock.com
Every file and every program leaves traces in your system: It accesses other files, utilizes Windows resources, makes entries in the windows registry, and potentially sets up extra software application.
In the best-case circumstance, you will just mess up your Windows if the software application’s uninstall regimen does not erase all associated files and computer system registry entries. In the worst-case situation, malware will contaminate your system or ransomware will secure your files.
If you wish to check out brand-new programs or open unidentified files, it is best to do this in an especially protected environment that is different from the running system: This is precisely what a sandbox provides.
If you open a program in a sandbox, it works as anticipated, however can not make any long-term modifications to the system or gain access to resources outside its environment– the sandbox avoids this, reroutes gain access to, and erases all activities of the program and itself when you close it.
With a sandbox, you can for that reason check out brand-new software application or set up programs from suspicious sources with less danger, browse possibly hazardous sites, and keep your system tidy.
We will reveal you different methods of establishing and utilizing an appropriate sandbox for programs and files under Windows: These variety from Windows on-board resources and virtual systems to web browsers and programs with their own sandbox function.
We explain the Sandboxie-Plus software application in specific information– the easiest and most useful sandbox service for a lot of users.
Additional reading: Is a hacker logged into your Google account? Here’s how to inform
Sandbox for the internet browser
You most likely currently utilize a sandbox: Current web browsers such as Chrome and Firefox utilize this security innovation.
They rely on Windows security systems: This has the benefit that they can ensure a high level of defense without having to utilize a lot of resources, which might result in sites opening gradually.

Like the majority of internet browsers, Chrome opens each tab in its own separated procedure, which can be seen in the Task Manager. All sites are protected from each other.
IDG
Each internet browser tab is opened in its own sandbox. This avoids Chrome and others from immediately downloading programs on a site or running harmful scripts.
This procedure likewise secures versus attacks that are performed through a site without an anti-virus program raising the alarm (zero-day exploits).
Each tab of the web browser runs as a separated procedure and has no access to other tabs or the system. It likewise begins with really restricted rights– which is why you typically have to license a site’s access to the computer system video camera.
In addition, the separation of the specific tabs need to imply that the crash of a site does not disable the whole internet browser, however just the matching tab.
How and whether the web browser sandbox works can be observed in the Windows Task Manager: Under “Processes” you can see that various other procedures are running under the “Google Chrome” entry– these are the different sandboxes of the private tabs.
More reading: How to turn a USB flash drive into a protected login secret for your PC
You can learn more information by getting in the command
chrome://sandbox/
in the internet browser address bar: The tabs here are called “Renderer”– this is the function that shows websites. Each ought to likewise appear in the “Sandbox” column and in the next column with the note “Lockdown.”
Like the “Untrusted” entry to the right, this implies that this procedure has really couple of gain access to rights to the system.

IDG
You need to constantly upgrade your internet browser, as hackers frequently attempt to make use of the sandbox through other security vulnerabilities in order to offer scripts and programs on a site more gain access to rights.
Programs with an integrated sandbox
Windows likewise utilizes a sandbox for particular programs: Apps from the Microsoft Store– the so-called UWP apps (Universal Windows Platform)– run in a separated procedure with minimized rights.
This indicates they can be uninstalled without leaving any residue. In most cases, you should likewise license them to gain access to files or hardware such as the cam or microphone.
Just a couple of users utilize UWP apps. The more often set up basic programs– the so-called desktop apps– run without a sandbox and rights constraints.
You likewise offer numerous UWP apps particular rights throughout setup. You can examine what these are before setup on the app page in the Microsoft Store under the entry “This app can” and after setup in the Windows settings under “Privacy > > App authorizations.”
You can withdraw these rights there– although this typically suggests that the app no longer works properly.

