PCWorld

Windows Sandbox: How to use Microsoft’s virtual Windows PC to secure your digital life

Microsoft may have positioned its easy-peasy Windows Sandbox within the Windows 10 May 2019 Update as a safe zone for testing untrusted applications, but it’s much more than that. Windows Sandbox, and sandboxing PC apps in general, give you a solution for trying a “utility” that may be malware, or a website that you’re not sure about. You could leave those potentially dangerous elements alone, but with Sandbox, you can be a little more adventurous.

Windows Sandbox creates a secure “Windows within Windows” virtual machine environment entirely from scratch, and walls it off from your “real” PC. You can open a browser and surf securely, download apps, even visit websites that you probably shouldn’t. Sandbox also includes a unique convenience: it lets you copy files in and out of the virtual PC, bringing them out of quarantine if you’re sure they’re safe.

At any time, you can close Windows Sandbox, and when you do, anything left there is totally obliterated. If that dodgy website rains malware

You’re reading a preview, subscribe to read more.

More from PCWorld

PCWorld1 min read
Tech Spotlight
When Nvidia switch the naming scheme of its graphics cards from GTX to RTX it ushered in a new era for the company. Years later, Keith is here to look at how, if at all, RTX hardware has changed the way we game and what it could mean for the future.
PCWorld5 min read
Be Safe! How I Set Up A ‘Paranoid PC’ To Surf The Risky Web
In the 1990s, a colleague took me to “Snake Alley,” Taipei’s red-light district, for a night of drinking with “entertainers” and some of their very muscled, serious friends. A good time was had by all, fortunately. Still, I was young, dumb, and very
PCWorld5 min readSecurity
How Do I Remove Malware From My PC?
Every device you use is under attack. And malware isn’t just a prank that slows down your PC anymore—it’s big business. Modern malware is the domain of organized crime, from ransomware that holds your files hostage to keyloggers and Trojans designed

Related