• XRATOR
  • Our Experts
  • Contact Us
  • Privacy & Policy
Conquer your risk
  • Home
  • Articles
  • News
  • Research
  • State of the art
No Result
View All Result
  • Home
  • Articles
  • News
  • Research
  • State of the art
No Result
View All Result
Conquer your risk
No Result
View All Result
Home Cybersecurity

How to use Windows 11 Sandbox to launch suspicious files

Sandbox feature in the Professional version of Windows can run suspicious files without risking the integrity of the machine.

Gwendal SmithbyGwendal Smith
October 26, 2022
in Articles, Cybersecurity, Malware
0
Sandbox feature in the Professional version of Windows can run suspicious files without risking the integrity of the machine.

Running a suspicious document or opening a file whose source you don’t know is always risky. However, there is a method that allows you to do this without worrying about your machine’s security. Sandbox is a Windows application that was created in 2018 in Windows 10 and is still available in Windows 11.

You can open a file in a restricted, isolated mini-environment using this tool. This software runs like any application and creates a mini-Windows in Windows, which you can then use to open unknown files without putting your computer at risk. After each use, Windows Sandbox wipes all generated data. This makes it ready for instant use again.

Despite the fact that Windows Sandbox isn’t activated by default in Windows 11, there are a few prerequisites. Moreover, the application is only available on the Professional version of Windows 11. In addition, the virtualization technology must be activated in the BIOS of the PC.

Activate the virtualization

Virtualization is already enabled on Windows 11 machines out of the box, but you can verify this by accessing your PC’s BIOS. The Virtualization Technology line (typically present in the BIOS Advanced options) indicates whether virtualization is active. If it says Enable, virtualization is active.
enter image description here
On your PC, you must change the Disabled setting to Enabled and then restart for the changes to take effect. If the line says Disabled, you must consult your PC manufacturer’s support to learn how to enable it. Esc, F1, F2, F8, or F10 are frequently used to access the BIOS or UEFI.

Access to Windows 11 Optional Apps and Features

Windows 11 Pro does not come with the sandbox enabled by default. You must install it from the Windows Additional Features panel. To do so, open Windows Settings using the Windows + i shortcut, select Applications in the left column, and then click the Optional Features menu.
You need to access optional features to activate Windows 11 sandbox
After you have scrolled through all the options, click on More Windows Features at the bottom of the window to continue.
More optional features are available in Windows 11

Enabling Windows 11 Sandbox

In the Windows Features panel that opens, locate the Windows Sandbox line, check the option and click the OK button to start its installation in Windows 11.
Check the box in the Windows 11 Additional Features to activate it.
Then restart the computer.

Opening Files with the Sandbox

Open the Start menu and click on All Applications to display the list of applications installed on your PC. At the bottom of the list, open the Windows Sandbox application.
A new Windows 11 session should appear as a Sandbox panel on the screen. This session is running independently of the operating system.
You may use this session just as you would your own Windows session to browse the Web, download files, and run them with no risk.
But it is not a 100% failsafe protection. Some very advanced malwares implement Sandbox Evasion Techniques. But for the most common malicious files, such as ransomware, it should work.
Tags: Best PracticesData ProtectionSandboxSecurity PostureWindows Security

Categories

  • Cybercrime
  • Malware
  • Vulnerability & Weakness
  • Threat Intelligence
  • Cyber Attacks
  • Cybersecurity
  • Offensive Security
  • Risk Management
  • Cyberdefense
  • Cyber Insurance

Popular News

  • The H-Factor: Turning Human Into The Strongest Link Of Your Cybersecurity Strategy

    The H-Factor: Turning Human Into The Strongest Link Of Your Cybersecurity Strategy

    0 shares
    Share 0 Tweet 0
  • Understanding and Mitigating the Risk of Computer Memory Exploitation

    0 shares
    Share 0 Tweet 0
  • Three Social Impacts of Ransomware Operations

    0 shares
    Share 0 Tweet 0
  • Methods to Conduct an Insider Threat Risk Assessment

    0 shares
    Share 0 Tweet 0
  • Cyber War, Undefined By Military, Rationalized By Insurers

    0 shares
    Share 0 Tweet 0

"Conquer Your Risk" is a corporate blog for Cybersecurity and Risk Management executives and specialists, sharing XRATOR experts' views on Cybersecurity, Threat Intelligence, Risk Management and Cyber Insurance.

Categories

  • Articles
  • Cyber Attacks
  • Cyber Insurance
  • Cybercrime
  • Cyberdefense
  • Cybersecurity
  • Malware
  • News
  • Offensive Security
  • Research
  • Risk Management
  • Scams
  • State of the art
  • Threat Intelligence
  • Vulnerability & Weakness

Quick Links

  • XRATOR
  • Our Experts
  • Privacy Policy
  • Contact Us

XRATOR® – copyright 2020-2021

No Result
View All Result
  • Contact Us
  • Homepages

© 2018 JNews by Jegtheme.

Manage Cookie Consent
We use cookies to optimize our website and our service.
By closing this windows, you automatically deny non-functionals cookies.
Functional Always active
The technical storage or access is strictly necessary for the legitimate purpose of enabling the use of a specific service explicitly requested by the subscriber or user, or for the sole purpose of carrying out the transmission of a communication over an electronic communications network.
Preferences
The technical storage or access is necessary for the legitimate purpose of storing preferences that are not requested by the subscriber or user.
Statistics
The technical storage or access that is used exclusively for statistical purposes. The technical storage or access that is used exclusively for anonymous statistical purposes. Without a subpoena, voluntary compliance on the part of your Internet Service Provider, or additional records from a third party, information stored or retrieved for this purpose alone cannot usually be used to identify you.
Marketing
The technical storage or access is required to create user profiles to send advertising, or to track the user on a website or across several websites for similar marketing purposes.
Manage options Manage services Manage vendors Read more about these purposes
Preferences
{title} {title} {title}
Manage Cookie Consent
We use cookies to optimize our website and our service.
Functional Always active
The technical storage or access is strictly necessary for the legitimate purpose of enabling the use of a specific service explicitly requested by the subscriber or user, or for the sole purpose of carrying out the transmission of a communication over an electronic communications network.
Preferences
The technical storage or access is necessary for the legitimate purpose of storing preferences that are not requested by the subscriber or user.
Statistics
The technical storage or access that is used exclusively for statistical purposes. The technical storage or access that is used exclusively for anonymous statistical purposes. Without a subpoena, voluntary compliance on the part of your Internet Service Provider, or additional records from a third party, information stored or retrieved for this purpose alone cannot usually be used to identify you.
Marketing
The technical storage or access is required to create user profiles to send advertising, or to track the user on a website or across several websites for similar marketing purposes.
Manage options Manage services Manage vendors Read more about these purposes
Preferences
{title} {title} {title}