Programs from the Microsoft Store run in a separated environment: However, they frequently ask for various rights throughout setup, which weaken this defense.
Foundry
From variation 24H2, Windows 11 likewise supports a sandbox function for regular programs– Win32 App Isolation. Makers need to integrate this into their software application for the security to work.
Acrobat Reader uses a protected sandbox function for PDF files: If you get a PDF as an accessory from an e-mail or an insecure source, you can avoid code consisted of in the file from being carried out or you from being required to a dubious site when you click a link in the PDF.
To utilize the PDF sandbox, go to “Settings > > Security (innovative)” in the Reader menu and trigger the “Enable safeguarded mode on start-up” choice.
Extra security is offered by the “Protected view” listed below, where you can select whether it needs to use to all PDFs or just to those from insecure sources. The Reader then opens the PDF in read-only mode, which suggests it can not be completed and typically can not be conserved or printed.
The little open source tool Sandboxie-Plus is perfect for running all suspicious files and programs in seclusion. You install it as typical under Windows and can then begin the wanted material straight in a sandbox container.
The total series of functions of Sandboxie-Plus expenses $40 annually: You can pay the developer straight through Paypal or you can purchase a fan certificate on the site.
For usage on a personal computer, nevertheless, the complimentary fundamental functions, which we provide below, suffice.

With Sandboxie-Plus, programs can be begun in a separated environment: They can not access the system and can be eliminated without leaving any residue.
Foundry
Sandboxie-Plus is readily available in variations for basic Windows and for Arm Windows.
The tool can likewise be set up as a mobile app on a USB stick. After setup, you will be welcomed by a setup wizard where you initially choose the alternative “Personal, for non-commercial usage” for the totally free functions.
In the next window, you can get a so-called examination certificate by clicking the red, highlighted text: This permits you to check the software application with all functions for 10 days.
Otherwise, click “Next.” For the interface, you can pick in between a professional and a newbie mode in addition to a light or dark mode for the screen.
It is best to accept the default settings and click “Next” once again. End up establishing the software application in the last window by clicking “Finish.”
In the following window for the “Global settings,” you do not require to change anything and click “OKAY.”
Running dangerous programs in Sandboxie-Plus
Sandboxie-Plus starts with a two-part user interface: At the leading you will see the entry for a “DefaultBox.” You can begin suspicious programs in this box. In the lower window, the tool logs all actions and settings.
The interface can likewise be contacted by right-clicking on the tool icon in the system tray and choosing “Show/ Hide.”
To begin software application securely in a sandbox, click “Sandbox > > Run in sandbox.” Verify the settings in the next window with “OKAY.”
Another window then appears: Enter the name of the software application that you wish to begin in Sandboxie-Plus and verify with “OKAY.” If you do not understand the specific name or the tool can not discover a program that matches your input, you can call the software application straight with the Explorer through “Search.”
This start treatment is suggested for programs that you have actually set up however wish to begin once again in the safe and secure environment– for instance, your web internet browser: If you call it up once again in the sandbox, you can utilize it to go to suspicious sites without danger.
The program then begins: The matching EXE file appears in the top window of Sandboxie-Plus.
You can acknowledge that software application is running in the sandbox by 2 functions: Its name in the program window starts and ends with a diamond sign– for instance, if you open the Chrome web browser in the sandbox and drag the mouse to its icon in the taskbar, it will state [#] New Tab– Google Chrome [#]
If you move the mouse to the leading edge of the program window, a yellow frame appears. There is likewise a window finder in Sandboxie-Plus under “Sandbox– Is the window in a sandbox?”
There, click the circle in the little program window left wing, hold down the left mouse button and launch it in the window of the program whose status you wish to inspect: The response to the concern will then appear in the window finder.
Sandboxie-Plus is likewise gone into in the context menu of Windows Explorer: You can then contact the wanted program with a right-click and the command “Start Sandboxed.”
Software application that you have actually simply downloaded can be set up in the sandbox by beginning the matching EXE or setup file with Sandboxie-Plus.
It is recommended to run each program and each file in its own sandbox: When beginning by means of Sandboxie-Plus or the context menu, choose the entry “Run in a brand-new sandbox” in the next window and after that “Standard sandbox.”
You can likewise offer each sandbox a significant name here.
Essential programs can be begun especially rapidly in Sandboxie-Plus, for instance your web browser, your e-mail program, or Windows Explorer: Click on an existing sandbox in the leading right-hand corner of the tool window.
Choose “Start > > Standard programs” and then the wanted software application.
Open and inspect suspicious files
Like programs, specific files can likewise be opened in a separated sandbox. Sandboxie-Plus begins the default program for this file– for instance Word for a DOCX file.
If the program crashes, alter a setting in Sandboxie-Plus: Open the file in a brand-new sandbox as explained. In the window in which you pick “Standard Sandbox” as the box type, tick the “Configure advanced choices” alternative at the bottom.
After clicking “Next,” choose “Version 1” for “Virtualization plan,” click “Next” a number of times, and surface with “Finish.”

