Configuring SBIE to balance isolation-by-default, security, and compatibility [suggestions welcome!] #3327
Replies: 1 comment
-
I will admit that I myself am still learning the ins and outs of Sandboxie. There are many of you in the community with deeper technical understanding of Sandboxie (as well as the things that sandboxing actually involves like debugging, trace logs, API calls, system hooks, etc.), and I welcome your thoughts and input! If there are any steps that I described that made you think, "Ah, I know how that should be implemented!" please contribute an explanation! If there are steps that made you think, "Wait, that will never work," (and I'm sure there are!) I would greatly appreciate your insight. And of course if there's anything I've forgotten, or any glaring holes in this plan, please don't hesitate to share. As I continue to familiarize myself with the technical implications of different SBIE options, one big question I have is: Does this seem doable with SBIE Free, or would this necessitate paid features like Security Hardening and/or Compartment mode? (I'm still trying to formulate a decent layperson's description of what those modes change in practice.) |
Beta Was this translation helpful? Give feedback.
-
The Objective
Scenario: Hardening Windows with SBIE isolation-by-default
One particular use-case that has the potential for broad appeal is using Sandboxie not just to virtualize individual cases of potential malware, but as a "daily driver" Windows hardening technique, reducing attack surfaces by isolating new programs from the system as a default.
This setup would be intended for use on a fresh Windows install, where we can assume a clean device. Some steps will likely include:
Users will have a simple dialog to choose whether to isolate new programs.
(This is where batch scripting or a dedicated Windows service might be useful, if it can't be accomplished just within SBIE.)
The End Result
After initially installing and configuring Sandboxie, the user will have a Qubes-like (or rather, Qubes-lite) hardened Windows environment using tiered levels of virtualization, depending on the level of trust:
The tutorial to set up this configuration will be understandable enough that users can choose only certain aspects of it to implement. For example, a user who wants the convenience of these preconfigured sandbox tiers but does not want isolation-by-default can either manually (or perhaps with a simple batch script) remove the ForceProcess parameters, so that new programs are not constantly prompting isolation dialogs.
Ultimately, it will be a thorough—but not highly technical—setup guide that will leave new users with ready-to-use, easy-to-understand sandbox templates that require minimal further configuration to start using without breakage.
Beta Was this translation helpful? Give feedback.
All reactions