Windows Sandbox Works Around Untrusted Software

Have you ever been in a predicament where you have downloaded some software, but then a pop-up arrives and says “we can’t identify who this is, or what it does” and suddenly your uncertain if your about to put yourself at risk? Welcome to the club. 

Microsoft has noticed this precarious situation and created a workaround for such scenarios. Utilizing Microsoft Sandbox, you are now able to run untrusted software without fear of compromise to your PC. This feature is available for Windows 10 users and will essentially create a playground area where you can access software and test it to ensure its validity, hence the name “Sandbox”. This “lightweight virtual machine” for Windows 10 Pro and Enterprise is built using the same technology that powers the Windows Containers, but without the need for Windows Servers. 

Windows Sandbox is built directly into Windows 10 Pro and Enterprise build 18305 or later, and the space requirements are minimal, being only 4GB of RAM and 1GB of disk space! Once a sandbox instance is created, it is basically treated as a clean installation of Windows, the bare minimum and only requires 100MB of hard drive space. The way you use Sandbox is a cinch as well, just run the instance, open the Pandora’s box of software and see the results! When your finished, simply close Sandbox and resume your usual activity!

The incorporation of a Sandbox function on Windows will help provide a great sense of security for the users, and help quickly resolve potential problems. 

What do you think? Let us know!

As always, if you have any questions or I.T. needs, just give us a call at Re2 Tech! We make I.T. easy! 

Phone: 952-223-4422


Share This Article

Strong Password, IT Tech, why a strong password, how to make a strong password, IT, Strong Password, password, cyber security, making a strong password

The Importance of a Strong Password and What Makes One

Your password is your key to the world of online security. The stronger your password is, the safer you are. But what makes a strong password? How do you create one? And why should you care? You’ll find answers to all these questions in this article! Why Does Your Password Matter? The security of your

Read More »
IT Consulting, IT management, managed IT, IT partner, how does IT consulting work, IT consulting services

How Do IT Consulting Services Work, and Why Do You Need It?

When you hear the term “IT consultant,” it’s easy to assume that it refers to someone who helps people set up their new iPhones. But in the business world, “IT consultant” is a much more complex and important role. An IT consultant may be hired by companies of all sizes to help them achieve their

Read More »
E-Waste, e-waste recycling, computer recycling, electronic waste recycling, electronic waste, how to properly recycle your electronics electronic recycling

The Importance of E-Waste Recycling

E-Waste is Becoming A Major Problem The world is becoming increasingly dependent on electronics. We use our phones and computers more than ever to communicate, shop, and entertain ourselves. But with this increased reliance comes an increased waste stream. Environmental activists have been sounding the alarm about the amount of e-waste being produced in recent

Read More »