With Sandboxie-Plus, you can inform whether a software application actually operates in the sandbox by the yellow frame around the program window and the hashtags before and after the program name at the top.
IDG
Essential: A program that you begin in the sandbox can just check out files outside the sandbox and can not alter them. If you open a file within the sandboxed software application, it can be altered, however this has no result on the initial file:
If you begin Outlook in the sandbox and erase an e-mail there, it will still be there when you open Outlook generally.
E-mails with suspicious accessories can be analyzed in this method: You open your mail program in the sandbox and open the accessory. If it appears suspicious or originates from an unforeseen sender, erase the sandbox and after that erase the e-mail in your regular e-mail program without opening it or taking a look at the accessory.
Sandboxie-Plus isolates programs and files by producing different directory sites for them: These lie in the program directory site “C: Sandbox username,” where there is a different folder for each sandbox.
The tool likewise shops modifications made by the separated program in the computer registry there. In this method, no traces stay in the system when you erase the matching sandbox.
You can do this by right-clicking on the wanted sandbox in the upper window of Sandboxie-Plus and choosing “Remove sandbox” from the context menu. If you wish to keep the sandbox however close the programs running in it, choose the “Close all procedures” command in the context menu.
Option: Virtual PC
A virtual PC (VPC) is likewise appropriate for beginning dangerous programs or opening suspicious files. Windows consists of the Windows Sandbox for this function. It is a VPC based upon Microsoft’s Hyper-V virtualization software application, however is just consisted of in Windows Pro.
You likewise require to install it initially: You do this through the Control Panel and “Enable or disable Windows functions.” Select the “Windows Sandbox” entry there and reboot the computer system.
You will then discover the program as “Windows Sandbox” in the choice of set up apps. After beginning, another Windows desktop opens as the interface of the virtual PC: You run this as you would your typical system– so you can set up and experiment with programs in the Windows Sandbox.
You can copy and paste suspicious files from the primary system to the virtual Windows.
Considering that the Windows 11 upgrade 22H2, the VPC likewise supports a reboot that protects its information and applications. This just uses if you just reboot the sandbox: If you close the VPC window or reboot the primary system, the contents of the sandbox will be erased.
If you are utilizing Windows Home, you can utilize totally free virtualization programs such as Virtualbox for a VPC. The virtual computer system requires an operating system– if it is to be Windows, you will require an extra lisence for this.
A VPC is mainly separated from the primary system and is a safe and secure test environment.
Compared to Sandboxie-Plus, nevertheless, it is extra-large if you just sometimes wish to check out unidentified programs or open suspicious e-mail accessories: You need to install your own os in the VPC, which puts similarly high needs on your computer system’s hardware.
This uses on the one hand to CPU efficiency, however above all to RAM: You need to offer a minimum of 4GB of RAM specifically for the virtual system; more RAM substantially increases the ease of usage of the VPC.
It is likewise not perfect for a fast file check: You need to begin the VPC like a typical system and wait till the virtual Windows is all set for usage.
This short article initially appeared on our sis publication PC-WELT and was equated and localized from German.
Author: Thomas Rau
Contributor, PCWorld
Thomas Rau has actually been composing for our German sis website PC-WELT for over 20 years. His focus is on laptop computers and network gadgets – in these locations he mainly evaluates organization and video gaming laptop computers, along with WLAN routers and WLAN repeaters.